Quantum code splits secrets

By Eric Smalley, Technology Research News

IBM researchers have shown that tapping the weird quantum properties of particles like atoms and photons would improve on a classic technique that allows a group of people to hold pieces of a secret that can only be revealed by combining the pieces.

When a secret is too important for any one person to know, secret-sharing cryptographic protocols provide a way to break up the secret into parts held by several or even many people. The protocols keep the secret until all or most of the parts are assembled.

Adding a quantum component to this scheme would make it harder for the people holding the pieces to cheat or be coerced into revealing the secret.

The IBM scheme is a step in that direction. "We haven't done anything so sophisticated in the quantum version" as splitting a secret into many parts, said David P. DiVincenzo, a physicist at IBM Research. "We've just been investigating the simple case of splitting a secret into two."

The quantum secret-sharing scheme is similar to quantum cryptography and quantum computing because it relies on the quantum mechanical condition of entanglement.

Particles like atoms are usually either spin up or spin down, meaning that the axes they spin around point either up or down relative to the magnetic field around the atoms. But when atoms or other particles are isolated from the environment and cannot be observed, they enter the quantum mechanical state of superposition, which means they are in some mixture of both spin up and spin down.

Two or more particles in superposition can be entangled so that even if they are separated, when one of them is measured and becomes either spin up or spin down the other particle immediately leaves superposition and assumes the same spin regardless of the distance between them.

There are four possible combinations of spins for a pair of entangled particles. One combination, called a singlet, stands out from the other three, which are called triplets.

The quantum secret-sharing scheme represents a bit of information by creating a string of entangled pairs of particles. An odd number of singlets in the string represents a one, and an even number of singlets represents a zero.

Because the two particles have to be together in order to tell whether they form a singlet or a triplet, two people sharing a secret this way couldn't simply measure their halves of the string and compare notes to tell whether the bit is a one or a zero. This makes quantum versions of secret-sharing protocols more secure than classical versions.

"If the parts of the secret are actually pieces of a quantum state, then even communication -- at least communication of the ordinary, classical sort -- can be insufficient for them to reconstruct the secret," said DiVincenzo. "They need to do something stronger. They need some kind of additional quantum technology in order to unlock the secret," he said.

The needed quantum technology could be a quantum communications channel. If the polarization of photons were used rather than the spin of atoms, the photons could be transmitted while preserving their quantum states.

In order to carry out the scheme, however, there must be a way to store the quantum states of particles for long periods of time.

"This scheme is not something that can be realized in the immediate future, except as a demonstration," said Daniel Gottesman, a fellow at the Clay Mathematics Institute and a visiting scholar at the University of California at Berkeley. "You need to store the quantum states until it comes time to open the secret, and it will be a while until we can do that reliably."

Quantum secret sharing "would require a good quantum memory and the ability to measure qubits. Some of the rudiments of what are needed in this scheme are available today," said DiVincenzo.

Practical quantum secret sharing will also require the development of quantum repeaters in order to send quantum information over distances greater than the roughly 10 kilometers possible today. Repeaters boost signals traveling along communications lines.

Quantum repeaters could be developed in about six years but quantum memory will probably take longer, said DiVincenzo. "That gets into the cloudy future," he said.

It also remains to be seen whether the added property of requiring quantum communications makes for a more useful form of secret sharing, Gottesman said.

It should be possible to make a practical form of the quantum secret-sharing scheme before large-scale quantum computers can be built, said DiVincenzo. Large-scale quantum computers are probably more than 20 years away, according to many researchers.

DiVincenzo's research colleagues were Barbara M. Terhal and Debbie W. Leung of IBM Research. They published the research in the June 18, 2001 issue of the journal Physical Review Letters. The research was funded by the National Security Agency (NSA), the Army Research Office and IBM.

Timeline:   Unknown
Funding:   Government; Corporate
TRN Categories:   Cryptography and Security; Quantum Computing
Story Type:   News
Related Elements:  Technical paper, "Hiding Bits in Bell States," Physical Review Letters, June 18, 2001




Advertisements:



October 10, 2001

Page One

Tiny tubes make logic circuits

Mobile radios make intranet

Quantum code splits secrets

Computer tells convincing story

Virtual beings boost evolutionary theory

News:

Research News Roundup
Research Watch blog

Features:
View from the High Ground Q&A
How It Works

RSS Feeds:
News  | Blog  | Books 



Ad links:
Buy an ad link

Advertisements:







Ad links: Clear History

Buy an ad link

 
Home     Archive     Resources    Feeds     Offline Publications     Glossary
TRN Finder     Research Dir.    Events Dir.      Researchers     Bookshelf
   Contribute      Under Development     T-shirts etc.     Classifieds
Forum    Comments    Feedback     About TRN


© Copyright Technology Research News, LLC 2000-2006. All rights reserved.