[1] Liu Yuanyuan, Xu Chengqiang. Three-party quantum secret sharing based on secure direct communication [C]. International Forum on Information Technology and Application, IEEE Computer Society, 2009: 126-130.
[2] Yang Yunyuan, Yin Guisheng, Deng Tingquan. Quantum secret sharing based on entanglement without local unitary operations [C]. Second International Workshop on Knowledge Discovery and Data Mining, IEEE Computer Society, 2009: 619-621.
[3] Falahati A, Hadi Meshgi. Using quantum cryptography for securing wireless LAN networks [C]. International Conference on Signal Processing Systems, IEEE Computer Society, 2009: 698-701.
[12] Zhou Nanrun, Wang Lijun, Ding Jie, et al. Quantum deterministic key distribution protocols based on the authenticated entanglement channel [J]. Physica Scripta, 2010, 81(4): 045009.
[13] Zhou Nanrun, Wang Lijun, Ding Jie, et al. Novel quantum deterministic key distribution protocols with entangled states [J]. International Journal of Theoretical Physics, 2010, 49(9): 2035-2044.
[16] Li Xiaoyu, Zhao Qiuyu. Deterministic key distribution scheme based on non-locality of unentangled states [J]. Telkomnika, 2013, 11(6): 3036-3043.
[21] Cai Q Y. Eavesdropping on the two-way quantum communication protocols with invisible photons [J]. Phys. Lett. A, 2006, 351: 23.
[22] Chiribella G, Maccone L, Perinotti P. Secret quantum communication of a reference frame [J]. Phys. Rev. Lett., 2007, 98: 120501.
[23] Cabello A. Quantum key distribution in the Holevo limit [J]. Phys. Rev. Lett., 2000, 85(26): 5635-5638.