Author:
Fang Junbin,Yi Zhengzhong,Li Jin,Liang Zhipeng,Wu Yulin,Lei Wen,Jiang Zoe Lin,Wang Xuan
Abstract
AbstractCombined with one-time pad encryption scheme, quantum key distribution guarantees the unconditional security of communication in theory. However, error correction and privacy amplification in the post-processing phase of quantum key distribution result in high time delay, which limits the final secret key generation rate and the practicability of quantum key distribution systems. To alleviate this limitation, this paper proposes an efficient post-processing algorithm based on polar codes for quantum key distribution. In this algorithm, by analyzing the channel capacity of the main channel and the wiretap channel respectively under the Wyner’s wiretap channel model, we design a codeword structure of polar codes, so that the error correction and privacy amplification could be completed synchronously in a single step. Through combining error correction and privacy amplification into one single step, this efficient post-processing algorithm reduces complexity of the system and lower the post-processing delay. Besides, the reliable and secure communicaiton conditions for this algorithm has been given in this paper. Simulation results show that this post-processing algorithm satisfies the reliable and secure communication conditions well.
Funder
National Natural Science Foundation of China
National Key Research and Development Program of China
Science and Technology Project of Guang
Project of Guangzhou Industry Leading Talents
Peng Cheng Laboratory Project of Guangdong Province
Fundamental Research Funds for the Central Universities
Science and Technology Project of Shenzhen
Publisher
Springer Science and Business Media LLC
Reference50 articles.
1. Lo, H.-K. A simple proof of the unconditional security of quantum key distribution. J. Phys. A: Math. Gen. 34, 6957 (2001).
2. Gottesman, D., Lo, H.-K., Lutkenhaus, N. & Preskill, J. Security of quantum key distribution with imperfect devices. In International Symposium on Information Theory, 2004. ISIT 2004. Proceedings, 136 ( IEEE, 2004).
3. Koashi, M. Simple security proof of quantum key distribution based on complementarity. New J. Phys. 11, 045018 (2009).
4. Molotkov, S. N. & Nazin, S. S. A simple proof of unconditional security of relativistic quantum cryptography. J. Exp. Theor. Phys. 92, 871–878 (2001).
5. Leverrier, A. & Grangier, P. Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 102, 180504 (2009).
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献