Quantum mechanics creates location-based cryptography
2010-07-28 0:00

By Alasdair Wilkins | io9.com

Imagine a form of encrypted communication so secure that itís physically impossible to access it unless youíre actually at the location where youíre supposed to hear it. Quantum mechanics makes location-based cryptography possible - without any pesky codes or keys.

The basic idea is simple - create an encrypted communication where your actual physical location is the only key required to gain access to the hidden information. It would eliminate any need to create and store decryption keys, which is disproportionately the most complex and time-intensive task in cryptography. You could encrypt a secure line so that the only people who could ever hear would have to be at, say, two secure military bases, eliminating any chance of someone listening in from a third location.

And now computer scientists at UCLA have figured out how to do it. The big problem holding back location-based cryptography was that triangulation, the classical method of verifying the receiverís location is the correct one, can be forged if enemies work together to provide just the right combination of wrong information. But thatís just classical physics - quantum mechanics has that problem solved. The solution lies in the no-cloning theorem, an outgrowth of the uncertainty principle that basically states itís impossible to create an exact replica of a quantum state.

This means that, when the secure transmitter sends out multiple quantum bits, or qubits, the intended receiver is the only device that can verify the information and confirm they are who they say they are. If an adversary was trying to listen in, theyíd still need multiple transmitters to mimic the supposed location, but thatís now physically impossible because the first adversary would need to both store the qubitís state and send it on to the next confederate, and quantum mechanics says thatís impossible.

As the authors note in their abstract:

Therefore, our work shows that position-based quantum cryptography is one of the rare examples...for which there is such a strong separation between classical and quantum cryptography. Our results open a fascinating new direction for position-based security in cryptography where security of protocols is solely based on the laws of physics and proofs of security do not require any pre-existing infrastructure.

Article from: io9.com

Also tune into:

Nick Pelling - The Voynich Manuscript, Alan Turing and Ciphers

Nick Pelling - Deciphering of the Mysterious Voynich Manuscript

Jim Gardner - The Intelligent Universe, Bio-Cosm, ET, AI and Evolution

Related Articles
Two Centuries On, a Cryptologist Cracks a Presidential Code
Code Cracked! Cyber Command Logo Mystery Solved
Crop Circle with Binary Code (Video)
The Kryptos Code - The Code the CIA Canít Crack
Wiltshire crop circle identified as symbolic code for first ten places of pi
Extended Awareness: The Possibilities of Quantum Consciousness
The quantum computer in your head
Quantum Communication (Video)
Is Quantum Mechanics Controlling Your Thoughts?
Privacy-Enhancing Technologies for Mobile Applications (Video)
Theory and Practice of Cryptography (Video)

Latest News from our Front Page

Feminist blogger uses her vaginal yeast to make sourdough bread
2015-12-01 22:52
It's a tale that might ensure you never look the same way at a humble loaf again. When a feminist blogger found herself suffering from a vaginal yeast infection, she made the unusual decision to use the unwanted bodily fluid as an ingredient for making bread. Zoe Stavri, who writes under the title Another Angry Woman, has documented the details of her ...
Apple could be working on virtual reality projector, patents show
2015-12-01 22:40
The company has been granted a patent for an ‚Äėadaptive projector‚Äô, which can project images onto surfaces Apple could be working on a new augmented reality projector, which would allow it to make computers without even adding a screen. The company has been granted a patent for an ‚Äúadaptive‚ÄĚ projector, reports Patently Apple. The patents seem to refer to a tool ...
83-year-old Romanian Jewess crowned "Miss Holocaust Survivor" in Israel
2015-12-01 22:23
83-year-old Romanian born Rita Berkowitz wins the one-of-a-kind charity beauty pageant Romania-born woman who immigrated to Israel won the third annual Miss Holocaust Survivors Beauty Pageant in Haifa. Rita Berkowitz, 83, was chosen among the 16 European natives who participated in the contest on Tuesday. She came to Israel in 1951. Hairdressers and makeup artists primped and pampered the contestants before they took ...
North Vancouver schools get first gender-neutral washroom
2015-12-01 21:52
In a first for North Vancouver schools, Seycove secondary has opened a gender-neutral washroom. The move is a step in the right direction and recognition that not every student feels welcome in the binary male- or female-designated washrooms, according to Brian Wilson, president of Seycove’s Queer Straight Alliance Club, which lobbied the school administration for the washroom. High school is already a ...
Newly-Completed Fukushima 'Containment' Wall Already 'Slightly Leaning'
2015-12-01 21:15
Just weeks after re-starting the building of a giant ice-wall to contain groundwater leaking from the Fukushima nuclear plant, TEPCO has been forced to admit that a 780-meter protective wall built alongside the crippled power station (completed only last month and designed to prevent contaminated groundwater from seeping into the sea)  is already "slightly leaning." While this sounds a lot ...
More News »