Abstract

We present algorithmic solutions aimed on post-processing procedure for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of classical public communication channel is also considered.

Highlights

  • Significant attention to quantum key distribution [1] is related to the fact of breaking of public-key encryption algorithms using quantum computing

  • We present algorithmic solutions aimed on post-processing for industrial quantum key distribution systems with hardware sifting

  • We present the developed post-processing procedure for sifted quantum keys, which consists of the following steps: error correction, parameter estimation, and privacy amplification

Read more

Summary

INTRODUCTION

Significant attention to quantum key distribution [1] is related to the fact of breaking of public-key encryption algorithms using quantum computing. Due to the technological limitations of quantum key distribution, keys of Alice and Bob are initially different even in the absence of eavesdropping Excluding of this effect can be realized by using error correction procedures. If QBER exceeds a critical value, the parties receive warning message about possible of eavesdropping In other cases, they use privacy amplification methods to exclude announced information on previous stages from keys. We present the developed post-processing procedure for sifted quantum keys (i.e., keys after basis and intensity reconciliations), which consists of the following steps: error correction, parameter estimation, and privacy amplification.

QUANTUM KEY DISTRIBUTION SETUP
Error correction
Parameter estimation
Privacy amplification
AUTHENTICATION
WORKFLOW
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call