High-Speed Implementation of Length-Compatible Privacy Amplification in Continuous-Variable Quantum Key Distribution

Privacy amplification is an indispensable step in postprocessing of continuous-variable quantum key distribution (CV-QKD), which is used to distill unconditional secure keys from identical corrected keys between two distant legal parties. The processing speed of privacy amplification has a significant effect on the secret key rate of a CV-QKD system. We report the high-speed parallel implementation of the length-compatible privacy amplification algorithm based on a graphic processing unit. The length-compatible algorithm is used to satisfy the security requirements of privacy amplification at different transmission distances when considering finite-size effect. We achieve the speed of privacy amplification over 1 Gb/s at arbitrary input length and the speed is one to two orders of magnitude faster than previous demonstrations, which supports the high-speed real-time CV-QKD system and ensures the security of privacy amplification.

[1]  Jean Cardinal,et al.  Reconciliation of a quantum-distributed Gaussian key , 2001, IEEE Transactions on Information Theory.

[2]  Eleni Diamanti,et al.  Experimental demonstration of long-distance continuous-variable quantum key distribution , 2012, Nature Photonics.

[3]  Wanyi Gu,et al.  Continuous-variable measurement-device-independent quantum key distribution using squeezed states , 2014, 1406.0973.

[4]  S. McLaughlin,et al.  Quantum key distribution over 25 km with an all-fiber continuous-variable system , 2007, 0706.4255.

[5]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[6]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[7]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[8]  Song Yu,et al.  Finite-size analysis of continuous-variable measurement-device-independent quantum key distribution , 2017 .

[9]  Hugo Krawczyk,et al.  LFSR-based Hashing and Authentication , 1994, CRYPTO.

[10]  Stefano Pirandola,et al.  High-rate measurement-device-independent quantum cryptography , 2013, Nature Photonics.

[11]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[12]  Sébastien Kunz-Jacques,et al.  Long Distance Continuous-Variable Quantum Key Distribution with a Gaussian Modulation , 2011, Physical Review A.

[13]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[14]  T. Richardson,et al.  Multi-Edge Type LDPC Codes , 2004 .

[15]  Shen-Shen Yang,et al.  FPGA-Based Implementation of Size-Adaptive Privacy Amplification in Quantum Key Distribution , 2017, IEEE Photonics Journal.

[16]  Eleni Diamanti,et al.  Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations , 2015, Entropy.

[17]  Christian Weedbrook,et al.  Quantum cryptography without switching. , 2004, Physical review letters.

[18]  E. Diamanti,et al.  Analysis of Imperfections in Practical Continuous-Variable Quantum Key Distribution , 2012, 1206.6357.

[19]  Xiang Peng,et al.  Continuous-variable measurement-device-independent quantum key distribution with imperfect detectors , 2014, CLEO 2014.

[20]  Chen Wei,et al.  Fast implementation of length-adaptive privacy amplification in quantum key distribution , 2014 .

[21]  Hong Guo,et al.  High speed error correction for continuous-variable quantum key distribution with multi-edge type LDPC code , 2017, Scientific Reports.

[22]  Mei Li,et al.  Continuous-variable QKD over 50 km commercial fiber , 2017, Quantum Science and Technology.

[23]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[24]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[25]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[26]  Xiangyu Wang,et al.  Computing quopit Clifford circuit amplitudes by the sum-over-paths technique , 2016, Quantum Inf. Comput..

[27]  P. Grangier,et al.  Finite-size analysis of a continuous-variable quantum key distribution , 2010, 1005.0339.

[28]  Douglas R Stinson,et al.  Universal hash families and the leftover hash lemma, and applications to cryptography and computing , 2010 .

[29]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[30]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.