[1]Lo H K, Curty M, Qi B. MeasurementDeviceIndependent quantum key distribution[J]. Physical Review Letters, 2012, 108, 130503: 15
[2]Jiang H D, Gao M, Wang H, et al. A global estimation of the lower bound of the privacy amplification term for decoystate quantum key distribution[EBOL]. [20151010]. http:arxiv.orgabs1502.04427
[3]Shan Y Z, Sun S H, Ma X C, et al. Measurementdeviceindependent quantum key distribution with a passive decoystate method[J]. Physical Review A, 2014, 90, 042334: 19
[4]Zhou C, Bao W S, Li H W, et al. Tight finitekey analysis for passive decoystate quantum key distribution under general attacks[J]. Physical Review A, 2014, 89, 052328: 19
[5]Wang Q, Wang X B. Simulating of the measurementdevice independent quantum key distribution with phase randomized general sources[J]. Scientific Reports, 2014, 4, 4612: 17
[6]Wang X B. Threeintensity decoystate method for deviceindependent quantum key distribution with basisdependent errors[J]. Physical Review A, 2013, 87, 012320: 111
[7]Zhou C, Bao W S, et al. Phaseencoded measurementdeviceindependent quantum key distribution with practical spontaneousparametricdownconversion sources[J]. Physical Review A, 2013, 88, 052333: 115 |