[1] Shamir A 1979 Commun. ACM 22 612 [2] Benaloh J and Leichter J 1988 Conference on the Theory and Application of Cryptography, 1988, Springer, New York, p. 27 [3] Brickell E F 1989 Workshop on the Theory and Application of of Cryptographic Techniques, 1989, Springer, Berlin, Heidelberg, p. 468 [4] Krawczyk H 1993 Annual international cryptology conference, 1993, Springer, Berlin, Heidelberg, p. 136 [5] Wang X W, Xia L X, Wang Z Y and Zhang D Y 2010 Opt. Commun. 283 1196 [6] Wang X W, Zhang D Y, Tang S Q, Zhan X G and You K M 2010 Int. J. Theor. Phys. 49 2691 [7] Wang X W, Zhang D Y, Tang S Q and Xie L J 2011 J. Phys. B: At., Mol. Opt. Phys. 44 035505 [8] Peng J Y, Bai M Q and Mo Z W 2014 Chin. Phys. B 23 010304 [9] Guo W M and Qin L R 2018 Chin. Phys. B 27 110302 [10] Cleve R, Gottesman D and Lo H K 1999 Phys. Rev. Lett. 83 648 [11] Steane A M 1996 Phys. Rev. A 54 4741 [12] Li Y, Zhang K and Peng K 2004 Phys. Lett. A 324 420 [13] Lance A M, Symul T, Bowen W P, Sanders B C and Lam P K 2004 Phys. Rev. Lett. 92 177903 [14] Deng F G, Li C Y, Li Y S, Zhou H Y and Wang Y 2005 Phys. Rev. A 72 022338 [15] Deng F G, Li X H, Li C Y, Zhou P and Zhou H Y 2005 Phys. Rev. A 72 044301 [16] Li X H, Zhou P, Li C Y, Zhou H Y and Deng F G 2006 J. Phys. B: At., Mol. Opt. Phys. 39 1975 [17] Liu Y L, Man Z X and Xia Y J 2008 Acta Phys Sin. 57 2680 (in Chinese) [18] Zhang J X, Jing J T, Xie C D and Peng K C 2005 Chin. Phys. Lett. 22 2751 [19] Muralidharan S and Panigrahi P K 2008 Phys. Rev. A 77 032321 [20] Brown I D, Stepney S, Sudbery A and Braunstein S L 2005 J. Phys. A: Math. Gen. 38 1119 [21] Nie Y Y, Sang M H, Li Y H and Liu J C 2011 Int. J. Theor. Phys. 50 1367 [22] Muralidharan S, Jain S and Panigrahi P K 2011 Opt. Commun. 284 1082 [23] Paul N, Menon J V, Karumanchi S, Muralidharan S and Panigrahi P K 2011 Quantum Inf. Process. 10 619 [24] Han L F and Xu H F 2012 Int. J. Theor. Phys. 51 2540 [25] Sun X M, Zha X W, Qi J X and Lan Q 2013 Acta Phys Sin. 62 230302 (in Chinese) [26] Jiang M and Dong D 2013 Quantum Inf. Process. 12 237 [27] Wang M M, Wang W, Chen J G and Farouk A 2015 Quantum Inf. Process. 14 4211 [28] Cao H and Ma W 2017 IEEE Photon. J. 9 1 [29] Cao H and Ma W 2018 IEEE Access 6 10453 [30] Song X, Liu Y, Xiao M, Deng H and Yang S 2020 Quantum Inf. Process. 19 1 [31] Halpern J and Teague V 2004 Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, 2004, p. 623 [32] Kol G and Naor M 2008 Proceedings of the fortieth annual ACM symposium on theory of computing, 2008, p. 423 [33] Asharov G and Lindell Y 2009 Annual International Cryptology Conference, 2009, Springer, Berlin, Heidelberg, p. 559 [34] De S J and Ruj S 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), 2016, p. 925 [35] Vakilinia I and Sengupta S 2019 IET Inf Secur. 13 530 [36] Chen Z, Tian Y and Peng C 2021 Sci. China Life Sci. 64 1 [37] Maitra A, De S J, Paul G and Pal A K 2015 Phys. Rev. A 92 022305 [38] Dou Z, Xu G, Chen X B, Liu X and Yang Y X 2018 Sci. China Life Sci. 61 1 [39] Qin H, Tang W K S and Tso R 2018 Sci. Rep. 8 1 [40] Nielsen M A and Chuang I 2002 Quantum Inf. Comput. 70 558 [41] Wen Q Y, Qin S J and Gao F 2014 J. Cryptol. 1 200 [42] Boström K and Felbinger T 2002 Phys. Rev. Lett. 89 187902 [43] Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317 [44] Chen X B, Xu G, Niu X X, Wen Q Y and Yang Y X 2010 Opt. Commun. 283 1561 |