Practical quantum cryptography : demonstration of secure commitments in the noisy storage model.
The establishment of quantum theory has sparked further advancements in computer science and information theory. In this work, we explore aspects of quantum cryptography, showing how physical assumptions combined with fundamental laws of nature allow for secure communication, without additi...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/49467 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-49467 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-494672023-02-28T23:11:22Z Practical quantum cryptography : demonstration of secure commitments in the noisy storage model. Ng, Nelly Huei Ying. Chew Lock Yue School of Physical and Mathematical Sciences DRNTU::Science::Physics The establishment of quantum theory has sparked further advancements in computer science and information theory. In this work, we explore aspects of quantum cryptography, showing how physical assumptions combined with fundamental laws of nature allow for secure communication, without additional computational assumptions as frequently invoked in many present-day cryptographic protocols. These progresses have wide applications, which can be used to perform tasks which lie in the central interest of modern cryptography, such as secure identi cation of a customer to an ATM machine. In particular, we have studied the bit commitment protocol within the scope of Noisy- Storage Model, and proved its robustness against experimental errors, demonstrating the feasibility of executing the protocol with real-world quantum devices. Having so, we conducted the implementation with actual optical devices. On the technical aspect, we developed a new set of uncertainty relations, which are extremely useful for actual implementations of protocols. These relations allow a signi cant reduction in the amount of classical information post-processing, directly shortening the computational time for secure two-party protocols in the model. Our approach involves the analytical optimization for a certain class of R enyi entropic measures conditioned on quantum measurements, which might be of independent interest. Bachelor of Science in Physics 2012-05-21T01:15:45Z 2012-05-21T01:15:45Z 2012 2012 Final Year Project (FYP) http://hdl.handle.net/10356/49467 en 85 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Science::Physics |
spellingShingle |
DRNTU::Science::Physics Ng, Nelly Huei Ying. Practical quantum cryptography : demonstration of secure commitments in the noisy storage model. |
description |
The establishment of quantum theory has sparked further advancements in computer
science and information theory. In this work, we explore aspects of quantum cryptography,
showing how physical assumptions combined with fundamental laws of nature allow
for secure communication, without additional computational assumptions as frequently
invoked in many present-day cryptographic protocols. These progresses have wide applications,
which can be used to perform tasks which lie in the central interest of modern
cryptography, such as secure identi cation of a customer to an ATM machine.
In particular, we have studied the bit commitment protocol within the scope of Noisy-
Storage Model, and proved its robustness against experimental errors, demonstrating the
feasibility of executing the protocol with real-world quantum devices. Having so, we
conducted the implementation with actual optical devices. On the technical aspect, we
developed a new set of uncertainty relations, which are extremely useful for actual implementations
of protocols. These relations allow a signi cant reduction in the amount of
classical information post-processing, directly shortening the computational time for secure
two-party protocols in the model. Our approach involves the analytical optimization
for a certain class of R enyi entropic measures conditioned on quantum measurements,
which might be of independent interest. |
author2 |
Chew Lock Yue |
author_facet |
Chew Lock Yue Ng, Nelly Huei Ying. |
format |
Final Year Project |
author |
Ng, Nelly Huei Ying. |
author_sort |
Ng, Nelly Huei Ying. |
title |
Practical quantum cryptography : demonstration of secure commitments in the noisy storage model. |
title_short |
Practical quantum cryptography : demonstration of secure commitments in the noisy storage model. |
title_full |
Practical quantum cryptography : demonstration of secure commitments in the noisy storage model. |
title_fullStr |
Practical quantum cryptography : demonstration of secure commitments in the noisy storage model. |
title_full_unstemmed |
Practical quantum cryptography : demonstration of secure commitments in the noisy storage model. |
title_sort |
practical quantum cryptography : demonstration of secure commitments in the noisy storage model. |
publishDate |
2012 |
url |
http://hdl.handle.net/10356/49467 |
_version_ |
1759853316202823680 |