Featured Research

from universities, journals, and other organizations

Secure communication technology can conquer lack of trust

Date:
January 2, 2013
Source:
Centre for Quantum Technologies at the National University of Singapore
Summary:
Many scenarios in business and communication require that two parties share information without either being sure if they can trust the other. Examples include secure auctions and identification at ATM machines. Exploiting the strange properties of the quantum world could be the answer to dealing with such distrust.

Many scenarios in business and communication require that two parties share information without either being sure if they can trust the other. Examples include secure auctions and identification at ATM machines. Exploiting the strange properties of the quantum world could be the answer to dealing with such distrust: researchers at the Centre for Quantum Technologies (CQT) at the National University of Singapore have used the quantum properties of light to perform the world's first demonstration of a 'secure bit commitment' technology.

The work is described in Nature Communications.

Secure bit commitment is equivalent to making a sealed bid in an auction. One party, usually known as Alice, 'commits' some information (a bit) to another party, usually known as Bob, with Alice later choosing when to reveal that bit. A bit commitment protocol is secure if Bob can't learn anything about the bit until Alice reveals it, and if Alice can't change the bit between committing and revealing it.

Compare this with a sealed-bid auction: the bidder must commit to an amount they will pay, and they should remain the only one who knows what the amount is until all the bids are revealed. This is desirable, because a dishonest auctioneer or anyone who accessed the information early could influence the bidding. At the same time, we want to make sure that the bidder cannot change the bid depending on any news he receives later on. This means that we cannot simply solve the problem by allowing the bidder to keep hold of their bid, because they might be dishonest and change the amount.

Traditional solutions to this problem -- think sealed envelopes or data held by a third party -- always depend on trust. Indeed, it has been proven that with classical information alone there is no solution that can totally protect the bidder and the bid receiver from unscrupulous behaviour.

In the demonstration, Alice communicates with Bob using photons, the particles of light. Alice creates pairs of photons that have the quantum property of being entangled, meaning that the photons' properties are connected even when they are separated. Alice splits each pair, keeping one photon and sending its entangled partner to Bob.

Alice encodes her 'bid' in her photons in such a way that Bob can only access the bid when Alice gives him instructions to decode his photons. But Bob can learn enough from his photons beforehand to know whether Alice is trying to cheat when she sends the instructions, say by using a different decoding. This way, both parties are protected from dishonesty.

The experiments were led by two Principal Investigators at CQT: Stephanie Wehner, who had earlier proposed a key theoretical requirement for secure bit commitment, and Christian Kurtsiefer, whose experimental group has expertise in creating entangled photons pair.

Wehner's idea was that secure bit commitment is possible with just one realistic, physical assumption: that anyone trying to cheat has limited ability to store quantum photons. (The quantum entanglement isn't enough on its own.) She proposed and developed this idea of 'noisy storage' in earlier papers.

"I wanted to demonstrate that secure bit commitment with the noisy storage model can work in the real world," says Wehner. With the experimental support from Kurtsiefer's group, it did. The team's Alice and Bob used 250,000 pairs of entangled photons to commit a bit secure against a memory of 972 quantum bits suffering a certain noise. Quantum memories aren't even that big today, but if they got better, security could be restored by increasing the number of photons. The demonstration is a proof-of-principle that points towards a possible quantum technology for secure communication in our future.


Story Source:

The above story is based on materials provided by Centre for Quantum Technologies at the National University of Singapore. Note: Materials may be edited for content and length.


Journal Reference:

  1. Nelly Huei Ying Ng, Siddarth K. Joshi, Chia Chen Ming, Christian Kurtsiefer, Stephanie Wehner. Experimental implementation of bit commitment in the noisy-storage model. Nature Communications, 2012; 3: 1326 DOI: 10.1038/ncomms2268

Cite This Page:

Centre for Quantum Technologies at the National University of Singapore. "Secure communication technology can conquer lack of trust." ScienceDaily. ScienceDaily, 2 January 2013. <www.sciencedaily.com/releases/2013/01/130102115540.htm>.
Centre for Quantum Technologies at the National University of Singapore. (2013, January 2). Secure communication technology can conquer lack of trust. ScienceDaily. Retrieved April 20, 2014 from www.sciencedaily.com/releases/2013/01/130102115540.htm
Centre for Quantum Technologies at the National University of Singapore. "Secure communication technology can conquer lack of trust." ScienceDaily. www.sciencedaily.com/releases/2013/01/130102115540.htm (accessed April 20, 2014).

Share This



More Computers & Math News

Sunday, April 20, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Nintendo Changed Gaming World, but Its Future Uncertain: Upstone

Nintendo Changed Gaming World, but Its Future Uncertain: Upstone

AFP (Apr. 19, 2014) The Nintendo Game Boy celebrates its 25th anniversary Monday and game expert Stephen Upstone says the console can be credited with creating a trend towards handheld gaming devices. Duration: 01:21 Video provided by AFP
Powered by NewsLook.com
Why Did Nike Fire Most Of Its Nike FuelBand Team?

Why Did Nike Fire Most Of Its Nike FuelBand Team?

Newsy (Apr. 19, 2014) Nike fired most of its Digital Sport hardware team, the group behind Nike's FuelBand device. Could Apple or an overcrowded market be behind layoffs? Video provided by Newsy
Powered by NewsLook.com
Nearly Two Weeks On, The Internet Copes With Heartbleed

Nearly Two Weeks On, The Internet Copes With Heartbleed

Newsy (Apr. 19, 2014) The Internet is taking important steps in patching the vulnerabilities Heartbleed highlighted, but those preventive measures carry their own costs. Video provided by Newsy
Powered by NewsLook.com
Facebook To Share Nearby Friends Data With Advertisers

Facebook To Share Nearby Friends Data With Advertisers

Newsy (Apr. 19, 2014) A Facebook spokesperson has confirmed the company will use GPS data from the new Nearby Friends feature for advertising sometime in the future. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins