SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Zhi-Hao Liu, Han-Wu Chen. Universal and General Quantum Simultaneous Secret Distribution with Dense Coding by Using One-Dimensional High-Level Cluster States[J]. Journal of Computer Science and Technology, 2021, 36(1): 221-230. DOI: 10.1007/s11390-020-9418-4 |
[1] |
Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum cryptography. Reviews of Modern Physics, 2002, 74(1):145-195. DOI: 10.1103/RevModPhys.74.145.
|
[2] |
Bennett C H, Brassard G. Quantum cryptography:Public key distribution and coin tossing. In Proc. IEEE International Conference on Computers, Systems & Signal Processing, December 1984, pp.175-179.
|
[3] |
Boaron A, Boso G, Rusca D, Vulliez C, Autebert C, Caloz M, Perrenoud M, Gras G, Bussieres F, Li M J, Nolan D, Martin A, Zbinden H. Secure quantum key distribution over 421 km of optical fiber. Physical Review Letters, 2018, 121(19):Article No. 190502. DOI: 10.1103/PhysRevLett.121.190502.
|
[4] |
Cao W F, Zhen Y Z, Zheng Y L, Li L, Chen Z B, Liu N L, Chen K. One-sided measurement-device-independent quantum key distribution. Physical Review A, 2018, 97(1):Article No. 012313. DOI: 10.1103/physreva.97.012313.
|
[5] |
Dellantonio L, Sorensen A S, Bacco D. High-dimensional measurement-device-independent quantum key distribution on two-dimensional subspaces. Physical Review A, 2018, 98(6):Article No. 062301. DOI: 10.1103/PhysRevA.98.062301.
|
[6] |
Huang A Q, Sun S H, Liu Z H, Makarov V. Quantum key distribution with distinguishable decoy states. Physical Review A, 2018, 98(1):Article No. 012330. DOI: 10.1103/PhysRevA.98.012330.
|
[7] |
Islam N T, Lim C C W, Cahall C, Kim J, Gauthier D J. Securing quantum key distribution systems using fewer states. Physical Review A, 2018, 97(4):Article No. 042347. DOI: 10.1103/PhysRevA.97.042347.
|
[8] |
Pivoluska M, Huber M, Malik M. Layered quantum key distribution. Physical Review A, 2018, 97(3):Article No. 032312. DOI: 10.1103/PhysRevA.97.032312.
|
[9] |
Huang P, Huang J Z, Zhang Z S, Zeng G H. Quantum key distribution using basis encoding of Gaussian-modulated coherent states. Physical Review A, 2018, 97(4):Article No. 042311. DOI: 10.1103/PhysRevA.97.042311.
|
[10] |
Lai H, Luo M X, Pieprzyk J, Zhang J, Pan L, Orgun M A. High-rate and high-capacity measurementdevice-independent quantum key distribution with Fibonacci matrix coding in free space. Science ChinaInformation Sciences, 2018, 61(6):Article No. 062501. DOI: 10.1007/s11432-017-9291-6.
|
[11] |
Blakley G R. Safeguarding cryptographic keys. In Proc. the National Computer Conference, June 1979, pp.313-317. DOI: 10.1109/AFIPS.1979.98.
|
[12] |
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11):612-613. DOI: 10.1145/359168.359176.
|
[13] |
Cleve R, Gottesman D, Lo H K. How to share a quantum secret. Physical Review Letters, 1999, 83(3):648-651. DOI: 10.1103/PhysRevLett.83.648.
|
[14] |
Hillery M, Bužek V, Berthiaume A. Quantum secret sharing. Physical Review A, 1999, 59(3):1829-1834. DOI: 10.1103/PhysRevA.59.1829.
|
[15] |
Karlsson A, Koashi M, Imoto N. Quantum entanglement for secret sharing and secret splitting. Physical Review A, 1999, 59(1):162-168. DOI: 10.1103/PhysRevA.59.162.
|
[16] |
Wang J, Li L, Peng H, Yang Y. Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Physical Review A, 2017, 95(2):Article No. 022320. DOI: 10.1103/PhysRevA.95.022320.
|
[17] |
Lu C, Miao F, Meng K, Yu Y. Threshold quantum secret sharing based on single qubit. Quantum Information Processing, 2018, 17(3):Article No. 64. DOI:10.1007/s11128- 017-1793-6.
|
[18] |
Qin H, Tso R. High-capacity quantum secret sharing based on orbital angular momentum. Quantum Information & Computation, 2018, 18(7/8):579-591. DOI: 10.5555/3370256.3370259.
|
[19] |
Song Y, Li Z, Li Y. A dynamic multiparty quantum direct secret sharing based on generalized GHZ states. Quantum Information Processing, 2018, 17(9):Article No. 244. DOI: 10.1007/s11128-018-1970-2.
|
[20] |
Zhou Y, Yu J, Yan Z, Jia X, Zhang J, Xie C, Peng K. Quantum secret sharing among four players using multipartite bound entanglement of an optical field. Physical Review Letters, 2018, 121(15):Article No. 150502. DOI: 10.1103/PhysRevLett.121.150502.
|
[21] |
Long G L, Deng F G, Wang C, Li X H. Quantum secure direct communication and deterministic secure quantum communication. Frontiers of Physics in China, 2007, 2(3):251- 272. DOI: 10.1007/s11467-007-0050-3.
|
[22] |
Li X H. Quantum secure direct communication. Acta Physica Sinica, 2015, 64(16):Article No. 0160307. DOI:10.7498/aps.64.160307. (in Chinese)
|
[23] |
Wang J, Zhang Q, Tang C J. Quantum broadcast communication. Chinese Physics B, 2007, 16(7):1868-1877. DOI: 1088/1009-1963/16/7/011.
|
[24] |
Yang Y G, Wang Y H, Wen Q Y. Quantum broadcast communication with authentication. Chinese Physics B, 2010, 19(7):63-67. DOI: 10.1088/1674-1056/19/7/070304.
|
[25] |
Liu Z H, Chen H W. Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad. Chinese Physics B, 2016, 25(8):63-68. DOI: CNKI:SUN:ZGWL.0.2016-08-010.
|
[26] |
Deng F G, Li X H, Li C Y, Zhou P, Liang Y J, Zhou H Y. Multiparty quantum secret report. Chinese Physics Letters, 2006, 23(7):1676-1679. DOI:10.1088/0256- 307X/23/7/006.
|
[27] |
Li X H, Li C Y, Deng F G, Zhou P, Liang Y J, Zhou H Y. Multiparty quantum remote secret conference. Chinese Physics Letters, 2007, 24(1):23-26. DOI:10.1088/0256- 307X/24/1/007.
|
[28] |
Nguyen B A. Quantum exam. Physics Letters A, 2006, 350(3/4):174-178. DOI: 10.1016/j.physleta.2005.09.071.
|
[29] |
Gao F, Wen Q Y, Zhu F C. Comment on:\Quantum exam"[phys. Lett. A 350(2006) 174]. Physics Letters A, 2007, 360(6):748-750. DOI: 10.1016/j.physleta.2006.08.016.
|
[30] |
Song J, Zhang S. Comment on:\Quantum exam"[phys. Lett. A 350(2006) 174]. Physics Letters A, 2007, 360(6):746-747. DOI: 10.1016/j.physleta.2006.08.019.
|
[31] |
Man Z X, Xia Y J. Efficient one-sender versus N-receiver quantum secure direct communication. Chinese Physics Letters, 2006, 23(8):1973-1975. DOI:10.1088/0256- 307X/23/8/004.
|
[32] |
Gao F, Lin S, Wen Q Y, Zhu F C. A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chinese Physics Letters, 2008, 25(5):1561-1563. DOI: 10.1088/0256-307X/25/5/011.
|
[33] |
Liu Z H, Chen H W, Liu W J, Xu J. Quantum simultaneous secret distribution with dense coding by using cluster states. Quantum Information Processing, 2013, 12(12):3745-3759. DOI: 10.1007/s11128-013-0633-6.
|
[34] |
Briegel H J, Raussendorf R. Persistent entanglement in arrays of interacting particles. Physical Review Letters, 2001, 86(5):910-913. DOI: 10.17877/DE290R-12220.
|
[35] |
Zhou D L, Zeng B, Xu Z, Sun C P. Quantum computation based on d-level cluster state. Physical Review A, 2003, 68(6):Article No. 062303. DOI: 10.1103/PhysRevA.68.062303.
|
[36] |
Wang X W, Shan Y G, Xia L X, Lu M W. Dense coding and teleportation with one-dimensional cluster states. Physics Letters A, 2007, 364(1):7-11. DOI: 10.1016/j.physleta.2006.11.056.
|
[37] |
Liu Z H, Chen H W, Liu W J, Xu J, Li Z Q. Deterministic secure quantum communication without unitary operation based on high-dimensional entanglement swapping. Science China-Information Sciences, 2012, 55(2):360-367. DOI: 10.1007/s11432-011-4371-z.
|
[38] |
Cai Q Y. The \ping-pong" protocol can be attacked without eavesdropping. Physical Review Letters, 2003, 91(10):Article No. 109801. DOI: 10.1103/PhysRevLett.91.109801.
|
[39] |
Liu Z H, Chen H W. Cryptanalysis of controlled bidirectional quantum secure direct communication network using classical XOR operation and quantum entanglement. IEEE Communications Letters, 2017, 21(10):2202-2205. DOI: 10.1109/LCOMM.2017.2721952.
|
[40] |
Gisin N, Fasel S, Kraus B, Zbinden H, Ribordy G. Trojanhorse attacks on quantum-key-distribution systems. Physical Review A, 2006, 73(2):022320. DOI: 10.1103/PHYSREVA.73.022320.
|
[41] |
Cai Q Y. Eavesdropping on the two-way quantum communication protocols with invisible photons. Physics Letters A, 2006, 351(1/2):23-25. DOI: 10.1016/j.physleta.2005.10.050.
|
[42] |
Deng F G, Zhou P, Li X H, Li C Y, Zhou H Y. Robustness of two-way quantum communication protocols against trojan horse attack. arXiv:0508168, 2005. https://arxiv.org/abs/quant-ph/0508168, Aug. 2020.
|
[43] |
Li X H, Deng F G, Li C Y, Liang Y J, Zhou P, Zhou H Y. Deterministic secure quantum communication without maximally entangled states. Journal of the Korean Physical Society, 2006, 49(4):1354-1359. DOI:10.1007/s10854-006- 0034-z.
|
[1] | Hui Jiang, Dian-Kang Li, Yu-Xin Deng, Ming Xu. A Pattern Matching Based Framework for Quantum Circuit Rewriting[J]. Journal of Computer Science and Technology, 2024, 39(6): 1312-1327. DOI: 10.1007/s11390-024-2726-3 |
[2] | Ze-Kun Ye, Lv-Zhou Li. Characterization of Exact One-Query Quantum Algorithms for Partial Boolean Functions[J]. Journal of Computer Science and Technology, 2023, 38(6): 1423-1430. DOI: 10.1007/s11390-022-1361-0 |
[3] | Wen-Jun Shi, Qin-Xiang Cao, Yu-Xin Deng, Han-Ru Jiang, Yuan Feng. Symbolic Reasoning About Quantum Circuits in Coq[J]. Journal of Computer Science and Technology, 2021, 36(6): 1291-1306. DOI: 10.1007/s11390-021-1637-9 |
[4] | Qing Ai, Yan-Song Li, Gui-Lu Long. Influences of Gate Operation Errors in the Quantum Counting Algorithm[J]. Journal of Computer Science and Technology, 2006, 21(6): 927-931. |
[5] | Run-Yao Duan, Zheng-Feng Ji, Yuan Feng, Ming-Sheng Ying. Some Issues in Quantum Information Theory[J]. Journal of Computer Science and Technology, 2006, 21(5): 776-789. |
[6] | Kwang-Jin Park, Moon-Bae Song, Chong-Sun Hwang. Broadcast-Based Spatial Queries[J]. Journal of Computer Science and Technology, 2005, 20(6): 811-821. |
[7] | Li Xiaofeng, Shou Biao, Zheng Shirong. Research on the Optimal Parallel Algorithms of Broadcast-Class Problems[J]. Journal of Computer Science and Technology, 1998, 13(5): 455-463. |
[8] | Xu Haishui, Li Xianji, Richard W.Nau. Performance of Multicast Communication on Hypercubes[J]. Journal of Computer Science and Technology, 1993, 8(4): 88-92. |
[9] | Duan Ping, Cai Xiyao. A Real-Time Interprocessor Synchronization Algorithm for Communication in Distributed Computer Systems[J]. Journal of Computer Science and Technology, 1987, 2(4): 292-302. |
[10] | Jin Zhiquan, A. Silberschatz. Proof Techniques for Port-Directed Communication and Broadcast[J]. Journal of Computer Science and Technology, 1987, 2(2): 81-91. |
1. | Mehria Nawaz. ONLINE SKILL TEST PLATFORM. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2022, 17(11) DOI:10.26782/jmcms.2022.11.00003 |