ADVANCED ERROR CORRECTION METHOD USING LDPC CODES IN POST-PROCESSING STAGE IN QKD SYSTEMS

Authors

  • Bogdan Bilash National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic Instituteі
  • Oleksandr Lysenko National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic Instituteі

DOI:

https://doi.org/10.18372/2310-5461.51.15692

Keywords:

QKD, LDPC, error correction, parity-check matrix, post-processing

Abstract

This paper reviews the known error correction methods for QKD systems, identifies their advantages and disadvantages. The method of LDPC-codes is substantiated for improvement. Noise errors can occur when exchanging qubits between Alice and Bob through the quantum channel, and Bob may receive erroneous values ​​when measuring states that need to be corrected in the post-processing phase. The verification matrix for LDPC codes is quasi-cyclic, ie each subsequent row of the matrix is ​​cyclically shifted to the right by one bit relative to the previous row. This allows not only to describe the matrix only by the first line of the matrix, but also to use the property of isomorphism of circulating matrices with a ring of polynomials over the Galois field. That is, the verification matrix can be described by a certain polynomial. And the operations performed on this polynomial are applied to the matrix. Using such isomorphic properties of polynomials makes it much easier to create and store not only a test matrix but also a generating matrix, which avoids long-term matrix multiplications and the use of more memory to store matrix data, greatly simplifying hardware implementation. The code word is created by the method proposed by the author of LDPC-codes R. Gallagher. The decoding of code words in the original message uses a "soft" algorithm for spreading trust (belief-propagation algorithm) or sum-product algorithm (SPA), which has proven its effectiveness and is used in modern telecommunications systems. An algorithm for generating a verification matrix and an algorithm for generating a generating matrix based on the method for finding the inverse Euclidean-Wallis polynomial have been proposed and adapted for writing program code. Software has been created that implements the above algorithms, which can be found on the git repository

Author Biographies

Bogdan Bilash, National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic Instituteі

National Technical University of Ukraine

Igor Sikorsky Kyiv Polytechnic Instituteі

Oleksandr Lysenko, National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic Instituteі

Doctor of technical sciences, professor

National Technical University of Ukraine

Igor Sikorsky Kyiv Polytechnic Instituteі

References

Gnatyuk, S., Okhrimenko, T., Azarenko, O., Fesenko, A., Berdibayev, R. (2020). Experimental Study of Secure PRNG for Q-trits Quantum Cryptography Protocols. Procedings of 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT) (May 14-18, 2020, Kyiv).

Gnatyuk, S. (2013). COMPARATIVE ANALYSIS OF QUANTUM KEY DISTRIBUTION SYSTEMS. Naukoiemni Tekhnologiii. Vol. 17 No. 1 (2013). https://doi.org/10.18372/2310-5461.17.4761

Ekert, A. (1992). Quantum Cryptography and Bell’s Theorem. Physical Review Letters. P.P. 413–418. (1992) https://doi.org/10.1103/PhysRevLett.67.661

Shor, P. (1994). Algorithms for quantum computation: discrete logarithms and factoring. Proceedings 35th Annual Symposium on Foundations of Computer Science. IEEE Comput. Soc. Press: 124–134. (1994). https://doi.org/10.1109/sfcs.1994.365700

Bennett, C., Brassard, G. (1984) BB84, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. P.P. 174–179. (1984).

M. Milicevic, M., Feng, C., Zhang, L., Gulak, P. (2017). Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography. P.P. 1–23. (2017). https://doi.org/10.1038/s41534-018-0070-6

Sibson, P. (2016). Chip-based quantum key distribution. Nat. Commun. (Vol. 8, May, 2016). https://doi.org/10.1038/ncomms13984

Lucamarini, M., Yuan, Z., Dynes, J., Shields A. (2018). Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature. Vol. 557, №.7705, P.P. 400–403 (May, 2018). https://doi.org/10.1038/s41586-018-0066-6

Yuan, Z. (2018). 10-Mb/s Quantum Key Distribution. J. Light. Technol. Vol. 36, P.P. 3427–3433. (2018). https://doi.org/10.1109/JLT.2018.2843136.

Lo, H., Curty, M., Qi, B. (2012). Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. Vol. 108, №.13, P. 130503. (Mar. 2012). https://doi.org/10.1103/PhysRevLett.108.130503.

Park, C. (2018). Practical plug-and-play measurement-device-independent quantum key distribution with polarization division multiplexing. IEEE Access. Vol. 6, P.P. 58587–58593. (2018). https://doi.org/10.1109/ACCESS.2018.2874028

Park, B., Woo, M., Kim, Y., Cho, Y., Moon, S., Han, S. (2020). User-independent optical path length compensation scheme with sub-nanosecond timing resolution for a 1 × N quantum key distribution network system. Photonics Res. Vol. 8, №.3, P. 296. (Mar. 2020). https://doi.org/10.1364/PRJ.377101

Bilash, B. (2020). Modified Error-Correction method based on one-time pad in quantum key distribution systems. Naukoiemni Tekhnologiii №2 (46), С. 129-136 (2020) https://doi.org/10.18372/2310-5461.46.14803 (In Ukrainian).

Eriksson, T. (2019). Crosstalk Impact on Continuous Variable Quantum Key Distribution in Multicore Fiber Transmission. IEEE Photonics Technol. Lett., Vol. 31, №.6, P.P. 467–470. (2019). https://doi.org/10.1109/LPT.2019.2898458

Brassard, G., Salvail, L. (1994). Secret-key reconciliation by public discussion. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics). Vol. 765 LNCS, P.P. 410–423. (1994) https://doi.org/10.1007/3-540-48285-7_35

Buttler, W., Lamoreaux, S., Torgerson, J., Nickel, G., Donahue, C., Peterson, C. (2003). Fast, efficient error reconciliation for quantum cryptography. Phys. Rev. A - At. Mol. Opt. Phys., vol. 67, №.5, P. 8. (2003) https://doi.org/10.1103/PhysRevA.67.052303

Gallager, R. (1963). Low density parity check codes. Cambridge: M.I.T. Press. P. 90. (1963).

Mackay D., Neal, R. (1995). Good codes based on very sparse matrices. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 1025, P.P. 100–111. https://doi.org/10.1007/3-540-60693-9_13

MacKay, D. (1999) Good error-correcting codes based on very sparse matrices. IEEE Trans. Inf. Theory. Vol. 45, №.2, P.P. 399–431. (1999). https://doi.org/10.1109/18.748992

Bilash, B., Park, B., Park, C., Han, S. (2020). Error-Correction Method Based on LDPC for Quantum Key Distribution Systems. 2020 International Conference on Information and Communication Technology Convergence (ICTC). https://doi.org/10.1109/ICTC49870.2020.9289451

Fossorier, M. (2004). Quasicyclic low-density parity-check codes from circulant permutation matrices. Information Theory, IEEE Transactions. Vol. 50, no. 8, pp. 1788–1793. (Aug. 2004).

Johnson, S. (2005). Introducing Low-Density Parity-Check Codes.

Philip, D., Circulant Matrices, Wiley. ISBN. (New York, 1970).

Vlasov, E. Finite fields in telecomuting applications. Theory and practice. FEC, CRC. Moscow: Nauka (In Russian).

Linear diophanite equation. Retrieved from https://math.stackexchange.com/questions/67969/linear-diophantine-equation-100x-23y-19/68021#68021

Sibson, P. (2017). Chip-based quantum key distribution. Nat. Commun. Vol. 8, No. (May, 2016) https://doi.org/10.1038/ncomms13984

Inverse polynomial. Retrieved from https://notabug.org/clasicus/Studying/src/master/Quantum%20Cryptography/Error%20Correction/Inverse%20Polynomial

Published

2021-10-28

Issue

Section

Information technology, cybersecurity