搜索结果: 1-5 共查到“理学 decoy state”相关记录5条 . 查询时间(0.044 秒)
Decoy-state quantum key distribution with biased basis choice
Decoy-state quantum distribution biased basis choice
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Source attack of decoy-state quantum key distribution using phase information
Source attack decoy-state quantum key distribution phase information
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Passive scheme with a photon-number-resolving detector for decoy-state quantum key distribution with an untrusted source
photon-number-resolving decoy-state quantum
2010/3/10
A passive scheme with a photon-number-resolving (PNR) detector and a beam splitter which are used to monitor the statistical characteristics of photon source, is proposed to verify the security of vac...
Upper bounds for the secure key rate of decoy state quantum key distribution
Upper bounds secure key decoy state quantum key
2010/4/12
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signal...
Numerical analysis of decoy state quantum key distribution protocols
Numerical analysis decoy state quantum key distribution protocols
2010/4/7
Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In...