[1] Bennett C H, Brassard G. Quantum Cryptography: Public Key Distribution and Coin Tossing[C]//Proc of the IEEE International Conference on Computers, Systems, and Signal Processing. Bangalore: IEEE, 1984: 175-179.
[2] Bennett C H, Brassard G, Mermin N D. Quantum Cryptography Without Bell's Theorem [J]. Phys Rev Lett, 1992, 68: 557-559.
[3] Ekert A. Quantum Cryptography Based on Bell's Theorem [J]. Phys Rev Lett, 1991, 67: 661-663.
[4] Cabello A. Quantum Key Distribution Without Alternative Measurements Phys [J]. Phys Rev A, 2000(61): 052312.
[5] Cabello A. Quantum Key Distribution in the Holevo Limit [J]. Phys Rev Lett, 2000, 85: 5635-5638.
[6] Long G L, Liu X S. Theoretically Efficient High-capacity Quantum-key-distribution Scheme [J]. Phys Rev A, 2002, 65: 032302.
[7] Deng F G, Long G L. Bidirectional Quantum Key Distribution Protocol with Practical Faint Laser Pulses [J]. Phys Rev A, 2004, 70: 012311.
[8] Kye W H, Kim C M, Kim M S, et al. Quantum Key Distribution with Blind Polarization Bases [J]. Phys Rev Lett, 2005, 95: 040501.
[9] Tao Y, Pan W, Luo B, et al. A Scheme for Quantum Key Distribution Between Any Two Users in a Network via W State[J]. Journal of Electronics & Information Technology, 2008, 30(11): 2588-2591.
[10] 刘丹, 裴昌幸, 权东晓, 等. 一种可提高安全通信距离的诱骗态量子密钥分发方案[J]. 西安电子科技大学学报, 2010, 37(1): 13-17.
Liu Dan, Pei Changxing, Quan Dongxiao, et al. New Decoy State Quantum Key Distribution for Increasing the Security Communication Distance[J]. Journal of Xidian University, 2010, 37(1): 13-17.
[11] Yuan Z L, Dynes J, Shields A J. Avoiding the Blinding Attack in QKD [J]. Nature Photonics 2010(4): 800-801.
[12] Sasaki M, Fujiwara M, Ishizuka H, et al. Field Test of Quantum Key Distribution in the Tokyo QKD Network [J], Optics Express, 2011, 19(11): 10387-10409.
[13] Liu Y, Chen T Y, Wang J, et al. Decoy-state Quantum Key Distribution with Polarized Photons over 200km [J]. Optics Express, 2010, 18(8): 8587-8594.
[14] 赵楠, 裴昌幸, 刘丹, 等. 自适应调整量子多用户检测方案[J]. 西安电子科技大学学报, 2011, 38(4): 1-5.
Zhao Nan, Pei Changxing, Liu Dan, et al. Quantum Multi-user Self-adaptive Adjusting Detection Scheme [J]. Journal of Xidian University, 2011, 38(4): 1-5.
[15] Hong C H, Heo J O, Khym G L, et al. n Quantum Channels are Sufficient for Multi-user Quantum Key Distribution Protocol Between n Users [J]. Opt Commun, 2010, 283: 2644-2646.
[16] Zukowski M, Zeilinger A, Horne M A, et al. Event-ready-detectors Bell Experiment Via Entanglement Swapping [J]. Phys Rev Lett, 1993(71): 4287-4290.
[17] Inamori H, Rallan L, Vedral V. Security of EPR-based Quantum Cryptography Against Incoherent Symmetric Attacks [J]. J Phys A, 2001, 34: 6913-6918.
[18] Waks E, Zeevi A, Yamamoto Y. Security of Quantum Key Distribution with Entangled Photons Against Individual Attacks [J]. Phys Rev A, 2002, 65: 052310. |