• Chinese Journal of Quantum Electronics
  • Vol. 25, Issue 1, 65 (2008)
Li RAN1、*, Yun-can LU1, Chun YANG1, and Jun HE2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: Cite this Article
    RAN Li, LU Yun-can, YANG Chun, HE Jun. Research on extending quantum key approach based on QKD[J]. Chinese Journal of Quantum Electronics, 2008, 25(1): 65 Copy Citation Text show less
    References

    [1] Wiesner S. Conjugate coding [J].Sigact News,1983,15(1): 78-88.

    [2] Wooters W K,Zurek W H. A single quantum cannot be cloned [J].Nature,1982,299: 802-803.

    [3] Liitkenhaus N. Security against eavesdropp ing in quantum cryp tography [J].Phys. Rev. A,1996,54: 972111.

    [4] Lütkenhaus N. Estimates for pract ical quantum cryp tography [J].Phys. Rev. A,1999,59: 330123319.

    [5] Brassard G,Lütkenhaus N,Mor T,et al. Security aspects of practical quantum cryptography [DB/OL].http://arxiv.org/df quant-ph/9911054,1999211.

    [6] Hankerson D,Menezes A,Vanstone S. Guide to Elliptic Curve Cryptography [M].Heidelberg: Springer,2004.Gisin N,Ribordy G,Tittel W,et al. Quantum cryptography [DK].Eprint quant-ph/0101098.

    [7] Bennett C H,Brassard G. Quantum cryptography:public key distribution and cointossing [C].Proc. IEEE Int.Conf. Computers,Systems and Signal Processing(Bangalore. India),1984,175-179.

    [8] Bennett C H. Quantum cryptography using any two non-orthogonal states [J].Phys. Rev. Left.,1992,68:3121-3124.

    [9] Bruss D. Optimal eavesdropping in quantum cryptography with six states [J].Phys. Rev. Left.,1998,32(14):3018-3021.

    [10] Ekert A. Quantum cryptography based on Bell'S theorem [J].Phys. Rev. Lett.,1991,67: 661-663.

    [11] Bennett C H,Bessette F,Brassard G,et al. Experimental quantum cryptography [J].Journal of Cryptology,1992,5(1): 3-28.

    [12] Marand C. Townsend PD Quantum key distribution over distance as long as 30 km [J].Opt. Lett.,1995,20: 169.

    [13] Hiskett P A,et al. Eighty kilometer transmission experiment using an InGaAs/InP SPAD based quantumcryptography receiver operating at 1.55 μm [J].J. Mod. Opt.,2001,48: 1957.

    [14] Kosaka H,et al. Single photon interference experiment over 100 km for quantum cryptography system using balancedgated mode photon detector [J].Elec. Lett.,2003,39: 1199.

    [18] Rukhin A,et al. A statistical test suite for random and pseudo-random number generators for cryptographic applications [OL],NIST(2001),http://csrc.nist.gov/rng/

    RAN Li, LU Yun-can, YANG Chun, HE Jun. Research on extending quantum key approach based on QKD[J]. Chinese Journal of Quantum Electronics, 2008, 25(1): 65
    Download Citation