[1] Shen Zeyuan, Fang Jian, He Guangqiang, et al.. Synchronous scheme and experimental realization in continuous variable quautum key distribution system [J]. Chinese J Lasers, 2013, 40(3): 0305004.
[2] Haibin Du, Yan Liang, Shengxiang Zhang, et al.. Practical high-speed light source for decoy-state quantum key distribution [J]. Chin Opt Lett, 2014, 12(7): 072702.
[3] Wang Yunyan, Guo Dabo, Zhang Yanhuang, et al.. Algorithm of multidimensional reconciliation for continuous-variable quantum key distribution [J]. Acta Optica Sinica, 2014, 34(8): 0827002.
[4] Michel Boyer, Ran Gelles, Tal Mor. Attacks on fixed-apparatus quantum-key-distribution schemes [J]. Phys Rev A, 2014, 90(1): 012329.
[5] W T Buttler, R J Hughes, S K Lamoreaux, et al.. Daylight quantum key distribution over 1.6 km [J]. Phys Rev Lett, 2000, 84(24): 5652-5655.
[6] C Kuresiefer, P Zarda, M Halder, et al.. A step towards global key distribution [J]. Nature, 2002, 419: 450.
[7] Huang Jianhua, Wu Guang, Zeng Heping. Study of 1.5 GHz harmonics ultrashort pulse gated InGaAs/InP avalanche photodiode single-photon detection [J]. Acta Optica Sinica, 2014, 34(2): 0204001.
[8] Guo Xueshi, Gao Kang, Liu Nannan, et al.. Differential detection system for measuring the quantum noise of pulsed light [J]. Acta Optica Sinica, 2013, 33(9): 0927002.
[9] Feng Tang, Bing Zhu. Scintillation discriminator improves free-space quantum key distribution [J]. Chin Opt Lett, 2013, 11(9): 090101.
[10] A Rubenok, J A Slater, P Chan, et al.. Real- world two- photon interference and proof- of- principle quantum key distribution immune to detector attacks [J]. Phys Rev Lett, 2013, 111(13): 130501.
[11] Normand J Beaudry, Marco Lucamarini, Stefano Mancini, et al.. Security of two-way quantum key distribution [J]. Phys Rev A, 2013, 88(6): 062302.
[12] Miloslav Dusek, Ondrej Haderka, Martin Hendrych, et al.. Quantum identification system [J]. Phys Rev A, 1999, 60(1): 149-156.
[13] Gilles Brassard, Norbert Lütkenhaus, Tal Mor, et al.. Limitations on practical quantum cryptography [J]. Phys Rev Lett, 2000, 85(6): 1330-1333.
[14] Vadim Makarov, Andrey Anisimov, Johannes Skaar. Effects of detector efficiency mismatch on security of quantum cryptosystems [J]. Phys Rev A , 2006, 74(2): 022313.
[15] Vadim Makarov. Controlling passively quenched single photon detectors by bright light [J]. New J Phys, 2009, 11(6): 065003.
[16] L Lydersen, C Wiechers, C Wittmann, et al.. Hacking commercial quantum cryptography systems by tailored bright illumination [J]. Nat Photonics , 2010, 4(10): 686-689.
[17] Francesco Buscemi, Michael J W Hall, Masanao Ozawa, et al.. Noise and disturbance in quantum measurements: An informationtheoretic approach [J]. Phys Rev Lett, 2014, 112(5): 050401.
[18] Fabio Grazioso, Frederic Grosshans. Quantum- key- distribution protocols without sifting that are resistant to photon- numbersplitting attacks [J]. Phys Rev A, 2013, 88(5): 052302.
[19] A Muller, T Herzog, B Huttner, et al..“Plug and play”systems for quantum cryptography [J]. Appl Phys Lett, 1997, 70(7): 793-795.
[20] Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, et al.. Phase-remapping attack in practical quantum-key-distribution systems [J]. Phys Rev A, 2007, 75(3): 032314.