Publication:
Two way quantum key distribution in imperfect settings

dc.contributor.affiliation#PLACEHOLDER_PARENT_METADATA_VALUE#en_US
dc.contributor.authorIskandar bin Baharien_US
dc.date.accessioned2024-10-09T07:48:34Z
dc.date.available2024-10-09T07:48:34Z
dc.date.issued2011
dc.description.abstractThis thesis studies the security and performance of a two-way quantum key distribution protocol namely LM05 given imperfect settings. A toy model for such a two-way protocol; i.e. a model protocol which essentially mimics the LM05 was proposed in which in some sense, it would distill only the most essential features of a two-way QKD scheme and inherently simplify its security analysis with regards to the intercept / resend, two dimensional ancilla based attack and photon number splitting attack. A simple but relevant theorem was proven and noting the obvious advantage of such a model in allowing for single as well as double photon contributions, appropriate key rate formula was derived. It was shown that given an imperfect photon source we had to resort to consider Eve’s Renyi information gain for the double photon contribution case. The results exhibit a favorable light on ToM in comparisons against BB84 which highlights an important feature of two-way schemes, i.e. the inclusion of double photon contributions play a very significant role in key generation and allows for a higher key rate compared to BB84 despite the relatively extreme toll of lossy channels. A sufficient condition for ToM’s advantage over BB84 was derived and noted that the ultimate culprit seems to be the transmitivity of Alice’s equipments. The possible application of the decoy state method on LM05 scheme was also studied in order to learn the effects on the distance ad key rate. Also considering both the case contributions of single and double photon pulses, relevant lower bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states were derived. Two different approaches were used in deriving the key rate formulas and several considerations on the derivations of the bounds were made for comparison. Given the results of comparing these with an ideal infinite decoy state case as well as the simulation of the original LM05, it can be said that a more refined method that based on the first approach should be considered as a proper estimation for a finite decoy implementation. On the whole, our practical approach does expectedly fall a little short with regards to the ideal infinite decoy case but really does improve the performance of the original even not as impressive as decoy state BB84 does. Hence we believe our result should provide a better perspective and effectively proposes for a more serious consideration of two-way protocols like LM05.en_US
dc.description.callnumbert QC 174.12 I81T 2011en_US
dc.description.degreelevelMaster
dc.description.identifierThesis : Two way quantum key distribution in imperfect settings /by Iskandar Bin Baharien_US
dc.description.identityt00011253019IskandarBaharien_US
dc.description.kulliyahKulliyyah of Scienceen_US
dc.description.notesThesis (MSc.CTS)--International Islamic University Malaysia, 2011en_US
dc.description.physicaldescriptionxii, 89 leaves : ill. ; 30cm.en_US
dc.description.programmeMaster of Science (Computational and Theoretical Sciences)en_US
dc.identifier.urihttps://studentrepo.iium.edu.my/handle/123456789/11502
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/9bt9GlShFkTTxMpdK09dWRcHDYzZZKZX20130717150641893
dc.language.isoenen_US
dc.publisherKuantan: International Islamic University Malaysia 2011en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshQuantum theoryen_US
dc.titleTwo way quantum key distribution in imperfect settingsen_US
dc.typeMaster Thesisen_US
dspace.entity.typePublication

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
t00011253019IskandarBahari_SEC_24.pdf
Size:
585.38 KB
Format:
Adobe Portable Document Format
Description:
24 pages file
Loading...
Thumbnail Image
Name:
t00011253019IskandarBahari_SEC.pdf
Size:
1.28 MB
Format:
Adobe Portable Document Format
Description:
Full text secured file

Collections