共 12 条
- [1] Bennett C.H., Brassard G., Quantum cryptography: public key distribution and coin tossing, Proceeding of the IEEE International Conference on Computer, Systems and Signal Processing, pp. 175-179, (1984)
- [2] Wootters W.K., Zurek W.H., A single quantum cannot be cloned, Nature (London), 299, pp. 802-803, (1982)
- [3] Wang X., Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett., 94, 23, (2005)
- [4] Lo H., Ma X., Chen K., Decoy state quantum key distribution, Phys. Rev. Lett., 94, 23, (2005)
- [5] Zhao Y., Qi B., Ma X., Et al., Experimental quantum key distribution with decoy states, Phys. Rev. Lett., 96, 7, (2006)
- [6] Peng C., Zhang J., Yang D., Et al., Experimental long-distance decoy-state quantum key distribution dased on polarization encoding, Phys. Rev. Lett., 98, 1, (2007)
- [7] Rosenberg D., Harrington J.W., Rice P.R., Et al., Long-distance decoy-state quantum key distribution in optical fiber, Phys. Rev. Lett., 98, 1, (2007)
- [8] Chen T.-Y., Liu Y., Cai W.-Q., Et al., Field test of a practical secure communication network with decoy-state quantum cryptography, Opt. Express, 17, 8, pp. 6540-6549, (2009)
- [9] Wei X., Yang T., Peng C., Et al., Research of a SiAPD single photon detector in a constant temperature system, Nuclear Electronics & Detection Technology, 26, 6, pp. 1013-1016, (2006)
- [10] He N., Liao X., Ao F., Application of laser in the measurement of object surface coating uniformity, Chinese J. Lasers, 35, SUPPL., pp. 189-192, (2008)