Repository logo
  • English
  • Deutsch
  • Español
  • Français
Log In
New user? Click here to register.
  1. Home
  2. Browse by Author

Browsing by Author "Sellami Ali"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Some of the metrics are blocked by your 
    consent settings
    Publication
    Estimation of decoy state parameters for practical quantum key distribution
    (Gombak, Selangor : International Islamic University Malaysia, 2010, 2010)
    Sellami Ali
    ;
    We have presented a method to estimate parameters of the decoy state protocol based on one decoy state, vacuum + one decoy state, two decoy states, and vacuum + two decoy states protocol for both BB84 and SARG04. For each protocol, this method can give different lower bound of the fraction of single-photon counts (y1) , the fraction of two-photon counts (y2) , the upper bound QBER of single-photon pulses (e1) , the upper bound QBER of two-photon pulses (e2) , and the lower bound of key generation rate for both BB84 and SARG04. The effects of statistical fluctuations on some parameters of our QKD system have been presented. We have also performed the optimization on the choice of intensities and percentages of signal state and decoy states which give out the maximum distance and the optimization of the key generation rate. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Also, it is shown that bidirectional ground to satellite and inter-satellite communications are possible with our protocol. The experiment of decoy state QKD has been demonstrated using ID-3000 commercial QKD system based on a standard ‘Plug & Play’ set-up. Two protocols of decoy state QKD have been implemented: one decoy state protocol, and vacuum + one decoy state protocol for both BB84 and SARG04 over different transmission distance of standard telecom fiber. For detecting of Eve (the photon number splitting attack), we have calculated the expected ratio of the decoy state gain to the signal state gain. Significant deviation of the measured ratio from this expected value indicates a PNS (Photon Number Splitting) by Eve.

This site contains copyrighted unpublished research owned by International Islamic University Malaysia (IIUM) and(or) the owner of the research. No part of any material contained in or derived from any unpublished research may be used without written permission of the copyright holders or due acknowledgement.

Contact:
  • Dar al-Hikmah Library
    International Islamic University Malaysia (IIUM)
    P.O Box 10, 50728
    Kuala Lumpur
  • +603-64214829/4813
  • studentrepo@iium.edu.my
Follow Us:
Copyright © 2024: Dar al-Hikmah Library, IIUM
by CDSOL