1. Aharonov, D., Ben-Or, M. & Eban, E. in Proc. Innovations in Computer Science (ICS) (ed. Yao, A.) 453–469 (Tsinghua Univ. Press, 2010)
2. Broadbent, A., Fitzsimons, J. F. & Kashefi, E. in Proc. IEEE Foundations of Computer Science (FOCS) 517–526 (IEEE Computer Society, 2009)
3. Bennett, C. H. & Brassard, G. in Proc. IEEE Int. Conf. on Computers, Systems and Signal Processing 175–179 (IEEE Computer Society, 1984)
4. Lo, H.-K. & Chau, H. F. Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)
5. Shor, P. W. & Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000)