[1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing[C]. Proceedings of IEEE, International Conference on Computers, Systems and Signal Processing, 1984: 175-179.
[2] Ekert A. Quantum cryptography based on Bell’s theorem[J]. Physical Review Letters, 1991, 67(6): 661-663.
[3] Lo H, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances[J]. Science, 1999, 283(5410): 2050-2056.
[4] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 2000, 85(2): 441-444.
[5] Renner R. Security of quantum key distribution[J]. International Journal of Quantum Information, 2008, 6(1): 1-127.
[6] Scarani V, Bechmann-Pasquinucci H, Cerf N J, et al. The security of practical quantum key distribution[J]. Reviews of Modern Physics, 2009, 81(3): 1301-1350.
[7] Jain N, Stiller B, Khan I, et al. Attacks on practical quantum key distribution systems (and how to prevent them)[J]. Contemporary Physics, 2016, 57(3): 366-387.
[8] Li H, Wang S, Huang J, et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources[J]. Physical Review A, 2011, 84(6): 062308.
[9] Lydersen L, Wiechers C, Wittmann C, et al. Hacking commercial quantum cryptography systems by tailored bright illumination[J]. Nature Photonics, 2010, 4(10): 686-689.
[10] Qi B, Fung C F, Lo H, et al. Time-shift attack in practical quantum cryptosystems[J]. Quantum Information & Computation, 2007, 7(1): 73-82.
[11] Jain N, Wittmann C, Lydersen L, et al. Device calibration impacts security of quantum key distribution[J]. Physical Review Letters, 2011, 107(11): 110501.
[12] Barrett J, Hardy L, Kent A A, et al. No signaling and quantum key distribution[J]. Physical Review Letters, 2005, 95(1): 010503.
[13] Pironio S, Acin A, Brunner N, et al. Device-independent quantum key distribution secure against collective attacks[J]. New Journal of Physics, 2009, 11(4): 045021.
[14] Acin A, Masanes L. Certified randomness in quantum physics[J]. Nature, 2016, 540(7632): 213-219.
[15] Arnonfriedman R, Renner R, Vidick T, et al. Simple and tight device-independent security proofs[J]. SIAM Journal on Computing, 2019, 48(1): 181-225.
[16] Tan E Y, Lim C C, Renner R, et al. Advantage distillation for device-independent quantum key distribution[J]. Physical Review Letters, 2020, 124(2): 020502.
[17] Bell J S. On the Einstein-Podolsky-Rosen paradox[J]. Physics, 1964, 1: 195-200.
[18] Einstein A, Podolsky B, Rosen N. Can quantum-mechanical description of physical reality be considered complete?[J]. Physical Review, 1935, 47: 777.
[19] Acin A, Massar S, Pironio S, et al. Randomness versus nonlocality and entanglement[J]. Physical Review Letters, 2012, 108(10): 100402.
[20] Salavrakos A, Augusiak R, Tura J, et al. Bell inequalities tailored to maximally entangled states[J]. Physical Review Letters, 2017, 119(4): 040402.
[21] Dhara C, Masanes L, Pironio S, et al. Security of device-independent quantum key distribution protocols[C]. Conference on Theory of Quantum Computation Communication and Cryptography, 2011: 13-22.