D. Rosenberg, J. W. Harrington, P. R. Rice, et al. Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber[J]. Phys. Rev. Lett., 2007,98(1):010503.
[2]
H. Takesue, S. W. Nam, Q. Zhang, et al. Quantum key distribution over 40 dB channel loss using super- conducting single photon detectors[J]. Nature Photonics, 2007,1:343.
[3]
D. Stucki, N. Walenta, F. Vannel, et al. High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres[J]. New J. Phys., 2009,11(7):075003.
[4]
J. F. Dynes, H. Takesue, Z. L. Yuan,et al. Efficient entanglement distribution over 200 kilometers[J]. Opt. Express, 2009, 17(14):11440.
[5]
W. K. Wootters, W. H. Zurek. A single quantum cannot be cloned[J].Nature(London),1982, 299(588):802-803.
[6]
N. Gisin, G. Ribordy, T. Wolfgang, et al. Quantum cryptography[J]. Rev. Mod. Phys., 2002,74(1):145-195.
[7]
T. E. Chapuran, P. Toliver, N. A. Peters, et al. Optical networking for quantum key distribution and quantum communications[J]. N. J. Phys., 2009,11(10):105001.
[8]
S. Wang, W. Chen, Z. Q. Yin, et al. Field test of wavelength-saving quantum key distribution network [J]. Opt. Lett.,2010,35(14):2454.
[9]
T. Y. Chen, J. Wang, H. Liang, et al. Metropolitan all-pass and inter-city quantum communication network[J]. Opt. Express, 2010,18(26):27217.
[10]
M. Sasaki, M. Fujiwara, H. Ishizuka, et al. Field test of quantum key distribution in the Tokyo QKD Network [J]. Opt. Express,2011,19(11):10387.
[11]
Cao Dong, Song Yaoliang. Computationally secure bit commitment protocol based on quantum steganography[J]. Chinese Journal of Quantum Electronics(量子电子学报) ,2012, 29 (1): 63-68 (in Chinese)
[12]
Zhao Long,Cao Zhenwen,Luo Rui,et al. Multi-signature scheme based on quantum properties[J].Chinese Journal of Quantum Electronics(量子电子学报),2012,29 (1): 69-73 (in Chinese)
[13]
Jiang Jinya,Nie Min,Liu Xiaohui. Layered model of quantum signaling and realizable strategy of entanglement distribution layer function[J].Chinese Journal of Quantum Electronics(量子电子学报),2012,29 (5): 555-560 (in Chinese)
[14]
Jiang Zhongsheng, Lu Hongjun,Xie Guangjun. Multidimensional controllable quantum superdense coding information transfer[J].Chinese Journal of Quantum Electronics(量子电子学报),2013,30 (4): 450-454 (in Chinese)
[15]
Zhao Feng, Li Jingling. Analysis of the coefficient of QBER and it influence[J]. Journal of Optoelectronics?Laser(光电子.激光), 2010,21(9) :1383-1385 (in Chinese)
[16]
Liu Linyao, Humengjun,Lu Hongjun,et al. Quantum key distribution based on arbitrary BELL state[J]. Journal of Optoelectronics?Laser(量子电子学报), 2013,30 (4): 439-444 (in Chinese)
[17]
Kuritsyn K. Modification of error reconciliation scheme for quantum cryptography[C]. Proceedings of SPIE,2003, 5128:91-94.
[18]
Buttler WT, Lamoreaux SK, Torgerson JR et al. Fast, efficient error reconciliation for quantum cryptography[J]. Phys.Rev.A ,2003,67(5):052303.
[19]
Zhao Feng, Fu Mingxing, Wang Faqiang, et al. Error reconciliation for practical quantum cryptography[J]. Optik-International Journal for Light and Electron Optics,2007,118(10): 502-506
[20]
H. F. Zhang, J. Wang, K. Cui, et al. A Real-Time QKD System Based on FPGA[J].J. Light. Tech.,2012,30(20): 3226-3234
[21]
He Yucheng, Yang Li, Wang Xin-mei. Estamates for BER of error correcting codes in performance simulations[J]. Journal of China Institute of Communication(通信学报),2001,22(9):99-103 (in Chinese)
[22]
B.J. Frey,D.J.C.MacKay.Trellis-Constrained Codes[C]. Proceedings of 35th Allerton Conference on communication,1997,1-10.