[1] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Physical Review Letters, 2000, 85(2): 441-444. [2] Zhuansun Shaoshuai, Chen Hong. A quantum deterministic key distribution based on W states [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2014, 31(6): 734-739 (in Chinese). [3] Zhansun Shaoshuai, Chen Hong, Cai Xiaoxia. Quantum deterministic key distribution protocol based on GHZ states entanglement swapping [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2015, 32(1): 83-89 (in Chinese). [4] Wang Haihong, Zhao Shengmei, Gong Longyan. A quantum key distribution protocol based on challenge-response mechanism [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2015, 32(4): 452-458 (in Chinese). [5] Mao Qingping, Zhao Shengmei, Wang Le, et al. Measurement-device-independent quantum key distribution based on wavelength division multiplexing technology [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2017, 34(1): 46-53 (in Chinese). [6] Jin Biao, Liu Weiyue. Encoding module for key error correction in satellite-ground quantum key distribution [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2017, 34(3): 344-348 (in Chinese). [7] Chen Xiaofeng, Liu Xiaofen. Mutual authenticated multiparty quantum key distribution based on single particle state [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2017, 34(3): 369-373 (in Chinese). [8] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 1984: 175-179. [9] Zhang Zhiyong, Wang Yanbo, He Min, et al. Intercept-resent eavesdropping in polarization-drift quantum cryptography based on B92 Protocol [J]. Chinese Journal of Quantum Electronics(量子电子学报),2016,33(1):44-50 (in Chinese). [10] Wang Le, Zou Li, Zhao Shengmei. A novel quantum secret sharing with a trustful center [J]. Chinese Journal of Quantum Electronics(量子电子学报),2014, 31(5): 591-598 (in Chinese). [11] Wang Jindong, Zhang Zhiming. Unconditional security of quantum key distribution based on practical devices [J]. Chinese Journal of Quantum Electronics (量子电子学报),2014, 31(4): 449-458 (in Chinese). [12] Huang Jingzheng. Practical Security Analysis of Quantum Key Distribution System(量子密钥分配系统实际安全性研究)[D]. Hefei: Doctorial Dissertation of University of Science and Technology of China, 2014: 6-7(in Chinese). [13] Zhao Yibo, Fung C H F, Han Zhengfu, et al. Security proof of differential phase shift quantum key distribution in the noiseless case [J]. Physical Review A, 2008, 78(4): 042330. [14] Koashi M. Simple security proof of quantum key distribution based on complementarity [J]. New Journal of Physics, 2009, 11(4): 045018. [15] Wen K, Tamaki K, Yamamoto Y. Unconditional security of single-photon differential phase shift quantum key distribution [J]. Physical Review Letters, 2009, 103(17): 170503. [16] Inamori H, Lütkenhaus N, Mayers D. Unconditional security of practical quantum key distribution [J]. The European Physical Journal D-Atomic, Molecular, Optical and Plasma Physics, 2007, 41(3): 599-627. [17] Hayashi M, Tsurumaru T. Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths [J]. New Journal of Physics, 2012, 14(9): 093014. [18] Hayashi M, Nakayama R. Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths [J]. New Journal of Physics, 2014, 16(6): 063009. [19] Qi B, Fung C H F, Lo H K, et al. Time-shift attack in practical quantum cryptosystems [J]. Quantum Information and Computation, 2007, 7(1): 73-82. [20] Makarov V, Brylevski A, Hjelme D R. Real-time phase tracking in single-photon interferometers [J]. Applied Optics, 2004, 43(22): 4385-4392. [21] Tang Yanlin. Experimental Study of Security in Practical Quantum Key Distribution System(实际量子密钥分发系统安全性的实验研究) [D]. Hefei: Doctorial Dissertation of University of Science and Technology of China, 2015: 7-9(in Chinese). [22] Curty M, Lütkenhaus N. Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses [J]. Physical Review A, 2005, 71(6): 062301. [23] Gottesman D, Lo H K, Lütkenhaus N, et al. Security of quantum key distribution with imperfect devices [J]. Quantum Information and Computation, 2004, 4(5): 325-360. |