Record Details

Role of Nonlocality and Counterfactuality in Quantum Cryptography

Electronic Theses of Indian Institute of Science

View Archive Info
 
 
Field Value
 
Title Role of Nonlocality and Counterfactuality in Quantum Cryptography
 
Creator Akshatha Shenoy, H
 
Subject Quantum Cryptography
Quantum Information Theory
Quantum Nonlocality
Counterfactual Quantum Cryptography
Bosonic Simulation
Quantum Indistinguishability
Quantum Random Number Generation
Leggett-Garg Inequaltiy
Quantum Information Splitting
Quantum Temporal Correlations
Counterfactual Cryptographic Protocols
Quantum Computation
Quantum Key Distribution
Dual Quantum Information Splitting (DQIS)
Computer Science
 
Description Quantum cryptography is arguably the most successfully applied area of quantum information theory. In this work, We invsetigate the role of quantum indistinguishability in random number
generation, quantum temporal correlations, quantum nonlocality and counterfactuality for quantum cryptography. We study quantum protocols for key distribution, and their security in the conventional setting, in the counterfactual paradigm, and finally also in the device-independent scenario as applied to prepare-and-measure schemes.
We begin with the interplay of two essential non-classical features like quantum indeterminism and quantum indistinguishability via a process known as bosonic stimulation is discussed. It
is observed that the process provides an efficient method for macroscopic extraction of quantum randomness.
Next, we propose two counterfactual cryptographic protocols, in which a secret key bit is generated even without the physical transmission of a particle. The first protocol is semicounterfactual in the sense that only one of the key bits is generated using interaction-free
measurement. This protocol departs fundamentally from the original counterfactual key distribution protocol in not encoding secret bits in terms of photon polarization. We discuss how the security in the protocol originates from quantum single-particle non-locality. The second protocol is designed for the crypto-task of certificate authorization, where a trusted third party authenticates an entity (e.g., bank) to a client. We analyze the security of both protocols under various general incoherent attack models.
The next part of our work includes study of quantum temporal correlations. We consider the use of the Leggett-Garg inequalities for device-independent security appropriate for prepare-and-measure protocols subjected to the higher dimensional attack that would completely undermine standard BB84.
In the last part, we introduce the novel concept of nonlocal subspaces constructed using the graph state formalism, and propose their application for quantum information splitting. In particular, we use the stabilizer formalism of graph states to construct degenerate Bell operators,
whose eigenspace determines the nonlocal subspace, into which a quantum secret is encoded and shared among an authorized group of agents, or securely transmitted to a designated secret retriever. The security of our scheme arises from the monogamy of quantum correlations. The quantum violation of the Bell-type inequality here is to its algebraic maximum, making this approach inherently suitable for the device-independent scenario.
 
Contributor Srinivas, T
 
Date 2018-01-09T01:55:24Z
2018-01-09T01:55:24Z
2018-01-09
2014
 
Type Thesis
 
Identifier http://etd.iisc.ernet.in/handle/2005/2987
http://etd.ncsi.iisc.ernet.in/abstracts/3850/G26725-Abs.pdf
 
Language en_US
 
Relation G26725