Continuous variable quantum key distribution protocol with Gaussian and non-Gaussian modulations /

Quantum key distribution (QKD) involves generating cryptographic keys using quantum states at both ends of the communicating parties (Alice and Bob). Any attempt to eavesdrop on the transmission will, necessarily by the laws of quantum mechanics, disturb or destroy the states. By identifying and onl...

Full description

Saved in:
Bibliographic Details
Main Author: Becir, Ahmed
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Science, International Islamic University Malaysia, 2012
Subjects:
Online Access:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 042900000a22003610004500
008 130214t2012 my a g m 000 0 eng d
040 |a UIAM  |b eng 
041 |a eng 
050 0 0 |a QC174.12 
100 1 |a Becir, Ahmed  
245 1 |a Continuous variable quantum key distribution protocol with Gaussian and non-Gaussian modulations /  |c by Ahmed Becir 
260 |a Kuala Lumpur :  |b Kulliyyah of Science, International Islamic University Malaysia,   |c 2012 
300 |a xvii, 183 leaves :  |b ill. ;  |c 30cm. 
500 |a Abstracts in English and Arabic. 
500 |a "A thesis submitted in fulfilment of the requirement for the degree of Doctor of Philosophy in Science."--On t.p. 
502 |a Thesis (Ph.D.)--International Islamic University Malaysia, 2012. 
504 |a Includes bibliographical references (leaves 164-170). 
520 |a Quantum key distribution (QKD) involves generating cryptographic keys using quantum states at both ends of the communicating parties (Alice and Bob). Any attempt to eavesdrop on the transmission will, necessarily by the laws of quantum mechanics, disturb or destroy the states. By identifying and only using keys that have not been disturbed, a perfectly secure cryptographic system can be realized. Discrete variable QKD was proposed in 1984 by Bennett and Brassard. Since then attempts to exploit this technology have been beset with the difficulties of working with the discrete variables in question - single photon states. Recently, the idea of continuous variable QKD was developed, in which the information-carrying quantum states are properties of a bright continuous wave laser beam. Bright laser beams are relatively simple to manipulate and can carry large amounts of information even when subject to high loss. This method however also suffers from the limited distance due to the noises introduced by the quantum channel. Continuous variable QKD protocols based on coherent state modulation are theoretically limited to 50 Km. In this thesis we introduce two new continuous variable protocols: The first one is based on the Gaussian modulation of entangled squeezed coherent state. The idea is instead of using maximally entangled state we choose to use weakly entangled state since the latter one is more robust to the quantum channel losses. However, using weakly entangled states makes the former security proofs (that are based on the Heisenberg uncertainty and Holevo quantity) no more efficient, in which we cannot drive tight bounds on the eavesdropper's accessible information. For this purpose we use the decomposition of the real symplectic matrix to derive tight upper bounds for eavesdropping individual and collective attacks. This protocol shows high promise in term of achievable distance, noise tolerance and key rate. It also shows that breaking the 50Km with sufficient key rate is possible. The second protocol is based on the discrete modulation (non Gaussian modulation) of the coherent (phase coherent) states, in which we introduce three different types of this protocol namely 2-states, 4-states and 8-states protocol. The 8-states protocol shows high tolerance against the channel noises and it can achieve hundreds of kilometers distance in fiber optics. 
596 |a 1 6 
650 0 0 |a Quantum theory 
650 0 0 |a Quantum communication  |x Security measures 
650 0 0 |a Cryptography 
653 0 |a Gaussian processes 
653 0 |a Modulation (Electronics) 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Kulliyyah of Science  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Kulliyyah of Science 
856 4 |u https://lib.iium.edu.my/mom/services/mom/document/getFile/Z7hCpVgvkZ7RWCEZrHOlwDRFuKo8axTf20131002120334086  |z Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. 
900 |a hab-ro-rose 
999 |c 437203  |c 437203  |d 468246  |d 468246 
999 |c 437203  |c 437203  |d 468246  |d 468246 
952 |0 0  |6 T QC 000174.12 B392C 2012  |7 0  |8 THESES  |9 758640  |a KIMC  |b KIMC  |c CLOSEACCES  |g 0.00  |o t QC 174.12 B392C 2012  |p 00011277163  |r 2019-09-04  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF QC 174.12 B392C 2012  |7 0  |8 THESES  |9 850410  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf QC 174.12 B392C 2012  |p 00011277164  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG