Title :
Correcting Codes in the Quantum Keys Reconciliation: Scenarios of Privacy Maintenance
Author :
Boughattas, Mohamed Bader ; Iyed, Ben Slimen ; Rezig, Houria
Author_Institution :
6´´Com Lab., ENIT, Tunis, Tunisia
Abstract :
The proposition of Buttler and his team to integrate the privacy maintenance into the errors correction stage of a quantum cryptography protocol, commonly called reconciliation, allowed the elaboration of a fast and efficient algorithm. A similar and parallel work which we shall develop along this article consists in targeting the insertion of various scenarios applied for the algorithms Winnow and Cascade. These scenarios are based on iterative methods of blocks subdivision, detection of the certain errors bits and the decrease of the information revealed to the eavesdropper. Comparative studies by simulation allow the correction power´s estimation, the time complexity and the efficiency of each scenario.
Keywords :
cryptographic protocols; error correction codes; quantum cryptography; Cascade algorithm; Winnow algorithm; blocks subdivision; correction power estimation; errors correction codes; privacy maintenance; quantum cryptography protocol; quantum keys reconciliation; Algorithm design and analysis; Complexity theory; Error analysis; Maintenance engineering; Privacy; Protocols; Security; Correction power; Interactivity; Privacy maintenance; Reconciliation;
Conference_Titel :
Social Computing (SocialCom), 2010 IEEE Second International Conference on
Conference_Location :
Minneapolis, MN
Print_ISBN :
978-1-4244-8439-3
Electronic_ISBN :
978-0-7695-4211-9
DOI :
10.1109/SocialCom.2010.152