[1] C. H. Bennett, G. Brassard. Quantum cryptography: public key distribution and coin tossing, 8(1984).
[2] A. K. Ekert. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett., 67, 661-663(1991).
[5] D. Bouwmeester et al. Experimental quantum teleportation. Nature, 390, 575-579(1997).
[7] C.-Y. Lu et al. Micius quantum experiments in space. Rev. Mod. Phys., 94, 035001(2022).
[8] N. Gisin et al. Quantum cryptography. Rev. Mod. Phys., 74, 145-195(2002).
[18] P. Lodahl. Quantum-dot based photonic quantum networks. Quantum Sci. Technol., 3, 013001(2017).
[48] S. Bartolucci et al. Fusion-based quantum computation(2021).
[49] K. Azuma, K. Tamaki, H.-K. Lo. All-photonic quantum repeaters. Nat. Commun., 6, 6787(2015).
[51] A. M. Brańczyk. Hong-Ou-Mandel interference(2017).