[1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing [C]. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. New York: IEEE , 1984: 175-179.
[2] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science , 1999, 283: 2050-2056.
[3] Shor P, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [J]. Physical Review Letters , 2000, 85: 441-444.
[4] Renner R. Security of quantum key distribution [J]. International Journal of Quantum Information , 2008, (1): 1-127.
[5] Kraus B, Gisin N, Renner R. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication [J]. Physical Review Letters , 2005, 95: 080501.
[6] Renner R, Gisin N, Kraus B. Information-theoretic security proof for quantum-key-distribution protocols [J]. Physical Review A , 2005, 72: 012332.
[7] Grosshans F, Grangier P. Continuous variable quantum cryptography using coherent states [J]. Physical Review Letters , 2002, 88(5): 057902.
[8] Inoue K, Waks E, Yamamoto Y. Differential phase shift quantum key distribution [J]. Physical Review Letters , 2002, 89(3): 037902.
[9] Sasaki T, Yamamoto Y, Koashi M. Practical quantum key distribution protocol without monitoring signal disturbance [J]. Nature , 2014, 509(7501): 475-478.
[10] Ekert A K. Quantum cryptography based on Bell′s theorem [J]. Physical Review Letters , 1991, 67: 661-663.
[11] Barrett J, Hardy L, Kent A. No signaling and quantum key distribution [J]. Physical Review Letters , 2005, 95: 010503.
[12] Acin A, Brunner N, Gisin N, et al . Device-independent security of quantum cryptography against collective attacks [J]. Physical Review Letters , 2007, 98: 230501.
[13] Arnon-Friedman R, Dupuis F, Fawzi O, et al . Practical device-independent quantum cryptography via entropy accumulation [J]. Nature Communications , 2018, 9(1): 459.
[14] Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution [J]. Physical Review Letters , 2012, 108(13): 130503.
[15] Lucamarini M, Yuan Z L, Dynes J F, et al . Overcoming the rate distance limit of quantum key distribution without quantum repeaters [J]. Nature , 2018, 557(7705): 400-403.
[16] Hwang W Y. Quantum key distribution with high loss: Toward global secure communication [J]. Physical Review Letters , 2003, 91(5): 057901.
[17] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Physical Review Letters , 2005, 94(23): 230503.
[18] Lo H K, Ma X, Chen K. Decoy state quantum key distribution [J]. Physical Review Letters , 2005, 94(23): 230504.