Abstracts Computer Science

Add abstract

Want to add your dissertation abstract to this database? It only takes a minute!

Search abstract

Search for abstracts by subject, author or institution

Share this abstract

The Security of Simplified Trusted Relays

by William Stacey

Institution: University of Waterloo
Department:
Degree:
Year: 2014
Keywords: Quantum Key Distribution; Trusted Quantum Relays
Posted:
Record ID: 2037246
Full text PDF: http://hdl.handle.net/10012/8720


Abstract

This thesis examines the security of performing quantum key distribution (QKD) with a simplified trusted relay (STR). The protocol carries out the quantum phase of a conventional trusted relay, however, reduces the required complexity of the nodes by carrying out an altered classical phase. Rather than announcing the parity of the final keys, the simplified trusted relay announces the parity of the keys before error correction and privacy amplification. As a result, the majority of the post-processing is left to the end users. Specifically, we examine the security of an STR protocol which carries out the quantum phase of the BB84 protocol. Through two different methods, we derive qubit key rates. For the first method, we require that the basis choice is equally weighted. Furthermore, we limit the relay to a single node. This proof has the benefit that it easily generalizes to an alternate protocol where a node may generate error correcting information. In the second security proof, we derive a key rate for an arbitrary number of nodes with an arbitrary basis weighting. We further extend our analysis to realistic scenarios in which the legitimate parties use weak coherent pulses to transmit signal states over a lossy channel. We provide a framework for generalizing decoy state methods to STR protocols.

Add abstract

Want to add your dissertation abstract to this database? It only takes a minute!

Search abstract

Search for abstracts by subject, author or institution

Share this abstract

Relevant publications

Book cover thumbnail image
Prediction of Upper Body Power of Cross-Country Sk...
by Ozciloglu, Mustafa Mikail
   
Book cover thumbnail image
Bitcoins Mining, Transaction, Security Challenges and Futur...
by Zahid, Muhammad Aslam
   
Book cover thumbnail image
Applying User-Centered Interface Design Methods to...
by Mburu, Lucy Waruguru
   
Book cover thumbnail image
Head-Order Techniques and Other Pragmatics of Lamb...
by Troullinos, Nikos B.
   
Book cover thumbnail image
Visualization of Interface Metaphor for Software An Engineering Approach
by Katre, Dinesh S.
   
Book cover thumbnail image
Indoor Wireless Metering Networks A Collection of Algorithms Enabling Low Power/Low ...
by Altan, Nicola
   
Book cover thumbnail image
Automated Generation of Geometrically-Precise and ...
by Mekni, Mehdi
   
Book cover thumbnail image
A Study on the Tone-Reservation Technique for Peak...
by Butt, Umer Ijaz