In this thesis, the security of a quantum zero-knowledge protocol is investigated. The goal is to assess whether the proposed protocol remains secure when implemented using Weak Coherent Pulses (WCP), through three complementary evaluations: symbolic, analytical, and experimental. In the symbolic evaluation, the protocol is formally verified and falsified using Tamarin Prover, the state-of-the-art tool for symbolic verification. The analytical evaluation analyzes the protocol to establish security bounds based on information-theoretic metrics. Finally, experimental evaluation is performed using the 3-state 1-decoy QKD box by QuantumFuture, evaluating its performances under realistic conditions.

Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy

BOMBONATI, LUCA
2024/2025

Abstract

In this thesis, the security of a quantum zero-knowledge protocol is investigated. The goal is to assess whether the proposed protocol remains secure when implemented using Weak Coherent Pulses (WCP), through three complementary evaluations: symbolic, analytical, and experimental. In the symbolic evaluation, the protocol is formally verified and falsified using Tamarin Prover, the state-of-the-art tool for symbolic verification. The analytical evaluation analyzes the protocol to establish security bounds based on information-theoretic metrics. Finally, experimental evaluation is performed using the 3-state 1-decoy QKD box by QuantumFuture, evaluating its performances under realistic conditions.
2024
Security Evaluation of a Quantum Zero Knowledge Proof Protocol Using 3-state 1-decoy
qzkp
3-state 1-decoy
quantum zkp
security evaluation
qzkp protocol
File in questo prodotto:
File Dimensione Formato  
Thesis.pdf

accesso aperto

Dimensione 7.75 MB
Formato Adobe PDF
7.75 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/91813