Add abstract
Want to add your dissertation abstract to this database? It only takes a minute!
Search abstract
Search for abstracts by subject, author or institution
Want to add your dissertation abstract to this database? It only takes a minute!
Search for abstracts by subject, author or institution
The Security of Simplified Trusted Relays
by William Stacey
Institution: | University of Waterloo |
---|---|
Department: | |
Degree: | |
Year: | 2014 |
Keywords: | Quantum Key Distribution; Trusted Quantum Relays |
Posted: | |
Record ID: | 2037246 |
Full text PDF: | http://hdl.handle.net/10012/8720 |
This thesis examines the security of performing quantum key distribution (QKD) with a simplified trusted relay (STR). The protocol carries out the quantum phase of a conventional trusted relay, however, reduces the required complexity of the nodes by carrying out an altered classical phase. Rather than announcing the parity of the final keys, the simplified trusted relay announces the parity of the keys before error correction and privacy amplification. As a result, the majority of the post-processing is left to the end users. Specifically, we examine the security of an STR protocol which carries out the quantum phase of the BB84 protocol. Through two different methods, we derive qubit key rates. For the first method, we require that the basis choice is equally weighted. Furthermore, we limit the relay to a single node. This proof has the benefit that it easily generalizes to an alternate protocol where a node may generate error correcting information. In the second security proof, we derive a key rate for an arbitrary number of nodes with an arbitrary basis weighting. We further extend our analysis to realistic scenarios in which the legitimate parties use weak coherent pulses to transmit signal states over a lossy channel. We provide a framework for generalizing decoy state methods to STR protocols.
Want to add your dissertation abstract to this database? It only takes a minute!
Search for abstracts by subject, author or institution
Prediction of Upper Body Power of Cross-Country Sk...
|
|
Bitcoins
Mining, Transaction, Security Challenges and Futur...
|
|
Applying User-Centered Interface Design Methods to...
|
|
Head-Order Techniques and Other Pragmatics of Lamb...
|
|
Visualization of Interface Metaphor for Software
An Engineering Approach
|
|
Indoor Wireless Metering Networks
A Collection of Algorithms Enabling Low Power/Low ...
|
|
Automated Generation of Geometrically-Precise and ...
|
|
A Study on the Tone-Reservation Technique for Peak...
|
|