{"id":205663,"date":"2017-07-14T05:44:05","date_gmt":"2017-07-14T09:44:05","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/why-you-might-trust-a-quantum-computer-with-secretseven-over-phys-org\/"},"modified":"2017-07-14T05:44:05","modified_gmt":"2017-07-14T09:44:05","slug":"why-you-might-trust-a-quantum-computer-with-secretseven-over-phys-org","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/quantum-computing\/why-you-might-trust-a-quantum-computer-with-secretseven-over-phys-org\/","title":{"rendered":"Why you might trust a quantum computer with secretseven over &#8230; &#8211; Phys.Org"},"content":{"rendered":"<p><p>July 12, 2017          It may be possible to control a quantum computer over the    internet without revealing what you are calculating, thanks to    the many possible ways that information can flow through a    computation. That's the conclusion of researchers in Singapore    and Australia who studied the measurement-based model of    quantum computing, reported 11 July in the open-access journal    Physical Review X. Credit: Timothy Yeo \/ Centre for    Quantum Technologies, National University of Singapore    <\/p>\n<p>      Here's the scenario: you have sensitive data and a problem      that only a quantum computer can solve. You have no quantum      devices yourself. You could buy time on a quantum computer,      but you don't want to give away your secrets. What can you      do?    <\/p>\n<p>    Writing in Physical Review X on 11 July, researchers in    Singapore and Australia propose a way you could use a quantum computer securely, even over the    internet. The technique could hide both your data and program    from the computer itself. Their work counters earlier hints    that such a feat is impossible.  <\/p>\n<p>    The scenario is not far-fetched. Quantum computers promise new    routes to solving problems in cryptography, modelling and    machine learning, exciting government and industry. Such    problems may involve confidential data or be commercially    sensitive.  <\/p>\n<p>    Technology giants are already investing in building such    computersand making them available to users. For example, IBM    announced on 17 May this year that it is making a quantum    computer with 16 quantum bits accessible to the    public for free on the cloud, as well as a 17-qubit prototype commercial processor.  <\/p>\n<p>    Seventeen qubits are not enough to outperform the world's    current supercomputers, but as quantum computers gain qubits,    they are expected to exceed the capabilities of any machine we    have today. That should drive demand for access.  <\/p>\n<p>    \"We're looking at what's possible if you're someone just    interacting with a quantum computer across the internet from    your laptop. We find that it's possible to hide some    interesting computations,\" says Joseph Fitzsimons, a Principal    Investigator at the Centre for Quantum Technologies (CQT) at    the National University of Singapore and Associate Professor at    Singapore University of Technology and Design (SUTD), who led    the work.  <\/p>\n<p>    Quantum computers work by processing bits of information stored    in quantum states. Unlike the binary bits found in our regular    (i.e., classical) computers, each a 0 or 1, qubits can be in    superpositions of 0 and 1. The qubits can also be entangled,    which is believed to be crucial to a quantum computer's power.  <\/p>\n<p>    The scheme designed by Fitzsimons and his colleagues brings    secrecy to a form of quantum computing driven by measurements.  <\/p>\n<p>    In this scheme, the quantum computer is prepared by putting all    its qubits into a special type of entangled state. Then the    computation is carried out by measuring the qubits one by one.    The user provides step-wise instructions for each measurement:    the steps encode both the input data and the program.  <\/p>\n<p>    Researchers have shown previously that users who can make or    measure qubits to convey instructions to the quantum computer    could disguise their computation. The new paper extends that    power to users who can only send classical bits - i.e. most of    us, for now.  <\/p>\n<p>    This is surprising because some computer science theorems imply    that encrypted quantum computation is impossible when only    classical communication is available.  <\/p>\n<p>    The hope for security comes from the quantum computer not    knowing which steps of the measurement sequence do what. The    quantum computer can't tell which qubits were used for inputs,    which for operations and which for outputs.  <\/p>\n<p>    \"It's extremely exciting. You can use this unique feature of    the measurement-based model of quantum computingthe way    information flows through the stateas a crypto tool to hide    information from the server,\" says team member Tommaso Demarie    of CQT and SUTD.  <\/p>\n<p>    Although the owner of the quantum computer could try to reverse    engineer the sequence of measurements performed, ambiguity    about the role of each step leads to many possible    interpretations of what calculation was done. The true    calculation is hidden among the many, like a needle in a    haystack.  <\/p>\n<p>    The set of interpretations grows rapidly with the number of    qubits. \"The set of all possible computations is exponentially    large - that's one of the things we prove in the paperand    therefore the chance of guessing the real computation is exponentially small,\" says    Fitzsimons. One question remains: could meaningful computations    be so rare among all the possible ones that the guessing gets    easier? That's what the researchers need to check next.  <\/p>\n<p>    Nicolas Menicucci at the Centre for Quantum Computation and    Communication Technology at RMIT University in Melbourne,    Australia, and Atul Mantri at SUTD, are coauthors on the work.  <\/p>\n<p>    \"Quantum computers became famous in the '90s with the discovery    that they could break some classical cryptography schemesbut    maybe quantum computing will instead be    known for making the future of cloud computing secure,\" says    Mantri.  <\/p>\n<p>     Explore further:    Refrigerator    for quantum computers discovered  <\/p>\n<p>    More information: Atul Mantri et al, Flow Ambiguity: A    Path Towards Classically Driven Blind Quantum Computation,    Physical Review X (2017). DOI: 10.1103\/PhysRevX.7.031004<\/p>\n<p>        The global race towards a functioning quantum computer is        on. With future quantum computers, we will be able to solve        previously impossible problems and develop, for example,        complex medicines, fertilizers, or artificial ...      <\/p>\n<p>        A team of researchers from Australia and the UK have        developed a new theoretical framework to identify        computations that occupy the 'quantum frontier'the        boundary at which problems become impossible for today's        computers ...      <\/p>\n<p>        While technologies that currently run on classical        computers, such as Watson, can help find patterns and        insights buried in vast amounts of existing data, quantum        computers will deliver solutions to important problems        where ...      <\/p>\n<p>        Researchers have succeeded in combining the power of        quantum computing with the security of quantum cryptography        and have shown that perfectly secure cloud computing can be        achieved using the principles of quantum mechanics. ...      <\/p>\n<p>        Quantum computersa possible future technology that would        revolutionize computing by harnessing the bizarre        properties of quantum bits, or qubits. Qubits are the        quantum analogue to the classical computer bits \"0\" and        \"1.\" ...      <\/p>\n<p>        IBM has announced its plans to begin offering the world's        first commercial universal quantum-computing servicecalled        IBM Q, the system will be made available to those who wish        to use it for a fee sometime later this year. ...      <\/p>\n<p>        (Phys.org)When researchers deposit a drop of fluid        containing thousands of free-swimming, genetically        engineered E. coli onto an array of micromotors, within        minutes the micromotors begin rotating. Some of the        individual ...      <\/p>\n<p>        Scientists at the University of Copenhagen have developed a        hands-on answer to a challenge linked to Heisenberg's        Uncertainty Principle. The researchers used laser light to        link caesium atoms and a vibrating membrane. The ...      <\/p>\n<p>        Information technologies of the future will likely use        electron spinrather than electron chargeto carry        information. But first, scientists need to better        understand how to control spin and learn to build the spin        equivalent ...      <\/p>\n<p>        Researchers have developed a fast and practical        molecular-scale imaging technique that could let scientists        view never-before-seen dynamics of biological processes        involved in neurodegenerative diseases such as Alzheimer's        ...      <\/p>\n<p>        (Phys.org)A pair of researchers at Brown University has        found that it is possible to induce a drop of fluid to emit        smaller droplets in a way that resembles the planet Saturn        with its rings. In their paper published in ...      <\/p>\n<p>        Large-scale quantum computers, which are an active pursuit        of many university labs and tech giants, remain years away.        But that hasn't stopped some scientists from thinking        ahead, to a time when quantum computers might be ...      <\/p>\n<p>      Please sign      in to add a comment. Registration is free, and takes less      than a minute. Read more    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/phys.org\/news\/2017-07-quantum-secretseven-internet.html\" title=\"Why you might trust a quantum computer with secretseven over ... - Phys.Org\">Why you might trust a quantum computer with secretseven over ... - Phys.Org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> July 12, 2017 It may be possible to control a quantum computer over the internet without revealing what you are calculating, thanks to the many possible ways that information can flow through a computation. That's the conclusion of researchers in Singapore and Australia who studied the measurement-based model of quantum computing, reported 11 July in the open-access journal Physical Review X. Credit: Timothy Yeo \/ Centre for Quantum Technologies, National University of Singapore Here's the scenario: you have sensitive data and a problem that only a quantum computer can solve <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/quantum-computing\/why-you-might-trust-a-quantum-computer-with-secretseven-over-phys-org\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[257742],"tags":[],"class_list":["post-205663","post","type-post","status-publish","format-standard","hentry","category-quantum-computing"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/205663"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=205663"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/205663\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=205663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=205663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=205663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}