Rise of the photon clones: New method could lead to 'impenetrable' comms

New tech aims to boost security and range of quantum cryptography

Physicists have produced "near-perfect" clones of quantum information that can be used to send and retrieve information securely over long distances through quantum cryptography.

Research into using quantum mechanics for cryptography reasons is a bustling area. More countries are beginning to invest in technology that could enable perfectly secure communication.

China launched the world's first quantum science satellite earlier this year to test how information could be encoded into entangled photons that were blasted into space and sent back.

A big problem, however, is that over those long distances quantum information can degrade. The photons carrying the information can be bounced around and absorbed into the fibre-optic cables or the atmosphere, destroying the quality of information and causing errors.

Cloning the quantum information can unravel the hidden information in the photons in a better, more readable state. But the success rate can never be 100 per cent.

The "no-cloning theorem" states that it is impossible to create an identical copy of an unknown quantum state. When the photons are entangled, the quantum states of each photon can not be individually defined and cannot be cloned perfectly.

A paper published in Nature Communications on Wednesday shows that a team of scientists have created a "probabilistic method" that demonstrates it is possible to create quantum information clones to a higher degree – beyond the theoretical limit.

First a beam of photons is amplified using a noiseless optical amplifier and then split to create clones of the original photons.

Explaining the probabilistic method is tricky business. To visualise the method, Professor Timothy Ralph, a researcher at the Centre for Quantum Computation and Communication Technology at the University of Queensland, said to think of archery.

"Imagine Olympic archers being able to choose the shots that land closest to the target's centre to increase their average score. By designing our experiment to have probabilistic outputs, we sometimes 'get lucky' and recover more information than is possible using existing deterministic cloning methods. We use the results closest to a 'bullseye' and discard the rest," Ralph said.

The success rate is 5 per cent and each photon can be cloned five times, Jing Yan Haw, lead author of the study and PhD researcher at the Australian National University (ANU), said.

The cloning method could be useful for generating secret keys that can encrypt and decrypt sensitive information.

"One of the problems with quantum encryption is its limited communication range. We hope this technology could be used to extend the range of communication, and one day lead to impenetrable privacy between two communicating parties," said Professor Ping Koy Lam, co-author of the paper and quantum optics researcher at ANU. ®

Similar topics

Broader topics

Other stories you might like

  • DigitalOcean tries to take sting out of price hike with $4 VM
    Cloud biz says it is reacting to customer mix largely shifting from lone devs to SMEs

    DigitalOcean attempted to lessen the sting of higher prices this week by announcing a cut-rate instance aimed at developers and hobbyists.

    The $4-a-month droplet — what the infrastructure-as-a-service outfit calls its virtual machines — pairs a single virtual CPU with 512 MB of memory, 10 GB of SSD storage, and 500 GB a month in network bandwidth.

    The launch comes as DigitalOcean plans a sweeping price hike across much of its product portfolio, effective July 1. On the low-end, most instances will see pricing increase between $1 and $16 a month, but on the high-end, some products will see increases of as much as $120 in the case of DigitalOceans’ top-tier storage-optimized virtual machines.

    Continue reading
  • GPL legal battle: Vizio told by judge it will have to answer breach-of-contract claims
    Fine-print crucially deemed contractual agreement as well as copyright license in smartTV source-code case

    The Software Freedom Conservancy (SFC) has won a significant legal victory in its ongoing effort to force Vizio to publish the source code of its SmartCast TV software, which is said to contain GPLv2 and LGPLv2.1 copyleft-licensed components.

    SFC sued Vizio, claiming it was in breach of contract by failing to obey the terms of the GPLv2 and LGPLv2.1 licenses that require source code to be made public when certain conditions are met, and sought declaratory relief on behalf of Vizio TV owners. SFC wanted its breach-of-contract arguments to be heard by the Orange County Superior Court in California, though Vizio kicked the matter up to the district court level in central California where it hoped to avoid the contract issue and defend its corner using just federal copyright law.

    On Friday, Federal District Judge Josephine Staton sided with SFC and granted its motion to send its lawsuit back to superior court. To do so, Judge Staton had to decide whether or not the federal Copyright Act preempted the SFC's breach-of-contract allegations; in the end, she decided it didn't.

    Continue reading
  • US brings first-of-its-kind criminal charges of Bitcoin-based sanctions-busting
    Citizen allegedly moved $10m-plus in BTC into banned nation

    US prosecutors have accused an American citizen of illegally funneling more than $10 million in Bitcoin into an economically sanctioned country.

    It's said the resulting criminal charges of sanctions busting through the use of cryptocurrency are the first of their kind to be brought in the US.

    Under the United States' International Emergency Economic Powers Act (IEEA), it is illegal for a citizen or institution within the US to transfer funds, directly or indirectly, to a sanctioned country, such as Iran, Cuba, North Korea, or Russia. If there is evidence the IEEA was willfully violated, a criminal case should follow. If an individual or financial exchange was unwittingly involved in evading sanctions, they may be subject to civil action. 

    Continue reading

Biting the hand that feeds IT © 1998–2022