DECOY STATE QUANTUM KEY DISTRIBUTION

被引:0
|
作者
Ali, Sellami [1 ,2 ]
Saharudin, Suhairi [2 ]
Wahiddin, M. R. B. [1 ,2 ]
机构
[1] Int Islamic Univ Malaysia, Fac Sci, Dept Computat & Theoret Sci, POBox 141, Kuantan 25710, Malaysia
[2] MIMOS Berhad, Informat Secur Cluster, Kuala Lumpur, Malaysia
来源
IIUM ENGINEERING JOURNAL | 2009年 / 10卷 / 02期
关键词
Quantum Cryptography; Quantum Key Distribution; Decoy State Protocol; Optical Communications;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional 'Plug & Play' set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10(-4) per pulse for a 25 km fiber length.
引用
收藏
页码:81 / 86
页数:6
相关论文
共 50 条
  • [11] Nonorthogonal decoy-state quantum key distribution
    Li, JB
    Fang, XM
    CHINESE PHYSICS LETTERS, 2006, 23 (04) : 775 - 778
  • [12] Modeling decoy state Quantum Key Distribution systems
    Mailloux, L. O.
    Engle, R. D.
    Grimaila, M. R.
    Hodson, D. D.
    Colombi, J. M.
    McLaughlin, C. V.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 489 - 506
  • [13] Quantum Key Distribution: Examination of the Decoy State Protocol
    Mailloux, Logan O.
    Grimaila, Michael R.
    Colombi, John M.
    Hodson, Douglas D.
    Engle, Ryan D.
    McLaughlin, Colin V.
    Baumgartner, Gerald
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (10) : 24 - 31
  • [14] Quantum key distribution with passive decoy state selection
    Mauerer, Wolfgang
    Silberhorn, Christine
    PHYSICAL REVIEW A, 2007, 75 (05):
  • [15] Practical decoy state quantum key distribution with finite resource
    Y. G. Tan
    Q. Y. Cai
    The European Physical Journal D, 2010, 56 : 449 - 455
  • [16] Experimental demonstration of passive decoy state quantum key distribution
    Zhang Yang
    Wang Shuang
    Yin Zhen-Qiang
    Chen Wei
    Liang Wen-Ye
    Li Hong-Wei
    Guo Guang-Can
    Han Zheng-Fu
    CHINESE PHYSICS B, 2012, 21 (10)
  • [17] Decoy-state quantum key distribution with a leaky source
    Tamaki, Kiyoshi
    Curty, Marcos
    Lucamarini, Marco
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [18] PASSIVE DECOY STATE QUANTUM KEY DISTRIBUTION WITH FINITE RESOURCE
    Tan, Yong-Gang
    Cai, Qing-Yu
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2011, 9 (03) : 903 - 913
  • [19] Experimental decoy state method for secure quantum key distribution
    Tomita, Akihisa
    2007 IEEE LEOS ANNUAL MEETING CONFERENCE PROCEEDINGS, VOLS 1 AND 2, 2007, : 478 - 479
  • [20] Practical decoy state quantum key distribution with finite resource
    Tan, Y. G.
    Cai, Q. Y.
    EUROPEAN PHYSICAL JOURNAL D, 2010, 56 (03): : 449 - 455