[1] Hillery M, Buzek V, Berthiaume A. Quantum secret sharing [J]. Physic Review A, 1999, 59: 1829-1834.[2] Nascimento A C A, Mueller Q J, Imai H. Improving quantum secret sharing schemes [J]. Physic Review A, 2001, 64, 042311.[3] Hsu L Y. Quantum secret-sharing protocol based on Grover's algorithm [J]. Physic Review A, 2003, 68, 022306.[4] Lance A M, Symul T, Bowen W P, et al. Continuous variable(2,3) threshold quantum secret sharing schemes [J]. New Journal of Physics, 2003, 5(4): 1.[5] Pang L J, Wang Y M. (f,n) threshold secret sharing scheme based on RSA cryptosystem [J]. Journal of china Institute of Communications, 2005, 26(6): 70-73.[6] 周南润, 黄鹏, 刘晔, 等. 两步量子安全直接通信协议的信息论分析[J]. 量子光学学报, 2008, 14(4): 388-393.[7] Li H X, Wang W. Efficient and secure quantum secret sharing scheme based on polarized single photons [J]. Computer Engineering and Design, 2010, 31(11): 2442-2444.[8] Scherpelz P, Resch R, Berryrieser D, et al. Entanglement-secured single-qubit quantum secret sharing [J]. Physic Review A, 2011, 84: 032303.[9] Huang H M. Secret sharing protocol of an unknown quantum state based on three-particle entangled state [J]. Laser Journal, 2012, 33(6): 38-40. [10] Fan C, Ru P. Proactive secret sharing scheme based on ECC [J]. Computer Simulation, 2012, 29(12): 131-134. [11] Zhang Z, Ma Z. Quantum protocol based on W state and Bell-state [J]. Journal of Information Engingeering University, 2013, 14(3): 263-269. [12] Wei K J, Ma H Q,W L. A quantum secret sharing scheme based on two polarization beam splitters [J]. Acta Physica Sinica, 2013, 62(10): 104205.[13] Li Q, Chan W H, Long D Y. Semiquantum secret sharing using entangled states [J]. Physic Review A, 2010, 82(2): 022303.[14] Hillery M, Buzek V, Berthiaume A. Quantum secret sharing [J]. Physic Review A, 1999, 59(3): 1829-1834.[15] 曾贵华. 量子密码学[M]. 北京: 科学出版社, 2006, 195-210. |