2017
DOI: 10.48550/arxiv.1702.07740
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography

Mario Milicevic,
Chen Feng,
Lei M. Zhang
et al.

Abstract: The speed at which two remote parties can exchange secret keys over a fixed-length fiber-optic cable in continuousvariable quantum key distribution (CV-QKD) is currently limited by the computational complexity of post-processing algorithms for key reconciliation. Multi-edge low-density paritycheck (LDPC) codes with low code rates and long block lengths were proposed for CV-QKD, in order to extend the maximum reconciliation distance between the two remote parties. Key reconciliation over multiple dimensions has… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 79 publications
(180 reference statements)
0
11
0
Order By: Relevance
“…3 9 Even though System C is not a balanced-complexity system, there are practical scenarios, where having a balanced complexity is not imperative, such as in ground station to unmanned aerial vehicle (UVA) quantum communication [95], [96], etc. 10 As for handling decoding failures, it is assumed to be identical to that in the conventional LDPC-based reconciliation scheme of [66], which is based on the classic cyclic redundancy check. Specifically, the system opts for discarding the sifted keys, if decoding failure occurs.…”
Section: System D: the Proposed Practically Generic Schemementioning
confidence: 99%
“…3 9 Even though System C is not a balanced-complexity system, there are practical scenarios, where having a balanced complexity is not imperative, such as in ground station to unmanned aerial vehicle (UVA) quantum communication [95], [96], etc. 10 As for handling decoding failures, it is assumed to be identical to that in the conventional LDPC-based reconciliation scheme of [66], which is based on the classic cyclic redundancy check. Specifically, the system opts for discarding the sifted keys, if decoding failure occurs.…”
Section: System D: the Proposed Practically Generic Schemementioning
confidence: 99%
“…where the mutual informations are bounded by the results of parameter estimation. In our example we choose the conservative value β = 0.95 [34][35][36][37]. (Notice that in principle the factor β is a function of n and ǫ EC , but for the sake of illustration we assume it to be constant.…”
Section: Numerical Examplesmentioning
confidence: 99%
“…where ξ ≤ 1 quantifies the inefficiency of error correction and privacy amplification protocols [69][70][71] and I AB is Alice-Bob mutual information. This is given by…”
Section: B Key Ratementioning
confidence: 99%