参考文献:
[1] Goldwasser S,Micali S,Rackoff C. The knowledge complexity of interactive proof system[J]. SIAM Journal on Computing,1989,18(1): 186-208.
[2] Brassard G,Crepeau C,Yung M.Constant-round perfect zero-knowledge computationally convincing protocols[J].Theoretical Computer Science,1991,84 (1): 23-52.
[3] Goldreich O,Kahan A.How to construct constant-round zero-knowledge proof system for NP[J].J Cryptology,1996,9(3): 167-189.
[4] Fei Xiangdong, Guo Baoan. Discussion of three basic zero knowledge proof types solutions[J]. Computer Engineering and Applications(计算机工程与应用), 2004, 40(8): 75-132 (in Chinese).
[5] Meng Yan,Hou Zhengfeng,Ang Dongyu,et al.One-round zero-knowledge proofs protocol based on elliptic curve[J]. Computer Technology and Development (计算机技术与发展), 2007, 17(12): 147-150 (in Chinese).
[6] Deng Yi,Lin Dongdai. Efficient concurrent zero knowledge arguments for NP in the bare pubfic-key model[J]. Journal of Software (软件学报), 2008, 19(2): 468-478.
[7] Mayers D. Unconditionally secure quantum bit commitment is impossible[J]. Physical Review Letters, 1997, 78(17): 3414- 3417.
[8] Lo H K, Chau H F. Is quantum bit commitment really possible? [J]. Physical Review Letters,
1997, 78(17): 3410- 3413.
[9] Lo H K. Insecurity of quantum secure computation[J]. Physical Review A, 1997, 56(2): 1154-1162.
[10] He G P, Wang Z D. Oblivious transfer using quantum entanglement[J]. Physical Review A, 2006, 73(1): 012331.
[11]Kobayashi H. General properties of quantum zero-knowledge proofs[C]. Proceedings of the 5th Theory of Cryptography Conference, 2008.
[12]Wang Yuwu,Zhan Youbang. A theoretical scheme for zero-knowledge proof quantum identity authentication[J]. Acta Physica Sinica(物理学报), 2009, 5(11): 7668-7671 (in Chinese).
[13]Wen Xiaojun, Chen Yongzhi. Quantum Signature and Its Application(量子签名及应用)[M]. Beijing: Aviation Industry Press, 2012: 35-38(in Chinese).
[14]Fan Xincan, Wen Xiaojun.Improvement of data link layer algorithm based on quantum teleportation[J]. Chinese Journal of Quantum Electronics(量子电子学报), 2015, 32(4): 466-
471 (in Chinese).
[15] Dong Yingdi, Peng Jinye. Quantum channel authentication scheme via weak cross-Kerr nonlinearity[J]. Journal of Quantum Optics(量子光学学报), 2015, 21(4): 334-338 (in Chinese).
[16] Zhou Yuanyuan, Li Xiaoqiang, Zhou Xuejun. Study on BB84-decoy-state quantum key distribution with a heralded single photon source[J]. Chinese Journal of Quantum Electronics(量子电子学报), 2010, 27(5): 565-572 (in Chinese).
[17] Wu Zhangbin, Chen Guang, Yang Bojun. Improve the performance of BBM92 quantum key distribution system[J]. Chinese Journal of Quantum Electronics(量子电子学报), 2009, 26(5): 560-564 (in Chinese).
[18] Mao Qianping,Zhao Shengmei,Wang Le,et al.Measurement-device-independent quantum key distribution based on wavelength division multiplexing technology[J].Chinese Journal of Quantum Electronics(量子电子学报), 2017, 34(1): 46-53 (in Chinese).
[19] Wang Haihong, Zhao Shengmei, Gong Longyan.A quantum key distribution protocol based on challenge-response mechanism[J].Chinese Journal of Quantum Electronics(量子电子学报), 2015, 32(4): 452-458 (in Chinese).
[20] Zhuansun Shaoshuai,Chen Hong,Cai Xiaoxia.QDKD based on W state and Bell state entanglement[J].Chinese Journal of Quantum Electronics(量子电子学报), 2015, 32(2): 178-185 (in Chinese).
|