C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 175–179 (1984).

G. Brassard, N. Lutkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85, 1330 (2000).

[Crossref]
[PubMed]

C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 175–179 (1984).

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

H. K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94, 230504 (2005).

[Crossref]
[PubMed]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

L. A. Coldren, S. W. Corzine, and M. L. Mashanovitch, Diode lasers and photonic integrated circuits (John Wiley and Sons, 2012).

[Crossref]

M. Rau, T. Vogl, G. Corrielli, G. Vest, L. Fuchs, S. Nauerth, and H. Weinfurter, “Spatial mode side channels in free-space QKD implementations,” IEEE J. Sel. Top. Quantum Electron. 21, 187–191 (2015).

[Crossref]

L. A. Coldren, S. W. Corzine, and M. L. Mashanovitch, Diode lasers and photonic integrated circuits (John Wiley and Sons, 2012).

[Crossref]

A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, and K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources,” New J. Phys. 17, 093011 (2015).

[Crossref]

M. Dusek, M. Jahma, and N. Lutkenhaus, “Unambiguous state discrimination in quantum cryptography with weak coherent states,” Phys. Rev. A 62, 022306 (2000).

[Crossref]

L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, “Hacking commercial quantum cryptography systems by tailored bright illumination,” Nat. Photon. 4, 686–689 (2010).

[Crossref]

S. Nauerth, F. Moll, M. Rau, C. Fuchs, J. Horwath, S. Frick, and H. Weinfurter, “Air-to-ground quantum communication,” Nat. Photon. 7, 382–386 (2013).

[Crossref]

S. Nauerth, F. Moll, M. Rau, C. Fuchs, J. Horwath, S. Frick, and H. Weinfurter, “Air-to-ground quantum communication,” Nat. Photon. 7, 382–386 (2013).

[Crossref]

M. Rau, T. Vogl, G. Corrielli, G. Vest, L. Fuchs, S. Nauerth, and H. Weinfurter, “Spatial mode side channels in free-space QKD implementations,” IEEE J. Sel. Top. Quantum Electron. 21, 187–191 (2015).

[Crossref]

S. Nauerth, M. Furst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” New J. Phys. 11, 065001 (2009).

[Crossref]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

M. Hayashi and R. Nakayama, “Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths,” New J. Phys. 16, 063009 (2014).

[Crossref]

S. Nauerth, F. Moll, M. Rau, C. Fuchs, J. Horwath, S. Frick, and H. Weinfurter, “Air-to-ground quantum communication,” Nat. Photon. 7, 382–386 (2013).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

W. Y. Hwang, “Quantum key distribution with high loss: toward global secure communication,” Phys. Rev. Lett. 91, 057901 (2003).

[Crossref]
[PubMed]

A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, and K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources,” New J. Phys. 17, 093011 (2015).

[Crossref]

M. Dusek, M. Jahma, and N. Lutkenhaus, “Unambiguous state discrimination in quantum cryptography with weak coherent states,” Phys. Rev. A 62, 022306 (2000).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

H. Ko, K. Lim, J. Oh, and J. K. K. Rhee, “Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system,” Quant. Inf. Proc. 15, 4265–4282 (2016).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, and K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources,” New J. Phys. 17, 093011 (2015).

[Crossref]

H. Ko, K. Lim, J. Oh, and J. K. K. Rhee, “Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system,” Quant. Inf. Proc. 15, 4265–4282 (2016).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

H. K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94, 230504 (2005).

[Crossref]
[PubMed]

M. Dusek, M. Jahma, and N. Lutkenhaus, “Unambiguous state discrimination in quantum cryptography with weak coherent states,” Phys. Rev. A 62, 022306 (2000).

[Crossref]

G. Brassard, N. Lutkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85, 1330 (2000).

[Crossref]
[PubMed]

L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, “Hacking commercial quantum cryptography systems by tailored bright illumination,” Nat. Photon. 4, 686–689 (2010).

[Crossref]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

H. K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94, 230504 (2005).

[Crossref]
[PubMed]

L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, “Hacking commercial quantum cryptography systems by tailored bright illumination,” Nat. Photon. 4, 686–689 (2010).

[Crossref]

L. A. Coldren, S. W. Corzine, and M. L. Mashanovitch, Diode lasers and photonic integrated circuits (John Wiley and Sons, 2012).

[Crossref]

A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, and K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources,” New J. Phys. 17, 093011 (2015).

[Crossref]

S. Nauerth, F. Moll, M. Rau, C. Fuchs, J. Horwath, S. Frick, and H. Weinfurter, “Air-to-ground quantum communication,” Nat. Photon. 7, 382–386 (2013).

[Crossref]

G. Brassard, N. Lutkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85, 1330 (2000).

[Crossref]
[PubMed]

M. Hayashi and R. Nakayama, “Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths,” New J. Phys. 16, 063009 (2014).

[Crossref]

M. Rau, T. Vogl, G. Corrielli, G. Vest, L. Fuchs, S. Nauerth, and H. Weinfurter, “Spatial mode side channels in free-space QKD implementations,” IEEE J. Sel. Top. Quantum Electron. 21, 187–191 (2015).

[Crossref]

S. Nauerth, F. Moll, M. Rau, C. Fuchs, J. Horwath, S. Frick, and H. Weinfurter, “Air-to-ground quantum communication,” Nat. Photon. 7, 382–386 (2013).

[Crossref]

S. Nauerth, M. Furst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” New J. Phys. 11, 065001 (2009).

[Crossref]

H. Ko, K. Lim, J. Oh, and J. K. K. Rhee, “Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system,” Quant. Inf. Proc. 15, 4265–4282 (2016).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

X. B. Wang, C. Z. Peng, J. Zhang, L. Yang, and J. W. Pan, “General theory of decoy-state quantum cryptography with source errors,” Phys. Rev. A 77, 042311 (2008).

[Crossref]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

X. B. Wang, C. Z. Peng, J. Zhang, L. Yang, and J. W. Pan, “General theory of decoy-state quantum cryptography with source errors,” Phys. Rev. A 77, 042311 (2008).

[Crossref]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

M. Rau, T. Vogl, G. Corrielli, G. Vest, L. Fuchs, S. Nauerth, and H. Weinfurter, “Spatial mode side channels in free-space QKD implementations,” IEEE J. Sel. Top. Quantum Electron. 21, 187–191 (2015).

[Crossref]

S. Nauerth, F. Moll, M. Rau, C. Fuchs, J. Horwath, S. Frick, and H. Weinfurter, “Air-to-ground quantum communication,” Nat. Photon. 7, 382–386 (2013).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

H. Ko, K. Lim, J. Oh, and J. K. K. Rhee, “Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system,” Quant. Inf. Proc. 15, 4265–4282 (2016).

[Crossref]

G. Brassard, N. Lutkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85, 1330 (2000).

[Crossref]
[PubMed]

S. Nauerth, M. Furst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” New J. Phys. 11, 065001 (2009).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, “Hacking commercial quantum cryptography systems by tailored bright illumination,” Nat. Photon. 4, 686–689 (2010).

[Crossref]

A. Mizutani, M. Curty, C. C. W. Lim, N. Imoto, and K. Tamaki, “Finite-key security analysis of quantum key distribution with imperfect light sources,” New J. Phys. 17, 093011 (2015).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

M. Rau, T. Vogl, G. Corrielli, G. Vest, L. Fuchs, S. Nauerth, and H. Weinfurter, “Spatial mode side channels in free-space QKD implementations,” IEEE J. Sel. Top. Quantum Electron. 21, 187–191 (2015).

[Crossref]

M. Rau, T. Vogl, G. Corrielli, G. Vest, L. Fuchs, S. Nauerth, and H. Weinfurter, “Spatial mode side channels in free-space QKD implementations,” IEEE J. Sel. Top. Quantum Electron. 21, 187–191 (2015).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

X. B. Wang, C. Z. Peng, J. Zhang, L. Yang, and J. W. Pan, “General theory of decoy-state quantum cryptography with source errors,” Phys. Rev. A 77, 042311 (2008).

[Crossref]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

S. Nauerth, M. Furst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” New J. Phys. 11, 065001 (2009).

[Crossref]

M. Rau, T. Vogl, G. Corrielli, G. Vest, L. Fuchs, S. Nauerth, and H. Weinfurter, “Spatial mode side channels in free-space QKD implementations,” IEEE J. Sel. Top. Quantum Electron. 21, 187–191 (2015).

[Crossref]

S. Nauerth, F. Moll, M. Rau, C. Fuchs, J. Horwath, S. Frick, and H. Weinfurter, “Air-to-ground quantum communication,” Nat. Photon. 7, 382–386 (2013).

[Crossref]

S. Nauerth, M. Furst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” New J. Phys. 11, 065001 (2009).

[Crossref]

L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, “Hacking commercial quantum cryptography systems by tailored bright illumination,” Nat. Photon. 4, 686–689 (2010).

[Crossref]

L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, “Hacking commercial quantum cryptography systems by tailored bright illumination,” Nat. Photon. 4, 686–689 (2010).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

X. B. Wang, C. Z. Peng, J. Zhang, L. Yang, and J. W. Pan, “General theory of decoy-state quantum cryptography with source errors,” Phys. Rev. A 77, 042311 (2008).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

X. B. Wang, C. Z. Peng, J. Zhang, L. Yang, and J. W. Pan, “General theory of decoy-state quantum cryptography with source errors,” Phys. Rev. A 77, 042311 (2008).

[Crossref]

C. Z. Peng, J. Zhang, D. Yang, W. B. Gao, H. X. Ma, H. Yin, H. P. Zeng, T. Yang, X. B. Wang, and J. W. Pan, “Experimental long-distance decoy-state quantum key distribution based on polarization encoding,” Phys. Rev. Lett. 98, 010505 (2007).

[Crossref]
[PubMed]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]

J. Y. Wang, B. Yang, S. K. Liao, L. Zhang, Q. Shen, X. F. Hu, J. C. Wu, S. J. Yang, H. Jiang, Y. L. Tang, B. Zhong, H. Liang, W. Y. Liu, Y. H. Hu, Y. M. Huang, B. Qi, J. G. Ren, G. S. Pan, J. Yin, J. J. Jia, Y. A. Chen, K. Chen, C. Z. Peng, and J. W. Pan, “Direct and full-scale experimental verifications towards ground-satellite quantum key distribution,” Nat. Photon. 7, 387–393 (2013).

[Crossref]