Please use this identifier to cite or link to this item:
http://hdl.handle.net/10263/7347
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Das, Nayana | - |
dc.date.accessioned | 2022-10-06T08:51:04Z | - |
dc.date.available | 2022-10-06T08:51:04Z | - |
dc.date.issued | 2022-08 | - |
dc.identifier.uri | http://hdl.handle.net/10263/7347 | - |
dc.description | Thesis is under the supervision of Prof. Goutam Paul | en_US |
dc.description.abstract | Quantum secure direct communication (QSDC) is an important branch of quantum cryptog- raphy, where one can transmit a secret message securely without encrypting it by a prior key. Quantum dialogue (QD) is a process of two way secure and simultaneous communication using a single channel and quantum conference (Q.Conf) is a process of securely exchanging messages between three or more parties, using quantum resources. Deterministic secure quan- tum communication (DSQC) is another class of quantum secure communication protocol, to transmit secret message without any shared key, where at-least one classical bit is required to decrypt the secret message. In the practical scenario, an adversary can apply detector-side- channel attacks to get some non-negligible amount of information about the secret message. Measurement-device-independent (MDI) quantum protocols can remove this kind of detector- side-channel attack, by introducing an untrusted third party (UTP), who performs all the measurements in the protocol with imperfect measurement devices. For secure communica- tion, identity authentication is always important as it prevents an eavesdropper to impersonate a legitimate party. The celebrated Clauser, Horne, Shimony, and Holt (CHSH) game model helps to perform the security analysis of many two-player quantum protocols. In this thesis, we perform analysis of several existing QSDC and QD protocols, and also design some new efficient protocols. We present new approaches of QSDC, QD and DSQC protocols with user authentication, some of them are MDI protocols. We analyze the security of a QSDC protocol, an MDI-QSDC protocol, and an MDI-QD protocol. We improve the previous protocols and propose some modifications of the above protocols. We also present a Q.Conf protocol by generalizing the previous MDI-QD protocol and using the algorithm of the Q.Conf protocol, we propose a quantum multi-party computation protocol to calculate the XOR value of multiple secret numbers. Next, we generalize the CHSH game, and we demonstrate how to distinguish between dimensions two and three for some special form of maximally entangled states using the generalized version of the CHSH game. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Indian Statistical Institute, Kolkata | en_US |
dc.relation.ispartofseries | ISI Ph. D Thesis;TH560 | - |
dc.subject | Communication System | en_US |
dc.subject | Quantum Secure Communication System | en_US |
dc.subject | Cryptology | en_US |
dc.subject | Quantum Mechanics | en_US |
dc.title | Analysis and Design of Quantum Secure Communication System | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Theses |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Thesis-Nayana Das 22 9 22.pdf | Thesis | 3.07 MB | Adobe PDF | View/Open |
Form 17 nayana Das.pdf | Form 17 | 449.93 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.