2Gisin N,Ribordy G,Tittel W,et al.Quantum cryptography[J].Rev Mod Phys,2002,74:145-195.
3Bennett C H,Brassard G.Quantum cryptography:Public key distribution and coin tossing[C].New York:Proceedings of the IEEE International Conference on Computers,Systems and Signal Processing,IEEE,1984,1:175-179.
4Bennett C H.Experimental quantum cryptography[J].Journal of Cryptolog,1992,5:3-28.
5Lo H K,Chau H F.Unconditional security of quantum key distribution over arbitrarily long distances[J].Science,1999,283,2050-2056.
6Shor P W,Preskill J.Simple proof of security of the BB84quantum key distribution protocol[J].Physical Review Letters,2000,85,441-444.
7Gottesman D,Hoi-kwong,Lo Lülkenhus N,et al.Security of quantum key distribution with imperfect devices[J].Quantum Information and Computation,2004,4:325-360.
8Tobias S M,Henning W,Martin F,et al.Harald,Experimental demonstration of free-space decoy-state quantum key distribution over 144km[J].Phys Rev Lett,2007,98:010504.
10Jaruwatanadilok S.Underwater wireless optical communication channel modeling and performance evaluation using vector radiative transfer theory[J].IEEE,2008,26(9):1620-1627.