Quantum key distribution using decoy state protocol
Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible...
Main Authors: | Ali, Sellami, Saharudin, Shuhairi, Wahiddin, Mohamed Ridza |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publications
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/1018/ http://irep.iium.edu.my/1018/ http://irep.iium.edu.my/1018/ http://irep.iium.edu.my/1018/1/Quantum_key_distribution_using_decoy_state_protocol.pdf |
Similar Items
-
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009) -
Implementation of decoy state protocol
by: Ali, Sellami, et al.
Published: (2009) -
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011) -
Quantum computers for optimization the performance
by: Mohamed Abdullah, Radhwan, et al.
Published: (2019) -
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)