Show simple item record

dc.contributor.authorLin, Jie 14:39:24 (GMT) 14:39:24 (GMT)
dc.description.abstractThis thesis applies numerical methods to analyze the security of quantum key distribution (QKD) protocols. The main theoretical problem in QKD security proofs is to calculate the secret key generation rate. Under certain assumptions, this problem has been formulated as a convex optimization problem and numerical methods have been proposed to produce reliable lower bounds for discrete-variable QKD protocols. We investigate the applicability of these numerical approaches and apply the numerical methods to study a variety of protocols, including measurement-device-independent (MDI) protocols, variations of the BB84 protocol with a passive countermeasure against Trojan horse attacks, and the phase-encoding BB84 protocol using attenuated laser sources without continuous phase randomization.en
dc.publisherUniversity of Waterlooen
dc.subjectquantum key distributionen
dc.subjectnumerical security proofen
dc.titleSecurity Proofs for Quantum Key Distribution Protocols by Numerical Approachesen
dc.typeMaster Thesisen
dc.pendingfalse and Astronomyen (Quantum Information)en of Waterlooen
uws-etd.degreeMaster of Scienceen
uws.contributor.advisorLütkenhaus, Norbert
uws.contributor.affiliation1Faculty of Scienceen

Files in this item


This item appears in the following Collection(s)

Show simple item record


University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages