Introduction - If you have any usage issues, please Google them yourself
According to the parameters of the experimental system, the BB84 system with decoy scheme is simulated, and the system security key generation rate R is obtained under different fiber transmission distance