[1] Hillery M,Buzek V,Berthiaume A.Quantum secret sharing[J].Phys Rev A,1999,59(3):1829-1834.
[2] Cleve R,Gottesman D,Lo H-K.How to share a quantum secret[J].Phys Rev Lett,1999,83:648-651.
[3] Gottesman D.Theory of quantum secret sharing[J].Phys Rev A,2000,61:042311.
[4] Smith A.Quantum secret sharing for general access structures[DB/OL].http://arxiv.org/abs/quant-ph/0001087.pdf,2000-01-24.
[5] Imai H,Muller-Quade J,Nascimento A,et al.A quantum information theoretical model for quantum secret sharing schemes[J].Quantum Inf Comput,2005,5(1):69-80.
[6] Helwig W,Cui W,et al.Absolute maximal entanglement and quantum secret sharing[J].Phys Rev A,2012,86:052335.
[7] Du Yu-tao,Bao Wan-su.Multiparty quantum secret sharing scheme based on the phase shift operations[J].Optics Communications,2013,308(1):159-163.
[8] Gao Gan.Improvement of efficient multiparty quantum secret sharing based on bell states and continuous variable operations[J].International Journal of Theoretical Physics,2014:1-5.
[9] 周淳,鲍皖苏,付向群.基于态关联性不完美的诱骗态量子密钥分配[J].电子学报,2012,40(10):2015-2020. Zhou Chun,Bao Wan-su,Fu Xiang-qun.Decoy-state quantum key distribution based on state-dependent imperfections[J].Acta Electronica Sinica,2012,40(10):2015-2020.(in Chinese)
[10] Wang Ming-ming,et al.Quantum secret sharing for general access structure based on multiparticle entanglement[J].Quantum Information Processing,2014,13(2):429-443.
[11] Fortescue B,Gour G.Reducing the quantum communication cost of quantum secret Sharing[J].IEEE Trans Inform Theory,2012,58(10):6659-6666.
[12] Sarvepalli P.Bounds on the information rate of quantum-secret-sharing schemes[J].Phys Rev A,2011,83:042324.
[13] Nielsen M A,Chuang I L.Quantum Computation and Quantum Information[M].Cambridge,England:Cambridge University,2000.410.
[14] Crescenzo G D,Galdi C.Hypergraph decomposition and secret sharing[J].Discrete Applied Mathematics,2009,157(5):928-946. |