Open-Source Quantum Simulation Software Models Multi-Billions of Atomic Orbitals

Open-Source Quantum Simulation Software Models Multi-Billions of Atomic Orbitals KITE code could power new quantum developments Key points… +  A research collaboration led by the University of York’s Department of Physics has created open-source software to assist in the creation of quantum materials which could in turn vastly increase the world’s computing power. +  Throughout […]

There May Be a Zoo of Non-classical Correlations Different than Bell’s

There May Be a Zoo of Non-classical Correlations Different than Bell’s Viewpoint: Quantum Correlations Take a New Shape Excerpts and salient points ~ +  Bell experiments provide perhaps the clearest demonstration of how radically quantum physics departs from classical physics. In such experiments, pairs of quantum particles are prepared in special entangled states and separately […]

Limits of Quantum Communication Networks; Secret Key Capacity Explored

Limits of Quantum Communication Networks; Secret Key Capacity Explored Establishing the ultimate limits of quantum communication networks At the moment, sensitive data is typically encrypted and then sent across fibre-optic cables and other channels together with the digital “keys” needed to decode the information. However, the data can be vulnerable to hackers. Quantum communication takes […]

UK’s UKQN: Testing Quantum Key Distribution with the UK’s Quantum Network

UK’s UKQN: Testing Quantum Key Distribution with the UK’s Quantum Network.  Quantum communications are destined to be the most-secure type of data transfer throughout the globe.  China demonstrated this in 2017 with Micius, their quantum-secure communications satellite.  Now, the UK has brought together the research and subsequent development of the UK Quantum Network (UKQN).  Early […]

Cybersecurity and Quantum Key Distribution

The concept of Alice and Bob communicating is back in the spotlight with quantum key distribution added to it. This team from the University of York developed a process which involves displacing the data detectors – the point where information must be read – to a location separate from the sender and receiver. Doing so reduces probability of a hacker attacking the device. See the layperson’s article at ScienceDaily and the original study at the Cornell University Library site.