IIUM Repository

Quantum key distribution in real life

Ali, Sellami and Ahmed, Abdallah Hassen and Habaebi, Mohamed Hadi and Chowdhury, Md. Sazzad Hossien (2012) Quantum key distribution in real life. World Applied Sciences Journal , 4 (10). pp. 29-34. ISSN 1818-4952

[img] PDF (Quantum key distribution in real life) - Published Version
Restricted to Registered users only

Download (62kB) | Request a copy

Abstract

The quantum key distribution (QKD) technique establishes secret keys shared between two communicating parties. Theoretically, unconditional security provided by QKD is guaranteed by the fundamental laws of quantum physics. in the real life, it is still possible to obtain unconditionally secure QKD, even with (phase randomized) attenuated laser pulses, as theoretically demonstrated by Gottesman-Lo-L¨utkenhaus-Preskill (GLLP). However, one must pay a steep price by placing severe limits on the distance and the key generation rate. These problems were solved using the decoy state method introduced by Hwang. In this paper, we have proposed a method to estimate parameters of the decoy state method based on two decoy state protocol for both BB84 and SARG04. The vacuum and weak decoy state protocol has been introduced as a special case of two decoy states protocol. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2) and the lower bound of key generation rate for both BB84 and SARG04. The fiber based QKD systems also have been simulated using the proposed method for BB84 and SARG04. The numerical simulation has shown that the fiber based QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Key words: Quantum cryptography % Quantum key distribution % Decoy state protocol and optical communications

Item Type: Article (Journal)
Additional Information: 6576/28060
Uncontrolled Keywords: Quantum cryptography % Quantum key distribution % Decoy state protocol and optical communications
Subjects: T Technology > T Technology (General) > T10.5 Communication of technical information
T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101 Telecommunication. Including telegraphy, radio, radar, television
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Engineering
Depositing User: Dr. Mohamed Hadi Habaebi
Date Deposited: 03 Jan 2013 08:47
Last Modified: 25 Apr 2013 14:47
URI: http://irep.iium.edu.my/id/eprint/28060

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year