共 44 条
[1]
Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[5]
Dachman-Soled D, 2009, LECT NOTES COMPUT SC, V5536, P125, DOI 10.1007/978-3-642-01957-9_8
[6]
Cryptography in the bounded-quantum-storage model
[J].
SIAM JOURNAL ON COMPUTING,
2008, 37 (06)
:1865-1890
[7]
Improving the security of multiparty quantum secret sharing against Trojan horse attack
[J].
PHYSICAL REVIEW A,
2005, 72 (04)
[8]
Freedman MJ, 2004, LECT NOTES COMPUT SC, V3027, P1
[9]
Teleportation attack on the QSDC protocol with a random basis and order
[J].
Chin. Phys.,
2008, 9 (3189-3193)
:3189-3193