[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Watch: Mexico City Protest Against American Ex-Pat 'Invasion' Turns Viole

Kazakhstan Just BETRAYED Russia - Takes gunpowder out of Putin’s Hands

Why CNN & Fareed Zakaria are Wrong About Iran and Trump

Something Is Going Deeply WRONG In Russia

329 Rivers in China Exceed Flood Warnings, With 75,000 Dams in Critical Condition

Command Of Russian Army 'Undermined' After 16 Of Putin's Generals Killed At War, UK Says

Rickards: Superintelligence Will Never Arrive

Which Countries Invest In The US The Most?

The History of Barbecue

‘Pathetic’: Joe Biden tells another ‘tall tale’ during rare public appearance

Lawsuit Reveals CDC Has ZERO Evidence Proving Vaccines Don't Cause Autism

Trumps DOJ Reportedly Quietly Looking Into Criminal Charges Against Election Officials

Volcanic Risk and Phreatic (Groundwater) eruptions at Campi Flegrei in Italy

Russia Upgrades AGS-17 Automatic Grenade Launcher!

They told us the chickenpox vaccine was no big deal—just a routine jab to “protect” kids from a mild childhood illness

Pentagon creates new military border zone in Arizona

For over 200 years neurological damage from vaccines has been noted and documented

The killing of cardiologist in Gaza must be Indonesia's wake-up call

Marandi: Israel Prepares Proxies for Next War with Iran?

"Hitler Survived WW2 And I Brought Proof" Norman Ohler STUNS Joe Rogan

CIA Finally Admits a Pyschological Warfare Agent from the Agency “Came into Contact” with Lee Harvey Oswald before JFK’s Assassination

CNN Stunned As Majority Of Americans Back Trump's Mass Deportation Plan

Israeli VS Palestinian Connections to the Land of Israel-Palestine

Israel Just Lost Billions - Haifa and IMEC

This Is The Income A Family Needs To Be Middle Class, By State

One Big Beautiful Bubble": Hartnett Warns US Debt Will Exceed $50 Trillion By 2032

These Are The Most Stolen Cars In Every US State

Earth Changes Summary - June 2025: Extreme Weather, Planetary Upheaval,

China’s Tofu-Dreg High-Speed Rail Station Ceiling Suddenly Floods, Steel Bars Snap

Russia Moves to Nationalize Country's Third Largest Gold Mining Firm


Science/Tech
See other Science/Tech Articles

Title: Quantum mechanics creates location-based cryptography
Source: [None]
URL Source: http://io9.com/5597728/quantum-mech ... es-location+based-cryptography
Published: Jul 29, 2010
Author: n
Post Date: 2010-07-29 12:38:19 by gengis gandhi
Keywords: None
Views: 171
Comments: 2

Quantum mechanics creates location-based cryptography Imagine a form of encrypted communication so secure that it's physically impossible to access it unless you're actually at the location where you're supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.

The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.

And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiver's location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But that's just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states it's impossible to create an exact replica of a quantum state.

This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, they'd still need multiple transmitters to mimic the supposed location, but that's now physically impossible because the first adversary would need to both store the qubit's state and send it on to the next confederate, and quantum mechanics says that's impossible.

As the authors note in their abstract:

Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre- existing infrastructure. [arXiv]

Send an email to Alasdair Wilkins, the author of this post, at alasdair@io9.com.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 2.

#1. To: christine (#0)

in my view the significance of this represents a huge loss of any control for any control type entities to manage behavior or information for purposes of maintaining power.

a taoist would say it represents the other side of the control trip coin, moving towards balance, providing expansion (yin) away from male/control/contraction (yang).

more

to

come!

gengis gandhi  posted on  2010-07-29   12:42:37 ET  Reply   Untrace   Trace   Private Reply  


#2. To: gengis gandhi (#1)

in my view the significance of this represents a huge loss of any control for any control type entities to manage behavior or information for purposes of maintaining power.

it does sound that way, doesn't it.

christine  posted on  2010-07-29   14:17:32 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 2.

        There are no replies to Comment # 2.


End Trace Mode for Comment # 2.

TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]