[1] C.H. Bennett and G. Brassard, in Proceedings of IEEE International Conference on Computer, Systems and Signal Processing,Bangalore, India, IEEE, New York,1984 ,175--179
[2]A.K. Ekert, Quantum cryptography based on Bell’s theorem[J],Phys. Rev. Lett. 1991, 67:661--663
[3]C.H. Bennett, G. Brassard, and N.D. Mermin, Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels[J],Phys. Rev.Lett 1992,68: 557--559
[4] P. Xue, C.F. Li, and G.C. Guo, Conditional efficient multiuser quantum cryptography network[J], Phys. Rev. 2002,A 65:022317
[5]A. Acin, N. Gisin, and V. Scarani, Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks[J],Phys. Rev. 2004,A69:012309
[6]K. Bostrom and T. Felbinger, Deterministic secure direct communication using entanglement[J],Phys. Rev. Lett.2002,89:187902.
[7]F.G. Deng, G.L. Long, and X.S. Liu, Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block[J],Phys. Rev. 2003,A 68:042317.
[8] F.L. Yan andX.Q. Zhang, A scheme for secure direct communication using epr pairs and teleportation[J],Euro. Phys. J. B ,2004,41:75
[9]H.J. Cao andH.S. Song, Quantum secure direct communication with W state,Phys. Scr. 2006,74:572
[10]M. Hillery, V. Buzek, and A. Berthiaume, Quantum secret sharing[J],Phys.Rev.1999, A59 :1829
[11] G.P. Guo and G.C. Guo, Entanglement of individual photon and atomic ensembles[J],Phys. Lett. 2003,A 310 : 247
[12] A.M. Lance, et al, Continuous-variable quantum-state sharing via quantum disentanglement[J],Phys. Rev.2005 ,A 71: 033814 |