[1] Takesue H, Inoue K. Quantum secret sharing based on modulated high-dimensional time-bin entanglement [J]. Phys. Rev. A, 2006, (74): 012315.
[2] Zhang Z J, Gao G, Wang X, et al. Multiparty quantum secret sharing based on the improved Bostrom-Felbinger protocol [J]. Opt. Comm., 2007, 269: 418.
[3] Beigea A, Englert B G, Kurtsiefer C, et al. Secure communication with a publicly known key [J]. Acta Physica Polonica A, 2002, 101: 357.
[10] Zhang Z S, Zeng G H, Zhou N R, et al. Quantum identity authentication based on Ping-Pong technique for photons [J]. Phys. Lett. A, 2006, 356: 199 (in Chinese).
[11] Wang J, Zhang Q, Tang C J. Multiparty simultaneous quantum identity authentication based on entanglement swapping [J]. Chin. Phys. Lett., 2006, 23: 2360 (in Chinese).
[13] Nanrun Zhou, Lijun Wang, Jie Ding, et al. Quantum deterministic key distribution protocols based on the authenticated entanglement channel [J]. Physica Scripta, 2010, 81(4): 045009.
[14] Nanrun Zhou, Lijun Wang, Jie Ding, et al. Novel quantum deterministic key distribution protocols with entangled states [J]. International Journal of Theoretical Physics, 2010, 49(9): 2035-2044.
[15] Zhou Nanrun, Wang Lijun, Ding Jie, et al. Quantum deterministic key distribution protocols based on teleportation and entanglement swapping [J]. Journal of Physics B, 2010, 59(4): 2193-2199.
[16] Dur W, Vidal G, Cirac J I. Three qubits can be entangled in two inequvalent ways [J]. Phys. Rev. A, 2000, 62: 062314.
[17] Cabello A. Quantum key distribution in the Holevo limit [J]. Phys. Rev. Lett., 2000, 85(26): 5635-5638.