[1]
|
G. L. Long and X. S. Liu, “Theoretically Efficient High-Capacity Quantum Key Distribution Scheme,” Physics Review A, Vol. 65, No. 3, 2002, Article ID: 032302.
doi:10.1103/PhysRevA.65.032302
|
[2]
|
A Beige, B. G. Englert, C. Kurtsiefer, et al., “Secure Communication with A Publicly Known Key,” Acta Physics Polonica A, Vol. 101, No. 3, 2002, pp. 357-368.
|
[3]
|
K. Bostrom and T. Felbinger, “Deterministic Secure Direct Communication Using Entanglement,” Physics Review Letters, Vol. 89, No. 18, 2002, pp. 187902-187905.
doi:10.1103/PhysRevLett.89.187902
|
[4]
|
J. Li, H. Jin and B. Jing, “Improved Quantum ‘Pingpong’ Protocol Based on GHZ State and Classical XOR Operation,” Science in China Series G, Vol. 54, No. 9, 2011, pp. 1612-1618.
|
[5]
|
F. G. Deng, G. L. Long and X. S. Liu, “Two-Step Quantum Direct Communication Protocol Using the Einstein- Podolsky-Rosen Pair Block,” Physics Review A, Vol. 68, No. 4, 2003, Article ID: 042317.
doi:10.1103/PhysRevA.68.042317
|
[6]
|
F. L. Yan and X. Q. Zhang, “A Scheme for Secure Direct Communication Using EPR Pairs and Teleportation,” European Physical Journal B, Vol. 41, No. 1, 2004, pp. 75-78.
doi:10.1140/epjb/e2004-00296-4
|
[7]
|
B. A. Nguyen, “Quantum Dialogue,” Physics Letters A, Vol. 328, No. 1, 2004, pp. 6-10.
doi:10.1016/j.physleta.2004.06.009
|
[8]
|
X. Ji and S. Zhang, “Secure Quantum Dialogue Based on Single-Photon,” Chinese Physics, Vol. 15, No. 7, 2006, pp. 1418-1420. doi:10.1088/1009-1963/15/7/005
|
[9]
|
Y. G. Yang and Q. Y. Wen, “Quasi-Secure Quantum Dialogue Using Single Photons,” Science in China Series G, Vol. 50, No. 5, 2007, pp. 558-562.
doi:10.1007/s11433-007-0057-3
|
[10]
|
X. R. Jin, X. Ji, S. Zhang, et al., “Three-Party Quantum Secure Direct Communication Based on GHZ States,” Physics Letters A, Vol. 354, No. 1-2, 2006, pp. 67-70.
doi:10.1016/j.physleta.2006.01.035
|
[11]
|
Z. X. Man and Y. J. Xia, “Improvement of Security of Three-Party Quantum Secure Direct Communication Based on GHZ States,” Chinese Physics Letters, Vol. 24, No. 1, 2007, pp. 15-18. doi:10.1088/0256-307X/24/1/005
|
[12]
|
A. Chamoli and C. M. Bhandari, “Secure Direct Communication Based on Ping-pong Protocol,” Quantum Information Processing, Vol. 8, No. 4, 2009, pp. 347-356.
doi:10.1007/s11128-009-0112-2
|
[13]
|
M. Y. Wang and F. L. Yan, “Three-Party Simultaneous Quantum Secure Direct Communication Scheme with EPR Pairs,” Chinese Physics Letters, Vol. 24, No. 9, 2007, pp. 2486-2488. doi:10.1088/0256-307X/24/9/007
|
[14]
|
S. K. Chong and T. Hwang, “The Enhancement of Three-party Simultaneous Quantum Secure Direct Communication Scheme with EPR Pairs,” Optics Communication, Vol. 284, No. 1, 2011, pp. 515-518.
doi:10.1016/j.optcom.2010.08.037
|
[15]
|
F. Gao, F. Z. Guo, Q. Y. Wen, et al., “Revisiting The Security of Quantum Dialogue and Bidirectional Quantum Secure Direct Communication,” Science in China Series G, Vol. 51, No. 5, 2008, pp. 559-566.
doi:10.1007/s11433-008-0065-y
|
[16]
|
Y. G. Tan and Q. Y. Cai, “Classical Correlation in Quantum Dialogue,” International Journal of Quantum Information, Vol. 6, No. 2, 2008, pp. 325-329.
doi:10.1142/S021974990800344X
|
[17]
|
A. Cabello, “Quantum Key Distribution in the Holevo Limit,” Physics Review Letters, Vol. 85, No. 26, 2000, pp. 5635-5638. doi:10.1103/PhysRevLett.85.5635
|