[2] Wang Xiangbin. Beat the photon-number-splitting attack in practical quantum cryptography[J]. Phys. Rev. Lett., 2005, 94: 230503
[3] Kumar R, Lucamarini M, Giuseppe G D et al.. Two-way quantum key distribution at telecommunication wavelength [J]. Phys. Rev. A, 2008, 77: 022304
[4] Bennett C H, Brassard G. Computers, systems and signal processing Bangalore[C]. Proc. of IEEE, New York,1984, 175~179
[5] Bennett C H. Quantum cryptography using any two nonorthogonal states [J]. Phys. Rev. Lett., 1992,68(21): 3121~3124
[6] Ekert K. Quantum cryptography based on Bell′s theorem [J]. Phys. Rev. Lett., 1991, 67(6): 661~664
[7] Wu Guang, Zhou Chunyuan, Chen Xiuliang et al.. A stable long-distance quantum key distribution system [J]. Acta Physica Sinica, 2005, 54(8): 3622~3625
[8] Diamanti E, Takesue H, Honjo T et al.. Performance of various quantum-key-distribution systems using 1.55 μm up- conversion single-photon detectors [J]. Phys. Rev. A, 2005, 72: 052311
[9] Inoue K, Waks E, Yamamoto Y. Differential-phase-shift quantum key distribution using coherent light[J]. Phys. Rev. A, 2003, 68: 022317
[10] Tsurumaru T. Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol[J]. Phys. Rev. A, 2007, 75: 062319