[1] |
SHAMIR A . How to share a secret[J]. Communication of ACM, 1979,22(11): 621-613.
|
[2] |
HILLERY M , BUˇZEK V , BERTHIAUME A . Quantum secret sharing[J]. Physical Review A, 1999,59(3): 1829-1834.
|
[3] |
SHI R H , SU Q , GUO Y ,et al. Quantum secret sharing based on Chinese remainder theorem[J]. Communications in Theoretical Physics, 2011,55(4): 573-578.
|
[4] |
GUO Y , ZHAO Y . High efficient quantum secret sharing based o-n the Chinese remainder theorem via the orbital angular momentum entanglement analysis[J]. Quantum Information Processing, 2013,12(2): 1125-1139.
|
[5] |
GUO Y , HUANG D Z , ZENG G H . Multiparty quantum secret s-haring of quantum states using entanglement states[J]. Chinese Physics Letters, 2008,25(1): 16-19.
|
[6] |
MARKHAM D , SANDERS B C . Graph states for quantum secret sharing[J]. Physical Review A, 2008,78(4):042309.
|
[7] |
KEET A , FORTESCUE B , MARKHAM D ,et al. Quantum secret sharing with qudit graph states[J]. Physical Review A, 2010,82(6):062315.
|
[8] |
RAHAMAN R , PARKER M G . Quantum scheme for secret sharing based on local distinguish ability[J]. Physical Review A, 2015,91(2):022330.
|
[9] |
TAVAKOLI A , HERBAUTS I , ZUKOWSKI M ,et al. Secret sharing with a single dlevelquantum system[J]. Physical Review A, 2015,92(3):030302.
|
[10] |
LIANG J W , ZHOU J , SHI J J ,et al. Improving continuous variable quantum key distribution using the heralded noiseless linear amplifier with source in the middle[J]. International Journal of Theoretical Physics, 2015,55(2): 1156-1166.
|
[11] |
WANG C , HUANG P , HUANG D ,et al. Practical security of continuous variable quantum key distribution with finite sampling bandwidtheffects[J]. Physical Review A, 2016,93(2):022315.
|
[12] |
WU Y D , ZHOU J , GONG X B ,et al. Continuous variable measurement device independent multipartite quantum communication[J]. Physical Review A, 2016,93(2):022325.
|
[13] |
AMIRI R , WALLDEN P , KENT A ,et al. Secure quantum signatures using insecure quantum channels[J]. Physical Review A, 2016,3(3):032325.
|
[14] |
QIN H W , DAI Y W . An efficient (t,n) threshold quantum secret sharing without entanglement Quantum error correcting codes using qudit graph states[J]. Modern Physics Letters B, 2016,30(12):1650138.
|
[15] |
QIN H , ZHU X , DAI Y . A proactive quantum secret sharing scheme based on GHZ state[J]. Modern Physics Letters B, 2015,29(27):1550165.
|
[16] |
HE X L , YANG C P . Deterministic transfer of multi-qubit GHZ entangled states and quantum secret sharing between different cavityes[J]. Quantum Information Processing, 2015,14(12): 4461-4474.
|
[17] |
QIN H , DAI Y . Verifiable (t,n) threshold quantum secret sharing using d-dimensional Bellstate[J]. Information Processing Letters, 2016,116(5): 351-355.
|
[18] |
KEET A , FORTESCUE B , MARKHAM D ,et al. Quantum sec-ret sharing with qudit graph states[J]. Physical Review A, 2010,82(6): 4229-4231.
|
[19] |
梁建武, 程资, 石金晶 ,等. 基于量子图态的量子秘密共享[J]. 物理学报. 2016,65(16): 35-41.
|
|
LIANG J W , CHEGN Z , SHI J J ,et al. Quantum secret sharing based on quantum graph States[J]. Acta Physica Sinica, 2016,65(16): 35-41.
|
[20] |
KONDRACKI A . The Chinese remainder theorem[J]. Formalized Mathematics, 1997,6(4): 573-577.
|
[21] |
佟鑫, 温巧燕, 朱甫臣 . 基于 GHZ 态纠缠交换的量子秘密共享[J]. 北京邮电大学学报. 2007,30(1): 44-48.
|
|
TONG X , WEN Q Y , ZHU F C . Quantum secret sharing based on GHZ state entanglement swapping[J]. Journal of Beijing University of Posts and Telecommunications, 2007,30(1): 44-48.
|