1] Miao Chunhua, Zhang Chunmei, He Deyong, et al. Field and long-term demonstration of a wide area quantum key distribution network[J]. Optics Express, 2014, 22(18): 21739-21756.
[2] Wang Chao, Song Xiaotian, Yin Zhenqiang, et al. Phase-reference-free experiment of measurement-device-independent quantum key distribution[J]. Physical Review Letters, 2015, 115(16): 160502.
[3] Wang Shuang, Yin Zhenqiang, Chen Wei, et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring[J]. Nature Photonics, 2015, 9: 832-836.
[4] Ding Yuyang, Chen Hua, Wang Shuang, et al. Polarization variations in installed fibers and their influence on quantum key distribution systems[J]. Optics Express, 2017, 25(22): 27923-27936.
[5] Nakazawa M, Yoshida M, Hirooka T, et al. QAM quantum noise stream cipher transmission over 100 km with continuous variable quantum key distribution[J]. IEEE Journal of Quantum Electronics, 2017, 53(4): 1-16.
[6] Wu Min, Liao Changjun, Liu Songhao. Research on extending quantum key approach based on QKD systems[J].
Acta Sinica Quantum Optica(量子光学学报), 2005, 11(2): 69-73(in Chinese).
[7] Jian Li, Lu Yuncan, Yang Chun, et al. Research on extending quantum key approach based on QKD[J]. Chinese Journal of Quantum Electronics(量子电子学报), 2008, 25(1): 65-70(in Chinese).
[8] Donnet S, Thangaraj A, Bloch M, et al. Security of Y-00 under heterodyne measurement and fast correlation attack[J]. Physics Letters A, 2006, 356(6): 406-410.
[9] Shimizu T, Hirota O, Nagasako Y. Running key mapping in a quantum stream cipher by the Yuen 2000 protocol[J]. Physical Review A, 2008, 77(3): 1012-1015.
[10] Kanter G S, Reilly D, Smith N. Practical physical-layer encryption: The marriage of optical noise with traditional cryptography[J]. IEEE Communications Magazine, 2009, 47(11): 74-81.
[11] Lu Yuan, Huang Peng, Zhu Jun, et al. The practical security and performance analysis of the quantum data stream cipher system by the αη protocol[J]. Acta Physica Sinica, 2012, 61(8): 80301.
[12] Douglas R S. Cryptography: Theory and Practice[M], 3rd edition. Dengguo F,译. Beijing: Electronic Industry Press, 2016.
[13] Jiao H S, Pu T, Zheng J L, et al. Physical-layer security analysis of a quantum-noise randomized cipher based on the wire-tap channel model[J]. Optics Express, 2017, 25(10): 10947-10960.
[14] NIST SP 800-22: Download Documentation and Software [OL]. https://csrc.nist.gov/projects/random-bit-generation/documentation-and-software.
[15] Zhang Yongqiang, Li Shunbo, Qu Shuai, et al. NIST randomness test method and application[J]. Computer Knowledge and Technology(电脑知识与技术), 2014, 26(3): 6064-6066(in Chinese). |