Verification of Quantum Bit Commitment Protocols using Bisimulation Techniques

Vitale, Marco (2022) Verification of Quantum Bit Commitment Protocols using Bisimulation Techniques. [Laurea magistrale], Università di Bologna, Corso di Studio in Informatica [LM-DM270]
Documenti full-text disponibili:
[img] Documento PDF (Thesis)
Disponibile con Licenza: Creative Commons: Attribuzione - Non commerciale - Non opere derivate 4.0 (CC BY-NC-ND 4.0)

Download (8MB)

Abstract

Given the current progress in the development of more and more performing quantum computers, the field of quantum cryptography is making a return, after its golden age in the 1990s. The main feature that made quantum cryptography so interesting is that, in certain cases, it can provide the so-called unconditional security, which is a security notion that declares that the system is secure against adversaries with unlimited computing resources and time. This allows the creation of cryptographic protocols based on the principles of quantum mechanics and mathematically verifiable. However, the security proof related to these protocols can often be tedious and very complicated, as demonstrated by the first proof of the BB84 protocol by Dominic Meyers. A different approach for the verification of quantum cryptographic protocols is given by the so-called process algebras. This method has been used successfully in the field of classical cryptographic protocols, for example to prove the security of El Gamal encryption from the Decision Diffie-Hellman (DDH). The main step of the process algebra approach is given by the use of the notion of bisimulation. In the last years, indeed, several quantum process algebras have been proposed, like qCCS and CQP, and they have been used to verify different types of quantum protocols, starting from quantum teleportation and arriving to quantum key distribution protocols like the BB84 and the EDP-based protocol. In this thesis, focusing on qCCS, we use the process algebra approach combined with different types of notions deriving from bisimulation, to analyze the security proprieties of two different types of quantum bit commitment protocols: the BB84 quantum bit commitment protocol and the Kent relativistic bit commitment protocol.

Abstract
Tipologia del documento
Tesi di laurea (Laurea magistrale)
Autore della tesi
Vitale, Marco
Relatore della tesi
Correlatore della tesi
Scuola
Corso di studio
Indirizzo
CURRICULUM A: TECNICHE DEL SOFTWARE
Ordinamento Cds
DM270
Parole chiave
Quantum Computing,Quantum Cryptography,Cryptography,Process Algebra,Bisimulation
Data di discussione della Tesi
17 Marzo 2022
URI

Altri metadati

Statistica sui download

Gestione del documento: Visualizza il documento

^