1. Quantum cryptography: Public key distribution and coin tossing;Bennett,1984
2. Y. Zhao, C.H.F.Fung, B.Qi, C.Chen, H.K.Lo, Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems, Phys. Rev. A. 78(4)(2008) 042333.
3. Y.L. Tang, H.L.Yin, X.Ma, et al. Measurement-device-independent quantum key distribution over untrustful metropolitan network, Phys. Rev. A. 88(2)(2013) 022308.
4. H. Lo, X.Ma, K.Chen, Decoy state quantum key distribution, Phys. Rev. Lett. 94(23)(2005) 230504.
5. T. Schmitt-Manderbach, H.Weier, M.Furst, et al. Space-to-ground quantum key distribution using a small-sized payload on Tiangong-2 space lab, Phys. Rev. Lett. 98(1)(2007) 010504.