[1] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[J]. Theoretical Computer Science, 560, 7-11(2014).
[2] Ekert A K. Quantum cryptography based on Bell's theorem[J]. Physical Review Letters, 67, 661-663(1991).
[3] Mayers D. Unconditional security in quantum cryptography[J]. Journal of the ACM, 48, 351-406(2001).
[4] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances[J]. Science, 283, 2050-2056(1999).
[5] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 85, 441-444(2000).
[6] Bennett C H, Bessette F, Brassard G et al. Experimental quantum cryptography[J]. Journal of Cryptology, 5, 3-28(1992).
[7] Liao S K, Cai W Q, Liu W Y et al. Satellite-to-ground quantum key distribution[J]. Nature, 549, 43-47(2017).
[8] Wang L, Zhao S M, Gong L Y et al. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum[J]. Chinese Physics B, 24, 120307(2015).
[9] Guan J Y, Cao Z, Liu Y et al. Experimental passive round-robin differential phase-shift quantum key distribution[J]. Physical Review Letters, 114, 180502(2015).
[10] Wang S, Yin Z Q, Chen W et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring[J]. Nature Photonics, 9, 832-836(2015).
[11] Pirandola S, Laurenza R, Ottaviani C et al. Fundamental limits of repeaterless quantum communications[J]. Nature Communications, 8, 15043(2017).
[12] Lucamarini M, Yuan Z L, Dynes J F et al. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters[J]. Nature, 557, 400-403(2018).
[13] Chen G, Wang L, Li W et al. Multiple-pulse phase-matching quantum key distribution[J]. Quantum Information Processing, 19, 416(2020).
[15] Wang S, He D Y, Yin Z Q et al. Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system[J]. Physical Review X, 9, 021046(2019).
[16] Grasselli F, Curty M. Practical decoy-state method for twin-field quantum key distribution[J]. New Journal of Physics, 21, 073001(2019).
[17] Wang X B, Yu Z W, Hu X L. Twin-field quantum key distribution with large misalignment error[J]. Physical Review A, 98, 062323(2018).
[18] Ma X F, Zeng P, Zhou H Y. Phase-matching quantum key distribution[J]. Physical Review X, 8, 031043(2018).
[19] Cui C H, Yin Z Q, Wang R et al. Twin-field quantum key distribution without phase post selection[J]. Physical Review Applied, 11, 034053(2019).
[20] Wang X B. Decoy-state quantum key distribution with large random errors of light intensity[J]. Physical Review A, 75, 052301(2007).
[21] Wang G, Li Z Y, Qiao Y C et al. Light source monitoring in quantum key distribution with single-photon detector at room temperature[J]. IEEE Journal of Quantum Electronics, 54, 1-10(2018).
[22] Qiao Y C, Wang G, Li Z Y et al. Monitoring an untrusted light source with single-photon detectors in measurement-device-independent quantum key distribution[J]. Physical Review A, 99, 052302(2019).
[23] Qiao Y C, Chen Z Y, Zhang Y C et al. Sending-or-not-sending twin-field quantum key distribution with light source monitoring[J]. Entropy, 22, 36(2020).
[24] Lo H K, Ma X F, Chen K. Decoy state quantum key distribution[J]. Physical Review Letters, 94, 230504(2005).
[25] Zeng P, Wu W J, Ma X F. Symmetry-protected privacy: Beating the rate-distance linear bound over a noisy channel[J]. Physical Review Applied, 13, 064013(2020).