Experimental comparison between one-decoy and two-decoy implementations of the Bennett-Brassard 1984 quantum cryptography protocol

Authors
Jeong, Youn-ChangKim, Yong-SuKim, Yoon-Ho
Issue Date
2016-01-14
Publisher
American Physical Society
Citation
Physical Review A, v.93, no.1
Abstract
The decoy-state method allows the use of weak coherent pulses in quantum cryptography, and to date, various strategies for the decoy state have been proposed. Here, we experimentally compare the secret key generation rates between the one-decoy and two-decoy implementations of the Bennett-Brassard 1984 (BB84) quantum key distribution protocol through a 3.1-km optical fiber at 780 nm. Once the parameters of the experimental setup are optimized for the maximal secret key generation rate for each implementation, it is found that the two-decoy implementation outperforms the one-decoy implementation.
Keywords
KEY DISTRIBUTION; SECURITY; BB84; KEY DISTRIBUTION; SECURITY; BB84; Quantum Key Distribution; BB84 protocol; SARG04 protocol
ISSN
2469-9926
URI
https://pubs.kist.re.kr/handle/201004/124505
DOI
10.1103/PhysRevA.93.012322
Appears in Collections:
KIST Article > 2016
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML

qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE