Decoy state quantum key distribution

Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD sys...

Full description

Bibliographic Details
Main Authors: Ali, Sellami, Saharudin, Suhairi, Wahiddin, Mohamed Ridza
Format: Article
Language:English
Published: IIUM Press 2009
Subjects:
Online Access:http://irep.iium.edu.my/1031/
http://irep.iium.edu.my/1031/1/DECOY_STATE_QUANTUM_KEY_DISTRIBUTION.pdf
_version_ 1848775790785724416
author Ali, Sellami
Saharudin, Suhairi
Wahiddin, Mohamed Ridza
author_facet Ali, Sellami
Saharudin, Suhairi
Wahiddin, Mohamed Ridza
author_sort Ali, Sellami
building IIUM Repository
collection Online Access
description Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4 per pulse for a 25 km fiber length.
first_indexed 2025-11-14T14:19:48Z
format Article
id iium-1031
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T14:19:48Z
publishDate 2009
publisher IIUM Press
recordtype eprints
repository_type Digital Repository
spelling iium-10312020-06-16T08:19:10Z http://irep.iium.edu.my/1031/ Decoy state quantum key distribution Ali, Sellami Saharudin, Suhairi Wahiddin, Mohamed Ridza QA76 Computer software Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4 per pulse for a 25 km fiber length. IIUM Press 2009 Article PeerReviewed application/pdf en http://irep.iium.edu.my/1031/1/DECOY_STATE_QUANTUM_KEY_DISTRIBUTION.pdf Ali, Sellami and Saharudin, Suhairi and Wahiddin, Mohamed Ridza (2009) Decoy state quantum key distribution. IIUM Engineering Journal, 10 (2). pp. 81-86. ISSN 1511-788X http://www.iium.edu.my/ejournal/home2010/index.php/iiumej/article/view/8
spellingShingle QA76 Computer software
Ali, Sellami
Saharudin, Suhairi
Wahiddin, Mohamed Ridza
Decoy state quantum key distribution
title Decoy state quantum key distribution
title_full Decoy state quantum key distribution
title_fullStr Decoy state quantum key distribution
title_full_unstemmed Decoy state quantum key distribution
title_short Decoy state quantum key distribution
title_sort decoy state quantum key distribution
topic QA76 Computer software
url http://irep.iium.edu.my/1031/
http://irep.iium.edu.my/1031/
http://irep.iium.edu.my/1031/1/DECOY_STATE_QUANTUM_KEY_DISTRIBUTION.pdf