Show simple item record

dc.contributor.advisorSrinivas, T
dc.contributor.authorAkshatha Shenoy, H
dc.date.accessioned2018-01-09T01:55:24Z
dc.date.accessioned2018-07-31T04:49:11Z
dc.date.available2018-01-09T01:55:24Z
dc.date.available2018-07-31T04:49:11Z
dc.date.issued2018-01-09
dc.date.submitted2014
dc.identifier.urihttps://etd.iisc.ac.in/handle/2005/2987
dc.identifier.abstracthttp://etd.iisc.ac.in/static/etd/abstracts/3850/G26725-Abs.pdfen_US
dc.description.abstractQuantum cryptography is arguably the most successfully applied area of quantum information theory. In this work, We invsetigate the role of quantum indistinguishability in random number generation, quantum temporal correlations, quantum nonlocality and counterfactuality for quantum cryptography. We study quantum protocols for key distribution, and their security in the conventional setting, in the counterfactual paradigm, and finally also in the device-independent scenario as applied to prepare-and-measure schemes. We begin with the interplay of two essential non-classical features like quantum indeterminism and quantum indistinguishability via a process known as bosonic stimulation is discussed. It is observed that the process provides an efficient method for macroscopic extraction of quantum randomness. Next, we propose two counterfactual cryptographic protocols, in which a secret key bit is generated even without the physical transmission of a particle. The first protocol is semicounterfactual in the sense that only one of the key bits is generated using interaction-free measurement. This protocol departs fundamentally from the original counterfactual key distribution protocol in not encoding secret bits in terms of photon polarization. We discuss how the security in the protocol originates from quantum single-particle non-locality. The second protocol is designed for the crypto-task of certificate authorization, where a trusted third party authenticates an entity (e.g., bank) to a client. We analyze the security of both protocols under various general incoherent attack models. The next part of our work includes study of quantum temporal correlations. We consider the use of the Leggett-Garg inequalities for device-independent security appropriate for prepare-and-measure protocols subjected to the higher dimensional attack that would completely undermine standard BB84. In the last part, we introduce the novel concept of nonlocal subspaces constructed using the graph state formalism, and propose their application for quantum information splitting. In particular, we use the stabilizer formalism of graph states to construct degenerate Bell operators, whose eigenspace determines the nonlocal subspace, into which a quantum secret is encoded and shared among an authorized group of agents, or securely transmitted to a designated secret retriever. The security of our scheme arises from the monogamy of quantum correlations. The quantum violation of the Bell-type inequality here is to its algebraic maximum, making this approach inherently suitable for the device-independent scenario.en_US
dc.language.isoen_USen_US
dc.relation.ispartofseriesG26725en_US
dc.subjectQuantum Cryptographyen_US
dc.subjectQuantum Information Theoryen_US
dc.subjectQuantum Nonlocalityen_US
dc.subjectCounterfactual Quantum Cryptographyen_US
dc.subjectBosonic Simulationen_US
dc.subjectQuantum Indistinguishabilityen_US
dc.subjectQuantum Random Number Generationen_US
dc.subjectLeggett-Garg Inequaltiyen_US
dc.subjectQuantum Information Splittingen_US
dc.subjectQuantum Temporal Correlationsen_US
dc.subjectCounterfactual Cryptographic Protocolsen_US
dc.subjectQuantum Computationen_US
dc.subjectQuantum Key Distributionen_US
dc.subjectDual Quantum Information Splitting (DQIS)en_US
dc.subject.classificationComputer Scienceen_US
dc.titleRole of Nonlocality and Counterfactuality in Quantum Cryptographyen_US
dc.typeThesisen_US
dc.degree.namePhDen_US
dc.degree.levelDoctoralen_US
dc.degree.disciplineFaculty of Engineeringen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record