[1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. New York: IEEE, 1984. 175–179. [2] Lo H, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999, 283(5410): 2050-2056. [3] Shor P W, Preskill J. Simple Proof of Security of the BB84 Quantum Key Distribution Protocol [J]. Physical Review Letters, 2000, 85(2): 441-444. [4] Renner R, Gisin N, Kraus B, et al. Information-theoretic security proof for quantum-key-distribution protocols [J]. Physical Review A, 2005, 72(1): 012332. [5] Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices [J]. Quantum Information & Computation, 2004, 4(5):325-360. [6] Hwang W Y. Quantum key distribution with high loss: toward global secure communication [J]. Physical Review Letters, 2003, 91(5):057901. [7] Wang X B. Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography [J]. Physical Review Letters, 2005, 94(23):230503. [8] Lo H, Ma X, Chen K, et al. decoy state quantum key distribution [J]. Physical Review Letters, 2005, 94(23): 230504-230504. [9] Lutkenhaus N. Estimates for practical quantum cryptography [J]. Physical Review A, 1999, 59(5) 3301-3319. [10] Lutkenhaus N. Security against individual attacks for realistic quantum key distribution [J]. Physical Review A, 2000, 61(5): 052304. [11] Li H W, Wang S, Huang J, Chen W, et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources [J]. Physical Review A, 2011, 84(6): 062308. [12] Lydersen L, Wiechers C, Wittmann C, et al. Hacking commercial quantum cryptography systems by tailored bright illumination[J]. Nature Photonics, 2010, 4(10): 686-689. [13] Yuan Z L, Dynes J F, Shields A J, et al. Avoiding the blinding attack in QKD [J]. Nature Photonics, 2010, 4(12): 800-801. [14] Scarani V, Bechmannpasquinucci H, Cerf N, et al. The security of practical quantum key distribution [J]. Reviews of Modern Physics, 2009, 81(3): 1301-1350. [15] Jain N, Stiller B, Khan I, et al. Attacks on practical quantum key distribution systems (and how to prevent them) [J]. Contemporary Physics, 2016, 57(3): 366-387. [16] Bouda J, Pivoluska M, Plesch M, et al. Weak randomness seriously limits the security of quantum key distribution [J]. Physical Review A, 2012, 86(6): 062308. [17] Wang J D, Zhang Z M. Unconditional security of quantum key distribution based on practical devices [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2014,31(4): 449(in Chinese). 王金东,张智明,量子密钥分发系统的现实无条件安全性 [J].量子电子学报, 2014,31(4): 449 [18] Mao Q P, Zhao S M, Wang L, et al.Measurement-device-independent quantum key distribution based on wavelength division multiplexing technology[J].Chinese Journal of Quantum Electronics(量子电子学报), 2017, 34(1): 46-53 (in Chinese). 毛钱萍,赵生妹,王乐,钱陈辰,陈汉武, 基于波分复用技术的测量设备无关量子密钥分发 [J].量子电子学报, 2017, 34(1): 46-53 |