3Bandjaballah C,Leroy J M,Voundas A. Rata Distortion and Detection in Quantum Communication[ J]. IEEE. TRANSATION ON information theory. 1998,44(4) :1658 - 1665.
4[1]H Bennett,G Brassard,A K Ekert.Quantum Cryptography[J]. Scientific American,1992,267(4):26-33.
5[2]J Blow,S J D Phoenix.On a fundamental theorem of quantum cry ptography[J].J.of Mod.Opt,1993,[ STHZ 40(1):33-36.
6[3]D Townsend,I Thompson.A quantum key distribution channel b ased on optical fibre[J].J.of Mod.Opt,1994,41(12):2425.
7[4]K Ekert.Quantum cryptography based on Bells theorem[J] .Phy.Rev.Lett,1991,67[ STBZ (6):661-663.
8[5]d Espagnat.The quantum theory and reality[J].Scientific American.1979,247(5 2):158-181.
9[6]H Bennett.Quantum cryptography using any two nonorthogonal s tates[J].Phy.Rev.Lett,1992,68(21):3121-3124.
10[7]M Barnett,B Hunttner,S J D Phoenix.Eavesdropping strategies and rejected-data protocols in quantum cryptography[J].J.of .Mod.Opt,1993,40(12):2 501-2513.