An efficient hybrid hash based privacy amplification algorithm for quantum key distribution

نویسندگان

چکیده

Privacy amplification (PA) is an essential part in a quantum key distribution (QKD) system, distilling highly secure from partially string by public negotiation between two parties. The optimization objectives of privacy for QKD are large block size, high throughput and low cost. For the global these objectives, novel algorithm proposed this paper combining multilinear-modular-hashing modular arithmetic hashing. This proves security hybrid hashing PA within framework both information theory composition theory. A scheme based on implemented evaluated CPU platform. results typical CV-QKD system indicate that ( $$261\,\mathrm{Mbps}@2.6\times 10^8$$ input size) twice higher than best existing $$140\,\mathrm{Mbps}@1\times size). Moreover, mobile platform instead desktop or server CPU, which means has better performance with much lower cost power consumption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution sy...

متن کامل

Using Hash-Based Signatures to Bootstrap Quantum Key Distribution

Quantum Key Distribution is a secret distribution technique that requires an authenticated channel. This channel is usually created on top of an un-authenticated communication medium using unconditionally secure Message Authentication Codes (MAC) and an initial common secret. We examine the consequences of replacing this MAC algorithm by a cryptographic hash-based signature algorithm, like the ...

متن کامل

Efficient Quantum Key Distribution

We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in ...

متن کامل

An Efficient Hash-Based Algorithm for Sequence Data Searching

In real life, data collected day by day often appear in sequences and this type of data is called sequence data. The technique of searching for similar patterns among sequence data is very important in many applications. We first point out that there are some deficiencies in the existing definitions of sequence similarity. We then introduce a definition of sequence similarity based on the shape...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantum Information Processing

سال: 2022

ISSN: ['1573-1332', '1570-0755']

DOI: https://doi.org/10.1007/s11128-022-03462-4