Beyond the Limits of Shannon’s Information in Quantum Key Distribution
نویسندگان
چکیده
We present a new post-processing method for Quantum Key Distribution (QKD) that raises cubically the secret key rate in number of double matching detection events. In Shannon’s communication model, information is prepared at Alice’s side, and it then intended to pass over noisy channel. our approach, bits do not rely transmitted quantum but Bob’s basis measurement choices. Therefore, measured are publicly revealed, while bases selections remain secret. Our implements sifting, reconciliation, amplification unique process, just requires round iteration; no redundancy sent, there limit correctable error percentage. Moreover, this can be implemented as software into QKD technologies already use.
منابع مشابه
Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation, secure twoand multi-party computation and delegated quantum computation. Quantum cryptography also st...
متن کاملFundamental Finite Key Limits for One-Way Information Reconciliation in Quantum Key Distribution
The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount...
متن کاملQuantum Authenticated Key Distribution
Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomonaco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for qu...
متن کاملQuantum Key Distribution - QKD
This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature. In particular this paper describes the BB84 protocol and its many variants as well as Eckert's approach thro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Entropy
سال: 2021
ISSN: ['1099-4300']
DOI: https://doi.org/10.3390/e23020229