Implementation of decoy state protocol

We report the experimental demonstration of decoy state QKD using commercial QKD system based on a standard bi-directional 'Plug & Play' set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance...

Full description

Bibliographic Details
Main Authors: Ali, Sellami, Saharudin, Shuhairi, Wahiddin, Mohamed Ridza
Format: Article
Language:English
Published: EuroJournals Publishing, Inc. 2009
Subjects:
Online Access:http://irep.iium.edu.my/12575/
http://irep.iium.edu.my/12575/4/ejsr_33_1_14.pdf
_version_ 1848777452761907200
author Ali, Sellami
Saharudin, Shuhairi
Wahiddin, Mohamed Ridza
author_facet Ali, Sellami
Saharudin, Shuhairi
Wahiddin, Mohamed Ridza
author_sort Ali, Sellami
building IIUM Repository
collection Online Access
description We report the experimental demonstration of decoy state QKD using commercial QKD system based on a standard bi-directional 'Plug & Play' set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 9.7008 × 10-4 per pulse for a 25 km fiber length
first_indexed 2025-11-14T14:46:13Z
format Article
id iium-12575
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T14:46:13Z
publishDate 2009
publisher EuroJournals Publishing, Inc.
recordtype eprints
repository_type Digital Repository
spelling iium-125752020-06-16T08:14:22Z http://irep.iium.edu.my/12575/ Implementation of decoy state protocol Ali, Sellami Saharudin, Shuhairi Wahiddin, Mohamed Ridza Q Science (General) We report the experimental demonstration of decoy state QKD using commercial QKD system based on a standard bi-directional 'Plug & Play' set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 9.7008 × 10-4 per pulse for a 25 km fiber length EuroJournals Publishing, Inc. 2009 Article PeerReviewed application/pdf en http://irep.iium.edu.my/12575/4/ejsr_33_1_14.pdf Ali, Sellami and Saharudin, Shuhairi and Wahiddin, Mohamed Ridza (2009) Implementation of decoy state protocol. European Journal of Scientific Research, 33 (1). pp. 183-186. ISSN 1450-216X, 1450-202X http://www.eurojournals.com/ejsr_33_1_14.pdf
spellingShingle Q Science (General)
Ali, Sellami
Saharudin, Shuhairi
Wahiddin, Mohamed Ridza
Implementation of decoy state protocol
title Implementation of decoy state protocol
title_full Implementation of decoy state protocol
title_fullStr Implementation of decoy state protocol
title_full_unstemmed Implementation of decoy state protocol
title_short Implementation of decoy state protocol
title_sort implementation of decoy state protocol
topic Q Science (General)
url http://irep.iium.edu.my/12575/
http://irep.iium.edu.my/12575/
http://irep.iium.edu.my/12575/4/ejsr_33_1_14.pdf