Please use this identifier to cite or link to this item: http://hdl.handle.net/10263/7250
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhogan, Vinayak-
dc.date.accessioned2022-01-28T06:45:10Z-
dc.date.available2022-01-28T06:45:10Z-
dc.date.issued2019-06-
dc.identifier.citation33p.en_US
dc.identifier.urihttp://hdl.handle.net/10263/7250-
dc.descriptionDissertation under the supervision of Prof. Subhamoy Maitraen_US
dc.description.abstractWith recent developments in quantum communications, much of the focus has been put on development of di erent Quantum Key Distribution(QKD) protocols that can successfully generate a symmetric key over insecure quan- tum channel. In this thesis, I have discussed in-depth security proof of a well known secure protocol named as BB84 protocol. This simple version of proof was rst pro- posed by Shor and Preskill[1], in year 2000. It involves two step derivation of BB84 protocol from a 'Lo-Chau' protocol, which has already been proven secure. I shall provide proof of exponentially lower bounds on mutual infor- mation shared between sender/receiver and an adversary, therfore proving its security. Along with it, I have also introduced another varient of Lo-Chau protocol which is more e cient in terms of shared resources, i.e. it uses almost 50% lesser quantum states exchanged over channel. I shall also prove it to be secure using the same technique used for BB84. iiien_US
dc.language.isoenen_US
dc.publisherIndian Statistical Institute, Kolkataen_US
dc.relation.ispartofseriesDissertation;;2019;5-
dc.subjectCSS codesen_US
dc.subjectBB84en_US
dc.titleProvability of Security and E ciency of Quantum Key Distribution (QKD) Algorithmsen_US
dc.typeOtheren_US
Appears in Collections:Dissertations - M Tech (CS)

Files in This Item:
File Description SizeFormat 
Vinayak - Provability of Security and Efficiency of Quantum .pdf362.63 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.