Full metadata record

DC FieldValueLanguage
dc.contributor.author정연창-
dc.contributor.author김용수-
dc.contributor.author김윤호-
dc.date.accessioned2016-01-30T17:00:02Z-
dc.date.available2016-01-30T17:00:02Z-
dc.date.issued201601-
dc.identifier.citationVOL 93, 012322-1-012322-5-
dc.identifier.issn10502947-
dc.identifier.other46144-
dc.identifier.urihttps://pubs.kist.re.kr/handle/201004/58541-
dc.description.abstractThe decoy-state method allows the use of weak coherent pulses in quantum cryptography, and to date, various strategies for the decoy state have been proposed. Here, we experimentally compare the secret key generation rates between the one-decoy and two-decoy implementations of the Bennett-Brassard 1984 (BB84) quantum key distribution protocol through a 3.1-km optical fiber at 780 nm. Once the parameters of the experimental setup are optimized for the maximal secret key generation rate for each implementation, it is found that the two-decoy implementation outperforms the one-decoy implementation.-
dc.publisherPhysical review. A-
dc.subjectQuantum Key Distribution-
dc.subjectBB84 protocol-
dc.subjectSARG04 protocol-
dc.titleExperimental comparison between one-decoy and two-decoy implementations of the Bennett-Brassard 1984 quantum cryptography protocol-
dc.typeArticle-
Appears in Collections:
KIST Publication > Article
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE