Funder
National Research Foundation of Korea
Institute for Information and Communications Technology Promotion
Kyung Hee University
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Modeling and Simulation,Signal Processing,Theoretical Computer Science,Statistical and Nonlinear Physics,Electronic, Optical and Magnetic Materials
Reference20 articles.
1. Blakley, G.R.: Safeguarding cryptographic keys. Proc. Natl. Comput. Conf. 48, 313 (1979)
2. Shamir, A.: How to share s secret. Commun. ACM 22, 612 (1979)
3. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)
4. Greenberger, D.M., Horne, M.A., Zeilinger, A.: Going Beyond Bell’s Theorem, Bell’s Theorem, Quantum Theory, and Conceptions of the Universe. In: Kafatos, M. (eds) p. 69. Kluwer, Dordrecht (1989)
5. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献