[1] BENNETT C H,BRASSARD G,EKERT A K.Quantum cryptography[J].Scientific American,1992,267(4):26-33. [2] TOYRAN M.Quantum cryptography[C]//Proceedings of IEEE Conference on Signal Processing and Communica-tions Applications.Washington D.C.,USA:IEEE Press,2007:1-4. [3] ZBINDEN H.Quantumcryptography[J].Applied Physics B,1998,67(6):743-748. [4] CANETTI R.Universally composable security:a new paradigm for cryptographic protocols[C]//Proceedings of IEEE Symposium on Foundations of Computer Science.Washington D.C.,USA:IEEE Press,2001:15-23. [5] FERGUSON N,KELSEY J,LUCKS S,et al.Improved cryptanalysis of Rijndael[M]//KNUDSEN L.Fast software encryption.Berlin,Germany:Springer,2000:213-230. [6] BIRYUKOV A,CANNIōRE C D.Data Encryption Standard(DES)[J].Encyclopedia of Cryptography and Security,2011,28(2):295-301. [7] COPPERSMITH D,JOHNSON D B,MATYAS S M.A proposed mode for triple-DES encryption[J].IBM Journal of Researchand Development,1996,40(2):253-262. [8] BORST J,KNUDSEN L R,RIJMEN V.Two attacks on reduced IDEA[C]//Proceedings of International Conference on Theory and Application of Cryptographic Techniques.Washington D.C.,USA:IEEE Press,1997:256-263. [9] ALLÉAUME R,BRANCIARD C,BOUDA J,et al.Using quantum key distribution for cryptographic purposes:a survey[J].Theoretical Computer Science,2014,560:62-81. [10] PRENEEL B,ROMPAY B V,ÖRS S B,et al.Performance of optimized implementations of the NESSIE primitives[EB/OL].[2018-10-05].https://www.cosic.esat.kuleuven.be/nessie/deliverables/D21-v2.pdf. [11] DIFFIE W,HELLMAN M.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654. [12] GORDON J.Strong RSA keys[J].Electronics Letters,1984,20(12):514-516. [13] ELGAMAL T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1984,31(4):469-472. [14] KOBLITZ N.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48(177):203-209. [15] GROVER L K.Quantum mechanics helps in searching for a needle in a haystack[J].Physical Review Letters,1997,79(2):325-328. [16] BIHAM E,BOYER M,BOYKIN P O,et al.A proof of the security of quantum key distribution[C]//Proceedings of the 32nd Annual ACM Symposium on Theory of Computation.New York,USA:ACM Press,2000:715-724. [17] SHOR P W,PRESKILL J.Simple proof of security of the BB84 quantum key distribution protocol[J].Physical Review Letters,2000,85(2):441-444. [18] BENNET C H.Quantum cryptography:public key distribution and coin tossing[C]//Proceedings of IEEE International Conference on Computers,Systems,and Signal Processing.Washington D.C.,USA:IEEE Press,1984:175-179. [19] LO H K,MA X,CHEN K.Decoy state quantum key distribution[J].Physical Review Letters,2005,94(23):1-4. [20] BENNETT C H.Quantum cryptography using any two nonorthogonal states[J].Physical Review Letters,1992,68(21):3121-3124. [21] BRAUNSTEIN S L,PIRANDOLA S.Measurement-device-independent quantum key distribution[EB/OL].[2018-10-05].https://arxiv.org/abs/1109.1473. [22] KORZH B,LIM C C W,HOULMANN R,et al.Provably secure and practical quantum key distribution over 307 km of optical fibre[J].Nature Photonics,2014,9(3):163-168. [23] PARK D K,SON J W,CHA S K,et al.Effect of decoherence in Ekert-protocol[EB/OL].[2018-10-05].https://arxiv.org/pdf/0906.0233.pdf. [24] WIESNER S.Conjugate coding[J].ACM SIGACT News,1983,15(1):78-88. [25] ROSENBERG D,PETERSON C G,HARRINGTON J,et al.Long-distance quantum key distribution in optical fiber[J].New Journal of Physics,2006,8(9):1-3. [26] MORROW A,HAYFORD D,LEGRÉ M.Battelle QKD test bed[C]//Proceedings of 2012 IEEE Conference on Technologies for Homeland Security.Washington D.C.,USA:IEEE Press,2013:162-166. [27] SHIMIZU K,HONJO T,FUJIWARA M,et al.Performance of long-distance quantum key distribution over 90-km optical links installed in a field environment of Tokyo metropolitan area[J].Journal of Lightwave Technology,2014,32(1):141-151. [28] HERBST T,MA X S,SCHEIDL T,et al.143 km free-space quantum teleportation[EB/OL].[2018-10-05].https://spie.org/Publications/Proceedings/Paper/10.1117/12.2061981. [29] SHAO Jin,WU Ling'an.Experiment of quantum cryptography communication with single photon polarization state[J].Acta Sinica Quantum Optica,1995,1(1):41-44.(in Chinese) 邵进,吴令安.用单光子偏振态的量子密码通信实验[J].量子光学学报,1995,1(1):41-44. [30] LIANG Chuang,FU Donghao,LIANG Bing,et al.Quantum key distribution over 1.1 km in an 850 nm experimental all-fiber system[J].Acta Physica Sinica,2001,50(8):1429-1433.(in Chinese) 梁创,符东浩,梁冰,等.850 nm光纤中1.1 km量子密钥分发实验[J].物理学报,2001,50(8):1429-1433. [31] TANG Yanlin,YIN Hualei,CHEN Sijing,et al.Measure-ment-device-independent quantum key distribution over 200 km[EB/OL].[2018-10-05].https://arxiv.org/abs/1407.8012v1. [32] YIN Hualei,CHEN Tengyun,YU Zongwen,et al.Measurement-device-independent quantum key distribution over a 404 km optical fiber[J].Physical Review Letters,2016,117(19):1-15. [33] WANG Shuang,CHEN Wei,GUO Junfu,et al.2 GHz clock quantum key distribution over 260 km of standard telecom fiber[J].Optics Letters,2012,37(6):1008-1010. [34] STUCKI D,WALENTA N,VANNEL F,et al.High rate,long-distance quantum key distribution over 250 km of ultra low loss fibres[J].New Journal of Physics,2009,11(7):10632-10639. [35] TAKESUE H,NAM S W,ZHANG Q,et al.Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors[J].Nature Photonics,2007,1(17):343-348. [36] PENG Chengzhi,LIANG Hao,WANG Jian,et al.Decoy-state quantum key distribution with polarized photons over 200 km[J].Optics Express,2010,18(8):8587-8594. [37] NAMEKATA N,TAKESUE H,HONJO T,et al.High-rate quantum key distribution over 100 km using ultra-low-noise,2-GHz sinusoidally gated InGaAs/InP avalanche photodiodes[J].Optics Express,2011,19(11):1-8. [38] ROSENBERG D,PETERSON C,HARRINGTON J,et al.Practical long-distance quantum key distribution system using decoy levels[J].New Journal of Physics,2009,11(4):1-9. [39] YUAN Z L,DIXON A,DYNES J,et al.Practical gigahertz quantum key distribution based on avalanche photo-diodes[J].New Journal of Physics,2009,11(4):1-11. [40] JIN Lin.Research progress of quantum radar[J].Modern Radar,2017,39(3):1-7.(in Chinese) 金林.量子雷达研究进展[J].现代雷达,2017,39(3):1-7. [41] BENNETT C H,BRASSARD G.Quantum cryptography:public key distribution and coin tossing[J].Theoretical Computer Science,2014,560:7-11. [42] BEHAR-COHEN F F,SAVOLDELLI M,PAREL J M,et al.Quantum random number generator[J].Proceedings of SPIE,2006,78(4):54-60. [43] JENNEWEIN T,ACHLEITNER U,WEIHS G,et al.A fast and compact quantum random number generator[J].Review of Scientific Instruments,2000,71(4):1675-1680. [44] STEFANOV A,GISIN N,GUINNARD O,et al.Optical quantum random number generator[J].Journal of Modern Optics,2000,47(4):595-598. [45] ASSCHE G V.Quantum cryptography and secret-key distillation:bibliography[M].Cambridge,UK:Cambridge University Press,2006. [46] STEBILA D,MOSCA M,LÜTKENHAUS N.The case for quantum key distribution[J].Physics,2009,36(5):283-296. [47] RAUB D,STEINWANDT R,MVLLERQUADE J.On thesecurity and composability of the one time pad[J].Astronomical Journal,2004,81(49):288-297. [48] PIVK M,KOLLMITZER C,RASS S.SSL/TLS with quantum cryptography[C]//Proceedings of International Conference on Quantum.Washington D.C.,USA:IEEE Press,2009:96-101. [49] FARAJ S T.A novel extension of SSL/TLS based on quantum key distribution[C]//Proceedings of International Conference on Computer and Communication Engineering.Washington D.C.,USA:IEEE Press,2008:919-922. [50] LIU Dong,WANG Shuang,ZHOU Jing,et al.Application of quantum keys in SSL VPN of power grid[J].Power System Technology,2014,38(2):544-548.(in Chinese) 刘东,王双,周静,等.量子密钥在电网SSL VPN中的应用[J].电网技术,2014,38(2):544-548. [51] HUANG Peng,LIU Ye,ZHOU Nanrun,et al.A secure quantum virtual private network scheme in passive optical network[J].Journal of Electronics and Information Technology,2009,31(7):1758-1762.(in Chinese) 黄鹏,刘晔,周南润,等.基于PON网络的安全量子VPN方案[J].电子与信息学报,2009,31(7):1758-1762. [52] GHILEN A,AZIZI M,BOUALLEGUE R.Q-OpenVPN:a new extension of OpenVPN based on a quantum scheme for authentication and key distribution[C]//Proceedings of International Conference on Cryptology and Network Security.Berlin,Germany:Springer,2015:238-247. [53] ZHANG Zongdong,ZENG Guihua.New model of virtual private network with QKD and IPSec[J].Computer Engineering,2005,31(19):141-143.(in Chinese) 章宗东,曾贵华.基于QKD和IPSec技术的新型虚拟专用网模型[J].计算机工程,2005,31(19):141-143. [54] FAROUK A,TARAWNEH O,ELHOSENY M,et al.IPsec multicast architecture based on quantum key distribution,quantum secret sharing and measurement[M]//HASSANIEN A E,ELHOSENY M,KACPRZYK J.Quantum computing:an environment for intelligent large scale real application.Berlin,Germany:Springer,2018:123-142. [55] METWALY A F,RASHAD M Z,OMARA F A,et al.Architecturefor secured centralized and decentralized IPsec multicast based on quantum key distribution[J].International Journal of Intelligent Computing and Information Sciences,2015,15(3):1-17. [56] ELLIOTT C,PEARSON D,TROXEL G.Quantum cryptography in practice[J].ACM SIGCOMM Computer Communication Review,2003,33(4):227-238. [57] SOBOTA M,KAPCZYNSKI A,BANASIK A.Application of quantum cryptography protocols in authentication process[C]//Proceedings of IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.Washington D.C.,USA:IEEE Press,2011:799-802. [58] GOTTESMAN D.Quantum Authentication[M]//ZENG Guihua.Quantum private communication.Berlin,Germany:Springer,2010:449-458. [59] DONALDSON R J,COLLINS R J,KLECZKOWSKA K,et al.Experimental demonstration of kilometer-range quantum digital signatures[J].Physical Review A,2016,93(1):1-14. [60] WANG Jian,ZHANG Quan,TANG Chaojing.Efficient quantum signature protocol of classical messages[J].Journal of Communications,2007,28(1):64-68.(in Chinese) 王剑,张权,唐朝京.针对经典消息的高效量子签名协议[J].通信学报,2007,28(1):64-68. [61] CLARKE P J,COLLINS R J,DUNJKO V,et al.Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light[J].Nature Communications,2011,3(6):1-60. [62] LEE H,HONG C H,KIM H,et al.Arbitrated quantum signature scheme with message recovery[J].Physics Letters A,2004,321(5):295-300. [63] LIU Yi,LIU Xingtong,WANG Jian,et al.Security analysis of electronic payment protocols based on quantum cryptography[C]//Proceedings of International Conference on Information Science and Control Engineering.Washington D.C.,USA:IEEE Press,2017:1709-1712. [64] PRASAD R S,MURALI G.Quantum cryptography based solution for secure and efficient key management for e-governance in India[C]//Proceedings of International Conference on Applied and Theoretical Computing and Communication Technology.Washington D.C.,USA:IEEE Press,2016:18-26. [65] SUNDAR D S,NARAYAN N.A novel voting scheme using quantum cryptography[C]//Proceedings of 2014 IEEE Conference on Open Systems.Washington D.C.,USA:IEEE Press,2015:66-71. [66] LIMAR I,VASILIU Y,KARPIŃSKI M,et al.Security amplification of the computer-aided voting system using quantum cryptography protocols[C]//Proceedings of IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems:Technology and Applications.Washington D.C.,USA:IEEE Press,2017:1-4. [67] KESTER Q A,NANA L,PASCU A C.A novel cryptographic encryption technique of video images using quantum cryptography for satellite communications[C]//Proceedings of International Conference on Adaptive Science and Technology.Washington D.C.,USA:IEEE Press,2014:1-6. [68] HAN Jiawei,LIU Yanheng,SUN Xin,et al.Enhancing data and privacy security in mobile cloud computing through quantum cryptography[C]//Proceedings of IEEE International Conference on Software Engineering and Service Science.Washington D.C.,USA:IEEE Press,2017:398-401. [69] XIAO Lei,LÜ Lei,YANG Xue,et al.Application of quantum communication in power dispatching system[J].Telecommunications Science,2017,33(S):202-205.(in Chinese)肖磊,吕磊,杨雪,等.量子通信在电力调度系统应用分析[J].电信科学,2017,33(增刊):202-205. [70] ZHOU Jing,LU Lifeng,LEI Yuqing,et al.Research on improving security of protection for power system secondary system by quantum key technology[J].Power System Technology,2014,38(6):1518-1522.(in Chinese)周静,卢利锋,雷煜卿,等.量子密钥技术提升电力系统二次防护安全性研究[J].电网技术,2014,38(6):1518-1522. [71] MIRZA A,SENEKANE M,PETRUCCIONE F,et al.Suitability of quantum cryptography for national facilities[C]//Proceedings of ISSA'14.Washington D.C.,USA:IEEE Press,2014:1-7. [72] ZHANG Hongtao,HU Shunxing,XU Hui,et al.Design of embedded video surveillance system based on quantum cryptography[C]//Proceedings of 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications.Washington D.C.,USA:IEEE Press,2014:914-918. [73] WANG Dong,LI Guochun,YU Xuehao,et al.Construction contemplation of cloud platform for domestic password service based on quantum secret communication[J].Telecommunications Science,2018,34(7):171-178.(in Chinese)王栋,李国春,俞学豪,等.基于量子保密通信的国产密码服务云平台建设思路[J].电信科学,2018,34(7):171-178. [74] PATTARANANTAKUL M,JANTHONG A,SANGUANNAM K,et al.Secure and efficient key management technique in quantum cryptography network[C]//Proceedings of International Con-ference on Ubiquitous and Future Networks.Washington D.C.,USA:IEEE Press,2012:280-285. |