Post Profile

Quantum communication: Quantum secret kept for a day

A bit of information can be kept secure for 24 hours before being revealed — more than 5 million times longer than the previous record.Quantum cryptography guards against eavesdroppers, but in secure voting and sealed-bid auctions, a message must remain unread and protected for
read more


Related Posts

Computer Hackers R.I.P.: Making Quantum Cryptography Practical

Academics / General Science : ScienceDaily: Science Society

Quantum cryptography, a completely secure means of communication, is much closer to being used practically as researchers have now developed high speed detectors capable of receiving information with much higher key rates, thereby a...

Quantum cryptography for mobile phones

Academics / General Science : ScienceDaily: Science Society

An ultra-high security scheme that could one day get quantum cryptography using Quantum Key Distribution into mobile devices has been developed and demonstrated. Secure mobile communications underpin our society and through mobile p...

Serious security: Device-Independent Quantum Key Distribution guards against the most general attacks

Academics / General Science : Physorg: Other Sciences

The Holy Grail of quantum cryptography – beyond delivering security that cannot be classically achieved – is guaranteeing unconditional security when the untrusted quantum devices are involved. While this goal has been studied since...

Quantum 'sealed envelope' system enables 'perfectly secure' information storage

Academics / General Science : TG Daily - General Sciences

Teaser A breakthrough in quantum cryptography demonstrates that information can be encrypted and then decrypted with complete security using the combined power of quantum theory and relativity - allowing the sender to dictate the un...

Eavesdroppers begone: New quantum key distribution technique is impervious to noise

Academics / General Science : Physorg: Other Sciences

( —Cryptography – the art and science of providing secure communications – typically employs three methods to authenticate users and prevent data theft: secret key (symmetric) cryptography, which uses a single key for both ...


Copyright © 2016 Regator, LLC