• Chinese Journal of Quantum Electronics
  • Vol. 36, Issue 4, 450 (2019)
YUHao 1, Ying ZHANG2、3, Wenhe ZHUO1, Shaopeng WANYAN2, and Jinsuo LIU2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2019.04.011 Cite this Article
    YUHao, ZHANG Ying, ZHUO Wenhe, WANYAN Shaopeng, LIU Jinsuo. Quantum network based on quantum teleportation and MDI protocol[J]. Chinese Journal of Quantum Electronics, 2019, 36(4): 450 Copy Citation Text show less
    References

    [1] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing [C]. IEEE Conference Computers, Systems Signal Processing , 1984: 175-179.

    [2] He X L, Yang C P. Deterministic transfer of multiqubit GHZ entangled states and quantum secret sharing between different cavities [J]. Quantum Information Processing , 2015, 14(12): 4461-4474.

    [6] Zhu Z C, Hu A Q, Fu A M. Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation [J]. International Journal of Theoretical Physics , 2016, 55(5): 2342-2353.

    [7] Liu F, Su Q, Wen Q Y. Eavesdropping on multiparty quantum secret sharing scheme based on the phase shift operations [J]. International Journal of Theoretical Physics , 2014, 53(5): 1730-1737.

    [8] Chan P, Slater J A, Lucio-Martinez I, et al . Modeling a measurement-device-independent quantum key distribution system [J]. Optics Express , 2014, 22(11): 12716-12736.

    [10] Zhu F, Zhang C H, Liu A P, et al . Enhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sources [J]. Physics Letters A , 2016, 1(20): 1-6.

    [11] Zhou J, Xu F, Sun E, et al . Coherent optical interleaved SC-FDM uplink scheme for long-reach passive optical network [J]. IEEE Photonics Journal , 2016, 8(2): 1-8.

    [12] Lim C C W, Walenta N, Legre M, et al . Random variation of detector efficiency: A countermeasure against detector blinding attacks for quantum key distribution [J]. IEEE Journal of Selected Topics in Quantum Electronics , 2015, 21(3): 192-196.

    [13] Tang X, Wonfor A, Kumar R, et al . Quantum-safe metro network with low-latency reconfigurable quantum key distribution [J]. Journal of Lightwave Technology , 2018, 3(22): 5230-5236.

    [14] Lin J, Yang C W, et al . Intercept-resend attacks on semi-quantum secret sharing and the improvements [J]. International Journal of Theoretical Physics , 2013, 52(1): 156-162.

    [15] Shi J, Shi R, Peng X, et al . Distributed quantum packet transmission in non-maximally entangled relay system [J]. International Journal of Theoretical Physics , 2015, 54(4): 1128-1141.

    [16] Wen Q Y, Gao F, et al . Participant attack and improvement to multiparty quantum secret sharing based on GHZ states [J]. International Journal of Theoretical Physics , 2013, 52(1): 293-301.

    [17] Zhang K J, Jia H Y. Cryptanalysis of a quantum proxy weak blind signature scheme [J]. International Journal of Theoretical Physics , 2015, 54(2): 582-588.

    YUHao, ZHANG Ying, ZHUO Wenhe, WANYAN Shaopeng, LIU Jinsuo. Quantum network based on quantum teleportation and MDI protocol[J]. Chinese Journal of Quantum Electronics, 2019, 36(4): 450
    Download Citation