购买
下载掌阅APP,畅读海量书库
立即打开
畅读海量书库
扫码下载掌阅APP

参考文献

[Ban 1999] Ban M. Quantum dense coding via a two-mode squeezed-vacuum state. J. Opt. B: Quantum Semiclass, 1999, 1: L9-L11

[Bennett-Brassard 1984] Bennett C H and Brassard G. Quantum cryptography: Public-key distribution and coin tossing. Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing Bangalore, India. 1984, 175-179

[Bennett 1992a] Bennett C H, Brassard G and Mermin N D. Quantum cryptography without Bell theorem. Phys. Rev. Lett., 1992, 68: 557

[Bennett 1992b] Bennett C H. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett., 1992, 68: 3121

[Bennett 1993] Bennett C H, Brassard G, Crepeau C, Jozsa R, Peres A and Wooters W K. Teleporting an unknown quantum state via dual classic and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett., 1993, 70: 1895-1899

[Bouwmeester 2000] Bouwmeester D, Ekert A and Zeilinger A. The Physics of Quantum Information: quanutm cryptography, quanutm teleportation, quanutm computation, Berlin Heidelberg: Springer-Verlag, 2000

[Bowen 2003] Bowen W P, Treps N, Buchler B C, Schnabel R, Ralph T C, Bachor H A, Symul T and Lam P K. Experimental investigation of continuous variable quantum teleportation. Phys. Rev. A, 2003, 67: 032302

[Brassard 2003] Brassard G, Bussieres F, Godbout N, et al. Multi-user quantum key distribution using wave-length division multiplexing. Proc. SPIE, 2003, 5260(6): 149-153

[Braunstein 1998] Braunstein S L and Kimble H J. Teleportation of continuous quantum variables. Phys. Rev. Lett., 1998,80: 869-872

[Breguet 1994] Breguet J, Muller A and Gisin N. Quantum cryptography with polarized photons in Optical fibers: experimental and practical limits. J. Mod.Opt., 1994, 41: 2405-2412

[Chen 2009b] Chen T Y, Liu Y, Cai W Q, et al. Field test of a practical secure communication network with decoy-state quantum cryptography. Optics Express, 2009, 17(8): 6540-6549

[Deutsch 1992] Deutsch D and Jozsa R. Rapid solutions of problems by quantum computation. Proceedings of the Royal Society of London A, 1992, 439: 553

[Dixon 2010] Dixon A R, Yuan Z L, Dynes J F, Sharpe A W and Shields A J. Continuous operation of high bit rate quantum key distribution. Appl. Phys. Lett., 2010(96):161102

[Duan 2001] Duan L M, Lukin M D, Cirac J I and Zoller P. Longdistance quantum communication with atomic ensembles and linear optics. Nature, 2001,414: 413-418

[D-wave 2011] Webpage of D-Wave Systems Inc., http://dwavesys.com/en/technology. html

[Ekert 1991] Ekert A K. Quantum cryptography based on Bell theorem. Phys. Rev. Lett., 1991,67: 661

[Elliott 2005] Elliott C, Colvin A, Pearson D, Pikalo O, Schlafer J and Yeh H. Current status of the DARPA Quantum Network, Quantum Information and Computation III. Proc. SPIE, 2005.5815: 138-149

[Furusawa 1998] Furusawa A, Sorensen J L, Braunstein S L, Fuchs C A, Kimble H J and Polzik E S. Unconditional Quantum Teleportation. Science, 1998, 282: 706

[Furusawa 2005] Takei N, Aoki T, Furusawa A, et al. Experimental demonstration of quantum teleportation of a squeezed state. Phys. Rev. A, 2005, 72: 042304

[Gobby 2004] Gobby C, Yuan Z L and Shields J. Quantum key distribution over 122 km of standard telecom. Appl. Phys. Lett., 2004, 84: 3762

[Grosshans 2002] Grosshans F and Grangier P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett., 2002, 88: 057902

[Grover 1996] Grover L K. A fast quantum mechanical algorithm for database search. Proceedings of 28th Annual ACM Symposium on the Theory of Computing, 1996, 212

[Han 2010] Han Y, et al. Quantum repeaters based on Rydberg-blockade-coupled atomic ensembles. Phys. Rev. A, 2010, 81: 052331

[Hillery 2000] Hillery M. Quantum cryptography with squeezed states. Phys. Rev. A, 2000, 61: 022309

[Huttner 1995] Huttner B,Imoto N, Gisin N and Mor T. Quantum cryptography with coherent states, Phys.Rev. A,1995,51(3):1863-1869

[Hwang 2003] Hwang W Y. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett., 2003, 91: 057901

[Jin 2010] Jin X M, Ren J G, Yang B, Yi Z H, Zhou F, Xu X F, Wang S K, Yang D, Hu Y F, Jiang S, Yang T, Yin, H, Chen K, Peng C Z and Pan J W. Experimental free-space quantum teleportation. Nature Photonics, 2010, 4: 376-381

[Kumavov 2006] Kumavor P D, Beal A C, Donkor E and Wang B C. Experimental Multiuser Quantum Key Distribution Network Using a Wavelength-Addressed Bus Architecture. Journal of Lightwave Technology, 2006,24(8): 3103

[Lance 2005] Lance M A, Symul T, Sharma V, Weedbrook C, Ralph C T and Lam P K. No-Switching Quantum Key Distribution Using Broadband Modulated Coherent Light. Phys. Rev. Lett., 2005, 95: 180503

[Leverrier 2009] Leverrier A and Grangier P. Unconditional security proof of long-distance continuous-variable quantum key distribution with a discrete modulation. Phys. Rev. Lett., 2009, 102:180504

[Li 2002] Li X Y, Pan Q, Jing J T, Zhang J, Xie C D and Peng K C. Quantum Dense Coding Exploiting a Bright Einstein-Podolskysen Beam. Phys. Rev. Lett., 2002, 88: 047904

[Lo 2005] Lo H K, Ma X F and Chen K. Decoy State Quantum Key Distribution. Phys. Rev. Lett., 2005, 94: 230504

[Mattle 1996] Mattle K, Weinfurter H, Kwiat P G and Zeilinger A. Dense Coding in Experimental Quantum Communication. Phys. Rev. Lett., 1996,76, 4656-4659

[Muller 1993] Muller A, Breguet J and Gisin N. Experimental demonstration of quantum cryptography using polarized photons in optical fiber over more than 1 km. Europhys. Lett., 1993, 23: 383-388

[Muller 1995] Muller A, Zbinden H and Gisin N. Underwater quantum coding. Nature, 1995, 378: 449

[Muller 1996] Muller A, Zbinden H and Gisin N. Quantum cryptography over 23km in installed under-lake telecom fibre. Europhys. Lett., 1996, 33: 335

[Ourjoumtsev 2009] Ourjoumtsev A , et al. Preparation of non-local superpositions of quasi-classical light states . Nature Phys., 2009, 5:189

[Peev 2009] Peev M, Pacher C, Alléaume R, et al. The SECOQC quantum key distribution network in Vienna. New Journal of Physics, 2009, 11: 075001

[Phoenix 1995] Phoenix S J D, Barnett S M, Townsend P D, et al. Multi-user quantum cryptography on optical networks. J. Modern. Opt., 1995, 42(6): 1155-1163

[Shen 2010] Shen Y, et al. Experimental study on discretely modulated continuous-variable quantum key distribution. Phys. Rev. A, 2010, 82: 022317

[Stucki 2002] Stucki G, Gisin N, Guinnard O, et al. Quantum key distribution over 67 km with a plug and play system. New J. Phys., 2002, 4: 41

[Stucki 2009] Stucki D, Walenta N, Vannel F, Thew R T, Gisin N, Zbinden H, Gray S, Towery C R and Ten S. High rate, long-distance quantum key distribution over 250km of ultra-low loss fibers. New J. Phys., 2009, 075003

[Symul 2007] Symul T et al. Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise. Phys. Rev. A, 2007, 76:030303(R)

[Ukowski 1993] Ukowski M, Zeilinger A, Horne M A and Ekert A K. “Event-ready-detectors” Bell experiment via entanglement swapping. Phys. Rev. Lett., 1993, 71: 4287

[Ursin 2007] Ursin R, Tiefenbacher F, Schmitt M T, Weier H, Scheidl T, Lindenthal M, Blauensteiner B, Jennewein T, Perdigues J, Trojek P, Omer B, Furst M, Meyenburg M, Rarity J, Sodnik Z, Barbieri C, Weinfurter H and Zeilinger A. Entanglement-based quantum communication over 144km. Nature Physics, 2007, 3: 481-486

[Vaidman 1994] Vaidman L. Teleportation of quantum states. Phys. Rev. A, 1994, 49: 1473-1476

[Villoresi 2008] Villoresi P, Jennewein T, Tamburini F, et al. New J. Phys., 2008, 10: 033038

[Wang 2005] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett., 2005, 94: 230503

[Yuan 2008] Yuan C Z, et al. Experimental demonstration of a BDCZ quantum repeater nod. Nature, 2008, 454: 1098

[Zhao 2007] Zhao B, et al. Robust Creation of Entanglement between Remote Memory Qubits. Phys. Rev. Lett., 2007, 98: 240502

[李士勇 2009] 李士勇, 李盼池. 量子计算与量子优化算法. 哈尔滨: 哈尔滨工业大学, 2009

[许方星 2009] 许方星,陈巍,王双等. 多层级量子密码城域网. 科学通报, 2009, 54(16): 2277-2283

[翟泽辉 2005] 翟泽辉,李永明,王少凯,郭 娟,张天才,郜江瑞. 连续变量量子隐形传态的实验研究. 物理学报,2005,54(6):254-260 cPxyYcEsiyJpHw6d4Mp0o8HwYcAGHF5VaHiYx+nHaw71wTqJ2oPi2LEp+1UoOADS

点击中间区域
呼出菜单
上一章
目录
下一章
×