Author:
Liu Zhi-Hao,Chen Han-Wu,Xu Juan,Liu Wen-Jie,Li Zhi-Qiang
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Modeling and Simulation,Signal Processing,Theoretical Computer Science,Statistical and Nonlinear Physics,Electronic, Optical and Magnetic Materials
Reference38 articles.
1. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, New York, pp. 313–317 (1979)
2. Shamir A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
3. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. Bangalore, India, pp. 175–179 (1984)
4. Hillery M., Buzek V., Berthiaume A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829–1834 (1999)
5. Cleve R., Gottesman D., Lo H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648–651 (1999)
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献