[1]
|
C. H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 9-12 December, 1984, pp. 175-179.
|
[2]
|
A. K. Ekert, “Quantum Cryptography Based on Bell’s Theorem,” Physical Review Letters, Vol. 67, No. 6, 1991, pp. 661-663. doi:10.1103/PhysRevLett.67.661
|
[3]
|
A. Muller, H. Zbinden and N. Gisin, “Quantum Cryptography over 23 km in Installed Under-Lake Telecom Fiber,” Europhysics Letters, Vol. 33, No. 5, 1996, pp. 335- 339. doi:10.1209/epl/i1996-00343-4
|
[4]
|
C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-X. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang and J.-W. Pan, “Experimental Long-Distance Decoy-State Quantum Key Distribution Based on Polarization Encoding,” Physical Review Letters, Vol. 98, No. 1, 2007, pp. 010505.1- 010505.4.
|
[5]
|
C. H. Bennett, “Quantum Cryptography Using Any Two Nonorthogonal States,” Physical Review Letters, Vol. 68, No. 21, 1992, pp. 3121-3124.
doi:10.1103/PhysRevLett.68.3121
|
[6]
|
X.-F. Mo, B. Zhu, Z.-F. Han, Y.-Z. Gui and G.-C. Guo, “Faraday-Michelson System for Quantum Cryptography,” Optics Letters, Vol. 30, No. 19, 2005, pp. 2632- 2634. doi:10.1364/OL.30.002632
|
[7]
|
H.-Q. Ma, J.-L. Zhao and L.-A. Wu, “Quantum Key Distribution Based on Phase Encoding and Polarization Measurement,” Optics Letters, Vol. 32, No. 6, 2007, pp. 698-700. doi:10.1364/OL.32.000698
|
[8]
|
A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden and N. Gisin, “‘Plug and Play’ Systems for Quantum Cryptography,” Applied Physics Letters, Vol. 70, No. 7, 1997, pp. 793-795. doi:10.1063/1.118224
|
[9]
|
S.-H. Sun, H.-Q. Ma, J.-J. Han, L.-M. Liang and C.-Z. Li, “Quantum Key Distribution Based on Phase Encoding in Long-Distance Communication Fiber,” Optics Letters, Vol. 35, No. 8, 2010, pp. 1203-1205.
doi:10.1364/OL.35.001203
|
[10]
|
T.-G. Noh, “Counterfactual Quantum Cryptography,” Phy- sical Review Letters, Vol. 103, No. 23, 2009, pp. 230501.1- 230501.4.
|
[11]
|
G. Brassard, N. Lütkenhaus, T. Mor and B. C. Sanders, “Limitations on Practical Quantum Cryptography,” Phy- sical Review Letters, Vol. 85, No. 6, 2000, pp. 1330- 1333. doi:10.1103/PhysRevLett.85.1330
|
[12]
|
Z.-Q. Yin, H.-W. Li, W. Chen, Z.-Fu Han and G.-C. Guo, “Security of Counterfactual Quantum Cryptography,” Physical Review A, Vol. 82, No. 4, 2010, pp. 042335.1- 042335.6.
|