HEAL DSpace

Security proof of BB84 quantum key distribution (QKD) protocol and study of imperfections over the implementation of the weak+vacuum decoy-state QKD protocol

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Papapanos, Christos en
dc.contributor.author Παπαπάνος, Χρήστος el
dc.date.accessioned 2020-11-22T08:37:29Z
dc.date.available 2020-11-22T08:37:29Z
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/51998
dc.identifier.uri http://dx.doi.org/10.26240/heal.ntua.19696
dc.rights Default License
dc.subject Quantum protocols en
dc.subject Security proof en
dc.subject CSS codes en
dc.subject Quantum Key Distribution (QKD) en
dc.subject BB84 QKD en
dc.subject Decoy-state QKD en
dc.subject Weak+vacuum decoy-state QKD en
dc.subject Imperfections en
dc.subject Implementation en
dc.subject Afterpulse el
dc.subject Chromatic dispersion en
dc.subject Non ideal VOA en
dc.subject Κβαντικά πρωτόκολλα el
dc.subject Απόδειξη ασφαλείας el
dc.subject Κώδικες CSS el
dc.subject Ατέλειες el
dc.subject Υλοποίηση el
dc.subject Χρωματική διασπορά el
dc.subject Μη ιδανικός VOA el
dc.title Security proof of BB84 quantum key distribution (QKD) protocol and study of imperfections over the implementation of the weak+vacuum decoy-state QKD protocol en
dc.contributor.department Εργαστήριο Φωτονικών Επικοινωνιών el
heal.type bachelorThesis
heal.secondaryTitle Απόδειξη Ασφαλείας του Πρωτοκόλλου Διανομής Κβαντικού Κλειδιού (QKD) BB84 και Μελέτη Ατελειών στην Υλοποίηση του Πρωτοκόλλου Weak+Vacuum Decoy-state QKD el
heal.classification Quantum protocols en
heal.classification Quantum optics en
heal.language el
heal.language en
heal.access free
heal.recordProvider ntua el
heal.publicationDate 2020-03-12
heal.abstract Quantum cryptographic protocols exploit basic principles of physics in order to conceal the content of the transmitter's message from third parties. This seems to be the end of the interception of communications. However, just like the classical cryptographic protocols, comprehensive studies are needed in order to prove their security from any kind of possible attacks, namely to guarantee their security level information-theoretically. In the field of Quantum Key Distribution (QKD), where single photons are transferred through fiber networks, the non ideal features of optical components as well other implementation imperfections could cause significant security loopholes. Inspired from this research topic, this diploma thesis contributes to the study of practical real-time implementation of Discrete Variable-QKD (DV-QKD) protocols. This diploma thesis has three goals. The first goal is the brief study of the proof of security of BB84 QKD protocol using the concept of protocols' equivalence and the CSS codes; at the same time we manage to keep only the main steps of this proof so even readers lacking specialized knowledge will be able to understand it. The second goal of this diploma thesis is the study of the way that we can conduct the mathematical formulas for the efficiency metrics (Secure Key Rate, Quantum Bit Error Rate) of a group of protocols- the decoy-state protocols- in a system that uses a fiber optic for the transmittance. In order to accomplish our third goal we choose, from the aforementioned group of protocols, the weak+vacuum decoy-state QKD protocol. We study the way that the non ideal Variable Optical Attenuator (VOA) affects this protocol's efficiency by generalizing the vacuum decoy state and we conduct new formulas for studying the effect of the afterpulse phenomenon on the efficiency of this protocol. Then, we consider the effect of chromatic dispersion in a setup with two Mach-Zehnder interferometers which are used not only on the aforementioned protocols but on even more protocols, thus the mathematical formulas which we conduct are universal. We find the maximum possible generation rate of the Secure Key Rate that this setup can create as well as the value of each phase shifter of the two interferometers in relation to the communication's length and the error detection due to the interference Visibility that we want to succeed. Finally, we present a graphic representation of the previous imperfection on a Matlab environment. en
heal.advisorName Αβραμόπουλος, Ηρακλής el
heal.committeeMemberName Φικιώρης, Γεώργιος el
heal.committeeMemberName Ματσόπουλος, Γεώργιος el
heal.academicPublisher Εθνικό Μετσόβιο Πολυτεχνείο. Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών el
heal.academicPublisherID ntua
heal.numberOfPages 76 p. en
heal.fullTextAvailability false


Αρχεία σε αυτό το τεκμήριο

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής