共 66 条
[1]
Bennett C.H.(1992)Quantum cryptography using any two nonorthogonal states Phys. Rev. Lett. 68 3121-112
[2]
Ekert A.K.(1991)Quantum cryptography based on Bell’s theorem Phys. Rev. Lett. 67 661-1333
[3]
Lutkenhaus N.(1996)Security against eavesdropping in quantum cryptography Phys. Rev. A 54 97-undefined
[4]
Bruss D.(1998)Optimal eavesdropping in quantum cryptography with six states Phys. Rev. Lett. 81 3018-undefined
[5]
Bechmann-Pasquinucci H.(2000)Quantum cryptography with 3-state systems Phys. Rev. Lett. 85 3313-undefined
[6]
Peres A.(2005)Decoy state quantum key distribution Phys. Rev. Lett. 94 4171-undefined
[7]
Lo H.K.(2008)Quantum key distribution with an unknown and untrusted source Phys. Rev. A 77 2533-undefined
[8]
Ma X.(2009)Quantum key distribution protocols with six-photon states against collective noise Opt. Commun. 282 3762-undefined
[9]
Chen K.(2009)Decoy state quantum key distribution with finite resources Phys. Lett. A 373 43-undefined
[10]
Zhao Y.(2010)Finite-key security against coherent attacks in quantum key distribution New J. Phys. 12 2050-undefined