A novel error correction scheme in quantum key distribution (QKD) protocol
Ideally, in any quantum key distribution (QKD) communication system, each sifted key is expected to be received without error. However in practice, due to infeasibility of generating pure single photon and device impairment problem, some of the sifted key may experience errors. This results to the i...
| Main Authors: | Lee, Siao Ping, Ng, Chee Kyun, Mokhtar, Makhfudzah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Asia-Pacific Advanced Network
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/52592/ http://psasir.upm.edu.my/id/eprint/52592/1/A%20novel%20error%20correction%20scheme%20in%20quantum%20key%20distribution%20%28QKD%29%20protocol.pdf |
Similar Items
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013)
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Quantum state engineering with ququarts: application for deterministic QKD protocol
by: Shurupov, Alexander P., et al.
Published: (2009)
by: Shurupov, Alexander P., et al.
Published: (2009)
Methods for performing error correction and a system thereof.
by: Mokhtar, Makhfudzah, et al.
Published: (2011)
by: Mokhtar, Makhfudzah, et al.
Published: (2011)
Quantum key distribution protocols
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
An efficient modeling and simulation of differential phase shift-quantum key distribution (DPS-QKD) system using optisystem
by: Dauda, Mu'azu
Published: (2017)
by: Dauda, Mu'azu
Published: (2017)
Quantum key distribution protocols in transmission control protocol
by: Kamarul Aizan, Nur Hanani
Published: (2012)
by: Kamarul Aizan, Nur Hanani
Published: (2012)
Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication
by: Khalid, Roszelinda, et al.
Published: (2014)
by: Khalid, Roszelinda, et al.
Published: (2014)
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
by: Abdul Khir , Mohd Fared, et al.
Published: (2013)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Quantum key distribution using decoy state protocol
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
Implemetation of BB84 quantum key distribution protocol’s with attacks.
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
by: Muhammad, Nur Atiqah, et al.
Published: (2009)
A method of sharing a secret key in quantum key distribution
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
The effect of mean photon number to the output key rate in quantum key distribution
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
by: Ahmad Ghazali, Lizal Iswady, et al.
Published: (2008)
Implementation of two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
by: Abdul Khir , Mohd Fared, et al.
Published: (2012)
Improved two-way six-state protocol for quantum key distribution
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
by: Shamsul Shaari, Jesni, et al.
Published: (2012)
Continuous-variable quantum key distribution protocols with eight-state discrete modulation
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
Alternative discrete variable protocol for point to point Quantum Key Distribution system
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
An efficient modeling and simulation of quantum key distribution protocols using OptiSystem™
by: Buhari, Abudhahir, et al.
Published: (2012)
by: Buhari, Abudhahir, et al.
Published: (2012)
Security performance of QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Practical quantum key distribution
by: Ali, Sellami
Published: (2012)
by: Ali, Sellami
Published: (2012)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
Decoy state quantum key distribution
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Quantum key distribution in real life
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Eavesdropping attacks on QKD channels
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
Optimal device independent quantum key distribution
by: Kamaruddin, Suhaili, et al.
Published: (2016)
by: Kamaruddin, Suhaili, et al.
Published: (2016)
Practical SARG04 quantum key distribution
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
The decoy state method in quantum key distribution
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Fiber based practical QKD system
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Feasibility of QKD over FSO Link
by: Husagić-Selman, Alma, et al.
Published: (2012)
by: Husagić-Selman, Alma, et al.
Published: (2012)
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
by: Majeed, Mohammed Munther A, et al.
Published: (2010)
Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
by: Becir, A., et al.
Published: (2012)
by: Becir, A., et al.
Published: (2012)
Improved Distributed Wyner-Ziv Video Coding Based On Reed Solomon Error Correction Scheme And Frame Estimation For Wireless Transmission
by: Chiam, Kin Honn
Published: (2015)
by: Chiam, Kin Honn
Published: (2015)
Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
by: Abdul Khir, Mohd Fared, et al.
Published: (2012)
A system and method for exchangeable quantum key distribution
by: ,, Suryadi, et al.
Published: (2012)
by: ,, Suryadi, et al.
Published: (2012)
Similar Items
-
Practical considerations on Quantum Key Distribution (QKD)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2013) -
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
by: Khalid, Roszelinda, et al.
Published: (2014) -
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012) -
Quantum state engineering with ququarts: application for deterministic QKD protocol
by: Shurupov, Alexander P., et al.
Published: (2009) -
Methods for performing error correction and a system thereof.
by: Mokhtar, Makhfudzah, et al.
Published: (2011)