[4] He X L, Yang C P. Deterministic transfer of multiqubit GHZ entangled states and quantum secret sharing between different cavities [J]. Quantum Information Processing, 2015, 14(12): 4461-4474.
[5] Qin H, Dai Y. d-Dimensional quantum state sharing with adversary structure [J]. Quantum Information Processing, 2016, 15(4): 1689-1701.
[6] Zhu Z C, Hu A Q, Fu A M. Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation [J]. International Journal of Theoretical Physics, 2016, 55(5): 2342-2353.
[7] Liu F, Su Q, Wen Q Y. Eavesdropping on multiparty quantum secret sharing scheme based on the phase shift operations [J]. International Journal of Theoretical Physics, 2014, 53(5): 1730-1737.
[8] Deng F G, Li X H, Zhou H Y, et al. Erratum: Improving the security of multiparty quantum secret sharing against trojan horse attack [J]. Physical Review A, 2005, 72(4): 440-450.
[9] Zhang K J, Jia H Y. Cryptanalysis of a quantum proxy weak blind signature scheme [J]. International Journal of Theoretical Physics, 2015, 54(2): 582-588.
[11] Gao F, Qin S J, Guo F Z, et al. Dense-coding attack on three-party quantum key distribution protocols [J]. IEEE Journal of Quantum Electronics, 2011, 47(5): 630-635.
[14] Lin J, Yang C W, Tsai C W, et al. Intercept-resend attacks on semi-quantum secret sharing and the improvements [J]. International Journal of Theoretical Physics, 2013, 52(1): 156-162.
[15] Shi J, Shi R, Peng X, et al. Distributed quantum packet transmission in non-maximally entangled relay system [J]. International Journal of Theoretical Physics, 2015, 54(4): 1128-1141.
[16] Song T T, Wen Q Y, Gao F, et al. Participant attack and improvement to multiparty quantum secret sharing based on GHZ states [J]. International Journal of Theoretical Physics, 2013, 52(1): 293-301.
[17] Yin A, Fu F. Eavesdropping on semi-quantum secret sharing scheme of specific bits [J]. International Journal of Theoretical Physics, 2016, 55(9): 4027-4035.
[18] Yang Y G, Xia J, Shi L, et al. Comment on “quantum secure direct communication with authentication expansion using single photons” [J]. International Journal of Theoretical Physics, 2012, 51(12): 3681-3687.
[19] Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices [C]. Proceedings of International Symposium on Information Theory, 2004., IEEE, 2004: 136.