Description: According to the parameters of the experimental system, the BB84 system with decoy scheme is simulated, and the system security key generation rate R is obtained under different fiber transmission distance
To Search:
File list (Check if you may need any files):
诱骗态程序\main.cpp
诱骗态程序