References
[1]
Bennett
C H,
Brassard
G.
Quantum cryptography: Public-key distribution and coin tossing. In: The Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing.
Bangalore:
IEEE Press.
1984, : 175-179
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum cryptography: Public-key distribution and coin tossing. In: The Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing&author=Bennett C H&author=Brassard G&publication_year=1984&pages=175-179
[2]
Gisin
N,
Ribordy
G,
Tittel
W, et al.
Quantum cryptography.
Rev Mod Phys,
2002, 74: 145-195
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum cryptography&author=Gisin N&author=Ribordy G&author=Tittel W&publication_year=2002&journal=Rev Mod Phys&volume=74&pages=145-195
[3]
李
宏伟,
陈
巍,
黄
靖正, et al.
量子密码安全性研究.
中国科学: 物理学 力学 天文学,
2012, 42: 1237-1255
Google Scholar
http://scholar.google.com/scholar_lookup?title=量子密码安全性研究&author=李 宏伟&author=陈 巍&author=黄 靖正&publication_year=2012&journal=中国科学: 物理学 力学 天文学&volume=42&pages=1237-1255
[4]
龙
桂鲁,
王
川,
李
岩松, et al.
量子安全直接通信.
中国科学: 物理学 力学 天文学,
2011, 41: 332-342
Google Scholar
http://scholar.google.com/scholar_lookup?title=量子安全直接通信&author=龙 桂鲁&author=王 川&author=李 岩松&publication_year=2011&journal=中国科学: 物理学 力学 天文学&volume=41&pages=332-342
[5]
吴
华,
赵
于康,
赵
勇, et al.
实用化光纤量子加密电话网络和高速数据传输系统—现场应用与安全管理.
中国科学: 信息科学,
2014, 44: 312-321
Google Scholar
http://scholar.google.com/scholar_lookup?title=实用化光纤量子加密电话网络和高速数据传输系统—现场应用与安全管理&author=吴 华&author=赵 于康&author=赵 勇&publication_year=2014&journal=中国科学: 信息科学&volume=44&pages=312-321
[6]
Phoenix
S J D,
Barnett
S M,
Townsend
P D, et al.
Multi-user quantum cryptography on optical networks.
J Mod Opt,
1995, 42: 1155-1163
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Multi-user quantum cryptography on optical networks&author=Phoenix S J D&author=Barnett S M&author=Townsend P D&publication_year=1995&journal=J Mod Opt&volume=42&pages=1155-1163
[7]
Li
C Y,
Li
X H,
Deng
F G, et al.
Efficient quantum cryptography network without entanglement and quantum memory.
Chin Phys Lett,
2006, 23: 2896-2899
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Efficient quantum cryptography network without entanglement and quantum memory&author=Li C Y&author=Li X H&author=Deng F G&publication_year=2006&journal=Chin Phys Lett&volume=23&pages=2896-2899
[8]
Xue
P,
Li
C F,
Guo
G C.
Conditional efficient multiuser quantum cryptography network.
Phys Rev A,
2002, 65: 022317
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Conditional efficient multiuser quantum cryptography network&author=Xue P&author=Li C F&author=Guo G C&publication_year=2002&journal=Phys Rev A&volume=65&pages=022317
[9]
Deng
F G,
Liu
X S,
Ma
Y J, et al.
A theoretical scheme for multi-user quantum key distribution with N Einstein-Podolsky-Rosen pairs on a passive optical network.
Chin Phys Lett,
2002, 19: 893-896
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=A theoretical scheme for multi-user quantum key distribution with N Einstein-Podolsky-Rosen pairs on a passive optical network&author=Deng F G&author=Liu X S&author=Ma Y J&publication_year=2002&journal=Chin Phys Lett&volume=19&pages=893-896
[10]
Hong
C H,
Heo
J O,
Khym
G L, et al.
Quantum channels are sufficient for multi-user quantum key distribution protocol between users.
Opt Commun,
2010, 283: 2644-2646
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum channels are sufficient for multi-user quantum key distribution protocol between users&author=Hong C H&author=Heo J O&author=Khym G L&publication_year=2010&journal=Opt Commun&volume=283&pages=2644-2646
[11]
Guo
Y,
Shi
R,
Zeng
G.
Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states.
Phys Scripta,
2010, 81: 045006
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states&author=Guo Y&author=Shi R&author=Zeng G&publication_year=2010&journal=Phys Scripta&volume=81&pages=045006
[12]
Wang
W Y,
Wang
C,
Wen
K, et al.
Quantum key distribution network based on differential phase shift.
Chin Phys Lett,
2007, 24: 1463-1466
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum key distribution network based on differential phase shift&author=Wang W Y&author=Wang C&author=Wen K&publication_year=2007&journal=Chin Phys Lett&volume=24&pages=1463-1466
[13]
Stucki
D,
Walenta
N,
Vannel
F, et al.
High rate, long-distance quantum key distribution over 250 km of ultra low loss fibers.
New J Phys,
2009, 11: 075003
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=High rate, long-distance quantum key distribution over 250 km of ultra low loss fibers&author=Stucki D&author=Walenta N&author=Vannel F&publication_year=2009&journal=New J Phys&volume=11&pages=075003
[14]
Sandor
I.
Quantum communications: Explained for communication engineers.
IEEE Commun Mag,
2013, 51: 28-25
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum communications: Explained for communication engineers&author=Sandor I&publication_year=2013&journal=IEEE Commun Mag&volume=51&pages=28-25
[15]
Du?ek
M,
Hade?ka
O,
Hendrych
M, et al.
Quantum identification system.
Phys Rev A,
1999, 60: 149-156
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum identification system&author=Du?ek M&author=Hade?ka O&author=Hendrych M&publication_year=1999&journal=Phys Rev A&volume=60&pages=149-156
[16]
Zeng
G,
Zhang
W.
Identity verification in quantum key distribution.
Phys Rev A,
2000, 61: 022303
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Identity verification in quantum key distribution&author=Zeng G&author=Zhang W&publication_year=2000&journal=Phys Rev A&volume=61&pages=022303
[17]
Mihara
T.
Quantum identification schemes with entanglements.
Phys Rev A,
2002, 65: 052326
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum identification schemes with entanglements&author=Mihara T&publication_year=2002&journal=Phys Rev A&volume=65&pages=052326
[18]
Lee
H,
Lim
J,
Yang
H J.
Quantum direct communication with authentication.
Phys Rev A,
2006, 73: 042305
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum direct communication with authentication&author=Lee H&author=Lim J&author=Yang H J&publication_year=2006&journal=Phys Rev A&volume=73&pages=042305
[19]
Zhang
Z,
Zeng
G,
Zhou
N, et al.
Quantum identity authentication based on ping-pong technique for photons.
Phys Lett A,
2006, 356: 199-205
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum identity authentication based on ping-pong technique for photons&author=Zhang Z&author=Zeng G&author=Zhou N&publication_year=2006&journal=Phys Lett A&volume=356&pages=199-205
[20]
Cederlof
J,
Larsson
J A.
Security aspects of the authentication used in quantum cryptography.
IEEE Trans Inform Theor,
2008, 54: 1735-1741
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Security aspects of the authentication used in quantum cryptography&author=Cederlof J&author=Larsson J A&publication_year=2008&journal=IEEE Trans Inform Theor&volume=54&pages=1735-1741
[21]
Wang
M J,
Pan
W.
Quantum secure direct communication based on authentication.
Chin Phys Lett,
2008, 25: 3860-3863
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum secure direct communication based on authentication&author=Wang M J&author=Pan W&publication_year=2008&journal=Chin Phys Lett&volume=25&pages=3860-3863
[22]
Yen
C A,
Horng
S J,
Goan
H S, et al.
Quantum direct communication with mutual authentication.
Quantum Inform Comput,
2009, 9: 376-394
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum direct communication with mutual authentication&author=Yen C A&author=Horng S J&author=Goan H S&publication_year=2009&journal=Quantum Inform Comput&volume=9&pages=376-394
[23]
Fung
C H F,
Ma
X F,
Chau
H F.
Practical issues in quantum-key-distribution postprocessing.
Phys Rev A,
2010, 81: 012318
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Practical issues in quantum-key-distribution postprocessing&author=Fung C H F&author=Ma X F&author=Chau H F&publication_year=2010&journal=Phys Rev A&volume=81&pages=012318
[24]
Yang
J,
Wang
C,
Zhang
R.
Quantum secure direct communication with authentication expansion using single photons.
Commun Theor Phys,
2010, 54: 829-834
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum secure direct communication with authentication expansion using single photons&author=Yang J&author=Wang C&author=Zhang R&publication_year=2010&journal=Commun Theor Phys&volume=54&pages=829-834
[25]
Zhou
N R,
Wang
L J,
Ding
J, et al.
Quantum deterministic key distribution protocols based on the authenticated entanglement channel.
Phys Scripta,
2010, 81: 045009
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum deterministic key distribution protocols based on the authenticated entanglement channel&author=Zhou N R&author=Wang L J&author=Ding J&publication_year=2010&journal=Phys Scripta&volume=81&pages=045009
[26]
Huang
P,
Zhu
J,
Lu
Y, et al.
Quantum identity authentication using gaussing-modulated squeezed states.
Int J Quantum Inform,
2011, 9: 701-721
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum identity authentication using gaussing-modulated squeezed states&author=Huang P&author=Zhu J&author=Lu Y&publication_year=2011&journal=Int J Quantum Inform&volume=9&pages=701-721
[27]
Yang
Y G,
Tian
J,
Xia
J, et al.
Quantum authenticated direct communication using Bell states.
Int J Theor Phys,
2013, 52: 336-344
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum authenticated direct communication using Bell states&author=Yang Y G&author=Tian J&author=Xia J&publication_year=2013&journal=Int J Theor Phys&volume=52&pages=336-344
[28]
Yuan
H,
Liu
Y M,
Pan
G Z, et al.
Quantum identity authentication based on ping-pong technique without entanglements.
Quantum Inf Process,
2014, 13: 2535-2549
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum identity authentication based on ping-pong technique without entanglements&author=Yuan H&author=Liu Y M&author=Pan G Z&publication_year=2014&journal=Quantum Inf Process&volume=13&pages=2535-2549
[29]
Franklin
M K,
Reiter
M K.
Fair exchange with a semi-trusted third party. In: The Proceedings of the 4th ACM conference on Computer and communications security.
New York:
Association for Computing Machinery.
1997, : 1-5
Google Scholar
http://scholar.google.com/scholar_lookup?title=Fair exchange with a semi-trusted third party. In: The Proceedings of the 4th ACM conference on Computer and communications security&author=Franklin M K&author=Reiter M K&publication_year=1997&pages=1-5
[30]
Long
G L,
Liu
X S.
Theoretically efficient high-capacity quantum-key-distribution scheme.
Phys Rev A,
2002, 65: 032302
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Theoretically efficient high-capacity quantum-key-distribution scheme&author=Long G L&author=Liu X S&publication_year=2002&journal=Phys Rev A&volume=65&pages=032302
[31]
Deng
F G,
Long
G L,
Liu
X S.
Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block.
Phys Rev A,
2003, 68: 042317
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block&author=Deng F G&author=Long G L&author=Liu X S&publication_year=2003&journal=Phys Rev A&volume=68&pages=042317
[32]
Long
G L,
Deng
F G,
Wang
C, et al.
Quantum secure direct communication and deterministic secure quantum communication.
Front Phys China,
2007, 2: 251-272
Google Scholar
http://scholar.google.com/scholar_lookup?title=Quantum secure direct communication and deterministic secure quantum communication&author=Long G L&author=Deng F G&author=Wang C&publication_year=2007&journal=Front Phys China&volume=2&pages=251-272
[33]
周
宗权,
李
传锋.
固态量子存储.
科学通报,
2013, 58: 287-293
Google Scholar
http://scholar.google.com/scholar_lookup?title=固态量子存储&author=周 宗权&author=李 传锋&publication_year=2013&journal=科学通报&volume=58&pages=287-293
[34]
林
青.
普适单体偏振高维量子态幺正操作的光学实现.
中国科学: 物理学 力学 天文学,
2014, 44: 317-325
Google Scholar
http://scholar.google.com/scholar_lookup?title=普适单体偏振高维量子态幺正操作的光学实现&author=林 青&publication_year=2014&journal=中国科学: 物理学 力学 天文学&volume=44&pages=317-325
[35]
叶
欣露,
林
青.
非对称偏振三维纠缠态的预警制备.
中国科学: 物理学 力学 天文学,
2013, 43: 626-633
Google Scholar
http://scholar.google.com/scholar_lookup?title=非对称偏振三维纠缠态的预警制备&author=叶 欣露&author=林 青&publication_year=2013&journal=中国科学: 物理学 力学 天文学&volume=43&pages=626-633
[36]
王
国伟,
徐
应强,
牛
智川.
新型低维结构锑化物红外探测器的研究与挑战.
中国科学: 物理学 力学 天文学,
2014, 44: 368-389
Google Scholar
http://scholar.google.com/scholar_lookup?title=新型低维结构锑化物红外探测器的研究与挑战&author=王 国伟&author=徐 应强&author=牛 智川&publication_year=2014&journal=中国科学: 物理学 力学 天文学&volume=44&pages=368-389
[37]
Wang
X Y,
Yu
H B.
How to break MD5 and other hash functions. In: Cramer R, ed. Advances in Cryptology—EUROCRYPT 2005.
Berlin Heidelberg:
Springer-Verlag.
2005, : 19-35
Google Scholar
http://scholar.google.com/scholar_lookup?title=How to break MD5 and other hash functions. In: Cramer R, ed. Advances in Cryptology—EUROCRYPT 2005&author=Wang X Y&author=Yu H B&publication_year=2005&pages=19-35
[38]
Wang
X Y,
Yin
Y L,
Yu
H B.
Finding Collisions in the Full SHA-1. In: Shoup V, ed. Advances in Cryptology—CRYPTO 2005.
Berlin Heidelberg:
Springer-Verlag.
2005, : 17-36
Google Scholar
http://scholar.google.com/scholar_lookup?title=Finding Collisions in the Full SHA-1. In: Shoup V, ed. Advances in Cryptology—CRYPTO 2005&author=Wang X Y&author=Yin Y L&author=Yu H B&publication_year=2005&pages=17-36
[39]
Shor
P W.
Algorithms for quantum computation: Discrete logarithms and factoring. In: The Proceedings of the 35th Annual Symposium of Foundation of Computer Science.
New York:
Institute of Electrical and Electronics Engineers.
1994, : 124-134
Google Scholar
http://scholar.google.com/scholar_lookup?title=Algorithms for quantum computation: Discrete logarithms and factoring. In: The Proceedings of the 35th Annual Symposium of Foundation of Computer Science&author=Shor P W&publication_year=1994&pages=124-134
[40]
Grover
L K.
A fast quantum mechanical algorithm for database search. In: The Proceedings of the 28th Annual ACM Symposium on Theory of Computing.
New York:
Association for Computing Machinery.
1996, : 212-219
Google Scholar
http://scholar.google.com/scholar_lookup?title=A fast quantum mechanical algorithm for database search. In: The Proceedings of the 28th Annual ACM Symposium on Theory of Computing&author=Grover L K&publication_year=1996&pages=212-219
[41]
Hao
L,
Long
G L.
Experimental implementation of a fixed-point duality quantum search algorithm in the nuclear magnetic resonance quantum system.
Sci China-Phys Mech Astron,
2011, 54: 936-941
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Experimental implementation of a fixed-point duality quantum search algorithm in the nuclear magnetic resonance quantum system&author=Hao L&author=Long G L&publication_year=2011&journal=Sci China-Phys Mech Astron&volume=54&pages=936-941
[42]
Gao
F,
Qin
S J,
Wen
Q Y, et al.
A simple participant attack on the Bradler-Dusek protocol.
Quantum Inform Comput,
2007, 7: 329-334
Google Scholar
http://scholar.google.com/scholar_lookup?title=A simple participant attack on the Bradler-Dusek protocol&author=Gao F&author=Qin S J&author=Wen Q Y&publication_year=2007&journal=Quantum Inform Comput&volume=7&pages=329-334
[43]
Lin
S,
Gao
F,
Guo
F Z, et al.
Comment on “Multiparty quantum secret sharing of classical messages based on entanglement swapping”.
Phys Rev A,
2007, 76: 036301
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Comment on “Multiparty quantum secret sharing of classical messages based on entanglement swapping”&author=Lin S&author=Gao F&author=Guo F Z&publication_year=2007&journal=Phys Rev A&volume=76&pages=036301