[1] Scarani V, Bechmann-Pasquinucci H, Cerf N J, et al. The security of practical quantum key distribution[J]. Reviews of Modern Physics, 2009, 81(3): 1301-1350.
Scarani V, Bechmann-Pasquinucci H, Cerf N J, et al. The security of practical quantum key distribution[J]. Reviews of Modern Physics, 2009, 81(3): 1301-1350.
[2] Wootters W K, Zurek W H. A single quantum cannot be cloned[J]. Nature, 1982, 299(5886): 802-803.
Wootters W K, Zurek W H. A single quantum cannot be cloned[J]. Nature, 1982, 299(5886): 802-803.
[3] Buek V, Hillery M. Quantum copying: Beyond the no-cloning theorem[J]. Physical Review A, 1996, 54(3): 1844-1852.
Buek V, Hillery M. Quantum copying: Beyond the no-cloning theorem[J]. Physical Review A, 1996, 54(3): 1844-1852.
[4] Fiurákek J, Cerf N J. Quantum cloning of a pair of orthogonally polarized photons with linear optics[J]. Physical Review A, 2008, 77: 052308.
Fiurákek J, Cerf N J. Quantum cloning of a pair of orthogonally polarized photons with linear optics[J]. Physical Review A, 2008, 77: 052308.
[5] Bartkiewicz K, Lemr K, Cernoch A, et al. Experimental eavesdropping based on optimal quantum cloning[J]. Physical Review Letters, 2013, 110: 173601.
Bartkiewicz K, Lemr K, Cernoch A, et al. Experimental eavesdropping based on optimal quantum cloning[J]. Physical Review Letters, 2013, 110: 173601.
[6] Fan H, Wang Y N, Jing L, et al. Quantum cloning machines and the applications[J]. Physics Reports, 2014, 544(3): 241-322.
Fan H, Wang Y N, Jing L, et al. Quantum cloning machines and the applications[J]. Physics Reports, 2014, 544(3): 241-322.
[7] Scarani V, Iblisdir S, Gisin N, et al. Quantum cloning[J]. Reviews of Modern Physics, 2005, 77(4): 1225-1256.
Scarani V, Iblisdir S, Gisin N, et al. Quantum cloning[J]. Reviews of Modern Physics, 2005, 77(4): 1225-1256.
[8] Bennett C, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 1984: 175-179.
Bennett C, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 1984: 175-179.
[9] Gisin N, Ribordy G E, Tittel W, et al. Quantum cryptography[J]. Reviews of Modern Physics, 2002, 74(1): 145-195.
Gisin N, Ribordy G E, Tittel W, et al. Quantum cryptography[J]. Reviews of Modern Physics, 2002, 74(1): 145-195.
[10] Bru? D, Cinchetti M, Mauro D’Ariano G, et al. Phase-covariant quantum cloning[J]. Physical Review A, 2000, 62: 012302.
Bru? D, Cinchetti M, Mauro D’Ariano G, et al. Phase-covariant quantum cloning[J]. Physical Review A, 2000, 62: 012302.
[11] Zhang W H, Wu T, Ye L, et al. Optimal real state cloning in d dimensions[J]. Physical Review A, 2007, 75: 044303.
Zhang W H, Wu T, Ye L, et al. Optimal real state cloning in d dimensions[J]. Physical Review A, 2007, 75: 044303.
[12] Cerf N J. Asymmetric quantum cloning in any dimension[J]. Journal of Modern Optics, 2000, 47(2-3): 187-209.
Cerf N J. Asymmetric quantum cloning in any dimension[J]. Journal of Modern Optics, 2000, 47(2-3): 187-209.
[13] Bartkiewicz K, Miranowicz A. Optimal cloning of qubits given by an arbitrary axisymmetric distribution on the Bloch sphere[J]. Physical Review A, 2010, 82: 042330.
Bartkiewicz K, Miranowicz A. Optimal cloning of qubits given by an arbitrary axisymmetric distribution on the Bloch sphere[J]. Physical Review A, 2010, 82: 042330.