[1] |
Mayers D. Unconditional security in quantum cryptography[J]. Journal of the ACM, 2001,48(3):351-406.
|
[2] |
Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol [ J ]. Physical Review Letters, 2000,85(2):441-444.
|
[3] |
Gottesman D, Lo H K, Lütkenhaus N, et al. Security of quantum key distribution with imperfect devices [ J ]. Quantum Information & Computation, 2004, 4 ( 5 ):325-360.
|
[4] |
Lo H K, Ma X F, Chen K. Decoy state quantum key distribution [ J ]. Physical Review Letters, 2005, 94
|
(23) |
:230504.
|
[5] |
Hwang W Y. Quantum key distribution with high loss: toward global secure communication[J]. Physical Review Letters, 2003,91:057901.
|
[6] |
Lo H K, Curty M, Qi B. Measurement-deviceindependent quantum key distribution [ J ]. Physical Review Letters, 2012,108:130503.
|
[7] |
Lucamarini M, Yuan Z L, Dynes J F, et al. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters [ J ]. Nature, 2018, 557 ( 7705 ): 400-403.
|
[8] |
Ma X F, Fung C H F, Razavi M. Statistical fluctuation analysis for measurement-device-independent quantum key distribution[J]. Physical Review A, 2012,86:052305.
|
[9] |
Curty M, Xu F H, Cui W, et al. Finite-key analysis for measurement-device-independent quantum key distribution[J]. Nature Communications, 2014,5:3732.
|
[10] |
Xu F H, Curty M, Qi B, et al. Practical aspects of measurement-device-independent quantum key distribution[J]. New Journal of Physics, 2013,15:11300.
|
[11] |
Zhou Y H, Yu Z W, Wang X B. Making the decoystate measurement-device-independent quantum key
|
|
distribution practically useful [J]. Physical Review A, 2016,93:042324.
|
[12] |
Wang W Y, Xu F H, Lo H K. Asymmetric protocols for scalable high-rate measurement-device-independent
|
|
quantum key distribution networks[J]. Physical Review X, 2019,9(4):041012.
|
[13] |
Tamaki K, Lo H K, Fung C H F, et al. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw[J]. Physical Review A, 2012,85:042307.
|
[14] |
Ma X F, Razavi M. Alternative schemes for measurement-device-independent quantum key distribution [J]. Physical Review A, 2012,86:062319.
|
[15] |
Tamaki K, Curty M, Kato G, et al. Loss-tolerant quantum cryptography with imperfect sources [ J ]. Physical Review A, 2014,90:052314.
|
[16] |
Xu F H, Wei K J, Sajeed S H, et al. Experimental quantum key distribution with source flaws[J]. Physical Review A, 2015,92:032305.
|
[17] |
Yin Z Q, Fung C H F, Ma X F, et al. Mismatchedbasis statistics enable quantum key distribution with uncharacterized qubit sources[J]. Physical Review A,2014,90:052319.
|
[18] |
Liu Y, Chen T Y, Wang L J, et al. Experimental measurement-device-independent quantum key distribution[J]. Physical Review Letters, 2013,111(13):130502.
|
[19] |
Rubenok A, Slater J A, Chan P C, et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks[J]. Physical Review Letters, 2013,111(13):130501.
|
[20] |
Silva T F D, Vitoreti D, Xavier G B, et al. Proof-ofprinciple demonstration of measurement-deviceindependent quantum key distribution using polarization qubits[J]. Physical Review A, 2013,88(5):052303.
|
[21] |
Tang Z Y, Liao Z F, Xu F H, et al. Experimental demonstration of polarization encoding measurementdevice- independent quantum key distribution [ J ]. Physical Review Letters, 2014,112:190503.
|
[22] |
Wei K J, Li W, Tan H, et al. High-speed measurementdevice- independent quantum key distribution with
|
|
integrated silicon photonics [ J]. Physical Review X, 2020,10:31030.
|
[23] |
Pirandola S, Laurenza R, Ottaviani C, et al. Fundamental limits of repeaterless quantum communications [ J ]. Nature Communications, 2017,8(1):1-15.
|
[24] |
Ma X F, Zeng P, Zhou H Y. Phase-matching quantum key distribution [ J ]. Physical Review X, 2018, 8(3):031043.
|
[25] |
Wang X B, Yu Z W, Hu X L. Twin-field quantum key distribution with large misalignment error[J]. Physical
|
|
Review A, 2018,98:062323.
|
[26] |
Curty M, Azuma K, Lo H K. Simple security proof of twin-field type quantum key distribution protocol [J].
|
[27] |
Cui C H, Yin Z Q, Wang R, et al. Twin-Field quantum key distribution without phase postselection [ J ].
|
|
Physical Review Applied, 2019,11:034053.
|
[28] |
Zhong X, HU J Y, Curty M, et al. Proof-of-principle experimental demonstration of twin- field type quantum key distribution[J]. Physical Review Letters, 2019,123 (10):100506.
|
[29] |
Fang X T, Zeng P, Liu H, et al. Implementation of quantum key distribution surpassing the linear ratetransmittance bound [J]. Nature Photonics, 2020,14:422-425.
|
[30] |
Chen J P, Zhang C, Liu Y, et al. Sending-or-notsending with independent lasers: secure twin-field quantum key distribution over 509 km [ J ]. Physical Review Letter, 2020,124:070501.
|
|
[ 31 ] Minder M, Pittaluga M, Roberts G L, et al. Experimental quantum key distribution beyond the repeaterless secret key capacity[J]. Nature Photonics, 2019,13:334-338.
|
[32] |
Wang S, He D Y, Yin Z Q, et al. Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system [J]. Physical Review X, 2019,9(2);021046.
|
[33] |
Pittaluga M, Minder M, Lucamarini M, et al. 600 km repeater-like quantum communications with dual-band
|
|
stabilisation[J]. arXiv Preprint, arXiv:2012.15099, 2020.
|