Causes of bit error and error correction for quantum key distribution protocols

被引:0
作者
Fang, Rushui [1 ]
Nikulin, Vladimir V. [1 ]
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Vestal, NY 13902 USA
来源
QUANTUM NANOPHOTONIC MATERIALS, DEVICES, AND SYSTEMS 2019 | 2019年 / 11091卷
关键词
quantum key distribution; bit error rate; low-density parity check matrix;
D O I
10.1117/12.2527763
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
Quantum key distribution protocols (QKD) identify eavesdroppers on quantum channel based on laws of quantum mechanics. In the original BB84 protocol, unauthorized measurements on qubits are discovered after Alice and Bob sacrifice some random resulting key bits as a test and find out a mismatch rate. Decoy state protocol alerts photon number splitting attack when the decoy multiphoton pulses deliberately positioned by Alice are registered abnormally higher at Bob's detectors than the single photon pulses are. E91 protocol is the first QKD protocol that ever brought about entangled atoms. Based on Bell's theorem, a probability coefficient is constrained within a fixed range under the circumstances of interception. While in practice, bit error rate (BER) is not necessarily associated with vicious eavesdropping. Detection inefficiency, transmission loss, imperfect entanglement sources and many other factors contribute as false alarms. Error correction is an essential post-processing procedure to tolerate implementation limits, yet secure the accuracy of the transmitted key. Quantifying third party contaminations also helps setting an optimal BER threshold to decide if one should abandon all previous communications. In this work, we summarize major causes of bit error in various practical QKD protocols mentioned above and study whether error correction models, such as low-density parity-check code (LDPC), perform accordingly to different kinds of errors.
引用
收藏
页数:9
相关论文
共 15 条
  • [1] Bennett C., 1984, INT C COMP SYST SIGN
  • [2] Bennett C., 1992, PHYS REV LETT, V68
  • [3] Benson O., 1999, Integrated Photonics Research
  • [4] Secure Quantum Key Distribution over 421 km of Optical Fiber
    Boaron, Alberto
    Boso, Gianluca
    Rusca, Davide
    Vulliez, Cedric
    Autebert, Claire
    Caloz, Misael
    Perrenoud, Matthieu
    Gras, Gaetan
    Bussieres, Felix
    Li, Ming-Jun
    Nolan, Daniel
    Martin, Anthony
    Zbinden, Hugo
    [J]. PHYSICAL REVIEW LETTERS, 2018, 121 (19)
  • [5] Limitations on practical quantum cryptography
    Brassard, G
    Lütkenhaus, N
    Mor, T
    Sanders, BC
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (06) : 1330 - 1333
  • [6] Plug-and-play measurement-device-independent quantum key distribution
    Choi, Yujun
    Kwon, Osung
    Woo, Minki
    Oh, Kyunghwan
    Han, Sang-Wook
    Kim, Yong-Su
    Moon, Sung
    [J]. PHYSICAL REVIEW A, 2016, 93 (03)
  • [7] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [8] Fan J., 2008, RES LETT COMMUNICATI, V2008, P4
  • [9] LOW-DENSITY PARITY-CHECK CODES
    GALLAGER, RG
    [J]. IRE TRANSACTIONS ON INFORMATION THEORY, 1962, 8 (01): : 21 - &
  • [10] Proof of security of quantum key distribution with two-way classical communications
    Gottesman, D
    Lo, HK
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) : 457 - 475