[1] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. IEEE International Conference on Computers Systems and Signal Processing, 1984: 175-179. [2] Ekert A K. Quantum cryptography based on Bell’s theorem [J]. Physical Review Letters, 1991, 67 (6): 661-663. [3] Bennett C H. Quantum cryptography using any two nonorthogonal states [J]. Physical Review Letters, 1992, 68(21): 3121-3124. [4] Bennett C H, Brassard G, Crepeau C, et al. Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels[C]. Quantum Entanglement and Quantum Information Proceedings of Cast, 1999, 70(13): 1895. [5] Zhu C H, Pei C X, Ma H X, et al. A scheme for quantum local area networks and performance analysis[J]. Journal of Xidian University(西安电子科技大学学报), 2006, 33 (6): 839-843(in Chinese). [6] Zhu W, Nie M. The model design and performance analysis of quantum signaling switch [J]. Acta Physica Sinica(物理学报), 2013, 62(13): 537-544(in Chinese). [7] Yu X T, Xu J, Zhang Z C. Routing protocol for wireless ad hoc quantum communication network based on quantum teleportation [J]. Acta Physica Sinica(物理学报), 2012, 61(22): 514-518 (in Chinese). [8] Zeng B Y. Design and Analysis of Quantum Network Communication Protocols for Data Link Layer(数据链路层量子网络通信协议设计与分析)[D]. Nanchang: Master Thesis of Nanchang University, 2011(in Chinese). [9] Chen P, Cai Y X, Cai X H, et al. Quantum channel establishing rate model of quantum communication network based on entangled states[J]. Acta Physica Sinica(物理学报), 2015, 64(4): 40301(in Chinese). [10] Ma H Y, Qin G Q, Fan X K, et al. Quantum network direct communication protocol over noisy channel [J]. Acta Physica Sinica(物理学报), 2015, 64(16): 160306(in Chinese). [11] Nie M, Wang L F, Yang G, et al. Transmission protocol and its performance analysis of quantum communication network based on packet switching [J]. Acta Physica Sinica(物理学报), 2015, 64(21): 210303(in Chinese). [12] Wang L F, Nie M, Yuang G, et al. A scheme of quantum packet transmission and its performance analysis based on hierarchical[J]. Acta Physica Sinica(物理学报), 2016, 65(13): 130302(in Chinese). [13] Fang Shuanghong, Peng Jinye, Huang Peng, et al. The synchronization scheme and implementation of continuous variable quantum key distribution system[J]. Journal of Quantum Optica(量子光学学报),2016, 22(1): 43-49(in Chinese). [14] Fan Xincan, Liu Kaiyang, Wen Xiaojun. Communication transmission and routing protocols of quantum mobile internet[J]. Chinese Journal of Quantum Electronics(量子电子学报), 2017, 35(5): 581-587(in Chinese). [15] Zhou J, Lu L F, Lei Y Q, et al. Research on improving security of protection for power system secondary system by quantum key technology[J]. Power System Technology(电网技术), 2014, 38(6): 1518-1522 (in Chinese). |