Please use this identifier to cite or link to this item:
http://hdl.handle.net/10263/7299
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar, Anoop | - |
dc.date.accessioned | 2022-03-23T10:15:51Z | - |
dc.date.available | 2022-03-23T10:15:51Z | - |
dc.date.issued | 2021-07 | - |
dc.identifier.citation | 66p. | en_US |
dc.identifier.uri | http://hdl.handle.net/10263/7299 | - |
dc.description | Supervisors: Prof. Subhamoy Maitra | en_US |
dc.description.abstract | Quantum Key Distribution Protocol (QKD) is a type of quantum cryptography, i.e., it uses the concepts related to quantum mechanics to establish security in the communication channel. It is a key generation protocol and is used for generating a shared secret key between two parties, commonly known as Alice and Bob. Any QKD protocol uses two communication channels for the key generation. The first one is a quantum channel for the transmission of qubits. The other one is a classical channel for the transmission of random classical bits. The two major processes of any QKD protocol involve key generation algorithm and classical post processing phase. For the key generation process, algorithms like BB84 protocol or Eckart E91 protocol is used. These algorithms use polarisation, entanglement, and measurement concepts of quantum mechanics for generating the key. The key generated in the final step of the key generation algorithm of the QKD protocol is made up of classical bits. Because of the inherent noisy nature of quantum channels, the keys generated at both ends after classical reconciliation can still be wrong. This defeats the purpose of key sharing. To overcome this adversities classical post processing is used. In this phase the keys generated at the two ends are processed via an error correcting scheme to potentially reach a common key without any public sharing of the data. To this end we have studied the behavior of various error correction schemes, both block based and convolutional schemes and later used them as part of the post processing phase of the BB84 QKD protocol. Then we studied the efficiency of these coding schemes with and without the interruption of a malicious third party. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Indian Statistical Institute, Kolkata. | en_US |
dc.relation.ispartofseries | Dissertation;(CS1921) | - |
dc.subject | Quantum Key Distribution Protocol | en_US |
dc.subject | Distribution Protocol | en_US |
dc.subject | Components of Quantum | en_US |
dc.subject | Quantum cryptography | en_US |
dc.title | Classical and Quantum Components of Quantum Key Distribution Protocol | en_US |
dc.type | Other | en_US |
Appears in Collections: | Dissertations - M Tech (CS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AnoopKumar_MTech_CS-19-21.pdf | 665.58 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.