Next Article in Journal
Aggregating Knockoffs for False Discovery Rate Control with an Application to Gut Microbiome Data
Next Article in Special Issue
An Attack on Zawadzki’s Quantum Authentication Scheme
Previous Article in Journal
Information Rate in Humans during Visuomotor Tracking
Previous Article in Special Issue
Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings’ Problem
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Beyond the Limits of Shannon’s Information in Quantum Key Distribution

by
Luis Adrián Lizama-Pérez
1,*,
J. Mauricio López R.
2 and
Emmanuel H. Samperio
1
1
Dirección de Investigación, Innovación y Posgrado, Universidad Politécnica de Pachuca, Ex-Hacienda de Santa Bárbara, Zempoala, Hidalgo 43830, Mexico
2
Cinvestav Querétaro, Libramiento Norponiente 2000, Real de Juriquilla, Santiago de Querétaro, Querétaro 76230, Mexico
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(2), 229; https://doi.org/10.3390/e23020229
Submission received: 18 December 2020 / Revised: 4 February 2021 / Accepted: 10 February 2021 / Published: 16 February 2021

Abstract

:
We present a new post-processing method for Quantum Key Distribution (QKD) that raises cubically the secret key rate in the number of double matching detection events. In Shannon’s communication model, information is prepared at Alice’s side, and it is then intended to pass it over a noisy channel. In our approach, secret bits do not rely in Alice’s transmitted quantum bits but in Bob’s basis measurement choices. Therefore, measured bits are publicly revealed, while bases selections remain secret. Our method implements sifting, reconciliation, and amplification in a unique process, and it just requires a round iteration; no redundancy bits are sent, and there is no limit in the correctable error percentage. Moreover, this method can be implemented as a post-processing software into QKD technologies already in use.

1. Introduction

To put it in historical context, fiber-optic telecommunications over long distances was not possible until manufacturing techniques that improved drastically its efficiency were developed. Fibers had been used to see inside the body, but they remained unusable for long-distance information transfer because too much light was lost along the way. However, in the 1960s, Charles Kao introduced a new disruptive approach based on pure glass fibers and laser technology with transcendent achievements [1].
In the quantum era, Quantum Key Distribution (QKD) is one of the most promising technologies to secure the information intended to cross data networks. However, the development of new techniques for the rapid establishment of secret key information using quantum pulses over long distances has become unpostponable [2,3,4,5,6].
Unfortunately, some factors prevent QKD of becoming a widely used technology as its inability to reach long-distances and produce large keys at high speed. The greatest weakness of QKD technology lies in its ability to gain useful information to establish a secret key despite the noise in the quantum channel [7,8]. On the one hand, noise provides the possibility for an attacker to disguise themselves, and, on the other hand, it imposes severe difficulties to correct errors produced during transmission in order to derive two identical cryptographic keys at both sides of the quantum link [9,10]. In the case of BB84 protocol, it has been estimated that a secure key can be distilled when the quantum bit error rate (QBER) is less than 11% [11].
In the few past years, we have developed a new scheme for QKD quantum called quantum flows [12,13,14] capable of resisting challenging attacks [15,16,17,18,19,20,21,22,23,24,25]. In quantum flows approach, Alice sends to Bob a pair of quantum states, parallel or non-orthogonal, which is chosen randomly. Bob measures the two quantum states with the same measurement basis, X or Z under active basis selection. If Bob obtains the same result, a single bit has been transmitted from Alice to Bob. Quantum flows have allowed us to formulate a new method for QKD distillation based on binary structures called frames. Framed reconciliation integrates the regular QKD stages of sifting, reconciliation, and amplification in a unique process. This property makes our method unique in the context of QKD distillation; moreover, it accelerates convergence and produces a key that grows cubically in the number of double detection events.
In this work, we enhance the framed reconciliation method showed previously for 2 × 2 frames [14], and we discuss that framed reconciliation can surpass Shannon’s information bounds for noisy channels. We strongly recommend that the reader consults our previous work on Quantum Key Distillation Using Binary Frames, so that we can keep the present article concise, as far as possible. Basic concepts comprise quantum flows, non-orthogonal quantum states, quantum photonic gains, binary frames, and matching results (MR). Having introduced 2 × 2 frames, which are the frames with the minimum size, we discuss here 3 × 2 frames. Throughout the article, we will compare both schemes.

2. Communication Model

Classical theory of communication, as it was established by Claude Shannon in 1948, defines a general communication system where Alice (the information source) prepares an information signal, that she sends over a noisy channel, but it corrupts at least in part due to the presence of noise in the channel [26,27]. At the other side, Bob receives this information signal, but Alice and Bob must implement a processing method to recover from the errors produced during transmission [28,29,30,31,32].
Shannon’s theory imposes a limit to the highest transmission speed over a noisy channel because it can never surpass the channel capacity. The coding rate is computed as the number of message symbols divided by the number of transmitted signals. A higher coding rate means higher transmission speed. When the efficiency of the codes approximates to the channel capacity by increasing the number of transmitted signals, it is known that these codes approach to the Shannon limit. However, a coding rate too high makes it impossible to achieve a decoding error probability close to zero because the optimum channel capacity is achievable just by letting the number of transmitted signals reach infinity [33]. We claim our method goes beyond this limit because it does not require the number of transmitted signals to be increased. In fact, the coding rate reaches unity. The QKD protocol in Reference [34] exhibits a total efficiency of the communication to come up to 100%, but it does not define an error correction algorithm.
On the other side, if e is the probability that a transmitted 0 bit is received as a 1 and 1 e is the probability to be received as a 0, Shannon theory implies that, in case that e = 0.5 , one can never say anything about the original message [35,36] because the entropy is maximized when the two possible outcomes are equally probable. Since our method corrects errors when e = 0.5 , we claim that it goes beyond the limits implied by Shannon’s theory.
In our approach, we call active (or real) information that which is derived from Shannon’s model viewpoint because information is first prepared by Alice, then transmitted through the (quantum) channel, and, finally, recovered by Bob after it has been measured and proven to be correct. Conversely, in our scheme, information is not enclosed in the transmitted quantum pulses but in the quantum bases (X or Z) that Bob chooses at the other side. In fact, measured bits are publicly announced but the measurement bases are never revealed. We designated reactive information to this communication paradigm that we introduced to the sifting QKD procedure.
Reactive bits are computed using Bob’s measurement bases, so errors produced in the quantum channel are easily detected by Alice because such bits are publicly revealed by Bob. Remarkably, in the presence of the unit error rate, information can still be recovered since errors give reactive information by themselves. For the same reason, not all of Alice’s information can be recovered, even in the absence of errors produced by the quantum channel.
Two reconciliation approaches have been conceived in QKD: direct and reverse reconciliation. In reverse reconciliation (RR), Alice must infer Bob’s outcomes, rather than Bob guessing Alice’s encodings, known as direct reconciliation (DR). Under this classification frame, reconciliation is RR, so let us briefly contrast our approach with RR which was introduced in the context of continuous variable QKD [31,37].
It has been demonstrated that RR reconciliation achieves longer distances even beyond the 3dB limit of previous CV-QKD works [38]. RR reconciliation has been implemented over LDPC basis [39], and it was shown that LDPC codes can reach within 0.0045 dB of the Shannon limit. Unfortunately, it requires large block lengths ( 10 7 ) [40]. Even more, decoding LDPC has larger computational and memory requirements than either Cascade or Winnow algorithms [41]. In contrast, our method does not require additional bits which reduces the coding rate. Our experimental simulations show complete efficiency in detecting/correcting errors. Moreover, the secret throughput grows cubically in the number of double detection events.
Before we introduce 3 × 2 frames, we will explain quantum communication based on frames through a simple example about our reconciliation method. To facilitate its exposition, we use 2 × 2 frames in this example. Then, to simplify exposition we discuss the role of auxiliary frames in the 2 × 2 case. In Section 3, we address the research methodology for 3 × 2 frames and then we detail the QKD distillation protocol. To make the discussion more effective, we have placed tables of 3 × 2 protocol in the Appendix A. Finally, in Section 4, we analyze the efficiency and the security of the 3 × 2 protocol against different attacks as the Intercept-Resend (IR) attack and the Photon Number Splitting (PNS) attack.

2.1. Quantum Communication

In the BB84 protocol [42,43,44,45], a quantum state | i X (or | i Z ), where i represents the encoded bit ( i = 0 , 1 ), is useful to be distilled whenever it has been measured in the proper (compatible) quantum basis, basis X for | i X (or Z for | i Z ). Otherwise, a non-compatible measurement is produced, the bit derived from this measurement is ambiguous, and it must be discarded. However, in the quantum flows scheme, ambiguous cases can still be used for the following reasons [14]:
  • The states are grouped by non-orthogonal pairs | i X , | i Z or | i X , | ( i 1 ) Z , where i = 0 , 1 .
  • A non-orthogonal pair is measured with the same quantum basis X or Z. Both measurements yield the same result half of the times, i.e., if measuring | i X , | i Z with X (or Z) gives i, or measuring | i X , | ( i 1 ) Z with X (or Z) gives i or 1 i , in both cases. We call those cases double matching detection event. Then, non-compatible measurements never occur.
  • It implies that the bit encoded in the X or Z basis is transmitted from Alice to Bob. This communication model defines two communication channels, channel X and channel Z, because there are two bits enclosed in a non-orthogonal quantum pair: one bit over channel X and other bit in channel Z. Bob just chooses which channel he wants to use. Provided a double matching detection event is generated, both measurements are equally useful.

2.2. Example of Error Correction

In order to better introduce our communication model, let us illustrate it with a simple example to contrast it with Shannon’s model. To see the effect of the errors instead of the losses in the channel, let us assume a conservative quantum channel. Table 1 shows an hypothetical QKD protocol possibly based on BB84, where Alice has sent 18 quantum states (in practical implementations, some sifted bits must be sacrificed to estimate the error rate of the channel). In this example, a 30% error rate (e) is produced; therefore, the QKD distillation process must be declined because prominent reconciliation algorithms, such as Cascade, Winnow, or LDPC, cannot work with this high error rate.
Let us suppose that the same errors are produced using the framed reconciliation method as it is illustrated in Figure 1. In this example, we ignored the losses due to double detection events and the amplification gain produced by the amount of combinations between double matching detection events (we will discuss them later). The reconciliation based on frames can process this error rate; in fact, it can reconcile any error rate that e has in the channel, so there is no need to estimate e wasting bits for this purpose. To simplify the exposition, in this example, we used 2 × 2 frames, but we will discuss 3 × 2 frames in the Distillation Method section.

2.3. Auxiliary Frames

A major component of the framed reconciliation method relies in the auxiliary frames. There are two types of auxiliary frames: zero frames and testing frames. Every quantum state of a zero frame is | 0 X or | 0 Z . Identifying measurement errors in a zero frame is easy, as we will see later. A testing frame contains one row that is under evaluation because it presumably contains error, and the rest of the rows come from a zero verified frame.
To compute the sifting string (SS), we follow the next procedure: A sifting string is constructed concatenating the bits that result after the ⊕ logical operation is applied to each column of the frame (a blank space is treated as a zero bit) and putting the measured bits that are produced by the optical detectors. The secret bits are derived from the code that is assigned to the arrangement of measurements inside the frame. We call measurement results (MR) to this arrangement. To see the role of auxiliary frames, let us assume that we intend to apply the framing algorithm to the Shannon’s model; thus, several zero bits are interleaved between the secret bits to be used as auxiliary correcting bits.
  • To achieve reconciliation in Shannon’s model, the first step is to ensure that auxiliary zero bits are error-free. However, Shannon’s 2 × 1 frames does not allow to identify errors in two consecutive zero bits (at least in one round iteration) as indicated by the following relations:
    0 0 = 1 1 = 0 ( SS ) .
    In addition, when using 2 × 1 frames, there is a unique possible matching result (MR), that is written below; therefore, no secret information can be derived from MRs in Shannon’s model.
    | | .
  • By contrast, using 2 × 2 frames, errors in the auxiliary frames can be easily identified. Here, we list the error-free zero frames:
    | 0 X | 0 Z = | 0 Z | 0 X = | 0 X | 0 X = | 0 Z | 0 Z = 00 , 00 ( SS ) ,
    which can be compared, for illustrative purposes, to the erroneous cases:
    | 1 X | 1 Z = | 1 Z | 1 X = 11 , 11 ( SS ) ,
    | 1 X | 1 X = | 1 Z | 1 Z = 00 , 11 ( SS ) .
  • Ambiguous SS are produced in regular frames. For example, to the left, we indicate that Alice sends the frame f 2 to Bob, who measures it using MR = 11. However, when applying the Z measurement basis, the photo-detector yields an error reporting | 1 Z instead | 0 Z ; so, we have:
    f 2 a = | 1 X | 0 Z | 1 X | 1 Z , f 2 b = | 1 Z | 1 X = 11 , 11 ( SS ) .
    When Alice receives the string SS = 11,11 which belongs to f 2 , she knows it implies two possibilities: either SS comes from the error-free string SS 24 = 11 , 11 under MR = 10 in f 2 or an error is produced in the first measured bit that actually corresponds to the string SS 23 = 10 , 01 under MR = 11 in f 2 . To disambiguate it, Alice uses the auxiliary frame f 10 . Thus, she looks at a frame f 10 where the ambiguous row , | 1 Z is allocated. Remember that each row is combined with each other. Previously, the second row of f 10 , i.e., | 0 X , , was verified as a zero frame. Then, suppose Alice finds the following f 10 case:
    f 10 = | 1 Z | 0 X = 10 , 10 .
The sifting string 10,10 reveals that an error exists in the row that is under evaluation; therefore, Alice decides SS 23 . Then, the pair ( SS 23 , f 2 ) determines Alice’s secret bit. It must be highlighted that the sifting strings of auxiliary frames cannot be distinguished from other identical SS from regular frames, so privacy is guaranteed. In fact, it is ensured that each SS can proceed equally from each bit.

2.4. One-Time Pad XOR Equivalency

It is known that the XOR one-time pad encryption method is a perfect cryptosystem provided the crypto key achieves the same number of bits as the plaintext. Let us show that the framing method actually behaves as one-time encryption. First, in Table 4, we can see the logical XOR (⊕) function. Each encrypted bit c could be produced by each key bit denoted as k.
As specified in the framed reconciliation method [14], Bob must reveal the sifting bits along the measured bits. However, each SS maps two different MRs, as can be verified in Table 5. Since secret bits are enclosed in MRs, we proved that secret bits of the framing protocol are equivalent to the secret bits of the XOR one-time pad cryptosystem. The same analysis can be applied to the 3 × 2 frames.

3. Distillation Method with 3 × 2 Frames

Before we detail the steps of the distillation method for 3 × 2 frames, let us describe the research methodology we applied:
  • The 3 × 2 frames must be identified: there are 4 3 = 64 binary 3 × 2 frames.
  • The measurement results (MR) must be specified: in 3 × 2 frames, there are 8 MR. Those MR are illustrated in Table A2 of Appendix A.
  • Frames are classified as usable and useless frames: a usable frame is a frame that produces a distinct SS under each MR. In 3 × 2 frames, there are 8 distinct SS per frame and 24 usable frames. Sifting bits are written in Table A4 of Appendix A. Remember that Sifting Strings (SS) are composed by the sifting bits and the measured bits: SS = 1 st sifting bit | | 2 nd sifting bit | | 3 th sifting bit , 1 st measured bit | | 2 nd measured bit | | 3 th measured bit . The 3 th sifting bit is appended to achieve discrimination, and it can be considered as a parity sifting bit.
  • Auxiliary frames which are intended to catch errors produced in regular frames must be identified. In 3 × 2 frames, there are 3 auxiliary frames labeled as f 25 , f 26 , and f 27 . The frame f 25 is the zero frame and is used to verify the two (below) rows of the testing frames f 26 and f 27 . The upper row of f 26 and f 27 is the row that is being tested. In the end, Alice will include the auxiliary frames inside the set of frames that Bob must remove. Auxiliary frames are listed in Table A1 of Appendix A.
  • All usable frames under each MR must be expanded to analyze all possible errors through SS, from single to multiple errors. Then, ambiguous SS that can be corrected under the auxiliary frames must be detected. In addition, all the SS that cannot be disambiguated must be identified and the corresponding frames must be removed. We show in Table A5 the cases that can be successfully disambiguated.
  • At Bob’s side, each (SS, MR) pair defines a secret bit (sb). For Alice, the same secret bit results from the pair (SS, f i ) because she knows the frame that is behind each SS. It must be guaranteed that each SS can be produced equally by both bits. In addition, it must be ensured that each secret bit proceeds from the same number of frames, so that the bit probability of each SS is the same in order to reduce the eavesdropper’s information gain (SS are publicly transmitted over the classical channel). This action may involve removing some extra SS. Alice sends to Bob the set of SS of all the frames that must be eliminated including auxiliary frames. Table A3 of Appendix A enlists SS, MR, frames, and sb.
Now, we can proceed to summarize the steps of the distillation method for 3 × 2 frames that comprises sifting, reconciliation, and privacy amplification. The overall steps of the process are indicated in Figure 2:
  • Alice sends some non-orthogonal quantum pairs either ( | i X , | i Z ) or ( | i X , | ( 1 i ) Z ) where i = 0 , 1 . Although quantum non-orthogonal pairs can be mutually interleaved they are numbered, so each pair can be identified by Alice and Bob
  • Bob measures each quantum pair using the same measurement basis (X or Z) which is chosen randomly (under active basis measurement). Some double detection events are produced. Bob informs Alice the tag number of such quantum pairs.
  • Alice computes all usable frames including null frames and auxiliary frames. She communicates to Bob the frame arrangement information. We call this step privacy amplification.
  • Bob computes the Sifting String (SS) of each frame. He returns the set of Siting Strings he obtained to Alice.
  • Alice analyzes the SS received from Bob:
    • She generates frames f 25 to prepare the auxiliary frames.
    • Using auxiliary frames, Alice removes ambiguity. Alice gets the secret bits using the relation (SS, f i ) and Table A3 of Appendix A.
    • Alice informs Bob of the cases that must be eliminated (because they cannot be disambiguated).
  • Bob removes the frames identified by Alice to reach Alice’s secret bit string. Bob’s secret bits are derived from (SS, MR) and Table A3 of Appendix A.

4. Secret Rate

The secret rate of the framed reconciliation method can be derived directly from frames without recurring to quantum physics mathematical relations. First off, we must enlist the Sifting String (SS) generated by all the frames classified by Measurement Result (MR) and separate the error-free SS from the erroneous SS (single and multiple errors). According to the size of frames (2 × 2 or 3 × 2), the error could be in the first bit, second bit, third bit, two bits, two of three bits, and three bits simultaneously. Then, we proceed to identify ambiguous SS, (because they appear simultaneously as error-free SS and erroneous SS for a given frame). Then, we identify the SS that can still be used after they are inspected under auxiliary frames. We call those cases unequivocal SS cases.
We calculate the secret rate (in absence of eavesdropping) as the sum up of the information derived from the unequivocal error-free rate and the amount of information derived from the unequivocal erroneous rate (unequivocal error-free rate is obtained as the number of unequivocal error-free SS under the total number of error-free SS; conversely, the unequivocal error rate is obtained as the rate of unequivocal erroneous SS over the total erroneous SS cases). As mentioned earlier, unequivocal means that ambiguity can be removed using auxiliary frames. The bits from remaining SS must be eliminated since they do not contribute to the secret rate.
In Table 6, we detail the deduction of the secret rate. Each SS contributes with a single bit. In 2 × 2 frames, we have 4 usable frames, and each one generates 4 SS; to compute the unequivocal erroneous rate, we have 2 SS per frame that can be recovered from 12 SS per frame yields 1 6 . On the other hand, to derive the unequivocal error-free rate, we have 2 SS per frame that can be recovered from 4 SS per frame it yields 1 2 . The unequivocal erroneous rate in 3 × 2 frames yields 1 3 , and the unequivocal error-free rate gives 1 21 (see Figure 3).

4.1. Secret Throughput

One of the main advantages of the reconciliation method based on frames is the total number of secret bits that results when the framing gain is applied. Remarkably, framing gain results from the amount of total combinations among double matching detection events. We call this process privacy pre-amplification (or amplification in short). Therefore, we compute the secret throughput multiplying the secret rate by the framing gain. In the case of 2 × 2 frames, we have 4 usable frames under 16 total frames, so the framing gain is 1 4 n 2 . Conversely, in 3 × 2 frames, there are 24 over 64 frames, so the framing gain is 3 8 n 3 . Equation (2) describes the secret throughput for each case.
I a b ( 2 x 2 ) = 1 4 n 2 1 2 1 3 e I a b ( 3 x 2 ) = 3 8 n 3 1 3 2 7 e .
Just to appreciate the growth rate of each frame size, we compute, in Table 7, some values of the secret throughput as a function of n and e. As it can be inferred, 3 × 2 frames have a visible advantage to produce secret bits, e.g., when n = 10 3 , it raises the secret throughput to n = 10 8 bits.

4.2. Rate Code

The rate code r a b is the relation between the secret information and the total bits generated to achieve reconciliation. In the case of 2 × 2 frames, the total information is 4 n 2 , while the total number is 6 n 3 in 3 × 2 frames. The rate code for each size of frame is written in Equation (2).
r a b ( 2 × 2 ) = 1 16 1 2 1 3 e r a b ( 3 × 2 ) = 1 16 1 3 2 7 e .

4.3. Secret Key Rate

In the case of frame reconciliation, the eavesdropper has a great disadvantage since they do not know Bob’s bases selection because they are not revealed over the classical channel. Even if the eavesdropper captures some copies of the quantum pulses, they must deal with the double detection events and the basis choices. Moreover, although the eavesdropper could replicate some double detection events, Alice performs all combinations between double detection events. As a consequence of the privacy amplification process, the eavesdropper’s information reduces even more.

4.3.1. The Intercept and Resend Attack (IR)

In the Intercept and Resend (IR) attack, the eavesdropper first measures each pair of non-orthogonal quantum pulses in the quantum channel, and then they send another pair of quantum pulses to Bob prepared according to the same quantum states.
Since secret bits are derived only from double matching detection events, Eve must produce first a double matching detection event using the quantum states she intercepts in the quantum channel because no useful information could be extracted from double non-matching detection events nor even single detection events.
In addition, Eve must guarantee that both states she resends to Bob’s station achieve his optical detectors, which imposes a severe difficulty because vacuum or single detection events are more probable than double detection events. However, suppose Eve forces both quantum states to arrive Bob’s receiver station. We can derive the efficiency of the IR attack using the following example:
Alice sends the non-orthogonal pair ( | 0 X , | 0 Z ) to Bob over the quantum channel. Eve measures them using Z basis, and let us assume she obtains a double matching detection event, say ( | 0 Z , | 0 Z ) .
Eve prepares and sends the quantum pair ( | 0 Z , | 0 Z ) to Bob.
Suppose Eve can force both quantum pulses to arrive to Bob’s optical station. There are two quantum measurement bases (X or Z) and five possible outcomes:
1 2 due to Bob’s Z basis: ( | 0 Z , | 0 Z ) .
1 2 due to Bob’s X basis: { ( | 0 X , | 0 X ) , ( | 1 X , | 1 X ) , ( | 1 X , | 0 X ) , ( | 0 X , | 1 X ) } .
To match Eve’s double detection event ( | 0 Z , | 0 Z ) , Bob must choose the Z basis which occurs with 1 2 probability, so Eve’s final probability is 1 4 .
The overall scheme is depicted in the following diagram, where Q ( + , + ) represents Alice’s pairs of non-orthogonal states:
Entropy 23 00229 i001

4.3.2. The Photon Number Splitting Attack (PNS)

The eavesdropper has a copy of all the quantum states that arrive to Bob’s station because Alice sends attenuated (multi-photon) quantum pulses, and the eavesdropper is equipped with a sufficiently large quantum memory. However, the eavesdropper’s probability of getting a double matching detection event is 1 2 . In addition, Eve must measure choosing between two different measurement basis (X or Z); thus, his final probability is 1 4 :
  • 1 2 because of the probability to get a double matching detection event.
  • 1 2 due to basis matching. Eve must measure choosing between two different measurement basis (X or Z).
Entropy 23 00229 i002

4.3.3. The Bases Choice Attack (BC)

The eavesdropper would decide to apply another quantum measurement bases to gain more information, and then they use the measurement bases X + Z or X Z . First, consider that the eavesdropper chooses between the measurement bases ( X + Z or X Z ) with 0.5 probability. However, non-matching detection events are ambiguous for the eavesdropper, which occur with 6 16 probability. In contrast, they get a double matching event with 9 16 probability. As a result, the chance to get Bob’s information is 9 32 .
Equation (3) shows the relation to compute the secret key rate for each frame size. It is written as the secret information multiplied by the rate between the total frames produced by Alice and those the eavesdropper duplicates.
Δ I ( 2 X 2 ) = 1 2 1 3 e 1 R · n 2 n 2 Δ I ( 3 X 2 ) = 1 3 2 7 e 1 R · n 3 n 3 .
Table 8 shows the final secret key information for each attack: Intercept and Resend attack (IR), Photon Number Splitting attack (PNS), and Basis Choice attack (BC). In the case of 2 × 2 frames, we have ignored the linear term n that is generated in n 2 because the quadratic term n 2 is dominant. In the same way, we omitted the quadratic and linear terms produced by n 3 because of the high order of the cubic term.
As it can be deduced from Table 8, the secret key rate is affected slightly by the eavesdropper’s behavior. This new scenario opens the possibility to employ less attenuated pulses as in CV-QKD to achieve, on one hand, long-distances quantum links or, on the other, portable QKD in closed buildings [46].

5. Conclusions

We have discussed a new post-processing method for Quantum Key Distribution (QKD) that raises cubically the secret key rate in the number of double matching detection events. Secret bits are derived from reactive bits instead of Shannon information, so Bob’s measured bits are publicly revealed, while bases selections remain secret. Our method implements sifting, reconciliation, and amplification in a unique process, and it just requires a round iteration; no redundancy bits are sent, and no limit in the correctable error percentage. Despite the fact that the reconciliation is performed with a unity error channel, the secret rate is kept, at least theoretically, in 16% using 2 × 2 frames and 4.7% when using 3 × 2 frames.
It is not difficult to evaluate the security of this method because it can be evaluated directly through the frames. There is no dependency on other security mechanism as hash functions.
The protocol works fast, at least theoretically, convergence is guaranteed, and it can be implemented as a post-processing software into QKD technologies.

Author Contributions

L.A.L.-P. conceived of the presented idea, he developed the theoretical formalism, J.M.L.R. supervised the project and contributed to the interpretation of the results and E.H.S. performed software and numerical simulations. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by National Council of Science and Technology of Mexico (CONACyT) and Center for Research and Advanced Studies of the National Polytechnic Institute of Mexico (Cinvestav-IPN).

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available within the article.

Conflicts of Interest

The authors declare no conflict of interest in this article.

Appendix A

This Appendix contains the relevant tables used for the framed methodology:
  • Table A1 describes the complete set of 3 × 2 frames.
  • MR are illustrated in Table A2.
  • Table A3 enlists SS, MR, frames, and sb.
  • Sifting bits are written in Table A4.
  • Table A5 shows the cases that can be successfully disambiguated.
Table A1. There are 24 useful frames: f i , where i = 1 , , 24 and 3 Auxiliary frames f j , where j = 25 , , 27 .
Table A1. There are 24 useful frames: f i , where i = 1 , , 24 and 3 Auxiliary frames f j , where j = 25 , , 27 .
Useful FramesAuxiliary Frames
f 1 = | 0 X | 0 Z | 0 X | 1 Z | 1 X | 0 Z f 2 = | 1 X | 0 Z | 0 X | 1 Z | 0 X | 0 Z f 3 = | 0 X | 0 Z | 1 X | 0 Z | 0 X | 1 Z f 25 = | 0 X | 0 Z | 0 X | 0 Z | 0 X | 0 Z
f 4 = | 1 X | 0 Z | 1 X | 0 Z | 1 X | 1 Z f 5 = | 1 X | 1 Z | 0 X | 1 Z | 0 X | 0 Z f 6 = | 1 X | 0 Z | 1 X | 1 Z | 0 X | 0 Z f 26 = | 0 X | 1 Z | 0 X | 0 Z | 0 X | 0 Z
f 7 = | 0 X | 1 Z | 1 X | 0 Z | 0 X | 0 Z f 8 = | 0 X | 1 Z | 1 X | 0 Z | 1 X | 0 Z f 9 = | 1 X | 0 Z | 1 X | 0 Z | 0 X | 1 Z f 27 = | 1 X | 1 Z | 0 X | 0 Z | 0 X | 0 Z
f 10 = | 1 X | 1 Z | 1 X | 0 Z | 1 X | 0 Z f 11 = | 0 X | 1 Z | 1 X | 1 Z | 0 X | 0 Z f 12 = | 0 X | 0 Z | 1 X | 1 Z | 0 X | 1 Z
f 13 = | 0 X | 0 Z | 1 X | 0 Z | 1 X | 1 Z f 14 = | 1 X | 1 Z | 1 X | 0 Z | 0 X | 0 Z f 15 = | 0 X | 0 Z | 0 X | 1 Z | 1 X | 1 Z
f 16 = | 0 X | 1 Z | 0 X | 1 Z | 1 X | 0 Z f 17 = | 0 X | 1 Z | 0 X | 1 Z | 1 X | 1 Z f 18 = | 0 X | 0 Z | 1 X | 1 Z | 1 X | 0 Z
f 19 = | 0 X | 1 Z | 1 X | 1 Z | 1 X | 1 Z f 20 = | 1 X | 0 Z | 0 X | 1 Z | 0 X | 1 Z f 21 = | 1 X | 1 Z | 0 X | 1 Z | 0 X | 1 Z
f 22 = | 1 X | 1 Z | 1 X | 1 Z | 0 X | 1 Z f 23 = | 1 X | 0 Z | 1 X | 1 Z | 1 X | 1 Z f 24 = | 1 X | 1 Z | 1 X | 1 Z | 1 X | 0 Z
Table A2. There exist eight possible Matching Results (MR) for 3 × 2 frames. The bit produced by a double matching event is represented inside the key notation with the symbol •. Additionally, each MR has been identified with a binary code left to each frame. After the sifting process, such MR code will become part of the secret key.
Table A2. There exist eight possible Matching Results (MR) for 3 × 2 frames. The bit produced by a double matching event is represented inside the key notation with the symbol •. Additionally, each MR has been identified with a binary code left to each frame. After the sifting process, such MR code will become part of the secret key.
MR = 000 | X | X | X MR = 100 | X | X | Z
MR = 001 | Z | Z | Z MR = 101 | Z | Z | X
MR = 010 | X | Z | X MR = 110 | X | Z | Z
MR = 011 | Z | X | Z MR = 111 | Z | X | X
Table A3. Bob sends to Alice the Sifting Strings (SS) which are constructed with the sifting bits and the measured bits. Alice knows the frames behind each SS, so she can get the secret bit (sb). On his side, Bob uses the SS and the MR to achieve the same bit.
Table A3. Bob sends to Alice the Sifting Strings (SS) which are constructed with the sifting bits and the measured bits. Alice knows the frames behind each SS, so she can get the secret bit (sb). On his side, Bob uses the SS and the MR to achieve the same bit.
Sifting StringBob’s MRAlice’s FramesbBob’s MRsbAlice’s Frame
MeasuredSifting
110000000 f 6 , f 9 , f 14 , f 22 00011 f 5 , f 11 , f 16 , f 24
011000000 f 8 , f 13 , f 18 , f 19 00011 f 12 , f 15 , f 20 , f 23
011001110 f 12 , f 15 , f 17 , f 19 01111 f 4 , f 13 , f 18 , f 23
110001100 f 6 , f 10 , f 14 , f 24 01011 f 5 , f 11 , f 21 , f 22
010011110 f 1 , f 11 , f 16 , f 18 01011 f 2 , f 6 , f 12 , f 20
111011100 f 4 , f 9 , f 22 , f 23 01111 f 8 , f 10 , f 19 , f 24
001010001 f 3 , f 4 , f 9 , f 13 00111 f 15 , f 20
100010001 f 7 , f 8 , f 10 , f 14 00111 f 5 , f 16
010010001 f 1 , f 2 , f 6 , f 18 00101 f 11 , f 12
111010001 f 17 , f 19 , f 21 , f 22 00101 f 23 , f 24
001011110 f 3 , f 13 01001 f 15 , f 17
100011101 f 7 , f 14 01111 f 5 , f 21
001100000 f 1 , f 15 , f 16 , f 17 00101 f 8 , f 13
100100000 f 2 , f 5 , f 20 , f 21 00101 f 9 , f 14
010100000 f 3 , f 7 , f 11 , f 12 00111 f 6 , f 18
111100000 f 4 , f 10 , f 23 , f 24 00111 f 19 , f 22
001101111 f 1 , f 15 01011 f 4 , f 13
100101100 f 2 , f 5 01101 f 10 , f 14
010101111 f 3 , f 6 , f 9 , f 12 01001 f 7 , f 8 , f 11 , f 18
111101101 f 16 , f 17 , f 19 , f 24 01101 f 20 , f 21 , f 22 , f 23
011110010 f 1 , f 15 , f 16 , f 17 , f 18 , f 19 00111 f 3 , f 4 , f 9 , f 12 , f 13 , f 23
110110010 f 2 , f 5 , f 6 , f 20 , f 21 , f 22 00111 f 7 , f 8 , f 10 , f 11 , f 14 , f 24
011111101 f 1 , f 15 , f 18 , f 23 01001 f 3 , f 12 , f 13 , f 19
110111110 f 2 , f 5 , f 6 , f 24 01111 f 7 , f 11 , f 14 , f 22
Table A4. We list the 24 frames that Alice uses during the distillation process. Bob computes the sifting bits applying the XOR function to each column (they are written at the bottom of each frame) and appending an extra (required) sifting bit. The sifting bits define the set { 000 , 001 , 010 , 011 , 100 , 101 , 110 , 111 } that does not contain redundancy, so that Alice can identify without ambiguity Bob’s Matching Results.
Table A4. We list the 24 frames that Alice uses during the distillation process. Bob computes the sifting bits applying the XOR function to each column (they are written at the bottom of each frame) and appending an extra (required) sifting bit. The sifting bits define the set { 000 , 001 , 010 , 011 , 100 , 101 , 110 , 111 } that does not contain redundancy, so that Alice can identify without ambiguity Bob’s Matching Results.
AliceBob
f 1 = | 0 X | 0 Z | 0 X | 1 Z | 1 X | 0 Z    | 0 X | 0 X | 1 X 1 0 0    | 0 Z | 1 Z | 0 Z 0 1 0    | 0 X | 1 Z | 1 X 1 1 0    | 0 Z | 0 X | 0 Z 0 0 0  
   | 0 X | 0 X | 0 Z 0 0 1    | 0 Z | 1 Z | 1 X 1 1 1    | 0 X | 1 Z | 0 Z 0 1 1    | 0 Z | 0 X | 1 X 1 0 1  
f 2 = | 1 X | 0 Z | 0 X | 1 Z | 0 X | 0 Z    | 1 X | 0 X | 0 X 1 0 0    | 0 Z | 1 Z | 0 Z 0 1 0    | 1 X | 1 Z | 0 X 1 1 0    | 0 Z | 0 X | 0 Z 0 0 0  
   | 1 X | 0 X | 0 Z 1 0 1    | 0 Z | 1 Z | 0 X 0 1 1    | 1 X | 1 Z | 0 Z 1 1 1    | 0 Z | 0 X | 0 X 0 0 1  
f 3 = | 0 X | 0 Z | 1 X | 0 Z | 0 X | 1 Z    | 0 X | 1 X | 0 X 1 0 0    | 0 Z | 0 Z | 1 Z 0 1 0    | 0 X | 0 Z | 0 X 0 0 0    | 0 Z | 1 X | 1 Z 1 1 0  
   | 0 X | 1 X | 1 Z 1 1 1    | 0 Z | 0 Z | 0 X 0 0 1    | 0 X | 0 Z | 1 Z 0 1 1    | 0 Z | 1 X | 0 X 1 0 1  
f 4 = | 1 X | 0 Z | 1 X | 0 Z | 1 X | 1 Z    | 1 X | 1 X | 1 X 1 0 0    | 0 Z | 0 Z | 1 Z 0 1 0    | 1 X | 0 Z | 1 X 0 0 0    | 0 Z | 1 X | 1 Z 1 1 0  
   | 1 X | 1 X | 1 Z 0 1 1    | 0 Z | 0 Z | 1 X 1 0 1    | 0 X | 0 Z | 1 Z 1 1 1    | 0 Z | 1 X | 1 X 0 0 1  
f 5 = | 1 X | 1 Z | 0 X | 1 Z | 0 X | 0 Z    | 1 X | 0 X | 0 X 1 0 0    | 1 Z | 1 Z | 0 Z 0 0 0    | 1 X | 1 Z | 0 X 1 1 0    | 1 Z | 0 X | 0 Z 0 1 0  
   | 1 X | 0 X | 0 Z 1 0 1    | 1 Z | 1 Z | 0 X 0 0 1    | 1 X | 1 Z | 0 Z 1 1 1    | 1 Z | 0 X | 0 X 0 1 1  
f 6 = | 1 X | 0 Z | 1 X | 1 Z | 0 X | 0 Z    | 1 X | 1 X | 0 X 0 0 0    | 0 Z | 1 Z | 0 Z 0 1 0    | 1 X | 1 Z | 1 X 1 1 0    | 0 Z | 1 X | 0 Z 1 0 0  
   | 1 X | 1 X | 0 Z 0 0 1    | 0 Z | 1 Z | 0 X 0 1 1    | 1 X | 1 Z | 0 Z 1 1 1    | 0 Z | 1 X | 0 X 1 0 1  
f 7 = | 0 X | 1 Z | 1 X | 0 Z | 0 X | 0 Z    | 0 X | 1 X | 0 X 1 0 0    | 1 Z | 0 Z | 0 Z 0 1 0    | 0 X | 0 Z | 0 X 0 0 0    | 1 Z | 1 X | 0 Z 1 1 0  
   | 0 X | 1 X | 0 Z 1 0 1    | 1 Z | 0 Z | 0 X 0 1 1    | 0 X | 0 Z | 0 Z 0 0 1    | 1 Z | 1 X | 0 X 1 1 1  
f 8 = | 0 X | 1 Z | 1 X | 0 Z | 1 X | 0 Z    | 0 X | 1 X | 1 X 0 0 0    | 1 Z | 0 Z | 0 Z 0 1 0    | 0 X | 0 Z | 1 X 1 0 0    | 1 Z | 1 X | 0 Z 1 1 0  
   | 0 X | 1 X | 0 Z 1 0 1    | 1 Z | 0 Z | 1 X 1 1 1    | 0 X | 0 Z | 0 Z 0 0 0    | 1 Z | 1 X | 1 X 0 1 1  
f 9 = | 1 X | 0 Z | 1 X | 0 Z | 0 X | 1 Z    | 1 X | 1 X | 0 X 0 0 0    | 0 Z | 0 Z | 1 Z 0 1 0    | 1 X | 0 Z | 0 X 1 0 0    | 0 Z | 1 X | 1 Z 1 1 0  
   | 1 X | 1 X | 1 Z 0 1 1    | 0 Z | 0 Z | 0 X 0 0 1    | 1 X | 0 Z | 1 Z 1 1 1    | 0 Z | 1 X | 0 X 1 0 1  
f 10 = | 1 X | 1 Z | 1 X | 0 Z | 1 X | 0 Z    | 1 X | 1 X | 1 X 1 0 0    | 1 Z | 0 Z | 0 Z 0 1 0    | 1 X | 0 Z | 1 X 0 0 0    | 1 Z | 1 X | 0 Z 1 1 0  
   | 1 X | 1 X | 0 Z 0 0 1    | 1 Z | 0 Z | 1 X 1 1 1    | 1 X | 0 Z | 0 Z 1 0 1    | 1 Z | 1 X | 1 X 0 1 1  
f 11 = | 0 X | 1 Z | 1 X | 1 Z | 0 X | 0 Z    | 0 X | 1 X | 0 X 1 0 0    | 1 Z | 1 Z | 0 Z 0 1 0    | 0 X | 1 Z | 0 X 0 1 0    | 1 Z | 1 X | 0 Z 1 1 0  
   | 0 X | 1 X | 0 Z 1 0 1    | 1 Z | 1 Z | 0 X 0 0 1    | 0 X | 1 Z | 0 Z 0 1 1    | 1 Z | 1 X | 0 X 1 1 1  
f 12 = | 0 X | 0 Z | 1 X | 1 Z | 0 X | 1 Z    | 0 X | 1 X | 0 X 1 0 0    | 0 Z | 1 Z | 1 Z 0 0 0    | 0 X | 1 Z | 0 X 0 1 0    | 0 Z | 1 X | 1 Z 1 1 0  
   | 0 X | 1 X | 1 Z 1 1 1    | 0 Z | 1 Z | 0 X 0 1 1    | 0 X | 1 Z | 1 Z 0 0 1    | 0 Z | 1 X | 0 X 1 0 1  
f 13 = | 0 X | 0 Z | 1 X | 0 Z | 1 X | 1 Z    | 0 X | 1 X | 1 X 0 0 0    | 0 Z | 0 Z | 1 Z 0 1 0    | 0 X | 0 Z | 1 X 1 0 0    | 0 Z | 1 X | 1 Z 1 1 0  
   | 0 X | 1 X | 1 Z 1 1 1    | 0 Z | 0 Z | 1 X 1 0 1    | 0 X | 0 Z | 1 Z 0 1 1    | 0 Z | 1 X | 1 X 0 0 1  
f 14 = | 1 X | 1 Z | 1 X | 0 Z | 0 X | 0 Z    | 1 X | 1 X | 0 X 0 0 0    | 1 Z | 0 Z | 0 Z 0 1 0    | 1 X | 0 Z | 0 X 1 0 0    | 1 Z | 1 X | 0 Z 1 1 0  
   | 1 X | 1 X | 0 Z 0 0 1    | 1 Z | 0 Z | 0 X 0 1 1    | 1 X | 0 Z | 0 Z 1 0 1    | 1 Z | 1 X | 0 X 1 1 1  
f 15 = | 0 X | 0 Z | 0 X | 1 Z | 1 X | 1 Z    | 0 X | 0 X | 1 X 1 0 0    | 0 Z | 1 Z | 1 Z 0 0 0    | 0 X | 1 Z | 1 X 1 1 0    | 0 Z | 0 X | 1 Z 0 1 0  
   | 0 X | 0 X | 1 Z 0 1 1    | 0 Z | 1 Z | 1 X 1 1 1    | 0 X | 1 Z | 1 Z 0 0 1    | 0 Z | 0 X | 1 X 1 0 1  
f 16 = | 0 X | 1 Z | 0 X | 1 Z | 1 X | 0 Z    | 0 X | 0 X | 1 X 1 0 0    | 1 Z | 1 Z | 0 Z 0 0 0    | 0 X | 1 Z | 1 X 1 1 0    | 1 Z | 0 X | 0 Z 0 1 0  
   | 0 X | 0 X | 0 Z 0 0 1    | 1 Z | 1 Z | 1 X 1 0 1    | 0 X | 1 Z | 0 Z 0 1 1    | 1 Z | 0 X | 1 X 1 1 1  
f 17 = | 0 X | 1 Z | 0 X | 1 Z | 1 X | 1 Z    | 0 X | 0 X | 1 X 1 0 0    | 1 Z | 1 Z | 1 Z 0 1 0    | 0 X | 1 Z | 1 X 1 1 0    | 1 Z | 0 X | 1 Z 0 0 0  
   | 0 X | 0 X | 1 Z 0 1 1    | 1 Z | 1 Z | 1 X 1 0 1    | 0 X | 1 Z | 1 Z 0 0 1    | 1 Z | 0 X | 1 X 1 1 1  
f 18 = | 0 X | 0 Z | 1 X | 1 Z | 1 X | 0 Z    | 0 X | 1 X | 1 X 0 0 0    | 0 Z | 1 Z | 0 Z 0 1 0    | 0 X | 1 Z | 1 X 1 1 0    | 0 Z | 1 X | 0 Z 1 0 0  
   | 0 X | 1 X | 0 Z 1 0 1    | 0 Z | 1 Z | 1 X 1 1 1    | 0 X | 1 Z | 0 Z 0 1 1    | 0 Z | 1 X | 1 X 0 0 1  
f 19 = | 0 X | 1 Z | 1 X | 1 Z | 1 X | 1 Z    | 0 X | 1 X | 1 X 0 0 0    | 1 Z | 1 Z | 1 Z 0 1 0    | 0 X | 1 Z | 1 X 1 1 0    | 1 Z | 1 X | 1 Z 1 0 0  
   | 0 X | 1 X | 1 Z 1 1 1    | 1 Z | 1 Z | 1 X 1 0 1    | 0 X | 1 Z | 1 Z 0 0 1    | 1 Z | 1 X | 1 X 0 1 1  
f 20 = | 1 X | 0 Z | 0 X | 1 Z | 0 X | 1 Z    | 1 X | 0 X | 0 X 1 0 0    | 0 Z | 1 Z | 1 Z 0 0 0    | 1 X | 1 Z | 0 X 1 1 0    | 0 Z | 0 X | 1 Z 0 1 0  
   | 1 X | 0 X | 1 Z 1 1 1    | 0 Z | 1 Z | 0 X 0 1 1    | 1 X | 1 Z | 1 Z 1 0 1    | 0 Z | 0 X | 0 X 0 0 1  
f 21 = | 1 X | 1 Z | 0 X | 1 Z | 0 X | 1 Z    | 1 X | 0 X | 0 X 1 0 0    | 1 Z | 1 Z | 1 Z 0 1 0    | 1 X | 1 Z | 0 X 1 1 0    | 1 Z | 0 X | 1 Z 0 0 0  
   | 1 X | 0 X | 1 Z 1 1 1    | 1 Z | 1 Z | 0 X 0 0 1    | 1 X | 1 Z | 1 Z 1 0 1    | 1 Z | 0 X | 0 X 0 1 1  
f 22 = | 1 X | 1 Z | 1 X | 1 Z | 0 X | 1 Z    | 1 X | 1 X | 0 X 0 0 0    | 1 Z | 1 Z | 1 Z 0 1 0    | 1 X | 1 Z | 0 X 1 1 0    | 1 Z | 1 X | 1 Z 1 0 0  
   | 1 X | 1 X | 1 Z 0 1 1    | 1 Z | 1 Z | 0 X 0 0 1    | 1 X | 1 Z | 1 Z 1 0 1    | 1 Z | 1 X | 0 X 1 1 1  
f 23 = | 1 X | 0 Z | 1 X | 1 Z | 1 X | 1 Z    | 1 X | 1 X | 1 X 1 0 0    | 0 Z | 1 Z | 1 Z 0 0 0    | 1 X | 1 Z | 1 X 0 1 0    | 0 Z | 1 X | 1 Z 1 1 0  
   | 1 X | 1 X | 1 Z 0 1 1    | 0 Z | 1 Z | 1 X 1 1 1    | 1 X | 1 Z | 1 Z 1 0 1    | 0 Z | 1 X | 1 X 0 0 1  
f 24 = | 1 X | 1 Z | 1 X | 1 Z | 1 X | 0 Z    | 1 X | 1 X | 1 X 1 0 0    | 1 Z | 1 Z | 0 Z 0 0 0    | 1 X | 1 Z | 1 X 0 1 0    | 1 Z | 1 X | 0 Z 1 1 0  
   | 1 X | 1 X | 0 Z 0 0 1    | 1 Z | 1 Z | 1 X 1 0 1    | 1 X | 1 Z | 0 Z 1 1 1    | 1 Z | 1 X | 1 X 0 1 1
Table A5. We list the cases that can be successfully disambiguated. Zero cases refer to the error-free SS.
Table A5. We list the cases that can be successfully disambiguated. Zero cases refer to the error-free SS.
Frame MR SS Disambiguated Bits
f 1 010011,1102nd & 3rd
101011,111
f 2 010110,1101st & 2nd
110110,111
f 3 011011,1102nd & 3rd
100011,111
f 4 100111,011zero & 1st
f 5 001110,000zero & 2nd
010110,110
101110,001
110110,111
f 6 000110,000zero & 1st
010110,110
100110,001
110110,111
f 7 011110,110 1st & 2nd
111110,111
f 8 111111,0111st & 3rd
f 9 100111,0111st & 3rd
f 10 111111,011zero & 3rd
f 11 001110,000 zero & 1st
011110,110
101110,001
111110,111
f 12 001011,000 zero & 3rd
011011,110
100011,111
110011,001
f 13 000011,000zero & 2nd
011011,110
100011,111
111011,001
f 14 000110,000zero & 2nd
011110,110
100110,001
111110,111
f 15 001011,000zero & 2nd
010011,110
101011,111
110011,001
f 16 101111,1011st & 3rd
f 17 101111,101zero & 1st
f 18 000011,000zero & 3rd
010011,110
101011,111
111011,001
f 19 001111,010zero & 1st
011111,100
101111,101
111111,011
f 20 110111,1011st & 3rd
f 21 110111,101zero & 3rd
f 22 001111,010 zero & 3rd
011111,100
100111,011
110111,101
f 23 000111,100 zero & 1st
010111,010
100111,011
110111,101
f 24 000111,100zero & 3rd
010111,010
101111,101
111111,011

References

  1. Kao, K.C.; Hockham, G.A. Dielectric-fibre surface waveguides for optical frequencies. In Proceedings of the Institution of Electrical Engineers; IET: London, UK, 1966; Volume 113, pp. 1151–1158. [Google Scholar]
  2. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef] [Green Version]
  3. Xu, F.; Ma, X.; Zhang, Q.; Lo, H.; Pan, J. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  4. Mehic, M.; Niemiec, M.; Rass, S.; Ma, J.; Peev, M.; Aguado, A.; Martin, V.; Schauer, S.; Poppe, A.; Pacher, C.; et al. Quantum key distribution: A networking perspective. ACM Comput. Surv. CSUR 2020, 53, 1–41. [Google Scholar] [CrossRef]
  5. Lovic, V. Quantum key distribution: Advantages, challenges and policy. Camb. J. Sci. Policy 2020, 1, e8410270193. [Google Scholar] [CrossRef]
  6. Razavi, M.; Leverrier, A.; Ma, X.; Qi, B.; Yuan, Z. Quantum key distribution and beyond: Introduction. JOSA B 2019, 36, QKD1–QKD2. [Google Scholar] [CrossRef] [Green Version]
  7. Geihs, M.; Nikiforov, O.; Demirel, D.; Sauer, A.; Butin, D.; Günther, F.; Alber, G.; Walther, T.; Buchmann, J. The status of quantum-key-distribution-based long-term secure internet communication. IEEE Trans. Sustain. Comput. 2019. [Google Scholar] [CrossRef]
  8. Kong, P. A review of quantum key distribution protocols in the perspective of smart grid communication security. IEEE Syst. J. 2020. [Google Scholar] [CrossRef]
  9. Pearson, D. High-speed qkd reconciliation using forward error correction. In AIP Conference Proceedings; American Institute of Physics: Melville, NY, USA, 2004; Volume 734, pp. 299–302. [Google Scholar]
  10. Runser, R.J.; Chapuran, T.; Toliver, P.; Peters, N.A.; Goodman, M.S.; Kosloski, J.T.; Nweke, N.; McNown, S.R.; Hughes, R.J.; Rosenberg, D.; et al. Progress toward quantum communications networks: Opportunities and challenges. In Optoelectronic Integrated Circuits IX; International Society for Optics and Photonics: Red Hook, NY, USA, 2007; Volume 6476, p. 64760I. [Google Scholar]
  11. Lütkenhaus, N. Estimates for practical quantum cryptography. Phys. Rev. A 1999, 59, 3301. [Google Scholar] [CrossRef] [Green Version]
  12. Lizama-Pérez, L.A.; López, J.M.; Carlos-López, E.D.; Venegas-Andraca, S.E. Quantum flows for secret key distribution in the presence of the photon number splitting attack. Entropy 2014, 16, 3121–3135. [Google Scholar] [CrossRef] [Green Version]
  13. Lizama-Pérez, L.A.; López, J.M.; De Carlos López, E. Quantum key distribution in the presence of the intercept-resend with faked states attack. Entropy 2016, 19, 4. [Google Scholar] [CrossRef] [Green Version]
  14. Lizama-Pérez, L.A.; Lopez, M. Quantum key distillation using binary frames. Symmetry 2020, 12, 1053. [Google Scholar] [CrossRef]
  15. Fung, C.H.F.; Qi, B.; Tamaki, K.; Lo, H.K. Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 2007, 75, 032314. [Google Scholar] [CrossRef] [Green Version]
  16. Xu, F.; Qi, B.; Lo, H.-K. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 2010, 12, 113026. [Google Scholar] [CrossRef]
  17. Makarov, V.; Hjelme, D.R. Faked states attack on quantum cryptosystems. J. Mod. Opt. 2005, 52, 691–705. [Google Scholar] [CrossRef]
  18. Makarov, V.; Anisimov, A.; Skaar, J. Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 2006, 74, 022313. [Google Scholar] [CrossRef] [Green Version]
  19. Makarov, V.; Skaar, J. Faked states attack using detector efficiency mismatch on sarg04, phase-time, dpsk, and ekert protocols. Quantum Inf. Comput. 2008, 8, 622–635. [Google Scholar]
  20. Qi, B.; Fung, C.F.; Lo, H.; Ma, X. Time-shift attack in practical quantum cryptosystems. arXiv 2005, arXiv:quant-ph/0512080. [Google Scholar]
  21. Lydersen, L.; Wiechers, C.; Wittmann, C.; Elser, D.; Skaar, J.; Makarov, V. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 2010, 4, 686–689. [Google Scholar] [CrossRef] [Green Version]
  22. Gerhardt, I.; Liu, Q.; Lamas-Linares, A.; Skaar, J.; Kurtsiefer, C.; Makarov, V. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2011, 2, 349. [Google Scholar] [CrossRef] [Green Version]
  23. Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, C.; Makarov, V.; Leuchs, G. After-gate attack on a quantum cryptosystem. New J. Phys. 2011, 13, 013043. [Google Scholar] [CrossRef] [Green Version]
  24. Weier, H.; Krauss, H.; Rau, M.; Fuerst, M.; Nauerth, S.; Weinfurter, H. Quantum eavesdropping without interception: An attack exploiting the dead time of single-photon detectors. New J. Phys. 2011, 13, 073024. [Google Scholar] [CrossRef] [Green Version]
  25. Scarani, V.; Acin, A.; Ribordy, G.; Gisin, N. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 2004, 92, 057901. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  26. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef] [Green Version]
  27. Verdu, S. Fifty years of shannon theory. IEEE Trans. Inf. Theory 1998, 44, 2057–2078. [Google Scholar] [CrossRef] [Green Version]
  28. Kuritsyn, K. Modification of error reconciliation scheme for quantum cryptography. In First International Symposium on Quantum Informatics; International Society for Optics and Photonics: Red Hook, NY, USA, 2003; Volume 5128, pp. 91–94. [Google Scholar]
  29. Brassard, G.; Salvail, L. Secret-key reconciliation by public discussion. In Workshop on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1993; pp. 410–423. [Google Scholar]
  30. Buttler, W.T.; Lamoreaux, S.K.; Torgerson, J.R.; Nickel, G.H.; Donahue, C.H.; Peterson, C.G. Fast, efficient error reconciliation for quantum cryptography. Phys. Rev. A 2003, 67, 052303. [Google Scholar] [CrossRef] [Green Version]
  31. Van Assche, G.; Cardinal, J.; Cerf, N.J. Reconciliation of a quantum-distributed gaussian key. IEEE Trans. Inf. Theory 2004, 50, 394–400. [Google Scholar] [CrossRef] [Green Version]
  32. Bennett, C.H.; Brassard, G.; Crépeau, C.; Maurer, U.M. Generalized privacy amplification. IEEE Trans. Inf. Theory 1995, 41, 1915–1923. [Google Scholar] [CrossRef] [Green Version]
  33. Muramatsu, J. Transmission of messages to the efficiency limit-implementation of tractable channel code achieving the shannon limit. NTT Tech. Rev. 2019, 17, 34–39. [Google Scholar]
  34. Yuan, H.; Song, J.; Han, L.; Hou, K.; Shi, S. Improving the total efficiency of quantum key distribution by comparing bell states. Opt. Commun. 2008, 281, 4803–4806. [Google Scholar] [CrossRef]
  35. Abou Jaoude, A. The paradigm of complex probability and claude shannon’s information theory. Syst. Sci. Control Eng. 2017, 5, 380–425. [Google Scholar] [CrossRef] [Green Version]
  36. Wagner, N.R. The Laws of Cryptography with Java Code. 2003. Available online: https://www.csshl.net/sites/default/files/_downloadable/crypto/laws_of_cryptography_with_java_code.pdf (accessed on 18 December 2020).
  37. Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241. [Google Scholar] [CrossRef] [Green Version]
  38. Grosshans, F.; Grangier, P. Reverse reconciliation protocols for quantum cryptography with continuous variables. arXiv 2002, arXiv:quant-ph/0204127. [Google Scholar]
  39. Wang, X.; Zhang, Y.; Yu, S.; Guo, H. High speed error correction for continuous-variable quantum key distribution with multi-edge type ldpc code. Sci. Rep. 2018, 8, 1–7. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  40. Chung, S.; Forney, G.D.; Richardson, T.J.; Urbanke, R. On the design of low-density parity-check codes within 0.0045 db of the shannon limit. IEEE Commun. Lett. 2001, 5, 58–60. [Google Scholar] [CrossRef]
  41. Mehic, M.; Niemiec, M.; Siljak, H.; Voznak, M. Error reconciliation in quantum key distribution protocols. Lect. Notes Comput. Sci. 2020, 12070, 222–236. [Google Scholar]
  42. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India, 9–12 December 1984. [Google Scholar]
  43. Van Assche, G. Quantum Cryptography and Secret-Key Distillation; Cambridge University Press: Cambridge, UK, 2006. [Google Scholar]
  44. Hughes, R.; Nordholt, J.; Rarity, J. Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography—A Quantum Information Science and Technology Roadmap; United States Government: New York, NY, USA, 2004.
  45. Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J. Experimental quantum cryptography. J. Cryptol. 1992, 5, 3–28. [Google Scholar] [CrossRef]
  46. Kumar, V.V.; Karthikeyan, T.; Praveen Sundar, P.V.; Magesh, G.; Balajee, J.M. A quantum approach in lifi security using quantum key distribution. Int. J. Adv. Sci. Technol. 2020, 29, 2345–2354. [Google Scholar]
Figure 1. Using frame reconciliation, all errors are detected and corrected (or removed). Each double detection event has been enumerated to follow them into the frames (see Table 2 and Table 3).
Figure 1. Using frame reconciliation, all errors are detected and corrected (or removed). Each double detection event has been enumerated to follow them into the frames (see Table 2 and Table 3).
Entropy 23 00229 g001
Figure 2. The frame distillation runs in one iteration: Alice sends pairs of non-orthogonal states ( N O i ). Bob informs to Alice which cases produced double matching detection events (i). Alice generates all possible frames and sends to Bob the frame arrangement information ( f n ). Bob returns back the sifting strings (SSn). Finally, Alice tells Bob which cases he must delete ( r m ). Step 1 is executed over the quantum channel, while steps 2 to 5 are completed using the classical channel.
Figure 2. The frame distillation runs in one iteration: Alice sends pairs of non-orthogonal states ( N O i ). Bob informs to Alice which cases produced double matching detection events (i). Alice generates all possible frames and sends to Bob the frame arrangement information ( f n ). Bob returns back the sifting strings (SSn). Finally, Alice tells Bob which cases he must delete ( r m ). Step 1 is executed over the quantum channel, while steps 2 to 5 are completed using the classical channel.
Entropy 23 00229 g002
Figure 3. The theoretical transmission rate is plotted as a function of the quantum bit error rate (QBER) e; we show the 2 × 2 and 3 × 2 lines and the Shannon’s reference function. When e = 1 , the secret rate achieves 0.16 for 2 × 2 frames and 0.047 for 3 × 2 frames.
Figure 3. The theoretical transmission rate is plotted as a function of the quantum bit error rate (QBER) e; we show the 2 × 2 and 3 × 2 lines and the Shannon’s reference function. When e = 1 , the secret rate achieves 0.16 for 2 × 2 frames and 0.047 for 3 × 2 frames.
Entropy 23 00229 g003
Table 1. In this example of a running Quantum Key Distribution (QKD), 6 errors (underlined at Bob’s column) among 18 measured quantum states are produced, so it gives an error rate of 30%. According to Shannon’s limit, it yields a transmission rate of 0.0817. It is known that, at 50%, there is no reconcilable information.
Table 1. In this example of a running Quantum Key Distribution (QKD), 6 errors (underlined at Bob’s column) among 18 measured quantum states are produced, so it gives an error rate of 30%. According to Shannon’s limit, it yields a transmission rate of 0.0817. It is known that, at 50%, there is no reconcilable information.
AliceBob
| 0 X 2 , | 0 Z 1 , | 0 X 2 , | 0 Z 1 ,
| 1 X 4 , | 0 Z 3 , | 1 X 4 , | 1 Z 3 ̲ ,
| 1 X 6 , | 1 Z 5 , | 1 X 6 , | 1 Z 5 ,
| 0 X 8 , | 1 Z 7 , | 1 X 8 ̲ , | 1 Z 7 ,
| 1 X 10 , | 0 Z 9 , | 0 X 10 ̲ , | 0 Z 9 ,
| 0 X 12 , | 1 Z 11 , | 0 X 12 , | 0 Z 11 ̲ ,
| 1 X 14 , | 1 Z 13 , | 1 X 14 , | 1 Z 13 ,
| 1 X 16 , | 0 Z 15 , | 0 X 16 ̲ , | 0 Z 15 ,
| 0 X 18 , | 1 Z 17 | 1 X 18 ̲ , | 1 Z 17
Table 2. Alice receives the Sifting String (SS) from Bob, which she knows belongs to f 2 , f 3 , and f 4 , respectively, but they are ambiguous, so she uses the auxiliary frames f 10 , f 9 , and f 9 , respectively, to identify the error and then correct it.
Table 2. Alice receives the Sifting String (SS) from Bob, which she knows belongs to f 2 , f 3 , and f 4 , respectively, but they are ambiguous, so she uses the auxiliary frames f 10 , f 9 , and f 9 , respectively, to identify the error and then correct it.
f 2 2 . 3 . MR = 01 | 1 Z | 1 Z SS = 00 , 11 f 10 2 . 1 . MR = 01 | 1 Z | 0 Z SS = 01 , 10
f 3 4 . 3 . MR = 10 | 1 X | 1 Z SS = 11 , 11 f 9 4 . 1 . MR = 10 | 1 X | 0 Z SS = 10 , 10
f 4 7 . 9 . MR = 00 | 1 X | 1 X SS = 00 , 11 f 9 9 . 1 . MR = 10 | 1 X | 0 Z SS = 10 , 10
Table 3. After Alice receives these SS, she determines that the respective frames must be eliminated because ambiguity cannot be removed.
Table 3. After Alice receives these SS, she determines that the respective frames must be eliminated because ambiguity cannot be removed.
f 2 5 . 3 . MR = 01 | 0 X | 1 Z SS = 01 , 01 f 3 6 . 3 . MR = 01 | 0 Z | 1 Z SS = 01 , 01 f 6 8 . 7 . MR = 01 | 0 X | 1 X SS = 10 , 01
Table 4. The logical XOR function.
Table 4. The logical XOR function.
c k b
0 0 0
1 1
1 0 1
1 0
Table 5. The XOR function for 2 × 2 frames; matching results (MR) is the measurement result, and sb denotes the final secret bit.
Table 5. The XOR function for 2 × 2 frames; matching results (MR) is the measurement result, and sb denotes the final secret bit.
c k b MRFramessb
00 | 0 X , , | 0 Z 10 f 1 0
, | 0 Z | 0 X , 11 f 5 1
| 1 X , | 1 X , 00 f 2 , f 6 0
, | 1 Z , | 1 Z 01 f 3 , f 4 1
01 , | 1 Z , | 0 Z 01 f 1 , f 6 0
, | 1 Z | 0 X , 11 f 4 1
| 0 X , , | 1 Z 10 f 3 0
, | 0 Z , | 1 Z 01 f 2 , f 5 1
10 | 1 X , | 0 X , 00 f 4 , f 5 0
| 1 X , , | 0 Z 10 f 6 1
| 0 X , | 1 X , 00 f 1 , f 3 0
, | 0 Z | 1 X , 11 f 2 1
11 , | 1 Z | 1 X , 11 f 1 , f 3 , f 6 0
| 1 X , , | 1 Z 10 f 2 , f 4 , f 5 1
Table 6. The secret rate is indicated without taking the framing gain for each frame size. The secret rate is shown when e = 0 and e = 1 .
Table 6. The secret rate is indicated without taking the framing gain for each frame size. The secret rate is shown when e = 0 and e = 1 .
I a b ( 2 × 2 ) I a b ( 3 × 2 )
1 2 ( 1 e ) + 1 6 e 1 3 ( 1 e ) + 1 21 e
1 2 1 3 e 1 3 2 7 e
e = 0 I a b ( 2 × 2 ) = 1 2 e = 0 I a b ( 3 × 2 ) = 1 3
e = 1 I a b ( 2 × 2 ) = 1 6 e = 1 I a b ( 3 × 2 ) = 1 21
Table 7. The theoretical secret throughput (bits) as a function of n and e for each frame size.
Table 7. The theoretical secret throughput (bits) as a function of n and e for each frame size.
n e = 0 e = 0.5 e = 1
I ab ( 2 × 2 ) I ab ( 3 × 2 ) I ab ( 2 × 2 ) I ab ( 3 × 2 ) I ab ( 2 × 2 ) I ab ( 3 × 2 )
10061820,21241211,5502062887
50015,5932,588,56210,3951,479,1785197369,794
100062,43720,770,87541,62511,869,07120,8122,967,267
Table 8. The secret key rate is computed as Δ I = I a b I a e for each attack.
Table 8. The secret key rate is computed as Δ I = I a b I a e for each attack.
IRPNSBC
1 ( 1 4 ) 2 · I a b ( 2 × 2 ) 1 ( 1 4 ) 2 · I a b ( 2 × 2 ) 1 ( 9 32 ) 2 · I a b ( 2 × 2 )
1 ( 1 4 ) 3 · I a b ( 3 × 2 ) 1 ( 1 4 ) 3 · I a b ( 3 × 2 ) 1 ( 9 32 ) 3 · I a b ( 3 × 2 )
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lizama-Pérez, L.A.; López R., J.M.; Samperio, E.H. Beyond the Limits of Shannon’s Information in Quantum Key Distribution. Entropy 2021, 23, 229. https://doi.org/10.3390/e23020229

AMA Style

Lizama-Pérez LA, López R. JM, Samperio EH. Beyond the Limits of Shannon’s Information in Quantum Key Distribution. Entropy. 2021; 23(2):229. https://doi.org/10.3390/e23020229

Chicago/Turabian Style

Lizama-Pérez, Luis Adrián, J. Mauricio López R., and Emmanuel H. Samperio. 2021. "Beyond the Limits of Shannon’s Information in Quantum Key Distribution" Entropy 23, no. 2: 229. https://doi.org/10.3390/e23020229

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop