[1] Lütkenhaus N. Security against individual attacks for realistic quantum key distribution [J]. Phys. Rev. A, 2000, 61: 052304.
[2] Gobby C, Yuan Z L, Shields A J. Quantum key distribution over 122 km of standard telecom fiber [J]. Appl. Phys. Lett., 2004, 84(19): 3762-3763
[3] Mo X F, Zhu B, Han Z F, et al. Faraday-Michelson system for quantum cryptography [J]. Opt. Lett., 2005, 30(19): 2632-2634.
[6] Takesue H, Diamanti E, Honjo T, et al. Differential phase shift quantum key distribution experiment over 105 km fibre [J]. New Journal of Physics, 2005, 7: 232.
[7] Hiroki T, Eleni D, et al. 10-GHz clock differential phase shift quantum key distribution experiment [J]. Opt. Exp., 2006, 14(20): 9522-9530.
[8] Waks E, Takesue H, Yamamoto Y. Security of differential-phase-shift quantum key distribution against individual attacks [J]. Phys. Rev. A, 2006, 73: 012344.
[9] Lo H K, Ma X F, Chen K. Decoy state quantum key distribution [J]. Phys. Rev. Lett., 2005, 94: 230504
[10] Inoue K, Honjo T. Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack [J]. Phys. Rev. A, 2005, 71: 042305.
[11] Zhao F , Fu M X , Lu Y Q, et al. Infuence of multi-photon pulses on practical differential-phase-shift quantum key distribution [J]. Chinese Physics, 2007, 16(11): 3402-3406.
[12] Inoue K, Takesue H, Honjo T. Differential-phase-shift quantum key distribution [C]. SPIE, 2007, 6780: 678015.
[13] Ma X F, Qi B, Zhao Y, et al. Practical decoy state for quantum key distribution [J]. Phys. Rev. A, 2005, 72, 012326.