Abstract
We present algorithmic solutions aimed on post-processing procedure for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of classical public communication channel is also considered.
Highlights
Significant attention to quantum key distribution [1] is related to the fact of breaking of public-key encryption algorithms using quantum computing
We present algorithmic solutions aimed on post-processing for industrial quantum key distribution systems with hardware sifting
We present the developed post-processing procedure for sifted quantum keys, which consists of the following steps: error correction, parameter estimation, and privacy amplification
Summary
Significant attention to quantum key distribution [1] is related to the fact of breaking of public-key encryption algorithms using quantum computing. Due to the technological limitations of quantum key distribution, keys of Alice and Bob are initially different even in the absence of eavesdropping Excluding of this effect can be realized by using error correction procedures. If QBER exceeds a critical value, the parties receive warning message about possible of eavesdropping In other cases, they use privacy amplification methods to exclude announced information on previous stages from keys. We present the developed post-processing procedure for sifted quantum keys (i.e., keys after basis and intensity reconciliations), which consists of the following steps: error correction, parameter estimation, and privacy amplification.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have