Speaker
Ms
Marie Louise Umuhire
(University of Kwazulu Natal, School of Chemistry and Physics, Westville Campus, Durban, South Africa)
Description
Quantum key distribution (QKD) is a process of encoding information in quantum carrier such photons that is shared between legitimate users (usually referred to as Alice and Bob) in the presence of an eavesdropper (usually referred to as Eve) [1]. Alice (sender) and Bob (receiver) are connected via two channels namely a quantum channel and classical channel. A quantum channel can be an optical fibre or free space; it enables users to exchange quantum information (single photons). A classical channel can be a computer network or a telephone line; it is used for the analysis of the transmitted information, the evaluation of the efficiency of the system and elimination of any error committed during the communication [1].
Since the introduction of QKD, many protocols have been proposed which can ensure the security of exchanging information [2-5]. The implementation of these protocols exploits the laws of Physics by using binary encoding based on phase, polarisation or time-bin degrees of freedom and achieves a secret key rate of at least one bit per photon [1, 6].
The implementation of a QKD system requires the execution of two major processes, such as quantum transmission and post-processing procedure. The second process is composed with 3 steps namely error estimation, error reconciliation and privacy amplification. This research project focuses on the privacy amplification where the size of the reconciled key is reduced in order to eliminate any information an eavesdropper could have gained.
References
1. Gisin, N., et al., Quantum cryptography. Reviews of modern physics, 2002. 74(1): p. 145.
2. Bennett, C.H., Quantum cryptography using any two nonorthogonal states. Physical review letters, 1992. 68(21): p. 3121.
3. Ekert, A.K., Quantum cryptography based on Bell’s theorem. Physical review letters, 1991. 67(6): p. 661.
4. Scarani, V., et al., Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical review letters, 2004. 92(5): p. 057901.
5. Gisin, N., et al., Towards practical and fast quantum cryptography. arXiv preprint quant-ph/0411022, 2004.
6. Scarani, V., et al., The security of practical quantum key distribution. Reviews of modern physics, 2009. 81(3): p. 1301.
Supervisor details<br><b>If not a student, type N/A.</b><br>Student abstract submision<br>requires supervisor permission:<br>please give their name,<br> institution and email address.
Prof. Francesco Petruccione, University of KwaZulu-Natal, petruccione@ukzn.ac.za
Please confirm that you<br>have carefully read the<br>abstract submission instructions<br>under the menu item<br>"Call for Abstracts"<br><b>(Yes / No)</b> | Yes |
---|---|
Consideration for<br>student awards<br><b>Choose one option<br>from those below.</b><br>N/A<br>Hons<br>MSc<br>PhD | PhD |
Primary author
Ms
Marie Louise Umuhire
(University of Kwazulu Natal, School of Chemistry and Physics, Westville Campus, Durban, South Africa)
Co-authors
Prof.
Francesco Petruccione
(UKZN)
Dr
Yaseera Ismail
(UKZN)