论文部分内容阅读
In this paper,we discuss the security of biased decoy state BB84 protocol with nite resources by consideringall of the statistical uctuations.The results can be directly used in the experimental realizations.