[1] BREUER HEINZ-PETER,PETRUCCIONE FRANCESCO.The Theory of Open Quantum Systems[M].Oxford:Oxford University Press,2007:30-39.
[2] BENNETT C H,FUCHS C A,SMOLIN J A.Communication,Computing and Measurement[M].Oxford:Oxford University Press,1980:132-136.
[3] HE Guangping.Quantum Information Made Easy[M].Beijing:Science Press,2012:82-89.
[4] BENNETT CHARLES,BRASSARD GILLES.Quantum Cryptography:Public Key Distribution and Coin Tossing[C].Proceedings of the IEEE International Conference on Computers,System and Signal Processing.Bangalore,1984:175-179.
[5] BENNETT CHARLLES H,BRASSARD GILLES,JOZSA RICHARD,et al.Reduction of Quantum Entropy by Reversible Extraction of Classical Information[J].Journal of Modern Optics,1993,41(12):2 307-2 314.
[6] HSU JUNG-LUN,CHONG SONG-KONG,HWANG TZONELIH,et al.Dynamic Quantum Secret Sharing[J].Quantum Information Processing,2013,12(1):331〖CDD*2〗344.
[7] SINGH SUDHIR KUMAR,SRIKANTH R.Quantum Seals[J].Physica Scripta,2005,71(5):433-435.
[8] HE Guangping.Upper Bounds of a Class of Imperfect Quantum Sealing Protocols[J].Physical Review A,2005,71:362-366.
[9] PEGRAM LAUREL M,RECORD M THOMAS.Thermodynamic Origin of Hofmeister Ion Effects[J].Journal of Physical Chemistry B,2008,112(31):9 428-9 436.
[10] CHAU H F.Reply to "Comment on 'Quantum String Seal is Insecure'"[J].Physical Review A,2007,76(5):Article ID 056 302.
[11] HE Guangping.Quantum Bit Commitment is Weaker Than Quantum Bit Seals[J].European Physical Journal D,2014,68(5):1-7.
[12] HE G P,WANG Z D,BAI Y K.Quantum Secret Sharing Based on Smolin States Alone[J].Journal of Physics A:Mathematical & Theoretical,2008,41(41):3 958-3 964.
[13] PANG Shengshi,WU Shengjun.Comparison of Mixed Quantum States[J].Physical Review A,2011,84(1):911-916.
[14] ZHANG Sheng,WANG Jian,TANG Chaojing.Security Proof of Counterfactual Quantum Cryptography Against General Intercept-Resend Attacks and Its Vulnerability[J].Chinese Physics B,2012,21(6):33-40.
[15] WEI Jianqiang,ZHANG Zhaoqi,HAN Rui,et al.Microwave Reflection Properties of Planar Anisotropy Fe50Ni50 Powder/Paraffin Composites[J].Chinese Physics B,2012,21(3):Article ID 037 601.
[16] YU Lizhi,SUN Shaoxin.Teleportation of Three-Qubit State via Six-Qubit Cluster State[J].International Journal of Theoretical Physics,2015,54(5):1 600-1 603.
[17] CHENG Rongjun,GE Hongxia.Element-Free Galerkin (EFG) Method for a Kind of Two-Dimensional Linear Hyperbolic Equation[J].Chinese Physics B,2009,18(10):4 059-4 064.
[18] YIN Zhenqiang,LI Hongwei,YAO Yao,et al.Counterfactual Quantum Cryptography Based on Weak Coherent States[J].Physical Review A,2012,86(2):Article ID 022 313.
[19] SUN Shihai,JIANG Musheng,LIANG Linmei.Single-Photon-Detection Attack on the Phase-Coding Continuous-Variable Quantum Cryptography[J].Physical Review A,2013,86(1):4 916-4 926.
[20] WEI Huang,WEN Qiaoyan,LIU Bin,et al.Quantum Key Agreement with EPR Pairs and Single-Particle Measurements[J].Quantum Information Processing,2014,13(3):649-663.
[21] LUO Yi,ZHAO Zhiwen,ZHAO Zhangji,et al.The Loophole of the Improved Secure Quantum Sealed-Bid Auction with Post-Confirmation and Solution[J].Quantum Information Processing,2013,12(1):295-302. |