Method for carrying out Hamming error correction for error code in quantum secret key distribution postprocessing

A quantum key distribution and post-processing technology, applied in key distribution, can solve problems such as low error correction efficiency, abnormality, and reduction in the number of communication rounds, and achieve the effect of improving error correction efficiency

Active Publication Date: 2016-10-12
PEKING UNIV
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A third party trying to eavesdrop on the password has to measure it in some way, and those measurements introduce perceptible anomalies
The traditional Hamming code-based error correction protocol uses a fixed block length, resulting in low error correction efficiency, so the fixed block length algorithm exposes too many bits, and these exposures can actually be avoided
Therefore, the efficiency achieved by using fixed block length Hamming error correction is very low, and only a certain degree of reduction in the number of communication rounds

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out Hamming error correction for error code in quantum secret key distribution postprocessing
  • Method for carrying out Hamming error correction for error code in quantum secret key distribution postprocessing
  • Method for carrying out Hamming error correction for error code in quantum secret key distribution postprocessing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] This embodiment provides a method for error correction in post-processing of quantum key distribution, including the following steps:

[0036] Preprocessing stage: the data structure used in the implementation of the Winnow error correction protocol is as follows: image 3 shown. Among them, Sift_Data is an external interface that calls the winnow protocol, and it calls the start_winnow data structure to start winnow error correction. The Start_Winnow data structure calls the CommuData data structure for network transmission, and at the same time calls New_Winnow for the specific error correction process. New_Winnow calls the BitBuffer data structure to store complex data in the error correction process. This data structure was created to save bandwidth and time in the subsequent error correction process. Alice at the sending end and Bob at the receiving end store the first and second original keys obtained from the physical end of quantum key distribution connected ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for carrying out Hamming error correction for an error code in quantum secret key distribution postprocessing. The method is based on Hamming error correction, and employs variable secret key block lengths, i.e., employing different block lengths according to the difference of error rates. Moreover, different block lengths are employed in each error correction process. The selection of the block lengths can be obtained through the advanced calculation and assessment. According to the technical scheme of the invention, the method improves the error correction efficiency of a Hamming error correction protocol.

Description

technical field [0001] The invention relates to the technical field of quantum key distribution, in particular to a method for performing Hamming error correction on code errors in post-processing of quantum key distribution. Background technique [0002] Quantum cryptography, also known as quantum key distribution, or QKD for short in English, uses the properties of quantum mechanics to ensure communication security. It enables communicating parties to generate and share a random, secure key to encrypt and decrypt messages. [0003] One of the most important properties of quantum cryptography is that if a third party tries to eavesdrop on the cipher, both communicating parties will be aware. This property is based on a fundamental principle of quantum mechanics: Any measurement of a quantum system creates a disturbance in the system. For a third party to attempt to eavesdrop on a password, it must be measured in some way, and those measurements will introduce perceptible ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 郭弘彭翔刘田
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products