[1] Bennett C H , Brassard G. Quantum cryptography: Public key distribution and coin tossing [C]. International Conference on Computers, Systems &Signal Processing. India: 1984: 175- 179.
[2] Wang Xiangbin. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Phys. Rev. Lett., 2005, 94: 230503.
[3] Hwang W Y. Quantum key distribution with high loss: toward global secure communication [J]. Phys. Rev. Lett., 2003, 91: 057901.
[4] Jian Li, Lu Yuncan, Yang Chun, etal. Research on extending quantum key approach based on QKD [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2008, 25(1):65-70 (in Chinese). [5] Han Baobin, Pei Changxing, Chen nan, etal. Analysis of the effect of magneto-optic effect on BB84 protocol [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2007, 24(5):575-578 (in Chinese).
[6] Lo H K, Ma Xiongfeng, Chen Kai. Decoy state quantum key distribution [J]. Phys. Rev. Lett., 2005, 94: 230504.
[7] Wang Xiangbin. Decoy-state protocol for quantum cryptography with four different intensities of coherent light [J]. Phys. Rev. A, 2005, 72: 012322.
[8] Ma Xiongfeng, Fung C H F, Dupuis F, etal. Decoy-state quantum key distribution with two-way classical postprocessing [J]. Phys. Rev. A, 2006, 74: 032330.
[9] Wang Xiangbin, Peng Chengzhi, Zhang Jun, etal. General theory of decoy-state quantum cryptography with source errors [J]. Phys. Rev. A, 2008, 77: 042311.
[10] Tsurumaru T. Exact minimum and maximum of yield with a finite number of decoy light intensities [J]. Phys. Rev. A, 2008, 77: 022319.
[11] Schmitt-Manderbach T, Weier H, Fürst M, etal. Experimental demonstration of free-space decoy-state quantum key distribution over 144km [J]. Phys. Rev. Lett., 2007, 98: 010504.
[12] Ma Xiongfeng, Lo H K. Quantum key distribution with triggering parametric down-conversion sources [J]. New Journal of Physics, 2008,10: 073018.
[13] Wang Qin, Wang Xiangbin, Guo Guangcan. Practical decoy-state method in quantum key distribution with a heralded single-photon source [J]. Phys. Rev. A, 2007,75: 012312.
[14] Wang Qin, Wang Xiangbin, Björk G, etal. Improved practical decoy state method in quantum key distribution with parametric down-conversion source [J]. A Lett Journal Exploring, 2007,79: 40001.
[15] Wang Qin, Chen Wei, Xavier G, etal. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source [J]. Phys. Rev. Lett., 2008, 100: 090501.
[16] Mauerer W, Silberhorn C. Quantum key distribution with passive decoy state selection [J]. Phys.Rev.A, 2007, 75: 050305.
[17] Adachi Y, Yamamoto T, Koashi M, etal. Simple and efficient quantum key distribution with parametric down-conversion [J]. Phys. Rev. Lett., 2007,99: 180503.
[18] Zhang Shengli, Zou Xubo, Li Ke, etal. Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key- distribution protocols with a heralded single-photon source [J]. Phys. Rev. A, 2007,76: 044304.
[19] Mi Jinglong, Wang Faqiang, Lin Qinqun, etal. Practical non-orthogonal decoy state quantum key distribution with heralded single photon source[J] Chin. Phys. B, 2008,17(04): 1178-1183.
[20] Mi Jinglong, Wang Faqiang, Lin Qinqun, etal. Decoy state quantum key distribution with dual detectors heralded single photon source[J].Acta Phys. Sin.(物理学报),2008,57(02): 678-684(in Chinese).
[21] Gottesman D, Lo H K, Lütkenhaus N, etal. Security of quantum key distribution with imperfect devices [J] Quantum Inform Comput, 2004,4: 325-360.
[22] Wang Xiangbin. Quantum key distribution with 4 intensities of coherent light [J]. Phys.Rew.A, 2005,72: 012322 |