^ (英文)N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography”, Rev. Mod. Phys.74, 145-195 (2002).
^(英文)V. Scarani, N. J. Cerf, M. Dusek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution”, Rev. Mod. Phys.81, 1301-1350 (2009).
^(英文)C. Elliott, “Building the quantum network”, New J. Phys.4, 46 (2002).
^(英文)C. Elliott, A. Colvin, D. Pearson, O. Pikalo, J.Schlafer, and H. Yeh, Current status of the DARPA Quantum Network, Quantum Information and Computation III, E. J. Donkor, A. R. Pirich, and H. E. Brandt, eds., Proc. SPIE 5815, 138--149 (2005).
^T.-Y. Chen, H. Liang, Y. Liu, W.-Q. Cai, L. Ju, W.-Y. Liu, J. Wang, H. Yin, K. Chen, Z.-B. Chen, C.-Z. Peng, and J.-W. Pan, “Field test of a practical secure communication network with decoy-state quantum cryptography”, Opt. Exp.17, 6540-6549 (2009). [1] (页面存档备份,存于互联网档案馆) 于2010年4月1日查阅
^China creates quantum network. Physics World June 2009 p.11 (2009)
^(英文)C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-X. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang, and J.-W. Pan, “Experimental Long-Distance Decoy-State Quantum Key Distribution Based on Polarization Encoding”, Phys. Rev. Lett.98, 010505 (2007).
^(英文)D. Rosenberg, J. W. Harrington, P. R. Rice, P. A. Hiskett, C. G. Peterson, R. J. Hughes, A. E. Lita, S. W. Nam, and J. E. Nordholt, “Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber”, Phys. Rev. Lett.98, 010503 (2007).
^(英文)T. Schmitt-Manderbach, H. Weier, M. Fürst, R. Ursin, F. Tiefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, C. Kurtsiefer, J. G. Rarity, A. Zeilinger, and H. Weinfurter , “Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km”, Phys. Rev. Lett.98, 010504 (2007).