Quantum key distribution in real life
The quantum key distribution (QKD) technique establishes secret keys shared between two communicating parties. Theoretically, unconditional security provided by QKD is guaranteed by the fundamental laws of quantum physics. in the real life, it is still possible to obtain unconditionally secure QK...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IDOSI Publication
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/28060/ http://irep.iium.edu.my/28060/ http://irep.iium.edu.my/28060/1/5.pdf |
id |
iium-28060 |
---|---|
recordtype |
eprints |
spelling |
iium-280602013-04-25T06:47:03Z http://irep.iium.edu.my/28060/ Quantum key distribution in real life Ali, Sellami Ahmed, Abdallah Hassen Habaebi, Mohamed Hadi Chowdhury, Md. Sazzad Hossien T10.5 Communication of technical information TK5101 Telecommunication. Including telegraphy, radio, radar, television The quantum key distribution (QKD) technique establishes secret keys shared between two communicating parties. Theoretically, unconditional security provided by QKD is guaranteed by the fundamental laws of quantum physics. in the real life, it is still possible to obtain unconditionally secure QKD, even with (phase randomized) attenuated laser pulses, as theoretically demonstrated by Gottesman-Lo-L¨utkenhaus-Preskill (GLLP). However, one must pay a steep price by placing severe limits on the distance and the key generation rate. These problems were solved using the decoy state method introduced by Hwang. In this paper, we have proposed a method to estimate parameters of the decoy state method based on two decoy state protocol for both BB84 and SARG04. The vacuum and weak decoy state protocol has been introduced as a special case of two decoy states protocol. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2) and the lower bound of key generation rate for both BB84 and SARG04. The fiber based QKD systems also have been simulated using the proposed method for BB84 and SARG04. The numerical simulation has shown that the fiber based QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Key words: Quantum cryptography % Quantum key distribution % Decoy state protocol and optical communications IDOSI Publication 2012-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/28060/1/5.pdf Ali, Sellami and Ahmed, Abdallah Hassen and Habaebi, Mohamed Hadi and Chowdhury, Md. Sazzad Hossien (2012) Quantum key distribution in real life. World Applied Sciences Journal , 4 (10). pp. 29-34. ISSN 1818-4952 10.5829/idosi.wasj.2012.20.mae.9999 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
T10.5 Communication of technical information TK5101 Telecommunication. Including telegraphy, radio, radar, television |
spellingShingle |
T10.5 Communication of technical information TK5101 Telecommunication. Including telegraphy, radio, radar, television Ali, Sellami Ahmed, Abdallah Hassen Habaebi, Mohamed Hadi Chowdhury, Md. Sazzad Hossien Quantum key distribution in real life |
description |
The quantum key distribution (QKD) technique establishes secret keys shared between two
communicating parties. Theoretically, unconditional security provided by QKD is guaranteed by the
fundamental laws of quantum physics. in the real life, it is still possible to obtain unconditionally secure
QKD, even with (phase randomized) attenuated laser pulses, as theoretically demonstrated by
Gottesman-Lo-L¨utkenhaus-Preskill (GLLP). However, one must pay a steep price by placing severe limits on
the distance and the key generation rate. These problems were solved using the decoy state method introduced
by Hwang. In this paper, we have proposed a method to estimate parameters of the decoy state method based
on two decoy state protocol for both BB84 and SARG04. The vacuum and weak decoy state protocol has been
introduced as a special case of two decoy states protocol. This method has given different lower bound of
the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of
single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2) and the lower bound of key
generation rate for both BB84 and SARG04. The fiber based QKD systems also have been simulated using the
proposed method for BB84 and SARG04. The numerical simulation has shown that the fiber based QKD
systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater
secure distance than that of SARG04.
Key words: Quantum cryptography % Quantum key distribution % Decoy state protocol and optical
communications |
format |
Article |
author |
Ali, Sellami Ahmed, Abdallah Hassen Habaebi, Mohamed Hadi Chowdhury, Md. Sazzad Hossien |
author_facet |
Ali, Sellami Ahmed, Abdallah Hassen Habaebi, Mohamed Hadi Chowdhury, Md. Sazzad Hossien |
author_sort |
Ali, Sellami |
title |
Quantum key distribution in real life |
title_short |
Quantum key distribution in real life |
title_full |
Quantum key distribution in real life |
title_fullStr |
Quantum key distribution in real life |
title_full_unstemmed |
Quantum key distribution in real life |
title_sort |
quantum key distribution in real life |
publisher |
IDOSI Publication |
publishDate |
2012 |
url |
http://irep.iium.edu.my/28060/ http://irep.iium.edu.my/28060/ http://irep.iium.edu.my/28060/1/5.pdf |
first_indexed |
2023-09-18T20:41:31Z |
last_indexed |
2023-09-18T20:41:31Z |
_version_ |
1777409396924481536 |