[1] |
SHOR P W , PRESKILL J . Simple proof of security of the BB84 quantum key distribution protocol[J]. Phys Rev Lett, 2000, 85: 441-446.
|
[2] |
GOTTESMAN D , LO H K , LUTKENHAUS N , et al. Security of quantum key distribution with imperfect devices[J]. Quantum Infor Comput, 2004, 4: 325-329.
|
[3] |
PAUL J , DAVID E , SéBASTIEN K J . High bit rate continuous-variable quantum key distribution[J]. Phys Rev A, 2014, 90(4): 042329-042335.
|
[4] |
ZHOU R R , YANG L . Quantum election scheme based on anonymous quantum key distribution[J]. Chin Phys B, 2012, 21(8): 080301080309.
|
[5] |
ALEXANDER S , ZUREK W H . Quantum discord cannot be shared[J]. Phys Rev Let, 2013, 111(4): 040401-040406.
|
[6] |
曾贵华 . 量子保密通信[M]. 北京: 高等教育出版社, 2006. ZENG G H . Quantum private communication[M]. Beijing: Higher Educaiton Press, 2006.
|
[7] |
DUSEK M , HANDERKA O , HENDRYCH M . Quantum identification system[J]. Phys Rev A, 1999, 60(1): 149-156.
|
[8] |
ZENG G H , ZHANG W P . Identity verification in quantum distri-bution[J]. Phys Rev A, 2000, 61: 022303-022308.
|
[9] |
曾贵华 . 不依赖于第三方的动态量子身份认证方案[J]. 电子学报, 2004, 32(7): 1148-1152. ZENG G H . Quantum identity authentication without trusted-party[J]. Acta Electronica Sinca, 2004, 32(7): 1148-1152.
|
[10] |
ZHOU N R , ZENG G H , ZENG W J , et al. Cross-center quantum identification based on teleportation and entanglement swapping[J]. Optics Communications, 2005, 254: 380-388.
|
[11] |
杨宇光, 温巧燕, 朱甫臣 . 一种网络多用户量子认证和量子身份认证方案[J]. 物理学报, 2005, 54(9): 3995-4000. YANG Y G , WEN Q Y , ZHU F C . A theoretical scheme for m lti-user quantum authentication and key distribution in a network[J]. Acta Physica Sinca, 2005, 54(9): 3995-4000.
|
[12] |
ZHANG Z S , ZENG G H , ZHOU N R , et al. Quantum identity authentication based on ping-pong technique for photons[J]. Phys Let A, 2006, 356: 199-205.
|
[13] |
张兴兰 . 基于公钥的单向量子身份认证[J]. 科学通报, 2009, 59(10): 1415-1418. ZHANG X L . One-way quantum identity authentication based on pub-lic key[J]. Chinese Sci Bull, 2009, 54(10): 1415-1418.
|
[14] |
李渊华, 刘俊昌, 义友 . 基于纠缠交换和团簇态实现二粒子任意态的可控隐形传态[J]. 光子学报, 2010, 39(11): 1615-1616. LI Y H , LIU J C , NIE Y Y . Controlled teleportation of an arbitrary two-particle state by using a four-qubit cluster state and entanglement swapping[J]. Acta Photonica Sinca, 2010, 39(11): 1615-1616.
|
[15] |
YANG Y G , WANG H Y , JIA X . A quantum protocol for (t, n)-threshold identity authentication based on greenberg-er-horne-zeilinger states[J]. Theor Phys, 2013, 52: 524-530.
|
[16] |
HUANG P , ZHU J , LU Y , et al. Quantum identity authentication using gaussian-modulation squeezed state[J]. International Journal of Quantum Information, 2011, 9(2): 701-721.
|
[17] |
YANG Y G , TIAN J , XIA J . Quantum authenticated direct communication using bell states[J]. Theor Phys, 2013, 52: 336-344.
|
[18] |
MAKAROV V , SKAAR J . Hacking commercial quantum cryptography systems by tailored bright illumination[J]. Nature Photonics, 2010, 214(4): 686-689.
|
[19] |
ZHAO Y , FUNG C H F , QI B . Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key- distribution systems[J]. Phys Rev A, 2008, 78: 042333-042340.
|
[20] |
LO H K , CURTY M , QI B . Measurement-device-independent quantum key distribution[J]. Phys Rev Let, 2012, 108: 130508-13514.
|
[21] |
TANG Z Y , LIAO Z F , XU F H , et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution[J]. Phys. Rev. Let, 2014, 112(19): 190503-190511.
|
[22] |
马瑞霖 . 量子密码通信[M]. 北京: 科学出版社, 2006. MA R L . Quantum cryptograghy communication[M]. Beijing: Science Press, 2006.
|
[23] |
GARCIA-PATRON R , CERF N J . Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution[J]. Physical Review Letters, 2006, 97: 190503-190510.
|
[24] |
YANG C W , TSAI C W , HWANG T . Fault tolerant two-step quantum secure direct communication protocol against collective noises[J]. Sci. China G:Phys. Mech. Astron, 2011, 54(3): 496-501.
|