Decoy states and two way quantum key distribution schemes
We study the possible application of the decoy state method on a basic two way quantum key distribution (QKD) scheme to extend its distance. Noting the obvious advantage of such a QKD scheme in allowing for single as well as double photon contributions, we derive relevant lower bounds on the corresp...
| Main Authors: | Shamsul Shaari, Jesni, Bahari, Iskandar, Ali, Sellami |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/3533/ http://irep.iium.edu.my/3533/1/OPTICS15546.pdf |
Similar Items
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
by: Abdul Khir, Mohd Fared, et al.
Published: (2013)
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014)
by: Shamsul Shaari, Jesni
Published: (2014)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
Checking noise correlations for safer two-way quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2014)
by: Shamsul Shaari, Jesni, et al.
Published: (2014)
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Finite key size analysis of two-way quantum cryptography
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
by: Shamsul Shaari, Jesni, et al.
Published: (2015)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Implementation of SARG04 decoy state quantum key distribution
by: Sellami , Ali, et al.
Published: (2011)
by: Sellami , Ali, et al.
Published: (2011)
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016)
by: Kamaruddin, Suhaili, et al.
Published: (2016)
Indistinguishable encoding for bidirectional quantum key distribution: Theory to experiment
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
by: Shamsul Shaari, Jesni, et al.
Published: (2017)
Device-independent quantum key distribution using single-photon entanglement
by: Kamaruddin, Suhaili, et al.
Published: (2015)
by: Kamaruddin, Suhaili, et al.
Published: (2015)
Estimation of decoy state parameters for practical QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Implementation of two-way free space quantum key distribution
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
Phase coherent states for enhancing the performance of continuous variable quantum key distribution
by: Becir, A, et al.
Published: (2012)
by: Becir, A, et al.
Published: (2012)
Implementation of decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Practical quantum key distribution
by: Ali, Sellami
Published: (2012)
by: Ali, Sellami
Published: (2012)
A system and method for exchangeable quantum key distribution
by: ,, Suryadi, et al.
Published: (2012)
by: ,, Suryadi, et al.
Published: (2012)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Practical SARG04 quantum key distribution
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Apparatus for flipping the polarization state of an optical pulse between a transmitter and a receiver in quantum key distribution and method thereof
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Entropic bounds for unitary testers and mutually unbiased unitary bases
by: Shamsul Shaari, Jesni, et al.
Published: (2020)
by: Shamsul Shaari, Jesni, et al.
Published: (2020)
Comment on new estimates of single photon parameters for setellite-based QKD
by: Shamsul Shaari, Jesni
Published: (2010)
by: Shamsul Shaari, Jesni
Published: (2010)
Quantum key distribution in real life
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
by: El-Orany, Faisal A.A, et al.
Published: (2009)
by: El-Orany, Faisal A.A, et al.
Published: (2009)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
Nonentagled qutrits in two way deterministic QKD
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
by: Shamsul Shaari, Jesni, et al.
Published: (2007)
Counterfactual protocol within device independent framework and its insecurity
by: Kamaruddin, Suhaili, et al.
Published: (2020)
by: Kamaruddin, Suhaili, et al.
Published: (2020)
An improved quantum condition for the bound state problem in non-relativistic quantum mechanics using the NUFA method.
by: Rajesh Kumar, P.
Published: (2022)
by: Rajesh Kumar, P.
Published: (2022)
Quantum state engineering with ququarts: application for deterministic QKD protocol
by: Shurupov, Alexander P., et al.
Published: (2009)
by: Shurupov, Alexander P., et al.
Published: (2009)
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Similar Items
-
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013) -
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012) -
Experimental two way quantum key distribution with weak+vacuum decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2013) -
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010) -
Nonorthogonal unitaries in two-way quantum key distribution
by: Shamsul Shaari, Jesni
Published: (2014)