[1] |
Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing [C]. Proceedings of IEEE, International
|
|
Conference on Computers, Systems and Signal Processing, 1984: 175-179.
|
[2] |
Ekert A. Quantum cryptography based on Bell’s theorem [J]. Physical Review Letters, 1991, 67(6): 661-663.
|
[3] |
Lo H, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999,
|
28 |
3(5410): 2050-2056.
|
[4] |
Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Physical Review Letters,
|
20 |
00, 85(2): 441-444.
|
[5] |
Renner R. Security of quantum key distribution [J]. International Journal of Quantum Information, 2008, 6(1): 1-127.
|
[6] |
Scarani V, Bechmann-Pasquinucci H, Cerf N J, et al. The security of practical quantum key distribution [J]. Reviews of Modern
|
|
Physics, 2009, 81(3): 1301-1350.
|
[7] |
Jain N, Stiller B, Khan I, et al. Attacks on practical quantum key distribution systems (and how to prevent them) [J]. Contemporary
|
|
Physics, 2016, 57(3): 366-387.
|
[8] |
Li H,Wang S, Huang J, et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter
|
|
and multiwavelength sources [J]. Physical Review A, 2011, 84(6): 062308.
|
[9] |
Lydersen L,Wiechers C,Wittmann C, et al. Hacking commercial quantum cryptography systems by tailored bright illumination
|
[J] |
Nature Photonics, 2010, 4(10): 686-689.
|
[10] |
Qi B, Fung C F, Lo H, et al. Time-shift attack in practical quantum cryptosystems [J]. Quantum Information & Computation,
|
20 |
07, 7(1): 73-82.
|
[11] |
Jain N, Wittmann C, Lydersen L, et al. Device calibration impacts security of quantum key distribution [J]. Physical Review
|
|
Letters, 2011, 107(11): 110501.
|
[12] |
Barrett J, Hardy L, Kent A A, et al. No signaling and quantum key distribution [J]. Physical Review Letters, 2005, 95(1):
|
01 |
0503.
|
[13] |
Pironio S, Acin A, Brunner N, et al. Device-independent quantum key distribution secure against collective attacks [J]. New
|
|
Journal of Physics, 2009, 11(4): 045021.
|
[14] |
Acin A, Masanes L. Certified randomness in quantum physics [J]. Nature, 2016, 540(7632): 213-219.
|
[15] |
Arnonfriedman R, Renner R, Vidick T, et al. Simple and tight device-independent security proofs [J]. SIAM Journal on
|
|
Computing, 2019, 48(1): 181-225.
|
[16] |
Tan E Y, Lim C C, Renner R, et al. Advantage distillation for device-independent quantum key distribution [J]. Physical Review
|
|
Letters, 2020, 124(2): 020502.
|
[17] |
Bell J S. On the Einstein-Podolsky-Rosen paradox [J]. Physics, 1964, 1: 195-200.
|
[18] |
Einstein A, Podolsky B, Rosen N. Can quantum-mechanical description of physical reality be considered complete? [J].
|
|
Physical Review, 1935, 47: 777.
|
[19] |
Acin A, Massar S, Pironio S, et al. Randomness versus nonlocality and entanglement [J]. Physical Review Letters, 2012,
|
10 |
8(10): 100402.
|
[20] |
Salavrakos A, Augusiak R, Tura J, et al. Bell inequalities tailored to maximally entangled states [J]. Physical Review Letters,
|
20 |
17, 119(4): 040402.
|
[21] |
Dhara C, Masanes L, Pironio S, et al. Security of device-independent quantum key distribution protocols [C]. Conference on
|
|
Theory of Quantum Computation Communication and Cryptography, 2011: 13-22.
|