Time-Entanglement QKD: Secret Key Rates and Information Reconciliation Coding

01/01/2023
by   Joseph J. Boutros, et al.
0

In time entanglement-based quantum key distribution (QKD), Alice and Bob extract the raw key bits from the (identical) arrival times of entangled photon pairs by time-binning. Each of them individually discretizes time into bins and groups them into frames. They retain only the frames with a single occupied bin. Thus, Alice and Bob can use the position of the occupied bin within a frame to generate random key bits, as in PPM modulation. Because of entanglement, their occupied bins and their keys should be identical. However, practical photon detectors suffer from time jitter errors. These errors cause discrepancies between Alice's and Bob's keys. Alice sends information to Bob through the public channel to reconcile the keys. The amount of information determines the secret key rate. This paper computes the secret key rates possible with detector jitter errors and constructs codes for information reconciliation to approach these rates.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/24/2020

Increasing the Raw Key Rate in Energy-Time Entanglement Based Quantum Key Distribution

A Quantum Key Distribution (QKD) protocol describes how two remote parti...
research
07/08/2022

Information Rates with Non Ideal Photon Detectors in Time-Entanglement Based QKD

We develop new methods of quantifying the impact of photon detector impe...
research
05/01/2023

Non-Binary LDPC Code Design for Energy-Time Entanglement Quantum Key Distribution

In energy-time entanglement Quantum Key Distribution (QKD), two users ex...
research
02/28/2023

Publicly verifiable delegative democracy with secret voting power

We use a commitment scheme to track every individual's voting power on a...
research
03/03/2023

QKD Based on Time-Entangled Photons and its Key-Rate Promise

For secure practical systems, quantum key distribution (QKD) must provid...
research
03/07/2019

Secret key distillation across a quantum wiretap channel under restricted eavesdropping

The theory of quantum cryptography aims to guarantee unconditional infor...
research
11/07/2022

Simple Set Sketching

Imagine handling collisions in a hash table by storing, in each cell, th...

Please sign up or login with your details

Forgot password? Click here to reset