Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

Encryption Math Security Science

Position-Based Quantum Cryptography Proved Secure 45

Posted by timothy
from the where-were-you-when dept.
KentuckyFC writes "Physicists have developed a new kind of quantum cryptography that uses position measurements to guarantee the security of a message. The technique is based on triangulation. Alice uses several transmitters to send messages to Bob who returns them immediately at the speed of light. If the return arrives within a certain time period, Alice can be certain that Bob is where he says he is. Physicists proved a few years ago that when the messages are purely classical this method is not secure because Eve can use any number of receivers to work out where Bob is and then use this information to trick Alice. However, the same physicists have now proved that the quantum version of the same position-based scheme is perfectly secure, essentially because Eve cannot easily measure the value of any qubits in the message. Alice and Bob go on to use the qubits to exchange a cryptographic key, a one-time pad, that they use to encrypt a message. The beauty of the technique is that a message encrypted in this way can be read only by somebody at a specific location, something that governments, banks, and the military, not to mention everybody else, may find useful."
This discussion has been archived. No new comments can be posted.

Position-Based Quantum Cryptography Proved Secure

Comments Filter:
  • Hmm... (Score:5, Funny)

    by fuzzyfuzzyfungus (1223518) on Thursday May 13, 2010 @02:26PM (#32197056) Journal
    Could the work that has been done in "slowing" light be used to interfere with this?(or, more practically, since the speed of light varies based on the medium, would you need a completely accurate characterization of the contents of the light paths that the signal travelled over for your certainty to be valid?

    On the plus side, this will finally provide a way for Bob to prove to Alice's satisfaction that he isn't with Eve, and Alice will be able to demonstrate the same about Mallory. Bliss through superior quantum physics!
  • by fahrbot-bot (874524) on Thursday May 13, 2010 @02:37PM (#32197292)

    Eve can use any number of receivers to work out where Bob is and then use this information to trick Alice.

    I'm concerned that this Eve [wikipedia.org] character keeps causing trouble. First for Adam, now Alice and Bob.

Time-sharing is the junk-mail part of the computer business. -- H.R.J. Grosch (attributed)