Modification of error reconciliation scheme for quantum cryptography

Konstantin Kuritsyn
{"title":"Modification of error reconciliation scheme for quantum cryptography","authors":"Konstantin Kuritsyn","doi":"10.1117/12.517879","DOIUrl":null,"url":null,"abstract":"Quantum cryptography is essentially the quantum key distribution (QKD). In the context of QKD, one from two partners (Alice) generates and sends a sequence of qubits through a private quantum channel to another partner (Bob) and Bob receives the sequence and measures the state of each qubit. After the quantum transmission stage, Alice and Bob have almost identical qubit sequences. The erros are due to physical imperfections in the channel and presence of an eavesdropper. The next stage in QKD is key reconciliation (i.e. finding and correcting discrepancies between Alice's string and that of Bob). This reconciliation can be done by public discussion. Let us suppose there is a secret quantum channel between Alice and Bob through which Alice transmits a n-bit string A=(A1, A2,...,An)ε{0,1}n. Then Bob receives a n-bit string B=(B1, B2,...,Bn)ε{0,1)n. The string B differs from A due to the presence of noise and eavesdropper in the channel. One can estimate the bit error probability in the channel. For example, Bob can choose a random subset from his string and send it to Alice in public. Then Alice compares the received string with her corresponding subset and calculates the total number of protocol steps. The cascade scheme uses the interaction over the public channel to correct the secret strings by dividing them into the blocks of a fixed length. The length is determined from the bit error probability. A simple interactive routine is applied in each of these blocks. An error found in some block results in some action with other blocks. It is important to optimize the error-finding routines in standalone blocks as well as to organize the effective constrution of blocks with the object of protocol benchmark, information leakage and number of interactions between partners.","PeriodicalId":90714,"journal":{"name":"Quantum bio-informatics V : proceedings of the quantum bio-informatics 2011, Tokyo University of Science, Japan, 7-12 March 2011. Quantum Bio-Informatics (Conference) (5th : 2011 : Tokyo, Japan)","volume":"32 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2003-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum bio-informatics V : proceedings of the quantum bio-informatics 2011, Tokyo University of Science, Japan, 7-12 March 2011. Quantum Bio-Informatics (Conference) (5th : 2011 : Tokyo, Japan)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.517879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Quantum cryptography is essentially the quantum key distribution (QKD). In the context of QKD, one from two partners (Alice) generates and sends a sequence of qubits through a private quantum channel to another partner (Bob) and Bob receives the sequence and measures the state of each qubit. After the quantum transmission stage, Alice and Bob have almost identical qubit sequences. The erros are due to physical imperfections in the channel and presence of an eavesdropper. The next stage in QKD is key reconciliation (i.e. finding and correcting discrepancies between Alice's string and that of Bob). This reconciliation can be done by public discussion. Let us suppose there is a secret quantum channel between Alice and Bob through which Alice transmits a n-bit string A=(A1, A2,...,An)ε{0,1}n. Then Bob receives a n-bit string B=(B1, B2,...,Bn)ε{0,1)n. The string B differs from A due to the presence of noise and eavesdropper in the channel. One can estimate the bit error probability in the channel. For example, Bob can choose a random subset from his string and send it to Alice in public. Then Alice compares the received string with her corresponding subset and calculates the total number of protocol steps. The cascade scheme uses the interaction over the public channel to correct the secret strings by dividing them into the blocks of a fixed length. The length is determined from the bit error probability. A simple interactive routine is applied in each of these blocks. An error found in some block results in some action with other blocks. It is important to optimize the error-finding routines in standalone blocks as well as to organize the effective constrution of blocks with the object of protocol benchmark, information leakage and number of interactions between partners.
量子密码学错误和解方案的改进
量子密码学本质上是量子密钥分发(QKD)。在量子密钥分配的背景下,两个合作伙伴中的一个(Alice)通过私有量子通道生成并发送一个量子比特序列给另一个合作伙伴(Bob), Bob接收该序列并测量每个量子比特的状态。在量子传输阶段之后,Alice和Bob拥有几乎相同的量子比特序列。这些误差是由于信道中的物理缺陷和窃听者的存在造成的。QKD的下一个阶段是密钥调和(即发现并纠正Alice的字符串和Bob的字符串之间的差异)。这种和解可以通过公开讨论来实现。让我们假设在Alice和Bob之间存在一个秘密量子通道,Alice通过该通道传输一个n位字符串a =(A1, A2,…,An)ε{0,1}n。然后Bob收到一个n位字符串B=(B1, B2,…,Bn)ε{0,1)n。由于信道中存在噪声和窃听者,字符串B与A不同。可以估计信道中的误码概率。例如,Bob可以从他的字符串中选择一个随机子集,并将其公开发送给Alice。然后,Alice将接收到的字符串与相应的子集进行比较,并计算协议步骤的总数。级联方案通过公共通道上的交互将秘密字符串划分为固定长度的块来纠正秘密字符串。长度由误码概率决定。在每个块中应用一个简单的交互例程。在某些块中发现的错误会导致对其他块的某些操作。以协议基准、信息泄漏和伙伴之间的交互次数为目标,优化独立块中的错误查找例程,组织块的有效构造是非常重要的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信