Quantum Dialogue Protocol Using a Class of Three-Photon W States
暂无分享,去创建一个
Dong Li | Xiu Xiao-Ming | Gao Ya-Jun | Chi Feng | Xiu Xiao-Ming | D. Li | Gao Ya-Jun | Chi Feng
[1] Fuguo Deng,et al. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.
[2] 张寿,et al. Secure quantum dialogue based on single-photon , 2006 .
[3] Xiu Xiao-Ming,et al. Quantum Secure Direct Communication Using W State , 2008 .
[4] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[5] F. L. Yan,et al. A scheme for secure direct communication using EPR pairs and teleportation , 2004 .
[6] Z. Yuan,et al. Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.
[7] P. Xue,et al. Conditional efficient multiuser quantum cryptography network , 2002 .
[8] A. Pati,et al. Perfect teleportation and superdense coding with W states , 2006, quant-ph/0610001.
[9] Masato Koashi,et al. Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.
[10] Li Dong,et al. A controlled quantum dialogue protocol in the network using entanglement swapping , 2008 .
[11] Qing-yu Cai,et al. Classical correlation in quantum dialogue , 2008, 0802.0358.
[12] K. Boström,et al. Deterministic secure direct communication using entanglement. , 2002, Physical review letters.
[13] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[14] He-Shan Song,et al. Quantum secure direct communication scheme using a W state and teleportation , 2006 .
[15] Zhang Zhan-jun,et al. Quantum dialogue revisited , 2005 .
[16] Nicolas Gisin,et al. Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks , 2004 .
[17] V. Buzek,et al. Quantum secret sharing , 1998, quant-ph/9806063.
[18] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[19] Jian-Wei Pan,et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.
[20] Li Dong,et al. MULTIPARTY QUANTUM STATE SHARING OF m-QUBIT STATE , 2007 .
[21] Zhou Ping,et al. Efficient Multiparty Quantum Secret Sharing with Greenberger?Horne?Zeilinger States , 2006 .
[22] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[23] Q. Cai. Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.
[24] Xia Yan,et al. Controlled Secure Quantum Communication Using Pure Entangled W Class States , 2008 .
[25] Fuguo Deng,et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.
[26] Xiu Xiao-Ming,et al. A Theoretical Scheme for Multiparty Multi-particle State Sharing , 2008 .
[27] J. Cirac,et al. Three qubits can be entangled in two inequivalent ways , 2000, quant-ph/0005115.
[28] Guang-Can Guo,et al. Quantum secret sharing without entanglement , 2002 .
[29] Zhang Yu-feng,et al. A Higher-Dimensional Hirota Condition and Its Judging Method , 2008 .
[30] Su-Juan Qin,et al. One-time pads cannot be used to improve the efficiency of quantum communication , 2007 .
[31] Chuan Wang,et al. Experimental realization of quantum cryptography communication in free space , 2005 .
[32] Xia Yan,et al. Controlled Secure Quantum Dialogue Using a Pure Entangled GHZ States , 2007 .
[33] Barry C. Sanders,et al. Continuous-variable quantum-state sharing via quantum disentanglement , 2004, quant-ph/0411191.
[34] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .