[1] Lütkenhaus N. Security against individual attacks for realistic quantum key distribution
[J]. Physics Review A, 2000, 61, 052304.
[2] Gobby C, Yuan Z L, Shields A J. Quantum key distribution over 122 km of standard telecom fiber
[J]. Applied Physics Letters, 2004, 84(19):3762-3763.
[3] Mo X F, Zhu B, Han Z F, et al. Faraday-Michelson system for quantum cryptography
[J]. Optics Letters, 2005, 30(19):2632-2634.
[4] Liu Y, Liu R F, Li N, et al. Direct deterministic communication on quantum channel
[J]. Chinese journal of quantum electronics(量子电子学报),2006,23(4):441(in Chinese).
[5] Zhu A D, Zhang S. Quantum key distribution and controlled quantum direct communication applying product state of qurtit
[J]. Chinese journal of quantum electronics(量子电子学报),2007,24(3):316(in Chinese).
[6] Takesue H, Diamanti E, Honjo T, et al. Differential phase shift quantum key distribution experiment over 105km fibre
[J]. New Journal of Physics, 2005, 7, 232.
[7] Hiroki T, Eleni D, Carsten L, et al. 10-GHz clock differential phase shift quantum key distribution experiment
[J]. Optics Express, 2006, 14(20):9522-9530.
[8] Waks E, Takesue H, Yamamoto Y. Security of differential-phase-shift quantum key distribution against individual attacks
[J]. Physics Review A, 2006, 73, 012344.
[9] Lo H K, Ma X F, Chen K. Decoy State Quantum Key Distribution
[J]. Physics Review Letters, 2005, 94, 230504.
[10] K. Inoue, T. Honjo. Robustness of differential-phase-shift quantum key distribution against photon- number-splitting attack
[J]. Physics Review A, 2005, 71, 042305.
[11] Zhao F , Fu M X , Lu Y Q et al. Infuence of multi-photon pulses on practical differential-phase-shift quantum key distribution
[J]. Chinese Physics, 2007, 16(11):3402-3406.
[12] Inoue K, Takesue H, Honjo T. Differential-Phase-Shift Quantum Key Distribution
[C]. SPIE,2007, 6780: 678015
[13] Ma X F, Qi B, Zhao Y, et al. Practical decoy state for quantum key distribution
[J]. Physics Review A, 2005, 72, 012326.
|