Quantum key distribution in real life

The quantum key distribution (QKD) technique establishes secret keys shared between two communicating parties. Theoretically, unconditional security provided by QKD is guaranteed by the fundamental laws of quantum physics. in the real life, it is still possible to obtain unconditionally secure QK...

Full description

Bibliographic Details
Main Authors: Ali, Sellami, Ahmed, Abdallah Hassen, Habaebi, Mohamed Hadi, Chowdhury, Md. Sazzad Hossien
Format: Article
Language:English
Published: IDOSI Publication 2012
Subjects:
Online Access:http://irep.iium.edu.my/28060/
http://irep.iium.edu.my/28060/
http://irep.iium.edu.my/28060/1/5.pdf
id iium-28060
recordtype eprints
spelling iium-280602013-04-25T06:47:03Z http://irep.iium.edu.my/28060/ Quantum key distribution in real life Ali, Sellami Ahmed, Abdallah Hassen Habaebi, Mohamed Hadi Chowdhury, Md. Sazzad Hossien T10.5 Communication of technical information TK5101 Telecommunication. Including telegraphy, radio, radar, television The quantum key distribution (QKD) technique establishes secret keys shared between two communicating parties. Theoretically, unconditional security provided by QKD is guaranteed by the fundamental laws of quantum physics. in the real life, it is still possible to obtain unconditionally secure QKD, even with (phase randomized) attenuated laser pulses, as theoretically demonstrated by Gottesman-Lo-L¨utkenhaus-Preskill (GLLP). However, one must pay a steep price by placing severe limits on the distance and the key generation rate. These problems were solved using the decoy state method introduced by Hwang. In this paper, we have proposed a method to estimate parameters of the decoy state method based on two decoy state protocol for both BB84 and SARG04. The vacuum and weak decoy state protocol has been introduced as a special case of two decoy states protocol. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2) and the lower bound of key generation rate for both BB84 and SARG04. The fiber based QKD systems also have been simulated using the proposed method for BB84 and SARG04. The numerical simulation has shown that the fiber based QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Key words: Quantum cryptography % Quantum key distribution % Decoy state protocol and optical communications IDOSI Publication 2012-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/28060/1/5.pdf Ali, Sellami and Ahmed, Abdallah Hassen and Habaebi, Mohamed Hadi and Chowdhury, Md. Sazzad Hossien (2012) Quantum key distribution in real life. World Applied Sciences Journal , 4 (10). pp. 29-34. ISSN 1818-4952 10.5829/idosi.wasj.2012.20.mae.9999
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic T10.5 Communication of technical information
TK5101 Telecommunication. Including telegraphy, radio, radar, television
spellingShingle T10.5 Communication of technical information
TK5101 Telecommunication. Including telegraphy, radio, radar, television
Ali, Sellami
Ahmed, Abdallah Hassen
Habaebi, Mohamed Hadi
Chowdhury, Md. Sazzad Hossien
Quantum key distribution in real life
description The quantum key distribution (QKD) technique establishes secret keys shared between two communicating parties. Theoretically, unconditional security provided by QKD is guaranteed by the fundamental laws of quantum physics. in the real life, it is still possible to obtain unconditionally secure QKD, even with (phase randomized) attenuated laser pulses, as theoretically demonstrated by Gottesman-Lo-L¨utkenhaus-Preskill (GLLP). However, one must pay a steep price by placing severe limits on the distance and the key generation rate. These problems were solved using the decoy state method introduced by Hwang. In this paper, we have proposed a method to estimate parameters of the decoy state method based on two decoy state protocol for both BB84 and SARG04. The vacuum and weak decoy state protocol has been introduced as a special case of two decoy states protocol. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2) and the lower bound of key generation rate for both BB84 and SARG04. The fiber based QKD systems also have been simulated using the proposed method for BB84 and SARG04. The numerical simulation has shown that the fiber based QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Key words: Quantum cryptography % Quantum key distribution % Decoy state protocol and optical communications
format Article
author Ali, Sellami
Ahmed, Abdallah Hassen
Habaebi, Mohamed Hadi
Chowdhury, Md. Sazzad Hossien
author_facet Ali, Sellami
Ahmed, Abdallah Hassen
Habaebi, Mohamed Hadi
Chowdhury, Md. Sazzad Hossien
author_sort Ali, Sellami
title Quantum key distribution in real life
title_short Quantum key distribution in real life
title_full Quantum key distribution in real life
title_fullStr Quantum key distribution in real life
title_full_unstemmed Quantum key distribution in real life
title_sort quantum key distribution in real life
publisher IDOSI Publication
publishDate 2012
url http://irep.iium.edu.my/28060/
http://irep.iium.edu.my/28060/
http://irep.iium.edu.my/28060/1/5.pdf
first_indexed 2023-09-18T20:41:31Z
last_indexed 2023-09-18T20:41:31Z
_version_ 1777409396924481536