[1]Lo H K, Chau H F.Unconditional security of quantum key distribution over arbitrarily long distances[J].Science, 1999, 283(5410):2050-2056[2]Shor P W, Preskill J.Simple proof of security of the BB84 quantum key distribution protocol[J].Physical Review Letters, 2000, 85(2):441-[3]Ma X, Qi B, Zhao Y, et al.Practical decoy state for quantum key distribution[J].Physical Review A, 2005, 72(1):012326-[4]Wang X B.Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors[J].Physical Review A, 2013, 87(1):012320-[5]胡康, 毛钱萍, 赵生妹.基于预报单光子源和探测器诱骗态的循环差分相移量子密钥分发协议[J].光学学报, 2017, 37(05):339-345[6]Mao Q P, Wang L, Zhao S M.Efficient quantum key distribution based on hybrid degrees of freedom[J].Laser Physics, 2019, 29(8):085201-[7]Wang L, Zhao S M, Gong L Y, et al.Free-space measurement-device-independent quantum key distribution protocol using decoy states with orbital angular momentum[J].Chinese Physics B, 2015, 24(12):120307-[8]Mao Q P, Wang L, Zhao S M.Plug-and-play round-robin differential phase-shift quantum key distribution[J].[J].Scientific Reports, 2017, 7(1):15435-[9]Wang L, Zhao S.Round-robin differential-phase-shift quantum key distribution with heralded pair-coherent sources[J].Quantum Information Processing, 2017, 16(4):100-[10]Bennett C H, Brassard G, Robert J M.Privacy amplification by public discussion[J].[J].SIAM Journal on Computing, 1988, 17(2):210-229[11]Leverrier A, Alleaume R, Boutros J.et alMultidimensional reconciliation for a continuous-variable quantum key distribution[J].Physical Review A, 2008, 77(4):042325-[12]Bloch M, Andrew T, Steven W.Efficient reconciliation of correlated continuous random variables using LDPC codes[J/OL].[J].arXiv preprint, 2005, 05:0509041-[13]Grosshans F, Gilles V A, Jerome W, et al.Quantum key distribution using gaussian-modulated coherent states[J].Nature, 2003, 421(6920):238-241[14]Zhao S M, Shen Z G, Xiao H, Wang, L.Multidimensional reconciliation protocol for continuous-variable quantum key agreement with polar coding[J].Science China Physics, Mechanics, and Astronomy, 2018, 61(9):90323-[15]Nguyen K C, Van Assche G, Cerf N J.Side-information coding with turbo codes and its application to quantum key distribution[J/OL].[J].arXiv preprint, 2004, 04:0406001-[16]Arikan E.Channel polarization: A method for constructing capacity-achieving codes for symmetry binary-input memoryless channels[J].IEEE Transactions on Information Theory, 2009, 55(7):3051-3073 |