Quantum key distribution using decoy state protocol
Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible...
Main Authors: | Ali, Sellami, Saharudin, Shuhairi, Wahiddin, Mohamed Ridza |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publications
2009
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/1018/1/Quantum_key_distribution_using_decoy_state_protocol.pdf |
Similar Items
-
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009) -
Implementation of decoy state protocol
by: Ali, Sellami, et al.
Published: (2009) -
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013) -
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010) -
Enhancement of RSA Key Generation Using Identity
by: Norhidayah, Muhammad, et al.
Published: (2015)