2Gobby C,Yuan Z L,Shields A J.Quantum key distribution over 122 km of standard telecom fiber.Appl Phys Lett,2004,84:3762-3764
3Tadamasa K,Yoshihiro N,Takaaki H,et al.Single-photon interference over 150 km transmission using silica-based integratedoptic interferometers for quantum cryptography.Jpn J Appl Phys,2004,43(9):1217-1219
4Mo X F,Zhu B,Han Z F,et al.Intrinsic-stabilization uni-directional quantum key distribution between Beijing and Tianjin.http://arxiv.org/abs/quant-ph/0412023
5Kurtsiefer C,Zarda P,Halder M,et al.Quantum cryptography a step towards global key distribution.Nature,2002,419:450
6Bennett C H,Brassard G.Quantum cryprography:Public key distribution and coin tossing.In:Proceedings of IEEE International Conference on Computers,Systems and Processing,Bangalore,India,(New York:IEEE),1984,175-179
7Bennett C H.Quantum cryptography using any two nonorthogonal states.Phys Rev Lett,1992,68(21):3121-3124
8Ekert A K.Quantum cryptography based on Bell's theorem.PhysRevLett,1991,67(6):661-663
9Ralph T C.Continuous variable quantum cryptography.Phys RevA,2000,61:010303
10Hillery M.Quantum cryptography with squeezed states.Phys Rev A,2000,61:022309