Two way quantum key distribution protocol with Weak+Vacuum decoy state

M. F Abdul Khir, Iskandar Bahari, Abang Annuar Ehsan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

We consider a practical implementation of decoy state protocol with a two way Quantum Key Distribution protocol using the Weak+Vacuum decoy state scheme. The result from numerical simulation was very encouraging given that the maximum secure distance was very close to the case of maximum theoretical limit using infinite decoy state.

Original languageEnglish
Title of host publicationConference Proceedings - 2011 IEEE 2nd International Conference on Photonics, ICP 2011
DOIs
Publication statusPublished - 2011
Event2011 IEEE 2nd International Conference on Photonics, ICP 2011 - Kota Kinabalu, Sabah
Duration: 17 Oct 201119 Oct 2011

Other

Other2011 IEEE 2nd International Conference on Photonics, ICP 2011
CityKota Kinabalu, Sabah
Period17/10/1119/10/11

Fingerprint

decoys
vacuum
simulation

Keywords

  • Decoy state
  • Optical communication
  • Quantum Key Distribution
  • Two way

ASJC Scopus subject areas

  • Condensed Matter Physics

Cite this

Khir, M. F. A., Bahari, I., & Ehsan, A. A. (2011). Two way quantum key distribution protocol with Weak+Vacuum decoy state. In Conference Proceedings - 2011 IEEE 2nd International Conference on Photonics, ICP 2011 [6106858] https://doi.org/10.1109/ICP.2011.6106858

Two way quantum key distribution protocol with Weak+Vacuum decoy state. / Khir, M. F Abdul; Bahari, Iskandar; Ehsan, Abang Annuar.

Conference Proceedings - 2011 IEEE 2nd International Conference on Photonics, ICP 2011. 2011. 6106858.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Khir, MFA, Bahari, I & Ehsan, AA 2011, Two way quantum key distribution protocol with Weak+Vacuum decoy state. in Conference Proceedings - 2011 IEEE 2nd International Conference on Photonics, ICP 2011., 6106858, 2011 IEEE 2nd International Conference on Photonics, ICP 2011, Kota Kinabalu, Sabah, 17/10/11. https://doi.org/10.1109/ICP.2011.6106858
Khir MFA, Bahari I, Ehsan AA. Two way quantum key distribution protocol with Weak+Vacuum decoy state. In Conference Proceedings - 2011 IEEE 2nd International Conference on Photonics, ICP 2011. 2011. 6106858 https://doi.org/10.1109/ICP.2011.6106858
Khir, M. F Abdul ; Bahari, Iskandar ; Ehsan, Abang Annuar. / Two way quantum key distribution protocol with Weak+Vacuum decoy state. Conference Proceedings - 2011 IEEE 2nd International Conference on Photonics, ICP 2011. 2011.
@inproceedings{0d5b90a92bfc46cb9aefd4d6afb04de2,
title = "Two way quantum key distribution protocol with Weak+Vacuum decoy state",
abstract = "We consider a practical implementation of decoy state protocol with a two way Quantum Key Distribution protocol using the Weak+Vacuum decoy state scheme. The result from numerical simulation was very encouraging given that the maximum secure distance was very close to the case of maximum theoretical limit using infinite decoy state.",
keywords = "Decoy state, Optical communication, Quantum Key Distribution, Two way",
author = "Khir, {M. F Abdul} and Iskandar Bahari and Ehsan, {Abang Annuar}",
year = "2011",
doi = "10.1109/ICP.2011.6106858",
language = "English",
isbn = "9781612842646",
booktitle = "Conference Proceedings - 2011 IEEE 2nd International Conference on Photonics, ICP 2011",

}

TY - GEN

T1 - Two way quantum key distribution protocol with Weak+Vacuum decoy state

AU - Khir, M. F Abdul

AU - Bahari, Iskandar

AU - Ehsan, Abang Annuar

PY - 2011

Y1 - 2011

N2 - We consider a practical implementation of decoy state protocol with a two way Quantum Key Distribution protocol using the Weak+Vacuum decoy state scheme. The result from numerical simulation was very encouraging given that the maximum secure distance was very close to the case of maximum theoretical limit using infinite decoy state.

AB - We consider a practical implementation of decoy state protocol with a two way Quantum Key Distribution protocol using the Weak+Vacuum decoy state scheme. The result from numerical simulation was very encouraging given that the maximum secure distance was very close to the case of maximum theoretical limit using infinite decoy state.

KW - Decoy state

KW - Optical communication

KW - Quantum Key Distribution

KW - Two way

UR - http://www.scopus.com/inward/record.url?scp=84855876299&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84855876299&partnerID=8YFLogxK

U2 - 10.1109/ICP.2011.6106858

DO - 10.1109/ICP.2011.6106858

M3 - Conference contribution

SN - 9781612842646

BT - Conference Proceedings - 2011 IEEE 2nd International Conference on Photonics, ICP 2011

ER -