Posted in | News | Quantum Computing

Study Proves Incompleteness and Limit of Security Theory in Quantum Cryptography

A team of scientists from the Quantum ICT Research Institute of Tamagawa University in Japan has reported that the researchers have demonstrated the limit and incompleteness of the security theory in quantum cryptography or quantum key distribution.

The research team proved that the existing theory is not capable of ensuring unconditional security. The researchers will describe their findings at the SPIE conference on Quantum Communication and Quantum Imaging, which will be conducted on August 15, 2012 in San Diego. The title of the presentation is ‘Incompleteness and Limit of Quantum Key Distribution Theory.’

Hitherto, most of the scientists in quantum information science have assumed that quantum cryptography is capable of providing unconditional security. The assurance of its unconditional security is provided by the trace distance, a quantum translation of the assessment of a mathematical cipher. Nevertheless, since 2006, new advancements in the realm have raised disapproval against the meaningful security of quantum key distribution guaranteed only by the trace distance. In spite of these criticisms, several papers have continued to state that the trace distance ensures unconditional security in quantum cryptography.

Now, scientists at the Quantum ICT Research Institute of Tamagawa University have successfully explained a logical path between the existing hypothesis and its criticisms. As a result, they have confirmed that the existing hypothesis fails to quantify security and is not capable of providing the unconditional security as described in Shannon’s theory, which describes the security for an unbreakable cipher.

Source: http://www.tamagawa.jp

Will Soutter

Written by

Will Soutter

Will has a B.Sc. in Chemistry from the University of Durham, and a M.Sc. in Green Chemistry from the University of York. Naturally, Will is our resident Chemistry expert but, a love of science and the internet makes Will the all-rounder of the team. In his spare time Will likes to play the drums, cook and brew cider.

Citations

Please use one of the following formats to cite this article in your essay, paper or report:

  • APA

    Soutter, Will. (2019, February 18). Study Proves Incompleteness and Limit of Security Theory in Quantum Cryptography. AZoQuantum. Retrieved on April 24, 2024 from https://www.azoquantum.com/News.aspx?newsID=76.

  • MLA

    Soutter, Will. "Study Proves Incompleteness and Limit of Security Theory in Quantum Cryptography". AZoQuantum. 24 April 2024. <https://www.azoquantum.com/News.aspx?newsID=76>.

  • Chicago

    Soutter, Will. "Study Proves Incompleteness and Limit of Security Theory in Quantum Cryptography". AZoQuantum. https://www.azoquantum.com/News.aspx?newsID=76. (accessed April 24, 2024).

  • Harvard

    Soutter, Will. 2019. Study Proves Incompleteness and Limit of Security Theory in Quantum Cryptography. AZoQuantum, viewed 24 April 2024, https://www.azoquantum.com/News.aspx?newsID=76.

Tell Us What You Think

Do you have a review, update or anything you would like to add to this news story?

Leave your feedback
Your comment type
Submit

While we only use edited and approved content for Azthena answers, it may on occasions provide incorrect responses. Please confirm any data provided with the related suppliers or authors. We do not provide medical advice, if you search for medical information you must always consult a medical professional before acting on any information provided.

Your questions, but not your email details will be shared with OpenAI and retained for 30 days in accordance with their privacy principles.

Please do not ask questions that use sensitive or confidential information.

Read the full Terms & Conditions.