[1] Wiesner S. Conjugate coding [J]. Sigact News, 1983, 15:78-88
[2] Bennett C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing [C]//Proceedings ofthe IEEE International Conference on Computers, Systems and Signal Processing, 1984. 175-179
[3] Bennett C H, Brassard G, et al. Experimental quantum cryptography [J]. Journal of Cryptology, 1992, 5:3-28
[4] Ekert A K. Quantum cryptography based on Bell's theorem [J]. Phys. Rev. Lett., 1991, 67:661-663
[5] Bennett C H. Quantum cryptography using any two nonorthogonal states [J]. Phys. Rev. Lett., 1992, 68: 3121- 3123
[6] Muller A, et al. Quantum cryptography over 23 km in installed under-lake telecom fibre [J]. Europhys. Lett., 1996, 30:335-339
[7] Townsend P. Optical encrytion makes networks more secure [J]. Fiber Systems International, 2000, 1:30-32
[8] Hughes R J, et al. Quantum key distribution over a 48 km optical fibre network [J]. J. Mod. Opt., 2000, 47: 533-547
[9] Buttler W T, et al. Daylight quantum key distribution over 1.6 km [J]. Phys. Rev. Lett., 2000, 84:5652-5655
[10] Philip H A, et al. Eighty kilometer transmission experiment using an InGaAs/InP SPAD-based quantum cryp- tography receiver operating at 1.55 μm [J]. Journal of Modern Optics, 2001, 48:1957-1966
[14] Li X Y, et al. Quantum dense coding exploiting a bright Einstein-Podolsky-Rosen beam [J]. Phys. Rev. Lett,2002, 88:047904
[19] Duan L M, et al. Long-distance quantum communication with atomic ensembles and linear optics [J]. Nature, 2001, 414:413-418
[20] Lounis B, Moerner W E. Single photons on demand from a single molecule at room temperature [J]. Nature, 2000,407:491-493
[24] Zheng S B, Guo G C. Efficient scheme for two-atom entanglement and quantum information processing in cavity QED [J]. Phys. Rev. Lett., 2000, 85:2392-2395
[25] Hood C J, et al. The atom-cavity microscope: single atoms bound in orbit by single photons [J], Science, 2000,287:1447-1453