Dissertations / Theses on the topic 'Quantum communication Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 26 dissertations / theses for your research on the topic 'Quantum communication Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lunemann, Carolin. "Quantum cryptography : security analysis of multiuser quantum communication with embedded authentication." Master's thesis, Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2007/1275/.
Full textIn der Diplomarbeit werden drei verschiedene quantenkryptographische Protokolle mit dem Schwerpunkt auf authentifizierten Quantennetzwerken analysiert. Die Sicherheit der Protokolle gegenüber verschiedenen Angriffen wird untersucht, wobei der Fokus auf kompletten Personifikationsattacken („impersonation attacks“) liegt. Auf Basis der Sicherheitsanalyse und den Netzwerkanforderungen werden entsprechende Verbesserungen vorgeschlagen. Um die Gefahr von Personifikationen realistisch abschätzen zu können, wird außerdem der Einfluss des Testablaufs analysiert. Um zusätzlichen Schutz gegen Personifikationsattacken zu gewährleisten, werden die Rahmenbedingungen für eine allgemeine Testspezifikation festgelegt.
Rafiei, Nima. "Quantum Communication Networks." Thesis, Stockholms universitet, Fysikum, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-186606.
Full textLan, Shau-Yu. "Matter-light entanglement with cold." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28197.
Full textCommittee Chair: Kuzmich, Alex; Committee Member: Chapman, Michael; Committee Member: Citrin, David; Committee Member: Kennedy, T. A. Brian; Committee Member: Raman, Chandra
Matsukevich, Dzmitry. "Quantum networking with atomic ensembles." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07072006-173336/.
Full textKennedy, Brian, Committee Member ; Chapman, Michael, Committee Member ; Kuzmich, Alex, Committee Chair ; Raman, Chandra, Committee Member ; Voss, Paul, Committee Member.
Boström, Kim. "Lossless quantum data compression and secure direct communication." Phd thesis, Universität Potsdam, 2004. http://opus.kobv.de/ubp/volltexte/2005/100/.
Full textDie zwei Themen der Dissertation umfassen 1) die Möglichkeit, eine Nachricht in einem Quantenkanal verlustfrei zu komprimieren und 2) die Möglichkeit eine Nachricht von einer Partei zu einer einer anderen direkt und auf sichere Weise zu übermitteln, d.h. ohne dass es einer dritte Partei möglich ist, die Nachricht abzuhören und dabei unerkannt zu bleiben.
Die wesentlichen Ergebnisse der Dissertation sind die folgenden.
Ein allgemeiner Formalismus für Quantencodes mit variabler Länge wird ausgearbeitet. Diese Codes sind notwendig um verlustfreie Kompression zu ermöglichen. Wegen der Quantennatur des Kanals sind die codierten Nachrichten allgemein in einer Superposition von verschiedenen Längen. Es zeigt sich, daß es unmöglich ist eine Quantennachricht verlustfrei zu komprimieren, wenn diese dem Sender nicht apriori bekannt ist. Im anderen Falle wird die Möglichkeit verlustfreier Quantenkompression gezeigt und eine untere Schranke für die Kompressionsrate abgeleitet. Des weiteren wird ein expliziter Kompressionsalgorithmus konstruiert, der für beliebig vorgegebene Ensembles aus Quantennachrichten funktioniert.
Ein quantenkryptografisches Prokoll - das “Ping-Pong Protokoll” - wird vorgestellt, welches die sichere direkte übertragung von klassischen Nachrichten durch einen Quantenkanal ermöglicht. Die Sicherheit des Protokolls gegen beliebige Abhörangriffe wird bewiesen für den Fall eines idealen Quantenkanals. Im Gegensatz zu anderen quantenkryptografischen Verfahren ist das Ping-Pong Protokoll deterministisch und kann somit sowohl für die Übermittlung eines zufälligen Schlüssels als auch einer komponierten Nachricht verwendet werden. Das Protokoll is perfekt sicher für die Übertragung eines Schlüssels und quasi-sicher für die direkte Übermittlung einer Nachricht. Letzteres bedeutet, dass die Wahrscheinlichkeit eines erfolgreichen Abhörangriffs exponenziell mit der Länge der Nachricht abnimmt.
This thesis deals with the encoding and transmission of information through a quantum channel. A quantum channel is a quantum mechanical system whose state is manipulated by a sender and read out by a receiver. The individual state of the channel represents the message.
The two topics of the thesis comprise 1) the possibility of compressing a message stored in a quantum channel without loss of information and 2) the possibility to communicate a message directly from one party to another in a secure manner, that is, a third party is not able to eavesdrop the message without being detected.
The main results of the thesis are the following.
A general framework for variable-length quantum codes is worked out. These codes are necessary to make lossless compression possible. Due to the quantum nature of the channel, the encoded messages are in general in a superposition of different lengths. It is found to be impossible to compress a quantum message without loss of information if the message is not apriori known to the sender. In the other case it is shown that lossless quantum data compression is possible and a lower bound on the compression rate is derived. Furthermore, an explicit compression scheme is constructed that works for arbitrarily given source message ensembles.
A quantum cryptographic protocol - the “ping-pong protocol” - is presented that realizes the secure direct communication of classical messages through a quantum channel. The security of the protocol against arbitrary eavesdropping attacks is proven for the case of an ideal quantum channel. In contrast to other quantum cryptographic protocols, the ping-pong protocol is deterministic and can thus be used to transmit a random key as well as a composed message.
The protocol is perfectly secure for the transmission of a key, and it is quasi-secure for the direct transmission of a message. The latter means that the probability of successful eavesdropping exponentially decreases with the length of the message.
Sit, Alicia. "Quantum Communication: Through the Elements: Earth, Air, Water." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39648.
Full textJogenfors, Jonathan. "Breaking the Unbreakable : Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography." Doctoral thesis, Linköpings universitet, Informationskodning, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-140912.
Full textEn viktig konsekvens av kvantmekaniken är att okända kvanttillstånd inte kan klonas. Denna insikt har gett upphov till kvantkryptering, en metod för två parter att med perfekt säkerhet kommunicera hemligheter. Ett komplett bevis för denna säkerhet har dock låtit vänta på sig eftersom en attackerare i hemlighet kan manipulera utrustningen så att den läcker information. Som ett svar på detta utvecklades apparatsoberoende kvantkryptering som i teorin är immun mot sådana attacker. Apparatsoberoende kvantkryptering har en mycket högre grad av säkerhet än vanlig kvantkryptering, men det finns fortfarande ett par luckor som en attackerare kan utnyttja. Dessa kryphål har tidigare inte tagits på allvar, men denna avhandling visar hur även små svagheter i säkerhetsmodellen läcker information till en attackerare. Vi demonstrerar en praktisk attack där attackeraren aldrig upptäcks trots att denne helt kontrollerar systemet. Vi visar också hur kryphålen kan förhindras med starkare säkerhetsbevis. En annan tillämpning av kvantmekanikens förbud mot kloning är pengar som använder detta naturens egna kopieringsskydd. Dessa kvantpengar har helt andra egenskaper än vanliga mynt, sedlar eller digitala banköverföringar. Vi visar hur man kan kombinera kvantpengar med en blockkedja, och man får då man en slags "kvant-Bitcoin". Detta nya betalningsmedel har fördelar över alla andra betalsystem, men nackdelen är att det krävs en kvantdator.
Zhang, Zheshen. "Quantum key distribution protocols with high rates and low costs." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28240.
Full textEriksson, Hampus. "Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card." Thesis, Linköpings universitet, Informationskodning, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-169039.
Full textRödiger, Jasper. "Time-Frequency Quantum Key Distribution: Numerical Assessment and Implementation over a Free-Space Link." Doctoral thesis, Humboldt-Universität zu Berlin, 2020. http://dx.doi.org/10.18452/21046.
Full textQuantum key distribution (QKD), the first applicable quantum technology, promises information theoretically secure communication. In the presented work the time-frequency (TF)-QKD protocol was examined, which uses time and frequency, namely pulse position modulation (PPM) in the time domain and frequency shift keying (FSK) in the frequency domain as the two complementary bases. Its security relies on the quantum properties of light and the time-frequency uncertainty relation. TF-QKD can be implemented mostly with standard telecom-technology in the 1550 nm band. The PPM basis can be implemented with modulators and the FSK basis with help of wavelength-division multiplexing technology. The TF-QKD protocol is capable of providing an arbitrarily large alphabet enabling more than 1 bit/photon. Moreover, it is robust in the atmosphere making it suitable for transmission over the free-space channel. In the present work the TF-QKD protocol is assessed theoretically, implemented with off-the-shelf components for 1 bit/photon and free-space transmission with optical tracking over a 388 m testbed is demonstrated in daylight. Using components at hand, secret key rates of 364 kbit/s back-to-back and 9 kbit/s over the free-space channel could be demonstrated.
Qin, Hao. "Sécurité pratique de systèmes de cryptographie quantique : étude d'attaques et développement de contre-mesures." Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0040.
Full textIn this thesis, I study a cryptographic primitive called quantum key distribution which allows two remote parties to share a secret key, in the presence of an eavesdropper, whose power is only limited by the laws of quantum physics. I focus my study on the implementation and the practical security of continuousvariable protocols. For the first time, I have proposed and studied a detector-based side channel attack on a continuous-variable system : saturation attack. This attack opens a new security loophole that we have characterized experimentally in our laboratory, on a real continuous-variable system. Finally, we have demonstrated experimentally for the first time the feasibility of a continuous-variable system deployment in a Dense Wavelength Division Multiplexing network, where quantum signals coexist with intense classical signals in a same fiber
Carneiro, Steven Ramos. "Secure communications based on quantum cryptography." Master's thesis, Universidade de Aveiro, 2010. http://hdl.handle.net/10773/9771.
Full textNo trabalho apresentado, estudamos criptografia quântica, nomeadamente formas de geração, transmissão e detecção de pares de fotões entrelaçados. Para uma melhor compreensão dos processos e fenómenos que estão na sua base, abordamos o paradoxo de Einstein, Podolsky e Rosen (EPR) e a teoria de Bell. Estas teorias possibilitaram-nos investigar sobre a natureza física, local ou não local a nível quântico, tendo sido as respostas obtidas essenciais para a segurança e confidencialidade na transmissão de dados. Depois, exploramos os vários tipos de processos de geração de fotões entrelaçados, concentrando-nos num tipo de processo em particular, a mistura de quatro ondas. Com a base teórica já estabelecida, apresentamos uma montagem experimental na qual geramos, transmitimos e detectamos fotões entrelaçados através da mistura espontânea de quatro ondas. Após uma descrição pormenorizada da montagem experimental, focando nas várias etapas e de algumas particularidades da experiência realizada, apresentamos os resultados obtidos. Nesta experiência usámos 2 tipos de fibras: uma fibra com o zero de dispersão deslocado (DSF) e uma fibra altamente não linear (HNLF), comparando e analisando as diferenças entre elas e a sua contribuição para a experiência em causa. Por fim, apresentamos as conclusões deste trabalho e também o trabalho que poderá ser realizado no futuro.
In the present thesis, we study quantum cryptography, namely the generation processes and, how we can transmit and detect entangled photon pairs. To understand the processes and phenomena which leads us to the core of our work, we look at the Einstein, Podolsky and Rosen paradox (EPR), and the Bell theory for answers. These two theories give us the means to question the locality or nonlocality of physical reality regarding quantum systems, which is of the utmost importance when we consider information security in data transmission. With this, we present several processes to generate entangled photon pairs, focusing on one in particular, Four-Wave Mixing (FWM). With the theoretical groundwork laid out, we present our setup to create, transmit and detect entangled photon pairs using spontaneous four-wave mixing. After a detailed description of our setup, describing the purpose and importance of each stage, we present the obtained results. In this experiment, we use two fibers: a Dispersion-Shifted Fiber (DSF) and a highly nonlinear fiber Highly Nonlinear Fiber (HNLF), comparing the results reached with each fiber. In the final chapter, we present our conclusions and the work that can be done in the near future.
Makarov, Vadim. "Quantum cryptography and quantum cryptanalysis." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1473.
Full textThis doctoral thesis summarizes research in quantum cryptography done at the Department of Electronics and Telecommunications at the Norwegian University of Science and Technology (NTNU) from 1998 through 2007.
The opening parts contain a brief introduction into quantum cryptography as well as an overview of all existing single photon detection techniques for visible and near infrared light. Then, our implementation of a fiber optic quantum key distribution (QKD) system is described. We employ a one-way phase coding scheme with a 1310 nm attenuated laser source and a polarization-maintaining Mach-Zehnder interferometer. A feature of our scheme is that it tracks phase drift in the interferometer at the single photon level instead of employing hardware phase control measures. An optimal phase tracking algorithm has been developed, implemented and tested. Phase tracking accuracy of +-10 degrees is achieved when approximately 200 photon counts are collected in each cycle of adjustment. Another feature of our QKD system is that it uses a single photon detector based on a germanium avalanche photodiode gated at 20 MHz. To make possible this relatively high gating rate, we have developed, implemented and tested an afterpulse blocking technique, when a number of gating pulses is blocked after each registered avalanche. This technique allows to increase the key generation rate nearly proportionally to the increase of the gating rate. QKD has been demonstrated in the laboratory setting with only a very limited success: by the time of the thesis completion we had malfunctioning components in the setup, and the quantum bit error rate remained unstable with its lowest registered value of about 4%.
More than half of the thesis is devoted to various security aspects of QKD. We have studied several attacks that exploit component imperfections and loopholes in optical schemes. In a large pulse attack, settings of modulators inside Alice's and Bob's setups are read out by external interrogating light pulses, without interacting with quantum states and without raising security alarms. An external measurement of phase shift at Alice's phase modulator in our setup has been demonstrated experimentally. In a faked states attack, Eve intercepts Alice's qubits and then utilizes various optical imperfections in Bob's scheme to construct and resend light pulses in such a way that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve's discretion. Construction of such faked states using several different imperfections is discussed. Also, we sketch a practical workflow of breaking into a running quantum cryptolink for the two abovementioned classes of attacks. A special attention is paid to a common imperfection when sensitivity of Bob's two detectors relative to one another can be controlled by Eve via an external parameter, for example via the timing of the incoming pulse. This imperfection is illustrated by measurements on two different single photon detectors. Quantitative results for a faked states attack on the Bennett-Brassard 1984 (BB84) and the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocols using this imperfection are obtained. It is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols. Furthermore we have attempted to integrate this imperfection of detectors into the general security proof for the BB84 protocol. For all attacks, their applicability to and implications for various known QKD schemes are considered, and countermeasures against the attacks are proposed.
The thesis incorporates published papers [J. Mod. Opt. 48, 2023 (2001)], [Appl. Opt. 43, 4385 (2004)], [J. Mod. Opt. 52, 691 (2005)], [Phys. Rev. A 74, 022313 (2006)], and [quant-ph/0702262].
Leifgen, Matthias. "Protocols and components for quantum key distribution." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät, 2016. http://dx.doi.org/10.18452/17473.
Full textIn this thesis, photonic quantum states are used for experimental realisations of two different concepts of quantum information processing. Quantum key distribution (QKD) is revolutionary because it is the only cryptographic scheme offering unconditional security. Two major problems prevail: Firstly, matching the conditions for unconditional security is challenging, secondly, long distance communication beyond 200 km is very demanding because an increasingly attenuated quantum state starts to fail the competition with constant noise. One experiment accomplished in this thesis is concerned with the first problem. The realisation of the actual quantum state is critical. Single photon states from nitrogen and for the first time also silicon vacancy defect centres are used for a QKD transmission under the BB84 (Bennett and Brassard 1984). The deviation of the used single photon states from the ideal state is thoroughly investigated and the information an eavesdropper obtains due to this deviation is analysed. Transmitting quantum states via satellites is a potential solution to the limited achievable distances in QKD. A novel protocol particularly suited for this is implemented for the first time in this thesis, the frequency-time (FT) protocol. The protocol is thoroughly investigated by varying the experimental parameters over a wide range and by evaluating the impact on the performance and the security. Finally, big steps towards a fully automated fibre-based BB84 QKD experiment in the time-bin implementation with autonomous sender and receiver units are accomplished. Another important concept using quantum mechanical properties as a resource is a quantum random number generator (QRNG). Random numbers are used for various applications in computing and cryptography. A QRNG supplying bits with high and quantifiable randomness at a record-breaking rate is reported and the statistical properties of the random output is thoroughly tested.
Lamoureux, Louis-Philippe. "Theoretical and experimental aspects of quantum cryptographic protocols." Doctoral thesis, Universite Libre de Bruxelles, 2006. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210776.
Full text
La présente dissertation a pour but de mettre en avance ces potentiels, tant dans le domaine théorique qu’expérimental. Plus précisément, dans un premier temps, nous étudierons des protocoles de communication quantique et démontrerons que ces protocoles offrent des avantages de sécurité qui n’ont pas d’égaux en communication classique. Dans un deuxième temps nous étudierons trois problèmes spécifiques en clonage quantique ou chaque solution
apportée pourrait, à sa façon, être exploitée dans un problème de communication quantique.
Nous débuterons par décrire de façon théorique le premier protocole de communication quantique qui a pour but la distribution d’une clé secrète entre deux parties éloignées. Ce chapitre nous permettra d’introduire plusieurs concepts et outils théoriques qui seront nécessaires dans les chapitres successifs. Le chapitre suivant servira aussi d’introduction, mais cette fois-ci penché plutôt vers le côté expériemental. Nous présenterons une élégante technique qui nous permettra d’implémenter des protocoles de communication quantique de façon simple. Nous décrirons ensuite des expériences originales de communication quantique basées sur cette technique. Plus précisément, nous introduirons le concept de filtration d’erreur et utiliserons cette technique afin d’implémenter une distribution de clé quantique bruyante qui ne pourrait pas être sécurisé sans cette technique. Nous démontrerons ensuite des expériences implémentant le tirage au sort quantique et d’identification quantique.
Dans un deuxième temps nous étudierons des problèmes de clonage quantique basé sur le formalisme introduit dans le chapitre d’introduction. Puisqu’il ne sera pas toujours possible de prouver l’optimalité de nos solutions, nous introduirons une technique numérique qui nous
permettra de mettre en valeur nos résultats.
Doctorat en sciences, Spécialisation physique
info:eu-repo/semantics/nonPublished
Autebert, Claire. "AlGaAs photonic devices : from quantum state generation to quantum communications." Thesis, Sorbonne Paris Cité, 2016. http://www.theses.fr/2016USPCC166/document.
Full textOne of the main issues in the domain of quantum information and communication is the generation,manipulation and detection of several qubits on a single chip. Several approaches are currentlyinvestigated for the implementation of qubits on different types of physical supports and a varietyof quantum information technologies are under development: for quantum memories, spectacularadvances have been done on trapped atoms and ions, while to transmit information, photons arethe ideal support thanks to their high speed of propagation and their almost immunity againstdecoherence. My thesis work has been focused on the conception, fabrication and characterization ofa miniaturized semiconductor source of entangled photons, working at room temperature and telecomwavelengths. First the theoretical concepts relevant to understand the work are described (chapter1). Then the conception and fabrication procedures are given (chapter 2). Chapter 3 presents theoptoelectronics characterization of the device under electrical pumping, and chapter 4 the resultson the optical losses measurements and the nonlinear optical characterization (second harmonicgeneration, spontaneous parametric down conversion and joint spectral intensity reconstruction).Chapters 5 and 6 focus on the characterization of the quantum state generated by a passive sample(demonstration of indistinguishability and energy-time entanglement) and its utilization in a multiuserquantum key distribution protocol (polarization entanglement). Finally the work on the firstelectrically driven photon pairs source emitting in the telecom range and working at room temperatureis presented (chapter 7)
Ly, Aliou. "Développement d’un oscillateur paramétrique optique continu intense et à faible bruit pour des applications aux communications quantiques." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLS528/document.
Full textLong distance quantum communications are limited to few tens of km due to the attenuation of light in telecom fibres. Quantum repeaters (quantum relays synchronized by photonic quantum memories) were introduced in order to increase distances. Or, currently, the most efficient memories do not operate at wavelengths in the telecom C band. In order to take advantage of these memories, the use of quantum interfaces (second order nonlinear medium) was proposed as an alternative. Thus, by adding by sum frequency generation a pump photon at an appropriate wavelength to the telecom photon carrying the information, one transfers the information to a wavelength compatible with these memories, and this with a preservation of the information initially carried by the telecom photon. Our aim is thus to build a continuous-wave singly resonant optical parametric oscillator (cw SRO) which will provide a wave at 1648 nm that will be frequency summed to telecom photons at 1536 nm to transfer the information to a photon storable into alkali atoms based memory. To efficiently transfer the information, the cw SRO has to fulfill some requirements: a high spectral purity (linewidth ~kHz), a high output power (~1 W) and a wavelength longer than that of the telecom photon to be converted. To this aim, we use the non-resonant wave of a cw SRO. The first work done during this thesis was to experimentally prove the possibility to have both high output power and high spectral purity from a cw SRO. By reusing a cw SRO already built during our previous works, we were able to stabilize at the kHz level the frequency of the non-resonant wave at 947 nm (signal wave) of this SRO, with an output power of more than one watt. Then, we built the cw SRO of which non-resonant wave at 1648 nm (idler wave) has been frequency stabilized below the kHz level along with an output power of the order of one watt. We next studied the long term stability of the idler wavelength at 1648 nm. We have measured frequency drifts of the order of 10 MHz/mn. These drifts originating mainly from the reference cavity to which the SRO is locked, can be reduced by, firstly, an active control of the cavity and by, secondly, the use of robust frequency stabilization techniques
Erven, Christopher. "On Experimental Quantum Communication and Cryptography." Thesis, 2012. http://hdl.handle.net/10012/6595.
Full textZhao, Yi. "Quantum Cryptography in Rreal-life Applications: Assumptions and Security." Thesis, 2009. http://hdl.handle.net/1807/19307.
Full textMeyer-Scott, Evan. "Experimental quantum communication in demanding regimes." Thesis, 2011. http://hdl.handle.net/10012/6052.
Full textBeaudry, Normand James. "Squashing Models for Optical Measurements in Quantum Communication." Thesis, 2009. http://hdl.handle.net/10012/4800.
Full textGigov, Nikolay. "Quantum Key Distribution Data Post-Processing with Limited Resources: Towards Satellite-Based Quantum Communication." Thesis, 2013. http://hdl.handle.net/10012/7244.
Full textPereira, Maria Ana de Matos Afonso. "Experimental Semi-Device Independent Quantum Key Distribution." Master's thesis, 2020. http://hdl.handle.net/10316/92115.
Full textThe goal of quantum key distribution is to safely transfer secret data between two legitimate users through an unreliable network. This is done so by exploiting the properties of quantum mechanics. The security proofs of standard quantum key distribution protocols rely heavily on the characterization of the measurements and prepared quantum states. These assumptions, however, prove to be difficult to meet in real-life implementations. The obvious solution would come as device-independent (DI) security proofs. However, this type of implementation remains a challenge to this day. The alternative to DI found was a semi-device independent approach. Here the devices are non-characterized, and the only assumption made is the inner product information of the sent coherent states. As it is currently one of the most well-established quantum-information technologies, I shall provide a brief introduction and state-of-the-art of quantum key distribution. In this dissertation, I will expound on the implementation of a semi-device independent quantum key distribution protocol. Firstly, state preparation is discussed. The accuracy of the state preparation as well as the measurement operation will have a great impact on the performance of the protocol based on polarization states encoded on weak coherent light pulses. To ensure these are correctly implemented, a full characterization of the polarization controllers used to encode the states is made. After that, the estimation of the parameters needed to prepare the desired polarization states and their respective optimization is explained. In this chapter, the building of the systems needed to control the polarization is also discussed. In the second part of the dissertation, the experimental implementation of the semi-device independent protocol is examined in more depth. Here, the components used shall be specified and their choice is explained. The full control of the experimental set-up will also be discussed. This includes an analysis of the alignment procedures and a characterization of the weak coherent pulses. Lastly, we shall discuss the experimental realization of the protocol and the discussion of the obtained results.
O objetivo da distribuição de chaves quânticas (em inglês QKD, "quantum key distribution") é transferir de forma segura chaves de encriptação entre dois utilizadores através de um canal de comunicação não protegido, com recurso às propriedades da mecânica quântica. As provas de segurança de protocolos padrão de sistemas de distribuição de chaves quânticas, requerem uma caracterização completa das operações de medida e dos estados quânticos preparados. Estas suposições são, no entanto, impraticáveis numa aplicação real devido às imperfeições inerentes aos instrumentos físicos que são utilizados. A solução que surge naturalmente é a aplicação de um sistema de distribuição de chaves quânticas cuja segurança seja assegurada independentemente dos instrumentos experimentais utilizados. No entanto, aplicações práticas deste tipo de protocolos continuam a ser um grande desafio atualmente. A alternativa que surgiu foi uma abordagem semi-independente dos instrumentos utilizados. Nesta situação, os instrumentos utilizados não são caracterizados. A única caracterização a fazer é da informação do produto interno dos estados quânticos que codificam a informação enviada por Alice. O meu projeto de mestrado tem como objetivo a implementação de um protocolo de distribuição de chaves quânticas semi-independente dos dispositivos usados. A dissertação inicia-se com uma breve exposição do estado da arte e introdução ao tema.Segue-se um capítulo com a análise de como os estados quânticos serão preparados. A exatidão desta preparação tem um papel fulcral no funcionamento do protocolo. Para assegurar a sua precisão, é necessário fazer uma caracterização dos controladores de polarização utilizados para codificar os estados. Com base nesta caracterização de polarização, calcularam-se então os parâmetros necessários para preparar os estados quânticos. Neste segundo capítulo é também abordada a construção dos sistemas necessários para controlar a polarização. Na terceira parte da dissertação a implementação experimental do protocolo semi-independente de dispositivos é analisada com mais detalhe. Os componentes utilizados são enunciados e a sua escolha é discutida e fundamentada. Os métodos utilizados para controlar toda experiência são também abordados. Isto inclui uma análise das técnicas de caracterização dos pulsos coerentes. Por fim é discutida a implementação experimental do protocolo.
Outro - NCCR QSIT - Quantum Science and Technology
Lapointe, Rébecca. "Complexité de la communication sur un canal avec délai." Thèse, 2014. http://hdl.handle.net/1866/10686.
Full textWe introduce a new communication complexity model in which we want to determine how much time of communication is needed by two players in order to execute arbitrary tasks on a channel with delay d. We establish a few basic lower and upper bounds and compare this new model to existing models such as the classical and quantum two-party models of communication. We show that the standard communication complexity of a function, modulo a factor of d/ lg d, constitutes an upper bound to its communication complexity on a delayed channel. We introduce a few examples on which a clever strategy depending on the delay procures a significant advantage over the naïve implementation of an optimal communication protocol. We then show that a delayed channel can be used to implement a cryptographic bit swap, but is insufficient on its own to implement an oblivious transfer scheme.
"Quantum cryptography and applications in the optical fiber network." Thesis, 2005. http://library.cuhk.edu.hk/record=b6073966.
Full textLastly, a quantum random number generator based on quantum optics has been experimentally demonstrated. This device is a key component for quantum key distribution as it can create truly random numbers, which is an essential requirement to perform quantum key distribution. This new generator is composed of a single optical fiber coupler with fiber pigtails, which can be easily used in optical fiber communications.
Next, a quantum key distribution over wavelength division multiplexed (WDM) optical fiber networks is realized. Quantum key distribution in networks is a long-standing problem for practical applications. Here we combine quantum cryptography and WDM to solve this problem because WDM technology is universally deployed in the current and next generation fiber networks. The ultimate target is to deploy quantum key distribution over commercial networks. The problems arising from the networks are also studied in this part.
Quantum cryptography, as part of quantum information and communications, can provide absolute security for information transmission because it is established on the fundamental laws of quantum theory, such as the principle of uncertainty, No-cloning theorem and quantum entanglement.
Then quantum key distribution in multi-access networks using wavelength routing technology is investigated in this research. For the first time, quantum cryptography for multiple individually targeted users has been successfully implemented in sharp contrast to that using the indiscriminating broadcasting structure. It overcomes the shortcoming that every user in the network can acquire the quantum key signals intended to be exchanged between only two users. Furthermore, a more efficient scheme of quantum key distribution is adopted, hence resulting in a higher key rate.
Luo, Yuhui.
"January 2005."
Adviser: K. T. Chan.
Source: Dissertation Abstracts International, Volume: 67-01, Section: B, page: 0338.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2005.
Includes bibliographical references.
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. Ann Arbor, MI : ProQuest Information and Learning Company, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
Frazão, João Carlos dos Reis. "Quantum communications system using qubits with polarization encoding." Master's thesis, 2020. http://hdl.handle.net/10316/92563.
Full textCompreende-se criptografia como a prática de princípios e técnicas que permitem uma comunicação segura, na presença de terceiros. Com o desenvolvimento dos computadores quânticos, a utilização de um algoritmo quântico muito eficiente (algoritmo de Shor) para atacar a atual criptografia assimétrica pode transformar-se numa realidade. Isso comprometeria a segurança dos sistemas atuais e futuras trocas de informações. Nesta dissertação, é estudada uma implementação do protocolo quântico BB84, que utiliza variáveis discretas com codificação na polarização de fotões.Na primeira parte deste trabalho, foi estudado o recetor já implementado no laboratório do Instituto de Telecomunicações de Aveiro. De forma a otimizar o processo de recolha e processamento de informação, foi desenvolvida uma solução baseada no Arduino. Conforme foram realizados alguns testes, percebeu-se que seria necessário adicionar um novo Arduino e uma placa periférica para gerir quatro valores de tensão de um controlador de polarização. Foram ainda obtidos resultados testes do Quantum Bit Error Rate (QBER), onde se verifica a estabilidade do sistema.Por último, de forma a obter ritmos de operação elevados, estudou-se uma solução baseada em moduladores IQ (In-phase Quadrature. Para se conseguir gerar os seis estados de polarização nas três bases não ortogonais (base padrão, base diagonal e base circular) propusemos uma estrutura Dual-IQ. Nesta estrutura, o sinal ótico é dividido em duas partes iguais, cada uma passando por um modulador IQ. Aqui, uma diferença de fase é introduzida em cada um dos sinais, e com a ajuda de um rotador de polarização é possível gerar vários estados de polarização. Foram realizadas simulações de forma a demonstrar que esta estrutura é capaz de gerar os seis estados de polarização necessários.
Cryptography can be understood as the practice of principles and techniques, that allows secure communications, in the presence of unwanted parties. With the development of quantum computers, the use of a very efficient quantum algorithm (Shor algorithm) to attack the current asymmetric cryptography can become a reality. This would compromise the security of current systems and future information exchanges.In this dissertation, an implementation of the BB84 quantum protocol is studied, which uses polarization encoding on single photons.In the first part of this work, the already implemented receiver, in the laboratory of Instituto de Telecomunicações de Aveiro was studied. To optimize the process of collecting and processing information, a solution based in the Arduino was developed. As some tests were carried out, it was perceived that the system needs two Arduinos and a peripheral board to manage four voltage values of a polarization controller. The Quantum Bit Error Rate (QBER) tests results were also obtained, where the stability of the system can be analyzed.Finally, in order to obtain high operation rates, a solution based on IQ (In-phase Quadrature) modulators was studied. To generate the six polarization states, in the three non-orthogonal bases (standard base, diagonal base and circular base), we proposed a Dual-IQ structure. In this structure, the optical input signal is divided into two equal parts, each passing on the IQ modulator. Here, a phase difference is introduced in each of the signal, and with the help of a polarization rotator it is possible to generate several polarization states. Simulations have been performed to demonstrate that this structure is capable of generating the six required polarization states.