共 44 条
- [1] Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
- [5] Dachman-Soled D, 2009, LECT NOTES COMPUT SC, V5536, P125, DOI 10.1007/978-3-642-01957-9_8
- [6] Cryptography in the bounded-quantum-storage model [J]. SIAM JOURNAL ON COMPUTING, 2008, 37 (06) : 1865 - 1890
- [7] Improving the security of multiparty quantum secret sharing against Trojan horse attack [J]. PHYSICAL REVIEW A, 2005, 72 (04):
- [8] Freedman MJ, 2004, LECT NOTES COMPUT SC, V3027, P1
- [9] Teleportation attack on the QSDC protocol with a random basis and order [J]. Chin. Phys., 2008, 9 (3189-3193): : 3189 - 3193