[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2179298.2179363acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

An empirical analysis of the cascade error reconciliation protocol for quantum key distribution

Published: 12 October 2011 Publication History
First page of PDF

References

[1]
Brassard, G. (1993). A bibliography of quantum cryptography. ACM SIGACT News, 24 (3), 16-20.
[2]
Bennett, C. H., & Brassard, G. (1984). Quantum Cryptography: Public Key Distribution and Coin Tossing. International Conference on Computers, Systems & Signals Processing. Bangalore, India.
[3]
Nakassis, A., Bienfang, J., & Williams, C. (2004). Expeditious reconciliation for practical quantum key distribution. Quantum Information and Computation, Proc. SPIE 5436.
[4]
Ardehali, M., Chau, H. F., & Lo, H.-K. (1999, Jan 29). arXiv:quant-ph/9803007v4. Retrieved Mar 4, 2011.
[5]
Van Assche, G. (2006). Quantum Cryptography and Secret-Key Distillation. Cambridge: Cambridge University Press.
[6]
Kollmitzer, C., & Pivk, M. (Eds.). (2010). Applied Quantum Cryptography. Lecture Notes in Physics, 797, 1. Springer, Berlin Heidelberg.
[7]
MacKay, D. J. (2005). Information Theory, Inference, and Learning Algorithms (4th Edition ed.). Cambridge: Cambridge University Press.
[8]
Yan, H., Ren, T., Peng, X., Lin, X., Jiang, W., & Liu, T. (2008). Information Reconciliation Protocol in Quantum Key Distribution System. Fourth International Conference on Natural Computation, (pp. 637-641). Jinan.
[9]
Lustic, K. (2011) Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol. Master's Thesis, AFIT/GCO/ENG11-08, Department of Computer and Electrical Engineering, Air Force Institute of Technology, June 2011.
[10]
Bennett, C. H., Bessette, F., Brassard, G., Salvail, L., & Smolin, J. (1992). Experimental quantum cryptography. Journal of Cryptology, 5 (1), 3-28.
[11]
Brassard, G., & Salvail, L. (1994). Secret-key reconciliation by public discussion. Workshop on the theory and application of cryptographic techniques on Advances in cryptology (pp. 410-423). Lofthus, Norway: Springer-Verlag.
[12]
Matsumoto, M., & Nishimura, T. (1998). Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul., 8 (1), 3-30.
[13]
Calver, T. (2011). An Empirical Analysis of the Cascade Secret Key Reconciliation Protocol for Quantum Key Distribution. Master's Thesis, AFIT/GIR/ENV/11-S01, Department of Systems Engineering and Management, Air Force Institute of Technology, September 2011.

Cited By

View all
  • (2024)An Overview of Postprocessing in Quantum Key DistributionMathematics10.3390/math1214224312:14(2243)Online publication date: 18-Jul-2024
  • (2023)Using Cascade in quantum key distributionPhysical Review Applied10.1103/PhysRevApplied.20.06404020:6Online publication date: 22-Dec-2023
  • (2022)SPoTKD: A Protocol for Symmetric Key Distribution Over Public Channels Using Self-Powered Timekeeping DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.315808917(1159-1171)Online publication date: 2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '11: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
October 2011
18 pages
ISBN:9781450309455
DOI:10.1145/2179298
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Eurosis: Eurosis
  • Oak Ridge National Laboratory
  • University of Tennessee: University of Tennessee

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

CSIIRW '11
Sponsor:
  • Eurosis
  • University of Tennessee

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)3
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An Overview of Postprocessing in Quantum Key DistributionMathematics10.3390/math1214224312:14(2243)Online publication date: 18-Jul-2024
  • (2023)Using Cascade in quantum key distributionPhysical Review Applied10.1103/PhysRevApplied.20.06404020:6Online publication date: 22-Dec-2023
  • (2022)SPoTKD: A Protocol for Symmetric Key Distribution Over Public Channels Using Self-Powered Timekeeping DevicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.315808917(1159-1171)Online publication date: 2022
  • (2022)Fundamentals of Quantum Key DistributionQuantum Key Distribution Networks10.1007/978-3-031-06608-5_1(1-28)Online publication date: 13-Sep-2022
  • (2020)Quantum Key Distillation Using Binary FramesSymmetry10.3390/sym1206105312:6(1053)Online publication date: 24-Jun-2020
  • (2020)Quantum Cryptography and SimulationProceedings of the 2020 4th International Conference on Cryptography, Security and Privacy10.1145/3377644.3377671(36-41)Online publication date: 10-Jan-2020
  • (2020)Error Reconciliation in Quantum Key Distribution ProtocolsReversible Computation: Extending Horizons of Computing10.1007/978-3-030-47361-7_11(222-236)Online publication date: 12-May-2020
  • (2019)Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh TopologyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.283766114:1(18-33)Online publication date: Jan-2019
  • (2013)An analysis of error reconciliation protocols used in Quantum Key Distribution systemsThe Journal of Defense Modeling and Simulation: Applications, Methodology, Technology10.1177/154851291350341812:3(217-227)Online publication date: 11-Sep-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media