Show simple item record

dc.contributor.authorKhatri, Sumeet
dc.date.accessioned2016-10-13 17:07:33 (GMT)
dc.date.available2016-10-13 17:07:33 (GMT)
dc.date.issued2016-10-13
dc.date.submitted2016-10-03
dc.identifier.urihttp://hdl.handle.net/10012/10993
dc.description.abstractWe investigate QKD protocols with two-way classical post-processing that are based on the well-known six-state and BB84 signal states. In these QKD protocols, the source (Alice) sends quantum signals to the receiver (Bob), who measures them, leaving only classical data on both sides. Our goal is to find the highest value of the quantum bit-error rate (QBER) $Q$ for which two-way classical post-processing protocols on the data can distill secret keys. Using the BB84 signal states, such protocols currently exist for $Q<\frac{1}{5}$. On the other hand, for $Q\geq\frac{1}{4}$ no such protocol can exist as the observed data is compatible with an intercept-resend attack. This leaves the interesting question of whether successful two-way protocols exist in the interval $\frac{1}{5}\leq Q<\frac{1}{4}$. For the six-state signal states, the corresponding interval is known to be $\frac{5-\sqrt{5}}{10}\leq Q<\frac{1}{3}$. We search for two-way protocols because it turns out that within these intervals Alice and Bob's correlations are symmetrically extendable, meaning that Bob and the eavesdropper (Eve) are completely indistinguishable from Alice's point of view, making any one-way Alice-to-Bob post-processing protocol insecure. A two-way protocol might be able to break the symmetry between Bob and Eve, and it must do so in order to distill a secret key because any two-way protocol will necessarily terminate with a one-way communication step, at which point the symmetric extendability of Alice and Bob's updated correlations must be checked again. We first show that the search for two-way protocols breaking the symmetric extendability of Alice and Bob's correlations can be restricted to a search over post-selection protocols if all we care about is whether secret key can at all be distilled and not about the rate of distillation. We then provide strong analytical and numerical evidence to suggest that no two-way classical post-processing protocol exists within the gap when the six-state signal states are used. Under quantum entanglement distillation protocols, it is known that secret key can be distilled right up to the intercept-resend bounds of $\frac{1}{4}$ and $\frac{1}{3}$ for the BB84 and six-state signal states, respectively. We therefore want to know whether classical post-processing protocols are just as good at distilling secret keys as quantum ones. Our results appear to indicate that they are not.en
dc.language.isoenen
dc.publisherUniversity of Waterlooen
dc.subjectQuantum informationen
dc.subjectQuantum cryptographyen
dc.titleSymmetric Extendability of Quantum States and the Extreme Limits of Quantum Key Distributionen
dc.typeMaster Thesisen
dc.pendingfalse
uws-etd.degree.departmentPhysics and Astronomyen
uws-etd.degree.disciplinePhysics (Quantum Information)en
uws-etd.degree.grantorUniversity of Waterlooen
uws-etd.degreeMaster of Scienceen
uws.contributor.advisorLütkenhaus, Norbert
uws.contributor.affiliation1Faculty of Scienceen
uws.published.cityWaterlooen
uws.published.countryCanadaen
uws.published.provinceOntarioen
uws.typeOfResourceTexten
uws.peerReviewStatusUnrevieweden
uws.scholarLevelGraduateen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record


UWSpace

University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages