Date of Submission

Winter 1-27-2021

Date of Award

Winter 1-27-2022

Institute Name (Publisher)

Indian Statistical Institute

Document Type

Doctoral Thesis

Degree Name

Doctor of Philosophy

Subject Name

Cryptology

Department

Applied Statistics Unit (ASU-Kolkata)

Supervisor

Paul, Goutam (ASU-Kolkata; ISI)

Abstract (Summary of the Work)

Quantum key distribution (QKD) has raised some promise for more secured communication than its classical counterpart. It allows the legitimate parties to detect eavesdropping which introduces error in the channel. If disturbed, there are ways to distill a secure key within some threshold error-rate. The amount of information gained by an attacker is generally quantified by (Shannon) mutual information. Knowing the maximum amount of information that an intruder can gain is important for post-processing purposes, and we mainly focus on that side in the thesis. Renyi information is also useful especially when post-processing is considered. The scope of this thesis is to first describe some relevant ingredients for QKD and then study some open-ended issues. We mostly focus on the 8B84 protocol and some issues relating optimal eavesdropping on it when each information-carrying particles are attacked individually. However, our results and techniques can also be applied for other protocols and different eavesdropping strategies. We felt a few other eavesdropping techniques worthy to analyze in that Line, despite Limitations to achieve newer results . First we study the optimal eavesdropping technique on the BB84 protocol and show that the optimal information can be achieved in infinitely many different ways to interact and measure the information-carriers. Although they are mathematically equivalent in some sense, that variety may help when designing the eavesdropping setup. However, it was not clear whether more such optimal interactions exist or not. This has lead us to derive them through a chain of necessary and sufficient conditions (NSC), which are shown to be in a one-to-one correspondence with the earlier interactions. In this process we arrive at a new NSC restricting attackers particles to a specific orientation, establishing the geometry of the attack more explicitly than earlier. Some explicit connections are shown with other modes of gleaning information like cloning. However, for practical purposes all an attacker requires is the evolution that entangles her ancilla with the senders particle, and the corresponding measurement that will lead her to optimal information gain. This is generally neglected in the literature as they exhibit a specific interaction. In our case, having infinitely many options to interact, we felt it better to address the issue of findings optimal evolutions. Overall, we have added more mathematical structures in the framework of optimal eavesdropping. We wanted to analyze the more generalized ways to attack, where a whole chunk of information-carrying particles can be evolved and then measured at a go. The process becomes complex to tackle when the chunks go bigger. Yet, we have explained the mathematical details of some of the existing results to point out the difficulties.

Comments

ProQuest Collection ID: http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:28842754

Total 205 pages.

Control Number

ISILib-TH493

Creative Commons License

Creative Commons Attribution 4.0 International License
This work is licensed under a Creative Commons Attribution 4.0 International License.

DOI

http://hdl.handle.net/10263/7147

Share

COinS