• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 17
  • 10
  • 4
  • 1
  • Tagged with
  • 40
  • 40
  • 40
  • 12
  • 11
  • 11
  • 11
  • 8
  • 8
  • 7
  • 7
  • 7
  • 7
  • 7
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Traço parcial em sistemas relativísticos: uma nova visão / Partial trace in relativistic systems: a new view

Taillebois, Emile Raymond Ferreira 08 November 2013 (has links)
Submitted by JÚLIO HEBER SILVA (julioheber@yahoo.com.br) on 2017-07-05T20:29:06Z No. of bitstreams: 2 Dissertação - Emile Raymond Ferreira Taillebois - 2013.pdf: 1511356 bytes, checksum: 65cfae075ab1d008ea3249e5ffc19da9 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) / Approved for entry into archive by Cláudia Bueno (claudiamoura18@gmail.com) on 2017-07-07T19:11:05Z (GMT) No. of bitstreams: 2 Dissertação - Emile Raymond Ferreira Taillebois - 2013.pdf: 1511356 bytes, checksum: 65cfae075ab1d008ea3249e5ffc19da9 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) / Made available in DSpace on 2017-07-07T19:11:05Z (GMT). No. of bitstreams: 2 Dissertação - Emile Raymond Ferreira Taillebois - 2013.pdf: 1511356 bytes, checksum: 65cfae075ab1d008ea3249e5ffc19da9 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2013-11-08 / Conselho Nacional de Pesquisa e Desenvolvimento Científico e Tecnológico - CNPq / In this dissertation, the use of the partial trace of momentum degrees of freedom in the construction of spin reduced density matrices for relativistic massive systems is analyzed. In the regime considered here, massive particles can be described by irreducible unitary representations of the Poincar e group, and the base states are labeled by the dynamical variables of momentum and spin. The reduced density matrices obtained by the partial trace of momenta have unusual properties, since they are not covariant under the action of restricted Lorentz transformations. That behavior produces some important consequences in the study of quantum information in relativistic systems. However, recent arguments have been presented against the use of those matrices in the description of processes involving the transfer of information stored in spin degrees of freedom of relativistic massive particles. Those criticisms are discussed in this dissertation and a connection with the structure of the space of states associated with a given unitary representation is established through a detailed study of the induced representation method applied to the Poincar e group. This allows rewriting the criticisms in literature without the need of a speci c model of interaction for the spin measurement. Besides that, the analysis performed here allows to establish a new method to construct e ective spin reduced density matrices. The presented approach allows recovering the results in the literature and, at the same time, to incorporate the criticisms in a consistent way. However, it is necessary to abandon the usual partial trace of the momentum degrees of freedom and the interpretation in the literature for the spin reduced density matrices. The examples presented in the arguments against the usual spin reduced density matrices are studied using the approach proposed in this dissertation. / Nesta dissertação, a utilização do traço parcial dos momentos na construção de matrizes densidade reduzidas de spin para partículas massivas relativisticas é analisada. No regime considerado, as partículas massivas podem ser descritas por representações unitárias do grupo de Poincaré, e os estados de base são rotulados pelas variáveis dinâmicas de momento e spin. As matrizes reduzidas obtidas por meio do traço parcial dos momentos possuem propriedades inusitadas, pois não são covariantes sob a ação de transformações de Lorentz restritas. Essa característica traz consequências importantes para o estudo da teoria da informação quântica em sistemas relativísticos. No entanto, argumentos recentes têm sido apresentados contra o uso dessas matrizes nos processos de transmissões de informação envolvendo os graus de spin de partículas massivas. Essas críticas são discutidas neste trabalho e uma conexão com a estrutura do espaço de estados associado a representação unitária em questão é estabelecida por meio de um estudo detalhado do método das representações induzidas aplicado ao grupo de Poincaré. Isso permite reescrever as críticas presentes na literatura sem a necessidade de se introduzir um modelo específico de interação associado à medida do spin das partículas. Alem disso, a análise realizada nesta dissertação permite estabelecer um novo método para a construção de matrizes densidade reduzidas efetivas de spin. A proposta apresentada permite recuperar os resultados presentes na literatura e, ao mesmo tempo, incorporar as críticas de maneira consistente. No entanto, para isso é necessário abandonar o traço parcial usual dos graus de liberdade de momento e a interpretação dada na literatura para as matrizes densidade reduzidas de spin. Os exemplos apresentados nas argumentações contra as matrizes densidade reduzidas de spin usuais são estudados utilizando o método proposto neste trabalho.
32

Duality of Gaudin Models

Filipp Uvarov (9121400) 29 July 2020 (has links)
<div>We consider actions of the current Lie algebras $\gl_{n}[t]$ and $\gl_{k}[t]$ on the space $\mathfrak{P}_{kn}$ of polynomials in $kn$ anticommuting variables. The actions depend on parameters $\bar{z}=(z_{1}\lc z_{k})$ and $\bar{\alpha}=(\alpha_{1}\lc\alpha_{n})$, respectively.</div><div>We show that the images of the Bethe algebras $\mathcal{B}_{\bar{\alpha}}^{\langle n \rangle}\subset U(\gl_{n}[t])$ and $\mathcal{B}_{\bar{z}}^{\langle k \rangle}\subset U(\gl_{k}[t])$ under these actions coincide.</div><div></div><div>To prove the statement, we use the Bethe ansatz description of eigenvectors of the Bethe algebras via spaces of quasi-exponentials. We establish an explicit correspondence between the spaces of quasi-exponentials describing eigenvectors of $\mathcal{B}_{\bar{\alpha}}^{\langle n \rangle}$ and the spaces of quasi-exponentials describing eigenvectors of $\mathcal{B}_{\bar{z}}^{\langle k \rangle}$.</div><div></div><div>One particular aspect of the duality of the Bethe algebras is that the Gaudin Hamiltonians exchange with the Dynamical Hamiltonians. We study a similar relation between the trigonometric Gaudin and Dynamical Hamiltonians. In trigonometric Gaudin model, spaces of quasi-exponentials are replaced by spaces of quasi-polynomials. We establish an explicit correspondence between the spaces of quasi-polynomials describing eigenvectors of the trigonometric Gaudin Hamiltonians and the spaces of quasi-exponentials describing eigenvectors of the trigonometric Dynamical Hamiltonians.</div><div></div><div>We also establish the $(\gl_{k},\gl_{n})$-duality for the rational, trigonometric and difference versions of Knizhnik-Zamolodchikov and Dynamical equations.</div>
33

Probabilistic Exact Inversion of 2-qubit Bipartite Unitary Operations using Local Operations and Classical Communication / Probabilistisk Exakt Inversion av 2-qubit Bipartita Unitära Operationer genom Lokala Operationer och Klassisk Kommunikation

Lindström, Ludvig January 2024 (has links)
A distributed quantum computer holds the potential to emulate a larger quantumcomputer by being partitioned it into smaller modules where local operations (LO)can be applied, and classical communication (CC) can be utilized between thesemodules. Finding algorithms under LOCC restrictions is crucial for leveraging thecapabilities of distributed quantum computing, This thesis explores probabilisticexact LOCC supermaps, that maps 2-qubit bipartite unitary operations to its inver-sion and complex conjugation. Presented are LOCC unitary inversion and complexconjugation supermaps that use 3 calls of the operation, achieving success proba-bilities of 3/128 and 3/8, respectively. These supermaps are discovered through anexamination of the Kraus Cirac decomposition and its interaction with single qubitunitary inversion supermaps. These results can be used for time reversal of as welland noise reduction in closed distributed quantum systems / En distribuerad kvantdator har potentialen att emulera en större kvantdator genom att delas upp i mindre moduler, där lokala operations (LO) kan appliceras och klassisk kommunikation (CC) användas. För att effektivt kunna använda algoritmer på en distribuerad kvantdator måste de anpassas för LOCC restriktioner. Denna avhandling studerar probabilistiskt exakta LOCC superavbildningar, somavbildar 2-qubits bipartita unitära operationer till deras invers och komplexkonjugat. I avhandlingen presenters en LOCC unitär inversion- samt en komplexkonjugatsuperavbildning vilka använder 3 anrop av operationen och lyckas med sannolikhet 3/128 respektive 3/8. Dessa superavbildningar hittades genom att studera Kraus Cirac-uppdelningen och dess interaktion med 1-qubits inversionsuperavbildningar. Förhoppningsvis kan dessa resultat användas till att invertera tiden samt brusreducering på distribuerade kvantsystem.
34

Quantum Error Correction in Quantum Field Theory and Gravity

Keiichiro Furuya (16534464) 18 July 2023 (has links)
<p>Holographic duality as a rigorous approach to quantum gravity claims that a quantum gravitational system is exactly equal to a quantum theory without gravity in lower spacetime dimensions living on the boundary of the quantum gravitational system. The duality maps key questions about the emergence of spacetime to questions on the non-gravitational boundary system that are accessible to us theoretically and experimentally. Recently, various aspects of quantum information theory on the boundary theory have been found to be dual to the geometric aspects of the bulk theory. In this thesis, we study the exact and approximate quantum error corrections (QEC) in a general quantum system (von Neumann algebras) focused on QFT and gravity. Moreover, we study entanglement theory in the presence of conserved charges in QFT and the multiparameter multistate generalization of quantum relative entropy.</p>
35

Quantum Information with Optical Continuous Variables: from Bell Tests to Key Distribution/Information Quantique avec Variables Continues Optiques: des Tests de Bell à la Distribution de Clé

García-Patrón Sánchez, Raúl 12 October 2007 (has links)
In this thesis we have studied different aspects of the novel field of quantum information with continuous variables. The higher efficiency and bandwidth of homodyne detection combined with the easiness of generation and manipulation of Gaussian states makes continuous-variable quantum information a promising and flourishing field of research. This dissertation is divided in two parts. The first part explores two applications of the “photon subtraction” operation; Firstly, a technique to generate highly non-Gaussian single-mode states of light; Secondly, an experimental setup capable of realizing a loophole-free Bell test. The second part of this dissertation develops a detailed analysis of an important family of continuous-variable quantum key distribution protocols, namely those based on Gaussian modulation of Gaussian states./Dans cette thèse on a étudié différents aspects de l'information quantique à variables continues. Les meilleures efficacité et bande passante de la détection homodyne combinées à la simplicité de génération et de manipulation d'états gaussiens rend l'information quantique à variables continues un domaine de recherche très prometteur, qui est actuellement en plein essor. La dissertation est divisée en deux parties. La première explore deux applications de l'opération “soustraction de photon”; en premier lieu on présente une nouvelle technique capable de générer des états mono-modaux de la lumière hautement non-gaussiens; deuxiemement on présente un schéma expérimental capable de réaliser un test de Bell sans faille logique. La deuxième partie de cette dissertation développe une étude détaillée d'une famille très importante de protocoles de distribution quantique de clé à variables continues, ceux basés sur la modulation gaussienne d'états gaussiens.
36

From Classical to Quantum Secret Sharing

Chouha, Paul-Robert 04 1900 (has links)
Dans ce mémoire, nous nous pencherons tout particulièrement sur une primitive cryptographique connue sous le nom de partage de secret. Nous explorerons autant le domaine classique que le domaine quantique de ces primitives, couronnant notre étude par la présentation d’un nouveau protocole de partage de secret quantique nécessitant un nombre minimal de parts quantiques c.-à-d. une seule part quantique par participant. L’ouverture de notre étude se fera par la présentation dans le chapitre préliminaire d’un survol des notions mathématiques sous-jacentes à la théorie de l’information quantique ayant pour but primaire d’établir la notation utilisée dans ce manuscrit, ainsi que la présentation d’un précis des propriétés mathématique de l’état de Greenberger-Horne-Zeilinger (GHZ) fréquemment utilisé dans les domaines quantiques de la cryptographie et des jeux de la communication. Mais, comme nous l’avons mentionné plus haut, c’est le domaine cryptographique qui restera le point focal de cette étude. Dans le second chapitre, nous nous intéresserons à la théorie des codes correcteurs d’erreurs classiques et quantiques qui seront à leur tour d’extrême importances lors de l’introduction de la théorie quantique du partage de secret dans le chapitre suivant. Dans la première partie du troisième chapitre, nous nous concentrerons sur le domaine classique du partage de secret en présentant un cadre théorique général portant sur la construction de ces primitives illustrant tout au long les concepts introduits par des exemples présentés pour leurs intérêts autant historiques que pédagogiques. Ceci préparera le chemin pour notre exposé sur la théorie quantique du partage de secret qui sera le focus de la seconde partie de ce même chapitre. Nous présenterons alors les théorèmes et définitions les plus généraux connus à date portant sur la construction de ces primitives en portant un intérêt particulier au partage quantique à seuil. Nous montrerons le lien étroit entre la théorie quantique des codes correcteurs d’erreurs et celle du partage de secret. Ce lien est si étroit que l’on considère les codes correcteurs d’erreurs quantiques étaient de plus proches analogues aux partages de secrets quantiques que ne leur étaient les codes de partage de secrets classiques. Finalement, nous présenterons un de nos trois résultats parus dans A. Broadbent, P.-R. Chouha, A. Tapp (2009); un protocole sécuritaire et minimal de partage de secret quantique a seuil (les deux autres résultats dont nous traiterons pas ici portent sur la complexité de la communication et sur la simulation classique de l’état de GHZ). / In this thesis, we will focus on a cryptographic primitive known as secret sharing. We will explore both the classical and quantum domains of such schemes culminating our study by presenting a new protocol for sharing a quantum secret using the minimal number of possible quantum shares i.e. one single quantum share per participant. We will start our study by presenting in the preliminary chapter, a brief mathematical survey of quantum information theory (QIT) which has for goal primarily to establish the notation used throughout the manuscript as well as presenting a précis of the mathematical properties of the Greenberger-Horne-Zeilinger (GHZ)-state, which is used thoroughly in cryptography and in communication games. But as we mentioned above, our main focus will be on cryptography. In chapter two, we will pay a close attention to classical and quantum error corrections codes (QECC) since they will become of extreme importance when we introduce quantum secret sharing schemes in the following chapter. In the first part of chapter three, we will focus on classical secret shearing, presenting a general framework for such a primitive all the while illustrating the abstract concepts with examples presented both for their historical and analytical relevance. This first part (chapters one and two) will pave the way for our exposition of the theory of Quantum Secret Sharing (QSS), which will be the focus of the second part of chapter three. We will present then the most general theorems and definitions known to date for the construction of such primitives putting emphasis on the special case of quantum threshold schemes. We will show how quantum error correction codes are related to QSS schemes and show how this relation leads to a very solid correspondence to the point that QECC’s are closer analogues to QSS schemes than are the classical secret sharing primitives. Finally, we will present one of the three results we have in A. Broadbent, P.-R. Chouha, A. Tapp (2009) in particular, a secure minimal quantum threshold protocol (the other two results deal with communication complexity and the classical simulation of the GHZ-state).
37

Role of Nonlocality and Counterfactuality in Quantum Cryptography

Akshatha Shenoy, H January 2014 (has links) (PDF)
Quantum cryptography is arguably the most successfully applied area of quantum information theory. In this work, We invsetigate the role of quantum indistinguishability in random number generation, quantum temporal correlations, quantum nonlocality and counterfactuality for quantum cryptography. We study quantum protocols for key distribution, and their security in the conventional setting, in the counterfactual paradigm, and finally also in the device-independent scenario as applied to prepare-and-measure schemes. We begin with the interplay of two essential non-classical features like quantum indeterminism and quantum indistinguishability via a process known as bosonic stimulation is discussed. It is observed that the process provides an efficient method for macroscopic extraction of quantum randomness. Next, we propose two counterfactual cryptographic protocols, in which a secret key bit is generated even without the physical transmission of a particle. The first protocol is semicounterfactual in the sense that only one of the key bits is generated using interaction-free measurement. This protocol departs fundamentally from the original counterfactual key distribution protocol in not encoding secret bits in terms of photon polarization. We discuss how the security in the protocol originates from quantum single-particle non-locality. The second protocol is designed for the crypto-task of certificate authorization, where a trusted third party authenticates an entity (e.g., bank) to a client. We analyze the security of both protocols under various general incoherent attack models. The next part of our work includes study of quantum temporal correlations. We consider the use of the Leggett-Garg inequalities for device-independent security appropriate for prepare-and-measure protocols subjected to the higher dimensional attack that would completely undermine standard BB84. In the last part, we introduce the novel concept of nonlocal subspaces constructed using the graph state formalism, and propose their application for quantum information splitting. In particular, we use the stabilizer formalism of graph states to construct degenerate Bell operators, whose eigenspace determines the nonlocal subspace, into which a quantum secret is encoded and shared among an authorized group of agents, or securely transmitted to a designated secret retriever. The security of our scheme arises from the monogamy of quantum correlations. The quantum violation of the Bell-type inequality here is to its algebraic maximum, making this approach inherently suitable for the device-independent scenario.
38

Spacetime Symmetries from Quantum Ergodicity

Shoy Ouseph (18086125) 16 April 2024 (has links)
<p dir="ltr">In holographic quantum field theories, a bulk geometric semiclassical spacetime emerges from strongly coupled interacting conformal field theories in one less spatial dimension. This is the celebrated AdS/CFT correspondence. The entanglement entropy of a boundary spatial subregion can be calculated as the area of a codimension two bulk surface homologous to the boundary subregion known as the RT surface. The bulk region contained within the RT surface is known as the entanglement wedge and bulk reconstruction tells us that any operator in the entanglement wedge can be reconstructed as a non-local operator on the corresponding boundary subregion. This notion that entanglement creates geometry is dubbed "ER=EPR'' and has been the driving force behind recent progress in quantum gravity research. In this thesis, we put together two results that use Tomita-Takesaki modular theory and quantum ergodic theory to make progress on contemporary problems in quantum gravity.</p><p dir="ltr">A version of the black hole information loss paradox is the inconsistency between the decay of two-point functions of probe operators in large AdS black holes and the dual boundary CFT calculation where it is an almost periodic function of time. We show that any von Neumann algebra in a faithful normal state that is quantum strong mixing (two-point functions decay) with respect to its modular flow is a type III<sub>1</sub> factor and the state has a trivial centralizer. In particular, for Generalized Free Fields (GFF) in a thermofield double (KMS) state, we show that if the two-point functions are strong mixing, then the entire algebra is strong mixing and a type III<sub>1</sub> factor settling a recent conjecture of Liu and Leutheusser.</p><p dir="ltr">The semiclassical bulk geometry that emerges in the holographic description is a pseudo-Riemannian manifold and we expect a local approximate Poincaré algebra. Near a bifurcate Killing horizon, such a local two-dimensional Poincaré algebra is generated by the Killing flow and the outward null translations along the horizon. We show the emergence of such a Poincaré algebra in any quantum system with modular future and past subalgebras in a limit analogous to the near-horizon limit. These are known as quantum K-systems and they saturate the modular chaos bound. We also prove that the existence of (modular) future/past von Neumann subalgebras also implies a second law of (modular) thermodynamics.</p>
39

Quantum information with optical continuous variables: from Bell tests to key distribution / Information quantique avec variables continues optiques: des tests de Bell à la distribution de clé

Garcia-Patron Sanchez, Raul 12 October 2007 (has links)
In this thesis we have studied different aspects of the novel field of quantum information with continuous variables. The higher efficiency and bandwidth of homodyne detection combined with the easiness of generation and manipulation of Gaussian states makes continuous-variable quantum information a promising and flourishing field of research. This dissertation is divided in two parts. The first part explores two applications of the “photon subtraction” operation; Firstly, a technique to generate highly non-Gaussian single-mode states of light; Secondly, an experimental setup capable of realizing a loophole-free Bell test. The second part of this dissertation develops a detailed analysis of an important family of continuous-variable quantum key distribution protocols, namely those based on Gaussian modulation of Gaussian states./Dans cette thèse on a étudié différents aspects de l'information quantique à variables continues. Les meilleures efficacité et bande passante de la détection homodyne combinées à la simplicité de génération et de manipulation d'états gaussiens rend l'information quantique à variables continues un domaine de recherche très prometteur, qui est actuellement en plein essor. La dissertation est divisée en deux parties. La première explore deux applications de l'opération “soustraction de photon”; en premier lieu on présente une nouvelle technique capable de générer des états mono-modaux de la lumière hautement non-gaussiens; deuxiemement on présente un schéma expérimental capable de réaliser un test de Bell sans faille logique. La deuxième partie de cette dissertation développe une étude détaillée d'une famille très importante de protocoles de distribution quantique de clé à variables continues, ceux basés sur la modulation gaussienne d'états gaussiens. / Doctorat en Sciences de l'ingénieur / info:eu-repo/semantics/nonPublished
40

Information-Theoretic aspects of quantum key distribution

Van Assche, Gilles 26 April 2005 (has links)
<p>La distribution quantique de clés est une technique cryptographique permettant l'échange de clés secrètes dont la confidentialité est garantie par les lois de la mécanique quantique. Le comportement particulier des particules élémentaires est exploité. En effet, en mécanique quantique, toute mesure sur l'état d'une particule modifie irrémédiablement cet état. En jouant sur cette propriété, deux parties, souvent appelées Alice et Bob, peuvent encoder une clé secrète dans des porteurs quantiques tels que des photons uniques. Toute tentative d'espionnage demande à l'espion, Eve, une mesure de l'état du photon qui transmet un bit de clé et donc se traduit par une perturbation de l'état. Alice et Bob peuvent alors se rendre compte de la présence d'Eve par un nombre inhabituel d'erreurs de transmission.</p><p><p><p>L'information échangée par la distribution quantique n'est pas directement utilisable mais doit être d'abord traitée. Les erreurs de transmissions, qu'elles soient dues à un espion ou simplement à du bruit dans le canal de communication, doivent être corrigées grâce à une technique appelée réconciliation. Ensuite, la connaissance partielle d'un espion qui n'aurait perturbé qu'une partie des porteurs doit être supprimée de la clé finale grâce à une technique dite d'amplification de confidentialité.</p><p><p><p>Cette thèse s'inscrit dans le contexte de la distribution quantique de clé où les porteurs sont des états continus de la lumière. En particulier, une partie importante de ce travail est consacrée au traitement de l'information continue échangée par un protocole particulier de distribution quantique de clés, où les porteurs sont des états cohérents de la lumière. La nature continue de cette information implique des aménagements particuliers des techniques de réconciliation, qui ont surtout été développées pour traiter l'information binaire. Nous proposons une technique dite de réconciliation en tranches qui permet de traiter efficacement l'information continue. L'ensemble des techniques développées a été utilisé en collaboration avec l'Institut d'Optique à Orsay, France, pour produire la première expérience de distribution quantique de clés au moyen d'états cohérents de la lumière modulés continuement.</p><p><p><p>D'autres aspects importants sont également traités dans cette thèse, tels que la mise en perspective de la distribution quantique de clés dans un contexte cryptographique, la spécification d'un protocole complet, la création de nouvelles techniques d'amplification de confidentialité plus rapides à mettre en œuvre ou l'étude théorique et pratique d'algorithmes alternatifs de réconciliation.</p><p><p><p>Enfin, nous étudions la sécurité du protocole à états cohérents en établissant son équivalence à un protocole de purification d'intrication. Sans entrer dans les détails, cette équivalence, formelle, permet de valider la robustesse du protocole contre tout type d'espionnage, même le plus compliqué possible, permis par les lois de la mécanique quantique. En particulier, nous généralisons l'algorithme de réconciliation en tranches pour le transformer en un protocole de purification et nous établissons ainsi un protocole de distribution quantique sûr contre toute stratégie d'espionnage.</p><p><p><p>Quantum key distribution is a cryptographic technique, which allows to exchange secret keys whose confidentiality is guaranteed by the laws of quantum mechanics. The strange behavior of elementary particles is exploited. In quantum mechnics, any measurement of the state of a particle irreversibly modifies this state. By taking advantage of this property, two parties, often called Alice and bob, can encode a secret key into quatum information carriers such as single photons. Any attempt at eavesdropping requires the spy, Eve, to measure the state of the photon and thus to perturb this state. Alice and Bob can then be aware of Eve's presence by a unusually high number of transmission errors.</p><p><p><p>The information exchanged by quantum key distribution is not directly usable but must first be processed. Transmission errors, whether they are caused by an eavesdropper or simply by noise in the transmission channel, must be corrected with a technique called reconciliation. Then, the partial knowledge of an eavesdropper, who would perturb only a fraction of the carriers, must be wiped out from the final key thanks to a technique called privacy amplification.</p><p><p><p>The context of this thesis is the quantum key distribution with continuous states of light as carriers. An important part of this work deals with the processing of continuous information exchanged by a particular protocol, where the carriers are coherent states of light. The continuous nature of information in this case implies peculiar changes to the reconciliation techniques, which have mostly been developed to process binary information. We propose a technique called sliced error correction, which allows to efficiently process continuous information. The set of the developed techniques was used in collaboration with the Institut d'Optique, Orsay, France, to set up the first experiment of quantum key distribution with continuously-modulated coherent states of light.</p><p><p><p>Other important aspects are also treated in this thesis, such as placing quantum key distribution in the context of a cryptosystem, the specification of a complete protocol, the creation of new techniques for faster privacy amplification or the theoretical and practical study of alternate reconciliation algorithms.</p><p><p><p>Finally, we study the security of the coherent state protocol by analyzing its equivalence with an entanglement purification protocol. Without going into the details, this formal equivalence allows to validate the robustness of the protocol against any kind of eavesdropping, even the most intricate one allowed by the laws of quantum mechanics. In particular, we generalize the sliced error correction algorithm so as to transform it into a purification protocol and we thus establish a quantum key distribution protocol secure against any eavesdropping strategy.</p> / Doctorat en sciences appliquées / info:eu-repo/semantics/nonPublished

Page generated in 0.1452 seconds