Practical SARG04 quantum key distribution
We have presented a method to estimate parameters of the decoy state method based on one decoy state protocol for SARG04. This method has given lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the...
| Main Authors: | Ali, Sellami, Mohammed, Sellami, Chowdhury, Md. Sazzad Hossien, Hassan Abdalla Hashim, Aisha |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Springer
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/26187/ http://irep.iium.edu.my/26187/1/Practical_SARG04_quantum_key_distribution.pdf |
Similar Items
Implementation of SARG04 decoy state quantum key distribution
by: Sellami , Ali, et al.
Published: (2011)
by: Sellami , Ali, et al.
Published: (2011)
Practical quantum key distribution
by: Ali, Sellami
Published: (2012)
by: Ali, Sellami
Published: (2012)
Quantum key distribution in real life
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Fiber based practical QKD system
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
Security proof of improved-SARG04 protocol using the same four qubit states
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2010)
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2010)
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
A system and method for exchangeable quantum key distribution
by: ,, Suryadi, et al.
Published: (2012)
by: ,, Suryadi, et al.
Published: (2012)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Implementation of two-way free space quantum key distribution
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
A new application of multistage homotopy perturbation method to the chaotic Rössler system
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Analytic treatment of differential equations by
modified homotopy perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
A new application of multistage homotopy perturbation method to the chaotic Rössler system
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
An accurate analytic solution for differential and integral equations by modified homotopy perturbation method
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2013)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2013)
A new reliable algorithm for analytical treatment of differential and integral equations
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2013)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2013)
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016)
by: Kamaruddin, Suhaili, et al.
Published: (2016)
A method of sharing a secret key in quantum key distribution
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014)
by: Shamsul Shaari, Jesni
Published: (2014)
The effect of mean photon number to the output key rate in quantum key distribution
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2019)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
Indistinguishable encoding for bidirectional quantum key distribution: Theory to experiment
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
Implemetation of BB84 quantum key distribution protocol’s with attacks.
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
Apparatus for flipping the polarization state of an optical pulse between a transmitter and a receiver in quantum key distribution and method thereof
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
Similar Items
-
Implementation of SARG04 decoy state quantum key distribution
by: Sellami , Ali, et al.
Published: (2011) -
Practical quantum key distribution
by: Ali, Sellami
Published: (2012) -
Quantum key distribution in real life
by: Ali, Sellami, et al.
Published: (2012) -
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010) -
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)