2021
DOI: 10.3390/e23020229
|View full text |Cite
|
Sign up to set email alerts
|

Beyond the Limits of Shannon’s Information in Quantum Key Distribution

Abstract: We present a new post-processing method for Quantum Key Distribution (QKD) that raises cubically the secret key rate in the number of double matching detection events. In Shannon’s communication model, information is prepared at Alice’s side, and it is then intended to pass it over a noisy channel. In our approach, secret bits do not rely in Alice’s transmitted quantum bits but in Bob’s basis measurement choices. Therefore, measured bits are publicly revealed, while bases selections remain secret. Our method i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…Most of today's cryptosystems currently relying on integer factorization (Rivest et al, 1978) and discrete logarithms (ElGamal, 1985) will become obsolete because of the Shor algorithm (Shor, 1997). Given the quantum threats, there is an increasing trend toward developing new technologies known as quantum key distribution (QKD) (Bennett and Brassard, 1984;Center, 2021;Lizama-P´erez et al, 2021). Seven algorithms have been selected by NIST: four are public key cryptosystems and concern key establishment, and three are related to digital signature algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Most of today's cryptosystems currently relying on integer factorization (Rivest et al, 1978) and discrete logarithms (ElGamal, 1985) will become obsolete because of the Shor algorithm (Shor, 1997). Given the quantum threats, there is an increasing trend toward developing new technologies known as quantum key distribution (QKD) (Bennett and Brassard, 1984;Center, 2021;Lizama-P´erez et al, 2021). Seven algorithms have been selected by NIST: four are public key cryptosystems and concern key establishment, and three are related to digital signature algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…This situation could change drastically if the currently available QKD technology implements the frame-based error reconciliation algorithm, which allows operating on quantum channels that exhibit high error rates [14,15]. The first version of the frame-based reconciliation method exhibits a decrease in efficiency as the channel error rate increases, but the method is still functional when the rate is greater than 50% [16].…”
Section: Introductionmentioning
confidence: 99%
“…Shor's algorithm [2] solves the mathematical problems on which cryptography is supported: integer factorization and discrete logarithm. Although quantum principles have threatened the security of major cryptographic systems, they have raised a new technology known as quantum key distribution (QKD) that allows remote secret key establishment [3,4,5,6].…”
Section: Introductionmentioning
confidence: 99%