[1] Ma Ruilin. Quantum Cryptography Communication(量子密码通信)[M].Beijing: Science Press, 2006(in Chinese). [2] Schmid C, Trojek P, Bourennane M, et al. Experimental single qubit quantum secret sharing[J]. Physical Review Letters, 2005, 95(23): 230505. [3] Bogdanski J, Rafiei N, Bourennane M. Experimental quantum secret sharing using telecommunication fiber[J]. Physical Review A, 2008, 78(6): 062307. [4] Tang Y L, Yin H L, Chen S J, et al. Measurement-device-independent quantum key distribution over 200 km[J]. Physical Review Letters, 2014, 113(19): 190501. [5] Stucki D, Legre M, Buntschu F, et al. Long-term performance of the Swiss quantum key distribution network in a field environment[J]. New Journal of Physics, 2011, 13(12): 123001. [6] Marand C, Townsend P D. Quantum key distribution over distances as long as 30 km[J]. Optics Letters, 1995, 20(16): 1695-1697. [7] Muller A, Herzog T, Huttner B, et al. “Plug and play” systems for quantum cryptography[J]. Applied Physics Letters, 1997, 70(7): 793-795. [8] Muller A, Zbinden H, Gisin N. Quantum cryptography over 23 km in installed under-lake telecom fibre[J]. Europhysics Letters, 1996, 33(5): 335 . [9] Ursin R, Tiefenbacher F, Schmitt-Manderbach T, et al. Entanglement-based quantum communication over 144 km[J]. Nature Physics, 2007, 3(7): 481-486. [10] Stucki D, Walenta N, Vannel F, et al. High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres[J]. New Journal of Physics, 2009, 11(7): 075003. [11] Korzh B, Lim C C W, Houlmann R, et al. Provably secure and practical quantum key distribution over 307 km of optical fibre[J]. Nature Photonics, 2015, 9(3): 163-168. [12] Yin H L, Chen T Y, Yu Z W, et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber[J]. Physical review letters, 2016, 117(19): 190501. [13] Xu B, Peng X, Guo H. Passive scheme with a photon-number-resolving detector for monitoring the untrusted source in a plug-and-play quantum-key-distribution system[J]. Physical Review A, 2010, 82(4): 042301. [14] Lo H K, Ma X, Chen K. Decoy state quantum key distribution[J]. Physical Review Letters, 2005, 94(23): 230504. [15] Curty M, Lo H K. Quantum key distribution secure against partly malicious devices[C]. Quantum Information and Measurement, Optical Society of America, 2017: QF3B.4. [16] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[J]. Theoretical Computer Science, 2014, 560: 7-11. [17] Martinelli M. A universal compensator for polarization changes induced by birefringence on a retracing beam[J]. Optics Communications, 1989, 72(6): 341-344. [18] Hillery M, Buzek V, Berthiaume A. Quantum secret sharing[J]. Physical Review A, 1999, 59(3):1829 . |