Author:
Zhang Dexi,Li Xiaoyu,Zhao Qiuyu
Funder
Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference39 articles.
1. C.H. Bennett, G. Brassard. Quantum ryptography: Public key distribution and tossing. Proceedings of IEEE International conference on Computers, Systems and Signal Processing. pp. 175-180 (1984)
2. A.K. Ekert, Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661–663 (1991)
3. C.H. Bennett, G. Brassard, N.D. Mermin, Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68(5), 557–559 (1992)
4. H.K. Lo, H.F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)
5. B. Qi, Y. Zhao, X.F. Ma, H.K. Lo, L. Qian, Quantum key distribution with dual detectors. Phys. Rev. A 75(5), 052304 (2007)