Your browser doesn't support javascript.
loading
Improved polar-code-based efficient post-processing algorithm for quantum key distribution.
Fang, Junbin; Yi, Zhengzhong; Li, Jin; Liang, Zhipeng; Wu, Yulin; Lei, Wen; Jiang, Zoe Lin; Wang, Xuan.
Afiliação
  • Fang J; Department of Optoelectronic Engineering, Jinan University, Guangzhou, 510632, China.
  • Yi Z; Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, 518055, China.
  • Li J; School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, 518055, China.
  • Liang Z; Department of Optoelectronic Engineering, Jinan University, Guangzhou, 510632, China.
  • Wu Y; School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, 518055, China.
  • Lei W; School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, 518055, China.
  • Jiang ZL; Department of Optoelectronic Engineering, Jinan University, Guangzhou, 510632, China.
  • Wang X; School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Shenzhen, 518055, China. zoeljiang@hit.edu.cn.
Sci Rep ; 12(1): 10155, 2022 Jun 16.
Article em En | MEDLINE | ID: mdl-35710795
Combined with one-time pad encryption scheme, quantum key distribution guarantees the unconditional security of communication in theory. However, error correction and privacy amplification in the post-processing phase of quantum key distribution result in high time delay, which limits the final secret key generation rate and the practicability of quantum key distribution systems. To alleviate this limitation, this paper proposes an efficient post-processing algorithm based on polar codes for quantum key distribution. In this algorithm, by analyzing the channel capacity of the main channel and the wiretap channel respectively under the Wyner's wiretap channel model, we design a codeword structure of polar codes, so that the error correction and privacy amplification could be completed synchronously in a single step. Through combining error correction and privacy amplification into one single step, this efficient post-processing algorithm reduces complexity of the system and lower the post-processing delay. Besides, the reliable and secure communicaiton conditions for this algorithm has been given in this paper. Simulation results show that this post-processing algorithm satisfies the reliable and secure communication conditions well.

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Tipo de estudo: Prognostic_studies Idioma: En Ano de publicação: 2022 Tipo de documento: Article

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Tipo de estudo: Prognostic_studies Idioma: En Ano de publicação: 2022 Tipo de documento: Article