[1] |
BENNETT C H , BRASSARD G . Quantum cryptography:public-key distribution and tossing[A]. Proceeding of IEEE International Conference on Computers,Systems and Signal Processing[C]. New York, 1984. 175-179.
|
[2] |
SHOR P W , PRESKILL J . Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 2000,85(2): 441-444.
|
[3] |
LU H , CAI Q Y . Quantum key distribution with classical Alice[J]. International Journal of Quantum Information, 2008,6(6): 1195-1202.
|
[4] |
LI X H , DENG F G , ZHOU H Y . Efficient quantum key distribution over a collective noise channel[J]. Physical Review A, 2008,78(2):022321.
|
[5] |
GAO F , LIU B , WEN Q Y ,et al. Flexible quantum private queries based on quantum key distribution[J]. Optics Express, 2012,20(16): 17411-17420.
|
[6] |
BEAUDRY N , LUCAMARINI M , MANCINI S ,et al. Security of two-way quantum key distribution[J]. Physical Review A, 2013,88(6):062302-12.
|
[7] |
SUN Z W , DU R G , LONG D Y . Quantum key distribution with limited classical Bob[J]. International Journal of Quantum Information, 2013,11(1):1350005-1-7.
|
[8] |
OKAMOTO T , TANAKA K , UCHIYAMA S . Quantum public-key cryptosystems[A]. Cryptology Crypto 2000[C]. Berlin: Springer, 2000. 147-165.
|
[9] |
GOTTESMAN D , CHUANG I . Quantum digital signatures[EB/OL]. .
|
[10] |
NIKOLOPOULOS G M . Applications of single-qubit rotations in quantum public-key cryptography[J]. Physical Review A, 2008,77(3):032348.
|
[11] |
SEYFARTH U , NIKOLOPOULOS G M , ALBER G . Symmetries and security of a quantum public-key encryption based on single-qubit rotations[J]. Physical Review A, 2012,85:022342.
|
[12] |
YANG L , LIANG M , LI B ,et al. Quantum public-key cryptosystems based on induced trapdoor one-way transformation[EB/OL]. .
|
[13] |
YANG L . Quantum public-key cryptosystem based on classical NP-complete problem[EB/OL]. .
|
[14] |
LIANG M , YANG L . Public-key encryption and authentication of quantum information[J]. Science China Ser G-Physics,Mechanics&Astronomy, 2012,55(9): 1618-1629.
|
[15] |
PAN J , YANG L . Quantum public-key encryption with information theoretic security[EB/OL]. .
|
[16] |
LOU M X , CHEN X B , YUN D ,et al. Quantum public-key cryptosystem[J]. International Journal of Theoretical Physics, 2012,51(3): 912-924.
|
[17] |
LIANG M , YANG L . Quantum-message-oriented public-key encryption scheme beyond computational hypothesis[A]. Proceeding of SPIE Vol 8440:Quantum Optics II[C]. United States:SPIE, 2012.84400L-1-7.
|
[18] |
ZHENG S H , GU L Z , XIAO D . Bit-oriented quantum public key probabilistic encryption schemes[J]. International Journal of Quantum Information, 2014,53(1): 116-124.
|
[19] |
LI X Y , LI L . Quantum public-key cryptosystem using non-orthogonal states[J]. Journal of Software, 2013,8(8): 1906-1913.
|
[20] |
YANG L , YANG B Y , PAN J Y . Quantum public-key encryption with information theoretic security[A]. Proceeding of SPIE Vol 8440:Quantum Optics II[C]. United States:SPIE, 2012.84400E-1-6.
|
[21] |
WOOTTERS W K , ZUREK W H . A single quantum cannot be cloned[J]. Nature, 1982,299(28): 802-803.
|