[1] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing , 1984: 175-179.
[2] Mizutani A, Curty M, Lim C C W, et al . Finite-key security analysis of quantum key distribution with imperfect light sources[J]. New Journal of Physics , 2015, 17(9): 093011.
[3] Yuen H P. Security of quantum key distribution[J]. IEEE Access , 2016, 4: 724-749.
[4] Sun S H, Liang L M. Experimental demonstration of an active phase randomization and monitor module for quantum key distribution[J]. Appl. Phys. Lett. , 2012, 101: 071107.
[5] Korzh B, Lim C C W, Houlmann R, et al . Provably secure and practical quantum key distribution over 307 km of optical fibre[J]. Nature Photonics , 2015, 9(3): 163-168.
[6] Comandar L C, Lucamarini M, Frhlich B, et al . Quantum key distribution without detector vulnerabilities using optically seeded lasers[J]. Nature Photonics , 2016, 10: 312-315.
[7] Makarov V. Controlling passively quenched single photon detectors by bright light[J]. New J. Modern Opt. , 2009, 11: 065003.
[8] Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution[J]. Phys. Rev. Lett. , 2012, 108: 130503.
[10] Ma X, Razavi M. Alternative schemes for measurement-device-independent quantum key distribution[J]. Phys. Rev. A , 2012, 86: 062319.
[11] Tang Y L, Yin H L, Chen S J, et al . Field test of measurement-device-independent quantum key distribution[C]. IEEE J. Select. Topics Quantum Electron , 2015, 21: 6600407.
[12] Zhou C, Bao W S, Chen W, et al . Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sources[J]. Phys. Rev. A , 2013, 88: 052333.
[13] Wang Y, Bao W S, Li H W, et al . Security of a practical semi-device-independent quantum key distribution protocol against collective attacks[J]. Chin. Phys. B , 2014, 23: 080303.
[14] Zhou Y Y. A measurement-device-independent quantum key distribution protocol with a heralded single photon source[J]. Optoeletronics Letters , 2016, 12(2): 148-151.
[15] Wang Q, Wang X B. An efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon source[J]. Phys. Rev. A , 2013, 88: 052332.
[16] Li M, Zhang C M, Yin Z Q, et al . Measurement-device-independent quantum key distribution with modified coherent state[J]. Opt. Lett. , 2014, 39: 880.
[17] Li M, Zhang C M, Yin Z Q, et al . Measurement-device-independent QKD with modified coherent state[J]. arXiv preprint: 2014, 1402.2502.
[19] Ma X F, Qi B, Zh Y, et al . Practical decoy state for quantum key distribution[J]. Phys. Rev. A , 2005, 72: 012326.
[20] Sun S H, Gao M, et al . Practical decoy state measurement-device-independent quantum key distribution[J]. Phys. Rev. A , 2013, 87: 052329.
[21] Jiang H D, Gao M. A global estimation of the lower bound of the privacy amplification term for decoy-state quantum key distribution[OL]. arXiv, 2015 1502.04427.