https://doi.org/10.1140/epjqt/s40507-025-00319-4
Research
Key reconciliation protocol for quantum key distribution
1
Department of Computer Science and IT, JIIT, 201304, Noida, India
2
Department of Electrical and Electronics Engineering, BITS-Pilani, Pilani Campus, 333031, Pilani, India
3
School of Engineering, Kalinga Institute of Industrial Technology Bhubaneswar, Bhubaneswar, India
a
vinay.chamola@pilani.bits-pilani.ac.in
Received:
6
September
2024
Accepted:
23
January
2025
Published online:
10
February
2025
In quantum cryptography, secret communications are delivered through a quantum channel. One of the most important breakthroughs in quantum cryptography has been the quantum key distribution (QKD). This process enables two distant parties to share secure communications based on physical laws. However, eavesdroppers can still interrupt the communication. To overcome this, we propose a different way to detect the presence of Eve through the polynomial interpolation technique. This technique also allows us for key verification. This approach prevents the receiver as well as the intruder from discovering the sender’s fundamental basis. To fully utilize IBM quantum computers’ quantum computing capabilities, this paper attempts to show % error against alpha (strength of eavesdropping) and the impact of noise on the success probability of the desired key bits. Furthermore, the success probability under depolarizing noise is explained for different qubit counts. In the enhanced QKD protocol, using polynomial interpolation for reconciliation shows a 50% probability of successful key generation. This is even when the noise is increased to the maximum capacity.
Key words: Quantum Cryptography / Quantum Communication / Quantum Security / Quantum Information / Quantum Computing
© The Author(s) 2025
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.