Use of decoy states in quantum key distribution
In this thesis, the decoy-pulse method and the experimental aspects of quantum key distribution are addressed. Additionally, an experimental implementation of the BB84 protocol with the addition of decoy states is reported. Finally, the experimental implementation is compared with a standard BB84 pr...
- Autores:
-
Sabogal Pérez, Daniel Ricardo
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2021
- Institución:
- Universidad de los Andes
- Repositorio:
- Séneca: repositorio Uniandes
- Idioma:
- spa
- OAI Identifier:
- oai:repositorio.uniandes.edu.co:1992/53558
- Acceso en línea:
- http://hdl.handle.net/1992/53558
- Palabra clave:
- Fotónica
Láseres
Criptografía
Teoría cuántica
Física
- Rights
- openAccess
- License
- http://creativecommons.org/licenses/by-nc-sa/4.0/
Summary: | In this thesis, the decoy-pulse method and the experimental aspects of quantum key distribution are addressed. Additionally, an experimental implementation of the BB84 protocol with the addition of decoy states is reported. Finally, the experimental implementation is compared with a standard BB84 protocol implementation with the purpose of comparing the security prospects that the decoy state method brings. |
---|