| [1]Grosshans F, Grangier P.Continuous variable quantum cryptography using coherent states[J].Physical Review Letters, 2002, 88(5):057902-
[2]Lodewyck J, Bloch M, García-Patrón R, et al.Quantum key distribution over 25 km with an all-fiber continuous-variable system[J].Physical Review A, 2007, 76(4):042305-
[3]Jouguet P, Kunz-Jacques S, Leverrier A, et al.Experimental demonstration of long-distance continuous-variable quantum key distribution[J].Nature photonics, 2013, 7(5):378-381
[4]Renner R, Cirac J I.de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography[J].Physical Review Letters, 2009, 102(11):110504-
[5]Leverrier A.Composable security proof for continuous-variable quantum key distribution with coherent states[J].Physical Review Letters, 2015, 114(7):070501-
[6]Leverrier A.Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction[J].Physical Review Letters, 2017, 118(20):200501-
[7]Leverrier A, Grangier P.Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation[J].Physical Review Letters, 2009, 102(18):180504-
[8]Liao Q, Liu H, Zhu L, et al.Quantum secret sharing using discretely modulated coherent states[J].Physical Review A, 2021, 103(3):032410-
[9]Liao Q, Xiao G, Xu C G, et al.Discretely modulated continuous-variable quantum key distribution with an untrusted entanglement source[J].Physical Review A, 2020, 102(3):032604-
[10]Lin J, Upadhyaya T, Lütkenhaus N.Asymptotic security analysis of discrete-modulated continuous-variable quantum key distribution[J].Physical Review X, 2019, 9(4):041064-
[11]Ghorai S, Grangier P, Diamanti E, et al.Asymptotic security of continuous-variable quantum key distribution with a discrete modulation[J].Physical Review X, 2019, 9(2):021059-
[12]Ma H X, Huang P, Bai D Y, et al.Long-distance continuous-variable measurement-device-independent quantum key distribution with discrete modulation[J].Physical Review A, 2019, 99(2):022322-
[13]Liao Q, Liu H, Gong Y, et al.Practical continuous-variable quantum secret sharing using plug-and-play dual-phase modulation[J].Optics Express, 2022, 30(3):3876-3892
[14]Navascués M, Grosshans F, Acin A.Optimality of Gaussian attacks in continuous-variable quantum cryptography[J].Physical Review Letters, 2006, 97(19):190502-
[15]García-Patrón R, Cerf N J.Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution[J].Physical Review Letters, 2006, 97(19):190503-
[16]Leverrier A, García-Patrón R, Renner R, et al.Security of continuous-variable quantum key distribution against general attacks[J].Physical Review Letters, 2013, 110(3):030502-
[17]Leverrier A, Grosshans F, Grangier P.Finite-size analysis of a continuous-variable quantum key distribution[J].Physical Review A, 2010, 81(6):062343-
[18]Ma X C, Sun S H, Jiang M S, et al.Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems[J].Physical Review A, 2013, 88(2):022339-
[19]Jouguet P, Kunz-Jacques S, Diamanti E.Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution[J].Physical Review A, 2013, 87(6):062313-
[20]Qin H, Kumar R, Alléaume R.Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution[J].Physical Review A, 2016, 94(1):012325-
[21]Qin H, Kumar R, Makarov V, et al.Homodyne-detector-blinding attack in continuous-variable quantum key distribution[J].Physical Review A, 2018, 98(1):012312-
[22]Ma X C, Sun S H, Jiang M S, et al.Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol[J].Physical Review A, 2013, 87(5):052309-
[23]Huang J, Wei Y, Yi J, et al.An improved knn based on class contribution and feature weighting[C]//2018 10th international conference on measuring technology and mechatronics automation (ICMTMA). IEEE, 2018: 313-316.
[24]Qin H, Kumar R, Alléaume R.Saturation attack on continuous-variable quantum key distribution system[C]//Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X. SPIE, 2013, 8899: 122-128.
[25]Huang P, Huang J, Wang T, et al.Robust continuous-variable quantum key distribution against practical attacks[J].Physical Review A, 2017, 95(5):052302-
[26]Huang J Z, Kunz-Jacques S, Jouguet P, et al.Quantum hacking on quantum key distribution using homodyne detection[J].Physical Review A, 2014, 89(3):032304-
[27]Hou W, Li D, Xu C, et al.An advanced k nearest neighbor classification algorithm based on KD-tree[C]//2018 IEEE International Conference of Safety Produce Informatization (IICSPI). IEEE, 2018: 902-905.
[28]Jolliffe I T, Cadima J.Principal component analysis: a review and recent developments[J].Philosophical transactions of the royal society A: Mathematical, Physical and Engineering Sciences, 2016, 374(2065):20150202-
|