Publication:
Deterministic quantum key distribution protocols : development and security analysis

dc.contributor.affiliation#PLACEHOLDER_PARENT_METADATA_VALUE#en_US
dc.contributor.authorJesni bin Shamsul Shaarien_US
dc.date.accessioned2024-10-09T07:40:55Z
dc.date.available2024-10-09T07:40:55Z
dc.date.issued2008
dc.description.abstractThe wonderful marriage between quantum mechanics and computation and information theory has brought about several interesting paradigmatic changes in matters related to computing and information security. In this regard, it results on one hand, the hope for true supercomputers, giving rise to the possibility of new algorithms and resources to solve computational issues which once were deemed nontractable or hard thus eventually spelling the obsoleteness of modern cryptographic systems relying on computationally hard problems. On the other hand, it promises cryptographic possibilities whose unconditional security relies on the laws of physics. The first quantum cryptography or more specifically quantum key distribution (QKD) protocol was introduced as far back as 1984, commonly referred to as BB84. The emergence of deterministic schemes, which stand in contrast to the nondeterministic nature of many earlier protocols, was noted later. We focus on two way deterministic schemes and emphasise the study in the context of key distribution. In consideration of the existing qubit based two way deterministic protocols, we develop in our thesis a nontrivial generalisation of such a protocol using only 2 mutually unbiased bases (MUB) to one with the maximal number, 3 MUB. This is despite the non existence of the universal-NOT which would forbid a trivial generalisation. We show that the protocol has a higher level of security reflected in both the probability of detecting an eavesdropper as well as its robustness against noise in the context of an eavesdropper executing an Intercept Resend attack. The protocol saturates the constraints of the Holevo bound and qualifies as a protocol in the Holevo limit. We later extend the protocol to exploiting an additional number of dimension of the Hilbert space, thus making use of the qutrit. This is in the same spirit as predecessing works which extend BB84 to 3 dimensional quantum systems. We proceed to prove a no-go theorem which has a similar effect to that of the universal-NOT. These protocols which do not resort to entanglement based setups, are envisioned to be well within the practical capacity of current technology. While the qubit and qutrit based two way deterministic protocols require specific recipes for generalisation to include the exhaustive number of MUB, the relevant arguments are made explicit when we consider the generalisation of such protocol to the use of qudits, quantum systems of arbitrary dimensions although in our work we consider only the case for prime numbered dimension. Referring to the common primitive in the above protocols in encoding onto unknown quantum states as ‘blind encoding’, we point out to a no-go theorem which properly generalises the inability to shift between orthogonal states of arbitrary qudits. We further study the necessary conditions for generalising to using the maximal number of MUB afforded as well as proposing a proper recipe to ensure a protocol of unitary efficiency.en_US
dc.description.callnumbert QA76.9A25J58D 2008en_US
dc.description.degreelevelDoctoral
dc.description.identifierThesis : Deterministic quantum key distribution protocols : development and security analysis / by Jesni Bin Shamsul Shaarien_US
dc.description.identityt00011019669JESNISHAMSULQA76.9A25J58D2008en_US
dc.description.kulliyahKulliyyah of Scienceen_US
dc.description.notesThesis (Ph. D.)--International Islamic University Malaysia, 2007en_US
dc.description.physicaldescriptionxi, 131 p. : ill. ; 30 cm.en_US
dc.description.programmeDoctor of Philosophy (Computational and Theoritical Science)en_US
dc.identifier.urihttps://studentrepo.iium.edu.my/handle/123456789/11190
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/rG95B1xQNNVJVpjBwr2qcMuSBwDga0cY20080702083252812
dc.language.isoenen_US
dc.publisherGombak : Kulliyyah of Science, International Islamic University Malaysia, 2008en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshComputer securityen_US
dc.subject.lcshTelecommunication -- Security measuresen_US
dc.subject.lcshCryptographyen_US
dc.titleDeterministic quantum key distribution protocols : development and security analysisen_US
dc.typeDoctoral Thesisen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
t00011019669JESNISHAMSULQA76.9A25J58D2008_SEC_24.pdf
Size:
406.77 KB
Format:
Adobe Portable Document Format
Description:
24 pages file
Loading...
Thumbnail Image
Name:
t00011019669JESNISHAMSULQA76.9A25J58D2008_SEC.pdf
Size:
1.27 MB
Format:
Adobe Portable Document Format
Description:
Full text secured file

Collections