this post was submitted on 14 Apr 2024
34 points (100.0% liked)

Technology

37723 readers
449 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies thanks to a breakthrough by scientists at Oxford’s Department of Physics guaranteeing security and privacy. The advance promises to unlock the transformative potential of cloud-based quantum computing and is detailed in a new study published in Physical Review Letters.

In the new study, the researchers use an approach known as ‘blind quantum computing’, which connects two totally separate quantum computing entities – potentially an individual at home or in an office accessing a cloud server – in a completely secure way. Importantly, their new methods could be scaled up to large quantum computations.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 16 points 7 months ago (18 children)

what use would a regular citizen have for a quantum computer?

[–] [email protected] 11 points 7 months ago (13 children)

"Guaranteeing security and privacy" could a strong argument imho.

[–] [email protected] 7 points 7 months ago (11 children)

couldn't they get that with a regular computer?

[–] [email protected] 7 points 7 months ago

Maybe not once quantum computers become more common.

Our current encryption methods can be represented as wave functions. This allows a sufficiently large quantum computer to solve for the keys in very little time.

There are new algorithms being developed that should defend against this. So you may still be correct.

Post Quantum Cryptography

load more comments (10 replies)
load more comments (11 replies)
load more comments (15 replies)