log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
PhD Defense: Improved Algorithms and Primitives for Quantum Cryptography
Nishant Rodrigues - University of Maryland
Wednesday, November 1, 2023, 1:00-3:00 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

In this dissertation we develop novel frameworks and algorithms in quantum cryptography, specifically for quantum key distribution and random number generation. We show a device independent quantum key distribution algorithm that is based on the notion of synchronous correlations. Most algorithms in DIQKD literature rely on the well-known CHSH inequality which is neither symmetric nor synchronous. We propose a new synchronous Bell inequality that simplifies the QKD setting by being fully symmetric so that the roles of the two parties in the protocol, Alice and Bob, are completely interchangeable. This has implications for QKD hardware since an identical set of devices can be produced for both parties instead of separate devices for each. We also achieve key rates comparable to CHSH-based protocols.

This dissertation also focuses on closing the causality or locality loophole present in device-independent schemes. An assumption that is critical to device-independent protocols is that the two parties are acausally separated and cannot communicate with each other once they receive their inputs. This is typically referred to as the \emph{nonsignaling} condition. If the condition of nonsignaling is violated, then an attacker may simulate the entire protocol classically. This erases any certificate of quantumness produced by the violation of a Bell inequality. We pose a new security assumption with respect to the adversary's uncertainty about the two parties' inputs. We derive a bound for this uncertainty and show that if the uncertainty grows any larger than the threshold, there is no strategy any adversary can use to cheat in the protocol. This closes the causality loophole and makes the protocol easier to implement for practical use.    

A primitive widely used in QKD and other cryptographic protocols is a random bit generator. We define \emph{ideal} and \emph{real} models of random bit generators and show their efficiency and security in the Constructive Cryptography framework. We specifically look at random bit generators based on process tomography of one-qubit channels. We consider ideal quantum random bit generators, then introduce some state preparation and bit-flip errors to define real quantum random bit generators. We show that the ideal and real generators are close to each other in statistical distance.

*We strongly encourage attendees to use their full name (and if possible, their UMD credentials) to join the zoom session.*

This talk is organized by Andrea F. Svejda