Severity: Warning
Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 197
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 197
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 271
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1075
Function: getPubMedXML
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3195
Function: GetPubMedArticleOutput_2016
File: /var/www/html/application/controllers/Detail.php
Line: 597
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 511
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 317
Function: require_once
98%
921
2 minutes
20
Measurement-device-independent quantum key distribution can remove all possible detector side channels, and is robust against state preparation flaws when further combined with the loss-tolerant method. However, the secure key rate in this scenario is relatively low, thus hindering its practical application. Here, we first present a four-intensity decoy-state protocol where the signal intensity is modulated only in Z basis for key generation while the decoy intensities are modulated in both Z and X bases for parameter estimation. Moreover, we adopt collective constraint and joint-study strategy in statistical fluctuation analysis. We have also experimentally demonstrated this protocol and the result indicates high performance and good security for practical applications.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1364/OL.489039 | DOI Listing |