8Curty M, Santos D J. Qubit authentication [ J ]. Phys. Revs. A,2002,66(7) :22-29.
9C. Bennett, G. Brassard, et al. in: Proceedings of IEEE In- ternational Conference on Computers, Systems and Signal Processing,volume 175 ,Bangalore,India, 1984.
3C H Bennett, G Brassard, et al. Quantum cryptography, or unforgeable subway tokens[ A ]. Advances in Cryptography: Proceedings of CRYPTO 82[C] .New York:Plenum Press, 1983. 267- 275.
4C H Bennett, G Brassard. Quantum cryptography and its application to provably secure key expansion, public-key distribution,and coin-tossing[ A]. IEEE International Symposium on Information Theory[C]. St-Jovite: Qebec Press, 1983.91 - 95.
5C H Bennett, G Brassard. Quantum cryptography: public-key distribution and coin tossing[A]. Proceedings of the International Conference on Computers, Systems and Signal Processing [C]. India: Bangalore Press, 1984.175 - 179.
6G S Vemam. Cipher printing telegraph systems for secret wire and radio telegraphic communications[ J]. Journal of the American Institute of Electrical Engineers, 1926,55(1) : 109 - 115.
7A K Ekert. Quantum cryptography based on Bell theorem[ J ]. Physical Review Letters, 1991,67(6) :661 - 663.
8C H Bennett. Quantttrn cryptography using any two nonorthogonal states[J]. Physical Review Letters, 1992, 68 (21) : 3121 - 3124.
9C H Bennett, Brassard G, et al. Quantum cryptography without Bell theorem[ J ]. Physical Review Letters, 1992,68 ( 5 ) : 557 - 559.
10D Bruss. Optimal eavesdropping in quantum cryptography with six states[J]. Physical Review Letters, 1998,81 ( 14):3018 - 3021.