[1] Chen Hui, Cao Yunfei, Li Zhenbang. Study on the Trends and Countermeasures for Quantum Secure Communication(量子保密通信发展趋势与对策探讨) [J]. Information Security And Communications Privacy (信息安全与通信保密), 2009(9):48–54 (in Chinese). [2] Dixon A. R., Dynes J. F., Lucamarini M., et al. High speed prototype quantum key distribution system and long term field trial [J]. Optics Express, 2015, 23(6):7583-7592. [3] Islam NT, Lim C., Cahall C., et al. Provably secure and high-rate quantum key distribution with time-bin qudits [J]. Science Advances, 2017, 3 (11). [4] Yin Hualei, Chen Tengyun, Yu Zongwen, et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber [J]. Phys. Rev. Lett, 2016, 117(19):190501. [5] Liao Shengkai, Cai Wenqi, Liu Weiyue, et al. Satellite-to-ground quantum key distribution [J]. Nature, 2017, 549(7670):43-47. [6] Liao Shengkai, Cai Wenqi, Handsteiner Johannes, et al. Satellite-Relayed Intercontinental Quantum Network [J]. Phys. Rev. Lett, 2018, 120(3):030501. [7] Zhang Liangliang, Zhang Yiwei, Liang Jie, et al. Information Security in New Quantum Technology Age(新量子技术时代下的信息安全) [J]. Computer Science (计算机科学), 2017, 44(7):1-7 (in Chinese). [8] Hwang WY. Quantum key distribution with high loss: toward global secure communication [J]. Physical Review Letters, 2003, 91(5):057901. [9] Lo H.K., Ma X., Chen K. Decoy state quantum key distribution [J]. Physical Review Letters, 2005, 94(23):230504. [10] Wang Xiangbin. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Physical Review Letters, 2005, 94(23):230503. [11] Jiang Yinghua, Zhang Shibing, Chang Yan, et al. Quantum key distribution protocol with two-way identity authentication(具有双向身份认证的量子密钥分发协议)[J]. Chinese Journal of Quantum Electronics(量子电子学报) , 2018, 1(8):49-53 (in Chinese). [12] Jin Biao, Liu Weiyue. Encoding module for key error correction in satellite-ground quantum key distribution(星地量子密钥分发中密钥纠错的编码模块)[J]. Chinese Journal of Quantum Electronics(量子电子学报) , 2017, 3(12):344-348 (in Chinese). [13] Liu Yang. The experimental study of long range Quantum key distribution system(远距离量子密钥分发系统的相关研究)[D]. Hefei: University of Science and Technology of China, 2012:90-92. [14] Assche G. Van. Quantum Cryptography and Secret-Key Distillation [M]. Cambridge University Press, 2006, (38):3-6. [15] Takahashi R., Tanizawa Y., Dixon A. R.. High-speed implementation of privacy amplification in quantum key distribution [J]. 6th Int. Conf. Quantum Cryptography, 2016. [16] Zhang Chunmei, Li Mo, Huang Jingzheng, et al. Fast implementation of length-adaptive privacy amplification in quantum key distribution [J]. China. Phys. B, 2014, 23(9). [17] Bennett Charles H., Brassard Gilles, Crepeau Claude, et al. Generalized privacy amplification [J]. IEEE Trans. On Information Theory, 1995, 41(6):1915-1923. [18] Krawczyk Hugo. LFSR-based hashing and authentication [J]. Advances in Cryptology-crypto 94, International Cryptology Conference, Santa Barbara, California, Usa, August, 1994, (839):129-139. [19] Ma Xiongfeng, Qi Bing, Zhao Yi, et al. Practical decoy state for quantum key distribution [J]. Physical Review A, 72.1 (2005): 012326. [20] Lo HoiKwong, Hoi Fung Chau, Ardehali Mohammed. Efficient quantum key distribution scheme and a proof of its unconditional security [J]. Journal of Cryptology, 2005, 18(2):133-165. [21] Wei Zhengchao, Wang Weilong, Zhang Zhen, et al. Decoy-state quantum key distribution with biased basis choice [J]. Scientific reports, 2013 , 3 (6147) :2453. [22] Tomamichel Marco, Lim C.C.W., Gisin Nicolas, et al. Tight finite-key analysis for quantum cryptography [J]. Nature communications, 2012, 3(48):634. [23] Fung C.H.F., Ma Xiongfeng, Chau H.F.. Practical issues in quantum-key-distribution post processing [J]. Physical Review A 2010, 81(1):012318. |