2018
DOI: 10.1103/physrevapplied.10.064032
|View full text |Cite
|
Sign up to set email alerts
|

Afterpulse Analysis for Quantum Key Distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
31
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 36 publications
(33 citation statements)
references
References 32 publications
2
31
0
Order By: Relevance
“…The problem to obtain the photon‐number distributions in Equations ()–() is to calculate the papsrc. According to the Reference 30, the afterpulse probability depends on two parameters, the response probability of light pulse and dark count, Qdsrc, and the afterpulse rate, pasrc, of the detector. papsrc=pasrc1prefix−pasrcQdsrc, where pasrc is the intrinsic character of the detector and can be measured as shown in Reference 33.…”
Section: Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…The problem to obtain the photon‐number distributions in Equations ()–() is to calculate the papsrc. According to the Reference 30, the afterpulse probability depends on two parameters, the response probability of light pulse and dark count, Qdsrc, and the afterpulse rate, pasrc, of the detector. papsrc=pasrc1prefix−pasrcQdsrc, where pasrc is the intrinsic character of the detector and can be measured as shown in Reference 33.…”
Section: Modelmentioning
confidence: 99%
“…In passive decoy modes, the probability distribution of photon number depends on the response probability of the detector, normally using the single-photon avalanche photodiode (SPAD) due to its high quantum efficiency, low price, and great robustness. [27][28][29] For SPADs, all light pulses, dark counts and afterpulses can report response signals, 30 where the afterpulse probability can be increased with a high repetition rate.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…We implement the standard BB84 protocol with decoy states in our system [1], [35], [36]. The secure key rate is lower bounded by [35], [36]…”
Section: Appendix B Secure Key Rate and Qbermentioning
confidence: 99%