Ultra-secure quantum communications

May 20, 2010

(PhysOrg.com) -- The risk of sensitive information falling into the wrong hands could be eliminated by a new quantum communication process that delivers unprecedented security.

UNSW telecommunications researcher Robert Malaney has developed the process, called "unconditional location verification", which ensures that even if an encryption password has fallen into the wrong hands, a secure message can only be seen by a recipient at an agreed geographic point.

Associate Professor Malaney, of the UNSW School of Electrical Engineering and Telecommunications, said quantum communications already allow unbreakable encryption but security can now be further enhanced using unconditional location verification.

"This takes to a level that hasn't previously been available," he said.

"With this process you can send data to a person at a particular location. If they are not at that location the process would detect that and you can stop the communication.

"This is a new application that you can deploy on current and emerging quantum networks. It opens up a range of new information security applications for both fibre and wireless communication networks.

"There would be many industries and organisations, banks for example, that would be interested in delivering information content in the sure knowledge a recipient is at an agreed-upon location."

The concept, which also has potential applications in the intelligence community, e-commerce and digital content distribution, is reported in the April edition of the American Physical Society journal Physical Review A.

The system works by sending paired "qubits" - particles, such as , which have been manipulated to contain specific - over a fibre optic or wireless network to a recipient. The recipient must send a return message, using information from the decoded qubits, to a number of reference points to open up a secure channel. Because operate at the speed of light and quantum information cannot be copied, the time to return the message can be accurately measured, ensuring that it has come from only one possible place.

Explore further: Attack on classical cryptography system raises security questions

add to favorites email to friend print save as pdf

Related Stories

Shining light in quantum computing

Sep 12, 2006

University of Queensland scientist Devon Biggerstaff is investigating ways to manipulate light in a process that will help shape future supercomputers and communication technology.

'Dead time' limits quantum cryptography speeds

Sep 28, 2007

Quantum cryptography is potentially the most secure method of sending encrypted information, but does it have a speed limit" According to a new paper by researchers at the National Institute of Standards and Technology and ...

Scientists demonstrate all-fiber quantum logic

May 28, 2009

A team of physicists and engineers have demonstrated all-fibre quantum logic, where single photons are generated and used to perform the controlled-NOT quantum logic gate in optical fibres with high fidelity.

Secure Communication via Space

Apr 22, 2008

The exchange of information between distant sources is the basis of all communications, but quantum mechanics may open up this distant exchange as never before.

Recommended for you

Controlling light on a chip at the single-photon level

Dec 16, 2014

Integrating optics and electronics into systems such as fiber-optic data links has revolutionized how we transmit information. A second revolution awaits as researchers seek to develop chips in which individual ...

Fraud-proof credit cards possible with quantum physics

Dec 15, 2014

Credit card fraud and identify theft are serious problems for consumers and industries. Though corporations and individuals work to improve safeguards, it has become increasingly difficult to protect financial ...

An Interview with Thomas Vidick on quantum code cracking

Dec 15, 2014

Quantum computers, looked to as the next generation of computing technology, are expected to one day vastly outperform conventional computers. Using the laws of quantum mechanics—the physics that governs ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.