1. Shor, P. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997).
2. Bennett, C. H. & Brassard, G. Quantum Cryptography: public key distribution and coin tossing, In Proceeding of IEEE International Conference on Computer, Systems & Signal Processing 175–179 (1984).
3. Scarani, V. et al. The security of practical quantum key distribution. Reviews of Modern Physics 81(3), 1301–1350 (2009).
4. Ma, X. et al. Practical decoy state for quantum key distribution. Phys. Rev. A 72(1), 012326 (2005).
5. Zhang, Z. et al. Improved key-rate bounds for practical decoy-state quantum key distribution. Phys. Rev. A 95, 012333 (2017).