Practical quantum key distribution

We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-...

Full description

Saved in:
Bibliographic Details
Main Author: Ali, Sellami
Format: Book Chapter
Language:English
Published: IGI Global 2012
Subjects:
Online Access:http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf
http://irep.iium.edu.my/6369/
http://www.igi-global.com/book/cyber-security-standards-practices-industrial/50522
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.6369
record_format dspace
spelling my.iium.irep.63692014-05-22T01:30:58Z http://irep.iium.edu.my/6369/ Practical quantum key distribution Ali, Sellami TA1501 Applied optics. Lasers We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. The effects of statistical fluctuations on some parameters of our QKD system have been presented. We have also performed the optimization on the choice of intensities and percentages of signal state and decoy states which give out the maximum distance and the optimization of the key generation rate. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Also, it is shown that bidirectional ground to satellite and inter-satellite communications are possible with our protocol. The experiment of decoy state QKD has been demonstrated using ID-3000 commercial QKD system based on a standard ‘Plug & Play’ set-up. One decoy state QKD has been implemented for both BB84 and SARG04 over different transmission distance of standard telecom fiber. IGI Global 2012 Book Chapter REM application/pdf en http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf Ali, Sellami (2012) Practical quantum key distribution. In: Cyber Security Standards, Practices and Industrial Applications:. IGI Global, pp. 114-137. ISBN ISBN13: 9781609608514, ISBN10: 1609608538, EISBN13: 9781609608521 http://www.igi-global.com/book/cyber-security-standards-practices-industrial/50522 DOI: 10.4018/978-1-60960-851-4
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic TA1501 Applied optics. Lasers
spellingShingle TA1501 Applied optics. Lasers
Ali, Sellami
Practical quantum key distribution
description We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. The effects of statistical fluctuations on some parameters of our QKD system have been presented. We have also performed the optimization on the choice of intensities and percentages of signal state and decoy states which give out the maximum distance and the optimization of the key generation rate. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Also, it is shown that bidirectional ground to satellite and inter-satellite communications are possible with our protocol. The experiment of decoy state QKD has been demonstrated using ID-3000 commercial QKD system based on a standard ‘Plug & Play’ set-up. One decoy state QKD has been implemented for both BB84 and SARG04 over different transmission distance of standard telecom fiber.
format Book Chapter
author Ali, Sellami
author_facet Ali, Sellami
author_sort Ali, Sellami
title Practical quantum key distribution
title_short Practical quantum key distribution
title_full Practical quantum key distribution
title_fullStr Practical quantum key distribution
title_full_unstemmed Practical quantum key distribution
title_sort practical quantum key distribution
publisher IGI Global
publishDate 2012
url http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf
http://irep.iium.edu.my/6369/
http://www.igi-global.com/book/cyber-security-standards-practices-industrial/50522
_version_ 1643605720802787328