[1] Wiesner S. Conjugate coding. SIGACT News,1983,15(1): 78~88
[2] Bennett C H,Brassard G. Quantum cryptography: Public key distribution and coin tossing. In proceedings of the IEEE International Conference on Computers Systems and Signal Processing,Bangalore,India,New York:IEEE,1984.175~179
[3] Ekert A K. Quantum cryptography based on bell's theorem. Phys Rev Lett,1991,67(6): 661~663
[4] Bennett C H,Bessette F,Brassard G,et al. Experimental quantum cryptography. Journal of Cryptology,1992,5(1): 3~28
[5] Brub D. Optimal eavesdropping in quantum cryptography with six states. Phys Rev Lett,1998,81(14): 3018-3021
[6] Philip H A,Bonfrate G,Buller G S,et al. Eighty kilometer transmission experiment using an InGaAs/InP SPAD-based quantum cryptography receiver operating at 1.55 μm. Journal of Modern Optics,2001,48(13): 1957~1966
[7] Buttler W T,Hughes R J,Lamoreaux S K,et al. Daylight quantum key distribution over 1.6 km. Phys Rev Lett,2000,84(34): 5652~5655
[8] Liang C,Liao J,Wu L A,et al. Acta Photonica Sinica,2000,29(12): 1139~1143
[9] Chen Z X,Tang Z L,Liu S H,et al. Acta Photonica Sinica,2004,33(12): 1469~1472
[10] Huttner B,Ekert A K. Information gain in quantum eavesdropping. Journal of modern Optics,1994,41(12): 2455~2466
[11] Félix s,Gisin N,Stefanov A,et al. Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses. Journal of Modern Optics,2001,48(13): 2009~2021
[12] Williamson M,Vedral V. Eavesdropping on practical quantum cryptography. Journal of Modern Optics,2003,50(13): 1989~2011
[13] Yang L,Wu L A,Liu S H,et al. Acta Physica Sinica,2002,51(5): 961~965
[14] Li F L. Higher Laser Physics. HeFei: University of Science and Technology of China Press,1992.285~327
[15] Kato T,Hirano M,Onishi M,et al. Ultra-low nonlinearity low-loss pure silica core fiber for long-haul WDM transmission. Electron Lett,1999,35(19): 1615~1617