† Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant Nos. U1304613 and 11204379).
Information reconciliation is a significant step for a continuous-variable quantum key distribution (CV-QKD) system. We propose a reconciliation method that allows two authorized parties to extract a consistent and secure binary key in a CV-QKD protocol, which is based on Gaussian-modulated coherent states and homodyne detection. This method named spherical reconciliation is based on spherical quantization and non-binary low-density parity-check (LDPC) codes. With the suitable signal-to-noise ratio (SNR) and code rate of non-binary LDPC codes, spherical reconciliation algorithm has a high efficiency and can extend the transmission distance of CV-QKD.
Quantum key distribution (QKD)[1,2] allows two authorized parties (Alice and Bob) to obtain raw keys after quantum signal generation, transmission and detection Since BB84 protocol[1] was proposed in 1984, quantum key distribution (QKD) has been greatly developed[3–11] and can be used in data encryption.[12–14] Because of imperfection of experimental equipment, disturbance of external environment and eavesdropping from attacker Eve, some errors appear in raw keys and part of raw keys are revealed to Eve. To avoid these disadvantages, classical post-processing,[15–17] such as authentication information reconciliation and privacy amplification, must be used to generate errorless secure key.
According to the difference in transmitted quantum state, QKD protocols are divided into discrete-variable (DV) QKD protocol and CV-QKD protocol. In DV- QKD protocol,[1] the transmitted information is encoded with discrete variables[18] and the raw keys are binary bit strings. So the information reconciliation for DV-QKD protocol is an error correction step principally. In CV-QKD protocol,[2,19] the transmitted information is encoded with continuous variables and the raw keys are values of continuous variables. In this paper, we focus on information reconciliation of CV-QKD[20] by using Gaussian-modulated coherent states and homodyne detection.
CV-QKD is expected to achieve higher secret key rates than DV-QKD due to the possibility of encoding more than 1 bit per pulse, while the difficult point of CV-QKD lies in information reconciliation. Up to now, there have been mainly two information reconciliation methods for CV-QKD: slice reconciliation[21,22] and multidimensional reconciliation.[23] Slice reconciliation method consists of slice quantization step and error correction step. This method encodes a Gaussian variable (symbol) into several bits and is applied to the SNR range 0.5–15.[11] Multidimensional reconciliation method consists of transformation and error correction. This method encodes a symbol into only one bit and is used for SNRs below 0.5. Because slice reconciliation can quantify a continuous variable into several bits, the complexity of slice reconciliation is higher than that of multidimensional reconciliation. The reverse reconciliation,[24] which was proposed in 2003, can reach longer transmission distance (with more than 3-dB losses) than the direct reconciliation.[19] The efficiency and complexity of information reconciliation method are significant for the performance of CV-QKD system.
In this paper, we propose a new information reconciliation method named spherical reconciliation, which is based on spherical quantization and non-binary LDPC codes. In spherical reconciliation, firstly Alice or Bob’s symbols are transformed into the points on the unit sphere completely. Then the points on the unit sphere are quantified into discrete variables with quantization function. Later part bits of discrete variables are discarded to reduce the bit error rate. Finally non-binary LDPC codes[25] are used to encode and decode remaining discrete variables and symbols, and Alice and Bob obtain consistent and secure binary keys.[26] Compared with slice reconciliation, the spherical reconciliation encodes more than 1 bit per pulse, in addition, spherical quantization can reduce leaked information. The performance of information reconciliation is influenced by quantization method, error correction method and corresponding signal-to-noise ratio (SNR) ranges. Reverse reconciliation is used in the following discussion. The simulation result indicates that spherical reconciliation can achieve a high efficiency nearly 97%, and obviously extend the transmission distance of CV-QKD systems to 80 km with a group of suitable parameters.
The rest of the paper is organized as follows. In Section
The first step of spherical reconciliation is to perform the spherical quantization. Spherical quantization is based on the unit sphere
After the quantum process of CV-QKD, Alice owns a symbol
The mutual information between Alice and Bob is defined as
Quantization is a process in which the symbols are mapped into binary bits. In spherical quantization, Bob’s symbols should be mapped into the points on the unit sphere
Assuming that Bob quantifies the normalized vector
Each quantization range corresponds to one binary bit string. The normalized vector
Based on the elements of information theory, the mutual information between
Spherical quantization is different from symbol quantization of Slice reconciliation. An imperfection of slice quantization is that a few symbols are out of the quantization intervals and assigned to the corresponding adjacent intervals. This way changes quantization efficiency and reconciliation efficiency necessarily. While in spherical quantization, all the symbols are mapped into the points on the unit sphere, which satisfies all the symbols in the corresponding quantization ranges.
When the number of dimension is 2 or 3, the unit spheres can be divided equally through angle division or gridding division. A necessary problem is that it is difficult to divide the unit sphere
Spherical reconciliation contains spherical quantization, bits sifting and error correction. We have introduced the spherical quantization method in Section
Bob’s symbols
The bit string
The purpose of error correction is that Alice and Bob share the same keys with high probability. They process the error correction via non-binary LDPC codes over Galois fields
At first, Bob generates a parity-check matrix
The total efficiency of bits sifting and error correction is given by
Details of spherical reconciliation are finished, and the structure is shown in Fig.
From formula (
We analyze the spherical reconciliation with a CV-QKD protocol based on Gaussian-modulated coherent states,[20] homodyne detection and reverse reconciliation. We simulate the performance of 2DS reconciliation now.
Alice and Bob build their respective two-dimensional vectors
When the normalized value
For the infinite-size condition, the secret key rate proven secure against individual attack is given by[23]
As figure
To compare spherical reconciliation with slice reconciliation in the same SNR case, we assume that the SNR is 3.25 and Bob quantifies a symbol into 4 bits, for slice reconciliation Bob should discard 2 bits, the efficiency is
For the finite-size condition, the secret key rate proven secure against collective attack is given by[32]
Figure
Information reconciliation is an indispensable part for CV-QKD system. In this paper we propose a new information reconciliation method named spherical reconciliation. Because of using no post-selection,[34,35] the spherical reconciliation can be proven secure against general attacks. Spherical quantization method is a high-efficiency quantization method. The performance of spherical reconciliation is restricted by the compatibility and performance of non-binary LDPC codes. We analyze the performance of 2DS reconciliation method, which has high efficiency and can extend the transmission distance of infinite-size and finite-size CV-QKD protocols. It is valuable to discuss spherical reconciliation in the case of high dimensions.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] | |
[35] |