1Bennett C H and Brassard G 1984 Proceedings of IEEE International Conference on Computers, Systems and Signal Processing 175.
2Gisin N et al 2002 Rev. Mod. Phys. 74. 145.
3Ekert A K 1991 Phys. Rev. Lett. 67. 661.
4Bennett C H, Brassard G and Mermin N D 1992 Phys. Rev.Lett. 68. 557.
5Bruβ D 1998 Phys. Rev. Lett. 81 .3018.
6Xue P, Li C F and Guo G C 2002 Phys. Rev. A 65 .022317.
7Guo G Pet al 2001 Phys. Rev. A 64 .042301.
8Beige A et al 2002 J. Phys. A: Math. Gen. 35. L407.
9Beige A et al 2002 Acta Phys. Pol. A 101. 357.
10Bostroem K and Felbinger T 2002 Phys. Rev. Lett. 89.187902.
同被引文献11
1YANG YuGuang1,2 & WEN QiaoYan31 College of Computer Science and Technology, Beijing University of Technology, Beijing 100022, China,2 State Key Laboratory of Information Security, Graduate University of the Chinese Academy of Sciences, Beijing 100049, China,3 School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China.Quasi-secure quantum dialogue using single photons[J].Science China(Physics,Mechanics & Astronomy),2007,50(5):558-562. 被引量:18