[1] |
Grosshans F, Van Assche G, Wenger J, et al. Quantum key distribution using gaussian-modulated coherent states[J]. Nature,2003,421(6920):238.
|
[2] |
Jouguet P, Kunz- Jacques S, Leverrier A, et al. Experimental demonstration of long-distance continuous-variable quantum key distribution[J]. Nature photonics,2013,7(5):378.
|
[3] |
Ma X C, Sun S H, JiangMS, et al. Local oscillator fluctuation opens a loophole for Eve in practical continuous- variable quantum-key-distribution systems[J]. Physical ReviewA, 2013, 88(2):022339.
|
[4] |
Jouguet P, Kunz-Jacques S, Diamanti E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution[J]. PhysicalReviewA, 2013, 87(6):062313.
|
[5] |
Huang J Z,Weedbrook C,Yin Z Q, et al. Quantum hacking of a continuous- variable quantum- key- distribution system using a wavelength attack[J]. PhysicalReviewA, 2013,87(6):062329.
|
[6] |
MaXC, Sun S H, JiangMS, et al.Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol[J]. PhysicalReviewA, 2013,87(5):052309.
|
[7] |
Qin H, Kumar R, Alléaume R. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution [J]. PhysicalReviewA, 2016,94(1):012325.
|
[8] |
Qin H, Kumar R, MakarovV, et al. Homodyne-detector-blinding attack in continuous- variable quantum key distribution[J].PhysicalReviewA, 2018, 98(1):012312.
|
[9] |
Wang C, Huang P, Huang D, et al. Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects[J]. PhysicalReviewA, 2016, 93(2):022315.
|
[10] |
Zheng Y, Huang P, Huang A, Peng J, and Zeng G. Practical security of continuous- variable quantum key distribution with reduced optical attenuation[J]. Physical Review A,2019, 100(1):012313.
|
[11] |
HuangW, MaoY, Xie C, et al. Quantum hacking of free-space continuous-variable quantum key distribution by using a machinelearning technique[J]. PhysicalReviewA, 2019,100(1):012316.
|
[12] |
Kunz-Jacques S, Jouguet P. Robust shot-noise measurement for continuous- variable quantum key distribution[J]. Physical ReviewA, 2015, 91(2):022307.
|
[13] |
Huang D, Huang P, Lin D, et al. High-speed continuous-variable quantum key distribution without sending a local oscillator [J]. Optics letters,2015,40(16):3695-3698.
|
[14] |
SohDBS, Brif C, ColesPJ, et al. Self-referenced continuousvariable quantum key distribution protocol[J]. Physical Review X, 2015,5(4):041010.
|
[15] |
Qi B, Lougovski P, Pooser R, et al. Generating the local oscillator“ locally”in continuous- variable quantum key distribution based on coherent detection[J]. Physical Review X, 2015, 5(4):041009.
|
[16] |
WangT,HuangP,ZhouY, et al. High key rate continuous-variable quantum key distribution with a real local oscillator[J].Optics express, 2018,26(3):2794-2806.
|
[17] |
WangT, HuangP, ZhouY, et al. Pilot-multiplexed continuousvariable quantum key distribution with a real local oscillator[J].PhysicalReviewA, 2018, 97(1):012310.
|
[18] |
LiuW, Huang P, Peng J, et al. Integrating machine learning to achieve an automatic parameter prediction for practical continuous-variable quantum key distribution[J]. Physical Review A,2018,97(2):022316.
|
[19] |
Huang P, Huang J,Wang T, et al. Robust continuous-variable quantum key distribution against practical attacks[J]. Physical ReviewA, 2017, 95(5):052302.
|
[20] |
Pirandola S, Ottaviani C, Spedalieri G, et al. High-rate measurement- device- independent quantum cryptography[J]. Nature Photonics,2015, 9(6):397.
|
[21] |
Li Z, Zhang Y C, Xu F, et al. Continuous- variable measurement-device- independent quantum key distribution[J]. PhysicalReviewA, 2014, 89(5):052301.
|
[22] |
Ma H X, Huang P, Bai D Y, et al. Continuous-variable mea-surement-device-independent quantum key distribution with photon subtraction[J]. PhysicalReviewA, 2018,97(4):042329.
|
[23] |
Ma H X, Huang P, Bai DY, et al. Long-distance continuousvariable measurement-device-independent quantum key distribution with discrete modulation[J]. Physical ReviewA, 2019, 99(2):022322.
|
[24] |
MaXC, SunSH, JiangMS, et al. Gaussian-modulated coherent- state measurement-device-independent quantum key distribution[J]. PhysicalReviewA, 2014,89(4):042335.
|
[25] |
Huang B, HuangY, Peng Z. Practical security of the continuous-variable quantum key distribution with real local oscillators under phase attack[J]. Optics Express, 2019, 27(15): 20621-20631.
|
[26] |
ZhaoY, ZhangY, HuangY, et al. Polarization attack on continuous- variable quantum key distribution[J]. Journal of Physics B:Atomic, Molecular and Optical Physics, 2018,52(1):015501.
|
[27] |
Xie C, Guo Y, Liao Q, et al. Practical security analysis of continuous-variable quantum key distribution with jitter in clock synchronization[J]. Physics LettersA, 2018, 382(12):811-817.
|
[28] |
ZhouY, JiangX Q, LiuW, et al. Practical security of continuous-variable quantum key distribution under finite- dimensional effect of multi-dimensional reconciliation[J]. Chinese Physics B,2018,27(5):050301.
|
[29] |
LeverrierA, Grosshans F, Grangier P. Finite-size analysis of a continuous- variable quantum key distribution[J]. Physical ReviewA, 2010, 81(6):062343.
|