Practical quantum key distribution

We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-...

Full description

Bibliographic Details
Main Author: Ali, Sellami
Format: Book Chapter
Language:English
Published: IGI Global 2012
Subjects:
Online Access:http://irep.iium.edu.my/6369/
http://irep.iium.edu.my/6369/
http://irep.iium.edu.my/6369/
http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf