基于QKD系统的扩展量子密钥方法研究
吴敏, 廖常俊, 刘颂豪. 基于QKD系统的扩展量子密钥方法研究[J]. 量子光学学报, 2005, 11(2): 69.
吴敏, 廖常俊, 刘颂豪. Research on extending quantum key approach based on QKD systems[J]. Acta Sinica Quantum Optica, 2005, 11(2): 69.
[1] BENNETT C H, BRASSARD G. Quantum cryptography: public key distribution and coin tossing [C]. ∥in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York), 1984, 175.
[2] BARNETT S M, PHOEIX S J D. Bell's inequality and rejected-data protocols for quantum cryptography [J]. J Mod Opt, 1993, 40: 1443.
[3] BARNETT S M, et al. Eavesdropping stategies and rejected data protocols in quantum cryptography [J]. J Mod Opt, 1993, 40: 2501.
[4] EKERT A K, PALMA G M. Quantum Cryptography with interferometric quantum Entanglement [J]. J Mod Opt, 1994, 41: 2413.
[5] 曾贵华, 王新梅. 量子密码协议的改进 [J]. 通信学报, 2000, 21(2): 60-63.
[6] PHILIP A HISKETT, et al. Eighty kilometer transmission experiment using an InGaAs/InP SPAD based quantum cryptography receiver operating at 1.55 μm [J]. J Mod Opt, 2001, 48: 1957.
[7] KOSAKA H, et al. Single-photon interference experiment over 100 km for quantum cryptography system using balanced gated-mode photon detector [J]. Elec Lett, 2003, 39: 1199.
[8] 王宏禹. 数字信号处理专论 [M]. 北京: 国防工业出版社. 1995: 70.
[9] RUKHIN A, et al. A Statistical Test Suite for Random and Pseudo-random Number Generators for CryptographicApplications, NIST (2001),http://csrc.nist.gov/rng/
吴敏, 廖常俊, 刘颂豪. 基于QKD系统的扩展量子密钥方法研究[J]. 量子光学学报, 2005, 11(2): 69. 吴敏, 廖常俊, 刘颂豪. Research on extending quantum key approach based on QKD systems[J]. Acta Sinica Quantum Optica, 2005, 11(2): 69.