[1] NGUYEN B A. Quantum dialogue[J]. Physics Letters A, 2004, 328(6): 610.
[2] GAO Gan. Two quantum dialogue protocols without information leakage[J]. Optics Communications, 2010, 283(10): 2288-2293.
[3] ZHAN Youbang, ZHANG Lingling, WANG Yuwu. Quantum dialogue by using nonsymmetric quantum channel[J]. Communications in Theoretical Physics, 2010, 53(4): 2288-2293.
[4] LI Dong, XIU Xiaoming, GAO Yajun, et al. Quantum dialogue protocol using a class of threephoton w states[J]. Communications in Theoretical Physics, 2009, 52(5): 853-856.
[5] GAO Fei, GUO Fenzhuo, WEN Qiaoyan, et al. Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication[J]. Science in China Series G: Physics, Mechanics & Astronomy, 2008, 51(5): 559-566.
[6] MAN Zhongxiao, ZHANG Zhanjun, LI Yong. Quantum dialogue revisited[J]. Chinese Physics Letters, 2005, 22(1): 22-24.
[7] ZOU Xin, YE Zhiqing. Controlled by a third party to realize quantum secure dialogue[J]. Acta Photonica Sinica, 2012, 41(4): 501-504.
[8] XIA Yan, SONG Jie, SONG Heshan. Controlled secure quantun dialogue using a pure entangled GHZ states[J]. Communications in Theoretical Physics, 2007, 48(5): 841-846.
[9] XIU Xiaoming. LI Dong, GAO Yajun, et al. Controlled deterministic secure quantum communication using fivequbit entangled states and twostep security test[J]. Optics Communications, 2009, 282(2): 333-337.
[10] WANG Dong, ZHA Xinwei. Quantum communication based on cluster state[J]. Chinese Journal of Quantum Electronics, 2011, 28(6): 687-692.
[11] LIU Junchang, LI Yuanhua, NIE Yiyou. Controlled teleportation of two an arbitrary twoparticle state by using a fourqubit cluster state and entanglement swapping[J]. Acta Photonica Sinica, 2010, 39(11): 2078-2083.
[12] LI Yuanhua, LIU Junchang, NIE Yiyou. Quantum information splitting by using a genuinely entangled sixqubit and Bellstate measurements[J]. Acta Photonica Sinica, 2011, 40(2): 307-310.
[13] SHUKLA C, KOTHARI V, BANER J, et al. On the grouptheotetic struvture of a class of quantum dialogue protocols[J]. Physics Letters A, 2013, 377(7): 518-527.
[14] YANG Youfeng, YE Zhiqing. Scheme of twoway quantum teleportation and security[J]. Acta Photonica Sinica, 2013, 42(5): 619-622.
[15] BROWN I D K, STEPNEY S, SUDBERY A. Searching for highly entangled multiqubit states[J]. Journal of physcis A:Mathematical and General, 2005, 38(5): 1119-1131.
[16] BENNETT C H, BRASSARD G, MERMIN N D. Quantum cryptography without Bells theorem[J]. Physical Review Letters, 1992, 68(5): 557-559.
[17] CABELLO A. Quantum key distribution in the holevo limit[J]. Physical Review Letters, 2000, 85(26): 5635-5638.