Purchasing new hardware? Read our latest product comparisons

Perfectly secure cloud computing possible thanks to quantum physics


January 29, 2012

Researchers have demonstrated a process relying on quantum physics they claim enables perfectly secure cloud computing (Image: Shutterstock)

Researchers have demonstrated a process relying on quantum physics they claim enables perfectly secure cloud computing (Image: Shutterstock)

As numerous companies continue their push to get us to entrust our data to the cloud, there are many still justifiably concerned about the security of cloud computing-based services. Now an international team of scientists have demonstrated that perfectly secure cloud computing is possible by combining the power of quantum computing with the security of quantum cryptography. They carried out what they claim is the first demonstration of "blind quantum computing," in which a quantum computation was carried out with the input, computation, and output all remaining unknown to the computer, and therefore, also any eavesdroppers.

While it is expected that quantum computers will play an important role in future information processing, some believe that - like today's supercomputers - they will be limited to a few specialized facilities around the world. While this brings to mind the quote most often attributed to IBM chairman Thomas Watson in 1943, "I think there is a world market for maybe five computers," given the inherent difficulties in building quantum devices, there's every chance such a scenario will eventuate - at least in the near term.

The international research team working at the Vienna Center for Quantum Science and Technology (VCQ) at the University of Vienna and the Institute for Quantum Optics and Quantum Information (IQOQI) says that quantum physics will enable remote users of such facilities to send and receive private data, safe in the knowledge that it is protected from prying eyes.

The researchers describe the process like this: "The user prepares qubits - the fundamental units of quantum computers - in a state known only to himself and sends these qubits to the quantum computer. The quantum computer entangles the qubits according to a standard scheme.

"The actual computation is measurement-based: the processing of quantum information is implemented by simple measurements on qubits. The user tailors measurement instructions to the particular state of each qubit and sends them to the quantum server.

"Finally, the results of the computation are sent back to the user who can interpret and utilize the results of the computation. Even if the quantum computer or an eavesdropper tries to read the qubits, they gain no useful information, without knowing the initial state; they are 'blind.'"

The researchers made what they believe is the first experimental demonstration of this blind quantum computing process by encoding the data using photons. These are well suited to the task as quantum computation operations can be carried out on them and they can be transmitted quickly over long distances.

"Quantum physics solves one of the key challenges in distributed computing. It can preserve data privacy when users interact with remote computing centers," says Stefanie Barz, lead author of the study, which appears in the journal Science.

Source: University of Vienna

About the Author
Darren Quick Darren's love of technology started in primary school with a Nintendo Game & Watch Donkey Kong (still functioning) and a Commodore VIC 20 computer (not still functioning). In high school he upgraded to a 286 PC, and he's been following Moore's law ever since. This love of technology continued through a number of university courses and crappy jobs until 2008, when his interests found a home at Gizmag. All articles by Darren Quick

Super Web security?!?

Matthew Fry

That\'s wonderful, but all kind of pointless.

The Service Provider (Cloud Provider) will be forced into leaving some kind of back door for the Government to monitor as they wish.

They will never allow something they cant monitor (spy) on. Just like way back when they started all of the older encryption algorithms.

At first they complain what a threat it is to National Security then after x amount of years they go silent on the subject. That tells you when they have broken the codes.

If they cant break the Quantum code they will simply find a way to monitor your terminal and pick up your keys as they are created.

You have no idea of what these organizations are capable of or how far they will go.

Have a nice day.


Guess few noticed this TechReview article: http://www.technologyreview.com/blog/arxiv/27522/?ref=rss

Bruce Kahn
Post a Comment

Login with your Gizmag account:

Related Articles
Looking for something? Search our articles