3BENNETY C H, BRASSARD G. An Update on Quantum Cryptography[ C]//Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India, 1984: 175-179.
4BENNETI" C H. Quantum Cryptography Using any Two Nonorthogonal States [ J ]. Phys. Rev. Lett, 1992,68 ( 21 ) : 3 121-3 124.
5EKERT A K. Quantum Cryptography Based On Bell's The- orem [ J ]. Phys. Rev. Lett. 1991,67 (6) :661-663.
7LANCE A M, SYMUL T, BOWEN W P, et al. Continu- ous Variable (2, 3 ) Threshold Quantum Secret Sharing Schemes[J]. New. J. Phys, 2003, 5(4) :4.1-4.13.
8HILLERY M, BUZEK V,BERTHIAUME A. Quantum Se- cret Sharing[ J]. Phys. Rev. A 1999,59(4) :1 829-1 834.
9LONG G. L, LIU X S. Theoretically Efficient High-Capaci- ty Quantum-Key-Distribution Scheme [ J ]. Phys. Rev. A, 2002, 65(3) :032 302.
10DENG F G, LONG G L, LIU X S. Two-step Quantum Direct Communication Protocol Using the Einstein-Podol- sky-Rosen pair block [ J ]. Phys. Rev. A, 2003, 68 (4) : 042 317.