Showing 1 - 9 results of 9 for search '"BB84"', query time: 0.04s Refine Results
  1. 1

    Fiber and free-space practical decoy state QKD for both BB84 and SARG04 protocols by Ali, Sellami, Wahiddin, Mohamed Ridza

    Published 2010
    “…Fiber and free-space practical decoy state quantum key distribution has been simulated for both BB84 and SARG04 protocols. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04…”
    Get full text
    Article
  2. 2

    Fiber based practical QKD system by Ali, Sellami, Ahmed, Abdallah Hassen, Mohammed, Sellami, Chowdhury, Md. Sazzad Hossien, Hassan Abdalla Hashim, Aisha, Mahmoud, Omer

    Published 2012
    “…A method to estimate parameters of the decoy state method based on one decoy state protocol for both BB84 and SARG04 has been presented. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single -photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Practical quantum key distribution by Ali, Sellami

    Published 2012
    “…We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
    Get full text
    Book Chapter
  4. 4

    Estimation of decoy state parameters for practical QKD by Ali, Sellami, Mahmoud, Omer, Saeed, Rashid Abdelhaleem

    Published 2011
    “…We have presented a method to estimate parameters of the decoy state method based on one decoy state protocol for both BB84 and SARG04. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
    Get full text
    Article
  5. 5

    Quantum key distribution in real life by Ali, Sellami, Ahmed, Abdallah Hassen, Habaebi, Mohamed Hadi, Chowdhury, Md. Sazzad Hossien

    Published 2012
    “…This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2) and the lower bound of key generation rate for both BB84 and SARG04. The fiber based QKD systems also have been simulated using the proposed method for BB84 and SARG04. …”
    Get full text
    Article
  6. 6

    Practical SARG04 quantum key distribution by Ali, Sellami, Mohammed, Sellami, Chowdhury, Md. Sazzad Hossien, Hassan Abdalla Hashim, Aisha

    Published 2012
    “…This method has given lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. …”
    Get full text
    Article
  7. 7

    Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme by Shamsul Shaari, Jesni, Bahari, Iskandar

    Published 2010
    “…We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.…”
    Get full text
    Article
  8. 8

    New estimates of single photon parameters for satellite-based QKD by Ali, Sellami, Wahiddin, Mohamed Ridza

    Published 2009
    “…A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state. …”
    Get full text
    Article
  9. 9

    Feasibility of QKD over FSO Link by Husagić-Selman, Alma, Al-Khateeb, Wajdi Fawzi Mohammed, Saharudin, Shuhairi

    Published 2012
    “…The paper discusses how different factors, such as link distance, weather, beam intensity and transceivers setup, influence key size when BB84 QKD protocol is used. For each weather condition specific for Malaysia key size was obtained, and the percentage of the received key compared to the total generated key is calculated. …”
    Get full text
    Proceeding Paper