[1] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers Systems and Signal Processing, 1984: 175-179.
[2] Bennett C H, Bessette F, Brassard G, et al. Experimental quantum cryptography[J]. Journal of Cryptology, 1992, 5(1): 3-28.
[3] Wootters W K, Zurek W H. A single quantum cannot be cloned[J]. Nature, 1982, 299(5886): 802-803.
[4] Heisenberg W. ber den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik (in German)[J]. Zeitschrift für Physik, 1927, 43(3/4): 172-198.
[5] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 2000, 85(2): 441.
[6] Mayers D. Unconditional security in quantum cryptography[J]. Journal of the ACM, 2001, 48(3): 351-406.
[7] Liu Lingling, Jing Mingyong, Yu Bo, et al. Polarization control in single photons phase coding quantum key distribution system[J]. Laser & Optoelectronics Progress, 2015, 52(7): 072701.
[8] Liu Youming, Wang Chao, Huang Duan, et al. Study of synchronous technology in high-speed continuous variable quantum key distribution system[J]. Acta Optica Sinica, 2015, 35(1): 0106006.
[9] Chen Yan, Shen Yong, Zou Hongxin. An all-fiber continuous variable quantum key distribution based on multi-bits coding of single pulse[J]. Acta Optica Sinica, 2015, 35(7): 0727001.
[10] Wang Yunyan, Guo Dabo, Zhang Yanhuang, et al. Algorithm of multidimensional reconciliation for continuous-variable quantum key distribution[J]. Acta Optica Sinica, 2014, 34(8): 0827002.
[11] Guo Xueshi, Gao Kang, Liu Nannan, et al. Differential detection system for measuring the quantum noise of pulsed light[J]. Acta Optica Sinica, 2013, 33(9): 0927002.
[12] Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution[J]. Physical Review Letters, 2012, 108(13): 130503.
[13] Ma X, Razavi M. Alternative schemes for measurement-device-independent quantum key distribution[J]. Physical Review A, 2012, 86(6): 3818-3821.
[14] Liu Y, Chen T Y, Wang L J, et al. Experimental measurement-device-independent quantum key distribution[J]. Physical Review Letters, 2013, 111(13): 130502.
[15] Zhu Feng, Wang Qin. Quantum key distribution protocol based on heralded single photon source[J]. Acta Optica Sinica, 2014, 34(6): 0627002.
[16] Phoenix S J D, Barnett S M, Chefles A. Three-state quantum cryptography[J]. Journal of Modern Optics, 2000, 47(2/3): 507-516.
[17] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Physical Review Letters, 1992, 68(21): 3121.
[18] Renes J M. Spherical code key distribution protocols for qubits[J]. Physical Review A, 2004, 70(5): 052314.
[19] Boileau J C, Tamaki K, Batuwantudawe J, et al. Unconditional security of a three state quantum key distribution protocol[J]. Physical Review Letters, 2005, 94(4): 040503.
[20] Schiavon M, Vallone G, Villoresi P. Experimental realization of equiangular three-state quantum key distribution[J]. Scientific Reports, 2016, 6: 30089.
[21] Boyer M, Kenigsberg D, Mor T. Quantum key distribution with classical Bob[J]. Physical Review Letters, 2007, 99(14): 140501.
[22] Zou X, Qiu D, Li L, et al. Semiquantum-key distribution using less than four quantum states[J]. Physical Review A, 2009, 79(5): 052312.