Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • CLEO/Europe and EQEC 2009 Conference Digest
  • (Optica Publishing Group, 2009),
  • paper ED_P6

Quantum Key Distribution With Time Coding And Decoy States

Not Accessible

Your library or personal account may give you access

Abstract

Modern information security systems require use of cryptographic key distribution systems connecting two remote parties. In the present work we propose modified quantum key distribution protocol with time coding and present analysis of practically feasible attacks on this protocol as well as some experimental results, that show the possibility of its successful implementation.

© 2009 IEEE

PDF Article
More Like This
Decoy State Protocol for OFDM based Frequency Coded Quantum Key Distribution

Saumya Choudhary, Mukund Anandan, and Pradeep Kumar K
WPo.17 International Conference on Fibre Optics and Photonics (Photonics) 2012

Free-Space Decoy-State Quantum Key Distribution

M. Fürst, T. Schmitt-Manderbach, H. Weier, R. Ursin, F. Tiefenbacher, T. Scheidl, C. Barbieri, J. Perdigues, Z. Sodnik, C. Kurtsiefer, J.G. Rarity, A. Zeilinger, and H. Weinfurter
OWJ4 Optical Fiber Communication Conference (OFC) 2008

Practical High-Dimensional Quantum Key Distribution with Decoy States

Darius Bunandar, Zheshen Zhang, Jeffrey Shapiro, and Dirk R. Englund
FF1A.2 CLEO: QELS_Fundamental Science (CLEO_QELS) 2015

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2022 | Optica Publishing Group. All Rights Reserved