[1] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing [C]. Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984): 175~179.
[2] Buttler W T, Hughes R J, Lamoreaux S K, Morgan G L, Nordholt J E, Peterson C G. Daylight Quantum Key Distribution over 1.6 km [J]. Phys. Rev. Lett., 2000, 84(24): 5652~5655.
[3] Hiskett P A, Rosenberg D, Peterson C G, Hughes R J, Nam S, Lita A E, Miller A J, Nordholt J E. Long-distrance quantum key distribution in optical fibre [J]. New J. Phys., 2006, 8: 193.
[4] Kurtsiefer C, Zarda P, Halder M, Weinfurter H, Gorman P M, Tapster P R, Rarity J G. Quantum cryptography: A step towards global key distribution [J]. Nature, 2002, 419: 450.
[5] Shan Xin, Sun Xianping, Luo Jun, Tan Zheng, Zhan Mingsheng. Free-space quantum key distribution with Rb vapor filters [J]. Appl. Phys. Lett., 2006, 89(19): 191121.
[6] Zhang Bing, Tang Zhilie, Liang Ruisheng, Lu Yiqun, Lu Wei, Liu Songhao. Experiment research of quantum key distribution with four polarization states coding and decoding [J]. Chinese Journal of Quantum Electronics (量子电子学报),2008, 25(6): 712-718 (in Chinese).
[7] Liao Jinfei, Ye Liu. Quantum key distribution with single-photon polarization states [J]. Chinese Journal of Quantum Electronics(量子电子学报) , 2008, 25(2): 181~185 (in Chinese).
[8] Ekert A K. Quantum Cryptography Based on Bell’s Theorem [J]. Phys. Rev. Lett., 1991, 67(6): 661~663.
[9] Bennett C H. Quantum cryptography using any two nonorthogonal states [J]. Phys Rev Lett., 1992, 68: 3121~23124.
[10] Miloslav Dušek, Ond?ej Haderka, Martin Hendrych, Robert Myška. Quantum identification system [J]. Phys. Rev. A, 1999, 60(1): 149~156.
[11] Curty M, Santos D J. Quantum authentication of classical messages [J]. Phys. Rev. A, 2001, 64: 062309-1~6. [12] Shi Baosen, Li Jian, Liu Jinming, Fan Xiaofeng, Guo Guangcan. Quantum Key Distribution and Quantum Authentication Based on Entangled State [J]. Phys. Lett. A, 2001, 281: 83~87.
[13] Zeng Guihua, Zhang Weiping. Identity verification in quantum key distribution [J]. Phys. Rev. A, 2000, 61: 022303-1~5.
[14] Zhou Nanrun, Zeng Guihua, Zeng Wenjie, Zhu Fuchen. Cross-center quantum identification scheme based on teleportation and entanglement swapping [J]. Opt. Commum., 2005, 254: 380~388.
[15] He Guangqiang, Zeng Guihua. A secure identification system using coherent states [J]. Chin. Phys., 2006, 15(2): 371~374.
[16] Kanamori Yoshito, Yoo Seong-Moo, Gregory Don A, Sheldon Frederick T. Authentication Protocol Using Quantum Superposition States [J]. Int. J. Network Security, 2009, 9(2): 121~128.
[17] He Guangqiang, Zeng Guihua. A quantum identification scheme based on polarization modulation [J]. Chin. Phys., 2005, 14(3): 541~545.
[18] Shan Xin, Sun Xianping, Luo Jun, Zhan Mingsheng. Ultranarrow-bandwidth atomic filter with Raman light amplification [J]. Opt. Lett., 2008, 33(16): 1842.
[19] Sun Xianping, Shan Xin, Luo Jun, Zhan Mingsheng. Atomic filter in free-space QKD [J]. Laser&Optoelectronics Progress(激光与光电子学进展), 2009, 46(2): 38 (in Chinese).
[20] Zhang Wentao, Zhu Baohua, Li Xian, Hu Yu. The analysis and research for the laser beam through atmosphere channel in APT system [J]. LASER JOURNAL(激光杂志), 2004, 25(1): 55~57 (in Chinese). |