Author:
Wang Tian-Yin,Liu Ying-Zhao,Wei Chun-Yan,Cai Xiao-Qiu,Ma Jian-Feng
Publisher
Springer Science and Business Media LLC
Reference28 articles.
1. Shamir, A. How to shair a secret. Commun. ACM 22(11), 612–613, doi:
10.1145/359168.359176
(1979).
2. Blakely, G. Safeguarding cryptographic keys. Proc. the National Computer Conference (pp. 313–317. AFIPS, Montvale: IEEE Press: New York, 1979).
3. Hillery, M., Bužek, V. & Berthiaume, A. Quantum secret sharing. Phys. Rev. A 59(3), 1829–1834, doi:
10.1103/PhysRevA.59.1829
(1999).
4. Tittel, W., Zbinden, H. & Gisin, N. Experimental demonstration of quantum secret sharing. Phys. Rev. A 63(4), 042301, doi:
10.1103/PhysRevA.63.042301
(2001).
5. Xiao, L. et al. Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307, doi:
10.1103/PhysRevA.69.052307
(2004).
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献