Q. Liao, Y. Guo, C. L. Xie, D. Huang, P. Huang, and G. H. Zeng, “Composable security of unidimensional continuous-variable quantum key distribution,” Quantum Inf Process, 17, 113 (2018).

[Crossref]

Y. Guo, R. J. Li, Q. Liao, J. Zhou, and D. Huang, “Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier,” Phys. Lett. A 382(6), 372–381 (2018).

[Crossref]

Q. Liao, Y. Guo, D. Huang, P. Huang, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection,” New J. Phys. 20(2), 023015 (2018).

[Crossref]

Y. Guo, Q. Liao, Y. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017).

[Crossref]

Y. Guo, Q. Liao, D. Huang, and G. H. Zeng, “Quantum relay schemes for continuous-variable quantum key distribution,” Phys. Rev. A 95, 042326 (2017).

[Crossref]

D. Huang, P. Huang, D. K. Lin, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Scientific Reports, 6, 19201 (2016).

[Crossref]
[PubMed]

D. Huang, P. Huang, T. Wang, H. S. Li, Y. M. Zhou, and G. H. Zeng, “Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol,” Phys. Rev. A 94, 032305 (2016).

[Crossref]

Y. Choi, O. Kwon, M. Woo, K. Oh, S. W. Han, Y. S. Kim, and S. Moon, “Plug-and-play measurement-device-independent quantum key distribution,” Phys. Rev. A 93, 032319 (2016).

[Crossref]

M. Gessner, L. Pezzé, and A. Smerzi, “Efficient entanglement criteria for discrete, continuous, and hybrid variables,” Phys. Rev. A 94(2), 020101 (2016).

[Crossref]

S. Takeda, M. Fuwa, P. van Loock, and A. Furusawa, “Entanglement swapping between discrete and continuous variables,” Phys. Rev. Lett. 114(10), 100501 (2015).

[Crossref]
[PubMed]

F. H. Xu, M. Curty, B. Qi, L. Qian, and H. K. Lo, “Discrete and continuous variables for measurement-device-independent quantum cryptography,” Nat. Photon. 9(12), 772 (2015).

[Crossref]

H. W. Li, Z. Q. Yin, M. Pawlowski, G. C. Guo, and Z. F. Han, “Detection efficiency and noise in a semi-device-independent randomness-extraction protocol,” Phys. Rev. A 91, 032305 (2015).

[Crossref]

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

C. Ottaviani, G. Spedalieri, S. L. Braunstein, and S. Pirandola, “Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration,” Phys. Rev. A 91, 022320 (2015).

[Crossref]

A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent states,” Phys. Rev. Lett. 114, 070501 (2015).

[Crossref]
[PubMed]

Z. Y. Li, Y. C. Zhang, F. H. Xu, X. Peng, and H. Guo, “Continuous-variable measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 052301 (2014).

[Crossref]

H. W. Li, Z. Q. Yin, W. Chen, S. Wang, G. C. Guo, and Z. F. Han, “Quantum key distribution based on quantum dimension and independent devices,” Phys. Rev. A 89, 032302 (2014).

[Crossref]

M. Curty, F. H. Xu, W. Cui, C. C. Lim, K. Tamaki, and H. K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution,” Nat. Commun. 5(4), 643–648 (2014).

[Crossref]

P. Huang, J. Fang, and G. H. Zeng, “State-discrimination attack on discretely modulated continuous-variable quantum key distribution,” Phys. Rev. A 89, 042330 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, and L. M. Liang, “Gaussian-modulated coherent-state measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 042335 (2014).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol,” Phys. Rev. A 87, 052309 (2013).

[Crossref]

H. Qin, R. Kumar, and R. Alleaume, “Saturation attack on continuous-variable quantum key distribution system,” Proc. SPIE 8899(2), 717–718 (2013).

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87, 062313 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88, 022339 (2013).

[Crossref]

C. Weedbrook, “Continuous-variable quantum key distribution with entanglement in the middle,” Phys. Rev. A 87, 022308 (2013).

[Crossref]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110, 030502 (2013).

[Crossref]
[PubMed]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012).

[Crossref]
[PubMed]

S. L. Braunstein and S. Pirandola, “Side-channel-free quantum key distribution,” Phys. Rev. Lett. 108, 130502 (2012).

[Crossref]
[PubMed]

H. K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 108, 130503 (2012).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84, 621 (2012).

[Crossref]

A. Leverrier and P. Grangier, “Erratum: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation [Phys. Rev. Lett. 102, 180504 (2009)],” Phys. Rev. Lett. 106259902 (2011).

[Crossref]

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

R. Renner and J. I. Cirac, “de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography,” Phys. Rev. Lett. 102, 110504 (2009).

[Crossref]
[PubMed]

A. Leverrier and P. Grangier, “Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation,” Phys. Rev. Lett. 102(18), 180504 (2009).

[Crossref]
[PubMed]

S. Pirandola, S. L. Braunstein, and S. Lloyd, “Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography,” Phys. Rev. Lett. 101, 200504 (2008).

[Crossref]
[PubMed]

A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, “Device-independent security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 98, 230501 (2007).

[Crossref]
[PubMed]

J. Y. Bang and M. S. Berger, ”Quantum mechanics and the generalized uncertainty principle,” Phys. Rev. D 74(12), 125012 (2006).

[Crossref]

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

M. M. Wolf, G. Giedke, and J. I. Cirac, “Extremality of Gaussian Quantum States,” Phys. Rev. Lett. 96, 080502 (2006).

[Crossref]
[PubMed]

R. García-Patrón and N. J. Cerf, “Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006).

[Crossref]
[PubMed]

M. Navascués and A. Acín, “SecurityBounds for continuous variables quantum key distribution,” Phys. Rev. Lett. 94, 020505 (2005).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95(18), 180503 (2005).

[Crossref]
[PubMed]

X. F. Mo, B. Zhu, Z. F. Han, Y. Z. Gui, and G. C. Guo, “Faraday-Michelson system for quantum cryptography,” Opt. Lett. 30(19), 2632–2634 (2005).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and Ph. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88, 057902 (2002).

[Crossref]
[PubMed]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145 (2002).

[Crossref]

W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature (London) 299(5886), 802–803 (1982).

[Crossref]

A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, “Device-independent security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 98, 230501 (2007).

[Crossref]
[PubMed]

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

M. Navascués and A. Acín, “SecurityBounds for continuous variables quantum key distribution,” Phys. Rev. Lett. 94, 020505 (2005).

[Crossref]

H. Qin, R. Kumar, and R. Alleaume, “Saturation attack on continuous-variable quantum key distribution system,” Proc. SPIE 8899(2), 717–718 (2013).

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

J. Y. Bang and M. S. Berger, ”Quantum mechanics and the generalized uncertainty principle,” Phys. Rev. D 74(12), 125012 (2006).

[Crossref]

C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175–179.

J. Y. Bang and M. S. Berger, ”Quantum mechanics and the generalized uncertainty principle,” Phys. Rev. D 74(12), 125012 (2006).

[Crossref]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012).

[Crossref]
[PubMed]

C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175–179.

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

C. Ottaviani, G. Spedalieri, S. L. Braunstein, and S. Pirandola, “Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration,” Phys. Rev. A 91, 022320 (2015).

[Crossref]

S. L. Braunstein and S. Pirandola, “Side-channel-free quantum key distribution,” Phys. Rev. Lett. 108, 130502 (2012).

[Crossref]
[PubMed]

S. Pirandola, S. L. Braunstein, and S. Lloyd, “Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography,” Phys. Rev. Lett. 101, 200504 (2008).

[Crossref]
[PubMed]

A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, “Device-independent security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 98, 230501 (2007).

[Crossref]
[PubMed]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110, 030502 (2013).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84, 621 (2012).

[Crossref]

R. García-Patrón and N. J. Cerf, “Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and Ph. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

H. W. Li, Z. Q. Yin, W. Chen, S. Wang, G. C. Guo, and Z. F. Han, “Quantum key distribution based on quantum dimension and independent devices,” Phys. Rev. A 89, 032302 (2014).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

Y. Choi, O. Kwon, M. Woo, K. Oh, S. W. Han, Y. S. Kim, and S. Moon, “Plug-and-play measurement-device-independent quantum key distribution,” Phys. Rev. A 93, 032319 (2016).

[Crossref]

M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, Cambridge University, Cambridge, (2000).

R. Renner and J. I. Cirac, “de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography,” Phys. Rev. Lett. 102, 110504 (2009).

[Crossref]
[PubMed]

M. M. Wolf, G. Giedke, and J. I. Cirac, “Extremality of Gaussian Quantum States,” Phys. Rev. Lett. 96, 080502 (2006).

[Crossref]
[PubMed]

M. Curty, F. H. Xu, W. Cui, C. C. Lim, K. Tamaki, and H. K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution,” Nat. Commun. 5(4), 643–648 (2014).

[Crossref]

F. H. Xu, M. Curty, B. Qi, L. Qian, and H. K. Lo, “Discrete and continuous variables for measurement-device-independent quantum cryptography,” Nat. Photon. 9(12), 772 (2015).

[Crossref]

M. Curty, F. H. Xu, W. Cui, C. C. Lim, K. Tamaki, and H. K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution,” Nat. Commun. 5(4), 643–648 (2014).

[Crossref]

H. K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 108, 130503 (2012).

[Crossref]
[PubMed]

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87, 062313 (2013).

[Crossref]

P. Huang, J. Fang, and G. H. Zeng, “State-discrimination attack on discretely modulated continuous-variable quantum key distribution,” Phys. Rev. A 89, 042330 (2014).

[Crossref]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012).

[Crossref]
[PubMed]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012).

[Crossref]
[PubMed]

S. Takeda, M. Fuwa, P. van Loock, and A. Furusawa, “Entanglement swapping between discrete and continuous variables,” Phys. Rev. Lett. 114(10), 100501 (2015).

[Crossref]
[PubMed]

S. Takeda, M. Fuwa, P. van Loock, and A. Furusawa, “Entanglement swapping between discrete and continuous variables,” Phys. Rev. Lett. 114(10), 100501 (2015).

[Crossref]
[PubMed]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110, 030502 (2013).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84, 621 (2012).

[Crossref]

R. García-Patrón and N. J. Cerf, “Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006).

[Crossref]
[PubMed]

R. García-Patrón, Quantum information with optical continuous variables: from Bell tests to key distribution, Universite Libre De Bruxelles, (2007).

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

M. Gessner, L. Pezzé, and A. Smerzi, “Efficient entanglement criteria for discrete, continuous, and hybrid variables,” Phys. Rev. A 94(2), 020101 (2016).

[Crossref]

M. M. Wolf, G. Giedke, and J. I. Cirac, “Extremality of Gaussian Quantum States,” Phys. Rev. Lett. 96, 080502 (2006).

[Crossref]
[PubMed]

A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, “Device-independent security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 98, 230501 (2007).

[Crossref]
[PubMed]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145 (2002).

[Crossref]

A. Leverrier and P. Grangier, “Erratum: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation [Phys. Rev. Lett. 102, 180504 (2009)],” Phys. Rev. Lett. 106259902 (2011).

[Crossref]

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

A. Leverrier and P. Grangier, “Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation,” Phys. Rev. Lett. 102(18), 180504 (2009).

[Crossref]
[PubMed]

F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88, 057902 (2002).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and Ph. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and Ph. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88, 057902 (2002).

[Crossref]
[PubMed]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, and L. M. Liang, “Gaussian-modulated coherent-state measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 042335 (2014).

[Crossref]

H. W. Li, Z. Q. Yin, M. Pawlowski, G. C. Guo, and Z. F. Han, “Detection efficiency and noise in a semi-device-independent randomness-extraction protocol,” Phys. Rev. A 91, 032305 (2015).

[Crossref]

H. W. Li, Z. Q. Yin, W. Chen, S. Wang, G. C. Guo, and Z. F. Han, “Quantum key distribution based on quantum dimension and independent devices,” Phys. Rev. A 89, 032302 (2014).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

X. F. Mo, B. Zhu, Z. F. Han, Y. Z. Gui, and G. C. Guo, “Faraday-Michelson system for quantum cryptography,” Opt. Lett. 30(19), 2632–2634 (2005).

[Crossref]
[PubMed]

Z. Y. Li, Y. C. Zhang, F. H. Xu, X. Peng, and H. Guo, “Continuous-variable measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 052301 (2014).

[Crossref]

Q. Liao, Y. Guo, C. L. Xie, D. Huang, P. Huang, and G. H. Zeng, “Composable security of unidimensional continuous-variable quantum key distribution,” Quantum Inf Process, 17, 113 (2018).

[Crossref]

Q. Liao, Y. Guo, D. Huang, P. Huang, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection,” New J. Phys. 20(2), 023015 (2018).

[Crossref]

Y. Guo, R. J. Li, Q. Liao, J. Zhou, and D. Huang, “Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier,” Phys. Lett. A 382(6), 372–381 (2018).

[Crossref]

Y. Guo, Q. Liao, Y. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017).

[Crossref]

Y. Guo, Q. Liao, D. Huang, and G. H. Zeng, “Quantum relay schemes for continuous-variable quantum key distribution,” Phys. Rev. A 95, 042326 (2017).

[Crossref]

Y. Choi, O. Kwon, M. Woo, K. Oh, S. W. Han, Y. S. Kim, and S. Moon, “Plug-and-play measurement-device-independent quantum key distribution,” Phys. Rev. A 93, 032319 (2016).

[Crossref]

H. W. Li, Z. Q. Yin, M. Pawlowski, G. C. Guo, and Z. F. Han, “Detection efficiency and noise in a semi-device-independent randomness-extraction protocol,” Phys. Rev. A 91, 032305 (2015).

[Crossref]

H. W. Li, Z. Q. Yin, W. Chen, S. Wang, G. C. Guo, and Z. F. Han, “Quantum key distribution based on quantum dimension and independent devices,” Phys. Rev. A 89, 032302 (2014).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

X. F. Mo, B. Zhu, Z. F. Han, Y. Z. Gui, and G. C. Guo, “Faraday-Michelson system for quantum cryptography,” Opt. Lett. 30(19), 2632–2634 (2005).

[Crossref]
[PubMed]

Q. Liao, Y. Guo, D. Huang, P. Huang, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection,” New J. Phys. 20(2), 023015 (2018).

[Crossref]

Y. Guo, R. J. Li, Q. Liao, J. Zhou, and D. Huang, “Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier,” Phys. Lett. A 382(6), 372–381 (2018).

[Crossref]

Q. Liao, Y. Guo, C. L. Xie, D. Huang, P. Huang, and G. H. Zeng, “Composable security of unidimensional continuous-variable quantum key distribution,” Quantum Inf Process, 17, 113 (2018).

[Crossref]

Y. Guo, Q. Liao, D. Huang, and G. H. Zeng, “Quantum relay schemes for continuous-variable quantum key distribution,” Phys. Rev. A 95, 042326 (2017).

[Crossref]

Y. Guo, Q. Liao, Y. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017).

[Crossref]

D. Huang, P. Huang, T. Wang, H. S. Li, Y. M. Zhou, and G. H. Zeng, “Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol,” Phys. Rev. A 94, 032305 (2016).

[Crossref]

D. Huang, P. Huang, D. K. Lin, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Scientific Reports, 6, 19201 (2016).

[Crossref]
[PubMed]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

Q. Liao, Y. Guo, C. L. Xie, D. Huang, P. Huang, and G. H. Zeng, “Composable security of unidimensional continuous-variable quantum key distribution,” Quantum Inf Process, 17, 113 (2018).

[Crossref]

Q. Liao, Y. Guo, D. Huang, P. Huang, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection,” New J. Phys. 20(2), 023015 (2018).

[Crossref]

Y. Guo, Q. Liao, Y. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017).

[Crossref]

D. Huang, P. Huang, D. K. Lin, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Scientific Reports, 6, 19201 (2016).

[Crossref]
[PubMed]

D. Huang, P. Huang, T. Wang, H. S. Li, Y. M. Zhou, and G. H. Zeng, “Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol,” Phys. Rev. A 94, 032305 (2016).

[Crossref]

P. Huang, J. Fang, and G. H. Zeng, “State-discrimination attack on discretely modulated continuous-variable quantum key distribution,” Phys. Rev. A 89, 042330 (2014).

[Crossref]

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, and L. M. Liang, “Gaussian-modulated coherent-state measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 042335 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol,” Phys. Rev. A 87, 052309 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88, 022339 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87, 062313 (2013).

[Crossref]

Y. Choi, O. Kwon, M. Woo, K. Oh, S. W. Han, Y. S. Kim, and S. Moon, “Plug-and-play measurement-device-independent quantum key distribution,” Phys. Rev. A 93, 032319 (2016).

[Crossref]

H. Qin, R. Kumar, and R. Alleaume, “Saturation attack on continuous-variable quantum key distribution system,” Proc. SPIE 8899(2), 717–718 (2013).

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87, 062313 (2013).

[Crossref]

Y. Choi, O. Kwon, M. Woo, K. Oh, S. W. Han, Y. S. Kim, and S. Moon, “Plug-and-play measurement-device-independent quantum key distribution,” Phys. Rev. A 93, 032319 (2016).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95(18), 180503 (2005).

[Crossref]
[PubMed]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95(18), 180503 (2005).

[Crossref]
[PubMed]

A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent states,” Phys. Rev. Lett. 114, 070501 (2015).

[Crossref]
[PubMed]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110, 030502 (2013).

[Crossref]
[PubMed]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012).

[Crossref]
[PubMed]

A. Leverrier and P. Grangier, “Erratum: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation [Phys. Rev. Lett. 102, 180504 (2009)],” Phys. Rev. Lett. 106259902 (2011).

[Crossref]

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

A. Leverrier and P. Grangier, “Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation,” Phys. Rev. Lett. 102(18), 180504 (2009).

[Crossref]
[PubMed]

D. Huang, P. Huang, T. Wang, H. S. Li, Y. M. Zhou, and G. H. Zeng, “Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol,” Phys. Rev. A 94, 032305 (2016).

[Crossref]

H. W. Li, Z. Q. Yin, M. Pawlowski, G. C. Guo, and Z. F. Han, “Detection efficiency and noise in a semi-device-independent randomness-extraction protocol,” Phys. Rev. A 91, 032305 (2015).

[Crossref]

H. W. Li, Z. Q. Yin, W. Chen, S. Wang, G. C. Guo, and Z. F. Han, “Quantum key distribution based on quantum dimension and independent devices,” Phys. Rev. A 89, 032302 (2014).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

Y. Guo, R. J. Li, Q. Liao, J. Zhou, and D. Huang, “Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier,” Phys. Lett. A 382(6), 372–381 (2018).

[Crossref]

Z. Y. Li, Y. C. Zhang, F. H. Xu, X. Peng, and H. Guo, “Continuous-variable measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 052301 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, and L. M. Liang, “Gaussian-modulated coherent-state measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 042335 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol,” Phys. Rev. A 87, 052309 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88, 022339 (2013).

[Crossref]

Q. Liao, Y. Guo, C. L. Xie, D. Huang, P. Huang, and G. H. Zeng, “Composable security of unidimensional continuous-variable quantum key distribution,” Quantum Inf Process, 17, 113 (2018).

[Crossref]

Y. Guo, R. J. Li, Q. Liao, J. Zhou, and D. Huang, “Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier,” Phys. Lett. A 382(6), 372–381 (2018).

[Crossref]

Q. Liao, Y. Guo, D. Huang, P. Huang, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection,” New J. Phys. 20(2), 023015 (2018).

[Crossref]

Y. Guo, Q. Liao, Y. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017).

[Crossref]

Y. Guo, Q. Liao, D. Huang, and G. H. Zeng, “Quantum relay schemes for continuous-variable quantum key distribution,” Phys. Rev. A 95, 042326 (2017).

[Crossref]

M. Curty, F. H. Xu, W. Cui, C. C. Lim, K. Tamaki, and H. K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution,” Nat. Commun. 5(4), 643–648 (2014).

[Crossref]

D. Huang, P. Huang, D. K. Lin, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Scientific Reports, 6, 19201 (2016).

[Crossref]
[PubMed]

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84, 621 (2012).

[Crossref]

S. Pirandola, S. L. Braunstein, and S. Lloyd, “Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography,” Phys. Rev. Lett. 101, 200504 (2008).

[Crossref]
[PubMed]

F. H. Xu, M. Curty, B. Qi, L. Qian, and H. K. Lo, “Discrete and continuous variables for measurement-device-independent quantum cryptography,” Nat. Photon. 9(12), 772 (2015).

[Crossref]

M. Curty, F. H. Xu, W. Cui, C. C. Lim, K. Tamaki, and H. K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution,” Nat. Commun. 5(4), 643–648 (2014).

[Crossref]

H. K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 108, 130503 (2012).

[Crossref]
[PubMed]

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “CV MDI QKD: Composable security against coherent attacks,” arXiv:1704.07924 (2017).

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “Parameter estimation with almost no public communication for continuous-variable quantum key distribution,” arXiv: 1712.00743 (2017).

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, and L. M. Liang, “Gaussian-modulated coherent-state measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 042335 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88, 022339 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol,” Phys. Rev. A 87, 052309 (2013).

[Crossref]

A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, “Device-independent security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 98, 230501 (2007).

[Crossref]
[PubMed]

Y. Choi, O. Kwon, M. Woo, K. Oh, S. W. Han, Y. S. Kim, and S. Moon, “Plug-and-play measurement-device-independent quantum key distribution,” Phys. Rev. A 93, 032319 (2016).

[Crossref]

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

M. Navascués and A. Acín, “SecurityBounds for continuous variables quantum key distribution,” Phys. Rev. Lett. 94, 020505 (2005).

[Crossref]

M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, Cambridge University, Cambridge, (2000).

Y. Choi, O. Kwon, M. Woo, K. Oh, S. W. Han, Y. S. Kim, and S. Moon, “Plug-and-play measurement-device-independent quantum key distribution,” Phys. Rev. A 93, 032319 (2016).

[Crossref]

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

C. Ottaviani, G. Spedalieri, S. L. Braunstein, and S. Pirandola, “Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration,” Phys. Rev. A 91, 022320 (2015).

[Crossref]

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “CV MDI QKD: Composable security against coherent attacks,” arXiv:1704.07924 (2017).

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “Parameter estimation with almost no public communication for continuous-variable quantum key distribution,” arXiv: 1712.00743 (2017).

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “Parameter estimation with almost no public communication for continuous-variable quantum key distribution,” arXiv: 1712.00743 (2017).

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “CV MDI QKD: Composable security against coherent attacks,” arXiv:1704.07924 (2017).

H. W. Li, Z. Q. Yin, M. Pawlowski, G. C. Guo, and Z. F. Han, “Detection efficiency and noise in a semi-device-independent randomness-extraction protocol,” Phys. Rev. A 91, 032305 (2015).

[Crossref]

Z. Y. Li, Y. C. Zhang, F. H. Xu, X. Peng, and H. Guo, “Continuous-variable measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 052301 (2014).

[Crossref]

M. Gessner, L. Pezzé, and A. Smerzi, “Efficient entanglement criteria for discrete, continuous, and hybrid variables,” Phys. Rev. A 94(2), 020101 (2016).

[Crossref]

C. Ottaviani, G. Spedalieri, S. L. Braunstein, and S. Pirandola, “Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration,” Phys. Rev. A 91, 022320 (2015).

[Crossref]

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84, 621 (2012).

[Crossref]

S. L. Braunstein and S. Pirandola, “Side-channel-free quantum key distribution,” Phys. Rev. Lett. 108, 130502 (2012).

[Crossref]
[PubMed]

S. Pirandola, S. L. Braunstein, and S. Lloyd, “Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography,” Phys. Rev. Lett. 101, 200504 (2008).

[Crossref]
[PubMed]

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “Parameter estimation with almost no public communication for continuous-variable quantum key distribution,” arXiv: 1712.00743 (2017).

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “CV MDI QKD: Composable security against coherent attacks,” arXiv:1704.07924 (2017).

A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, “Device-independent security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 98, 230501 (2007).

[Crossref]
[PubMed]

F. H. Xu, M. Curty, B. Qi, L. Qian, and H. K. Lo, “Discrete and continuous variables for measurement-device-independent quantum cryptography,” Nat. Photon. 9(12), 772 (2015).

[Crossref]

H. K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 108, 130503 (2012).

[Crossref]
[PubMed]

F. H. Xu, M. Curty, B. Qi, L. Qian, and H. K. Lo, “Discrete and continuous variables for measurement-device-independent quantum cryptography,” Nat. Photon. 9(12), 772 (2015).

[Crossref]

H. Qin, R. Kumar, and R. Alleaume, “Saturation attack on continuous-variable quantum key distribution system,” Proc. SPIE 8899(2), 717–718 (2013).

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84, 621 (2012).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95(18), 180503 (2005).

[Crossref]
[PubMed]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110, 030502 (2013).

[Crossref]
[PubMed]

R. Renner and J. I. Cirac, “de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography,” Phys. Rev. Lett. 102, 110504 (2009).

[Crossref]
[PubMed]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145 (2002).

[Crossref]

A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, “Device-independent security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 98, 230501 (2007).

[Crossref]
[PubMed]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84, 621 (2012).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95(18), 180503 (2005).

[Crossref]
[PubMed]

M. Gessner, L. Pezzé, and A. Smerzi, “Efficient entanglement criteria for discrete, continuous, and hybrid variables,” Phys. Rev. A 94(2), 020101 (2016).

[Crossref]

C. Ottaviani, G. Spedalieri, S. L. Braunstein, and S. Pirandola, “Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration,” Phys. Rev. A 91, 022320 (2015).

[Crossref]

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, and L. M. Liang, “Gaussian-modulated coherent-state measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 042335 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88, 022339 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol,” Phys. Rev. A 87, 052309 (2013).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95(18), 180503 (2005).

[Crossref]
[PubMed]

S. Takeda, M. Fuwa, P. van Loock, and A. Furusawa, “Entanglement swapping between discrete and continuous variables,” Phys. Rev. Lett. 114(10), 100501 (2015).

[Crossref]
[PubMed]

M. Curty, F. H. Xu, W. Cui, C. C. Lim, K. Tamaki, and H. K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution,” Nat. Commun. 5(4), 643–648 (2014).

[Crossref]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145 (2002).

[Crossref]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and Ph. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

S. Takeda, M. Fuwa, P. van Loock, and A. Furusawa, “Entanglement swapping between discrete and continuous variables,” Phys. Rev. Lett. 114(10), 100501 (2015).

[Crossref]
[PubMed]

H. W. Li, Z. Q. Yin, W. Chen, S. Wang, G. C. Guo, and Z. F. Han, “Quantum key distribution based on quantum dimension and independent devices,” Phys. Rev. A 89, 032302 (2014).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

D. Huang, P. Huang, T. Wang, H. S. Li, Y. M. Zhou, and G. H. Zeng, “Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol,” Phys. Rev. A 94, 032305 (2016).

[Crossref]

Y. Guo, Q. Liao, Y. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017).

[Crossref]

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

C. Weedbrook, “Continuous-variable quantum key distribution with entanglement in the middle,” Phys. Rev. A 87, 022308 (2013).

[Crossref]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84, 621 (2012).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95(18), 180503 (2005).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and Ph. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012).

[Crossref]
[PubMed]

M. M. Wolf, G. Giedke, and J. I. Cirac, “Extremality of Gaussian Quantum States,” Phys. Rev. Lett. 96, 080502 (2006).

[Crossref]
[PubMed]

Y. Choi, O. Kwon, M. Woo, K. Oh, S. W. Han, Y. S. Kim, and S. Moon, “Plug-and-play measurement-device-independent quantum key distribution,” Phys. Rev. A 93, 032319 (2016).

[Crossref]

W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature (London) 299(5886), 802–803 (1982).

[Crossref]

Q. Liao, Y. Guo, C. L. Xie, D. Huang, P. Huang, and G. H. Zeng, “Composable security of unidimensional continuous-variable quantum key distribution,” Quantum Inf Process, 17, 113 (2018).

[Crossref]

F. H. Xu, M. Curty, B. Qi, L. Qian, and H. K. Lo, “Discrete and continuous variables for measurement-device-independent quantum cryptography,” Nat. Photon. 9(12), 772 (2015).

[Crossref]

M. Curty, F. H. Xu, W. Cui, C. C. Lim, K. Tamaki, and H. K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution,” Nat. Commun. 5(4), 643–648 (2014).

[Crossref]

Z. Y. Li, Y. C. Zhang, F. H. Xu, X. Peng, and H. Guo, “Continuous-variable measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 052301 (2014).

[Crossref]

H. W. Li, Z. Q. Yin, M. Pawlowski, G. C. Guo, and Z. F. Han, “Detection efficiency and noise in a semi-device-independent randomness-extraction protocol,” Phys. Rev. A 91, 032305 (2015).

[Crossref]

H. W. Li, Z. Q. Yin, W. Chen, S. Wang, G. C. Guo, and Z. F. Han, “Quantum key distribution based on quantum dimension and independent devices,” Phys. Rev. A 89, 032302 (2014).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145 (2002).

[Crossref]

Q. Liao, Y. Guo, C. L. Xie, D. Huang, P. Huang, and G. H. Zeng, “Composable security of unidimensional continuous-variable quantum key distribution,” Quantum Inf Process, 17, 113 (2018).

[Crossref]

Q. Liao, Y. Guo, D. Huang, P. Huang, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection,” New J. Phys. 20(2), 023015 (2018).

[Crossref]

Y. Guo, Q. Liao, Y. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017).

[Crossref]

Y. Guo, Q. Liao, D. Huang, and G. H. Zeng, “Quantum relay schemes for continuous-variable quantum key distribution,” Phys. Rev. A 95, 042326 (2017).

[Crossref]

D. Huang, P. Huang, T. Wang, H. S. Li, Y. M. Zhou, and G. H. Zeng, “Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol,” Phys. Rev. A 94, 032305 (2016).

[Crossref]

D. Huang, P. Huang, D. K. Lin, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Scientific Reports, 6, 19201 (2016).

[Crossref]
[PubMed]

P. Huang, J. Fang, and G. H. Zeng, “State-discrimination attack on discretely modulated continuous-variable quantum key distribution,” Phys. Rev. A 89, 042330 (2014).

[Crossref]

Z. Y. Li, Y. C. Zhang, F. H. Xu, X. Peng, and H. Guo, “Continuous-variable measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 052301 (2014).

[Crossref]

Y. Guo, R. J. Li, Q. Liao, J. Zhou, and D. Huang, “Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier,” Phys. Lett. A 382(6), 372–381 (2018).

[Crossref]

D. Huang, P. Huang, T. Wang, H. S. Li, Y. M. Zhou, and G. H. Zeng, “Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol,” Phys. Rev. A 94, 032305 (2016).

[Crossref]

W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature (London) 299(5886), 802–803 (1982).

[Crossref]

M. Curty, F. H. Xu, W. Cui, C. C. Lim, K. Tamaki, and H. K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution,” Nat. Commun. 5(4), 643–648 (2014).

[Crossref]

F. H. Xu, M. Curty, B. Qi, L. Qian, and H. K. Lo, “Discrete and continuous variables for measurement-device-independent quantum cryptography,” Nat. Photon. 9(12), 772 (2015).

[Crossref]

S. Pirandola, C. Ottaviani, G. Spedalieri, C. Weedbrook, S. L. Braunstein, S. Lloyd, T. Gehring, C. S. Jacobsen, and U. L. Andersen, “High-rate measurement-device-independent quantum cryptography,” Nat. Photon. 9, 397 (2015).

[Crossref]

W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature (London) 299(5886), 802–803 (1982).

[Crossref]

Q. Liao, Y. Guo, D. Huang, P. Huang, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution using non-Gaussian state-discrimination detection,” New J. Phys. 20(2), 023015 (2018).

[Crossref]

Y. Guo, R. J. Li, Q. Liao, J. Zhou, and D. Huang, “Performance improvement of eight-state continuous-variable quantum key distribution with an optical amplifier,” Phys. Lett. A 382(6), 372–381 (2018).

[Crossref]

Y. Choi, O. Kwon, M. Woo, K. Oh, S. W. Han, Y. S. Kim, and S. Moon, “Plug-and-play measurement-device-independent quantum key distribution,” Phys. Rev. A 93, 032319 (2016).

[Crossref]

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

Y. Guo, Q. Liao, Y. Wang, D. Huang, P. Huang, and G. H. Zeng, “Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction,” Phys. Rev. A 95, 032304 (2017).

[Crossref]

C. Weedbrook, “Continuous-variable quantum key distribution with entanglement in the middle,” Phys. Rev. A 87, 022308 (2013).

[Crossref]

M. Gessner, L. Pezzé, and A. Smerzi, “Efficient entanglement criteria for discrete, continuous, and hybrid variables,” Phys. Rev. A 94(2), 020101 (2016).

[Crossref]

P. Huang, J. Fang, and G. H. Zeng, “State-discrimination attack on discretely modulated continuous-variable quantum key distribution,” Phys. Rev. A 89, 042330 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, and L. M. Liang, “Gaussian-modulated coherent-state measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 042335 (2014).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87, 062329 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol,” Phys. Rev. A 87, 052309 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87, 062313 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88, 022339 (2013).

[Crossref]

Z. Y. Li, Y. C. Zhang, F. H. Xu, X. Peng, and H. Guo, “Continuous-variable measurement-device-independent quantum key distribution,” Phys. Rev. A 89, 052301 (2014).

[Crossref]

C. Ottaviani, G. Spedalieri, S. L. Braunstein, and S. Pirandola, “Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration,” Phys. Rev. A 91, 022320 (2015).

[Crossref]

Y. Guo, Q. Liao, D. Huang, and G. H. Zeng, “Quantum relay schemes for continuous-variable quantum key distribution,” Phys. Rev. A 95, 042326 (2017).

[Crossref]

H. W. Li, Z. Q. Yin, M. Pawlowski, G. C. Guo, and Z. F. Han, “Detection efficiency and noise in a semi-device-independent randomness-extraction protocol,” Phys. Rev. A 91, 032305 (2015).

[Crossref]

H. W. Li, Z. Q. Yin, W. Chen, S. Wang, G. C. Guo, and Z. F. Han, “Quantum key distribution based on quantum dimension and independent devices,” Phys. Rev. A 89, 032302 (2014).

[Crossref]

D. Huang, P. Huang, T. Wang, H. S. Li, Y. M. Zhou, and G. H. Zeng, “Continuous-variable quantum key distribution based on a plug-and-play dual-phase-modulated coherent-states protocol,” Phys. Rev. A 94, 032305 (2016).

[Crossref]

J. Y. Bang and M. S. Berger, ”Quantum mechanics and the generalized uncertainty principle,” Phys. Rev. D 74(12), 125012 (2006).

[Crossref]

S. Takeda, M. Fuwa, P. van Loock, and A. Furusawa, “Entanglement swapping between discrete and continuous variables,” Phys. Rev. Lett. 114(10), 100501 (2015).

[Crossref]
[PubMed]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95(18), 180503 (2005).

[Crossref]
[PubMed]

S. L. Braunstein and S. Pirandola, “Side-channel-free quantum key distribution,” Phys. Rev. Lett. 108, 130502 (2012).

[Crossref]
[PubMed]

H. K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett. 108, 130503 (2012).

[Crossref]
[PubMed]

A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, “Device-independent security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 98, 230501 (2007).

[Crossref]
[PubMed]

R. García-Patrón and N. J. Cerf, “Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006).

[Crossref]
[PubMed]

F. Grosshans and P. Grangier, “Continuous variable quantum cryptography using coherent states,” Phys. Rev. Lett. 88, 057902 (2002).

[Crossref]
[PubMed]

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

M. M. Wolf, G. Giedke, and J. I. Cirac, “Extremality of Gaussian Quantum States,” Phys. Rev. Lett. 96, 080502 (2006).

[Crossref]
[PubMed]

M. Navascués and A. Acín, “SecurityBounds for continuous variables quantum key distribution,” Phys. Rev. Lett. 94, 020505 (2005).

[Crossref]

S. Pirandola, S. L. Braunstein, and S. Lloyd, “Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography,” Phys. Rev. Lett. 101, 200504 (2008).

[Crossref]
[PubMed]

A. Leverrier and P. Grangier, “Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation,” Phys. Rev. Lett. 102(18), 180504 (2009).

[Crossref]
[PubMed]

A. Leverrier and P. Grangier, “Erratum: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation [Phys. Rev. Lett. 102, 180504 (2009)],” Phys. Rev. Lett. 106259902 (2011).

[Crossref]

R. Renner and J. I. Cirac, “de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography,” Phys. Rev. Lett. 102, 110504 (2009).

[Crossref]
[PubMed]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: Finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109, 100502 (2012).

[Crossref]
[PubMed]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110, 030502 (2013).

[Crossref]
[PubMed]

A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent states,” Phys. Rev. Lett. 114, 070501 (2015).

[Crossref]
[PubMed]

H. Qin, R. Kumar, and R. Alleaume, “Saturation attack on continuous-variable quantum key distribution system,” Proc. SPIE 8899(2), 717–718 (2013).

Q. Liao, Y. Guo, C. L. Xie, D. Huang, P. Huang, and G. H. Zeng, “Composable security of unidimensional continuous-variable quantum key distribution,” Quantum Inf Process, 17, 113 (2018).

[Crossref]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and Ph. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84, 621 (2012).

[Crossref]

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145 (2002).

[Crossref]

D. Huang, P. Huang, D. K. Lin, and G. H. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Scientific Reports, 6, 19201 (2016).

[Crossref]
[PubMed]

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “Parameter estimation with almost no public communication for continuous-variable quantum key distribution,” arXiv: 1712.00743 (2017).

M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, Cambridge University, Cambridge, (2000).

R. García-Patrón, Quantum information with optical continuous variables: from Bell tests to key distribution, Universite Libre De Bruxelles, (2007).

C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175–179.

C. Lupo, C. Ottaviani, P. Papanastasiou, and S. Pirandola, “CV MDI QKD: Composable security against coherent attacks,” arXiv:1704.07924 (2017).