Estimation of decoy state parameters for practical quantum key distribution /
We have presented a method to estimate parameters of the decoy state protocol based on one decoy state, vacuum + one decoy state, two decoy states, and vacuum + two decoy states protocol for both BB84 and SARG04. For each protocol, this method can give different lower bound of the fraction of single...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Gombak, Selangor :
Kulliyyah of Science, International Islamic University Malaysia,
2010
|
Subjects: | |
Online Access: | Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | We have presented a method to estimate parameters of the decoy state protocol based on one decoy state, vacuum + one decoy state, two decoy states, and vacuum + two decoy states protocol for both BB84 and SARG04. For each protocol, this method can give different lower bound of the fraction of single-photon counts y 1, the fraction of two-photon counts y 2, the upper bound QBER of single-photon pulses e 1, the upper bound QBER of two-photon pulses e 2, and the lower bound of key generation rate for both BB84 and SARG04. The effects of statistical fluctuations on some parameters of our QKD system have been presented. We have also performed the optimization on the choice of intensities and percentages of signal state and decoy states which give out the maximum distance and the optimization of the key generation rate. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Also, it is shown that bidirectional ground to satellite and inter-satellite communications are possible with our protocol. The experiment of decoy state QKD has been demonstrated using ID-3000 commercial QKD system based on a standard 'Plug & Play' set-up. Two protocols of decoy state QKD have been implemented: one decoy state protocol, and vacuum + one decoy state protocol for both BB84 and SARG04 over different transmission distance of standard telecom fiber. For detecting of Eve (the photon number splitting attack), we have calculated the expected ratio of the decoy state gain to the signal state gain. Significant deviation of the measured ratio from this expected value indicates a PNS (Photon Number Splitting) by Eve. |
---|---|
Item Description: | Abstracts in English and Arabic. "A thesis submitted in partial fulfilment of the requirement for the degree of Doctor of Philosophy in Computational and Theoretical Science."--On t.p. |
Physical Description: | xviii, 179 leaves : ill. ; 30cm. |
Bibliography: | Includes bibliographical references (leaves 154-160). |