Robustness bounds and practical limitations of quantum key distribution.
[Ph.D. Thesis], (2008)
Aeysha Khalique: Robustness bounds and practical limitations of quantum key distribution -
(Portable Documnet File)
Available under Creative Commons Attribution Non-commercial No Derivatives.
Download (1397Kb) | Preview
|Item Type:||Ph.D. Thesis|
|Title:||Robustness bounds and practical limitations of quantum key distribution|
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to interpret concepts of quantum physics. This leads to a deeper understanding of quantum theory. The most common examples of practical applications of basic quantum theory are quantum computation and quantum cryptography. Quantum cryptography provides secure communication between legitimate users even in the presence of an adversary by making possible the distribution of a secret key. It then allows error correction and privacy amplification, which is elimination of adversary information, through classical communication. In this thesis two important aspects of quantum key distribution are covered, namely robustness bounds with respect to provable entanglement for ideal protocols and practical quantum key distribution using two-way classical communication. In part one of the thesis, ideal quantum key distribution protocols and their robustness in terms of provable entanglement are discussed. The robustness bounds are proved for most general coherent attacks. These bounds for provable entanglement are already known to be 25% for the four-state protocol and 33% for the six-state protocol. We anticipate to provide a region in which the legitimate users share entanglement. This region is large for the four-state protocol and is reduced to a smaller region for the six-state protocol because of additional constraint on it. We also investigate the information cost which the adversary has to pay in order to reach these bounds. In part two we adopt a more practical approach. We investigate the limitation on distance of secure communication because of practical restrictions. In particular we investigate the restrictions due to the lack of single photon sources, the lossy channel and faulty detectors. These practical limitations have already been observed using one-way classical communication between legitimate users. It has been observed that it is actually the dark count rate that limit the distance up to which legitimate users can share a secret key. We have used two-way classical communication to postpone the effect of dark counts and increase the distance to considerable amount. For the purpose we have considered an optimal attack with respect to the disturbance that an eavesdropper creates while attacking. Any other format of attacking will increase the disturbance. We show that using two-way classical communication for post processing we can increase the distance of secure communication considerably.
|Uncontrolled Keywords:||quantum key distribution, quantum information, protocol, practical limitations achievable distances, key rates, classical communication, tagged qubits|
|Classification DDC:||500 Naturwissenschaften und Mathematik > 500 Naturwissenschaften
500 Naturwissenschaften und Mathematik > 530 Physik
500 Naturwissenschaften und Mathematik > 510 Mathematik
|Date Deposited:||17 Oct 2008 09:23|
|Last Modified:||07 Dec 2012 11:54|
|License:||Creative Commons: Attribution-Noncommercial-No Derivative Works 3.0|
|Referees:||Drossel, Prof. Dr. Barbara and Roth, Prof. Dr. Robert|
|Refereed:||25 June 2008|
Actions (login required)