[1] | Bennett C H and Brassard G 1984 Int. Conf. Comput. Syst. Signal Process (Bangalore India) (New York: IEEE) p 175 |
[2] | Ekert A K 1991 Phys. Rev. Lett. 67 661 | Quantum cryptography based on Bell’s theorem
[3] | Peev M et al 2009 New J. Phys. 11 075001 | The SECOQC quantum key distribution network in Vienna
[4] | Chen T Y et al 2010 Opt. Express 18 27217 | Metropolitan all-pass and inter-city quantum communication network
[5] | Sasaki M et al 2011 Opt. Express 19 10387 | Field test of quantum key distribution in the Tokyo QKD Network
[6] | Fröhlich B et al 2013 Nature 501 69 | A quantum access network
[7] | Xu F et al 2010 New J. Phys. 12 113026 | Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
[8] | Lydersen L et al 2010 Nat. Photon. 4 686 | Hacking commercial quantum cryptography systems by tailored bright illumination
[9] | Sun S H et al 2011 Phys. Rev. A 83 062331 | Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system
[10] | Lo H K et al 2012 Phys. Rev. Lett. 108 130503 | Measurement-Device-Independent Quantum Key Distribution
[11] | Rubenok A et al 2013 Phys. Rev. Lett. 111 130501 | Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks
[12] | Liu Y et al 2013 Phys. Rev. Lett. 111 130502 | Experimental Measurement-Device-Independent Quantum Key Distribution
[13] | Tang Z Y et al 2014 Phys. Rev. Lett. 112 190503 | Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution
[14] | Tang Y L et al 2014 Phys. Rev. Lett. 113 190501 | Measurement-Device-Independent Quantum Key Distribution over 200 km
[15] | Wang C, Song X T, Yin Z Q, Wang S, Chen W, Zhang C M, Guo G C and Han Z F 2015 Phys. Rev. Lett. 115 160502 | Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution
[16] | Xu F 2015 Phys. Rev. A 92 012333 | Measurement-device-independent quantum communication with an untrusted source
[17] | Comandar L C, Lucamarini M, Fröhlich B, Dynes J F et al 2016 Nat. Photon. 10 312 | Quantum key distribution without detector vulnerabilities using optically seeded lasers
[18] | Tang G Z, Sun S H, Xu F, Chen H, Li C Y and Liang L M 2016 Phys. Rev. A 94 032326 | Experimental asymmetric plug-and-play measurement-device-independent quantum key distribution
[19] | Tang G Z, Sun S H, Chen H, Li C Y and Liang L M 2016 Chin. Phys. Lett. 33 120301 | Time-Bin Phase-Encoding Measurement-Device-Independent Quantum Key Distribution with Four Single-Photon Detectors
[20] | Tang Y L, Yin H L, Zhao Q, Liu H et al 2016 Phys. Rev. X 6 011024 | Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network
[21] | Lucio-Martinez I, Chan P, Mo X, Hosier S and Tittel W 2009 New J. Phys. 11 095001 | Proof-of-concept of real-world quantum key distribution with quantum frames
[22] | Xu F, Curty M, Qi B and Lo H K 2013 New J. Phys. 15 113007 | Practical aspects of measurement-device-independent quantum key distribution
[23] | Sun S H, Ma H Q, Han J J, Liang L M and Li C Z 2010 Opt. Lett. 35 1203 | Quantum key distribution based on phase encoding in long-distance communication fiber