1Bennett.C.H,Brassard.G.Quantum cryptography:publish-key distribution and coin tossing [A].IEEE International Conference on Computem, Systems and Signal Processing[C], 1984:175- 179.
2Ekert.A.K,Quantum cryptography based on bellg theoremcf[J]. Physical Review Letters, 1991,67(6) :661-663.
2Shor P W. in Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, (IEEE Computer Society Press, Los Alamitos, CA, 1994) 124-133.
3Grover L K. Phys Rev Lett, 1997, 79(2):325-328.
4Chuang I L. Vandersypen L M K, Zhou X, et al. Nature, 1998, 393(6681):143-146.
5Bennett C H, Brassard G. Proc. IEEE Internat. Conf. On Computers, Systems and Signal Processing, Bangalore, New York,IEEE, 1984, P175.
6Bennett C H, Brassard G. SIGACT news, 1989, 20:78.
7Bennett C H, Brassard G, Crepeau C, et al. Phys Rev Lett, 1993, 70(13 ):1895-1899.
8Bouwmeester D, Pan J W, Mattle K, et al. Nature, 1997, 390(6660):575-579.
9Wootters W K, Zurek W H. Nature, 1982, 299:802.
10Davidovich L, Zagury N, Brune M, et al. Phys Rev A, 1994, 50(2):R895-R898.