UWSpace is currently experiencing technical difficulties resulting from its recent migration to a new version of its software. These technical issues are not affecting the submission and browse features of the site. UWaterloo community members may continue submitting items to UWSpace. We apologize for the inconvenience, and are actively working to resolve these technical issues.
 

Application of the Flag-State Squashing Model to Numerical Quantum Key Distribution Security Analysis

dc.contributor.authorLi, Nicky Kai Hong
dc.date.accessioned2020-09-18T13:35:53Z
dc.date.available2020-09-18T13:35:53Z
dc.date.issued2020-09-18
dc.date.submitted2020-09-14
dc.description.abstractThe squashing model proof technique is a powerful tool in proving security of quantum key distribution (QKD) protocols since it reduces the dimension of the associated computational problem from infinite to finite. In the first half of this thesis, we formally prove that the unconditional asymptotic security of an arbitrary QKD protocol after applying a squashing model implies the same security for the original protocol. We also prove rigorously that the squashing map of the flag-state squashing model is indeed a quantum channel for an infinite-dimensional input Hilbert space. In the second half of the thesis, we apply the flag-state squashing model to the phase-encoded BB84 protocol. Since all phase-encoded BB84 implementations have signal states with unbalanced amplitudes in practice, the original security analyses a priori do not apply to them. Previous security proofs use signal tagging of multi-photon pulses to recover the behaviour of regular BB84. This is overly conservative, as for unbalanced signals, the photon-number splitting attack does not leak full information to Eve. In this work, we exploit the flag-state squashing model to preserve some parts of the multi-photon generated private information in our analysis. Using a numerical proof technique, we obtain significantly higher key rates compared with previously published results in the low-loss regime. It turns out that the usual scenario of untrusted dark counts runs into conceptual difficulties in some parameter regime. Thus, we discuss the trusted dark count scenario in this paper as well. We also report a gain in key rates when part of the total loss is known to be induced by a trusted device. We highlight that all these key rate improvements can be achieved without modification of the experimental setup.en
dc.identifier.urihttp://hdl.handle.net/10012/16320
dc.language.isoenen
dc.pendingfalse
dc.publisherUniversity of Waterlooen
dc.subjectQuantum Key Distributionen
dc.subjectSquashing Modelen
dc.subjectQuantum Cryptographyen
dc.subjectQuantum Informationen
dc.titleApplication of the Flag-State Squashing Model to Numerical Quantum Key Distribution Security Analysisen
dc.typeMaster Thesisen
uws-etd.degreeMaster of Scienceen
uws-etd.degree.departmentPhysics and Astronomyen
uws-etd.degree.disciplinePhysics (Quantum Information)en
uws-etd.degree.grantorUniversity of Waterlooen
uws.contributor.advisorLütkenhaus, Norbert
uws.contributor.affiliation1Faculty of Scienceen
uws.peerReviewStatusUnrevieweden
uws.published.cityWaterlooen
uws.published.countryCanadaen
uws.published.provinceOntarioen
uws.scholarLevelGraduateen
uws.typeOfResourceTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Li_NickyKaiHong.pdf
Size:
1.26 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
6.4 KB
Format:
Item-specific license agreed upon to submission
Description: