Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Demystifying the information reconciliation protocol cascade

Published: 01 April 2015 Publication History

Abstract

Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and, although its efficiency is not optimal, it has become the de-facto standard for practical implementations of information reconciliation in quantum key distribution. The aim of this work is to analyze the performance of Cascade, to discuss its strengths, weaknesses and optimization possibilities, comparing with some of the modified versions that have been proposed in the literature. When looking at all design trade-offs, a new view emerges that allows to put forward a number of guidelines and propose near optimal parameters for the practical implementation of Cascade improving performance significantly in comparison with all previous proposals.

References

[1]
S. J. Wiesner (1983), Conjugate Coding, SIGACT News, Vol. 15, No. 1, pp. 78-88.
[2]
C. H. Bennett and G. Brassard (1984), Quantum Cryptography: Public Key Distribution and Coin Tossing, in IEEE Intl. Conf. on Computers, Systems, and Signal Processing, pp. 175-179.
[3]
C. H. Bennett, G. Brassard and J.-M. Roberts (1988), Privacy Amplification by Public Discussion, SIAM J. Comput., Vol. 17, No. 2, pp. 210-229.
[4]
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin (1992), Experimental Quantum Cryptography, J. Cryptology, Vol. 5, No. 1, pp. 3-28.
[5]
C. H. Bennett, G. Brassard, C. Crépeau and U. M. Maurer (1995), Generalized Privacy Amplification, IEEE Trans. Inf. Theory, Vol. 41, No. 6, pp. 1915-1923.
[6]
G. Brassard and L. Salvail (1994), Secret-Key Reconciliation by Public Discussion, in Advances in Cryptology -- EUROCRYPT '93, Workshop on the Theory and Application of Cryptographic Techniques, Vol. 765 of Lecture Notes in Computer Science, pp. 410-423. Springer Berlin Heidelberg.
[7]
M. Van Dijk (1997), Secret Key Sharing and Secret Key Generation, PhD thesis, Technische Universiteit Eindhoven.
[8]
M. Van Dijk and A. Koppelaar (1997), High Rate Reconciliation, in ISIT 1997, IEEE Intl. Symposium on Information Theory, p. 92.
[9]
K. Yamazaki, M. Osaki and O. Hirota (1998), On Reconciliation of Discrepant Sequences Shared Through Quantum Mechanical Channels, in Information Security, Vol. 1396 of Lecture Notes in Computer Science, pp. 345-356. Springer Berlin Heidelberg.
[10]
T. Sugimoto and K. Yamazaki (2000), A Study on Secret Key Reconciliation Protocol "Cascade", IEICE Trans. Fundam. Electron. Commun. Comput. Sci., Vol. E83-A, No. 10, pp. 1987-1991.
[11]
K. Chen (2000), Improvement of Reconciliation for Quantum Key Distribution, Master's thesis, Department of Computer Science, Rochester Institute of Technology, available online at https://ritdml.rit.edu/handle/1850/14810; last accessed July 7, 2014.
[12]
E. Furukawa and K. Yamazaki (2001), Application of existing perfect code to secret key reconciliation, in ISCIT 2001, Intl. Symposium on Communications and Information Technologies, pp 397-400.
[13]
A. Yamamura and H. Ishizuka (2001), Error Detection and Authentication in Quantum Key Distribution, in ACISP 2001, Information Security and Privacy, 6th Australasian Conf., Vol. 2119 of Lecture Notes in Computer Science, pp. 260-273. Springer Berlin Heidelberg.
[14]
K. Chen (2001), Reconciliation by Public Discussion: Throughput and Residue Error Rate, unpublished draft.
[15]
K.-C. Nguyen (2002), Extension des protocoles de réconciliation en cryptographie quantique, Master's thesis, Faculté des Sciences Appliquées, Université Libre de Bruxelles.
[16]
S. Liu (2002), Information-Theoretic Secret Key Agreement, PhD thesis, Technische Universiteit Eindhoven.
[17]
S. Liu, H. C. Van Tilborg and M. Van Dijk (2003), A Practical Protocol for Advantage Distillation and Information Reconciliation, Designs Codes Cryptogr., Vol. 30, No. 1, pp. 39-62.
[18]
W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue and C. G. Peterson (2003), Fast, efficient error reconciliation for quantum cryptography, Phys. Rev. A, Vol. 67, No. 5, p. 052303.
[19]
H. Yan, T. Ren, X. Peng, X. Lin, W. Jiang, T. Liu and H. Guo (2008), Information Reconciliation Protocol in Quantum Key Distribution System, in ICNC 2008, 4th Intl. Conf. on Natural Computation, Vol. 3, pp. 637-641.
[20]
J. Han and X. Qian (2009), Auto-adaptive interval selection for quantum key distribution, Quantum Inform. Comput., Vol. 9, No. 7&8, pp. 693-700.
[21]
R. Ii-Yung (2013), A probabilistic analysis of Binary and Cascade, unpublished manuscript, available online at http://math.uchicago.edu/~may/REU2013/REUPapers/Ng.pdf; last accessed July 7, 2014.
[22]
R. W. Hamming (1950), Error Detecting and Error Correcting Codes, Bell Labs Tech. J., Vol. 29, No. 2, pp. 147-160.
[23]
N. Bonello, S. Chen and L. Hanzo (2011), Design of Low-Density Parity-Check Codes: An overview, IEEE Veh. Technol. Mag., Vol. 6, No. 4, pp. 16-23.
[24]
S. Seet, R. Ii-Yung and K. Khoo (2013), An Accurate Analysis of the BINARY Information Reconciliation Protocol by Generating Functions, QCrypt 2013, 3rd Intl. Conf. on Quantum Cryptography.
[25]
T. B. Pedersen and M. Toyran (2014), High Performance Information Reconciliation for QKD with CASCADE, Quantum Inform. Comput., to appear, arXiv:1307.7829 [quant-ph].
[26]
D. S. Slepian and J. K. Wolf (1973), Noiseless Coding of Correlated Information Sources, IEEE Trans. Inf. Theory, 19 (4), pp. 471-480.
[27]
C. Crépeau (1995), Réconciliation et Distillation Publiques de Secret, unpublished manuscript, available online at http://www.cs.mcgill.ca/~crepeau/; last accessed July 7, 2014.
[28]
This is a crucial issue for the application of Cascade in QKD. Information leakage, e.g., see Eq. (7), is a quantity to be subtracted from the raw key in the privacy amplification step of the post-processing protocol. Information leakage in turn depends on the ratio of the transmitted information and hence on the information efficiency fEC (cf. Eq. (2); the theoretically optimal value of the latter being equal to 1). The main question then is how to estimate the information leakage of Cascade. Our approach here is that if a parity of a subblock of one of the parties (Alice) is sent to the other (Bob) and he responds with the parity of the same subblock, then the overall leakage is 1 bit. This is by no means self-evident as in fact two bits are leaked and in principle the eavesdropper could make use of both of them. If so, the leakage would double and the usage of Cascade and any two-way protocol in general would be highly penalized during privacy ampli_cation. Fortunately this is not the case, at least for BB84. In [32] it is shown that the information leakage in the discussed case is indeed 1 bit for arbitrary eavesdropper attacks. The author puts forward the approach of encrypting the reconciliation communication exchange by one time pad, a procedure that consumes key and is thus, from an overall key generation balance point of view, equivalent to reducing an equal amount of key during privacy amplification. One of the results in [32] is that for BB84 one can encrypt BOTH parities discussed above by the same bit. This implies that in this case the information leakage due to Bob's answer does not need to be taken into account during privacy amplification and it is the leakage of information, due to Alice's communication alone that is relevant for Cascade performance for BB84.
[29]
G. Van Assche (2005), Information-Theoretic Aspects of Quantum Key Distribution, PhD thesis, Faculté des Sciences Appliquées, Université Libre de Bruxelles.
[30]
G. Van Assche (2006), Quantum Cryptography and Secret-Key Distillation, Cambridge University Press.
[31]
A. R. Conn, K. Scheinberg and L. N. Vicente (2009), Introduction to Derivative-Free Optimization, Society for Industrial and Applied Mathematics, Philadelphia.
[32]
H.-K. Lo (2003), Method for decoupling error correction from privacy amplification, New J. Phys., Vol. 5, pp. 36.1-36.24.

Cited By

View all
  • (2021)Physical layer authentication for automotive cyber physical systems based on modified HB protocolFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-020-0010-415:3Online publication date: 1-Jun-2021
  • (2018)Optimized cascade protocol for efficient information reconciliation in quantum key distribution systemsQuantum Information & Computation10.5555/3370256.337025818:7-8(553-578)Online publication date: 1-Jun-2018
  • (2018)Improved reconciliation with polar codes in quantum key distributionQuantum Information & Computation10.5555/3370214.337021918:9-10(795-813)Online publication date: 1-Aug-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Quantum Information & Computation
Quantum Information & Computation  Volume 15, Issue 5-6
April 2015
180 pages

Publisher

Rinton Press, Incorporated

Paramus, NJ

Publication History

Published: 01 April 2015
Revised: 19 September 2014
Received: 18 July 2014

Author Tags

  1. cascade protocol
  2. information reconciliation
  3. quantum key distribution
  4. two-way reconciliation

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media