2020
DOI: 10.1007/s11128-020-02853-9
|View full text |Cite
|
Sign up to set email alerts
|

Novel reconciliation protocol based on spinal code for continuous-variable quantum key distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…Error correcting codes (ECC) [10] are a major mathematical tool used in the IR step [5,6,8,[11][12][13][14][15][16] to overcome the transmission noise in the raw key generation step and ensure that Alice and Bob arrive at an identical sequence of symbols. Any information leaked to Eve during the IR step must be subtracted from the final secret key during privacy amplification [17,18].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Error correcting codes (ECC) [10] are a major mathematical tool used in the IR step [5,6,8,[11][12][13][14][15][16] to overcome the transmission noise in the raw key generation step and ensure that Alice and Bob arrive at an identical sequence of symbols. Any information leaked to Eve during the IR step must be subtracted from the final secret key during privacy amplification [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…Apart from the above techniques of IR in ET-QKD systems, various other ECC techniques have been used for IR, however, in the continuous-variable (CV) QKD setting [23]. For example, spatially-coupled (SC) LDPC codes [11], irregular repeat accumulate (IRA) and SC-IRA codes [12], polar codes [13,14], and spinal codes [15] have been used for CV-QKD. However, these techniques involve a different method of IR compared to that used in ET-QKD and hence are not applicable for IR considered in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…Owing to the physical noises or the existence of Eve [17] in a quantum channel, the raw data of the legitimate parties obtained from the first phase are weakly correlated and weakly secure continuous variables. To extract identical secret keys from their raw data, Alice and Bob subsequently perform a phase called post-processing including four main stages: sifting, parameter estimation [18]- [20], reconciliation [21]- [25], and privacy amplification [26]- [28]. Reconciliation is a crucial stage for CV-QKD, which allows the legitimate parties to distill the corrected keys from their raw data via an authentic classical channel.…”
Section: Introductionmentioning
confidence: 99%