Quantum mechanics enables perfectly secure cloud computing

Researchers have succeeded in combining the power of quantum computing with the security of quantum cryptography and have shown that perfectly secure cloud computing can be achieved using the principles of quantum mechanics. ...

Quantum eavesdropper steals quantum keys

(PhysOrg.com) -- In quantum cryptography, scientists use quantum mechanical effects to encrypt and then communicate confidential information. Although quantum cryptography codes are unbreakable in principle, even the best ...

Making quantum cryptography truly secure

Quantum key distribution (QKD) is an advanced tool for secure computer-based interactions, providing confidential communication between two remote parties by enabling them to construct a shared secret key during the course ...

Vienna physicists create quantum twin atoms

At the Vienna University of Technology, sophisticated atomchips have been used to create pairs of quantum mechanically connected atom-twins. Until now, similar experiments were only possible using photons.

Researchers weight safety of quantum cryptology

Scientists in Belgium and Spain have proved for the first time that new systems of quantum cryptology are much safer than current security systems. The study was published in the journal Nature Communications.

Physicists move closer to efficient single-photon sources

A team of physicists in the United Kingdom has taken a giant step toward realizing efficient single-photon sources, which are expected to enable much-coveted completely secure optical communications, also known as "quantum ...

Detector blinding attacks on quantum cryptography defeated

(PhysOrg.com) -- The Cambridge Research Laboratory of Toshiba Research Europe announced today that it has discovered a simple method to prevent detector blinding attacks on quantum cryptography.

Long distance, top secret messages

When the military needs to send the key to encrypted data across the world, it can't necessarily rely on today's communication lines, where the message could be covertly intercepted. But physicists at the Georgia Institute ...

page 8 from 11