Open Access System for Information Sharing

Login Library

 

Article
Cited 4 time in webofscience Cited 4 time in scopus
Metadata Downloads

Experimental comparison between one-decoy and two-decoy implementations of Bennett-Brassard 1984 quantum cryptography protocol SCIE SCOPUS

Title
Experimental comparison between one-decoy and two-decoy implementations of Bennett-Brassard 1984 quantum cryptography protocol
Authors
Jeong, YCKim, YSKIM, YOON HO
Date Issued
2016-01-14
Publisher
American Physical Society
Abstract
The decoy-state method allows the use of weak coherent pulses in quantum cryptography, and to date, various strategies for the decoy state have been proposed. Here, we experimentally compare the secret key generation rates between the one-decoy and two-decoy implementations of the Bennett-Brassard 1984 (BB84) quantum key distribution protocol through a 3.1-km optical fiber at 780 nm. Once the parameters of the experimental setup are optimized for the maximal secret key generation rate for each implementation, it is found that the two-decoy implementation outperforms the one-decoy implementation.
URI
https://oasis.postech.ac.kr/handle/2014.oak/29971
DOI
10.1103/PHYSREVA.93.012322
ISSN
2469-9926
Article Type
Article
Citation
Physical Review A, vol. 93, no. 1, page. 12322, 2016-01-14
Files in This Item:

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Views & Downloads

Browse