2022
DOI: 10.1007/s11128-022-03462-4
|View full text |Cite
|
Sign up to set email alerts
|

An efficient hybrid hash based privacy amplification algorithm for quantum key distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Because of the finite-size effects, the block length in the procedure of privacy amplification is at least , which also takes up abundant hardware resource [ 26 , 27 ], so that not all the check matrices can be stored in advance. The reconciliation efficiency will be reduced quickly even if the SNR changes in a very small range.…”
Section: Simulation Experimentsmentioning
confidence: 99%
“…Because of the finite-size effects, the block length in the procedure of privacy amplification is at least , which also takes up abundant hardware resource [ 26 , 27 ], so that not all the check matrices can be stored in advance. The reconciliation efficiency will be reduced quickly even if the SNR changes in a very small range.…”
Section: Simulation Experimentsmentioning
confidence: 99%
“…In the quantum transmission, Bob randomly measures quantum states with a homodyne or a heterodyne detector [13]. Post-processing is to extract secret keys from both parties, which consists of four main steps: data sifting [10,11], parameter estimation [3,14], information reconciliation (IR) [15,16], and privacy amplification [17][18][19]. It is reported that IR is essential in the post-processing to improve the secret key rate (SKR) [20].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, quantum cryptography has absolute security in theory. Since the first quantum cryptographic protocol [1] appeared in 1984, many different kinds of quantum cryptographic protocols have been proposed one after another, such as quantum key distribution (QKD) [2][3][4][5] , quantum secret sharing (QSS), [6][7][8][9][10] quantum secure direct communication (QSDC), [11][12][13][14] quantum privacy comparison (QPC), [15][16][17][18] quantum key agreement (QKA), [19][20][21][22][23][24][25][26] etc.…”
Section: Introductionmentioning
confidence: 99%