[1]Rivest R L, Shamir A, Aleman L. A method for obtaining digital signatures and public key cryptosystems[J]. Communications of ACM, 1978, 21(2): 120126[2]Biham E, Shamir A. Differential cryptanalysis of deslike cryptosystems[J]. Journal of Cryptology, 1991, 41(3): 372[3]Koblitz N, Menezes A. A survey of public key cryptosystems[OL].[20170404]. http:www.cacr.math.uwaterloo.caajmenezepublicationspublickey.pdf[4]Smith P, Lennon M. Luc: A new public key system[COL] Proc of the 9th Int Conf on Information Seccurity. 1993 [20170606]. http:docplayer.net15001400Lucanewpublickeysystem.html[5]邓元庆, 龚晶, 石灰. 密码学简明教程[M]. 北京: 清华大学出版社, 2011: 610[6]Bennett C H, Brassard G. Quantum cyptography: Public key distribution and coin tossing[JOL]. Theoretical Computer Science, 2011 [20170606]. http:www.sciencedirect.comsciencearticlepiiS0304397514004241[7]Renner R. Security of quantum key distribution[J]. International Journal of Quantum Information, 2008, 6(1): 1127[8]Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography[J]. Reviews of Modern Physics, 2002, 74(1): 145195[9]Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances[J]. Science, 1999, 283(5410): 20502056[10]Andrew S. Tanenbaum, Computer Networks Solutions Manual[MOL]. 4th ed.[20170404]. https:wenku.baidu.comview329a727a31b765ce0508148b.html