文化大學機構典藏 CCUR:Item 987654321/2564
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 47184/51050 (92%)
Visitors : 13957957      Online Users : 313
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/2564


    Title: An enhancement of quantum key distribution protocol with noise problem
    Authors: Lin, Feng-Tse
    Contributors: 應數系
    Keywords: quantum key distribution
    quantum cryptography
    confidence intervals
    random sampling
    reconciliation
    privacy amplification
    Date: 2008
    Issue Date: 2009-11-06 14:22:37 (UTC+8)
    Abstract: An enhanced version of the quantum key distribution (QKD) protocol in quantum cryptography is proposed. We consider that realistic detectors and imperfect devices may introduce noise into the transmission thereby causing a high error rate. The proposed scheme is based on an error rate analysis and a random sampling procedure in statistics to produce a probabilistic bound on the error estimation. Confidence intervals are used to interpret the error estimate with a specified confidence level. Based on the information obtained, Alice and Bob judge what caused the errors and establish confidence levels for the error rate of the remaining untested bits. Hence, they can determine the maximum number of times reconciliation needs to be performed to remove all errors from what remains of a raw key to produce an error-free secret key. As a result, the tedious reconciliation process can be reduced and a neglectful probability of not detecting the existence of remaining errors can be avoided as well. The privacy amplification is then applied: (1) to extract a secret key from a partially secret key, and (2) to enlarge the length of the secret key into the final key. The proposed scheme can work when dealing with errors caused by random noise and eavesdropping.
    Relation: INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL Volume: 4 Issue: 5 Pages: 1043-1053
    Appears in Collections:[Department of Applied Mathematics] journal articles

    Files in This Item:

    There are no files associated with this item.



    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©  2006-2025  - Feedback