Information-Theoretic Tools for Analyzing Non-IID Structures in Quantum Key Distribution
| dc.contributor.author | Arqand, Amir | |
| dc.date.accessioned | 2025-09-23T13:00:23Z | |
| dc.date.available | 2025-09-23T13:00:23Z | |
| dc.date.issued | 2025-09-23 | |
| dc.date.submitted | 2025-09-22 | |
| dc.description.abstract | Quantum key distribution (QKD) is the task of establishing an information-theoretically secure key between two parties (Alice and Bob) by exploiting the rules of quantum mechanics. A central goal in QKD is to provide finite-size security proofs against the most general class of attacks—namely, coherent attacks. One approach for obtaining such proofs is through the original entropy accumulation theorem (EAT) and the generalized entropy accumulation theorem (GEAT). In this thesis, we improve and extend these EAT-style techniques in several aspects. We begin by presenting techniques for applying the GEAT in the finite-size analysis of generic prepare-and-measure protocols. We then improve the statistical analysis in these EAT-style techniques, yielding a significant improvement in the key rates obtained by these methods. In addition, these improvements can be applied directly at the level of Rényi entropies if desired, yielding fully-Rényi security proofs. Beyond this, we develop an EAT-style framework that can accommodate specific forms of marginal-state constraints ``compatible'' with the source-replacement scheme. This allows us to overcome the repetition-rate restriction previously imposed on the GEAT when analyzing prepare-and-measure protocols. Furthermore, it yields ``fully adaptive'' protocols that can, in principle, update the entropy estimation procedure during the protocol itself. Finally, we investigate the effect of imperfections in QKD by deriving a number of chain rules for mutual information suited for analyzing protocols involving information leakage from imperfect devices. In particular, we derive chain rules between smooth min-entropy and smooth max-information for characterizing one-shot information leakage caused by an additional conditioning register. Furthermore, we introduce an EAT-style theorem for mutual information to simplify the evaluation of leakage measured by smooth max-information. In addition, we derive suitable chain rules to incorporate the leakage process into the GEAT framework. | |
| dc.identifier.uri | https://hdl.handle.net/10012/22532 | |
| dc.language.iso | en | |
| dc.pending | false | |
| dc.publisher | University of Waterloo | en |
| dc.subject | quantum key distribution | |
| dc.subject | rényi entropies | |
| dc.subject | entropy accumulation | |
| dc.subject | information theoretic security | |
| dc.subject | quantum cryptography | |
| dc.title | Information-Theoretic Tools for Analyzing Non-IID Structures in Quantum Key Distribution | |
| dc.type | Doctoral Thesis | |
| uws-etd.degree | Doctor of Philosophy | |
| uws-etd.degree.department | Physics and Astronomy | |
| uws-etd.degree.discipline | Physics (Quantum Information) | |
| uws-etd.degree.grantor | University of Waterloo | en |
| uws-etd.embargo.terms | 0 | |
| uws.contributor.advisor | Lutkenhaus, Norbert | |
| uws.contributor.affiliation1 | Faculty of Science | |
| uws.peerReviewStatus | Unreviewed | en |
| uws.published.city | Waterloo | en |
| uws.published.country | Canada | en |
| uws.published.province | Ontario | en |
| uws.scholarLevel | Graduate | en |
| uws.typeOfResource | Text | en |