Reverse Reconciliation for Optimal Error Correction in Quantum Key Distribution
<p>The quantum states of the BB84 protocol and the two measurement bases <math display="inline"><semantics> <mi mathvariant="bold">X</mi> </semantics></math> and <math display="inline"><semantics> <mi mathvariant="bold">Z</mi> </semantics></math> are represented through the bi-dimensional Bloch sphere. A bit is encoded by means of a pair of non-orthogonal states.</p> "> Figure 2
<p>The pairs of quantum states are separated as orthogonal, non-orthogonal, and parallel states.</p> "> Figure 3
<p>The diagram shows the sifting strings (SSs) for the different instances at Bob’s side, which are represented as SS<math display="inline"><semantics> <msub> <mrow/> <mi>i</mi> </msub> </semantics></math> labels with <math display="inline"><semantics> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> <mo>…</mo> <mn>10</mn> </mrow> </semantics></math>. The resulting labels depend on the specific approach that is used, and they are shown in <a href="#symmetry-15-00710-t001" class="html-table">Table 1</a>.</p> "> Figure 4
<p>General QKD protocol based on XOR bits. The final step is for Alice and Bob to confirm that they have both set the same secret key because Alice sends the hash code of the distilled key to Bob and obtains a positive confirmation from him.</p> "> Figure 5
<p>An example of the labels contained in the lists <math display="inline"><semantics> <mrow> <msub> <mi>L</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo stretchy="false">{</mo> <mrow> <mo>[</mo> <msub> <mi>ϵ</mi> <mn>11</mn> </msub> <mo>,</mo> <msub> <mi>ϵ</mi> <mn>12</mn> </msub> <mo>]</mo> </mrow> <mo>,</mo> <mrow> <mo>[</mo> <msub> <mi>π</mi> <mn>11</mn> </msub> <mo>,</mo> <msub> <mi>π</mi> <mn>12</mn> </msub> <mo>]</mo> </mrow> <mo stretchy="false">}</mo> </mrow> <mo>,</mo> <mrow> <mo stretchy="false">{</mo> <mrow> <mo>[</mo> <msub> <mi>π</mi> <mn>21</mn> </msub> <mo>,</mo> <msub> <mi>π</mi> <mn>22</mn> </msub> <mo>]</mo> </mrow> <mo>,</mo> <mrow> <mo>[</mo> <msub> <mi>ϵ</mi> <mn>21</mn> </msub> <mo>,</mo> <msub> <mi>ϵ</mi> <mn>22</mn> </msub> <mo>]</mo> </mrow> <mo stretchy="false">}</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>L</mi> <mn>2</mn> </msub> <mo>=</mo> <mrow> <mo stretchy="false">{</mo> <mrow> <mo>[</mo> <msub> <mi>ϵ</mi> <mn>11</mn> </msub> <mo>,</mo> <msub> <mi>ϵ</mi> <mn>12</mn> </msub> <mo>]</mo> </mrow> <mo>,</mo> <mrow> <mo>[</mo> <msub> <mi>ϵ</mi> <mn>21</mn> </msub> <mo>,</mo> <msub> <mi>ϵ</mi> <mn>22</mn> </msub> <mo>]</mo> </mrow> <mo stretchy="false">}</mo> </mrow> <mo>,</mo> <mrow> <mo stretchy="false">{</mo> <mrow> <mo>[</mo> <msub> <mi>π</mi> <mn>11</mn> </msub> <mo>,</mo> <msub> <mi>π</mi> <mn>12</mn> </msub> <mo>]</mo> </mrow> <mo>,</mo> <mrow> <mo>[</mo> <msub> <mi>π</mi> <mn>21</mn> </msub> <mo>,</mo> <msub> <mi>π</mi> <mn>22</mn> </msub> <mo>]</mo> </mrow> <mo stretchy="false">}</mo> </mrow> </mrow> </semantics></math>. At the bottom of each frame, we have written the XOR bits.</p> "> Figure 6
<p>There are four configurations for T.1: the inputs are written in the left-hand corners (<b>top</b>, <b>bottom</b>), while the test cases appear in the right-hand corners. The implicit SSs are written above the arrows. The (<b>c</b>,<b>d</b>) configurations are just the reflection of the (<b>a</b>,<b>b</b>) ones, respectively.</p> ">
Abstract
:1. Introduction
- Alice prepares and sends a message to Bob adding redundant information. Then, with the help of the auxiliary information, he seeks to recover the original message by identifying and correcting the errors in the message. This is the approach of correction methods used in telecommunications such as turbo codes and LDPC.
- Alice seeks to establish a key of random bits with Bob, i.e., there is no predefined message, then Alice must identify the bits that Bob has obtained after quantum pulses were transferred over the quantum channel and errors have occurred.
- To avoid the waste of frames, the inverse of the measured bits is used instead of the measured bits, that is the conjugated bits [27].
- In this new approach, we only used the sifting bits of those frames that produce unitary results, since, as we will see, they are more visible from Alice’s point of view.
1.1. BB84
1.2. Pairs of Quantum States
2. Security of Frame-Based Reconciliation Methods
2.1. Clarifications about the Symbology Used
- —
- , , , and are examples of quantum states where the upper index denotes the sequence number in which it was transmitted from Alice to Bob. As can be seen, we did not use the quantum ket notation, but rather, bold letters, in order to facilitate the discussion about the reconciliation methods. When necessary, we changed the numerical label, representing it as follows , so states look like , , , and . At Bob’s side, the received states, also called the detection events, are written as , , , and . Furthermore, depending on the specific context, the upper index could be omitted (in the case that the index would not be strictly necessary), or it could consist of two sequence numbers to refer to a double-matching detection event.
- —
- is a double-matching detection event at Bob’s side: in this example, two detection events with the basis that produced . We write between rectangular brackets the sequential numerical indices of such events, which in this case are , where the position of the labels between brackets does not matter. However, in a double-matching detection event, we write the basis to the left as and the basis to the right as .
- —
- is a frame at Alice’s side. In fact, it corresponds to the frame , one of the 16 possible frames (for the complete list of frames, please see [27]). We commonly represent the frames in the form of a matrix, with the purpose of facilitating the visualization of the sifting bits (SSs) or the measurement results (MRs). However, when it comes to discussing the reconciliation methods, we used the notation introduced here. For a useful reference, consider that because and are symmetrically equivalent.
- —
- is a frame at Bob’s side (also referred to as an instance) denoting two double-matching detection events, where and are the corresponding sequential numerical indices of such events. Provided this frame comes from Alice’s , it implies that , , , and . From the numerical labels, we could establish that Alice sends ; Bob measures them as ; then, during reconciliation, Alice represents them as . The last expression makes sense, because as we will see later, our algorithms focus on bits equal to one.
2.2. The Sifting String
- —
- Measured bits: The bits detected at Bob’s optical station must be appended, so SS= sifting bits measured bits. It should be noted that the secret bits are derived from the geometric arrangement (MR) of the bits within Bob’s frame, rather than the bits themselves obtained from the detection bases.
- —
- Conjugate bits: The inverted bits of the measured bits are added, so SS= sifting bits conjugate bits. The purpose of the conjugate bits is to detect errors where is detected as or as , which cannot be detected using the measured bits.
- —
- XOR bits: This will be detailed in this work and does not require additional bits.
2.3. Problem Statement
2.4. Security of the Measured-Bit Approach
2.5. Security of the Conjugate Bit Approach
3. Frame Reconciliation with XOR Bits
3.1. General QKD Protocol
- Alice sends the collection of quantum states to Bob, where the bold symbols denote the quantum states, while are Alice’s sequential numerical indices of the transmitted quantum states, whose record is kept at her side. Of course, due to the noise and losses of the quantum channel, of the states sent, not all the states arrive at Bob’s station and not all the ones that arrive are free of error.
- Bob measures each received state applying randomly the quantum basis or . Bob obtains the distribution , where are the sequential numerical indices of the quantum measurements at Bob’s side. We write to denote Bob’s sequential numerical indices of two states measured by him with the basis in which both measurements yield , then we represent it symbolically as the event , where . In addition, we define the event of two quantum measurements that produces as , where are the sequential numerical indices of the two measurements and .A double-matching detection event as described before can be generated from a pair of non-orthogonal states, a pair of parallel states, or as a result of one or two errors in the channel and/or optical detection system. Furthermore, the double-matching detection events are chosen after performing the measurements, that is a posteriori, so the rate of those events is linear and not quadratic, as was the case in our previous works. As a result, there is no fixed time window separating the two quantum states. For the purposes of this protocol and the identification of the errors produced, the origin of those events is not relevant. Now, going back to the algorithm, Bob sends two lists and to Alice, which can be specified as follows:The list allows two instances: (1) or (2) . The instance is randomly chosen by Bob; see the example of Table 4. The specific instance (1) or (2) will determine the shared secret bit (see T.2 below). For this reason, an instance contains two specific pairs of events that cannot be applied more than once to an instance. is an auxiliary list that does not contribute secret bits, but contains auxiliary information that allows Alice to detect errors. The ordering between and in is randomly performed by Bob. As a result of the above description, contains the frames where SS = 11, while has those where SS = 00. The pairing process is performed on an even number of events, which may require the removal of an event. An example of these lists in the frame notation can be seen in Figure 5 and Table 4:
- After Alice receives and , she performs the following algorithms:
- A.1 to choose from the ones that belong to the frame class (or equivalently to ).
- A.2 to detect the errors in .
- A.3 to detect the remaining errors in , which includes T.2, to determine the secret bits. Note that Bob obtains the secret bits by direct application of T.2.
- Bob inverts the results of and to and , respectively. Post-processing is then repeated: Step 2 (without quantum measurement) and Step 3.
3.2. Auxiliary Algorithms
3.2.1. Algorithm A.1
- 1.
- If , then it belongs to ; thus, write it in . Similarly, if , then it belongs to ; thus, write it in . Additionally, store each as in the list F and each as in the list G.
- 2.
- Find which of the Cartesian elements , , and are in or , where . The symbol does not imply a specific ordering between the two sets, so it must be equally taken . Write the identified cases in the auxiliary list . Informally speaking, we can say that this list contains the results of the self-references and , which will be useful in A.2.
3.2.2. Algorithm A.2
- (a)
- , then all instances in are inverted; thus, correct them in .
- (b)
- , then all j instances in are inverted; thus, correct them in .
3.2.3. Algorithm A.3
- 1.
- From , choose a pivot, say :
- —
- If , then write for and for .
- —
- If , then write for and for .
- 2.
- Use T.2 to determine the MR of all the elements of .
3.2.4. Test T.1
- (a)
- implies and .
- (b)
- implies and .
3.2.5. Test T.2
3.3. The Error Probability in the Quantum Channel
- —
- is erroneously detected as , while is (error-free) measured as .
- —
- is (error-free) measured as , but is erroneously detected as .
- —
- , .
- —
- , .
3.4. Privacy Amplification Performance
3.5. Security of the XOR Bit Approach
3.6. Strength of the System against Attacks
- 1.
- The photon number splitting attack (PNS): Eve cannot obtain a copy of the key for two reasons:
- —
- Although Eve captures some of the photons contained in the multiphotonic pulses, nothing guarantees she can produce the required double-matching detection events.
- —
- Alice and Bob distill the key according to the errors produced in the channel and the optical detection system, but Eve is unable to reproduce the errors of Bob’s detection system.
- 2.
- The intercept and resend attack (IR): Eve’s behavior can be seen as noise in the quantum channel (measure/resend), which alters the quantum state of half of the states sent by Alice because Eve’s basis is correct 50% of the time:
- —
- However, Alice and Bob obtain the key according to the final results obtained by Bob, which Eve cannot replicate. As long as the reconciliation process is confidential, Eve will not be able to derive the secret key.
3.7. Properties of the XOR Bit Approach
- —
- It has no losses and exhibits 100% efficiency.
- —
- It is immune to the error rate of the quantum channel; in other words, it is invariant with respect to the noise in the quantum channel.
- —
- It requires just one data exchange between Alice and Bob through the classical channel.
- —
- The secret key rate is , where w is the number of double-matching detection events and amounts to half of the pulses received at Bob’s station.
- —
- Security against the photon number splitting attack (PNS) and intercept and resend (IR) attack is guaranteed.
- —
- No bits of the shared (raw) key are revealed, just the sifting XOR bits.
4. Conclusions
Funding
Conflicts of Interest
Appendix A. Secret Gain with Measured Bits
g | [18] | |
---|---|---|
Appendix B. Secret Gain of the Frames
MR | 00 | 01 | 10 | 11 |
---|---|---|---|---|
00 | ||||
01 | ||||
10 | ||||
11 |
MR | 00 | 01 | 10 | 11 |
---|---|---|---|---|
00 | ||||
01 | ||||
10 | ||||
11 |
MR | 00 | 01 | 10 | 11 |
---|---|---|---|---|
00 | ||||
01 | ||||
10 | ||||
11 |
MR | 00 | 01 | 10 | 11 |
---|---|---|---|---|
00 | ||||
01 | ||||
10 | ||||
11 |
MR | 00 | 01 | 10 | 11 |
---|---|---|---|---|
00 | ||||
01 | ||||
10 | ||||
11 |
MR | 00 | 01 | 10 | 11 |
---|---|---|---|---|
00 | ||||
01 | ||||
10 | ||||
11 |
MR | 00 | 01 | 10 | 11 |
---|---|---|---|---|
00 | ||||
01 | ||||
10 | ||||
11 |
MR | 00 | 01 | 10 | 11 |
---|---|---|---|---|
00 | ||||
01 | ||||
10 | ||||
11 |
References
- Alléaume, R.; Branciard, C.; Bouda, J.; Debuisschert, T.; Dianati, M.; Gisin, N.; Godfrey, M.; Grangier, P.; Länger, T.; Lütkenhaus, N.; et al. Using quantum key distribution for cryptographic purposes: A survey. Theor. Comput. Sci. 2014, 560, 62–81. [Google Scholar] [CrossRef]
- Hong, K.W.; Foong, O.M.; Low, T.J. Challenges in quantum key distribution: A review. In Proceedings of the 4th International Conference on Information and Network Security, Kuala Lumpur, Malaysia, 28–31 December 2016; pp. 29–33. [Google Scholar]
- Bacco, D.; Da Lio, B.; Cozzolino, D.; Da Ros, F.; Guo, X.; Ding, Y.; Sasaki, Y.; Aikawa, K.; Miki, S.; Terai, H.; et al. Boosting the secret key rate in a shared quantum and classical fibre communication system. Commun. Phys. 2019, 2, 140. [Google Scholar] [CrossRef] [Green Version]
- Alagic, G.; Apon, D.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.; Lichtinger, J.; Miller, C.; Moody, D.; Peralta, R.; et al. Status Report on the Third Round of the Nist Post-Quantum Cryptography Standardization Process; US Department of Commerce, NIST: Washington, DC, USA, 2022.
- Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
- Yan, B.; Tan, Z.; Wei, S.; Jiang, H.; Wang, W.; Wang, H.; Luo, L.; Duan, Q.; Liu, Y.; Shi, W.; et al. Factoring integers with sublinear resources on a superconducting quantum processor. arXiv 2022, arXiv:2212.12372. [Google Scholar]
- Diamanti, E.; Lo, H.K.; Qi, B.; Yuan, Z. Practical challenges in quantum key distribution. NPJ Quantum Inf. 2016, 2, 1–12. [Google Scholar] [CrossRef] [Green Version]
- Sasaki, T.; Yamamoto, Y.; Koashi, M. Practical quantum key distribution protocol without monitoring signal disturbance. Nature 2014, 509, 475–478. [Google Scholar] [CrossRef] [PubMed]
- Mehic, M.; Niemiec, M.; Siljak, H.; Voznak, M. Error Reconciliation in Quantum Key Distribution Protocols. In Reversible Computation: Extending Horizons of Computing; Springer International Publishing: Cham, Switzerland, 2020; pp. 222–236. [Google Scholar]
- Mink, A.; Nakassis, A. LDPC error correction for Gbit/s QKD. In Proceedings of the Quantum Information and Computation XII, Baltimore, MD, USA, 5–9 May 2014; Volume 9123, pp. 19–31. [Google Scholar]
- Yan, H.; Ren, T.; Peng, X.; Lin, X.; Jiang, W.; Liu, T.; Guo, H. Information reconciliation protocol in quantum key distribution system. In Proceedings of the 2008 Fourth International Conference on Natural Computation, Jinan, China, 18–20 October 2008; Volume 3, pp. 637–641. [Google Scholar]
- Liu, S.; Van Tilborg, H.C.; Van Dijk, M. A practical protocol for advantage distillation and information reconciliation. Des. Codes Cryptogr. 2003, 30, 39–62. [Google Scholar] [CrossRef]
- Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J. Experimental quantum cryptography. J. Cryptol. 1992, 5, 3–28. [Google Scholar] [CrossRef]
- Brassard, G.; Salvail, L. Secret-key reconciliation by public discussion. In Advances in Cryptology—EUROCRYPT’93, Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, 23–27 May 1993; Springer: Berlin/Heidelberg, Germany, 1993; pp. 410–423. [Google Scholar]
- Buttler, W.T.; Lamoreaux, S.K.; Torgerson, J.R.; Nickel, G.; Donahue, C.; Peterson, C.G. Fast, efficient error reconciliation for quantum cryptography. Phys. Rev. A 2003, 67, 052303. [Google Scholar] [CrossRef] [Green Version]
- Jouguet, P.; Kunz-Jacques, S. High performance error correction for quantum key distribution using polar codes. arXiv 2012, arXiv:1204.5882. [Google Scholar] [CrossRef]
- Arikan, E. Channel polarization: A method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory 2009, 55, 3051–3073. [Google Scholar] [CrossRef]
- Lizama-Perez, L.A.; López, J.M. Quantum key distillation using binary frames. Symmetry 2020, 12, 1053. [Google Scholar] [CrossRef]
- Limei, G.; Qi, R.; Di, J.; Duan, H. Qkd iterative information reconciliation based on ldpc codes. Int. J. Theor. Phys. 2020, 59, 1717–1729. [Google Scholar] [CrossRef]
- Johnson, J.S.; Grimaila, M.R.; Humphries, J.W.; Baumgartner, G.B. An analysis of error reconciliation protocols used in quantum key distribution systems. J. Def. Model. Simul. 2015, 12, 217–227. [Google Scholar] [CrossRef]
- Gallager, R.G. Low-density parity-check codes. Inf. Theory Ire Trans. 1962, 8, 21–28. [Google Scholar] [CrossRef] [Green Version]
- Mink, A.; Nakassis, A. LDPC for QKD reconciliation. arXiv 2012, arXiv:1205.4977. [Google Scholar]
- Johnson, J.S. An Analysis of Error Reconciliation Protocols for Use in Quantum Key Distribution. Master’s Thesis, Air Force Institute of Technology, Montgomery County, OH, USA, 2012. [Google Scholar]
- Grosshans, F.; Grangier, P. Reverse reconciliation protocols for quantum cryptography with continuous variables. arXiv 2002, arXiv:0204127. [Google Scholar]
- Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Lizama-Pérez, L.A.; López R., J.M.; Samperio, E.H. Beyond the limits of Shannon’s information in quantum key distribution. Entropy 2021, 23, 229. [Google Scholar] [CrossRef] [PubMed]
- Lizama-Pérez, L.A.; López-Romero, J.M. Perfect Reconciliation in Quantum Key Distribution with Order-Two Frames. Symmetry 2021, 13, 1672. [Google Scholar] [CrossRef]
- Bennett, C.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the International Conference on Computer System and Signal Processing, Bangalore, India, 10–19 December 1984. [Google Scholar]
SS | XOR | Conjugate | Measured |
---|---|---|---|
SS | 00 | 0000 | 0000 |
SS | 00 | 0011 | 0000 |
SS | 01 | 0101 | 0110, 0101 |
SS | 10 | 1001 | 1010, 1001 |
SS | 00 | 0000 | 0000 |
SS | 01 | 0110 | 0110, 0101 |
SS | 10 | 1010 | 1010, 1001 |
SS | 00 | 0000 | 0011 |
SS | 11 | 1100 | 1111 |
SS | 00 | 0000 | 0011 |
# | SS | i | Bob’s Instances |
---|---|---|---|
1 | 0000 | 1,2,5 | |
2 | 1001 | 4,7 | |
3 | 0101 | 3,6 | |
4 | 1010 | 4,7 | |
5 | 0110 | 3,6 | |
6 | 0011 | 8,10 | |
7 | 1111 | 9 |
# | SS | i | Case | Bob’s Instances |
---|---|---|---|---|
1 | 0000 | 1,5,8,10 | (a) (b) | |
2 | 1010 | 7 | (a) (b) | |
3 | 0110 | 6 | (a) (b) | |
4 | 0101 | 3 | (a) (b) | |
5 | 1001 | 4 | (a) (b) | |
6 | 0011 | 2 | (a) | |
7 | 1100 | 9 | (a) |
User | Task | XOR Bit QKD Protocol | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
Alice | Time Slot | … | 8 | 7 | 6 | 5 | 4 | 3 | 2 | 1 |
QS | ||||||||||
Bob | Basis | … | ||||||||
Result | ||||||||||
Label |
Frame | Alice | Bob | Secret Bit |
---|---|---|---|
0 | |||
1 |
# | SS | Bob’s Instances |
---|---|---|
1 | 00 | |
2 | 11 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lizama-Perez, L.A. Reverse Reconciliation for Optimal Error Correction in Quantum Key Distribution. Symmetry 2023, 15, 710. https://doi.org/10.3390/sym15030710
Lizama-Perez LA. Reverse Reconciliation for Optimal Error Correction in Quantum Key Distribution. Symmetry. 2023; 15(3):710. https://doi.org/10.3390/sym15030710
Chicago/Turabian StyleLizama-Perez, Luis Adrián. 2023. "Reverse Reconciliation for Optimal Error Correction in Quantum Key Distribution" Symmetry 15, no. 3: 710. https://doi.org/10.3390/sym15030710
APA StyleLizama-Perez, L. A. (2023). Reverse Reconciliation for Optimal Error Correction in Quantum Key Distribution. Symmetry, 15(3), 710. https://doi.org/10.3390/sym15030710