Quantum key distribution with distinguishable decoy states
The decoy-state protocol has been considered to be one of the most important methods to protect the security of quantum key distribution (QKD) with a weak coherent source. Here we test two experimental approaches to generating the decoy states with different intensities: modulation of the pump curre
下载地址
用户评论