Efficient bit sifting scheme of post-processing in quantum key distribution

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Key Distribution Without Sifting

We propose a novel quantum key distribution protocol that uses AES to expand an initial secret, allowing us to individually authenticate every qubit, with tags that are efficient to construct. In exchange for an increase in the amount of classical data to be transmitted, the tags can be handled such that they allow secure key generation from two photon states, and make BB84 exactly 100% efficie...

متن کامل

Sifting problems in finite-size quantum key distribution Extended Abstract

Quantum key distribution (QKD) allows for unconditionally secure communication between two parties (Alice and Bob). A recent breakthrough in the theory of QKD is the treatment of finite-key scenarios, pioneered by Renner and collaborators (see [1], for example). This has made QKD theory practically relevant, since the asymptotic regime associated with infinitely many exchanged quantum signals i...

متن کامل

Efficient Quantum Key Distribution

We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in ...

متن کامل

Efficient quantum key distribution scheme with nonmaximally entangled states

We propose an efficient quantum key distribution scheme based on entanglement. The sender chooses pairs of photons in one of the two equivalent nonmaximally entangled states randomly, and sends a sequence of photons from each pair to the receiver. They choose from the various bases independently but with substantially different probabilities, thus reducing the fraction of discarded data, and a ...

متن کامل

Post-processing procedure for industrial quantum key distribution systems

We present algorithmic solutions aimed on post-processing for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of a classical public communication channel is also considered.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantum Information Processing

سال: 2015

ISSN: 1570-0755,1573-1332

DOI: 10.1007/s11128-015-1035-8