[1]Gisin, Nicolas and Ribordy, Gr{\'e}goire and Tittel, Wolfgang and Zbinden, Hugo.Quantum cryptography[J].Reviews of modern physics, 2002, 74(1):145-195
[2]Bennett, C.H. and Brassard, G..Quantum Cryptography: Public-Key Distribution and Tossing[J].Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, IEEE Press, 1984, :175-179
[3]Peter W. Shor and John Preskill.Simple Proof of Security of the BB84 Quantum Key Distribution Protocol[J].Phys. Rev. Lett., 2000, 85(2):441-444
[4]B. Kraus, N. Gisin, and R. Renner.Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication[J].Phys. Rev. Lett., 2005, 95(08):080501-080504
[5]Renato Renner, Nicolas Gisin, and Barbara Kraus.Information-theoretic security proof for quantum-key-distribution protocols[J].Phys. Rev. A, 2005, 72(01):012332-012348
[6]Masato Koashi and John Preskill.Secure Quantum Key Distribution with an Uncharacterized Source[J].Phys. Rev. Lett., 2003, 90(5):057902-057905
[7]Antonio Acín, Nicolas Gisin, and Lluis Masanes.From Bell’s Theorem to Secure Quantum Key Distribution[J].Phys. Rev. Lett., 2006, 97(12):120405-120508
[8]Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani.Device-Independent Security of Quantum Cryptography against Collective Attacks[J].Phys. Rev. Lett., 2007, 98(23):230501-230504
[9]Lo, Hoi-Kwong and Chau, Hoi Fung.Unconditional security of quantum key distribution over arbitrarily long distances[J].science, 1999, 283(5410):2050-2056
[10]David Deutsch, Artur Ekert, Richard Jozsa, Chiara Macchiavello, Sandu Popescu, and Anna Sanpera.Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels[J].Phys. Rev. Lett., 1996, 77(13):2818-2821
[11]Renner, Renato.Security of quantum key distribution[J].International Journal of Quantum Information, 2008, 6(01):1-127
[12]Fuchs, Christopher A and Gisin, Nicolas and Griffiths, Robert B and Niu, Chi-Sheng and Peres, Asher.Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy[J].Physical Review A, 1997, 5(2):1163-1172
[13]Robert B. Griffiths and Chi-Sheng Niu.Optimal eavesdropping in quantum cryptography.??II.??A quantum circuit[J].Phys. Rev. A, 1997, 56(2):1173-1176
[14]Dagmar Bru?.Optimal Eavesdropping in Quantum Cryptography with Six States[J].Phys. Rev. Lett., 1998, 81(14):3018-3021
[15]Eli Biham and Tal Mor.Security of Quantum Cryptography against Collective Attacks[J].Phys. Rev. Lett., 1997, 78(11):2256-2259
[16]Eli Biham, Michel Boyer, Gilles Brassard, Jeroen van de Graaf, and Tal Mor.Security of Quantum Key Distribution against All Collective Attacks[J].Algorithmica, 2002, 34:372-388
|