Quantum 'sealed envelope' system enables 'perfectly secure' information storage

Nov 04, 2013
Credit: Paul Hocksenar

A breakthrough in quantum cryptography demonstrates that information can be encrypted and then decrypted with complete security using the combined power of quantum theory and relativity - allowing the sender to dictate the unveiling of coded information without any possibility of intrusion or manipulation.

Scientists sent encrypted data between pairs of sites in Geneva and Singapore, kept "perfectly secure" for fifteen milliseconds - putting into practice what cryptographers call a 'bit ' protocol, based on theoretical work by study co-author Dr Adrian Kent, from Cambridge's Department of Applied Mathematics and Theoretical Physics.

Researchers describe it as the first step towards impregnable information networks controlled by "the combined power of Einstein's relativity and " which might one day, for example, revolutionise financial trading and other markets across the world.

'Bit commitment' is a mathematical version of a securely sealed envelope. Data are delivered from party A to party B in a locked state that cannot be changed once sent and can only be revealed when party A provides the key – with security guaranteed, even if either of the parties tries to cheat.

The technique could one day be used for everything from global financial trading to secure voting and even long-distance gambling, although researchers point out that this is the "very first step into new territory".

This is a significant breakthrough in the world of 'quantum cryptography' – one that was once believed to be impossible. The results are published in the journal Physical Review Letters.

"This is the first time perfectly secure bit commitment – relying on the laws of and nothing else – has been demonstrated," said Adrian Kent.

"It is immensely satisfying to see these theoretical ideas at last made practical thanks to the ingenuity of all the theorists and experimenters in this collaboration."

Any signal between Geneva and Singapore takes at least fifteen milliseconds – with a millisecond equal to a thousandth of a second. This blink-of-an-eye is long enough with current technology to allow data to be handed over encrypted at both sites, and later decrypted – with security "unconditionally guaranteed" by the laws of physics, say the team.

The researchers have exploited two different areas of physics: Einstein's special relativity – which interprets uniform motion between two objects moving at relative speeds – combined with the power of quantum theory, the new physics of the subatomic world that Einstein famously dismissed as "spooky".

Completely secure 'bit commitment' using quantum theory alone is known to be impossible, say researchers, and the "extra control" provided by relativity is crucial.

Professor Gilles Brassard FRS of the Universit'e de Montr'eal, one of the co-inventors of quantum cryptography who was not involved in this study, spoke of the "vision" he had fifteen years ago - when trying to combine quantum 'bit commitment' with relativity to "save" the theory - in which Einstein and early quantum physicist Niels Bohr "rise from their graves and shake hands at last":

"Alas, my idea at the time was flawed. I am so thrilled to see this dream finally come true, not only in theory but also as a beautiful experiment!" he said.

Bit commitment is a building block – what researchers call a "primitive" – that can be put together in lots of ways to achieve increasingly complex tasks, they say. "I see this as the first step towards a global network of information controlled by the combined power of and quantum theory," Kent said.

One possible future use of relativistic could be global stock markets and other trading networks. It might be a way of leveling the technological 'arms race' in which traders acquire and exploit information as fast as possible, the team suggest, although they stress at such an early stage these suggestions are speculative.

The new study builds on previous experiments that, while successful, had to assume limitations in the technology of one or both parties – and consequently not entirely "safe or satisfactory" says Kent, "since you never really know what technology is out there".

Explore further: Quantum physics just got less complicated

More information: prl.aps.org/abstract/PRL/v111/i18/e180504

Related Stories

Yale scientist sheds fresh light on Einstein

Oct 02, 2013

Albert Einstein's celebrated genius may be underappreciated, according to a new book by Yale physicist A. Douglas Stone: The father of relativity theory deserves far more credit than he gets for his insights ...

Researchers explore quantum entanglement

Feb 08, 2013

Albert Einstein called quantum entanglement—two particles in different locations, even on other sides of the universe, influencing each other—"spooky action at a distance."

Secure communication technology can conquer lack of trust

Jan 02, 2013

Many scenarios in business and communication require that two parties share information without either being sure if they can trust the other. Examples include secure auctions and identification at ATM machines. Exploiting ...

Quantum copies do new tricks

Mar 22, 2012

One of the strange features of quantum information is that, unlike almost every other type of information, it cannot be perfectly copied. For example, it is impossible to take a single photon and make a number of photons ...

Recommended for you

Quantum physics just got less complicated

Dec 19, 2014

Here's a nice surprise: quantum physics is less complicated than we thought. An international team of researchers has proved that two peculiar features of the quantum world previously considered distinct ...

Controlling light on a chip at the single-photon level

Dec 16, 2014

Integrating optics and electronics into systems such as fiber-optic data links has revolutionized how we transmit information. A second revolution awaits as researchers seek to develop chips in which individual ...

Fraud-proof credit cards possible with quantum physics

Dec 15, 2014

Credit card fraud and identify theft are serious problems for consumers and industries. Though corporations and individuals work to improve safeguards, it has become increasingly difficult to protect financial ...

User comments : 5

Adjust slider to filter visible comments by rank

Display comments: newest first

Modernmystic
3 / 5 (2) Nov 04, 2013
As with all technology I see some good aspects and some that will prove difficult.

A completely secure network for fanatics to communicate with will make it more difficult to prevent violence and to apprehend them.

OTOH with the recent egregious abuses of power by the American and UK governments I see some very desirable aspects to the technology as well.
Soylent_Grin
not rated yet Nov 04, 2013
Knowing there is no privacy, that someone could be listening in at any time, can create fanatics and fuel existing ones.
It will be abused, as is everything, but maybe having one part of our lives that isn't controlled and monitored, some good old fashioned privacy, will go a long way to reducing fanaticism.
antialias_physorg
5 / 5 (1) Nov 04, 2013
Unfortunately the article only talks about what it could be used for and not how it actually works. (And the abstract linked at the bottom is only a little more enlightening)

Anyone have a clue what this is about? I'm clear on what a commitment protocol is, but where the relativistic part comes in eludes me.
Soylent_Grin
not rated yet Nov 04, 2013
Anyone have a clue what this is about? I'm clear on what a commitment protocol is, but where the relativistic part comes in eludes me.


Alright, keep in mind that I'm not a cryptographer or a physics expert, just an enthusiast.
You know what bit commitment is, so you know Alice and Bob can't cheat. However, the protocols don't do anything about Eve listening in and raise the question of the shared key being cracked. In standard cryptography, anything short of a one time pad can be cracked.

With quantum cryptography, not only is the key unbreakable (it is related to the superposition state of the information) but Eve is cut out because any attempt to listen in on the channel breaks the entanglement and renders the channel just so much noise...

...but I have a feeling that's too basic for you, AA, so I don't think I quite understand your question.
antialias_physorg
not rated yet Nov 04, 2013
but Eve is cut out because any attempt to listen in on the channel breaks the entanglement and renders the channel just so much noise...

That's also the case for regular quantum key exchange systems (which have been published and already been broken - though by cleverly exploiting inadequacies in the hardware and not the QM principle behind it).

I was wondering what makes this particular approach more secure. Commitment protocols aren't 100% secure (though they can be made arbitrarily secure. As you point out: only OTPs are totally secure. But they require a trusted/secure exchange of keys which is a rather major disadvantage)

I'm wondering where the relativity as noted here:
using the combined power of quantum theory and relativity
comes into play. How do they use the knowledge of the relative motion of sender and receiver to secure the transmission?

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.