[1] NIELSEN M A,CHUANG I L.Quantum Computation and Quantum Information [M].Cambridge:Cambridge University Press,2000.[2] 尼尔森,著.量子计算和量子信息 [M].赵千川,译.北京:清华大学出版社,2006.[3] BENNETT C H,BRASSARD G.Quantum Crytography [C].Public Key Distribution and Coin Tossing.Proceedings of IEEE International Conference on Computers,Systems and Signal Processing,IEEE,1984:175-179.[4] 张永德.量子信息物理原理 [M].北京:科学出版社,2005.[5] BENNETT C H,BRASSARD G,ROBERT J.Privacy Amplification by Public Discussion [J].SIAM Journal on Computing,1989,17:210-229.[6] MIHARA T.Quantum Identification Schemes with Entarglements [J].Phys. Rev. A,2002,65:052326.[7] 曾贵华.量子密码学 [M].北京:科学出版社,2006.[8] 巧 燕,高飞,朱甫臣.量子密钥分发中身份认证问题的研究现状及方向 [J].北京邮电大学学报,2004,27:1-5.[9] GOLDENBERG L,VAIDMAN L.Quantum Cryptography Based on Orthogonal States [J].Physical Riview Letters,1995,75:1 239.[10] 高飞,温巧燕.一种量子密钥分发和身份认证协议 [J].北京邮电大学学报,2004,27:98-102.[11] 周南润,曾贵华,朱甫臣.一次量子通信量子密钥分发和认证协议的安全性分析 [J].上海交通大学学报,2005,39:1 509-1 513. |