2[1]H Bennett,G Brassard,A K Ekert.Quantum Cryptography[J]. Scientific American,1992,267(4):26-33.
3[2]J Blow,S J D Phoenix.On a fundamental theorem of quantum cry ptography[J].J.of Mod.Opt,1993,[ STHZ 40(1):33-36.
4[3]D Townsend,I Thompson.A quantum key distribution channel b ased on optical fibre[J].J.of Mod.Opt,1994,41(12):2425.
5[4]K Ekert.Quantum cryptography based on Bells theorem[J] .Phy.Rev.Lett,1991,67[ STBZ (6):661-663.
6[5]d Espagnat.The quantum theory and reality[J].Scientific American.1979,247(5 2):158-181.
7[6]H Bennett.Quantum cryptography using any two nonorthogonal s tates[J].Phy.Rev.Lett,1992,68(21):3121-3124.
8[7]M Barnett,B Hunttner,S J D Phoenix.Eavesdropping strategies and rejected-data protocols in quantum cryptography[J].J.of .Mod.Opt,1993,40(12):2 501-2513.
9[8]Goldenberg,Lev Vaidman.Quantum cryptography based on orthogo nal states[J].Phy.Rev.Lett,1995,[ STHZ 75(7):1239-1243.
10[9]D Townsend.Secure key distribution systems based on quantum cryptography[J].Electron.Lett,1994 ,30(10):809-811.