Decoy state quantum key distribution

Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD sys...

Full description

Bibliographic Details
Main Authors: Ali, Sellami, Saharudin, Shuhairi, Wahiddin, Mohamed Ridza
Format: Article
Language:English
Published: IIUM Press 2009
Subjects:
Online Access:http://irep.iium.edu.my/1031/
http://irep.iium.edu.my/1031/
http://irep.iium.edu.my/1031/1/DECOY_STATE_QUANTUM_KEY_DISTRIBUTION.pdf
id iium-1031
recordtype eprints
spelling iium-10312011-07-18T08:03:18Z http://irep.iium.edu.my/1031/ Decoy state quantum key distribution Ali, Sellami Saharudin, Shuhairi Wahiddin, Mohamed Ridza QA76 Computer software Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4 per pulse for a 25 km fiber length. IIUM Press 2009 Article PeerReviewed application/pdf en http://irep.iium.edu.my/1031/1/DECOY_STATE_QUANTUM_KEY_DISTRIBUTION.pdf Ali, Sellami and Saharudin, Shuhairi and Wahiddin, Mohamed Ridza (2009) Decoy state quantum key distribution. IIUM Engineering Journal, 10 (2). pp. 81-86. ISSN 1511-788X http://www.iium.edu.my/ejournal/home2010/index.php/iiumej/article/view/8
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Ali, Sellami
Saharudin, Shuhairi
Wahiddin, Mohamed Ridza
Decoy state quantum key distribution
description Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4 per pulse for a 25 km fiber length.
format Article
author Ali, Sellami
Saharudin, Shuhairi
Wahiddin, Mohamed Ridza
author_facet Ali, Sellami
Saharudin, Shuhairi
Wahiddin, Mohamed Ridza
author_sort Ali, Sellami
title Decoy state quantum key distribution
title_short Decoy state quantum key distribution
title_full Decoy state quantum key distribution
title_fullStr Decoy state quantum key distribution
title_full_unstemmed Decoy state quantum key distribution
title_sort decoy state quantum key distribution
publisher IIUM Press
publishDate 2009
url http://irep.iium.edu.my/1031/
http://irep.iium.edu.my/1031/
http://irep.iium.edu.my/1031/1/DECOY_STATE_QUANTUM_KEY_DISTRIBUTION.pdf
first_indexed 2023-09-18T20:08:15Z
last_indexed 2023-09-18T20:08:15Z
_version_ 1777407303516946432