Improved key-reconciliation method
نویسندگان
چکیده
In [1], Peikert proposed efficient and practical lattice-based protocols for key transport, encryption and authenticated key exchange. One of the main technical innovations of [1] is a reconciliation technique that allows two parties who ”approximately agree” on a secret value to reach exact agreement, a setting common to essentially all lattice-based encryption schemes. In [1], this reconciliation technique was described for reaching agreement on a single bit. Peikert’s reconciliation technique has been extended in [2], allowing for agreement on more than one bit. In both cases, only one reconciliation bit is required to reach exact agreement. As symmetric keys typically require many bits, say 128 or more, the parties compute multiple secret values, and reach exact agreement on each of those values individually. In this paper, we propose a reconciliation method that sends more than one reconciliation bit. In this way, the parties can agree on the same number of bits as with Peikert’s method with less stringent conditions on ”how approximate” the approximate agreement must be. Allowing for less stringent conditions on the approximate agreement improves security of the system. Alternatively, with virtually the same approximation requirements (i.e., with virtually the same security guarantees), an instance of our method allows the two parties to agree on one a secret value that is one bit longer than with the method from [2]. We numerically illustrate the advantages of our method with the impact to the recommended schemes in [2].
منابع مشابه
Scalar Reconciliation for Gaussian Modulation of Two-Way Continuous-Variable Quantum Key Distribution
The two-way continuous-variable quantum key distribution (CVQKD) systems allow higher key rates and improved transmission distances over standard telecommunication networks in comparison to the one-way CVQKD protocols. To exploit the real potential of two-way CVQKD systems a robust reconciliation technique is needed. It is currently unavailable, which makes it impossible to reach the real perfo...
متن کاملLong-Distance Continuous-Variable Quantum Key Distribution with Advanced Reconciliation of a Gaussian Modulation
The two-way continuous-variable quantum key distribution (CVQKD) systems allow higher key rates and improved transmission distances over standard telecommunication networks in comparison to the one-way CVQKD protocols. To exploit the real potential of two-way CVQKD systems a robust reconciliation technique is needed. It is currently unavailable, which makes it impossible to reach the real perfo...
متن کاملLong Distance Continuous-Variable Quantum Key Distribution with a Gaussian Modulation
We designed high-efficiency error correcting codes allowing to extract an errorless secret key in a Continuous-Variable Quantum Key Distribution (CVQKD) protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signalto-noise ratios on an Additive White Gaussian Noise Channel (AWGNC) with a binary modulation and can be combin...
متن کاملEfficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes
This paper investigates an efficient and practical information reconciliation method in the case where two parties have access to correlated continuous random variables. We show that reconciliation is a special case of channel coding and that existing coded modulation techniques can be adapted for reconciliation. We describe an explicit reconciliation method based on LDPC codes in the case of c...
متن کاملComparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol
Error reconciliation is an important technique for Learning With Error (LWE) and RingLWE (RLWE)-based constructions. In this paper, we present a comparison analysis on two error reconciliation-based RLWE key exchange protocols: Ding et al. in 2012 (DING12) and Bos et al. in 2015 (BCNS15). We take them as examples to explain core idea of error reconciliation, building key exchange over RLWE prob...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017