JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (9): 36-40.doi: 10.6040/j.issn.1671-9352.3.2015.027
Previous Articles Next Articles
XU Sheng-wei
CLC Number:
[1] BLAKLEY G R. Safeguarding cryptographic keys[C] // Proceedings of National Computer Conference. Montvale: AFIPS, 1979: 313-317. [2] SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11):612-613. [3] HILLERY M, BUŽEK V, BERTHIAUME A. Quantum secret sharing[J]. Physical Review A, 1998, 59(3):1829-1834. [4] KARLSSON A, KOASHI M, IMOTO N. Quantum entanglement for secret sharing and secret splitting[J]. Physical Review A, 1999, 59(1):162-168. [5] CLEVE R, GOTTESMAN D, LO H K. How to share a quantum secret[J]. Physical Review Letters, 2010, 83(3):648-651. [6] GOTTESMAN D. Theory of quantum secret sharing[J]. Physical Review A, 2000, 61(4):192-193. [7] BANDYOPADHYAY S. Teleportation and secret sharing with pure entangled states[J]. Physical Review A, 2000, 62(1):20-32. [8] TITTEL W, ZBINDEN H, GISIN N. Experimental demonstration of quantum secret sharing[J]. Physical Review A, 2001, 63(4):392-396. [9] GUO G P, GUO G C. Quantum secret sharing without entanglement[J]. Physics Letters A, 2002, 310(4):247-251. [10] LANCE A M, SYMUL T, BOWEN W P, et al. Tripartite quantum state sharing[J]. Physical Review Letters, 2004, 92(17):1-4. [11] ZHANG Z J, LI Y, MAN Z X. Multiparty quantum secret sharing[J]. Physical Review A, 2005, 71(4). [12] ZHANG Z J, YANG J, MAN Z X, et al. Multiparty secret sharing of quantum information using and identifying Bell states[J]. Eur Phys J, 2005, 33(1):133-136. [13] DENG F G, LI X H, LI C Y, et al. Multiparty quantum state sharing of an arbitrary two-particle state with einstein-podolsky-rosen pairs[J]. Physical Review A, 2005, 72(4):440-450. [14] YANG Y G, WANG Y, CHAI H P, et al. Member expansion in quantum(t, n)threshold secret sharing schemes[J]. Optics Communications, 2011, 284(284):3479-3482. [15] JIA Hengyue, WEN Qiaoyan, GAO Fei, et al. Dynamic quantum secret sharing[J]. Physics Letters A, 2012, 376:1035-1041. [16] HSU J L, CHONG S K, HWANG T, et al. Dynamic quantum secret sharing[J]. Quantum Information Processing, 2013, 12(1):1035-1041. [17] DENG F G, LI X H, ZHOU H Y, et al. Improving the security of multiparty quantum secret sharing against trojan horse attack[J]. Physical Review A, 2005, 72(4):440-450. [18] GAO F, QIN S J, WEN Q Y, et al. A simple participant attack on the brádler-duek protocol[J]. Quantum Information & Computation, 2007, 7(4):329-334. [19] BENNETT C H, BRASSARD G. Quantum cryptography: public key distribution and coin tossing[J]. Theoretical Computer Science, 1984, 560:175-179. [20] SHOR P W, PRESKILL J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 2000, 85(2):441-444. [21] CALDERBANK A R, SHOR P W. Good quantum error-correcting codes exist[J]. Physical Review A, 1995, 54(2):1098-1105. |
[1] | JIAO Hong-ru, QIN Jing. Quantum secret sharing scheme realizing all hyperstar quantum access structure [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 62-68. |
[2] | XU Ting-ting, LI Zhi-hui, MA Min. A new improvable quantum secret sharing scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 8-15. |
|