[1] 陈汉武.量子信息与量子计算 [M].南京:东南大学出版社,2006:1-5.[2] SHAMIR A.How to Share a Secret [J].Communications of the ACM,1979,22(11):612-613.[3] BLAKELY G.Safeguarding Cryptographic Keys [C]//Proceedings of the National Computer Conference,New York:AFIPS Press,1979:313-317.[4] HILLERY M,BUZEK V,BERTHIAUME A.Quantum Secret Sharing [J]. Phys. Rev. A,1999,59:1 829-1 834.[5] KARLSSON A,KOASHI M,IMOTO N.Quantum Entanglement for Secret Sharing and Secret Splitting [J].Phys. Rev. A,1999,59:162-169.[6] HSU L Y.Quantum Secret-Sharing Protocol Based Grover’s Algorithm [J].Phys. Rev. A,2003,68:022306.[7] KARIMIPOUR V,BAHRAMINASAB A,BAGHERINEZHAD S.Entanglement Swapping of Generalized Cat States and Secr-Sharing [J].Phys. Rev. A,2002,65:042320.[8] LJUUGGREN D,BOURENNANE M,KARLSSON A.Authority-Based User Authentication in Quantum Key Distribution [J].Phys. Rev. A,2000,62:022305.[9] ZHANG Z J,YONG L,MAN Z X. Multiparty Quantum Secret Sharing [J].Phys. Rev. A,2005,71:044301.[10] LIU Y Q,SHI J,HU B L,et al.Scheme of Three Quantum Bit Secret Sharing Based on GHZ State [J].Chinese Journal of Quantum Electronics,2010,27(1):46-50.[11] 陈汉武.量子信息与量子计算 [M].南京:东南大学出版社,2006,19-27.[12] ZHAO H,ZHOU X Q,YANG X L.Generation of Multiparticle Entangled State from Einstein-Podolsky-Rosen Photon Pairs Optics Communications [J].Acta Phys. Sin.,2010,283:2 472-2 475.[13] ZHOU X Q,WU Y W.Discussion on Building the Net of Quantum Teleportation Using Three-Particle Entangled States [J].Acta Phys. Sin.,2007,56(4):1 881-1 887.[14] BENNETT C H,BESSETTE F,BRASSARD G,et al.Experimental Quantum Cryptography [J].Journal of Cryptography,1992(5):3-28. |