• Chinese Journal of Quantum Electronics
  • Vol. 25, Issue 2, 181 (2008)
Jin-fei LIAO* and Liu YE
Author Affiliations
  • [in Chinese]
  • show less
    DOI: Cite this Article
    LIAO Jin-fei, YE Liu. Quantum key distribution with single-photon polarization states[J]. Chinese Journal of Quantum Electronics, 2008, 25(2): 181 Copy Citation Text show less
    References

    [1] Bennett C H,Brassard G. in Proce. of IEEE International Conference on Computers,Systems and Signal Processing [C].Bangalore,India IEEE,New York,1984,175.

    [2] Ekert A K. Quantum cryptography based on Bell's theorem [J].Phys. Rev. Lett.,1991,67: 661.

    [3] Bennett C H. Quantum cryptography using any two nonorthogonal states [J].Phys. Rev. Lett.,1992,68: 3121.

    [4] Bennett C H,et al. Communication via one-and two-particle operators on Einstein-Podolsky-Rosen states [J].Phys. Rev. Lett.,1992,69: 2881,

    [5] Goldenberg L,Vaidman L. Quantum cryptography based on orthogonal states [J].Phys. Rev. Lett.,1995,75:1239.

    [6] Huttner B,Imoto N,Gisin N,et al. Quantum cryptography with coherent states [J].Phys. Rev. A,1995,51:1863.

    [7] Koashi M,Imoto N. Quantum cryptography based on split transmission of one-bit information in two steps [J].Phys. Rev. Lett.,1997,79: 2383.

    [8] BruB D. Optimal eavesdropping in quantum cryptography with six states [J].Phys. Rev. Lett.,1998,81: 3018.

    [9] Long G L,Liu X S. Theoretically efficient high-capacity quantum-key-distribution scheme [J].Phys. Rev. A,2002,65: 032302.

    [10] Xue P,Li C F,Guo G C. Conditional efficient multiuser quantum cryptography network [J].Phys. Rev. A,2002,65: 022317.

    [11] Deng F G,Long G L. Secure direct communication with a quantum one-time pad [J].Phys. Rev. A,2004,69: 052319.

    [12] Wang C,Deng F G,Li Y S,Liu X S,et al. Quantum secure direct communication with high-dimension quantum superdense coding [J].Phys. Rev. A,2005,71: 044305.

    [15] Bostr m K,Felbinger T. Deterministic secure direct communication using entanglement [J].Phys. Rev. Lett.,2002,89: 187902.

    [16] W'ojcik A. Eavesdropping on the “Ping-Pong”quantum communication protocol [J].Phys. Rev. Lett.,2003,90: 157901.

    [17] Cai Q Y. The “Ping-Pong ”protocol can be attacked without eavesdropping [J].Phys. Rev. Lett.,2003,91: 109801.

    [18] Zhang Z J,Man Z X,Li Y. The improved bostrom-felbinger protocol against attacks without eavesdropping [J].Int. J. Quant. Inform.,2004,2: 521.

    [19] Gao M,Liang L M,Li C Z,et al. Robust quantum key distribution with two-photon polarization states [J].Phys. Lett. A,2006,359: 126-128.

    [20] Li Shujing,Wang Bo,Yang Xudong,et al. Controlled polarization rotation of an optical field in multi-Zeemansublevel atoms [J].Phys. Rev. A,2006,74: 033821.

    LIAO Jin-fei, YE Liu. Quantum key distribution with single-photon polarization states[J]. Chinese Journal of Quantum Electronics, 2008, 25(2): 181
    Download Citation