1BENNETT C H, BRASSARD G. Quantum Cryptography: Public Key Distribution and Coin Tossing [ A]. in proceedings of the IEEE International Conference on Computers, Systems and Signal Proceeding [C]. New York: IEEE, 1984. 175.
2EKERT ARTUR K. Quantum Cryptography Based on Bell's Theorem [J]. Phys Rev Lett, 1991, 67: 1293.
3BENNETT CTARLES H. Quantum Cryptography Using Any Two Nonorthogonal States [J]. Phys Rev Lett, 1992, 68:3121.
4EKERT A K, RARITY JOHN G, TAPSTER PAUL R, et al. Practical Quantum Cryptography Based on Two- photon Interferometry [J]. Phys Rev Lett, 1992, 69: 1293.
5TITTEL W, BRENDEL J, ZBINDEN H, et al. Quantum Cryptography Using Entangled Photons in Energy- Time Bell States [J]. Phys Rev Lett, 2000, 84:4737.
6WERNER REINHARD F. Quantum States with Einstein- Podolsky- Rosen correlations Admitting a Hidden- variable Model [J]. Phys Rev A, 1989, 40:4277.
7BENNETT C H, et al. Purification of Noisy Entanglement and Faithful Teleportation via Noisy Channels [ J ]. Phys Rev Lett, 1996, 76: 722.
8VEDRAL V, PLENIO M B, RIPPIN M A, et al. Quantifying Entanglement [J]. Phys Rev Lett, 1997, 78: 2275.
9WALGATE J, SHORT A J, HARDY L, et al. Local Distinguishability of Multipartite Orthogonal Quantum States [J].Phys Rev Lett, 2000, 85. 4972.
10HERZOG T J, RARITY J G, WEINFURTER H, et al. Frustrated Two - photon Creation via Interference [J]. Phys Rev Lett, 1994, 72: 629.