[1] Bennett C H, Brassard G, Mermin N D. Quantum Cryptography without Bells Theorem[J]. Physical Review Letter, 1992, 68: 557- 569.[2] Hillery M, Buzek V, Berthiaume A. Quantum Secret Sharing[J]. Physical Review A, 1999, 59: 1829-1834.[3] 林青群, 王发强, 米景隆, 等, 基于随机相位编码的确定性量子密钥分配[J]. 物理学报,2007,56: 5796-5801.[4] 陶原, 潘炜, 罗斌, 等. 基于W态的网络中任意两个用户间量子密钥分配方案[J]. 电子与信息学报, 2008, 30: 2588-2591.[5] Zhu Aidong, Zhang Shou. Quantum key distribution and controlled quantum direct communication applying product state of qutrit [ J]. Chinese Journal of Quantum Electronics(量子电子学报), 2007,24(3) : 316(in Chinese).[6] LEE H, HONG C, K IM H, et al. Arbitrated Quantum Signature Scheme With message Recovery [ J]. Physical Review A, 2004,321: 295-300.[7] Zhou N R, Zeng G H, Zeng W J, et al. Cross-center quantum identification scheme based on teleportation and entanglement swapping. Optics Communications, 2005, 254: 380—388.[8] Bostrom K, Felbinger T. Deterministic Secure Direct Communication Using Entanglement[J]. Physical Review Letter, 2002, 89: 187902.[9] Wang J, Zhang Q, Tang C J. Quantum Secure Direct Communication Based on Order Rearrangement of Single Photons[J]. Physical Review A, 2006,358: 256-258.[10] Wang J, Zhang Q, Tang C J. Multiparty Controlled Quantum Secure Direct Communication Using Greenberger-Horne-Zeilinger State[J].Optics Communications, 2006, 266: 732- 737.[11] 龙桂鲁,王川,李岩松,邓富国. 量子安全直接通信[J]. 中国科学,2011,41: 332-342.[12] Ji Xin, Zhang Shou. Teleportation of the there-particle entangled state by the two EPR pairs [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2006,23(6) : 816(in Chinese).[13] Bennet C H, Brassard G.. Quantum cryptography: Public-key distribution and tossing[C]// IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 1984.[14] Bennett C H. Quantum cryptography using any two nonorthogonal states[J].Physical Review Letters, 1992, 68: 3121-3124.[15] EKERT A K. Quantum cryptography based on B ell. s theorem [J].Physical Review Letters, 1991, 67: 66663.[16] BRUB D. Optimal Eavesdropping in Quantum Cryptography with SixStates[J].Physical Review Letters, 1998, 81: 3108-3021.[17] SONG D. Secure key distribution by swapping quantum entanglement[J].Physical Review A, 2004, 69: 034301.[18] 张德喜,赵秋宇,李晓宇.利用贝尔测量的高效量子密钥分配协议[J].电子科技大学学报,2006,35:917-923.[19] GAO G.. Quantum key distribution by comparing Bell states [J].2008, 281: 876-879.[20] YUAN H, SONG J, HAN L F, et al. Improving the total efficiency of quantum key distribution by comparing Bell states [J]. Optics Communication, 2008, 281: 4803- 4806.[21] Nanrun Z, Li J W, LI H G, Xiang W Z, Ye L. Quantum deterministic key distribution protocols based on teleportation andentanglement swapping[J]. Optics Communications, 2011,284: 4836–4842.[22] Cinelli C, Barbieri M, Martini F D, et al. Realization of hyperentangled two-photon states[J]. International Journal of Laser Physics, 2005,15:124-128. |