Information causality in the quantum and post-quantum regime.

Sci Rep

1] Centre for Engineered Quantum Systems, School of Mathematics and Physics, University of Queensland, Brisbane, QLD 4072, Australia [2] Centre for Quantum Computer and Communication Technology, School of Mathematics and Physics, University of Queensland, Brisbane, QLD 4072, Australia.

Published: November 2014

Quantum correlations can be stronger than anything achieved by classical systems, yet they are not reaching the limit imposed by relativity. The principle of information causality offers a possible explanation for why the world is quantum and why there appear to be no even stronger correlations. Generalizing the no-signaling condition it suggests that the amount of accessible information must not be larger than the amount of transmitted information. Here we study this principle experimentally in the classical, quantum and post-quantum regimes. We simulate correlations that are stronger than allowed by quantum mechanics by exploiting the effect of polarization-dependent loss in a photonic Bell-test experiment. Our method also applies to other fundamental principles and our results highlight the special importance of anisotropic regions of the no-signalling polytope in the study of fundamental principles.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4223661PMC
http://dx.doi.org/10.1038/srep06955DOI Listing

Publication Analysis

Top Keywords

quantum post-quantum
8
correlations stronger
8
fundamental principles
8
causality quantum
4
post-quantum regime
4
quantum
4
regime quantum
4
quantum correlations
4
stronger achieved
4
achieved classical
4

Similar Publications

Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based Encryption.

Sensors (Basel)

November 2024

Graduate Program on Computer Science, Department of Informatics and Statistics, Federal University of Santa Catarina (UFSC), Florianópolis 88040-370, SC, Brazil.

We propose a novel solution to streamline the migration of existing Transport Layer Security (TLS) protocol implementations to a post-quantum Key Encapsulation Mechanism for Transport Layer Security (KEMTLS). By leveraging Identity-Based Encryption (IBE), our solution minimizes the necessary modifications to the surrounding infrastructure, enabling the reuse of existing keys and certificates. We provide a proof-of-concept implementation and performance analysis, demonstrating the practical feasibility and effectiveness of our proposed approach.

View Article and Find Full Text PDF

Scenarios for Optical Encryption Using Quantum Keys.

Sensors (Basel)

October 2024

Advanced Broadband Communications Center (CCABA), Universitat Politècnica de Catalunya (UPC), 08034 Barcelona, Spain.

Optical communications providing huge capacity and low latency remain vulnerable to a range of attacks. In consequence, encryption at the optical layer is needed to ensure secure data transmission. In our previous work, we proposed LightPath SECurity (LPSec), a secure cryptographic solution for optical transmission that leverages stream ciphers and Diffie-Hellman (DH) key exchange for high-speed optical encryption.

View Article and Find Full Text PDF

The integration of blockchain technology with the IoToffers numerous opportunities to enhance the privacy, security, and integrity. This study comprehensively analyze the challenges, scope, and potential solutions associated with integrating blockchain technology and the IoT, with a specific emphasis on nuclear energy applications. We discuss the roles and various aspects of blockchain and the IoT, highlighting their multiple dimensions and applications.

View Article and Find Full Text PDF

PQSF: post-quantum secure privacy-preserving federated learning.

Sci Rep

October 2024

School of Computer Science, School of Cyber Science and Engineering, Nanjing University of Information Science and Technology, Nanjing, 210044, China.

In federated learning, secret sharing is a key technology to maintain the privacy of participants' local models. Moreover, with the rapid development of quantum computers, existing federated learning privacy protection schemes based on secret sharing will no longer be able to guarantee the data security of participants in the post-quantum era. In addition, existing privacy protection methods have the problem of high communication and computational overhead.

View Article and Find Full Text PDF

In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. While at a high level the scheme resembles the Schnorr blind signature, our work does not directly follow from that construction, since isogenies do not offer as rich an algebraic structure. Specifically, our protocol does not fit into the abstraction introduced by Hauck, Kiltz, and Loss (EUROCYRPT'19), which was used to generically construct Schnorr-like blind signatures based on modules such as classical groups and lattices.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!