[1] Zhao S M, Zheng B Y. Quantum information Processing Techniques [M]. Beijing:Posts and telecommunications Press, 2010: 14-19 (in Chinese). 赵生妹,郑宝玉. 量子信息处理技术[M]. 北京:北京邮电大学出版社,2010:14-19. [2] Zhang Q Y. Quantum secret sharing of single-qubit state via tripartite entangled states[J]. Chinese Journal of Quantum Electronics (量子电子学报),2012,29(4):421-426(in Chinese). 张群永. 基于三粒子纠缠态的未知单粒子态量子秘密共享[J]. 量子电子学报,2012, 29(4):421-426. [3] Sun X M, Zha X W, Qi J X, Lan Q. High-efficient quantum state sharing via non-maximally five-qubit cluster state[J]. Acta Physical Sinica(物理学报),2013,62(23): 20-28 (in Chinese). 孙新梅,查新未,祁建霞,兰倩.基于非最大纠缠的五粒子Cluster态的高效量子态共享方案[J].物理学报,2013,62(23):20-28. [4] He X L, Yang C P. Deterministic transfer of multiqubit GHZ entangled states and quantum secret sharing between different cavities[J]. Quantum Information Processing, 2015, 14(12):4461-4474. [5] Qin H, Dai Y. d -Dimensional quantum state sharing with adversary structure[J]. Quantum Information Processing, 2016, 15(4):1689-1701. [6] Zhu Z C, Hu A Q, Fu A M. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation[J]. International Journal of Theoretical Physics, 2016, 55(5):2342-2353. [7] Liu F, Su Q, Wen Q Y. Eavesdropping on Multiparty Quantum Secret Sharing Scheme Based on the Phase Shift Operations[J]. International Journal of Theoretical Physics, 2014, 53(5):1730-1737. [8] Deng F G, Li X H, Zhou H Y, et al. Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack[J]. Physical Review A, 2005, 72(4):440-450. [9] Zhang K J, Jia H Y. Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme[J]. International Journal of Theoretical Physics, 2015, 54(2):582-588. [10] Wang L, Zou L, Zhao S M. A Novel Quantum Secret Sharing with a Trustful Center[J]. Chinese Journal of Quantum Electronics (量子电子学报),2014,31(5): 591-598 (in Chinese). 王乐,邹丽,赵生妹. 一种含有安全可信任中心的量子秘密共享方案[J]. 量子电子学报, 2014, 31 (5): 591-598. [11] Gao F, Qin S J, Guo F Z, et al. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols[J]. IEEE Journal of Quantum Electronics, 2011, 47(5):630-635. [12] Zhao S M, Li M M, Zheng B Y. A Novel Quantum Key Distribution Protocol Based on Quantum Error Correction Code[J]. Journal of Electronics & Information Technology(电子与信息学报), 2009,31(4):954-957(in Chinese). 赵生妹,李苗苗,郑宝玉. 一种基于量子纠错编码的量子密钥分配协议[J].电子与信息学报,2009,31(4):954-957. [13] Zhao S M, Zhu X L, Xiao Y. A Novel Construction of Quantum LDPC Codes Based on Balanced Incomplete Block Designs[J]. Journal of Electronics & Information Technology(电子与信息学报), 2011,33(1):218-222(in Chinese). 赵生妹,朱修利,肖宇. 一种基于BIBD的量子LDPC 码构造新方法[J].电子与信息学报,2011,33(1):218-222. [14] Lin J, Yang C W, Tsai C W, et al. Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements[J]. International Journal of Theoretical Physics, 2013, 52(1):156-162. [15] Shi J, Shi R, Peng X, et al. Distributed Quantum Packet Transmission in Non-maximally Entangled Relay System[J]. International Journal of Theoretical Physics, 2015, 54(4):1128-1141. [16] Song T T, Wen Q Y, Gao F, et al. Participant Attack and Improvement to Multiparty Quantum Secret Sharing Based on GHZ States[J]. International Journal of Theoretical Physics, 2013, 52(1):293-301. [17] Yin A, Fu F. Eavesdropping on Semi-Quantum Secret Sharing Scheme of Specific Bits[J]. International Journal of Theoretical Physics, 2016, 55(9):4027-4035. [18] Yang Y G, Xia J, Shi L, et al. Comment on “Quantum Secure Direct Communication with Authentication Expansion Using Single Photons”[J]. International Journal of Theoretical Physics, 2012, 51(12):3681-3687. [19] Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices[C]. Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on. IEEE, 2004: 136. |