[1]
|
SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612–613. doi: 10.1145/359168.359176 |
[2]
|
DU Yutao and BAO Wansu. Dynamic quantum secret sharing protocol based on two-particle transform of Bell states[J]. Chinese Physics B, 2018, 27(8): 080304. doi: 10.1088/1674-1056/27/8/080304 |
[3]
|
HILLERY M, BUŽEK V, and BERTHIAUME A. Quantum secret sharing[J]. Physical Review A, 1999, 59(3): 1829–1834. doi: 10.1103/PhysRevA.59.1829 |
[4]
|
CLEVE R, GOTTESMAN D, and LO H K. How to share a quantum secret[J]. Physical Review Letters, 1999, 83(3): 648–651. doi: 10.1103/PhysRevLett.83.648 |
[5]
|
CRÉPEAU C, GOTTESMAN D, and SMITH A. Secure multi-party quantum computation[C]. The 34th Annual ACM Symposium on Theory of Computing, Montréal, Canada, 2002: 643–652. |
[6]
|
GUO Guoping and GUO Guangcan. Quantum secret sharing without entanglement[J]. Physics Letters A, 2003, 310(4): 247–251. doi: 10.1016/S0375-9601(03)00074-4 |
[7]
|
ZHANG Zhanjun. Multiparty quantum secret sharing of secure direct communication[J]. Physics Letters A, 2005, 342(1/2): 60–66. |
[8]
|
YAN Fengli and GAO Ting. Quantum secret sharing between multiparty and multiparty without entanglement[J]. Physical Review A, 2005, 72(1): 012304. doi: 10.1103/PhysRevA.72.012304 |
[9]
|
LIU Hongwei, MA Haiqiang, WEI Kejin, et al. Multi-group dynamic quantum secret sharing with single photons[J]. Physics Letters A, 2016, 380(31/32): 2349–2353. doi: 10.1016/j.physleta.2016.05.032 |
[10]
|
YANG Yuguang, TENG Yiwei, CHAI Haiping, et al. Verifiable quantum (k, n)-threshold secret key sharing[J]. International Journal of Theoretical Physics, 2011, 50(3): 792–798. doi: 10.1007/s10773-010-0616-7 |
[11]
|
YANG Yuguang, JIA Xin, WANG Hongyang, et al. Verifiable quantum (k, n)-threshold secret sharing[J]. Quantum Information Processing, 2011, 11(6): 1619–1625. doi: 10.1007/s11128-011-0323-1 |
[12]
|
SONG Yun, LI Zhihui, and LI Yongming. A dynamic multiparty quantum direct secret sharing based on generalized GHZ states[J]. Quantum Information Processing, 2018, 17(9): 244. doi: 10.1007/s11128-018-1970-2 |
[13]
|
宋云. 基于GHZ态局域测量的量子秘密共享[J]. 电子学报, 2019, 47(7): 1443–1448. doi: 10.3969/j.issn.0372-2112.2019.07.007
SONG Yun. Quantum secret sharing based on GHZ states local measurements[J]. Acta Electronica Sinica, 2019, 47(7): 1443–1448. doi: 10.3969/j.issn.0372-2112.2019.07.007 |
[14]
|
DU Yutao and BAO Wansu. Multiparty quantum secret sharing scheme based on the phase shift operations[J]. Optics Communications, 2013, 308: 159–163. doi: 10.1016/j.optcom.2013.06.014 |
[15]
|
LU Changbin, MIAO Fuyou, HOU Junpeng, et al. Verifiable threshold quantum secret sharing with sequential communication[J]. Quantum Information Processing, 2018, 17(11): 310. doi: 10.1007/s11128-018-2059-7 |
[16]
|
BAI Chenming, LI Zhihui, and LI Yongming. Sequential quantum secret sharing using a single qudit[J]. Communications in Theoretical Physics, 2018, 69(5): 513–518. doi: 10.1088/0253-6102/69/5/513 |
[17]
|
YE Chongqiang and YE Tianyu. Circular semi-quantum secret sharing using single particles[J]. Communications in Theoretical Physics, 2018, 70(6): 661–671. doi: 10.1088/0253-6102/70/6/661 |
[18]
|
YANG Yuguang, GAO Shang, LI Dan, et al. Three-party quantum secret sharing against collective noise[J]. Quantum Information Processing, 2019, 18(7): 215. doi: 10.1007/s11128-019-2319-1 |
[19]
|
WANG Yu, TIAN Caixing, SU Qi, et al. Measurement-device-independent quantum secret sharing and quantum conference based on Gaussian cluster state[J]. Science China Information Sciences, 2019, 62(7): 72501. doi: 10.1007/s11432-018-9705-x |
[20]
|
许娟, 陈汉武, 刘文杰, 等. 无纠缠量子秘密共享中酉操作的选择[J]. 中国科学: 信息科学, 2011, 54(9): 1837–1842. doi: 10.1007/s11432-011-4240-9
XU Juan, CHEN Hanwu, LIU Wenjie, et al. Selection of unitary operations in quantum secret sharing without entanglement[J]. Science China Information Sciences, 2011, 54(9): 1837–1842. doi: 10.1007/s11432-011-4240-9 |
[21]
|
黄鹏, 周南润, 刘晔. 基于多目标量子远程通信的秘密共享协议[J]. 通信学报, 2008, 29(3): 114–118. doi: 10.3321/j.issn:1000-436X.2008.03.018
HUANG Peng, ZHOU Nanrun, and LIU Ye. Secret sharing protocol based on multi-target quantum teleportation[J]. Journal on Communications, 2008, 29(3): 114–118. doi: 10.3321/j.issn:1000-436X.2008.03.018 |
[22]
|
魏春艳, 蔡晓秋, 王天银, 等. 基于量子不经意密钥传输的量子匿名认证密钥交换协议[J]. 电子与信息学报, 2020, 42(2): 341–347. doi: 10.11999/JEIT190679
WEI Chunyan, CAI Xiaoqiu, WANG Tianyin, et al. Quantum anonymous authenticated key exchange protocol based on quantum oblivious Key transfer[J]. Journal of Electronics &Information Technology, 2020, 42(2): 341–347. doi: 10.11999/JEIT190679 |
[23]
|
施荣华, 冯艳艳, 石金晶. 基于正则图上量子游走的仲裁量子签名方案[J]. 电子与信息学报, 2020, 42(1): 89–97. doi: 10.11999/JEIT190597
SHI Ronghua, FENG Yanyan, and SHI Jinjing. Arbitrated quantum signature scheme with quantum walks on regular graphs[J]. Journal of Electronics &Information Technology, 2020, 42(1): 89–97. doi: 10.11999/JEIT190597 |
[24]
|
李宏伟. 量子密钥分配协议的安全性分析[D]. [硕士论文], 解放军信息工程大学, 2009.
LI Hongwei. Security proof of quantum key distribution[D]. [Master dissertation], PLA Information Engineering University, 2009. |