[1]Li H W, Yin Z Q, Han Z F, et al.Security of practical phase-coding quantum key distribution[J].arXiv preprint, 2009, arXiv:0911(2938):1-4 [2]Bennett C H and Brassard G.Quantum cryptography: public key distribution and coin tossing[J].Proceedings of IEEE International Conference on Computers, Systems and Signal Processing Bangalore India (IEEE, 1984), 1984, 175(0):175-179 [3]Yuen H P.On the foundations of quantum key distribution-reply to renner and beyond[J].arXiv preprint, 2012, arXiv:1210(2804):1-10 [4]Elboukhari M, Azizi M, Azizi A.Analysis of the Security of BB84 by Model Checking[J].arXiv preprint, 2010, arXiv:1005(4504):1-12 [5]Hasegawa J, Hayashi M, Hiroshima T, et al.Security analysis of decoy state quantum key distribution incorporating finite statistics[J].arXiv preprint, 2007, arXiv:0707(3541):1-13 [6]Yuen H P.Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols[J].arXiv preprint, 2014, arXiv:1405(1683):1-27 [7]Lavale M.Analysis of Differential Phase Shift Quantum Key Distribution[J].arXiv preprint, 2011, arXiv:1110(4820):1-10 [8]Bennett C H.Quantum cryptography using any two nonorthogonal states[J].Physical Review Letters, 1992, 68(21):3121-3124 |