[1] 冯登国, 裴定一. 密码学导引[M]. 北京: 科学出版社, 1999.
[2] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing //Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. New York: IEEE, 1984: 175-179.
[3] Ekert A. Quantum cryptography based on Bell’s theorem[J]. Phys Rev Lett, 1991, 67: 661-664.
[4] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys Rev Lett, 1992, 68: 3121-3124.
[5] Yang L. Quantum public-key cryptosystem based on classical NP-complete problem.New York: Cornell University, 2003. http://arxiv.org/ftp/quant-ph/papers/0310/0310076.pdf.
[6] Kawachi A, Koshiba T, Nishimura H, et al. Computational indistinguishability between quantum states and its cryptographic application //Advances in Cryptology: Eurocrypt 2005 Proceedings. Berlin: Springer, 2005, 3494: 268-284.
[7] Nokolopoulos G M. Applications of single-qubit rotations in quantum public-key cryptography[J]. Phys Rev A, 2008, 77(3): 032348/1-7.
[8] Pan J Y, Yang L. Quantum public-key encryption with information theoretic security.New York: Cornell University, 2010. http://arxiv.org/PS_cache/arxiv/pdf/1006/1006.0354v2.pdf.
[9] Yang L, Wu L A, Liu S H. Quantum three-pass cryptography protocol //Proc SPIE. Bellingham: SPIE Press, 2002, 4917:106-111.
[10] Yang L, Hu L. Quantum no-key protocol with inherent identification //Proc SPIE. Bellingham: SPIE Press, 2006, 6305: 63050J/1-6.
[11] Kanamori Y, Yoo S M, Shurman M A. A quantum no-key protocol for secure data communication //Proc 43rd ACM SE Conference. New York: ACM Press, 2005: 92-93.
[12] Wu Y, Yang L. Practical quantum no-kay protocol with identification //Information Assurance and Security. New York: IEEE, 2009: 540-543.
[13] Beige A, Englert B G, Kurtsiefer C, et al. Secure communication with a publicly known key[J]. Acta Phys Pol A, 2002, 101(3): 357-368.
[14] Bostrm K, Felbinger T. Deterministic secure direct communication using entanglement[J]. Phys Rev Lett, 2002, 89:187902/1-4.
[15] Deng F G, Long G L. Secure direct communication with a quantum one-time pad[J]. Phys Rev A, 2004, 69:052319/1-4.
[16] Deng F G, Long G L, Liu X S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block[J]. Phys Rev A, 2003, 68: 042317/1-4.
[17] 曾贵华. 量子密码学[M]. 北京: 科学出版社, 2006.
[18] Barnum H, Cr'epeau C, Gottesman D, et al. Authentication of quantum messages //Proc 43rd Annual IEEE Symposium on the Foundations of Computer Science. New York: IEEE, 2002: 449-458.
[19] Yang L, Hu L, Feng D G. Quantum message authentication based on algebraic coding theory //Quantum Optics and Applications in Computing and Communications Ⅱ. 2005, 5631: 101-104.
[20] Duek M, Haderka O, Hendrych M, et al. Quantum identification system[J]. Phys Rev A, 1999, 60(1):149-156.
[21] Zeng G H, Guo G C. Quantum authentication protocol.New York: Cornell University, 2000. http://arxiv.org/PS_cache/quant-ph/pdf/0001/0001046v1.pdf.
[22] Ljunggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution[J]. Phys Rev A, 2000, 62: 022305/1-7.
[23] Zeng G H, Keitel C H. Arbitrated quantum-signature scheme[J]. Phys Rev A, 2002, 65: 042312/1-6.
[24] Lǚ L, Feng D G. An arbitrated quantum message signature scheme //International Symposium on Computational and Information Science. Berlin: Springer, LNCS, 2004, 3314: 1054-1060.
[25] Zeng G H. Quantum identity authentication without trusted-party[J]. Acta Electronica Sinica, 2004, 32:1148-1151(in Chinese). 曾贵华. 不依赖于第三方的动态量子身份认证方案[J]. 电子学报, 2004, 32:1148-1151.
[26] Zeng G H, Zhang W P. Identity verification in quantum key distribution[J]. Phys Rev A, 2000, 61: 022303.
[27] He G Q, Zeng G H. A secure identification system using coherent states[J]. Chinese Phys, 2006, 15: 371-374.
[28] Nielsen M A, Chuang I L. Quantum computation and quantum information[M]. London: Cambridge University Press, 2000. |