• Acta Optica Sinica
  • Vol. 34, Issue 8, 827002 (2014)
Wang Yunyan1、*, Guo Dabo1、2, Zhang Yanhuang1, Wang Xiaokai1, and He Zhuanling1
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3788/aos201434.0827002 Cite this Article Set citation alerts
    Wang Yunyan, Guo Dabo, Zhang Yanhuang, Wang Xiaokai, He Zhuanling. Algorithm of Multidimensional Reconciliation for Continuous-Variable Quantum Key Distribution[J]. Acta Optica Sinica, 2014, 34(8): 827002 Copy Citation Text show less
    References

    [1] Charles H Bennet, Gilles Brassard. Quantum cryptography: publikey distribution and coin tossing [C]. Proceedings of International Conference on Computers, Systems & Signal Processing, 1984.

    [2] Ma Ruilin. Quantum Cryptography Communication [M]. Beijing: Science Press, 2006.

    [3] Chen Shuai, Wang Jindong, Zhong Pingping, et al.. Influence of time jitter on quantum bit error rate of pahse-coding quantum key distribution system [J]. Acta Optica Sinica, 2011, 31(7): 0727001.

    [4] Zhao Guhao, Zhao Shanghong, Yao Zhoushi, et al.. Effect of the pulse broadening caused by atmosphere on staellite based quantum key distribution [J]. Acta Optica Sinica, 2012, 32(11): 1127001.

    [5] Timothy C Ralph. Continuous variable quantum cryptography [J]. arXiv: quant-ph// 9907073, 1999.

    [6] Mark Hillery. Quantum cryptography with squeezed states [J]. Phys Rev A, 2000, 61 (2): 022309.

    [7] Frédéric Grosshans, Gilles Van Assche, Jérme Wenger, et al.. Quantum key distribution using gaussian-modulated coherent states [J]. Nature, 2003, 421(6920): 238-241.

    [8] Frédéric Grosshans. Collective attacks and unconditional security in continuous variable quantum key distribution [J]. Phys Rev Lett, 2005, 94(2): 020504.

    [9] Gong Lihua, Song Hanchong, He Chaosheng, et al.. A continuous variable quantum deterministic key distribution based on two-mode squeezed states [J]. Physica Scripta, 2014, 89(3): 035101.

    [10] Wang Jinjing, Jia Xiaojun, Peng Kunchi. Improvement of balanced homodyne detector [J]. Acta Optica Sinica, 2012, 32(1): 0127001.

    [11] Jérme Lodewyck, Matthieu Bloch, Raúl García-Patrón, et al.. Quantum key distribution over 25 km with an all-fiber continuous-variable system [J]. Phys Rev A, 2007, 76(4): 042305.

    [12] Wen Chao Dai, Yuan Lu, Jun Zhu, et al.. An integrated quantum secure communication system [J]. Science China Information Sciences, 2011, 54(12): 2578-2591.

    [13] Wang Xuyang, Bai Zengliang, Wang Shaofeng, et al.. Four-state modulation continuous variable quantum key distribution over a 30-km fiber and analysis of excess noise [J]. Chin Phys Lett, 2013, 30 (1): 010305.

    [14] Paul Jouguet, Sébastien Kunz-Jacques, Anthony Leverrier, et al.. Experimental demonstration of long-distance continuous-variable quantum key distribution [J]. Nature Photonics, 2013, 7: 378-381.

    [15] Gilles Van Assche, Jean Cardina, Nicolas J Cerf. Reconciliation of a quantum distributed Gaussian key [J]. IEEE Transactions on Information Theory, 2004, 50(2): 394-400.

    [16] Matthieu Bloch, Andrew Thangara, Steven W McLaughlin, et al.. LDPC-based Gaussian key reconciliation [C]. IEEE Information Theroy Workshop, 2006. ITW′06 Punta del Este, 2006. 116-120.

    [17] Guo Dabo, Zhang Ning, Liu Gang. Reconciliation of quantum Gaussian distributed key based on Turbo codes [J]. Acta Sinica Quantum Optica, 2013, 19(1): 32-38.

    [18] Guo Dabo, Liu Gang, Zhang Ning, et al.. Reverse reconciliationa of quantum Gaussian distributed key [J]. Acta Sinica Quantum Optica, 2013, 19(3): 219-226.

    [19] Robert Gallager. Low-density parity-check codes [J]. Information Theory, IRE Transactionon, 1962, 8(1): 21-28.

    [20] Jérme Lodewyck, Matthieu Bloch, Raúl García-Patrón, et al.. Quantum key distribution over 25 km with an all-fiber continuous-variable system [J]. Phys Rev A, 2007, 76 (4): 042305.

    [21] Guo Dabo, Zhang Yanhuang, Wang Yunyan. Performance optimization for the reconciliation of Gaussian quantum key distribution [J]. Acta Optica Sinica, 2014, 34(1): 0127001.

    [22] Anthony Leverrier, Romain Alléaume, Joseph Boutros, et al.. Multidimensional reconciliation for a continuous-variable quantum key distribution [J]. Phys Rev A, 2008, 77(4): 042325.

    [23] Lin Yi, He Guangqiang, Zeng Guihua. The application of LDPC codes in the mulitidimensional reconciliation of quantum key distribution [J]. Acta Sinica Quantum Optica, 2013, 19(2): 116-121.

    [24] Yuan Dongfeng, Zhang Haigang. The Theory and Application of LDPC Code [M]. Beijing: Posts & Telecom Perss, 2008. 75-79.

    [25] Li Kang. Study on Continuous Variable Quantum Key Distribution [D]. Beijing: Beijing University of Post and Telecommunications, 2009. 32-43.

    [26] Miguel Navascués, Antonio Acín. Security bounds for continuous variables quantum key distribution [J]. Phys Rev Lett, 2005, 94 (2): 020505.

    [27] Anthony Leverrier, Philippe Grangier. Continuous-variable quantum key distribution protocols with a discrete modulation [J]. arXiv: 1002.4083, 2010.

    [28] Paul Jouguet, Sébastien Kunz-Jacques, Anthony Leverrier. Long-distance continuous variable quantum key distribution with a Gaussian modulation [J]. Phys Rev A, 2011, 84(6): 062317.

    CLP Journals

    [1] Han Baoyuan, Kong Xiangjin. Optimal Solution of Phase-Remapping Attack[J]. Acta Optica Sinica, 2015, 35(2): 227001

    [2] Dou Lei, Guo Dabo, Wang Xiaokai. Optimizing Multidimensional Reconciliation Algorithm for Continuous-Variable Quantum Key Distribution[J]. Acta Optica Sinica, 2016, 36(9): 927001

    [3] Yan Jin, Wang Xiaokai, Guo Dabo, Sun Yi. Security Analysis of Post-Processing in Quantum Gaussian Key Distributed[J]. Acta Optica Sinica, 2016, 36(3): 327003

    [4] Li Ruixue, Ma Haiqiang, Wei Kejin, Zhu Wu, Liu Hongwei. Polarization-Insensitive Phase Modulation in Fiber Quantum Key Distribution System[J]. Laser & Optoelectronics Progress, 2016, 53(4): 40601

    [5] Wang Zhe, Yao Zhihai, Gou Lidan, Wang Xiaoqian. Security Analysis of Three-State Quantum Key Distribution Protocol[J]. Laser & Optoelectronics Progress, 2017, 54(12): 122702

    [6] He Zhuanling, Guo Dabo, Wang Xiaokai. Security Capacity of Compound Wiretap Channel[J]. Laser & Optoelectronics Progress, 2015, 52(11): 112701

    [7] Hu Kang, Mao Qianping, Zhao Shengmei. Round Robin Differential Phase Shift Quantum Key Distribution Protocol Based on Heralded Single Photon Source and Detector Decoy State[J]. Acta Optica Sinica, 2017, 37(5): 527002

    Wang Yunyan, Guo Dabo, Zhang Yanhuang, Wang Xiaokai, He Zhuanling. Algorithm of Multidimensional Reconciliation for Continuous-Variable Quantum Key Distribution[J]. Acta Optica Sinica, 2014, 34(8): 827002
    Download Citation