Practical quantum key distribution
We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-...
Saved in:
Main Author: | |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
IGI Global
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf http://irep.iium.edu.my/6369/ http://www.igi-global.com/book/cyber-security-standards-practices-industrial/50522 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!