Practical quantum key distribution

We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-...

Full description

Bibliographic Details
Main Author: Ali, Sellami
Format: Book Chapter
Language:English
Published: IGI Global 2012
Subjects:
Online Access:http://irep.iium.edu.my/6369/
http://irep.iium.edu.my/6369/
http://irep.iium.edu.my/6369/
http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf
id iium-6369
recordtype eprints
spelling iium-63692014-05-22T01:30:58Z http://irep.iium.edu.my/6369/ Practical quantum key distribution Ali, Sellami TA1501 Applied optics. Lasers We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. The effects of statistical fluctuations on some parameters of our QKD system have been presented. We have also performed the optimization on the choice of intensities and percentages of signal state and decoy states which give out the maximum distance and the optimization of the key generation rate. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Also, it is shown that bidirectional ground to satellite and inter-satellite communications are possible with our protocol. The experiment of decoy state QKD has been demonstrated using ID-3000 commercial QKD system based on a standard ‘Plug & Play’ set-up. One decoy state QKD has been implemented for both BB84 and SARG04 over different transmission distance of standard telecom fiber. IGI Global 2012 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf Ali, Sellami (2012) Practical quantum key distribution. In: Cyber Security Standards, Practices and Industrial Applications:. IGI Global, pp. 114-137. ISBN ISBN13: 9781609608514, ISBN10: 1609608538, EISBN13: 9781609608521 http://www.igi-global.com/book/cyber-security-standards-practices-industrial/50522 DOI: 10.4018/978-1-60960-851-4
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic TA1501 Applied optics. Lasers
spellingShingle TA1501 Applied optics. Lasers
Ali, Sellami
Practical quantum key distribution
description We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. The effects of statistical fluctuations on some parameters of our QKD system have been presented. We have also performed the optimization on the choice of intensities and percentages of signal state and decoy states which give out the maximum distance and the optimization of the key generation rate. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Also, it is shown that bidirectional ground to satellite and inter-satellite communications are possible with our protocol. The experiment of decoy state QKD has been demonstrated using ID-3000 commercial QKD system based on a standard ‘Plug & Play’ set-up. One decoy state QKD has been implemented for both BB84 and SARG04 over different transmission distance of standard telecom fiber.
format Book Chapter
author Ali, Sellami
author_facet Ali, Sellami
author_sort Ali, Sellami
title Practical quantum key distribution
title_short Practical quantum key distribution
title_full Practical quantum key distribution
title_fullStr Practical quantum key distribution
title_full_unstemmed Practical quantum key distribution
title_sort practical quantum key distribution
publisher IGI Global
publishDate 2012
url http://irep.iium.edu.my/6369/
http://irep.iium.edu.my/6369/
http://irep.iium.edu.my/6369/
http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf
first_indexed 2023-09-18T20:15:17Z
last_indexed 2023-09-18T20:15:17Z
_version_ 1777407746568617984