228 research outputs found
Demystifying the Information Reconciliation Protocol Cascade
Cascade is an information reconciliation protocol proposed in the context of
secret key agreement in quantum cryptography. This protocol allows removing
discrepancies in two partially correlated sequences that belong to distant
parties, connected through a public noiseless channel. It is highly
interactive, thus requiring a large number of channel communications between
the parties to proceed and, although its efficiency is not optimal, it has
become the de-facto standard for practical implementations of information
reconciliation in quantum key distribution. The aim of this work is to analyze
the performance of Cascade, to discuss its strengths, weaknesses and
optimization possibilities, comparing with some of the modified versions that
have been proposed in the literature. When looking at all design trade-offs, a
new view emerges that allows to put forward a number of guidelines and propose
near optimal parameters for the practical implementation of Cascade improving
performance significantly in comparison with all previous proposals.Comment: 30 pages, 13 figures, 3 table
Demystifying the information reconciliation protocol cascade
Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and, although its efficiency is not optimal, it has become the de-facto standard for practical implementations of information reconciliation in quantum key distribution. The aim of this work is to analyze the performance of Cascade, to discuss its strengths, weaknesses and optimization possibilities, comparing with some of the modified versions that have been proposed in the literature. When looking at all design trade-offs, a new view emerges that allows to put forward a number of guidelines and propose near optimal parameters for the practical implementation of Cascade improving performance significantly in comparison with all previous proposals
Towards an Optimal Implementation of Cascade
Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and, although its efficiency is not optimal, it has become the de-facto standard for practical implementations of information reconciliation in quantum key distribution. The aim of this work is to analyze the performance of Cascade, to discuss its strengths, weaknesses and optimization possibilities, comparing with some of the modified versions that have been proposed in the literature. When looking at all design trade-offs, a new view emerges that allows to put forward a number of guidelines and propose near optimal parameters for the practical implementation of Cascade improving performance significantly in comparison with all previous proposals
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
We present an overview of quantum key distribution (QKD), a secure key
exchange method based on the quantum laws of physics rather than computational
complexity. We also provide an overview of the two most widely used commodity
security protocols, IPsec and TLS. Pursuing a key exchange model, we propose
how QKD could be integrated into these security applications. For such a QKD
integration we propose a support layer that provides a set of common QKD
services between the QKD protocol and the security applicationsComment: 12Page
Entanglement Verification in Quantum Networks with Tampered Nodes
In this paper, we consider the problem of entanglement verification across
the quantum memories of any two nodes of a quantum network. Its solution can be
a means for detecting (albeit not preventing) the presence of intruders that
have taken full control of a node, either to make a denial-of-service attack or
to reprogram the node. Looking for strategies that only require local
operations and classical communication (LOCC), we propose two entanglement
verification protocols characterized by increasing robustness and efficiency.Comment: 14 pages, 7 figure
Daylight entanglement-based quantum key distribution with a quantum dot source
Entanglement-based quantum key distribution can enable secure communication in trusted node-free networks and over long distances. Although implementations exist both in fiber and in free space, the latter approach is often considered challenging due to environmental factors. Here, we implement a quantum communication protocol during daytime for the first time using a quantum dot source. This technology presents advantages in terms of narrower spectral bandwidth-beneficial for filtering out sunlight-and negligible multiphoton emission at peak brightness. We demonstrate continuous operation over the course of three days, across an urban 270 m-long free-space optical link, under different light and weather conditions
- …