[1] Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613. [2] Blakley G R. Safe guarding cryptographic keys[J]. National Computer Conference, 1979, 48: 313-317. [3] Hillery M, Buzěk V, Berthiaume A. Quantum secret sharing[J]. Phys Rev A, 1999, 59: 1829. [4] Bennett C H, Brassard G, Mermin N D. Quantum cryptography using any tow nonorthogonal states[J]. Phys Rev Lett,1992, 68: 3121-3124. [5] Karlsson A, Koashi M, Imoto N. Quantum entanglement for secret sharing and secret splitting[J]. Phys Rev A, 1999, 59: 162. [6] Karimipour V, Bahraminasab A. Entanglement swapping of generalized cat states and secret sharing[J]. Phys Rev A, 2002, 65: 042320. [7] Bagherinezhad S, Karimipour V. Quantum secret sharing based on reusable GHZ states as secure carriers[J]. Phys Rev A, 2003(67): 044302. [8] Guo Guoping, Guo Guangcan. Quantum secret sharing without entanglement[J]. Phys Lett A, 2003(310): 247. [9] Hsu Liyi. Quantum secret-sharing protocol based on Grover's algorithm[J]. Phys Rev A, 2003(68): 022306. [10] Zhang Zhanjun, Yong Li, Man Zhongxiao. Multiparty quantum secret sharing [J]. Phys Rev A, 2005 (71): 044301. [11] Guo Fenzhuo, Wen Qiaoyan, Zhu Fuchen. Quantum secret sharing based on multi-particle entanglement[J]. The Journal of China Universities of Posts and Telecommunications, 2005, 12(1): 15-19. [12] 佟鑫, 温巧燕, 朱甫臣. 基于GHZ态纠缠交换的量子秘密共享[J]. 北京邮电大学学报, 2007, 30(1): 44-48. Tong Xin, Wen Qiaoyan, Zhu Fuchen. Quantum secret sharing based on GHZ states entanglement swapping [J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(1): 44-48. [13] Wang Jian, Zhang Quan, Tang Chaojing. Multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. 2006. http://arxiv.org/abs/quant-ph/0602166. [14] Qin Sujuan, Gao Fei, Wen Qiaoyan, et al. Improving the security of multiparty quantum secret sharing against an attack with a fake signal[J]. Phys Lett A, 2006, 357: 101-103. [15] Deng F G, Li X H, Zhou H Y, et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack[J]. Phys Rev A, 2005, 72: 044302. [16] Li Lixiang. Preparation of motional cat states for trapped ions using a standing wave in strong excitation[J]. J Opt B: Quantum Semiclass Opt, 1999(1): 339-340. [17] Leibfried D, Roos C, Barton P, et al. Experiments towards quantum information with trapped Calcium ions. 2000. http://arxiv.org/abs/quant-ph/0009105. [18] Kim Y H, Kulik S P, Shih Y. Quantum teleportation of a polarization state with a complete Bell state measurement [J]. Phys Rev Lett, 2001(86): 1370. [19] Phillips D F, Fleischhauer A, Mair A, et al. Storage of light in atomic vapor[J]. Phys Rev Lett, 2001(86): 783. [20] Sun C P, Li Y,Liu X F. Quasi-spin-wave quantum memories with a dynamical symmetry[J]. Phys Rev Lett, 2003(91):147903.(上接第8页) [6] 张昱琪, 周强. 汉语基本短语的自动识别[J]. 中文信息学报, 2002, 16 (6): 1-8. Zhang Yuqi, Zhou Qiang. Automatic identification of Chinese base phrases [J]. Journal of Chinese Information Processing, 2002, 16(16): 1-8. [7] 周强, 孙茂松, 黄昌宁. 汉语句子的组块分析体系[J].计算机学报, 1999, 22(11): 1158-1165. Zhou Qiang, Sun Maosong, Huang Changning. Chunking parsing scheme for Chinese sentences [J]. Chinese Journal of Computers, 1999, 22(1): 1158-1165. [8] 赵军, 黄昌宁. 基于转换的汉语基本名词短语识别模型[J]. 中文信息学报, 1998, 13(2): 1-7. Zhao Jun, Huang Changning. A transformation-based model for Chinese basenp recognition [J]. Journal of Chinese Information Processing, 1998, 13(2): 1-7. [9] Steven Abney. Parsing by chunks, principle-based parsing . : Kluwer Academic Publishers, 1991. 56-60. [10] Erik F, Tjong Kim Sang, Sabine Buchholz. Introduction to the CONLL-2000 shared task chunking //CONLL. Lisbon: , 2000: 127-132. [11] Chih-wei Hsu, Chih-Jen Lin. A comparison of methods for multi-class support vector machines. Taipei: Department of Computer Science and Information Engineering, National Taiwan University, 2001. [12] Knerr, S P L. Single-layer learning revisited a stepwise procedure for building and training a neural network //Neurocomputing Algorithms, Architectures and Applications. New York: , 1990. [13] Friedman. Another approach to polychotomous classification . : Stanford University, 1997. [14] KrBel U. Pairwise classification and support vector machines [M]. Cambridge: MA MIT Press, 1999. 255-268. |