参考文献
[1]Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
[2]Blakley G R.Safeguarding Cryptographic Keys[C]//Proceedings of AFIPS’79.New York,USA:AFIPS Press,1979:313-317.
[3]Cleve R,Gottesman D,Lo H K.How to Share a Quantum Secret[J].Physical Review Letters,1999,83(3):648-651.
[4]Gottesman D.Theory of Quantum Secret Sharing[J].Physical Review A,2000,61(4):192-193.
[5]Hillery M,Buek V,Berthiaume A.Quantum Secret Sharing[J].Physical Review A,1999,59(3):1829-1834.
[6]Guo Guoping,Guo Guangcan.Quantum Secret Sharing Without Entanglement[J].Physics Letters A,2003,310(4):247-251.
[7]Smith A D.Quantum Secret Sharing for General Access Structures[J].Physics,2000,97(2):52-57.
[8]Hsu L Y,Li C M.Quantum Secret Sharing Using Product States[J].Physical Review A,Atomic Molecular & Optical Physics,2005,71(2):159-159.
[9]宋云,李志慧,李永明.含至多四个参与者的量子秘密共享方案的最优信息率[J].电子学报,2014,42(10):1951-1956.
[10]Imai H,Müller-Quade J,Nascimento A C A.An Information Theoretical Model for Quantum Secret Sharing[J].Quantum Information & Computation,2005,5(1):69-80.
[11]Li Qin.Sharing a Quantum Secret Without a Trusted Party[J].Quantum Information Processing,2011,10(1):97-106.
[12]Tavakoli A,Herbauts I,Z·ukowski M.Secret Sharing with a Single D-level Quantum System[J].Physical Review A,2015,92(3).
[13]Maitra A,Paul G.A Resilient Quantum Secret Sharing Scheme[J].International Journal of Theoretical Physics,2015,54(2):398-408.
[14]Yang Yuguang.Verifiable Quantum (k,n)-threshold Secret Key Sharing[J].International Journal of Theoretical Physics,2011,50(3):792-798.
[15]Wang Qinhua,Dai Yuewei.Verifiable (t,n) Threshold Quantum Secret Sharing Using D-dimensional Bell State[J].Information Processing Letters,2016,116(5):351-355.
[16]陈恭亮.信息安全数学基础[M].北京:清华大学出版社,2004.
[17]Stinson D R.密码学原理与实践[M].冯登国,译.北京:电子工业出版社,2016.
编辑任吉慧 |