[1] CLEVE R, GOTTESMAN D, LO H K. How to share a quantum secret [J]. Physical Review Letters, 1999, 83(3): 648-651. [2] BENNET C H, BRASSARD G. Quantum cryptography: public-key distribution and coin tossing [C]// Proceedings of the 1984 IEEE International Conference on Computers, Systems and Signal Processing. Piscataway: IEEE Press, 1984: 175-179. [3] BOSTROM K, FELBINGER T. Deterministic secure direct communication using entanglement[J]. Physical Review Letters, 2002, 89(18): 187902. [4] ZENG G, ZHANG W. Identity verification in quantum distribution [J]. Physical Review A, 2000, 61(2):022301-022303. [5] HILLERY M, BUZEK V, BERTHIAUME A. Quantum secret sharing [J]. Physical Review A, 1999, 59(3): 1829-1834. [6] BAGHERINEZHAD S, KARIMIPOUR V. Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers [J]. Physical Review A, 2003, 67(4): 044302. [7] XIE D, YE M, LI X. Improved multipartite quantum secret sharing protocol using preshared Greenberger-Horne-Zeilinger states [J]. Communications in Theoretical Physics, 2011, 56(6): 1027-1030. [8] DENG F, LONG G, ZHOU H. An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs [J]. Physics Letters A, 2005, 340(1): 43-50. [9] DVR W, VIDAL G, CIRAC J I. Three qubits can be entangled in two inequivalent ways [J]. Physical Review A, 2000, 62(6): 062314. [10] AGRAWAL P, PATI A. Perfect teleportation and superdense coding with W states [J]. Physical Review A, 2006, 74(6): 062320. [11] LI L, QIU D. The states of W-class as shared resources for perfect teleportation and superdense coding [J]. Physics A: Mathematical and Theoretical, 2007, 40(35): 10871. [12] HWANG T, HWANG C C, LI C M. Multiparty quantum secret sharing based on GHZ states [J]. Physica Scripta, 2011, 83(4): 045004. [13] LIU X, PAN R. Cryptanalysis of quantum secret sharing based on GHZ states [J]. Physica Scripta, 2011, 84(4): 045015. [14] TAN X, JIANG L. Improved three-party quantum secret sharing based on Bell states [J]. International Journal of Theoretical Physics, 2013, 52(10): 3577-3585. [15] CURTY M, LVTKENHAUS N. Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses [J]. Physical Review A, 2005, 71(6): 1-10. [16] YANG C W, TSAI C W, HWANG T. Thwarting intercept-and-resend attack on Zhang's quantum secret sharing using collective rotation noises [J]. Quantum Information Processing, 2012, 11(1): 113-122. [17] ZHANG B, LIU Y. A postselection-based linear optical scheme for generation of a three-photon W state [J]. Journal of Physics B: Atomic, Molecular and Optical Physics, 2009, 42(19): 195504. [18] CARDOSO W B, QIANG W C, AVELAR A T, et al. Generation of two-photon EPR and W states [J]. Journal of Physics B: Atomic, Molecular and Optical Physics, 2010, 43(15): 155502. [19] ZHA X, SONG H. Two schemes of remote preparation of a four-particle entangled W state via a six-qubit maximally entangled state [J]. Physica Scripta, 2011, 84(1): 015010. [20] LIN Q. Efficient generation of multi-photon W state [J]. Science China: Physica, Mechanica and Astronomica, 2012, 42(1): 54-60.(林青. 多光子W态的高效制备[J]. 中国科学:物理学、力学、天文学, 2012, 42(1): 54-60.) [21] CAO H, SONG H. Quantum secure direct communication with W states [J]. Chinese Physical Letters, 2006, 23(2): 290-292. [22] CAO H, SONG H. Quantum secure direct communication using a W state and teleportation [J]. Physica Scripta, 2006, 74(5): 572-575. [23] DONG L, XIU X, CAO Y, et al. Quantum secure direct communication using W state [J]. Communication in Theoretical Physicss, 2008, 49(6): 1495-1498. [24] DONG L, XIU X, CAO Y, et al. Quantum secure direct communication using a class of three-particle W state [J]. Communication in Theoretical Physicss, 2008, 50(2): 359-362. [25] LIU C, GENG H, LIU W. Secure quantum communication protocol based on symmetric W state and identity authentication [J]. Journal of Computer Applications, 2014, 34(2): 438-441.(刘超,耿焕同, 刘文杰. 基于对称W态和身份认证的安全量子通信协议[J]. 计算机应用, 2014, 34(2): 438-441.) [26] QIN S, GAO F, WEN Q, et al. Improving the security of multiparty quantum secret sharing against an attack with a fake signal [J]. Physics Letters A, 2006, 357(2): 101-103. [27] SUN Y, DU J, QIN S, et al. Two-way authentication quantum secret sharing [J]. Journal of Physics,2008,57(8):4689-4694.(孙莹,杜建忠,秦素娟,等. 具有双向认证功能的量子秘密共享方案[J]. 物理学报, 2008,57(8):4689-4694.) |