1
Assistant Professor, Malek Ashtar University of Technology, Shahinshahr, Iran
2
PhD, Malek Ashtar University of Technology, Shahinshahr, Iran
Abstract
This paper introduces a post-processing protocol for quantum key distribution (QKD) systems based on the widely used two-dimensional standard BB84 setup. In writing the algorithms of this protocol, the optimal version of well-known codes and functions such as LDPC encoding and decoding codes, key derivation functions, PolyHash and Toeplitz hashing functions, and one-time-pad encoding systems have been used. This protocol is not limited to use in the two-dimensional BB84 scheme, and with a simple and minor change in its sifting algorithm, it can also be used to post-process various QKD protocols (including the two-state polarization and phase protocols (B92), the four-state protocols based on entangled states (BBM92), decoy state protocols, high-dimensional protocols, etc.).
Mehri Toonabi, A., & Momeni, S. (2025). Introducing a post-processing protocol for quantum key distribution (QKD) systems. Electronic and Cyber Defense, 13(1), -.
MLA
Ali Mehri Toonabi; Samira Momeni. "Introducing a post-processing protocol for quantum key distribution (QKD) systems", Electronic and Cyber Defense, 13, 1, 2025, -.
HARVARD
Mehri Toonabi, A., Momeni, S. (2025). 'Introducing a post-processing protocol for quantum key distribution (QKD) systems', Electronic and Cyber Defense, 13(1), pp. -.
VANCOUVER
Mehri Toonabi, A., Momeni, S. Introducing a post-processing protocol for quantum key distribution (QKD) systems. Electronic and Cyber Defense, 2025; 13(1): -.