[1] BENNETT C H,BRASSARD G. Quantum cryptography:publickey distribution and tossing[C]//Proceedings of the 1984 IEEE Engineers International Conference on Computers,Systems and Signal Processing. Piscataway:IEEE,1984:175-179. [2] ZHOU N,ZENG G,ZENG W,et a1. Cross-center quantum identification based on teleportation and entanglement swapping[J]. Optics Communications,2005,254(4/5/6):380-388. [3] HONG C H, HEO J, JANG J G, et al. Quantum identity authentication with single photon[J]. Quantum Information Processing,2017,16:No. 236. [4] 潘江游, 杨理. 基于一次一密的量子身份识别方案[J]. 中国科学院研究生院学报,2012,29(2):277-281.(PAN J Y,YANG L. Quantum identification based on one-me pad[J]. Journal of Graduate University of Chinese Academy of Sciences,2012,29(2):277-281.) [5] 程超. 基于Kerberos协议和DES加密算法的电子邮件服务认证的设计与实现[D]. 成都:电子科技大学,2013:37.(CHENG C. Design and implement the E-mail service certification based on the Kerberos protocol and DES encryption algorithm[D]. Chengdu:University of Electronic Science and Technology of China, 2013:37.) [6] 高小川. 基于Kerberos的量子可信认证系统的设计与实现[D]. 北京:北京邮电大学,2019:25-42.(GAO X C. Design and implementation of quantum trusted authentication system based on Kerberos[D]. Beijing:Beijing University of Posts and Telecommunications,2019:25-42.) [7] 张兴兰. 基于公钥的单向量子身份认证[J]. 科学通报,2009, 59(10):1415-1418. (ZHANG X L. One-way quantum identity authentication based on public key[J]. Chinese Science Bulletin, 2009,54(10):1415-1418.) [8] 韩琦, 韦仁童, 何明珍, 等. 量子Pauli门的相关性质及其在量子计算中的应用[J]. 兰州文理学院学报(自然科学版),2016,30(5):1-4,106.(HAN Q,WEI R T,HE M Z,et al. Related properties of quantum Pauli gate and its application in quantum computing[J]. Journal of Lanzhou University of Arts and Sciences (Natural Science Edition),2016,30(5):1-4,106.) [9] 昌燕. 量子安全通信协议理论研究[D]. 成都:电子科技大学, 2016:32-70(CHANG Y. Theoretical research on quantum secure communication protocols[D]. Chengdu:University of Electronic Science and Technology of China,2016:32-70.) [10] 杨宇光, 温巧燕, 朱甫臣. 一种网络多用户量子认证和秘钥分配理论方案[J]. 物理学报,2005,54(9):3995-4000.(YANG Y G,WEN Q Y,ZHU F C. A theoretical scheme for multi-user quantum authentication and key distribution in a network[J]. Acta Physica Sinca,2005,54(9):3995-4000.) [11] 刘俊昌, 李渊华, 聂义友. 基于纠缠交换和团簇态实现二粒子任意态的可控隐形传态[J]. 光子学报,2010,39(11):1615-1616.(LIU J C,LI Y H,NIE Y Y. Controlled teleportation of an arbitrary two-particle state by using a four-qubit cluster state and entanglement swapping[J]. Acta Photonica Sinca, 2010, 39(11):2078-2082.) [12] 马彰超. 量子时代的网络安全挑战及其应对研究[J]. 信息通信技术与政策,2019(10):37-42.(MA Z C. The cyber security challenge in the quantumera and its countermeasures[J]. Information and Communications Technology and Policy,2019(10):37-42.) [13] 裴树军, 张圆绪, 娄淑慧. 公钥加密体系下的HDFS身份认证过程改进与实现[J]. 哈尔滨理工大学学报,2016,21(4):13-18. (PEI S J, ZHANG Y X, LOU S H. Research on HDFS authentication process based on public key encryption[J]. Journal of Harbin University of Science and Technology,2016,21(4):13-18.) [14] 杨宇光, 温巧燕. 量子门限群签名[J]. 中国科学G辑:物理学力学天文学, 2008,38(9):1162-1170. (YANG Y G,WEN Q Y. Quantum threshold group signature[J]. Science in China Series G-Physics,Mechanics and Astronomy,2008,38(9):1162-1170.) [15] PERUZZO A,LAING A,POLITI A,et al. Multimode quantum interference of photons in multiport integrated devices[J]. Nature Communications,2011,2:224. [16] 郑涛, 张仕斌, 李雪杨, 等. 具有双向身份认证功能的量子密钥分发协议[J]. 计算机应用研究,2020,37(4):1154-1157. (ZHENG T, ZHANG S B, LI X Y, et al. Quantum key distribution protocol with two-way authentication[J]. Application Research of Computers,2020,37(4):1154-1157.) |