BIUSTRE

Security of quantum key distribution protocols: Towards practical realization

Show simple item record

dc.contributor.supervisor Hillhouse, Gregory Campbell
dc.contributor.supervisor Mafu, Mhlambululi
dc.contributor.author Sekga, Comfort
dc.date.accessioned 2026-03-04T10:15:45Z
dc.date.available 2026-03-04T10:15:45Z
dc.date.issued 2024-10
dc.identifier.citation Sekga, C (2024) Security of quantum key distribution protocols: Towards practical realization.Master’s thesis, Botswana International University of Science and Technology: Palapye en_US
dc.identifier.uri https://repository.biust.ac.bw/handle/123456789/725
dc.description Thesis (MSc in Physics ---Botswana International University of Science and Technology, 2024 en_US
dc.description.abstract Quantum cryptography, or more specifically, quantum key distribution (QKD), guarantees information theoretical security-the Holy Grail of communication se- curity based on the principles of quantum physics. Since the primitive BB84 QKD protocol, great strides have been made both in theory and experiments to develop quantum technologies for real-life applications. Even though QKD has reached this milestone, most security analyses are based on the assumption that the QKD system’s preparation and measurement devices are idealized. However, such as- sumptions can be fatal to the security of a QKD system. As a result, we relax some of these assumptions and prove the security of several QKD protocols by using techniques that closely emulate the imprecisions in preparation and measurement devices and the environment in which the QKD is operated. For instance, we apply the post-selection technique to demonstrate the security of the six-state SARG04 protocol against general attacks with finite resources. Through this approach, one can derive a secure key from a multi-photon source while also taking into account an optimal coherent attack. Moreover, we employ the reference frame independence (RFI) concept, which eliminates the need for active alignment of reference frames to derive the security bounds for several proposed QKD protocols. Our security analyses also incorporate the loss-tolerant method, which allows us to prove the security of QKD by considering imperfections in the state preparation. Further- more, we propose the variants of the measurement-device-independent (MDI) QKD protocol, which utilizes a measurement device controlled by a third party, who may be an eavesdropper, thus removing the possibility of detector side-channel attacks. We also exploit quantum resources, such as biphotons, that enable us to achieve high dimensional encoding in our proposed protocols. Also, we utilize vector vortex and scalar beams to study the security of proposed protocols through a turbulent xvi atmospheric link under diverse weather conditions such as rain or haze. The sim- ulation results demonstrate that the proposed protocols can achieve a significant secret key rate at reasonable transmission distances comparable to the key rates obtained under an ideal environment with perfect preparation and measurement devices. Therefore, proving the security of QKD while allowing intrinsic errors due to signal preparation and measurement devices makes a giant step toward realizing practical QKD implementations. en_US
dc.publisher BIUST en_US
dc.subject Quantum key distribution en_US
dc.subject Post-selection techniqu en_US
dc.subject Reference frame independence en_US
dc.subject Biphotons en_US
dc.title Security of quantum key distribution protocols: Towards practical realization en_US
dc.description.level msc en_US
dc.description.accessibility unrestricted en_US
dc.description.department paa en_US


Files in this item

This item appears in the following Collection(s)

  • Faculty of Sciences
    This collection is made up of electronic theses and dissertations produced by post graduate students from Faculty of Sciences

Show simple item record

Search BIUSTRE


Browse

My Account