Two way quantum key distribution in imperfect settings /

This thesis studies the security and performance of a two-way quantum key distribution protocol namely LM05 given imperfect settings. A toy model for such a two-way protocol; i.e. a model protocol which essentially mimics the LM05 was proposed in which in some sense, it would distill only the most e...

Full description

Saved in:
Bibliographic Details
Main Author: Iskandar bin Bahari
Format: Thesis
Language:English
Published: Kuantan: Kulliyyah of Science, International Islamic University Malaysia 2011
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 043290000a22003250004500
008 120627t2011 my a g m 000 0 eng d
040 |a UIAM  |b eng 
041 |a eng 
043 |a a-my--- 
050 |a QC174.12 
100 1 |a Iskandar bin Bahari 
245 1 |a Two way quantum key distribution in imperfect settings /  |c by Iskandar Bin Bahari 
260 |a Kuantan:   |b Kulliyyah of Science, International Islamic University Malaysia   |c 2011 
300 |a xii, 89 leaves :  |b ill. ;  |c 30cm. 
500 |a Abstract in English and Arabic. 
500 |a "A thesis submitted in fulfilment of the requirement for the degree of Master of Science (Computational and Theoretical Sciences)."--On t.p. 
502 |a Thesis (MSc.CTS)--International Islamic University Malaysia, 2011. 
504 |a Includes bibliographical references ( leaves 85-89). 
520 |a This thesis studies the security and performance of a two-way quantum key distribution protocol namely LM05 given imperfect settings. A toy model for such a two-way protocol; i.e. a model protocol which essentially mimics the LM05 was proposed in which in some sense, it would distill only the most essential features of a two-way QKD scheme and inherently simplify its security analysis with regards to the intercept / resend, two dimensional ancilla based attack and photon number splitting attack. A simple but relevant theorem was proven and noting the obvious advantage of such a model in allowing for single as well as double photon contributions, appropriate key rate formula was derived. It was shown that given an imperfect photon source we had to resort to consider Eve's Renyi information gain for the double photon contribution case. The results exhibit a favorable light on ToM in comparisons against BB84 which highlights an important feature of two-way schemes, i.e. the inclusion of double photon contributions play a very significant role in key generation and allows for a higher key rate compared to BB84 despite the relatively extreme toll of lossy channels. A sufficient condition for ToM's advantage over BB84 was derived and noted that the ultimate culprit seems to be the transmitivity of Alice's equipments. The possible application of the decoy state method on LM05 scheme was also studied in order to learn the effects on the distance ad key rate. Also considering both the case contributions of single and double photon pulses, relevant lower bounds on the corresponding gains in a practical decoy state implementation using two intensities for decoy states were derived. Two different approaches were used in deriving the key rate formulas and several considerations on the derivations of the bounds were made for comparison. Given the results of comparing these with an ideal infinite decoy state case as well as the simulation of the original LM05, it can be said that a more refined method that based on the first approach should be considered as a proper estimation for a finite decoy implementation. On the whole, our practical approach does expectedly fall a little short with regards to the ideal infinite decoy case but really does improve the performance of the original even not as impressive as decoy state BB84 does. Hence we believe our result should provide a better perspective and effectively proposes for a more serious consideration of two-way protocols like LM05. 
596 |a 1 6 
650 |a Quantum theory 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Department of Computational and Theoretical Sciences  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Department of Computational and Theoretical Sciences 
856 4 |u https://lib.iium.edu.my/mom/services/mom/document/getFile/9bt9GlShFkTTxMpdK09dWRcHDYzZZKZX20130717150641893  |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. 
900 |a hab-zhmn 
999 |c 438839  |c 438839  |d 467267  |d 467267 
999 |c 438839  |c 438839  |d 467267  |d 467267 
952 |0 0  |6 T QC 000174.000012 I000081T 002011  |7 0  |8 THESES  |9 758028  |a KIMC  |b KIMC  |c CLOSEACCES  |g 0.00  |o t QC 174.12 I81T 2011  |p 00011253019  |r 2019-09-04  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF QC 174.12 I81T 2011  |7 0  |8 THESES  |9 849009  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf QC 174.12 I81T 2011  |p 11100326633  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG