[1] Bennett C H,Brassard G.Quantum cryptography:Publish-keydistribution and coin tossing [C].In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, 1984, Bangalore, India, 175-179.
[2] GisinN, RibordyG, TittelW, et al. Quantum cryptography [J].Rev. Mod. Phys, 2002, 74:145-195.
[3] NamikiR, HiranoT. Security of quantum cryptography using balanced homodyne detection [J]. Phys. Rev. A,2003, 67(2):2308.
[4] LeverrierA, GrangierP.Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation [J]. Phys. Rev,2009, 102:180504.
[5] ScaraniV, B-PH, CerfN J, et al.The security of practical quantum key distribution [J]. Rev. Mod. Phys. 2009, 81(10):1301-1350.
[6] ShorPW,PreskillJ. Simple proof of security of the BB84 quantum key distribution protocol[J].Phys. Rev. Lett.2000, 85(2):441-444.
[7] Renner R, GisinN, KrausB.Distribution protocols [J]. Phys. Rev. A.2005,72(1):573.
[8] PatelK A, DynesJ F, LucamariniM, et al.Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks [J]. Appl. Phys.Lett. 2014,104(5):051123-4.
[9] Hayashi M.Hypothesis testing for an entangled state produced by spontaneous parametric down conversion[J].Phys. Rev. A.2006,74(6):154.
[10] Inamori H, Lütkenhaus N, Mayers D.Unconditional security of practical quantum key distribution[J].Europe. Phys. J. D.2007,41(3):599-627.
[11] Hayashi M.Prior entanglement between senders enables perfect quantum network coding with modification[J]. Phys. Rev. A.2007,76(4):538.
[12] Scarani V, Renner R.Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing[J].Phys. Rev. Lett. 2008,100(20)1586-1594.
[13] Huttner B, Imoto N, GisinN,et al.Quantum cryptography with coherent states[J].Phys. Rev. A.1995,51(3):1863-1869.
[14] Dunjko V, Kashefi E, Leverrier A. Blind quantum computing with weak coherent pulses[J].Phys. Rev. Lett. 2012,-(20): 502.
[15] Wang X-B. Beating the PNS attack in practical quantum cryptography [J].Phys. Rev. Lett. 2005,94(24):6102.
[16] Acn A, Gisin N, Scarani V.Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks [J].Phys. Rev. A.2004,69(1):2309.
[17] Qi B, Fung C-H F, Lo H-K.Time-shift attack in practical quantum cryptosystems[J].Quant. Inf. Comput. 2007,7(1):73-82.
[18] Lin S, Wen Q Y, Gao F, et al.Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks[J].Phys. Rev. A.2009,79(5):1744-1747.
[19] Ribordy G,Gisin N,Kraus B.Trojan-horse attacks on quantum-key-distribution systems[J].Phys.Rev. A.2006,73(24):457-460.
[20] Lo H K, Ma X F , Chen K.Decoy state quantum key distribution: theory and practice[J].Phys. Rev. Lett.2004,94(23):504.
[21] Yin Z Q, Fred Fung C H, Ma X F,et al.Mismatched-basis statistics enable quantum key distribution with uncharacterized qubitsources[J]. Phys. Rev. A.2014,90(5):319.
[22] Pastukhov V M, Vladimirova Y V,Zadkov V N.Photon-number statistics from resonance fluorescence of a two-level atom near a plasmonic nanoparticle[J].Phys. Rev. A.2014,90(6):31.