• Chinese Journal of Quantum Electronics
  • Vol. 22, Issue 3, 387 (2005)
[in Chinese]*, [in Chinese], and [in Chinese]
Author Affiliations
  • [in Chinese]
  • show less
    DOI: Cite this Article
    [in Chinese], [in Chinese], [in Chinese]. Two methods of extending quantum key warehouse[J]. Chinese Journal of Quantum Electronics, 2005, 22(3): 387 Copy Citation Text show less
    References

    [1] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing [C] //Proc. of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York):1984, 175.

    [2] Barnett S M, Phoeix S J D. Bell's inequality and rejected-data protocols for quantum cryptography [J]. J. Mod.Opt., 1993, 40: 1443.

    [3] Barnett S M, et al. Eavesdropping stategies and rejected data protocols in quantum cryptography [J]. J. Mod.Opt., 1993, 40: 2501.

    [4] Ekert A K, Palma G M. Quantum cryptography with interferometric quantum entanglement [J]. J. Mod. Opt.,1994, 41: 2413.

    [6] Bennett C H.,et al. Experimental quantum cryptography [J]. J. Crypto., 1992, 5: 3.

    [7] Philip A Hiskett, et al. Eighty kilometer transmission experiment using an InGaAs/InP SPAD based quantum cryptography receiver operating at 1.55 μm [J]. J. Mod. Opt., 2001, 48: 1957.

    [8] H. Kosaka, et al. Single-photon interference experiment over 100km for quantum cryptography system using balanced gated-mode photon detector [J]. Elec. Lett., 2003, 39: 1199.

    [10] Rukhin A, et al. A statistical test suite for random and pseudo-random number generators for cryptographic applications [R]. NIST, 2001.

    [in Chinese], [in Chinese], [in Chinese]. Two methods of extending quantum key warehouse[J]. Chinese Journal of Quantum Electronics, 2005, 22(3): 387
    Download Citation