Experimental study and pratical realization of a reconciliation method for quantum key distribution system

by   Nedra Benletaief, et al.

This paper investigates a reconciliation method in order to establish an errorless secret key in a QKD protocol. Classical key distribution protocols are no longer unconditionally secure because computational complexity of mathematical problems forced hardships. In this context, QKD protocols offer a highest level of security because they are based on the quantum laws of physics. But, the protocol performances can be lowered by multiples errors. It appears clearly that reconciliation should be performed in such a situation in order to remove the errors as for the legitimate partners. The proposed method accomplishes reconciliation by using QTC in the special problem of sideinformation source coding (Slepian-Wolf coding model). Our theoretical hypothesis are sustained by experimental results that confirm the advantage of our method in resolving reconciliation problem compared to a recent related work. Indeed, the integration of our method generates an important progess in security and a large decrease of the QBER. The gain is obtained with a reasonable complexity increase. Also, the novelty of our work is that it tested the reconciliation method on a real photonic system under VPItransmissionMaker.


page 1

page 2

page 3

page 4


Reconciliation for Practical Quantum Key Distribution with BB84 protocol

This paper investigates a new information reconciliation method for quan...

Experimental study of continuous variable quantum key distribution

It has been proven in the literature that the main technological factors...

Toward Efficient Quantum Key Distribution Reconciliation

In this paper, we propose how to construct a reconciliation method for t...

On the Everlasting Security of Password-Authenticated Quantum Key Exchange

Quantum Key Distribution, introduced in 1984 in the seminal paper of Ben...

Experimental demonstrations of unconditional security in a purely classical regime

So far, unconditional security in key distribution processes has been co...

Experimental twin-field quantum key distribution with flawed and correlated sources

The security of quantum key distribution (QKD) is severely threatened by...

Security analysis method for practical quantum key distribution with arbitrary encoding schemes

Quantum key distribution (QKD) gradually has become a crucial element of...

Please sign up or login with your details

Forgot password? Click here to reset