[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference decwet::physics

Title:Physics
Notice:On the existence of Schr�dinger's Cat
Moderator:AUSS::GARSON
Created:Mon Oct 17 1988
Last Modified:Thu Jun 05 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:423
Total number of notes:5376

96.0. "Quantum Communication" by DOAR::TURNER (MALLET::TURNER or DTN 768-5411) Mon Dec 11 1989 03:46

T.RTitleUserPersonal
Name
DateLines
96.1comments on quantum transmissionPULSAR::WALLYWally Neilsen-SteinhardtTue Dec 12 1989 11:4851
96.2MEMIT::SCOLAROTue Dec 12 1989 12:5126
96.3based on Bell's TheoremELRIC::MARSHALLhunting the snarkTue Dec 12 1989 15:2036
96.4gradually clearingPULSAR::WALLYWally Neilsen-SteinhardtWed Dec 13 1989 09:2423
96.5The True OriginVOSTOK::LEPAGECosmos---is my jobWed Dec 13 1989 09:508
96.637% solution.CADSYS::COOPERTopher CooperThu Dec 14 1989 08:3115
96.7Solar CellsDOAR::TURNERMALLET::TURNER or DTN 768-5411Thu Dec 14 1989 08:518
96.8No *undetectable* taps.CADSYS::COOPERTopher CooperThu Dec 14 1989 09:1351
96.9Quantum Computers vs Turing Machines.CADSYS::COOPERTopher CooperThu Dec 14 1989 10:5284
96.10PenroseELRIC::MARSHALLhunting the snarkFri Dec 15 1989 06:0349
96.11ALIEN::POSTPISCHILI will not be bullied.Fri Dec 15 1989 06:0520
96.12Turing +CADSYS::COOPERTopher CooperFri Dec 15 1989 08:4766
96.13rearranged redundancies.CADSYS::COOPERTopher CooperFri Dec 15 1989 11:0243
96.14read the current _Sci Am_PULSAR::WALLYWally Neilsen-SteinhardtMon Dec 18 1989 10:04101
96.15Quantum quotesRBURNS::KLAESAll the Universe, or nothing!Wed May 29 1991 08:0243
96.16Chinese RoomsSGOUTL::BELDIN_RPull us together, not apartThu Jan 16 1992 07:318
96.17pointer to good deal on 3 quantun mechanics booksSTAR::ABBASII spell checkTue Aug 18 1992 15:0514
96.18Flipping a quantum mechanical coinMTWAIN::KLAESNo Guts, No GalaxyWed Aug 31 1994 11:1855
96.19quantum cryptographyAUSS::GARSONDECcharity Program OfficeMon May 19 1997 21:4352
                                            Tuesday, 6 May 1997, 7:00 p.m.

                 Fickle Photons Hobble Quantum Cryptography

Scientists have devised a way to breach the security of information that
might be encoded in photons. The findings, reported in the current issue of
Physical Review Letters, appear to undermine one form of quantum
cryptography, which harnesses the principles of quantum mechanics to guard
secrets.

Like the tape that self-destructs in Mission: Impossible, a photon's wave
function--a quantum-mechanical property--collapses when it is measured,
destroying the information it contains. Researchers hoped this phenomenon
would make quantum cryptography the premier tool for encoding information
in a scheme called bit commitment, in which two people who don't trust each
other can swap data without revealing their hands. Physicist Richard Hughes
of Los Alamos National Laboratory in New Mexico explains one hypothetical
scenario: "Suppose Alice wants to prove she can make a prediction about the
stock market, but wants to make sure that Bob can't use the information to
... make a killing for free."

To do so, Alice can send Bob a string of photons, all of them polarized
diagonally (45 or 135 degrees, indicating a 1) or rectilinearly (0 or 90
degrees, indicating a 0). If Bob views diagonal photons through a
rectilinear filter or vice versa, he'll get a random string of readings,
indistinguishable from useful ones. As a result, Bob gets no information
until Alice chooses to reveal whether she sent a 1 or a 0. Bob can then
verify, after the fact, that Alice indeed had sent the bit that she claimed
she did, by looking at the photons he measured with the "right" filter; if
Alice has told the truth, his readings will agree with hers. Thus, Alice
has to commit herself to a value for the bit but doesn't need to show her
hand until later.

Unfortunately, this scheme has a gaping hole. Computer scientist Dominic
Mayers of Princeton University, physicist Hoi-Kwong Lo of Hewlett-Packard,
and physicist H. F. Chau of the University of Hong Kong have found a way
for Alice to cheat. Instead of producing a single photon, the researchers
found, she might prepare an Einstein-Podolsky-Rosen pair: two photons with
polarizations that are linked, even as they travel in different directions.
Alice might store one half of the pair while sending the other half to Bob,
then measure her stored photon later, which reveals Bob's measurement of
the counterpart. Thus, she could avoid bit commitment--or change her
commitment late in the game, after sending Bob the photons.

This weak spot in bit commitment would compromise a range of protocols,
notably the "post-Cold War" ones in which you don't trust your friends.
"I'm very disappointed with this result," says Claude Crepeau, a quantum
cryptographer at the University of Montreal. "There was a lot of research
centered on [quantum-bit commitment]. It's no longer possible to achieve
this goal."

     � 1997 by the American Association for the Advancement of Science