Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 356-363.
• Information Security • Previous Articles Next Articles
ZHENG Yi-neng
CLC Number:
[1]王剑,王振国.量子密码协议理论研究[M].长沙:国防科技大学出版社,2011:79-100. [2]ID-Quantique(Geneva,Switzerland)[OL].http://www.idqu-antique.com. [3]万骏.浅谈量子通信理论及其应用[J].科技传播,2018(6):1674-6708. [4]BENNET C H,BRASSARD G.Quantum cryptography:Public key distribution andcointossing[C]∥IEEE International Conference on Computers Systems and Signal Processing Bangalore.1984:175-179. [5]BECHMANN-PASQUINUCCI H,PERES A.Quantum cryp- tography with 3-state systems[J].Physical Review Letters,2000,85(15):3313-3316. [6]BRUSS D.Optimal eavesdropping in quantum cryptography with six states[J].Physical Review Letters,1998,81(14):3018-3021. [7]BIHAM E,HUNTTER B,MOR T.Quantum cryptographic network based on quantum memories[J].Physical Review A,1996,54(4):2651. [8]TOWNSEND P.Quantum cryptography on optical fibernet- works in European 98 Parallel Processing[J].Springer,1998,1470:35-46. [9]TOWNSEND P.Quantum cryptography on multiuser optical fiber network[J].Nature,1997,385(6611):47-49. [10]LONGDELL,FRAVEL J J,SELLARS E,et al.Stopped light with storage times Greater than one second using electrom agentically induced transparency in a solid[J].Physical Review Letters,2005,95:63-601. [11]CHEN Z,BCHE N,ZHAO B.Experimental demonstration of a BDCZ quantum repeater node[J].Nature,2008,454(28):1098-1101. [12]YUAN Z S,CHEN Y A.Fault-tolerent quantum repeater with atomic ensembles and linear optical[J].Physical Review A,2007,76(2):22-29. [13]CLAUSEN C,USMANI I,BUSSIERES F.Quatum storage of photonic entanglement in a crystal[J].Nature,2011,469:508-511. [14]TOLIVER P,CHAPURAN T E,RUNSEP R J,et al.Experimental investigation of quantum key distribution through transparent optical switch elements[J].IEEE Photonics Technology Letters,2003,15(11):1669-1671. [15]BEIGE A,ENGLERT B G,KURTSIEFER C,et al.Secure communication with single-photon two-qubit states[J].Physical Review A,2002,35(28):407-413. [16]CAI Q Y.The “Ping-Pong” protocol can be attacked without eavesdropping[J].Physical Review Letters,2003,91(10):109801. [17]CAI Q Y,LI B W.Deterministic secure communication without using entanglement[J].China Physical Letters,2004,21(4):601-603. [18]MAN Z X,ZHANG Z J,LI Y.Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations[J].China Physical Letters,2005,22(1):18-21. [19]WANG J,ZHANG Q,TANG C J.Multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state[J].Optics Communications,2006,266(2):732-737. |
[1] | ZHANG Liang-liang, ZHANG Yi-wei, LIANG Jie, SUN Rui-yi and WANG Xin-an. Information Security in New Quantum Technology Age [J]. Computer Science, 2017, 44(7): 1-7. |
[2] | LIU Ji (State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing 210093). [J]. Computer Science, 2007, 34(1): 203-207. |
|