Show simple item record

dc.contributor.authorLi, Nicky Kai Hong
dc.date.accessioned2020-09-18 13:35:53 (GMT)
dc.date.available2020-09-18 13:35:53 (GMT)
dc.date.issued2020-09-18
dc.date.submitted2020-09-14
dc.identifier.urihttp://hdl.handle.net/10012/16320
dc.description.abstractThe squashing model proof technique is a powerful tool in proving security of quantum key distribution (QKD) protocols since it reduces the dimension of the associated computational problem from infinite to finite. In the first half of this thesis, we formally prove that the unconditional asymptotic security of an arbitrary QKD protocol after applying a squashing model implies the same security for the original protocol. We also prove rigorously that the squashing map of the flag-state squashing model is indeed a quantum channel for an infinite-dimensional input Hilbert space. In the second half of the thesis, we apply the flag-state squashing model to the phase-encoded BB84 protocol. Since all phase-encoded BB84 implementations have signal states with unbalanced amplitudes in practice, the original security analyses a priori do not apply to them. Previous security proofs use signal tagging of multi-photon pulses to recover the behaviour of regular BB84. This is overly conservative, as for unbalanced signals, the photon-number splitting attack does not leak full information to Eve. In this work, we exploit the flag-state squashing model to preserve some parts of the multi-photon generated private information in our analysis. Using a numerical proof technique, we obtain significantly higher key rates compared with previously published results in the low-loss regime. It turns out that the usual scenario of untrusted dark counts runs into conceptual difficulties in some parameter regime. Thus, we discuss the trusted dark count scenario in this paper as well. We also report a gain in key rates when part of the total loss is known to be induced by a trusted device. We highlight that all these key rate improvements can be achieved without modification of the experimental setup.en
dc.language.isoenen
dc.publisherUniversity of Waterlooen
dc.subjectQuantum Key Distributionen
dc.subjectSquashing Modelen
dc.subjectQuantum Cryptographyen
dc.subjectQuantum Informationen
dc.titleApplication of the Flag-State Squashing Model to Numerical Quantum Key Distribution Security Analysisen
dc.typeMaster Thesisen
dc.pendingfalse
uws-etd.degree.departmentPhysics and Astronomyen
uws-etd.degree.disciplinePhysics (Quantum Information)en
uws-etd.degree.grantorUniversity of Waterlooen
uws-etd.degreeMaster of Scienceen
uws.contributor.advisorLütkenhaus, Norbert
uws.contributor.affiliation1Faculty of Scienceen
uws.published.cityWaterlooen
uws.published.countryCanadaen
uws.published.provinceOntarioen
uws.typeOfResourceTexten
uws.peerReviewStatusUnrevieweden
uws.scholarLevelGraduateen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record


UWSpace

University of Waterloo Library
200 University Avenue West
Waterloo, Ontario, Canada N2L 3G1
519 888 4883

All items in UWSpace are protected by copyright, with all rights reserved.

DSpace software

Service outages