Citation: | “Improved Eavesdropping Detection Strategy Based on Extended Three-particle Greenberger-Horne-Zeilinger State in Two-step Quantum Direct Communication Protocol,” Chinese Journal of Electronics, vol. 21, no. 4, pp. 736-739, 2012, |
C.H. Bennett and G. Brassard, “Quantum cryptography:Public-key distribution and coin tossing”, Proceeding of theIEEE International Conference on Computer, Systems and SignalProcessing, Bangalore, India, pp.175-179, 1984.
|
C.H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A. Peresand W.K. Wooters, “Teleporting an unknown quantum statevia dual classical and Einstein-Podolsky-Rosen channels”, Phys.Rev. Lett., Vol.70, 1993.
|
Kim. Yoon-Ho, S.P. Kulik and Shih. Yanhua, “Quantum teleportationwith a complete Bell state measurement”, J. Mod.Opt., Vol.49, pp.221-236, 2002.
|
J. Li, H.F. Jin and B. Jing, “Improved quantum “Ping-pong”protocol based on GHZ state and classical XOR Operation”,Sci. China Ser. G, Vol.54, No.9, pp.1612-1618, 2011.
|
Z.J. Zhang, Y.M. Liu and D.Wang, “Perfect teleportation of arbitraryn-qubit states using different quantum channels”, Phys.Lett. A, Vol.372, pp.28-32, 2007.
|
J. Li, D.J. Song, X.J. Guo and B. Jing, “Improved quantum“Ping-pong” protocol based on five-qubit GHZ state and classicalCNOT operation”, Int. J. Theor. Phys., Vol.51, No.1,pp.292-302, 2012.
|
H. Yuan, Q. He, X.Y. Hu et al., “Deterministic secure quantumcommunication with cluster state and bell-basis measurements”,Commun. Theor. Phys., Vol.50, 2008.
|
J. Li, D.J. Song, X.J. Guo and B. Jing, “An improved “Pingpong”protocol based on four-qubit genuine entangled state”,Chinese Jaurnal of Electronics, Vol.20, No.3, pp.457-460, 2011.
|
Prakash. Hari, “Quantum teleportation”, International Conferenceon Emerging Trends in Electronic and Photonic Devicesand Systems, 2009.
|
J. Li, D.J. Song, X.J. Guo and B. Jing, “Quantum secure directcommunication protocol based on five-particles cluster stateand classical XOR operation”, Acta Electronica Sinica, Vol.36,No.1, pp.31-36, 2012. (in Chinese)
|
F. Akira, “Quantum teleportation and quantum informationprocessing”, Quantum Electronics and Laser Science Conference,2010.
|
J. Li, H.F. Jin and B. Jing, “Improved security detection strategyfor quantum “Ping-Pong” protocol and its security analysis”,Chin. Commun., Vol.8, No.3, pp.170-179, 2011.
|
J. Li, D.J. Song, X.J. Guo and B. Jing, “An improved securitydetection strategy based on W state in “Ping-pong” Protocol”,Chinese Journal of Electronics, Vol.21, No.1, pp.117-120, 2012.
|
M. Hillery, V. Buzek and A. Berthiaume, “Quantum secret sharing”,Phys. Rev. A, Vol.59, pp.1829-1834, 1999.
|
S.K. Singh and R. Srikanth, “Generalized quantum secret sharing”,Phys. Rev. A, Vol.71, pp.012328, 2005.
|
G.L. Long and X.S. Liu, “Theoretically efficient high-capacityquantum- key- distribution scheme”, Phys. Rev. A, Vol.65,032302, 2002.
|
F.G. Deng, G.L. Long and X.S. Liu, “Two-step quantum directcommunication protocol using the Einstein-Podolsky-Rosenpair block”, Phys. Rev. A, Vol.68, 042317, 2003.
|
G.L. Long, F.G. Deng, C. Wang X.H. Li, K. Wen and W.Y.Wang, “Quantum secure direct communication and deterministicsecure quant communication”, Front. Phys. China, Vol.2,No.3, pp.251-272, 2007.
|
K. Boström and T. Felbringer, “Deterministic secure directcommunication using entanglement”, Phys. Rev. Lett., Vol.89,pp.187902, 2002.
|
F. Gao, F.Z. Guo, Q.Y. Wen et al., “Comparing the efficiency ofdifferent detection strategies of the ‘Ping-pong’ protocol”, Sci.China, Ser. G-Phys Mech. Astron, Vol.39, No.2, pp.161-166,2009. (in Chinese)
|
A. Wójcik, “Eavesdropping on the “Ping-pong” quantumcommunication protocol”, Phys. Rev. Lett., Vol.90, No.5,pp.157901, 2003.
|
F.G. Deng, X.H. Li, C.Y. Li et al., “Eavesdropping on the“Ping-pong” quantum communication protocol freely in a noisechannel”, Chin. Phys. Lett., Vol.16, pp.277-281, 2007.
|