Practical quantum key distribution
We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-...
Main Author: | |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
IGI Global
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/6369/ http://irep.iium.edu.my/6369/ http://irep.iium.edu.my/6369/ http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf |