[1] Wiesner S. Conjugate coding[J]. SIGACT News, 1983, 15:78-88. [2] Bennett C H, Brassard G, Breidbart S, et al. Quantum cryptography, orunforgeable subway tokens[A]. Advances in Cryptography: Proceedings of CRYPTO82[C]. New York: Plenum Press, 1983. 267-275. [3] Bennett C H, Brassard G. Quantum cryptography and its application toprovably secure key expansion, public-key distribution, and coin-tossing[A].IEEE International Symposium on Information Theory[C]. St-Jovite: Qebec Press, 1983. 91-95. [4] Bennett C H, Brassard G. Quantum cryptography: public-key distribution and coin tossing[A]. Proceedings of the International Conference on Computers, Systems and Signal Processing[C]. India: Bangalore Press, 1984. 175-179. [5] Ekert A K. Quantum cryptography based on Bell's theorem[J]. Phys Rev Lett, 1991, 67: 661-663. [6] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys Rev Lett, 1992, 68: 3 121-3 124. [7] Lütkenhaus N. Security against eavesdropping in quantum cryptography[J]. Phys Rev A, 1996, 54: 97-111. [8] Lütkenhaus N. Estimates for practical quantum cryptography[J]. Phys Rev A, 1999, 59: 3 301-3 319. [9] Brassard G, Lütkenhaus N, Mor T, et al. Security aspects of practical quantum cryptography[DB/OL]. http:∥arxiv.org/pdf/quant-ph/9911054,1999-11. [10] Dusek M, Haderka O, Hendrych M, et al. Quantum identificationsystem[J]. Phys Rev A, 1999, 60: 149-156. [11] Zeng G, Zhang W. Identity verification in quantum key distribution[J]. Phys Rev A, 2000, 61: 022303. [12] Liunggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution[J]. Phys Rev A, 2000, 62: 022305. [13] Shi B, Jian L, Liu J, et al. Quantum key distribution and quantum authentication based on entangled state[J]. Phys Lett A, 2001, 281: 83-87. [14] Mihara T. Quantum identification schemes with entanglements[J]. Phys Rev A, 2002, 65: 052326. [15] 郭奋卓, 温巧燕. 量子密钥分发中的验证方案[J]. 北京邮电大学学报,2003, 26(增刊): 54-56. Guo Fenzhuo, Wen Qiaoyan. Authentication in quantum key distribution[J]. Journal of Beijing University of Posts and Telecommunications, 2003,26(sup):54-56. |