-
1
Fiber and free-space practical decoy state QKD for both BB84 and SARG04 protocols
Published 2010“…Fiber and free-space practical decoy state quantum key distribution has been simulated for both BB84 and SARG04 protocols. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04…”
Get full text
Article -
2
Fiber based practical QKD system
Published 2012“…A method to estimate parameters of the decoy state method based on one decoy state protocol for both BB84 and SARG04 has been presented. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single -photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
Get full text
Get full text
Proceeding Paper -
3
Practical quantum key distribution
Published 2012“…We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
Get full text
Book Chapter -
4
Estimation of decoy state parameters for practical QKD
Published 2011“…We have presented a method to estimate parameters of the decoy state method based on one decoy state protocol for both BB84 and SARG04. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
Get full text
Article -
5
Quantum key distribution in real life
Published 2012“…This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2) and the lower bound of key generation rate for both BB84 and SARG04. The fiber based QKD systems also have been simulated using the proposed method for BB84 and SARG04. …”
Get full text
Article -
6
Practical SARG04 quantum key distribution
Published 2012“…This method has given lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. …”
Get full text
Article -
7
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
Published 2010“…We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.…”
Get full text
Article -
8
New estimates of single photon parameters for satellite-based QKD
Published 2009“…A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state. …”
Get full text
Article -
9
Feasibility of QKD over FSO Link
Published 2012“…The paper discusses how different factors, such as link distance, weather, beam intensity and transceivers setup, influence key size when BB84 QKD protocol is used. For each weather condition specific for Malaysia key size was obtained, and the percentage of the received key compared to the total generated key is calculated. …”
Get full text
Proceeding Paper