[1] ZHAO Yi, QI Bing, MA Xiong-feng, et al. Experimental quantum key distribution with decoy states[J]. Physical Review Letters, 2006, 96(7): 070502-1-070502-4.
[2] QUAN Dong-xiao, PEI Chang-xing, ZHU Chang-hua, et al .New method of decoy state quantum key distribution with a heralded single-photon source[J]. Acta Physica Sinica, 2008, 57(9): 5600-5604.
[4] LIU D, PEI C X, QUAN D X, et al. A new quantum secure direct communication scheme with authentication[J]. Chinese Physics Letters, 2010, 27(5): 306
[5] CHEN Zhi-xin, TANG Zhi-lie, LIAO Chang-jun, et al. Practical security problem of six states Q KD protocol[J].Acta Physica Sinica, 2006, 35(1): 126-129.
[6] BRASSARD G, LTKENHAUS N, MOR T, et al. Limitations on pratical quantum cryptography[J]. Physical Review Letters, 2000, 85(6): 1330-1333.
[7] MO X F, ZHU B, HAN Z F, et al. Faraday-Michelson system for quantum cryptography[J].Optics Letters, 2005, 30(19): 2632-2634.
[8] YUAN Z L, SHIELDS A J. Continuous operation of a one-way quantum key distribution system over installed telecom fibre[J]. Optics Express, 2005, 13(2): 660-665.
[9] HU J Z, WANG X B. Reexamination of the decoy-state quantum key distribution with an unstable source[J]. Physical Review A, 2010, 82(1): 012331.
[10] WANG X B, PENG C Z, ZHANG J, et al. General theory of decoy-state quantum cryp tography with source errors[J]. Physical Review A, 2008, 77(4): 42311.
[11] PENG C Z, ZHANG J, YANG D. Experimental long-distance decoy-state quantum key distribution based on polarization encoding[J]. Physical Review Letters, 2007, 98(1): 10505.
[12] SCHM ITT-MANDERBACH T. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km[J]. Physical Review Letters, 2007, 98(1): 10504.
[13] WANG X B, PENG C Z, PAN J W. Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source[J]. Applied Physics Letters, 2007, 90(3): 031110.