Multidimensional reconciliation for a continuous-variable quantum key distribution
read more
Citations
The security of practical quantum key distribution
Gaussian quantum information
Gaussian quantum information
Physical-Layer Security: From Information Theory to Security Engineering
Advances in quantum cryptography
References
A mathematical theory of communication
Quantum Computation and Quantum Information
Quantum Computation and Quantum Information
The wire-tap channel
Quantum Cryptography
Related Papers (5)
Frequently Asked Questions (14)
Q2. What can be done with a binary phase shift keying BPSK?
as LDPC codes and turbocodes can both be optimized for binary symmetric channels, they can also be optimized042325-3for a binary phase shift keying BPSK modulation, where the bit 0 1 is encoded into the amplitude +A −A and where the channel noise is considered to be additive white Gaussian noise AWGN .
Q3. What is the significance of the Gaussian distribution on Rn?
An interesting property of the Gaussian distribution N 0,1n on Rn whose covariance matrix is the identity is that it has a spherical symmetry in Rn.
Q4. What is the main bottleneck of the continuous-variable QKD?
the main bottleneck of the continuous-variable QKD lies in the impossibility for Alice and Bob to extract efficiently all the information available, this difficulty resulting in both a limited range and a limited rate for the key distribution.
Q5. What is the method for a QKD?
The method described inthis article is particularly well adapted for low signal-tonoise ratios, which is the situation encountered when one wants to perform a QKD over long distances.
Q6. What is the code for binary channels?
Some very good codes are known for binary channels: LDPC codes and turbocodes both almost achieve the Shannon limit and can be efficiently decoded thanks to iterative decoding algorithms.
Q7. What is the anticommutator of A and B?
B. Computation of M(x ,y)For n=2, 4, and 8, there exists a nonunique family of n orthogonal matrices An= A1 , . . . ,An of Rn n such that A1 =1n and, for i , j 1, Ai ,Aj =−2 i,j1n where A ,B is the anticommutator of A and B.
Q8. What is the way to convert binary codes into spherical codes?
There is indeed a canonical way to convert binary codes into binary spherical codes, and this can be achieved thanks to the following mapping of F2n onto an isomorphic image in the n-dimensional sphere:F2 n → Sn−1 Rn, b1, . . . ,bn − 1 b1 n , . . . , − 1 bnn .
Q9. What is the correlation between Alice and Bob?
At the end of the quantum part of the continuous-variable QKD protocol, Alice and Bob share correlated random values and their correlation depends on the variance of the modulation of the coherent states and on the properties of the quantum channel.
Q10. What is the effect of a rota-tion on QKD?
Now that the authors have explained how efficient reconciliation of correlated Gaussian variables can be achieved with rota-tions in R8, let us look at the implications for the continuousvariable QKD.
Q11. What is the secret key rate for the eavesdropper?
Note that it is conjectured that, as is the case for discrete-variable protocols 16 , coherent attacks are not more powerful than collective attacks 12,13,17 , which would imply that Kth is the secure key rate against the most general attacks allowed by quantum mechanics.
Q12. What is the optimum distance for the QKD protocol?
Both approaches achieve comparable reconciliation efficiencies around 90% , but for different R. One can observe two042325-5distinct regimes: for low loss—i.e., short distance—slice reconciliation is better, but only rotations in R8 allow QKD over longer distances over 50 km with the current experimental parameters .
Q13. What is the main difference between continuous and continuous QKD protocols?
spherical codes, codes for which all code words lie on a sphere centered on 0, can play the same role for continuous-variable protocols as binary codes for discrete protocols.
Q14. What is the way to reconcile Gaussian data?
It is not easy to know exactly how the efficiency of reconciliation depends on R. However, each reconciliation technique performs better for a certain range of R: slice reconciliation is usually used for a R around 3 23 while rotations in R8 are optimal for a low R, typically around 0.5.