[1]Bennett C H, Brassard G.Quantum cryptography: public key distribution and coin tossing[C]. //Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. 1984: 175-179. [2]Xiao shengli, Chen liju, Zhu feng.Pockels effect and optical modulator[J].物理与工程, 2007, 17(5):33-35 [3]Inoue K, Waks E, Yamamoto Y.Differential Phase Shift Quantum Key Distribution[J].Phys.Rev.Lett.2002, 89(3):37902-37904[J].Phys.Rev.Lett., 2002, 89(3):37902-37904 [4]Bruss D, Macchiavello C.Optimal eavesdropping in cryptography with three-dimensional quantum states[J].Physical review letters, 2002, 88(12):127901- [5]Cerf N J, Bourennane M, Karlsson A, et al.Security of quantum key distribution using d-level systems[J].Physical Reviwiew Letters, 2002, 88(12):127902- [6]Chen xia, Wang faqiang, Lu yiqun, et al.a phase modulated QKD system with two quantum cryptography protocols[J].物理学报, 2008, 56(11):6434-6440 [7]He Yinbo, Xiong Jingyi, Zheng Wei, et al.Application of Jones matrix in the design of polarization in interference filter[J].Acta Photonica Sinica, 2002, 31(4):507-512 [8]Zhou c, Wu G, Zeng H.Single-photon routing by time-division phase modulation in a Sagnac interferometer[J].Applied physics letters, 2003, 83(1):15-17 [9]Lu Fei, Tang Zhilie, Liao Changjun, et al.Plug and Play Systems for Quantum Cryptography[J].Laser & optoelectronics Progress, 2004, 41(11):1-5 |