Provability of Security and E ciency of Quantum Key Distribution (QKD) Algorithms

dc.contributor.authorBhogan, Vinayak
dc.date.accessioned2022-01-28T06:45:10Z
dc.date.available2022-01-28T06:45:10Z
dc.date.issued2019-06
dc.descriptionDissertation under the supervision of Prof. Subhamoy Maitraen_US
dc.description.abstractWith recent developments in quantum communications, much of the focus has been put on development of di erent Quantum Key Distribution(QKD) protocols that can successfully generate a symmetric key over insecure quan- tum channel. In this thesis, I have discussed in-depth security proof of a well known secure protocol named as BB84 protocol. This simple version of proof was rst pro- posed by Shor and Preskill[1], in year 2000. It involves two step derivation of BB84 protocol from a 'Lo-Chau' protocol, which has already been proven secure. I shall provide proof of exponentially lower bounds on mutual infor- mation shared between sender/receiver and an adversary, therfore proving its security. Along with it, I have also introduced another varient of Lo-Chau protocol which is more e cient in terms of shared resources, i.e. it uses almost 50% lesser quantum states exchanged over channel. I shall also prove it to be secure using the same technique used for BB84. iiien_US
dc.identifier.citation33p.en_US
dc.identifier.urihttp://hdl.handle.net/10263/7250
dc.language.isoenen_US
dc.publisherIndian Statistical Institute, Kolkataen_US
dc.relation.ispartofseriesDissertation;;2019;5
dc.subjectCSS codesen_US
dc.subjectBB84en_US
dc.titleProvability of Security and E ciency of Quantum Key Distribution (QKD) Algorithmsen_US
dc.typeOtheren_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Vinayak - Provability of Security and Efficiency of Quantum .pdf
Size:
362.63 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: