[3] Wootters W K, Zurek W H. A single quantum cannot be cloned[J]. Nature, 1982, 299(588): 802-803.
[4] Mayers D. Unconditional security in quantum cryptography[J]. Journal of the ACM, 2001, 48(3): 351-406.
[6] Ma X C, Sun S H, Jiang M S, et al. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution[J]. Phys. Rev. A, 2014, 89(4): 1-9.
[7] Liu Y, Chen T Y, Wang L J, et al. Experimental measurement-device-independent quantum key distribution[J]. Phys. Rev. Lett., 2013, 111(13): 130502.
[8] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing[C]. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Banglore, 1984.
[9] Bennett C H, Bessette F, Brassard G, et al. Experimental quantum cryptography[J]. Journal of Cryptography, 1992, 5: 3-28.
[10] Ekert A K. Quantum cryptography based on Bell theorem[J]. Phys. Rev. Lett., 1991, 67(6): 661-663.
[11] Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Phys. Rev. Lett., 1992, 68(21): 3121-3124.
[12] Bruss D. Optimal eavesdropping in quantum cryptography with six states[J]. Phys. Rev. Lett., 1998, 81(14): 3018-3021.
[13] Liu C, Zhang S, Zhao L, et al. Differential-phase-shift quantum key distribution using heralded narrow-band single photons[J]. Opt. Expr., 2013, 21(8): 9505-9513.
[14] Hwang W Y. Quantum key distribution with high loss: Toward global secure communication[J]. Phys. Rev. Lett., 2003, 91(5): 7091-7095.
[15] Serna E H. Quantum key distribution from a random seed[J]. arXiv preprint, 2013, arXiv: 1311.1582.
[17] Wei Zhengjun, Wan Wei, Wang Jindong, et al. A new differential phase shift quantum key distribution system with Faraday- Michelson interferometer[J]. Acta Physica Sinica, 2011, 60(9): 411-417.
[18] Zhang C M, Li M, Huang J Z, et al. Fast implementation of length-adaptive privacy amplification in quantum key distribution[J]. Chin. Phys. B, 2014, 23(9): 90310-90315.
[19] Fred Fung C H, Ma X F, Chau H F, et al. Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol[J]. Quan. Phys., 2012, 85(3): 032308.
[20] Mala H. Biclique-based cryptanalysis of the block cipher squre[J]. Information Security, 2014, 8(3): 207-212.
[21] Gong L Y, Pan J X, Liu B B, et al. A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords[J]. Journal of Computer and System Sciences, 2013, 79(1): 122-130.