Threshold Quantum Secret Sharing of Secure Direct Communication
暂无分享,去创建一个
[1] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[2] Zhan-jun Zhang,et al. Multiparty quantum secret sharing , 2004, quant-ph/0412203.
[3] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[4] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[5] M. Koashi,et al. Quantum entanglement for secret sharing and secret splitting , 1999 .
[6] Vlatko Vedral,et al. Security of EPR-based quantum cryptography against incoherent symmetric attacks , 2001 .
[7] Tatsuaki Okamoto,et al. Threshold quantum cryptography , 2005 .
[8] Edo Waks,et al. Security of quantum key distribution with entangled photons against individual attacks , 2000, quant-ph/0012078.
[9] Deng Fu-Guo,et al. Efficient Quantum Cryptography Network without Entanglement and Quantum Memory , 2006 .
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[12] Harald Weinfurter,et al. Secure Communication with a Publicly Known Key , 2001 .
[13] Z. Man,et al. Multiparty quantum secret sharing of classical messages based on entanglement swapping , 2004, quant-ph/0406103.
[14] Fuguo Deng,et al. Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.
[15] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[16] Zhan-Jun Zhang,et al. Multiparty quantum secret sharing of secure direct communication , 2005 .
[17] Zhan-jun Zhang,et al. Improving Wojcik's eavesdropping attack on the ping-pong protocol , 2004 .
[18] Yi-Min Liu,et al. Multiparty quantum secret sharing of secure direct communication using single photons , 2008 .
[19] Wang Jian,et al. Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation , 2007 .
[20] Wang Yan,et al. Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations , 2005 .