[1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. New York: IEEE, 1984: 175–179. [2] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999, 283: 2050–2056. [3] Shor P, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Physical Review Letters, 2000, 85: 441–444. [4] Renner R. Security of quantum key distribution[J]. International Journal of Quantum Information, 2008, 6(1): 1-127. [5] Kraus B, Gisin N, Renner R. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication [J]. Physical Review Letters, 2005, 95: 080501. [6] Renner R, Gisin N, Kraus B. Information-theoretic security proof for quantum-key-distribution protocols [J]. Physical Review A, 2005, 72: 012332. [7] Grosshans F, Grangier P. Continuous variable quantum cryptography using coherent states [J]. Physical Review Letters, 2002, 88(5): 057902. [8] Inoue K, Waks E, Yamamoto Y. Differential phase shift quantum key distribution [J]. Physical Review Letters, 2002, 89(3): 037902. [9] Sasaki T, Yamamoto Y, Koashi M. Practical quantum key distribution protocol without monitoring signal disturbance[J]. Nature, 2014, 509(7501): 475-478. [10] Ekert A K. Quantum cryptography based on Bell’s theorem [J]. Physical Review Letters, 1991, 67: 661–663. [11] Barrett J, Hardy L, Kent A. No signaling and quantum key distribution [J]. Physical Review Letters, 2005, 95: 010503. [12] Acin A, Brunner N, Gisin N, et al. Device-independent security of quantum cryptography against collective attacks [J]. Physical Review Letters, 2007, 98: 230501. [13] Arnon-Friedman R, Dupuis F, Fawzi O, et al. Practical device-independent quantum cryptography via entropy accumulation [J]. Nature Communications, 2018, 9(1): 459. [14] Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution [J]. Physical Review Letters, 2012, 108(13): 130503. [15] Lucamarini M, Yuan Z L, Dynes J F, et al. Overcoming the rate distance limit of quantum key distribution without quantum repeaters [J]. Nature, 2018, 557(7705): 400-403. [16] Hwang W Y. Quantum key distribution with high loss: Toward global secure communication [J]. Physical Review Letters, 2003, 91(5): 057901. [17] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Physical Review Letters, 2005, 94(23): 230503. [18] Lo H K, Ma X, Chen K. Decoy state quantum key distribution [J]. Physical Review Letters, 2005, 94(23): 230504. [19] Wang J D, Zhang Z M. Unconditional security of quantum key distribution based on practical devices[J]. Chinese Journal of Quantum Electronics (量子电子学报), 2014,31(4): 449-458(in Chinese ). [20] Mao Q P,Zhao S M,Wang L,et al.Measurement-device-independent quantum key distribution based on wavelength division multiplexing technology[J].Chinese Journal of Quantum Electronics(量子电子学报), 2017, 34(1): 46-53 (in Chinese).
|