[1] Bennett C H , Brassard G. Quantum cryptography: Public key distribution and coin tossing [C]. International Conference on Computers, Systems and Signal Processing, India, 1984: 175-179.
[2] Wang Xiangbin. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Phys. Rev. Lett., 2005, 94: 230503.
[3] Hwang W Y. Quantum key distribution with high loss: toward global secure communication [J]. Phys. Rev. Lett., 2003, 91: 057901.
[6] Lo H K, Ma Xiongfeng, Chen Kai. Decoy state quantum key distribution [J]. Phys. Rev. Lett., 2005, 94: 230504.
[7] Wang Xiangbin. Decoy-state protocol for quantum cryptography with four different intensities of coherent light [J]. Phys. Rev. A, 2005, 72: 012322.
[8] Ma Xiongfeng, Fung C H F, Dupuis F, et al. Decoy-state quantum key distribution with two-way classical postprocessing [J]. Phys. Rev. A, 2006, 74: 032330.
[9] Wang Xiangbin, Peng Chengzhi, Zhang Jun, et al. General theory of decoy-state quantum cryptography with source errors [J]. Phys. Rev. A, 2008, 77: 042311.
[10] Tsurumaru T. Exact minimum and maximum of yield with a finite number of decoy light intensities [J]. Phys. Rev. A, 2008, 77: 022319.
[11] Schmitt-Manderbach T, Weier H, Fürst M, et al. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km [J]. Phys. Rev. Lett., 2007, 98: 010504.
[12] Ma Xiongfeng, Lo H K. Quantum key distribution with triggering parametric down-conversion sources [J]. New Journal of Physics, 2008, 10: 073018.
[13] Wang Qin, Wang Xiangbin, Guo Guangcan. Practical decoy-state method in quantum key distribution with a heralded single-photon source [J]. Phys. Rev. A, 2007, 75: 012312.
[14] Wang Qin, Wang Xiangbin, Bjrk G, et al. Improved practical decoy state method in quantum key distribution with parametric down-conversion source [J]. Europhysics Lett., 2007, 79(4): 40001.
[15] Wang Qin, Chen Wei, Xavier G, et al. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source [J]. Phys. Rev. Lett., 2008, 100: 090501.
[16] Mauerer W, Silberhorn C. Quantum key distribution with passive decoy state selection [J]. Phys. Rev. A, 2007, 75: 050305.
[17] Adachi Y, Yamamoto T, Koashi M, et al. Simple and efficient quantum key distribution with parametric down-conversion [J]. Phys. Rev. Lett., 2007, 99: 180503.
[18] Zhang Shengli, Zou Xubo, Li Ke, et al. Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source [J]. Phys. Rev. A, 2007, 76: 044304.
[19] Mi Jinglong, Wang Faqiang, Lin Qinqun, et al. Practical non-orthogonal decoy state quantum key distribution with heralded single photon source [J]. Chin. Phys. B, 2008, 17(04): 1178-1183.
[21] Gottesman D, Lo H K, Lütkenhaus N, et al. Security of quantum key distribution with imperfect devices [J]. Quant. Inf. Comp., 2004, 4: 325-360.
[22] Wang Xiangbin. Quantum key distribution with 4 intensities of coherent light [J]. Phys. Rev. A, 2005, 72: 012322.