Author:
Ye Li-Xiang,Lin Xiu,Chen Xiang,He Juan,Yang Rong-Can,Liu Hong-Yu
Funder
National Natural Science Foundation of China (CN)
Natural Science Foundation of Fujian Province
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Modelling and Simulation,Signal Processing,Theoretical Computer Science,Statistical and Nonlinear Physics,Electronic, Optical and Magnetic Materials
Reference33 articles.
1. Greenberger, D.M., Horne, M.A., Zeilinger, A.: Going beyond Bell’s theorem. In: Kafatos, M. (ed.) Bell’s Theorem, Quantum Theory, and Conceptions of the Universe. Kluwer Academics, Dordrecht (1989)
2. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)
3. Zhang, Z.J., Man, Z.X.: Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 72, 022303 (2005)
4. Bennett, C.H., Brassard, G., Crepeau, C., Jozsa, R., Peres, A., Wootters, W.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)
5. Gisin, N., Massar, S.: Optimal quantum cloning machines. Phys. Rev. Lett. 79, 2153 (1993)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献