1. Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (ICCSSP’84), Nov 22-24, 1984, Bangalore, India. New York, NY, USA: IEEE, 1984: 175-179
2. Bennett C H. Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 1992, 68(21): 3121-3124
3. Ekert A K. Quantum cryptography bases on Bell’s theorem. Physical Review Letters, 1991, 67(6): 661-664
4. Ahonen O, Mottonen M, O’Brien J L. Entanglement-enhanced quantum key distribution. Physical Review A, 2008, 78: 032314
5. Brassard G, Salvail L. Secret-key reconciliation by public discussion. Advances in Cryptology: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT’93), May 23-27, 1993, Lofthus, Norway. LNCS 765. Berlin, Germany: Springer- Verlag, 1994: 410-423
6. Bennett C H, Brassard G, Crepeau C, et al. Generalized privacy amplification. IEEE Transactions on Information Theory, 1995, 41(6-2): 1915–1919
7. Goldenberg L, Vaidman L. Quantum cryptography based on orthogonal states. Physical Review Letters, 1995, 75(7): 1239-1243
8. Koashi M, Imoto N. Quantum cryptograph based on split transmission of one-bit information in two steps. Physical Review Letters, 1997, 79(12): 2383-2386
9. Hwang W Y, Koh I G, Han Y D. Quantum cryptography without public announcement of bases. Physics Letter A, 1998, 244(6): 489-494
10. Boström K, Felbinger T. Deterministic secure direct communication using entanglement. Physical Review Letters, 2002, 89(18): 187902
11. He G Q, Zeng G H. Deterministic quantum key distribution based on Gaussian-modulated EPR correlations. Chinese Physics, 2006, 15(6): 1285-1289
12. Li X H, Deng F G, Zhou H Y. Efficient quantum key distribution over a collective noise channel. Physical Review A, 2008, 78(2): 022321
13. Wójcik A. Eavesdropping on the ‘ping-pong’ quantum communication protocol. Physical Review Letters, 2003, 90(15): 157901
14. Cai Q Y, Li B W. Improving the capacity of the Bostrom-Felbinger protocol. Physical Review A, 2004, 69(5): 054301
15. Deng F G, Long G L. Secure direct communication with a quantum one-time pad. Physical Review A, 2004, 69(5): 052319
16. Wang C, Deng F G, Liu Y S, et al. Quantum secure direct communication with high-dimension quantum superdense coding. Physical Review A, 2005, 71(4): 044305
17. Lucamarini M, Mancini S. Secure deterministic communication without entanglement. Physical Review Letters, 2005, 94(14): 140501
18. Xiong J, Zhang Z S, Zhou N R, et al. Unsymmetrical quantum key distribution using tripartite entanglement. Communications in Theoretical Physics, 2007, 47(3): 441-445
19. Deng F G, Long G L, Liu X S. A two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Physical Review A, 2003, 68(4): 042317
20. Nielsen M A, Chuang I L. Quantum computationand quantum information. Cambridge, UK: Cambridge University Press,2000
21. Shannon C E. A mathematical theory of communication. Bell System Technical Journal, 1948, 27(1): 379-423
22. Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography. Review of Modern Physics, 2002, 74(1): 145-195
23. Zhang Z S, Zeng G H, Zhou N R, et al. Quantum identity authentication based on ping-pong technique for photons. Physics Letters A, 2006, 356(3): 199-205
24. Deutsch D, Ekert A, Jozsa R, et al. Quantum privacy amplification and the security of quantum cryptography over noisy channels. Physical Review Letters, 1996, 77(13): 2818-2821 |