Analysis of a rate-adaptive reconciliation protocol and the effect of the leakage on the secret key rate

Quantum key distribution performs the trick of growing a secret key in two distant places connected by a quantum channel. The main reason is so that the legitimate users can bound the information gathered by the eavesdropper. In practical systems, whether because of finite resources or external conditions, the quantum channel is subject to fluctuations. A rate-adaptive information reconciliation protocol, which adapts to the changes in the communication channel, is then required to minimize the leakage of information in the classical postprocessing. We consider here the leakage of a rate-adaptive information reconciliation protocol. The length of the exchanged messages is larger than that of an optimal protocol; however, we prove that the min-entropy reduction is limited. The simulation results, both in the asymptotic and in the finite-length regime, show that this protocol allows to increase the amount of a distillable secret key.

[1]  Shun Watanabe,et al.  Key rate of quantum key distribution with hashed two-way classical communication , 2007, 2007 IEEE International Symposium on Information Theory.

[2]  Robert G. Gallager,et al.  Claude E. Shannon: A retrospective on his life, work, and impact , 2001, IEEE Trans. Inf. Theory.

[3]  J. Neumann Mathematische grundlagen der Quantenmechanik , 1935 .

[4]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[5]  Physical Review , 1965, Nature.

[6]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[7]  M. Hayashi,et al.  Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths , 2011, 1107.0589.

[8]  Renato Renner,et al.  Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.

[9]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[10]  Sébastien Kunz-Jacques,et al.  Long Distance Continuous-Variable Quantum Key Distribution with a Gaussian Modulation , 2011, Physical Review A.

[11]  Rüdiger L. Urbanke,et al.  The capacity of low-density parity-check codes under message-passing decoding , 2001, IEEE Trans. Inf. Theory.

[12]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[13]  Marco Tomamichel,et al.  Duality Between Smooth Min- and Max-Entropies , 2009, IEEE Transactions on Information Theory.

[14]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[15]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[16]  Valerio Scarani,et al.  Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.

[17]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[18]  David P. DiVincenzo,et al.  Quantum information and computation , 2000, Nature.

[19]  Sergey Sorokin,et al.  Manifold cities: social variables of urban areas in the UK , 2018, Proceedings of the Royal Society A.

[20]  R. Renner,et al.  Uncertainty relation for smooth entropies. , 2010, Physical review letters.

[21]  L. Goddard Information Theory , 1962, Nature.

[22]  Xiongfeng Ma,et al.  Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.

[23]  H. Weinfurter,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[24]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[25]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[26]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[27]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[28]  Ueli Maurer,et al.  Small accessible quantum information does not imply security. , 2007, Physical review letters.

[29]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[30]  Shlomo Shamai,et al.  Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.

[31]  Mark F. Flanagan,et al.  International Symposium on Information Theory and its Applications (ISITA 2008) , 2008 .

[32]  Robert B. Ash,et al.  Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.

[33]  Hoi-Kwong Lo,et al.  Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.

[34]  Tor Helleseth,et al.  Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.

[35]  R. Stephenson A and V , 1962, The British journal of ophthalmology.