1. N. Chandran, V. Goyal, R. Moriarty, and R. Ostrovsky, Position Based Cryptography (Springer, Heidelberg, 2009), pp. 391–407.
2. C. H. Bennett, G. Brassard, in Quantum cryptography: Public key distribution and coin tossing: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (IEEE, New York, 1984), pp. 175–179.
3. A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
4. X. R. Yin, W. P. Ma, D. S. Shen, and L. L. Wang, Acta Phys. Sin. 62, 170304 (2013).
5. W. Jin, L. M. Zheng, F. Q. Wang, and R. S. Liang, Sci. China Inf. Sci. 56, 092304 (2013).