Experimental comparison between one-decoy and two-decoy implementations of the Bennett-Brassard 1984 quantum cryptography protocol
- Authors
- Jeong, Youn-Chang; Kim, Yong-Su; Kim, Yoon-Ho
- Issue Date
- 2016-01-14
- Publisher
- American Physical Society
- Citation
- Physical Review A, v.93, no.1
- Abstract
- The decoy-state method allows the use of weak coherent pulses in quantum cryptography, and to date, various strategies for the decoy state have been proposed. Here, we experimentally compare the secret key generation rates between the one-decoy and two-decoy implementations of the Bennett-Brassard 1984 (BB84) quantum key distribution protocol through a 3.1-km optical fiber at 780 nm. Once the parameters of the experimental setup are optimized for the maximal secret key generation rate for each implementation, it is found that the two-decoy implementation outperforms the one-decoy implementation.
- Keywords
- KEY DISTRIBUTION; SECURITY; BB84; KEY DISTRIBUTION; SECURITY; BB84; Quantum Key Distribution; BB84 protocol; SARG04 protocol
- ISSN
- 2469-9926
- URI
- https://pubs.kist.re.kr/handle/201004/124505
- DOI
- 10.1103/PhysRevA.93.012322
- Appears in Collections:
- KIST Article > 2016
- Files in This Item:
There are no files associated with this item.
- Export
- RIS (EndNote)
- XLS (Excel)
- XML
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.