[1] Zhang Yongsheng, Li Chuanfeng, Guo Guangcan. Quantum key distribution via quantum encryption [J]. Physical Review A, 2001, 64, 024302 [2] Kim Boström, Timo Felbinger. Deterministic Secure Direct Communication Using Entanglement [J]. Physical Review Letters, 2002, 89, 187902 [3] Deng Fuguo, Long Guilu, Liu Xiaoshu. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block [J]. Physical Review A, 2003, 68, 042317 [4] Antoni Wójcik. Eavesdropping on the “Ping-Pong” Quantum Communication Protocol [J]. Physical Review Letters, 2003, 90, 157901 [5] Cai Qingyu, Li Baiwen. Improving the capacity of the Boström-Felbinger protocol [J]. Physical Review A, 2004, 69, 054301 [6] Deng Fuguo, Long Guilu. Secure direct communication with a quantum one-time pad [J]. Physical Review A, 2004, 69, 052319 [7] Man Zhongxiao, Zhang Zhanjun, Li Yong. Deterministic Secure Direct Communication by Using Swapping Quantum Entanglement and Local Unitary Operations [J]. Chin. Phys. Lett., 2005, 22, 18 [8] Wang Chuan, Deng Fuguo, Li Yansong, et al. Quantum secure direct communication with high-dimension quantum superdense coding [J]. Physical Review A, 2005, 71, 044305 [9] Li Xihan, Deng Fuguo, Zhou Hongyu. Improving the security of secure direct communication based on the secret transmitting order of particles [J]. Physical Review A, 2006, 74, 054302 [10] Wang Jian, Zhang Quan, Tang Chaojing. Multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state [J]. Optics Communications, 2006, 266, 732 [11] Zhu Aidong, Xia Yan, Fan Qiubo, Zhang Shou. Secure direct communication based on secret transmitting order of particles [J]. Physical Review A, 2006, 73, 022338 [12] Gu Bin, Pei ShiXin, Song Biao, Zhong Kun. Deterministic secure quantum communication over a collective-noise channel [J]. Science in China Series G: Physics, Mechanics and Astronomy, 2009, 52, 1913 [13] Han Yunguang, Yin Zhenqiang, Li Hongwei, et al. Security of modified Ping-Pong protocol in noisy and lossy channel [J]. Scientific Reports, 2014, 4 [14] Saber Bagherinezhad, Vahid Karimipour. Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers [J]. Physical Review A, 2003, 67, 044302 [15] Xie Deng, Ye Mingyong, Li Xinghua. Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger–Horne–Zeilinger States [J]. Commun. Theor. Phys., 2011 [16] Deng Fuguo. Ph. D. Dissertation, Tsinghua University, Beijing, 2004 (in Chinese) [17] Zhang Qunyong. Quantum secret sharing of single-qubit state via tripartite entangled states [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2012, 29(4):421-426, (in Chinese) [18] Wang Jindong, Zhang Zhiming. Unconditional security of quantum key distribution based on practical devices [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2014, 31(4):449-458, (in Chinese) [19] Yu Zhenbo, Liu Xiaoqing. Quantum secret sharing protocol based on W state [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2014, 31(5):605-609, (in Chinese) [20] ZhuanSun Shaoshuai, Chen Hong. A quantum deterministic key distribution protocol based on W states [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2014, 31(6):734-739, (in Chinese) |