[1] Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.
[2] Blakely G. Safeguarding cryptographic keys [C]. Proceedings of the National Computer Conference, NewYork: AFIPS Press, 1979, 313-317.
[3] Hillery M, Buzěk V, Berthiaume A. Quantum secret sharing [J]. Phys. Rev. A, 1999, 59: 1829-1834.
[4] Karlsson A, Koashi M, Imoto N. Quantum entanglment for secret sharing and secret splitting [J]. Phys. Rev. A, 1999, 59: 162-169.
[5] Hsu L Y. Quantum secret-sharing protocol based Grover’s algorithm [J]. Phys. Rev. A, 2003, 68: 022306.
[6] Karimipour V, Bahraminasab A, Bagherinezhad S. Entanglement swapping of generalized cat states and secrsharing [J]. Phys. Rev. A, 2002, 65: 042320.
[7] Bandyopadhyay S. Teleportation and secret sharing with pur entangled states [J]. Phys. Rev. A, 2000, 62: 012308.
[8] Guo F Z, Wen Q Y, Zhu F C. Quantum scret sharing based on multi-particle entanglement [J]. Journal of China Universities of Posts and Telecommunications, 2005, 12(1): 15219.
[9] Ljuuggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution [J]. Phys. Rev. A, 2000, 62: 022305.
[10] Zhang Z J, Yong L, Man Z X. Multiparty quantum secret sharing [J]. Phys. Rev. A, 2005, 71: 044301.
[11] Aspect A, Dalibard J, Roger G. Experimental test of Bell’s inequalities using time-varying analyzers [J]. Phys. Rev. Lett., 1982, 49: 1804-1806.
[12] Clauser J F, Horne M A, Shimony A, et al. Proposed experiment to test local hidden-variable theories [J]. Phys. Rev. Lett., 1969, 23: 880-884.
[13] Yang W. Study on quantum teleportation and quantum secret sharing [D]. Master Thesis of Hunan University, 2006 (in Chinese).