Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 19 submissions in the queue.
posted by Cactus on Tuesday February 18 2014, @03:00PM   Printer-friendly
from the Making-the-NSA-cry dept.

aliks writes:

"The practical applications of quantum encryption may be getting closer. A paper published in Physical Review Letters by Vedran Dunjko, Petros Wallden, and Erika Andersson presents a way to use Quantum Digital Signatures without requiring long term quantum memory.

Phys.org provides a summary:
Quantum digital signatures (QDSs) allow the sending of messages from one sender to multiple recipients, with the guarantee that messages cannot be forged or tampered with. Additionally, messages cannot be repudiated; if one recipient accepts a message, she is guaranteed that others will accept the same message as well. While messaging with these types of security guarantees are routinely performed in the modern digital world, current technologies only offer security under computational assumptions. QDSs, on the other hand, offer security guaranteed by quantum mechanics. All of the variants of QDSs proposed thus far require long-term, high quality quantum memory, making them unfeasible in the foreseeable future. Here, we present a QDS scheme where no quantum memory is required, which also needs just linear optics. This makes QDSs feasible with current technology."

[Ed. Note] The Physical Review Letters link has all the fun details, but Phys.org provides a more understandable article for the layperson.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by VLM on Tuesday February 18 2014, @05:29PM

    by VLM (445) on Tuesday February 18 2014, @05:29PM (#1727)

    Also the arxiv entry for the PRL paper seen here (not a rickroll, promise)

    http://arxiv.org/abs/1309.1375 [arxiv.org]

    links to this supplementary at

    http://arxiv.org/abs/1311.5760 [arxiv.org]

    "Part of the security analysis is similar to the one in our earlier paper arXiv:1309.1375, since it uses similar methods applied to a different setting. It is included here in detail, in the supplementary material, for completeness"

    I have not studied either in detail but they look interesting.

    Starting Score:    1  point
    Moderation   +2  
       Informative=2, Total=2
    Extra 'Informative' Modifier   0  

    Total Score:   3