Improved Three-Party Quantum Secret Sharing Based on Bell States
暂无分享,去创建一个
[1] Qiaoyan Wen,et al. Participant attack on a kind of MQSS schemes based on entanglement swapping , 2010 .
[2] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[3] 宋婷婷,et al. Participant attack on quantum secret sharing based on entanglement swapping , 2009 .
[4] Tzonelih Hwang,et al. Multiparty quantum secret sharing based on GHZ states , 2011 .
[5] Wang Yan,et al. Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .
[6] Deng Fu-Guo,et al. Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .
[7] Deng Fu-Guo,et al. Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .
[8] Chun-Wei Yang,et al. Thwarting intercept-and-resend attack on Zhang’s quantum secret sharing using collective rotation noises , 2012, Quantum Inf. Process..
[9] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[10] Christian Kurtsiefer,et al. Experimental demonstration of a quantum protocol for byzantine agreement and liar detection. , 2007, Physical review letters.
[11] Qiaoyan Wen,et al. Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.
[12] Qiao-Yan Wen,et al. Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.
[13] Quantum memory for individual polarized photons , 2003, quant-ph/0301009.
[14] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[15] Xiao-Fen Liu,et al. Cryptanalysis of quantum secret sharing based on GHZ states , 2011 .
[16] Wen Qiao-Yan,et al. Cryptanalysis of the arbitrated quantum signature protocols , 2011 .
[17] Z. Man,et al. Multiparty quantum secret sharing of classical messages based on entanglement swapping , 2004, quant-ph/0406103.
[18] D. Gottesman. Theory of quantum secret sharing , 1999, quant-ph/9910067.
[19] Su-Juan Qin,et al. Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .
[20] N. Lutkenhaus,et al. Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses , 2004, quant-ph/0411041.
[21] K. Peng,et al. Multiparty secret sharing of quantum information based on entanglement swapping , 2004 .
[22] Qiaoyan Wen,et al. Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .
[23] Qin Li,et al. Arbitrated quantum signature scheme using Bell states , 2009 .
[24] Fuguo Deng,et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.
[25] A Cabello. Quantum key distribution in the Holevo limit. , 2000, Physical review letters.
[26] Ping Zhou,et al. Deterministic secure quantum communication without maximally entangled states , 2006 .
[27] Fei Gao,et al. A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..
[28] Zhou Hong-Yu,et al. Multiparty Quantum Secret Report , 2006 .
[29] R. Cleve,et al. HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.
[30] Wen Qiao-Yan,et al. Cryptanalysis of Multiparty Quantum Secret Sharing of Quantum State Using Entangled States , 2008 .
[31] Nguyen Ba An. Quantum exam , 2006 .
[32] Fei Gao,et al. Comment on “Multiparty quantum secret sharing of classical messages based on entanglement swapping” , 2007 .
[33] Quantum secret sharing between multiparty and multiparty with entanglement swapping , 2008 .