Results

**1 - 5**of**5**### Problems in application of LDPC codes to information reconciliation in quantum key distribution protocols

, 2009

"... ..."

### DSO National Laboratories

"... Abstract—Information Reconciliation (IR) protocols, which achieve error correction of shared secrets by public discussion, is an important process in Quantum Key Distribution (QKD). We provide an analysis of Brassard’s BINARY and CASCADE IR protocols, two protocols commonly used in QKD. Using genera ..."

Abstract
- Add to MetaCart

(Show Context)
Abstract—Information Reconciliation (IR) protocols, which achieve error correction of shared secrets by public discussion, is an important process in Quantum Key Distribution (QKD). We provide an analysis of Brassard’s BINARY and CASCADE IR protocols, two protocols commonly used in QKD. Using generating functions, we give an accurate result on BINARY. We derive the error probability distribution at each pass, which allows us to compute the decoding error probability and the number of “leaked ” bits; two quantities crucial in the proof of security for QKD. We then corroborate the probability distribution computed by our formulas with actual simulation results. Finally we show that our formulas give better estimate for the decoding error probability of BINARY than the upper bound derived by Brassard for CASCADE. Because CASCADE should have better decoding performance than BINARY, this shows that Brassard’s estimate of CASCADE may be too loose and can be improved. Our accurate formulas for BINARY can also be used as a basis on which to derive more accurate formulas for CASCADE. I.

### Universally composable and customizable post-processing for practical quantum key distribution

"... NOTICE: this is the author’s version of a work that was accepted for publication in Computers & Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. C ..."

Abstract
- Add to MetaCart

NOTICE: this is the author’s version of a work that was accepted for publication in Computers & Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in