Abstract
Quantum cryptography (secure key distribution) systems must include procedures for correcting errors in the raw key transmitted over a quantum communication channel. Several reconciliation protocols are discussed and compared in terms of efficiency.
Similar content being viewed by others
References
S. Wiesner, SIGACT News 15, 78 (1983).
C. H. Bennett and G. Brassard, in Proceedings of IEEE International Conference on Computer Systems and Signal Processes (Bangalore, India, 1984), p. 175.
G. S. Vernam, J. Am. Inst. Electr. Eng. 55, 109 (1926).
V. A. Kotel’nikov, A Report (Moscow, 1941).
C. E. Shannon, Bell Syst. Tech. J. 28, 658 (1949).
W. K. Wootters and W. H. Zurek, Nature 299, 802 (1982).
C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992); C. H. Bennett, G. Brassard, and N. D. Mermin, Phys. Rev. Lett. 68, 557 (1992).
W. Diffie and M. E. Hellman, IEEE Trans. Inf. Theory 22, 644 (1976).
A. K. Ekert, B. Huttner, G. M. Palma, and A. Peres, Phys. Rev. A 50, 1047 (1994).
H. E. Brandt, J. M. Myer, and S. J. Lomonaco, Jr., Phys. Rev. A 56, 4456 (1997).
C. E. Shannon, Bell Syst. Tech. J. 27, 397 (1948); 27, 623 (1948).
R. Gallagher, Information Theory and Reliable Communication (Wiley, New York, 1968; Sovetskoe Radio, Moscow, 1974).
C. W. Helstrom, Quantum Detection and Estimation Theory (Academic, New York, 1976).
J. Wolfowitz, Ill. J. Math. 1, 591 (1957).
A. S. Kholevo, Introduction to the Quantum Theory of Information (MTsNMO, Moscow, 2002), Sovrem. Mat. Fiz., No. 5; Probl. Peredachi Inf. 8, 63 (1972); 15, 3 (1979); Usp. Mat. Nauk 53, 193 (1998).
R. Jozsa and B. Schumacher, J. Mod. Opt. 41, 2343 (1994).
P. Hausladen, R. Jozsa, B. Schumacher, et al., Phys. Rev. A 54, 1869 (1996).
B. Schumacher and M. D. Westmoreland, Phys. Rev. A 56, 131 (1997).
D. Maurer, IEEE Trans. Inf. Theory 39, 733 (1993).
C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, IEEE Trans. Inf. Theory 41, 1915 (1995).
J. L. Carter and M. N. Wegman, J. Comput. Syst. Sci. 18, 143 (1979).
C. H. Bennett, F. Bessette, G. Brassard, et al., J. Cryptology 5, 3 (1992).
G. Brassard and L. Salvail, Lect. Notes Comput. Sci. 765, 410 (1994).
E. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes (North-Holland, Amsterdam, 1977).
W. W. Peterson and E. J. Weldon, Error-Correcting Codes (MIT Press, Cambridge, 1972).
W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, et al., quant-ph/0203096.
B. Julsgaard, J. Sherson, J. I. Cirac, et al., Nature 432, 482 (2004).
Author information
Authors and Affiliations
Additional information
__________
Translated from Zhurnal Éksperimental’no\(\overset{\lower0.5em\hbox{$\smash{\scriptscriptstyle\smile}$}}{l} \) i Teoretichesko\(\overset{\lower0.5em\hbox{$\smash{\scriptscriptstyle\smile}$}}{l} \) Fiziki, Vol. 128, No. 2, 2005, pp. 263–291.
Original Russian Text Copyright © 2005 by Makkaveev, Molotkov, Pomozov, Timofeev.
Rights and permissions
About this article
Cite this article
Makkaveev, A.P., Molotkov, S.N., Pomozov, D.I. et al. Practical error-correction procedures in quantum cryptography. J. Exp. Theor. Phys. 101, 230–252 (2005). https://doi.org/10.1134/1.2047789
Received:
Issue Date:
DOI: https://doi.org/10.1134/1.2047789