this post was submitted on 14 Apr 2024
34 points (100.0% liked)

Technology

37727 readers
469 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

The full power of next-generation quantum computing could soon be harnessed by millions of individuals and companies thanks to a breakthrough by scientists at Oxford’s Department of Physics guaranteeing security and privacy. The advance promises to unlock the transformative potential of cloud-based quantum computing and is detailed in a new study published in Physical Review Letters.

In the new study, the researchers use an approach known as ‘blind quantum computing’, which connects two totally separate quantum computing entities – potentially an individual at home or in an office accessing a cloud server – in a completely secure way. Importantly, their new methods could be scaled up to large quantum computations.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 7 months ago

However, delegating quantum computations to a server carries the same privacy and security concerns that bedevil classical cloud computing. Users are currently unable to hide their work from the server or to independently verify their results in the regime where classical simulations become intractable. Remarkably, the same phenomena that enable quantum computing can leave the server “blind” in a way that conceals the client’s input, output, and algorithm [6–8]; because quantum information cannot be copied and measurements irreversibly change the quantum state, information stored in these systems can be protected with information-theoretic security, and incorrect operation of the server or attempted attacks can be detected—a surprising possibility which has no equivalent in classical computing.

From the paper the article talks about