Jan. 2, 2013 Many scenarios in business and communication require that two parties share information without either being sure if they can trust the other. Examples include secure auctions and identification at ATM machines. Exploiting the strange properties of the quantum world could be the answer to dealing with such distrust: researchers at the Centre for Quantum Technologies (CQT) at the National University of Singapore have used the quantum properties of light to perform the world's first demonstration of a 'secure bit commitment' technology.
The work is described in Nature Communications.
Secure bit commitment is equivalent to making a sealed bid in an auction. One party, usually known as Alice, 'commits' some...
Encryption
Secure communication technology can conquer lack of trust
- 02 January 2013
- Editor
- Hits: 108
Data storage: Electrically enhanced recall
- 10 December 2012
- Editor
- Hits: 86
Dec. 10, 2012 Operating tiny magnetic memories under electrical fields reduces power demand and could enable storage and retrieval of data at much higher speeds than conventional devices
Random-access memory (RAM) is a fast electronic device used in computers to temporarily store data. Traditional RAM is based on the flow of electrical current for data processing. To make RAM faster, more energy efficient and capable of storing more information in a smaller volume, hardware...
Random-access memory (RAM) is a fast electronic device used in computers to temporarily store data. Traditional RAM is based on the flow of electrical current for data processing. To make RAM faster, more energy efficient and capable of storing more information in a smaller volume, hardware...
Single sign-on for Internet use had major vulnerabilites: Many now fixed
- 15 August 2012
- Editor
- Hits: 164
TechAndComputer (Aug. 15, 2012) Online shopping, cloud computing, online CRM systems: Each day many IT systems require the user to identify himself/herself. Single Sign-On (SSO) systems were introduced to circumvent this problem, and to establish structured Identity Management (IDM) systems in industry: Here the user only has to identify once, all subsequent authentications are done automatically. However, SSO systems based on the industry standard SAML have huge vulnerabilities: Roughly...
Quantum cryptography theory has a demonstrated security defect
- 10 August 2012
- Editor
- Hits: 166
TechAndComputer (Aug. 7, 2012) Researchers at Tamagawa University announced August 10 that they had demonstrated the incompleteness and limit of the security theory in quantum key distribution. The present theory cannot guarantee unconditional security. Details will be given at the SPIE conference on Quantum Communication and Quantum Imaging on August 15, 2012. Share This: See Also: Computers & MathHackingEncryptionInformation TechnologyQuantum...
Major step taken towards 'unbreakable' message exchange
- 03 August 2012
- Editor
- Hits: 183
TechAndComputer (Aug. 3, 2012) Single particles of light, also known as photons, have been produced and implemented into a quantum key distribution (QKD) link, paving the way for unbreakable communication networks. Share This: See Also: Matter & EnergyOpticsPhysicsQuantum PhysicsComputers & MathHackingEncryptionSpintronics ResearchReference Photoelectric effectNanowireWave-particle dualityElectromagnetic radiation
The results of the...
The results of the...