[1] Scheidl T, Ursin R, Fedrizzi A, et al. Feasibility of 300km Quantum Key Distribution with Entangled States[J]. New J Phys, 2009(11): 085002.
[2] 刘丹, 裴昌幸, 权东晓, 等. 一种可提高安全通信距离的诱骗态量子密钥分发方案[J]. 西安电子科技大学学报, 2010, 37(1): 13-17.
Liu Dan, Pei Changxing, Quan Dongxiao, et al. New Decoy State Quantum Key Distribution for Increasing the Security Communication Distance[J]. Journal of Xidian University, 2010, 37(1): 13-17.
[3] 朱畅华, 裴昌幸, 马怀新, 等. 一种量子局域网方案及其性能分析[J]. 西安电子科技大学学报, 2006, 33(6): 839-843.
ZHU Changhua, PEI Changxing, Ma Huaixin, et al. A Scheme for Quantum Local Area Networks and Performance Analysis[J]. Journal of Xidian University, 2006, 33(6): 839-843.
[4] Bennett C H. Quantum Cryptography Using Any Two Nonorthogonal States[J]. Physical Review Letters, 1992(68): 3121-3124.
[5] Bennett C H, Brassard G, Ekert A. Quantum Cryptography[J]. Scientific American, 1992, 267(10): 50-57.
[6] Bennett C H, Brassard G. Quantum Cryptography: Public Key Distribution and Coin Tossing[C]//Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing. Bangalore: IEEE, 1984: 175-179.
[7] Moshavi S. Multi-user Detection for DS CDMA Communications[J]. IEEE Communications Magazine, 1996, 34(10): 124-136.
[8] Brodsky M, George E C, Antonelli C, et al. Loss of Polarization Entanglement in a Fiber-optic System with Polarization Mode Dispersion in One Optical Path[J]. Opt Lett, 2011, 36(1): 43-45.
[9] Jennewein T, Simon C, Weihs G, et al. Quantum Cryptography with Entangled Photons[J]. Phys Rev Lett, 2000(84): 4729-4732.
[10] Ekert A. Quantum Cryptography Based on Bell's Theorem[J]. Physical Review Letters, 1991(67): 661-663.
[11] Schmitt-Manderbach T, Weier H, Furst M, et al. Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144km[J]. Phys Rev Lett, 2007(98): 010504.
[12] Nielsen M A, Chuang I L. Quantum Computation and Quantum Information[M]. London: Cambridge University Press, 2000.
[13] Bennett C H, Shor P W. Quantum Information Theory[J]. IEEE Trans on Information Theory, 1998, 44(6): 2724-2742.
[14] Born M, Wolf E. Principles of Optics [M]. London: Cambridge University Press, 1999.
[15] 覃兆宇, 程兆谷, 张志平, 等. 偏振光斯托克斯参量的高速实时测量技术[J]. 光学学报, 2007, 27(4): 659-662.
Qin Zhaoyu, Cheng Zhaogu, Zhang Zhiping, et al. High Speed and Real Time Measurement of Stokes Parameters[J]. Acta Optica Sinica, 2007, 27(4): 659-662.
[16] 刘海涛, 吴重庆, 董辉, 等. 光纤偏振态检测方法的研究[J]. 北方交通大学学报, 2003, 27(3): 58-62.
Liu Haitao, Wu Chongqing, Dong Hui, et al. Study of Measuring Polarization State in Optical Fiber[J]. Journal of Northern Jiaotong University, 2003, 27(3): 58-62.
[17] 陈杰, 黎遥, 吴光, 等. 偏振态稳定控制下的量子密钥分发[J]. 物理学报, 2007, 56(9): 5243-5247.
Chen Jie, Li Yao, Wu Guang, et al. Stable Quantum Key Distribution with Polarization Control[J]. Acta Physica Sinica, 2007, 56(9): 5243-5247.
[18] Tittel W, Brendel J, Zbinden H, et al. Quantum Cryptography Using Entangled Photons in Energy-time Bell States[J]. Phys Rev Lett, 2000(84): 4737-4740.
[19] Concha J I, Poor H V. Multiaccess Quantum Channels[J]. IEEE Trans on Information Theory, 2004, 50(5): 725-747.
[20] Concha J I, Poor H V. Multiuser Detection in a Quantum Channel[C]//IEEE ISIT Proceeding. Serrento: IEEE, 2000: 276 |