Individual attack analysis of device independent counterfactual quantum key distribution /

The study of quantum key distribution (QKD) which began in the early 80's has seen much fruition and development for almost three decades now. Ranging from security proofs and new protocols, quantum cryptography takes the limit of security definition to the most extreme especially in the contex...

Full description

Saved in:
Bibliographic Details
Main Author: Suhaili Kamaruddin (Author)
Format: Thesis
Language:English
Published: Kuantan, Pahang : Kulliyyah of Science, International Islamic University Malaysia, 2018
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/10748
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 045900000a22004090004500
008 180504s2018 my a f m 000 0 eng d
040 |a UIAM  |b eng  |e rda 
041 |a eng 
043 |a a-my--- 
050 4 |a QC174.12 
100 0 |a Suhaili Kamaruddin,  |e author  |9 12240 
245 1 |a Individual attack analysis of device independent counterfactual quantum key distribution /  |c by Suhaili binti Kamaruddin 
264 1 |a Kuantan, Pahang :   |b Kulliyyah of Science, International Islamic University Malaysia,   |c 2018 
300 |a xiv, 105 leaves :  |b illustrations ;  |c 30cm. 
336 |2 rdacontent  |a text 
337 |2 rdamedia  |a unmediated 
337 |2 rdamedia  |a computer 
338 |2 rdacarrier  |a volume 
338 |2 rdacarrier  |a online resources 
347 |2 rdaft  |a text file  |b PDF 
500 |a Abstract in English and Arabic. 
500 |a "A thesis submitted in fulfillment of the requirement for the degree of Doctor of Philosophy in Computational and Theoretical Sciences" -- On t.p. 
502 |a Thesis (Ph.D)--International Islamic University Malaysia, 2018. 
504 |a Includes bibliographical references (leaves 101-105). 
520 |a The study of quantum key distribution (QKD) which began in the early 80's has seen much fruition and development for almost three decades now. Ranging from security proofs and new protocols, quantum cryptography takes the limit of security definition to the most extreme especially in the context of device independent QKD. This is the scenario where even the equipment used by the legitimate parties cannot be trusted and is considered as black boxes i.e. the parties are assumed to have no knowledge of the device's full function. Further extreme is explored when the adversary, Eve is even seen to have access to physics beyond that of quantum mechanics; or commonly known as 'supra-quantum' and violations of Bell inequalities become a necessary condition for security. Moving on to a recent development in a new type of protocol, namely counterfactual QKD (CQKD), quantum physics allows for the establishment of secure keys without a net transmission of signals between the legitimate parties; exploiting the single photon entanglement phenomena. We consider taking this new type of protocol to the extreme security requirements of device independence against a supra quantum Eve. We begin by exploring binary measurement based QKD with binary output within a device independent context in which we present the security analysis of the protocol against an individual attack by a supra-quantum adversary considering two different scenarios. The two scenarios involved in determining the maximal key rate are between the measurement that would maximizes the legitimate parties' correlations and those that would achieve maximal violation of Bell-type inequality. We show that higher correlation between shared raw keys at the expense of maximal Bell violation provide for better key rate for low channel disturbance. This naturally allows us to apply to the single photon entanglement QKD where we show that a non zero key rate is indeed possible. Finally, we show how, the counterfactual QKD protocol, as described in the original papers are not secure given a device independent scenario, let alone a supra-quantum adversary. Capitalizing on the results of the earlier chapters, we propose a possible framework for device independent CQKD against an individual attack by a supra-quantum Eve. We show how, at least, as an example of an equivalent protocol could provide for a secure key given a heuristic analysis within the device independent framework and how this can be used in a CQKD picture with a Bell check. We conclude the thesis with future outlooks on how the work could be developed for understanding not only in the field of quantum cryptography but also more fundamental issues in physics. 
650 0 |a Quantum theory  |9 3793 
650 0 |a Quantum communication  |x Security measures  |9 12241 
650 0 |a Cryptography  |9 12242 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Kulliyyah of Science  |z IIUM  |9 4758 
700 0 |a Jesni Shamsul Shaari,  |e degree supervisor  |9 12243 
710 2 |a International Islamic University Malaysia.  |b Kulliyyah of Science  |9 4761 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/10748 
900 |a sz-nbm 
942 |2 lcc 
999 |c 440260  |d 471222 
952 |0 0  |1 0  |2 lcc  |4 0  |6 T Q C 00174.00012 S00947I 02018  |7 3  |8 IIUMTHESIS  |9 762882  |a KIMC  |b KIMC  |c CLOSEACCES  |d 2022-08-15  |g 0.00  |l 1  |o t QC 174.12 S947I 2018  |p 11100431080  |r 2023-01-04  |s 2022-12-22  |t 1  |v 0.00  |y THESIS