Use of decoy states in quantum key distribution

In this thesis, the decoy-pulse method and the experimental aspects of quantum key distribution are addressed. Additionally, an experimental implementation of the BB84 protocol with the addition of decoy states is reported. Finally, the experimental implementation is compared with a standard BB84 pr...

Full description

Autores:
Sabogal Pérez, Daniel Ricardo
Tipo de recurso:
Trabajo de grado de pregrado
Fecha de publicación:
2021
Institución:
Universidad de los Andes
Repositorio:
Séneca: repositorio Uniandes
Idioma:
spa
OAI Identifier:
oai:repositorio.uniandes.edu.co:1992/53558
Acceso en línea:
http://hdl.handle.net/1992/53558
Palabra clave:
Fotónica
Láseres
Criptografía
Teoría cuántica
Física
Rights
openAccess
License
http://creativecommons.org/licenses/by-nc-sa/4.0/
Description
Summary:In this thesis, the decoy-pulse method and the experimental aspects of quantum key distribution are addressed. Additionally, an experimental implementation of the BB84 protocol with the addition of decoy states is reported. Finally, the experimental implementation is compared with a standard BB84 protocol implementation with the purpose of comparing the security prospects that the decoy state method brings.