[1] Ekert A K. Quantum cryptography based on Bell’s theorem[J]. Physical Review Letters, 1991, 67(6): 661-663.
[2] Ma Hongyang, Chen Bingquan, Guo Zhongwen, et al. Development of quantum network based on multiparty quantum secret sharing[J]. Canadian Journal of Physics, 2008, 8(9): 1097-1101.
[4] Gong Lihua, Liu Ye, Zhou Nanrun. Novel quantum virtual private network scheme for PON via quantum secure direct communication[J]. International Journal of Theoretical Physics, 2013, 52(9): 3260-3268.
[7] Abdul Khira M F, Mohd Zainc M N, et al. Implementation of two way quantum key distribution protocol with decoy state[J]. Optics Communications, 2012, 285(5): 842-845.
[8] Jeremy S, Bill P. Quantum mechanics without wavefunctions[J]. J. Chem. Phys., 2012, 13(3): 102-105.
[10] Hua Lu, Chi-Hang Fred Fung, et al. Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel[J]. Phys. Rev. A, 2011, 84(4): 2344-2348.
[11] He Guangqiang, Zhu Jun, Zeng Guihua. Deterministic quantum key distribution using Gaussian-modulated squeezed states[J]. Commun. Theor. Phys., 2011, 5(4): 664-668.