Practical quantum key distribution
We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-...
Saved in:
Main Author: | |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
IGI Global
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf http://irep.iium.edu.my/6369/ http://www.igi-global.com/book/cyber-security-standards-practices-industrial/50522 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
id |
my.iium.irep.6369 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.63692014-05-22T01:30:58Z http://irep.iium.edu.my/6369/ Practical quantum key distribution Ali, Sellami TA1501 Applied optics. Lasers We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. The effects of statistical fluctuations on some parameters of our QKD system have been presented. We have also performed the optimization on the choice of intensities and percentages of signal state and decoy states which give out the maximum distance and the optimization of the key generation rate. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Also, it is shown that bidirectional ground to satellite and inter-satellite communications are possible with our protocol. The experiment of decoy state QKD has been demonstrated using ID-3000 commercial QKD system based on a standard ‘Plug & Play’ set-up. One decoy state QKD has been implemented for both BB84 and SARG04 over different transmission distance of standard telecom fiber. IGI Global 2012 Book Chapter REM application/pdf en http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf Ali, Sellami (2012) Practical quantum key distribution. In: Cyber Security Standards, Practices and Industrial Applications:. IGI Global, pp. 114-137. ISBN ISBN13: 9781609608514, ISBN10: 1609608538, EISBN13: 9781609608521 http://www.igi-global.com/book/cyber-security-standards-practices-industrial/50522 DOI: 10.4018/978-1-60960-851-4 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
TA1501 Applied optics. Lasers |
spellingShingle |
TA1501 Applied optics. Lasers Ali, Sellami Practical quantum key distribution |
description |
We have presented a method to estimate parameters of the decoy state protocol based on one decoy
state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of
single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon
pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation
rate for both BB84 and SARG04. The effects of statistical fluctuations on some parameters of our QKD
system have been presented. We have also performed the optimization on the choice of intensities and
percentages of signal state and decoy states which give out the maximum distance and the optimization
of the key generation rate. The numerical simulation has shown that the fiber based QKD and free space
QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and
greater secure distance than that of SARG04. Also, it is shown that bidirectional ground to satellite and
inter-satellite communications are possible with our protocol. The experiment of decoy state QKD has
been demonstrated using ID-3000 commercial QKD system based on a standard ‘Plug & Play’ set-up.
One decoy state QKD has been implemented for both BB84 and SARG04 over different transmission
distance of standard telecom fiber. |
format |
Book Chapter |
author |
Ali, Sellami |
author_facet |
Ali, Sellami |
author_sort |
Ali, Sellami |
title |
Practical quantum key distribution |
title_short |
Practical quantum key distribution |
title_full |
Practical quantum key distribution |
title_fullStr |
Practical quantum key distribution |
title_full_unstemmed |
Practical quantum key distribution |
title_sort |
practical quantum key distribution |
publisher |
IGI Global |
publishDate |
2012 |
url |
http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf http://irep.iium.edu.my/6369/ http://www.igi-global.com/book/cyber-security-standards-practices-industrial/50522 |
_version_ |
1643605720802787328 |