[1] W. K. Wootters, W. H. Zurek. A single quantum cannot be cloned[J].Nature(London),1982, 299(588):802-803.[2] N. Gisin, G. Ribordy, T. Wolfgang, et al. Quantum cryptography[J]. Rev. Mod. Phys., 2002,74(1):145-195.[3] D. Rosenberg, J. W. Harrington, P. R. Rice, et al. Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber[J]. Phys. Rev. Lett., 2007,98(1):010503.[4] H. Takesue, S. W. Nam, Q. Zhang, et al. Quantum key distribution over 40 dB channel loss using super- conducting single photon detectors[J]. Nature Photonics, 2007,1:343.[5] D. Stucki, N. Walenta, F. Vannel, et al. High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres[J]. New J. Phys., 2009,11(7):075003.[6] J. F. Dynes, H. Takesue, Z. L. Yuan,et al. Efficient entanglement distribution over 200 kilometers[J]. Opt. Express, 2009, 17(14):11440.[7] T. E. Chapuran, P. Toliver, N. A. Peters, et al. Optical networking for quantum key distribution and quantum communications[J]. N. J. Phys., 2009,11(10):105001.[8] S. Wang, W. Chen, Z. Q. Yin, et al. Field test of wavelength-saving quantum key distribution network [J]. Opt. Lett.,2010,35(14):2454.[9] T. Y. Chen, J. Wang, H. Liang, et al. Metropolitan all-pass and inter-city quantum communication network[J]. Opt. Express, 2010,18(26):27217.[10] M. Sasaki, M. Fujiwara, H. Ishizuka, et al. Field test of quantum key distribution in the Tokyo QKD Network [J]. Opt. Express,2011,19(11):10387.[11] Cao Dong, Song Yaoliang. Computationally secure bit commitment protocol based on quantum steganography[J]. Chinese Journal of Quantum Electronics(量子电子学报) ,2012, 29 (1): 63-68 (in Chinese)[12] Zhao Long,Cao Zhenwen,Luo Rui,et al. Multi-signature scheme based on quantum properties[J].Chinese Journal of Quantum Electronics(量子电子学报),2012,29 (1): 69-73 (in Chinese)[13] Jiang Jinya,Nie Min,Liu Xiaohui. Layered model of quantum signaling and realizable strategy of entanglement distribution layer function[J].Chinese Journal of Quantum Electronics(量子电子学报),2012,29 (5): 555-560 (in Chinese)[14] Jiang Zhongsheng, Lu Hongjun,Xie Guangjun. Multidimensional controllable quantum superdense coding information transfer[J].Chinese Journal of Quantum Electronics(量子电子学报),2013,30 (4): 450-454 (in Chinese)[15] Zhao Feng, Li Jingling. Analysis of the coefficient of QBER and it influence[J]. Journal of Optoelectronics?Laser(光电子.激光), 2010,21(9) :1383-1385 (in Chinese) [16] Liu Linyao, Humengjun,Lu Hongjun,et al. Quantum key distribution based on arbitrary BELL state[J]. Journal of Optoelectronics?Laser(量子电子学报), 2013,30 (4): 439-444 (in Chinese)[17] Kuritsyn K. Modification of error reconciliation scheme for quantum cryptography[C]. Proceedings of SPIE,2003, 5128:91-94.[18] Buttler WT, Lamoreaux SK, Torgerson JR et al. Fast, efficient error reconciliation for quantum cryptography[J]. Phys.Rev.A ,2003,67(5):052303.[19] Zhao Feng, Fu Mingxing, Wang Faqiang, et al. Error reconciliation for practical quantum cryptography[J]. Optik-International Journal for Light and Electron Optics,2007,118(10): 502-506 [20] H. F. Zhang, J. Wang, K. Cui, et al. A Real-Time QKD System Based on FPGA[J].J. Light. Tech.,2012,30(20): 3226-3234[21] He Yucheng, Yang Li, Wang Xin-mei. Estamates for BER of error correcting codes in performance simulations[J]. Journal of China Institute of Communication(通信学报),2001,22(9):99-103 (in Chinese)[22] B.J. Frey,D.J.C.MacKay.Trellis-Constrained Codes[C]. Proceedings of 35th Allerton Conference on communication,1997,1-10. |