Decoy state method is widely used in practical quantum key distribution (QKD) systems to substantially extend the secure communication distance. Detector efficiency mismatch (DEM), which exists between practical detectors, effects the security of practical QKD systems seriously. Security of single photon QKD with DEM has been analyzed. However, estimate of the phase error rate still remains difficult in practice. Here, using a simple equivalent detection model, the mutual information between legitimate users and the eavesdropper for single photon state in QKD with DEM is analyzed. Then we improve the security analysis to cover the situation of weak coherent QKD with DEM. A general theory of the decoy state QKD with DEM is proposed to calcul...
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure ...
Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundam...
Measurement-device-independent quantum key distribution (MDI-QKD) is innately immune to all detectio...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy agains...
Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keyi...
Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keyi...
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure ...
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure ...
Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundam...
Measurement-device-independent quantum key distribution (MDI-QKD) is innately immune to all detectio...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
The decoy state quantum key distribution (QKD) protocol is proven to be an effective strategy agains...
Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keyi...
Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keyi...
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure ...
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure ...
Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundam...
Measurement-device-independent quantum key distribution (MDI-QKD) is innately immune to all detectio...