Share This Article:

Toward Efficient Quantum Key Distribution Reconciliation

Abstract Full-Text HTML Download Download as PDF (Size:1780KB) PP. 117-128
DOI: 10.4236/jqis.2014.42013    3,054 Downloads   3,922 Views   Citations

ABSTRACT

In this paper, we propose how to construct a reconciliation method for the BB84 Quantum Key Distribution (QKD) protocol. Theoretically, it is unconditionally secure because it is based on the quantum laws of physics, rather than the assumed computational complexity of mathematical problems. BB84 protocol performances can be reduced by various errors and information leakages such as limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping. The proposed reconciliation method allowed to weed out these errors by using Turbo codes. Since their high error correction capability implies getting low errors, this method has high performance especially when compared to the last method presented in the literature based on Low-Density Parity Check codes (LDPC). In particular, we demonstrate that our method leads to a significant improvement of the protocol security and of the Bit Error Rate (BER) even with great eavesdropping capability.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Benletaief, N. , Rezig, H. and Bouallegue, A. (2014) Toward Efficient Quantum Key Distribution Reconciliation. Journal of Quantum Information Science, 4, 117-128. doi: 10.4236/jqis.2014.42013.

References

[1] Bennett, C.H. and Brassard, G. (1984) Quantum Cryptography: Public Key Distribution and Coin Tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 175.
[2] Mayers, D. (2001) Unconditional Security in Quantum Cryptography. Journal of the ACM, 48, 351-406.
http://dx.doi.org/10.1145/382780.382781
[3] Shor, P.W. and Preskill, J. (2000) Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Physical Review Letters, 85, 441-444.
http://dx.doi.org/10.1103/PhysRevLett.85.441
[4] Benletaief, N., Rezig, H. and Bouallegue, A. (2011) Reconciliation for Practical Quantum Key. Mediterranean Microwave Symposium (MMS), Hammamet, 8-10 September 2011, 219-222.
[5] Kuritsyn, K. (2003) Modification of Error Reconciliation Scheme for Quantum Cryptography. Proceedings of SPIE, 5128, 91-92.
http://dx.doi.org/10.1117/12.517879
[6] Brassard, G. and Salvail, L. (1994) Secret-Key Reconciliation by Public Discussion. Proceedings of Eurocypt’93, 765, 410-423.
[7] Buttler, W.T., Lamoreaux, S.K. and Torgerson, J.R. (2003) Fast, Efficient Error Reconciliation for Quantum Cryptography. Physical Review Letters, 67, 1-8.
[8] Van Assche, G., Cardinal, J. and Cerf, N.J. (2004) Reconciliation of a Quantum-Distributed Gaussian Key. IEEE Transactions on Information Theory, 50, 394-400.
[9] Assche, G.V. (2005) Information-Theoretic Aspects of Quantum Key Distribution. PhD, Université Libre de Bruxelles, Brussels.
[10] Bloch, M., Thangaraj, A. and McLaughlin, S.W. (2005) Efficient Reconciliation of Correlated Continuous Random Variables Using LDPC Codes. CoRR.
[11] Leverrier, A., Alleaume, R., Boutros, J., Zemor, G. and Grangier, P. (2008) Multidimensional Reconciliation for Continuous-Variable Quantum Key Distribution. Physical Review A, 77, 42-50.
http://dx.doi.org/10.1103/PhysRevA.77.042325
[12] Elkouss, D., Martinez, J., Lancho, D. and Martin, V. (2010) Rate Compatible Protocol for Information Reconciliation: An Application to QKD. Information Theory Workshop (ITW), Cairo, 6-8 January 2010, 1-5.
[13] Gallager, R.G. (1962) Low-Density Parity-Check Codes. MIT Press, Cambridge. Preliminary Version in IRE Transactions on Information Theory, 8, 21-28.
[14] Tanner, R.M. (1981) A Recursive Approach to Low Complexity Codes. IEEE Transactions on Information Theory, 27, 533-547.
http://dx.doi.org/10.1109/TIT.1981.1056404
[15] Berrou, C., Glavieux, A. and Thitimajshima, P. (1993) Near Shannon Limit Error-Correctiong Coding and Decoding: Turbo-Codes. Proceedings of International Conference on Communications, Geneva, 23-26 May 1993, 1064-1070.
[16] Ben Slimen, I., Trabelsi, O., Rezig, H., Bouallegue, R. and Bouallegue, A. (2007) Stop Conditions of BB84 Protocol via a Depolarizing Channel. Journal of Computational Science, 6, 424-429.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.