Tang Shao-jie

  • Citations Per Year
Learn More
Every security analysis of quantum key distribution relies on a faithful modeling of the employed quantum states. The properties of decoy state protocol based on only two decoy states and one signal state are analyzed. The performance of decoy state quantum key distribution protocol with finite resources is calculated by considering the statistical(More)
  • 1