Implementation of decoy state protocol
We report the experimental demonstration of decoy state QKD using commercial QKD system based on a standard bi-directional 'Plug & Play' set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance...
| Main Authors: | Ali, Sellami, Saharudin, Shuhairi, Wahiddin, Mohamed Ridza |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
EuroJournals Publishing, Inc.
2009
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/12575/ http://irep.iium.edu.my/12575/4/ejsr_33_1_14.pdf |
Similar Items
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Implementation of SARG04 decoy state quantum key distribution
by: Sellami , Ali, et al.
Published: (2011)
by: Sellami , Ali, et al.
Published: (2011)
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
Estimation of decoy state parameters for practical QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
The probe attack on the Bennett-Brassard 1984 protocol in the presences of noisy amplitude damping channel
by: Abdel-Hameed, Hossam Farouk, et al.
Published: (2017)
by: Abdel-Hameed, Hossam Farouk, et al.
Published: (2017)
Deterministic six states protocol for quantum communication
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
by: Shamsul Shaari, Jesni, et al.
Published: (2006)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Apparatus for flipping the polarization state of an optical pulse between a transmitter and a receiver in quantum key distribution and method thereof
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Quantum state engineering with ququarts: application for deterministic QKD protocol
by: Shurupov, Alexander P., et al.
Published: (2009)
by: Shurupov, Alexander P., et al.
Published: (2009)
A secure quantum telephone system
by: Said, Ressa Suhardiman, et al.
Published: (2009)
by: Said, Ressa Suhardiman, et al.
Published: (2009)
Quantum-trajectory simulations of a two-level atom cascaded to a cavity QED laser
by: Abdul Hadi, Muhammad Salihi, et al.
Published: (2003)
by: Abdul Hadi, Muhammad Salihi, et al.
Published: (2003)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
A system and method for exchangeable quantum key distribution
by: ,, Suryadi, et al.
Published: (2012)
by: ,, Suryadi, et al.
Published: (2012)
Tight bounds for the eavesdropping collective attacks on general CV-QKD protocols that involve non-maximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Generation of elementary gates and Bell's states using controlled adiabatic evolutions
by: Benmachiche, Abderrahim, et al.
Published: (2019)
by: Benmachiche, Abderrahim, et al.
Published: (2019)
Message from Deputy Rector (Research & Innovation)
by: Wahiddin, Mohamed Ridza
Published: (2017)
by: Wahiddin, Mohamed Ridza
Published: (2017)
Quantum phase fluctuations of coherent and thermal light coupled to a non-degenerate parametric oscillator beyond rotating wave approximation
by: Alam, Mohosin D.Najib, et al.
Published: (2017)
by: Alam, Mohosin D.Najib, et al.
Published: (2017)
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
by: Becir, A, et al.
Published: (2012)
by: Becir, A, et al.
Published: (2012)
Quality of polarization entanglement in spontaneous parametric down conversion
by: Ali, Norshamsuri, et al.
Published: (2017)
by: Ali, Norshamsuri, et al.
Published: (2017)
Bite me: Blue tails as a ‘risky-decoy’ defense tactic for lizards
by: Bateman, Bill, et al.
Published: (2014)
by: Bateman, Bill, et al.
Published: (2014)
A New Router Certification Authority
Protocol For Securing Mobile Internet
Protocol Version 6
by: Abdul Hadi Ali Alsalihy, Wafaa
Published: (2007)
by: Abdul Hadi Ali Alsalihy, Wafaa
Published: (2007)
Cultivating the Communities of Practice in the Academia
by: Wahiddin, Mohamed Ridza
Published: (2016)
by: Wahiddin, Mohamed Ridza
Published: (2016)
Practical SARG04 quantum key distribution
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Generation of three-qubit entangled W-state by nonlinear optical state truncation
by: Said, Ressa Suhardiman, et al.
Published: (2006)
by: Said, Ressa Suhardiman, et al.
Published: (2006)
A protocol for secret key infusion from satellite transmissions
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
Implementation of two-way free space quantum key distribution
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Laboratory protocols-sediment sample analysis
by: Sa'ari, Anies Aznida, et al.
Published: (2011)
by: Sa'ari, Anies Aznida, et al.
Published: (2011)
Similar Items
-
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009) -
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009) -
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010) -
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011) -
Implementation of SARG04 decoy state quantum key distribution
by: Sellami , Ali, et al.
Published: (2011)