2020
DOI: 10.1038/s41598-019-56637-y
|View full text |Cite
|
Sign up to set email alerts
|

Blind information reconciliation with variable step sizes for quantum key distribution

Abstract: Quantum key distribution (QKD) generates symmetric keys between two authenticated parties with the guarantee of information-theoretically security. A vital step in QKD to obtain fully-matched key between two parties is information reconciliation. the blind reconciliation protocol provides a useful tool that corrects the mismatch in a wide range of qubit error rate (QBeR) but without a prior error estimation. However, there is a contradiction between the reconciliation efficiency and the processing time in this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…Moreover, additional optimizations and fine-tuning of parameters (e.g. varying of step size in a way as it was implemented for LDPC codes version [17]), can be also considered.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, additional optimizations and fine-tuning of parameters (e.g. varying of step size in a way as it was implemented for LDPC codes version [17]), can be also considered.…”
Section: Discussionmentioning
confidence: 99%
“…Information reconciliation methods proposed so far mainly rely on the Cascade method [7][8][9] or low-density parity-check (LDPC) codes [10][11][12][13][14][15][16][17]. The latter approach has been studied in various aspects and it is used in commercial QKD devices.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, this protocol could achieve high efficiencies within a wider QBER range even with frame-length of 2 kb, which made it suitable for hardware implementations. Later in [26], an increasing number instated of a fixed number of punctured bits were revealed in each additional communication round. With the help of this optimization, Bob could receive increasing help from Alice in the later communication round, thereby the convergence of IR was accelerated.…”
Section: Introductionmentioning
confidence: 99%
“…If QBER is higher than the determined threshold, because of the nocloning theorem [10], it shows that Eve spoofs the connection and the key is not safe anymore. Otherwise, the next step is begun, 3-B uses a reconciliation algorithm [11][12][13][14][15][45][46][47] to correct the errors and then uses some privacy amplification methods [16,17] to remove the disclosed information along the reconciliation step. Key reconciliation is important because using an efficient approach with minimum information leakage, in addition to increase secure key generation rate, it impacts on the security of the communication between two sides.…”
Section: -Introductionmentioning
confidence: 99%