8,557 research outputs found
A Simple Approach to Error Reconciliation in Quantum Key Distribution
We discuss the error reconciliation phase in quantum key distribution (QKD)
and analyse a simple scheme in which blocks with bad parity (that is, blocks
containing an odd number of errors) are discarded. We predict the performance
of this scheme and show, using a simulation, that the prediction is accurate.Comment: 19 pages. Presented at the 53rd Annual Meeting of the Australian
Mathematical Society, Adelaide, Oct 1, 2009. See also
http://wwwmaths.anu.edu.au/~brent/pub/pub239.htm
Blind Reconciliation
Information reconciliation is a crucial procedure in the classical
post-processing of quantum key distribution (QKD). Poor reconciliation
efficiency, revealing more information than strictly needed, may compromise the
maximum attainable distance, while poor performance of the algorithm limits the
practical throughput in a QKD device. Historically, reconciliation has been
mainly done using close to minimal information disclosure but heavily
interactive procedures, like Cascade, or using less efficient but also less
interactive -just one message is exchanged- procedures, like the ones based in
low-density parity-check (LDPC) codes. The price to pay in the LDPC case is
that good efficiency is only attained for very long codes and in a very narrow
range centered around the quantum bit error rate (QBER) that the code was
designed to reconcile, thus forcing to have several codes if a broad range of
QBER needs to be catered for. Real world implementations of these methods are
thus very demanding, either on computational or communication resources or
both, to the extent that the last generation of GHz clocked QKD systems are
finding a bottleneck in the classical part. In order to produce compact, high
performance and reliable QKD systems it would be highly desirable to remove
these problems. Here we analyse the use of short-length LDPC codes in the
information reconciliation context using a low interactivity, blind, protocol
that avoids an a priori error rate estimation. We demonstrate that 2x10^3 bits
length LDPC codes are suitable for blind reconciliation. Such codes are of high
interest in practice, since they can be used for hardware implementations with
very high throughput.Comment: 22 pages, 8 figure
Fundamental Finite Key Limits for One-Way Information Reconciliation in Quantum Key Distribution
The security of quantum key distribution protocols is guaranteed by the laws
of quantum mechanics. However, a precise analysis of the security properties
requires tools from both classical cryptography and information theory. Here,
we employ recent results in non-asymptotic classical information theory to show
that one-way information reconciliation imposes fundamental limitations on the
amount of secret key that can be extracted in the finite key regime. In
particular, we find that an often used approximation for the information
leakage during information reconciliation is not generally valid. We propose an
improved approximation that takes into account finite key effects and
numerically test it against codes for two probability distributions, that we
call binary-binary and binary-Gaussian, that typically appear in quantum key
distribution protocols
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
It is shown that an existing method to study ideal individual attacks on the
BB84 QKD protocol using error discard can be adapted to reconciliation with
error correction, and that an optimal attack can be explicitly found. Moreover,
this attack fills Luetkenhaus bound, independently of whether error positions
are leaked to Eve, proving that it is tight. In addition, we clarify why the
existence of such optimal attacks is not in contradiction with the established
``old-style'' theory of BB84 individual attacks, as incorrectly suggested
recently in a news feature.Comment: 12 pages, 3 figure
Single-Quadrature Continuous-Variable Quantum Key Distribution
Most continuous-variable quantum key distribution schemes are based on the
Gaussian modulation of coherent states followed by continuous quadrature
detection using homodyne detectors. In all previous schemes, the Gaussian
modulation has been carried out in conjugate quadratures thus requiring two
independent modulators for their implementations. Here, we propose and
experimentally test a largely simplified scheme in which the Gaussian
modulation is performed in a single quadrature. The scheme is shown to be
asymptotically secure against collective attacks, and considers asymmetric
preparation and excess noise. A single-quadrature modulation approach renders
the need for a costly amplitude modulator unnecessary, and thus facilitates
commercialization of continuous-variable quantum key distribution.Comment: 13 pages, 7 figure
- …