Reverse reconciliation for continuous variable quantum key distribution

An efficient and practical post-processing technique based on reverse reconciliation for continuous variable quantum key distribution is proposed and simulated with low-density parity check (LDPC) codes. MultiLevel Coding/MultiStage Decoding, which fully utilizes optimization technique such as vector quantization and iterative decoding and the optimal channel coding most close to the Shannon limit, was used to realize efficient reverse reconciliation algorithm. Simulation results showed that the proposed method can improve the secure key distribution rate to 2.2 kb/s and the coding efficiency to 0.89 over 20 km in single-mode optical fiber. Moreover, there still is room for much improvement.

[1]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[2]  N. Cerf,et al.  Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. , 2006, Physical Review Letters.

[3]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[4]  Zixiang Xiong,et al.  Compression of binary sources with side information at the decoder using LDPC codes , 2002, IEEE Communications Letters.

[5]  J. Cirac,et al.  De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. , 2008, Physical review letters.

[6]  Jean Cardinal,et al.  Reconciliation of a quantum-distributed Gaussian key , 2001, IEEE Transactions on Information Theory.

[7]  N. Lutkenhaus,et al.  Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks , 2008, 0807.3751.

[8]  Andrew Thangaraj,et al.  LDPC-based Gaussian key reconciliation , 2006, 2006 IEEE Information Theory Workshop - ITW '06 Punta del Este.

[9]  S. McLaughlin,et al.  Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.

[10]  C. Elliott Building the quantum network* , 2002 .

[11]  Jin-Jian Chen,et al.  Computational Complexity of Continuous Variable Quantum Key Distribution , 2008, IEEE Transactions on Information Theory.

[12]  Robert F. H. Fischer,et al.  Multilevel codes: Theoretical concepts and practical design rules , 1999, IEEE Trans. Inf. Theory.

[13]  Zheng-Fu Han,et al.  Apply current exponential de Finetti theorem to realistic quantum key distribution , 2008, 0809.2683.

[14]  Rüdiger L. Urbanke,et al.  Design of capacity-approaching irregular low-density parity-check codes , 2001, IEEE Trans. Inf. Theory.

[15]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[16]  Claude E. Shannon,et al.  The mathematical theory of communication , 1950 .

[17]  Chuan Wang,et al.  Arbitrarily long distance quantum communication using inspection and power insertion , 2009 .

[18]  Peilin Hong,et al.  Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network , 2009, Science in China Series F: Information Sciences.