Practical quantum key distribution

We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-...

Full description

Saved in:
Bibliographic Details
Main Author: Ali, Sellami
Format: Book Chapter
Language:English
Published: IGI Global 2012
Subjects:
Online Access:http://irep.iium.edu.my/6369/3/Cyber_Security_Standards.pdf
http://irep.iium.edu.my/6369/
http://www.igi-global.com/book/cyber-security-standards-practices-industrial/50522
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first