[1] Li Hongwei, Yin Zhengqiang, Han Zhengfu, et al. Security of practical phase-coding quantum key distribution[J]. Quantum Information and Computation, 2010, 10(9/10): 0771-0779.
[2] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing Bangalore India (IEEE), 1984, 175-179.
[3] Yuen H P. On the foundations of quantum key distribution-reply to renner and beyond[J]. Quantum ICT Research Institute Bulletin of Tamagawa University, 2013, 3(1): 1.
[4] Elboukhari M, Azizi M, Azizi A. Analysis of the security of BB84 by model checking[J]. International Journal of Network Security and Its Applications, 2010, 2(2): 87-98.
[5] Hasegawa J, Hayashi M, Hiroshima T, et al. Experimental decoy state quantum key distribution with uncoditional security incorporating finite statistics[C]. Quantum Electronics and Laser Science Conference, 2007.
[6] Yuen H P. Some physics and system issues in the security analysis of quantum key distribution protocols[J]. Quantum Information Processing, 2014, 13(10): 2241-2254.
[7] Lavale M. Analysis of differential phase shift quantum key distribution[J]. 2011, arXiv preprint arXiv: 1110.4820.
[8] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys. Rev. Lett., 1992, 68(21): 312.