Girls lock-up quantum security

Sunday 22nd January 2012
Left to right: Stefanie Barz received the Laudimaxima 2011 prize from University of Vienna for outstanding scientific work. Elham Kashefi is a member of the Laboratory of Foundation of Computer Science (LFCS) and Quantum Information Scotland Network (QUISCO) and Assistant Professor and EPSRC Advanced Research Fellow at the School of Informatics, the University of Edinburgh. She's currently on leave from CNRS, Laboratoire d'Informatique de Grenoble (CAPP). IQC post doctoral fellow Anne Broadbent is interested in quantum nonlocality, complexity and cryptography and is currently an IQC post-doctoral researcher, holdiing an NSERC fellowship. The rest of the team were Joseph Fitzsimon with National University of Singapore and University College Dublin, Anton Zeilinger and Philip Walther fellow researchers with Broadbent at Vienna and Austrian Academy of Science

Quantum computers, besides offering substantial computational speedups, are also expected to preserve the privacy of a computation.

An experimental demonstration of blind quantum computing in which the input, computation, and output all remain unknown to the computer is presented, and the conceptual framework of measurement-based quantum computation that enables a client to delegate a computation to a quantum server is presented. 

Almost as intriguingly, the research has been carried out by six researchers from the Universities of Vienna, Edinburgh, Waterloo (Ontario) Singapore and Dublin, three of team being  women.

Various blind delegated computations, including one- and two-qubit gates and the Deutsch and Grover quantum algorithms, are demonstrated. The client only needs to be able to prepare and transmit individual photonic qubits.

The demonstration is crucial for unconditionally secure quantum cloud computing and might bea key ingredient for real-life applications, especially  considering the challenges of making powerful quantum computers widely available.

This is a very strong security guarantee,” says Broadbent,(right) who co-invented the theoretical protocol that was implanted in the recent experiments. “It holds no matter what computational power we ascribe to the ‘adversary’ attempting to spy on the communications.” 

Custom Search

Scotland, Computer News in Scotland, Technology News in Scotland, Computing in Scotland, Web news in Scotland computers, Internet, Communications, advances in communications, communications in Scotland, Energy, Scottish energy, Materials, Biomedicine, Biomedicine in Scotland, articles in Biomedicine, Scottish business, business news in Scotland.

Website : beachshore