[1] H K Lo, H F Chau. Unconditional security of quantum key distribution over arbitrarily long distances[J]. Science, 1999, 283(5410): 2050-2056.
[2] C H Bennett, G Brassard. Quantum cryptography: public key distribution and coin tossing [C]. Proceeding of IEEE International Conference on Computers, Systems and signal Processing, 1984: 175-179.
[3] Shen Zeyuan, Fang Jian, He Guangqiang, et al.. Synchronous scheme and experimental realization in continuous variable quantum key distribution system [J].Chinese J Lasers, 2013, 40(3): 0305004.
[4] Zhao Guhao, Zhao Shanghong, Yao Zhoushi, et al.. Quantum key distribution analysis for filtering scheme based on double fiber Bragg gating [J].Chinese J Lasers, 2013, 40(9): 0918001.
[5] Zhu Feng, Wang Qin. Quantum key distribution protocol based on heralded single photon source [J].Acta Optica Sinica, 2014, 34(6): 0627002.
[7] D Gottesman, H K Lo, N Lukenhaus, et al.. Security of quantum key distribution with imperfect devices [J]. Quantum Information and Computation, 2004, 4(5): 325-360.
[8] Scarani V, Bechmann-Pasquinucci H, Cerf NJ, et al.. The security of practical quantum key distribution [J]. Rev Mod Phys, 2009, 81(3): 1301-1350.
[9] Hughes R J, Mongan G L, Peterso C G. Quantum key distribution over a 48 km optical fibre network [J]. J Mod Opt, 2000, 47(2-3): 533-547.
[10] Mo Xiaofan, Zhu Bing, Han Zhengfu, et al.. Faraday-michelson system for quantum cryptography [J]. Opt Lett, 2005, 30(19): 2632-2634.
[11] Wu Guang, Zhou Chunyuan, Zeng Heping. Single-photon interference and router-control in an optic fiber Sagnac interferometer [J]. Acta Physica Sinica, 2004, 53(3): 698-702.
[12] Dixon A R, Yuan Z L, Dynes J F, et al.. Continuous operation of high bit rate quantum key distribution [J]. Appl Phys lett, 2010, 96(16): 161102.
[13] Chen Shuai, Wang Jindong, Zhong Pingping, et al.. Influence of time jitter on quantum Bit error rate of phase-coding quantumkey distribution system [J]. Acta Optica Sinica, 2011, 31(7): 0727001.
[14] Feihu Xu, Bing Qi, Hoi-Kwong Lo. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system [J]. New J Phys, 2010, 12(11):113026.
[15] S H Sun, M S Jiang, L M Liang. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system [J]. Phys Rev A, 2011, 83(6): 062331.
[16] S H Sun, M S Jiang, L M Liang. Single-photon-detection attack on the phase-coding continuous-variable quantum cryptography [J]. Phys Rev A, 2012, 86(1): 012305.
[17] Gisin N, Ribordy G, Tittle W, et al.. Quantum cryptography [J]. Rev Mod Phys, 2002, 74(1): 145-195.
[18] Ma RuiLin. Quantum Cryptography Communication [M]. Beijing: Science Press, 2006, 74: 88-89.
[19] Gerd Keiser. Optical Fiber Communications [M]. Beijing: Publishing House of Electronics Industry, 2012: 304-308.