Show simple item record

dc.contributor.authorLin, Jie
dc.date.accessioned2017-10-25 14:39:24 (GMT)
dc.date.available2017-10-25 14:39:24 (GMT)
dc.date.issued2017-10-25
dc.date.submitted2017-10
dc.identifier.urihttp://hdl.handle.net/10012/12589
dc.description.abstractThis thesis applies numerical methods to analyze the security of quantum key distribution (QKD) protocols. The main theoretical problem in QKD security proofs is to calculate the secret key generation rate. Under certain assumptions, this problem has been formulated as a convex optimization problem and numerical methods have been proposed to produce reliable lower bounds for discrete-variable QKD protocols. We investigate the applicability of these numerical approaches and apply the numerical methods to study a variety of protocols, including measurement-device-independent (MDI) protocols, variations of the BB84 protocol with a passive countermeasure against Trojan horse attacks, and the phase-encoding BB84 protocol using attenuated laser sources without continuous phase randomization.en
dc.language.isoenen
dc.publisherUniversity of Waterlooen
dc.subjectquantum key distributionen
dc.subjectnumerical security proofen
dc.titleSecurity Proofs for Quantum Key Distribution Protocols by Numerical Approachesen
dc.typeMaster Thesisen
dc.pendingfalse
uws-etd.degree.departmentPhysics and Astronomyen
uws-etd.degree.disciplinePhysics (Quantum Information)en
uws-etd.degree.grantorUniversity of Waterlooen
uws-etd.degreeMaster of Scienceen
uws.contributor.advisorLütkenhaus, Norbert
uws.contributor.affiliation1Faculty of Scienceen
uws.published.cityWaterlooen
uws.published.countryCanadaen
uws.published.provinceOntarioen
uws.typeOfResourceTexten
uws.peerReviewStatusUnrevieweden
uws.scholarLevelGraduateen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record


UWSpace

University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages