An efficient hybrid hash based privacy amplification algorithm for
quantum key distribution
- URL: http://arxiv.org/abs/2105.13678v2
- Date: Mon, 7 Jun 2021 12:17:12 GMT
- Title: An efficient hybrid hash based privacy amplification algorithm for
quantum key distribution
- Authors: Yan Bingze, Li Qiong, Mao Haokun and Chen Nan
- Abstract summary: A novel privacy amplification algorithm is proposed in this paper.
It is implemented on a mobile CPU platform instead of a desktop CPU or a server CPU.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Privacy amplification (PA) is an essential part in a quantum key distribution
(QKD) system, distilling a highly secure key from a partially secure string by
public negotiation between two parties. The optimization objectives of privacy
amplification for QKD are large block size, high throughput and low cost. For
the global optimization of these objectives, a novel privacy amplification
algorithm is proposed in this paper by combining multilinear-modular-hashing
and modular arithmetic hashing. This paper proves the security of this hybrid
hashing PA algorithm within the framework of both information theory and
composition security theory. A scheme based on this algorithm is implemented
and evaluated on a CPU platform. The results on a typical CV-QKD system
indicate that the throughput of this scheme (261Mbps@2.6*10^8 input block size)
is twice higher than the best existing scheme (140Mbps@1*10^8 input block
size). Moreover, This scheme is implemented on a mobile CPU platform instead of
a desktop CPU or a server CPU, which means that this algorithm has a better
performance with a much lower cost and power consumption.
Related papers
- Multi-Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security [0.0]
We present a novel cryptographic system that integrates Quantum Key Distribution (QKD) with classical encryption techniques.
Our approach leverages the E91 QKD protocol to generate a shared secret key between communicating parties.
This key is then hashed using the Secure Hash Algorithm (SHA) to provide a fixedlength, high-entropy key.
arXiv Detail & Related papers (2024-08-13T15:20:29Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - A quantum algorithm for finding collision-inducing disturbance vectors
in SHA-1 [2.963904090194172]
Modern cryptographic protocols rely on sophisticated hash functions to generate quasi-unique numbers that serve as signatures for user authentication and other security verifications.
The security could be compromised by finding texts hash-mappable to identical numbers, forming so-called collision attack.
We propose an algorithm that takes advantage of entangled quantum states for concurrent seeding of candidate disturbance vectors.
arXiv Detail & Related papers (2022-10-23T16:01:17Z) - Asymmetric Scalable Cross-modal Hashing [51.309905690367835]
Cross-modal hashing is a successful method to solve large-scale multimedia retrieval issue.
We propose a novel Asymmetric Scalable Cross-Modal Hashing (ASCMH) to address these issues.
Our ASCMH outperforms the state-of-the-art cross-modal hashing methods in terms of accuracy and efficiency.
arXiv Detail & Related papers (2022-07-26T04:38:47Z) - Improved Polar-code-based Efficient Post-processing Algorithm for
Quantum Key Distribution [7.762056267745584]
This paper proposes an efficient post-processing algorithm based on polar codes for quantum key distribution.
By analyzing the channel capacity of the main channel and the wiretap channel respectively, we design a codeword structure of polar codes.
arXiv Detail & Related papers (2021-12-20T15:03:29Z) - Privacy amplification scheme based on composite coding [2.9848983009488936]
We propose a privacy amplification scheme based on composite coding, which is an extension of quantum CSS codes to classical linear codes.
The information-theoretic bound for the extraction of the key is obvious in composite coding.
arXiv Detail & Related papers (2021-09-15T07:58:09Z) - Large-scale and High-speed Privacy Amplification for FPGA-based Quantum
Key Distribution [0.0]
FPGA-based Quantum key distribution (QKD) system is an important trend of QKD systems.
This paper designs a new PA scheme for FPGA-based QKD with multilinear modular hash-modular arithmetic hash (MMH-MH) PA and number theoretical transform (NTT) algorithm.
arXiv Detail & Related papers (2021-07-02T12:35:55Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Space-efficient binary optimization for variational computing [68.8204255655161]
We show that it is possible to greatly reduce the number of qubits needed for the Traveling Salesman Problem.
We also propose encoding schemes which smoothly interpolate between the qubit-efficient and the circuit depth-efficient models.
arXiv Detail & Related papers (2020-09-15T18:17:27Z) - Hashing-based Non-Maximum Suppression for Crowded Object Detection [63.761451382081844]
We propose an algorithm, named hashing-based non-maximum suppression (HNMS) to efficiently suppress the non-maximum boxes for object detection.
For two-stage detectors, we replace NMS in region proposal network with HNMS, and observe significant speed-up with comparable accuracy.
Experiments are conducted on CARPK, SKU-110K, CrowdHuman datasets to demonstrate the efficiency and effectiveness of HNMS.
arXiv Detail & Related papers (2020-05-22T23:45:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.