Cybersecurity and Quantum Key Distribution

The concept of Alice and Bob communicating is back in the spotlight with quantum key distribution added to it. This team from the University of York developed a process which involves displacing the data detectors – the point where information must be read – to a location separate from the sender and receiver. Doing so reduces probability of a hacker attacking the device. See the layperson’s article at ScienceDaily and the original study at the Cornell University Library site. 

The original work is found at Cornell University Library…

This report is found at ScienceDaily…

Share this article ...

Our Mission

At The Qubit Report, our mission is to promote knowledge and opinion of quantum computing from the casual reader to the scientifically astute.  Because Quantum is Coming.

Einstein Stroll