2007
DOI: 10.1103/physreva.76.032312
|View full text |Cite
|
Sign up to set email alerts
|

Key rate of quantum key distribution with hashed two-way classical communication

Abstract: We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution ͑QKD͒ protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
56
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 48 publications
(57 citation statements)
references
References 34 publications
1
56
0
Order By: Relevance
“…As for the security of this poslselection approach as applied to a QKD system, no advantage is given to a potential attacker in the true single-photon regime, since the thresholding is nothing but a further sifting step on the received bits [21,23]. If the attacker tried to force Alice and Bob to postselect a particular bit, in fact, she would alter the probe signal before the disclosure of the preparation bases on the public channel, and, therefore, before she could actually know if her measured bit is correct.…”
Section: Realization Of the Arts Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…As for the security of this poslselection approach as applied to a QKD system, no advantage is given to a potential attacker in the true single-photon regime, since the thresholding is nothing but a further sifting step on the received bits [21,23]. If the attacker tried to force Alice and Bob to postselect a particular bit, in fact, she would alter the probe signal before the disclosure of the preparation bases on the public channel, and, therefore, before she could actually know if her measured bit is correct.…”
Section: Realization Of the Arts Methodsmentioning
confidence: 99%
“…[22] was proposed in Ref. [23]: parities for many pairs of bits are shared between Alice and Bob along the public channel. Those pairs with nonmatching parities are discarded, while the remaining ones (over which the QBER is lower) are syndrome decoded.…”
Section: Introductionmentioning
confidence: 99%
“…see [9,Section 2]). Note that we do not use the so-called noisy preprocessing [10], [11] nor the postprocessing with two-way classical communication [12], [13]. n (see [9]).…”
Section: A Stokes Parameterizationmentioning
confidence: 99%
“…The reason why we utilize the mismatched measurement outcomes is that the authors recently showed that the key generation rate is increased if we use the mismatched measurement outcomes [9]. In the postprocessing phase, we employ the standard postprocessing without the noisy preprocessing [10], [11] nor the two-way classical communication [12], [13].…”
Section: Introductionmentioning
confidence: 99%
“…We have chosen to restrict the channel to one-way communications since our focus is on practical protocols with reduced distillation complexity, network requirements, etc. However, it should be noted that two-way communications can be used to distill a key in scenarios where one-way secret key distillation is not possible [5] and, in general, the amount of a distillable secret key with two-way communications can be strictly higher than with one-way communications [22,23].…”
Section: A Impact Of Information Reconciliation On the Secret Key Lementioning
confidence: 99%