1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
2. Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of AFIPS the National Computer Conference, vol. 48, pp. 313–317 (1979)
3. Guo, Y., Lee, M., Zeng, G.: Large-capability quantum key distribution with entangled qutrits. Opt. Commun. 281(14), 3938–3942 (2008)
4. Yang, F., Shi, R., Guo, Y., Shi, J., Zeng, G.: Continuous-variable quantum key distribution under the local oscillator intensity attack with noiseless linear amplifier. Quantum Inf. Process. 14(8), 1–16 (2015)
5. Gong, L., Song, H., He, C., Liu, Y., Zhou, N.: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 89(89), 240–240 (2014)