[1] Wiesner S.Conjugate coding.SIGACT News,1983,15(1):78~88
[2] Bennett C H,Brassard G,et al.Quantum cryptography:Public-key distribution and coin tossing,Inproceedings of the IEEE International Conference on Computers,Systems and SignalProcessing , Bangalore,India,1984.175~179
[3] Ekert A K.Quantum cryptography based on Bell′s theorem.Phys Rev Lett,1991,67(6):661~663
[4] Bennett C H,Bessette F,Brassard G,et al.Experimental quantum cryptography.Journal of Cryptology,1992,5(1):3~28
[5] Bennett C H.Quantum cryptography using any two nonorthogonal states.Phys Rev Lett,1992,68(21):3121~3123
[6] Brub D.Optimal eavesdropping in quantum cryptography with six states.Phys Rev Lett,1998,81(14):3018~3021
[7] Liang C,Fu D H,Liang B,et al.Quantum key distribution over 1.1 km in an 850 nm experimental all-fiber system.Acta Physica Sinica,2001,50(8):1429~1433
[8] Hughes R J,Morgan G L,Peterson C G,et al.Quantum key distribution over a 48 km optical fibre network.J Mod Opt,2000,47(2/3):533~547
[9] Philip A H,Bonfrate G,Buller G S,et al.Eighty kilometer transmission experiment using an InGaAs/InP SPAD-based quantum cryptography receiver operating at 1.55 μm.Journal of Modern Optics,2001,48(13):1957~1966
[10] Buttler W T,Hughes R J,Lamoreaux S K,et al.Daylight quantum key distribution over 1.6 km.Phys Rev Lett,2000,84(34):5652~5655
[13] Huttner B,Ekert A K, et al.Information gain in quantum eavesdropping.Journal of Modern Optics,1994,41(12):2455~2466