[1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing [C]. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. Bangalore, India. New York: IEEE, 1984: 175-179.
[2] Lo H, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999, 283(5410): 2050-2056.
[3] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Physical Review Letters, 2000, 85(2): 441-444.
[4] Renner R, Gisin N, Kraus B, et al. Information-theoretic security proof for quantum-key-distribution protocols [J]. Physical Review A, 2005, 72(1): 012332.
[5] Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices [J]. Quantum Information and Computation, 2004, 4(5): 325-360.
[6] Hwang W Y. Quantum key distribution with high loss: Toward global secure communication [J]. Physical Review Letters, 2003, 91(5): 057901.
[7] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Physical Review Letters, 2005, 94(23): 230503.
[8] Lo H, Ma X, Chen K, et al. Decoy state quantum key distribution [J]. Physical Review Letters, 2005, 94(23): 230504.
[9] Lutkenhaus N. Estimates for practical quantum cryptography [J]. Physical Review A, 1999, 59(5): 3301-3319.
[10] Lutkenhaus N. Security against individual attacks for realistic quantum key distribution [J]. Physical Review A, 2000, 61(5): 052304.
[11] Li H W, Wang S, Huang J, Chen W, et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources [J]. Physical Review A, 2011, 84(6): 062308.
[12] Lydersen L, Wiechers C, Wittmann C, et al. Hacking commercial quantum cryptography systems by tailored bright illumination [J]. Nature Photonics, 2010, 4(10): 686-689.
[13] Yuan Z L, Dynes J F, Shields A J, et al. Avoiding the blinding attack in QKD [J]. Nature Photonics, 2010, 4(12): 800-801.
[14] Scarani V, Bechmannpasquinucci H, Cerf N, et al. The security of practical quantum key distribution [J]. Reviews of Modern Physics, 2009, 81(3): 1301-1350.
[15] Jain N, Stiller B, Khan I, et al. Attacks on practical quantum key distribution systems (and how to prevent them) [J]. Contemporary Physics, 2016, 57(3): 366-387.
[16] Bouda J, Pivoluska M, Plesch M, et al. Weak randomness seriously limits the security of quantum key distribution [J]. Physical Review A, 2012, 8(6): 062308.