Information reconciliation for quantum key distribution

Quantum key distribution (QKD) relies on quantum and classical procedures in orderto achieve the growing of a secret random string --the key-- known only to the twoparties executing the protocol. Limited intrinsic efficiency of the protocol, imperfectdevices and eavesdropping produce errors and information leakage from which the set ofmeasured signals --the raw key-- must be stripped in order to distill a final, informationtheoretically secure, key. The key distillation process is a classical one in which basisreconciliation, error correction and privacy amplification protocols are applied to the rawkey. This cleaning process is known as information reconciliation and must be done in afast and efficient way to avoid cramping the performance of the QKD system. Brassardand Salvail proposed a very simple and elegant protocol to reconcile keys in the secret-key agreement context, known as Cascade, that has become the de-facto standard for allQKD practical implementations. However, it is highly interactive, requiring many com-munications between the legitimate parties and its efficiency is not optimal, imposing anearly limit to the maximum tolerable error rate. In this paper we describe a low-densityparity-check reconciliation protocol that improves significantly on these problems. Theprotocol exhibits better efficiency and limits the number of uses of the communicationschannel. It is also able to adapt to different error rates while remaining efficient, thusreaching longer distances or higher secure key rate for a given QKD system.

[1]  Marten van Dijk,et al.  A Practical Protocol for Advantage Distillation and Information Reconciliation , 2003, Des. Codes Cryptogr..

[2]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[3]  V. Scarani,et al.  Fast and simple one-way quantum key distribution , 2005, quant-ph/0506097.

[4]  Chip Elliott,et al.  Current status of the DARPA quantum network (Invited Paper) , 2005, SPIE Defense + Commercial Sensing.

[5]  Steven W. McLaughlin,et al.  Rate-compatible puncturing of low-density parity-check codes , 2004, IEEE Transactions on Information Theory.

[6]  David Elkouss,et al.  Interactive reconciliation with low-density parity-check codes , 2010, 2010 6th International Symposium on Turbo Codes & Iterative Information Processing.

[7]  E. Diamanti,et al.  Field test of a continuous-variable quantum key distribution prototype , 2008, 0812.3292.

[8]  Rüdiger L. Urbanke,et al.  The capacity of low-density parity-check codes under message-passing decoding , 2001, IEEE Trans. Inf. Theory.

[9]  G. Buller,et al.  Quantum key distribution system clocked at 2 GHz. , 2005, Optics express.

[10]  Nicolas Gisin,et al.  Quantum key distribution and 1 Gbps data encryption over a single fibre , 2009, 0912.1798.

[11]  Hoi-Kwong Lo,et al.  Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.

[12]  V. Scarani,et al.  Fast and simple one-way quantum key distribution , 2005, quant-ph/0506097.

[13]  David Elkouss,et al.  Efficient reconciliation protocol for discrete-variable quantum key distribution , 2009, 2009 IEEE International Symposium on Information Theory.

[14]  Gilles Van Assche,et al.  Quantum cryptography and secret-key distillation , 2006 .

[15]  David Elkouss,et al.  QKD in Standard Optical Telecommunications Networks , 2009, QuantumComm.

[16]  C. G. Peterson,et al.  Fast, efficient error reconciliation for quantum cryptography , 2002, quant-ph/0203096.

[17]  T. Sugimoto,et al.  A Study on Secret key Reconciliation Protocol "Cascade" , 2000 .

[18]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.

[19]  XuDong Qian,et al.  Auto-adaptive interval selection algorithm for quantum key distribution , 2009, Quantum Inf. Comput..

[20]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[21]  Shlomo Shamai,et al.  Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.

[22]  James F. Dynes,et al.  Practical gigahertz quantum key distribution based on avalanche photodiodes , 2009 .

[23]  Aaron D. Wyner,et al.  Recent results in the Shannon theory , 1974, IEEE Trans. Inf. Theory.

[24]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[25]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[26]  Zixiang Xiong,et al.  Compression of binary sources with side information at the decoder using LDPC codes , 2002, IEEE Communications Letters.

[27]  Christopher R. Jones,et al.  Construction of Rate-Compatible LDPC Codes Utilizing Information Shortening and Parity Puncturing , 2005, EURASIP J. Wirel. Commun. Netw..

[28]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .

[29]  David Elkouss,et al.  Rate compatible protocol for information reconciliation: An application to QKD , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).

[30]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[31]  J. Dynes,et al.  Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate. , 2008, Optics express.

[32]  T. Ralph,et al.  Continuous variable quantum cryptography , 1999, quant-ph/9907073.

[33]  Jesus Martinez Mateo,et al.  Improved Construction of Irregular Progressive Edge-Growth Tanner Graphs , 2010 .