1 |
A. Ambainis, E. Bachy, A. Nayakz, et al, "One-dimensional quantum walks," in Proc. of the thirty-third annual ACM symposium on Theory of computing STOC01, pp. 37-49, 2001.
|
2 |
A. Cabello, "Quantum Key Distribution in the Holevo Limit," Physical Review Letters, vol. 85, pp. 5635, January, 2000.
DOI
|
3 |
Y. Du, W. Bao, "Multiparty quantum secret sharing scheme based on the phase shift operations," Optics Communications, vol. 308, no. 1, pp. 159-163, November, 2013.
DOI
|
4 |
Z. Zhu, A. Hu, A. Fu, "Cryptanalysis of a new circular quantum secret sharing protocol for remote agents," Quantum Information Processing, vol. 12, no. 2, pp. 1173-1183, February, 2013.
DOI
|
5 |
R. Shi, L. Huang, W. Yang, et al, "Multiparty quantum secret sharing with Bell states and Bell measurements," Optics Communications, vol. 283, no. 11, pp. 2476-2480, June, 2010.
DOI
|
6 |
G. Gan, "Multiparty Quantum Secret Sharing Using Two-Photon Three-Dimensional Bell States," Communications in Theoretical Physics, vol. 52, no. 3, pp. 421-424, September, 2009.
DOI
|
7 |
M. Dusek, O. Haderka, M. Hendrych, et al, "Quantum identification system," Physical Review A, vol. 60, pp. 149, January, 1999.
DOI
|
8 |
Q. Cai, "Eavesdropping on the two-way quantum communication protocols with invisible photons," Physics Letters A, vol. 351, no. 1-2, pp. 23-25, February, 2006.
DOI
|
9 |
J. Lin, T. Hwang, "New circular quantum secret sharing for remote agents," Quantum Information Processing, vol. 12, no. 1, pp. 685-697, April, 2013.
DOI
|
10 |
F. Liu, Q. Su, Q. Wen, "Eavesdropping on Multiparty Quantum Secret Sharing Scheme Based on the Phase Shift Operations," International Journal of Theoretical Physics, vol. 53, no. 5, pp. 1730-1737, April, 2014.
DOI
|
11 |
H. Qin, X. Zhu, Y. Dai, "(t, n) Threshold quantum secret sharing using the phase shift operation," Quantum Information Processing, vol. 14, no. 8, pp. 2997-3004, August, 2015.
DOI
|
12 |
T. Hwang, C. Hwang, C. Li, "Multiparty quantum secret sharing based on GHZ states," Physica Scripta, vol. 83, no. 4, pp. 045004, March, 2011.
DOI
|
13 |
X. Liu, R. Pan, "Cryptanalysis of quantum secret sharing based on GHZ states," Physica Scripta, vol. 84, no. 4, pp. 045015, September, 2011.
DOI
|
14 |
P. Xue, R. Zhang, H. Qin, et al, "Experimental quantum-walk revival with a time-dependent coin," Physical Review Letters, vol. 114, no. 14, pp. 140502, April, 2015.
DOI
|
15 |
H. Wang, Y. Huang, X. Fang, et al, "High-Capacity Three-Party Quantum Secret Sharing with Single Photons in Both the Polarization and the Spatial-Mode Degrees of Freedom," International Journal of Theoretical Physics, vol. 52, no. 4, pp.1043-1051, April, 2013.
DOI
|
16 |
S. Hao, B. Yu, "Multiparty Quantum Secret Information Sharing in Enterprise Management Based on Single Qubit with Random Rotation Angle," International Journal of Theoretical Physics, vol. 51, no. 6, pp. 1674-1679, June, 2012.
DOI
|
17 |
Y. Yang, Q.Wen, X. Zhang, "Multiparty simultaneous quantum identity authentication with secret sharing," Science in China Series G: Physics, Mechanics and Astronomy, vol. 51, no. 3, pp. 321-327, January, 2008.
DOI
|
18 |
X. Zhang, D. Ji, "Analysis of a kind of quantum cryptographic schemes based on secret sharing," Science in China Series G: Physics, Mechanics and Astronomy, vol. 52, no. 9, pp. 1313-1316, September, 2009.
DOI
|
19 |
Y. Yang, H. Wang, X. Jia, H. Zhang, "A Quantum Protocol for (t,n)-Threshold Identity Authentication Based on Greenberger-Horne-Zeilinger States," International Journal of Theoretical Physics, vol. 52, no. 2, pp. 524-530, 2013.
DOI
|
20 |
H. Abulkasim, S. Hamad, K. Bahnasy, et al, "Authenticated quantum secret sharing with quantum dialogue based on Bell states," Physica Scripta, vol. 91, no. 8, pp. 085101, July, 2016.
DOI
|
21 |
Y. Aharonov, L. Davidovich, N. Zagury, "Quantum random walks," Physical Review A, vol. 48, no. 2, pp. 1687-1690, 1993.
DOI
|
22 |
J. Kempe, "Quantum random walks - an introductory overview," Contemporary Physics, vol. 44, no. 4, pp. 307-327, January, 2003.
DOI
|
23 |
X. Chen, Y. Wang, G. Xu, et al, "Quantum Network Communication With a Novel Discrete-Time Quantum Walk," IEEE Access, vol. 7, pp. 13634-13642, January, 2019.
DOI
|
24 |
S.E. Venegas-Andraca, "Quantum walks: a comprehensive review," Quantum Information Processing, vol. 11, no. 5, pp. 1015-1106, January, 2012.
DOI
|
25 |
Y.Wang, Y. Shang, P. Xue, "Generalized teleportation by quantum walks," Quantum Information Processing, vol. 16, no. 221, September, 2017.
|
26 |
Y. Shang, Y. Wang, M. Li, et al, "Quantum communication protocols by quantum walks with two coins," Europhysics Letters, vol. 124, no. 6, pp. 60009, February, 2019.
DOI
|
27 |
Z. Bian, J. Li, X. Zhan, et al, "Experimental implementation of a quantum walk on a circle with single photons," Physical Review A, vol. 95, no. 5, pp. 052338, May, 2017.
DOI
|
28 |
M. Hillery, V. Buzek, A. Berthiaume, "Quantum secret sharing," Physical Review A, vol. 59, no. 3, pp. 1829-1834, March 1999.
DOI
|
29 |
W. Liu, P. Gao, W. Yu, et al, "Quantum Relief algorithm," Quantum Information Processing, vol. 17, no. 10, pp. 280, October, 2018.
DOI
|
30 |
X. Zou, Y. Dong, G. Guo, "Optical implementation of one-dimensional quantum random walks using orbital angular momentum of a single photon," New Journal of Physics, vol. 8, no. 81, May, 2006.
|
31 |
H. Tang, X. Lin, Z. Feng, et al, "Experimental two-dimensional quantum walk on a photonic chip," Science Advances, vol. 4, no. 5, pp.3174, December, 2018.
|
32 |
Y. Feng, R. Shi, J. Shi, et al, "Arbitrated quantum signature scheme with quantum walk-based teleportation," Quantum Information Processing, vol. 18, no. 5, pp. 15, April, 2019.
DOI
|
33 |
J. Shi, H. Chen, F. Zhou, et al, "Quantum Blind Signature Scheme with Cluster States Based on Quantum Walk Cryptosystem," International Journal of Theoretical Physics, vol. 58, no. 4, pp. 1337-1349, February, 2019.
DOI
|
34 |
H. Lee, H. Yang, J. Lim, "Quantum Direct Communication with Authentication," Physical Review A, vol. 73, no. 4, pp. 543-543, April 2006.
|
35 |
Z. Qu, Z. Li, G. Xu, et al, "Quantum Image Steganography Protocol Based on Quantum Image Expansion and Grover Search Algorithm," IEEE Access, vol. 7, pp. 50849-50857, January, 2019.
DOI
|
36 |
Y. Chang, S. Zhang, L. Yan, et al, "A Quantum Authorization Management Protocol Based on EPR-Pairs," Computers, Materials & Continua, vol. 59, no. 3, pp. 1005-1014, 2019.
DOI
|
37 |
W. Liu, P. Gao, Z. Liu, et al, "A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment," Security and Communication Networks, vol. 2019, pp.1-14, 2019.
|
38 |
Z. Qu, S. Wu, M. Wang, et al, "Effect of quantum noise on deterministic remote state preparation of an arbitrary two-particle state via various quantum entangled channels," Quantum Information Processing, vol. 16, no.12, pp. 306, December, 2017.
DOI
|
39 |
Z. Qu, Z. Wen, X. Wang, "Matrix Coding-Based Quantum Image Steganography Algorithm", IEEE Access, vol. 7, pp. 35684-35698, January, 2019.
DOI
|
40 |
L. Yan, Y. Chang, S. Zhang, et al, "Measure-Resend Semi-Quantum Private Compari-son Scheme Using GHZ Class States," Computers, Materials & Continua, vol. 61, no. 2, pp. 877-887, 2019.
DOI
|
41 |
S. Zhang, Y. Chang, L. Yan, et al, "Quantum Communication Networks and Trust Management: A Survey," Computers, Materials & Continua, vol. 61, no.3, pp.1145-1174, January, 2019.
DOI
|
42 |
W. Liu, Y. Xu, M. Zhang, et al, "A Novel Quantum Visual Secret Sharing Scheme," IEEE Access, vol. 7, pp. 114374-114384, 2019.
DOI
|
43 |
X. Chen, X. Niu, X. Zhou, et al, "Multi-party quantum secret sharing with the single-particle quantum state to encode the information," Quantum Information Processing, vol. 12, no. 1, pp. 365-380, March, 2013.
DOI
|