{"id":10116,"date":"2014-03-13T01:51:37","date_gmt":"2014-03-13T05:51:37","guid":{"rendered":"http:\/\/www.opensource.im\/?p=10116"},"modified":"2014-03-13T01:51:37","modified_gmt":"2014-03-13T05:51:37","slug":"new-cryptography-scheme-secured-by-quantum-physics","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/new-cryptography-scheme-secured-by-quantum-physics.php","title":{"rendered":"New Cryptography Scheme Secured By Quantum Physics"},"content":{"rendered":"<p><p>  Image Caption: The experiment's Alice and Bob communicated with  entangled photons produced in this setup. Such apparatus could be  miniaturized using techniques from integrated optics. Credit:  IQC, University of Waterloo<\/p>\n<p>    Centre for Quantum Technologies  <\/p>\n<p>    The way we secure digital transactions could soon change. An    international team has demonstrated a form of quantum cryptography that can protect people doing    business with others they may not know or trust  a situation    encountered often on the internet and in everyday life, for    example at a banks ATM.  <\/p>\n<p>    Having quantum cryptography to hand is a realistic prospect, I    think. I expect that quantum technologies will gradually become    integrated with existing devices such as smartphones, allowing    us to do things like identify ourselves securely or generate    encryption keys, says Stephanie Wehner, a Principal Investigator    at the Centre for Quantum Technologies (CQT) at the National    University of Singapore, and co-author on the paper.  <\/p>\n<p>    In cryptography, the problem of providing a secure way for two    mutually distrustful parties to interact is known as two-party    secure computation. The new work, published in Nature Communications, describes the    implementation using quantum technology of an important    building block for such schemes.  <\/p>\n<p>    CQT theorists Wehner and Nelly Ng teamed up with researchers at the    Institute for Quantum Computing (IQC) at the University of Waterloo,    Canada, for the demonstration.  <\/p>\n<p>    Research partnerships such as this one between IQC and CQT are    critical in moving the field forward, says Raymond Laflamme,    Executive Director at the Institute for Quantum Computing. The    infrastructure that weve built here at IQC is enabling    exciting progress on quantum technologies.  <\/p>\n<p>    CQT and IQC are two of the worlds largest, leading research    centres in quantum technologies. Great things can happen when    we combine our powers, says Artur Ekert, Director of CQT.  <\/p>\n<p>    The experiments performed at IQC deployed quantum-entangled    photons in such a way that one party, dubbed Alice, could share    information with a second party, dubbed Bob, while meeting    stringent restrictions. Specifically, Alice has two sets of    information. Bob requests access to one or the other, and Alice    must be able to send it to him without knowing which set hes    asked for. Bob must also learn nothing about the unrequested    set. This is a protocol known as 1-2 random oblivious transfer    (ROT).  <\/p>\n<p>    ROT is a starting point for more complicated schemes that have    applications, for example, in secure identification. Oblivious    transfer is a basic building block that you can stack together,    like lego, to make something more fantastic, says Wehner.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.redorbit.com\/news\/technology\/1113093679\/new-cryptography-scheme-secured-by-quantum-physics-031214\" title=\"New Cryptography Scheme Secured By Quantum Physics\">New Cryptography Scheme Secured By Quantum Physics<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Image Caption: The experiment's Alice and Bob communicated with entangled photons produced in this setup. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-10116","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/10116"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=10116"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/10116\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=10116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=10116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=10116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}