[1] Bennett C H. Quantum cryptography: public key distribution and coin tossing[C]. International Conference on Computer System and Signal Processing, 1984: 175-179.
[2] Grosshans F, Grangier P. Continuous variable quantum cryptography using coherent states[J]. Physical Review Letters, 2002, 88(5): 057902.
[3] Lodewyck J, Bloch M, García-Patrón R, et al. Quantum key distribution over 25 km with an all-fiber continuous-variable system[J]. Physical Review A, 2007, 76(4): 042305.
[4] Bloch M, Thangaraj A, McLaughlin S W, et al. LDPC-based secret key agreement over the Gaussian wiretap channel[C]. 2006 IEEE International Symposium on Information Theory, 2006: 1179-1183.
[5] Guo Dabo, Zhang Yanhuang, Wang Yunyan. Performance optimization for the reconciliation of Gaussian quantum key distribution[J]. Acta Optica Sinica, 2014, 34(1): 0127001.
[6] Leverrier A, Alléaume R, Boutros J, et al. Multidimensional reconciliation for a continuous-variable quantum key distribution[J]. Physical Review A, 2008, 77(4): 042325.
[7] Jouguet P, Kunz-Jacques S, Leverrier A. Long-distance continuous-variable quantum key distribution with a Gaussian modulation[J]. Physical Review A, 2011, 84(6): 062317.
[8] Leverrier A, Grangier P. Continuous-variable quantum key distribution protocols with a discrete modulation[Z/OL]. 2010[2015-03-21]. http:∥arxiv.org/abs/1002.4083.
[9] Jouguet P, Kunz-Jacques S, Leverrier A, et al. Experimental demonstration of long-distance continuous-variable quantum key distribution[J]. Nature Photonics, 2013, 7(5): 378-381.
[10] Wang Yunyan, Guo Dabo, Zhang Yanhuang, et al. Algorithm of multidimensional reconciliation for continuous-variable quantum key distribution[J]. Acta Optica Sinica, 2014, 34(8): 0827002.
[11] Richardson T J, Urbanke R L. The capacity of low-density parity-check codes under message-passing decoding[J]. IEEE Transactions on Information Theory, 2001, 47(2): 599-618.
[12] Shokrollahi A, Storn R. Design of efficient erasure codes with differential evolution[M]. Berlin: Springer, 2005: 413-427.
[13] Bloch M, Thangaraj A, McLaughlin S W. Efficient reconciliation of correlated continuous random variables using LDPC codes[Z/OL]. 2005[2016-03-21]. http:∥arxiv.org/abs/cs/0509041.
[14] van Assche G. Quantum cryptography and secret-key distillation[M]. Cambridge: Cambridge University Press, 2006.
[15] Richardson T, Urbanke R. Modern coding theory[M]. Cambridge: Cambridge University Press, 2008.
[16] Yuan Dongfeng, Zhang Haigang. The theory and application of LDPC code[M]. Beijing: Posts & Telecom Perss, 2008: 31-32, 122-123.
[17] Xiao Juan, Wang Lin, Deng Lizhao. Density evolution method and threshold decision for irregular LDPC codes[J]. Journal of Electronics & Information Technology, 2005, 27(4): 617-620.
[18] Hou J, Siegel P H, Milstein L B. Performance analysis and code optimization of low density parity-check codes on Rayleigh fading channels[J]. IEEE Journal on Selected Areas in Communications, 2001, 19(5): 924-934.