Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for carrying out cascading error correction for error code in quantum secret key distribution postprocessing

A quantum key distribution and post-processing technology, applied in the field of quantum key error correction, can solve the problems of low error correction efficiency, large key consumption, encryption and decryption errors, etc., to achieve the effect of improving error correction efficiency

Inactive Publication Date: 2016-10-12
PEKING UNIV
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A third party trying to eavesdrop on the password has to measure it in some way, and those measurements introduce perceptible anomalies
[0011] 1. If the keys of Alice and Bob are inconsistent, the encryption and decryption process will go wrong, and the communication will not be possible;
[0012] 2. When using a key for encryption, because the communication uses the "one-time pad" technology, the consumption of the key is very large. Therefore, if the length of the key is short, the key needs to be regenerated frequently, which is harmful to the system. disastrous for
The traditional protocol does not make full use of the information transmitted by the two sides of the communication, wasting the bandwidth and the information transmitted by the channel, so that the throughput achieved by the entire protocol is not high, that is, the error correction efficiency is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out cascading error correction for error code in quantum secret key distribution postprocessing
  • Method for carrying out cascading error correction for error code in quantum secret key distribution postprocessing
  • Method for carrying out cascading error correction for error code in quantum secret key distribution postprocessing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The data structure of the Cascade protocol during implementation is as follows image 3 As shown, Cascade.cpp is the main class of the protocol, which has the implementation process of the entire protocol inside, and performs error correction according to the execution flow of the Cascade protocol. It calls the function of Data_Interface.cpp to establish a connection between Alice at the sending end and Bob at the receiving end; uses the function of CommuData.cpp to encapsulate and decapsulate the interaction information between Alice and Bob; calls the data structure and algorithm provided in CascadeRecord.cpp Perform parity check and calculation, divide into blocks, locate the bit error position, locate the word block position when the error is accompanied by backtracking, record the position correspondence of random rearrangement, etc.; use the function in Para.cpp to get the bit error rate of the protocol input and key.

[0054] The communication parties set up the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of quantum secret key error correction, and especially relates to a method for carrying out cascading error correction for an error code in quantum secret key distribution postprocessing. The method comprises the steps: carrying out multiple error correction of a secret key block; finding the position of a corrected error code in a one error correction process after the error correction process is finished; finding the position of the error code before the random rearrangement through historical record information, and generating a new block with an odd number of errors at this moment, and carrying out the secondary error search of the new positioned block with an error code; carrying out the continuous backtracking of error correction, stopping the correction when the odd and even verification of all blocks of a transmitting end and receiving end in the record in the whole process are consistent, and entering the next process of error correction at this moment. The method carries out backtracking search in an error correction process, and carries out error correction with errors. The method employs the historical information to fully dig the interaction information of two communication sides, achieves an effect, which can achieved in a conventional protocol through a plurality of processes, in one error correction process, and greatly improves the error correction efficiency.

Description

technical field [0001] The invention relates to the field of quantum key error correction, in particular to a cascade error correction method for error codes in post-processing of quantum key distribution. Background technique [0002] Quantum cryptography, also known as quantum key distribution, or QKD for short in English, uses the properties of quantum mechanics to ensure communication security. It enables communicating parties to generate and share a random, secure key to encrypt and decrypt messages. [0003] One of the most important properties of quantum cryptography is that if a third party tries to eavesdrop on the cipher, both communicating parties will be aware. This property is based on a fundamental principle of quantum mechanics: Any measurement of a quantum system creates a disturbance in the system. For a third party to attempt to eavesdrop on a password, it must be measured in some way, and those measurements will introduce perceptible anomalies. Communic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 郭弘彭翔刘田
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products