探花直播 of Cambridge - quantum cryptography /taxonomy/subjects/quantum-cryptography en Researchers demonstrate the UK鈥檚 first long-distance ultra-secure communication over a quantum network /research/news/researchers-demonstrate-the-uks-first-long-distance-ultra-secure-communication-over-a-quantum <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/gettyimages-1400360356-copy.jpg?itok=ZWmYAO7b" alt="Digital abstract background" title="Abstract background, Credit: MR.Cole_Photographer via Getty Images" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p> 探花直播team, from the Universities of Bristol and Cambridge, created the network, which uses standard fibreoptic infrastructure, but relies on a variety of quantum phenomena to enable ultra-secure data transfer.</p> <p> 探花直播network uses two types of quantum key distribution (QKD) schemes: 鈥榰nhackable鈥 encryption keys hidden inside particles of light; and distributed entanglement: a phenomenon that causes quantum particles to be intrinsically linked.</p> <p> 探花直播researchers demonstrated the capabilities of the network via a live, quantum-secure video conference link, the transfer of encrypted medical data, and secure remote access to a distributed data centre. 探花直播data was successfully transmitted between Bristol and Cambridge 鈥 a fibre distance of over 410 kilometres.</p> <p>This is the first time that a long-distance network, encompassing different quantum-secure technologies such as entanglement distribution, has been successfully demonstrated. 探花直播researchers presented their results at the <em>2025 Optical Fiber Communications Conference (OFC)</em> in San Francisco.</p> <p>Quantum communications offer unparalleled security advantages compared to classical telecommunications solutions. These technologies are immune against future cyber-attacks, even with quantum computers, which 鈥 once fully developed 鈥 will have the potential to break through even the strongest cryptographic methods currently in use.</p> <p>In the past few years, researchers have been working to build and use quantum communication networks. China recently set up a massive network that covers 4,600 kilometres by connecting five cities using both fibreoptics and satellites. In Madrid, researchers created a smaller network with nine connection points that use different types of QKD to securely share information.</p> <p>In 2019, researchers at Cambridge and Toshiba demonstrated a metro-scale quantum network operating at record key rates of millions of key bits per second. And in 2020, researchers in Bristol built a network that could share entanglement between multiple users. Similar quantum network trials have been demonstrated in Singapore, Italy and the USA.</p> <p>Despite this progress, no one has built a large, long-distance network that can handle both types of QKD, entanglement distribution, and regular data transmission all at once, until now.</p> <p> 探花直播experiment demonstrates the potential of quantum networks to accommodate different quantum-secure approaches simultaneously with classical communications infrastructure. It was carried out using the UK鈥檚 Quantum Network (UKQN), established over the last decade by the same team, supported by funding from the Engineering and Physical Sciences Research Council (EPSRC), and as part of the <a href="https://www.quantumcommshub.net/">Quantum Communications Hub</a> project.</p> <p>鈥淭his is a crucial step toward building a quantum-secured future for our communities and society,鈥 said co-author Dr Rui Wang, Lecturer for Future Optical Networks in the Smart Internet Lab's High Performance Network Research Group at the 探花直播 of Bristol. 鈥淢ore importantly, it lays the foundation for a large-scale quantum internet鈥攃onnecting quantum nodes and devices through entanglement and teleportation on a global scale.鈥</p> <p>鈥淭his marks the culmination of more than ten years of work to design and build the UK Quantum Network,鈥 said co-author Adrian Wonfor from Cambridge鈥檚 Department of Engineering. 鈥淣ot only does it demonstrate the use of multiple quantum communications technologies, but also the secure key management systems required to allow seamless end-to-end encryption between us.鈥</p> <p>鈥淭his is a significant step in delivering quantum security for the communications we all rely upon in our daily lives at a national scale,鈥 said co-author Professor Richard Penty, also from Cambridge and who headed the Quantum Networks work package in the Quantum Communications Hub. 鈥淚t would not have been possible without the close collaboration of the two teams at Cambridge and Bristol, the support of our industrial partners Toshiba, BT, Adtran and Cisco, and our funders at UKRI.鈥</p> <p>鈥淭his is an extraordinary achievement which highlights the UK鈥檚 world-class strengths in quantum networking technology,鈥 said Gerald Buller, Director of the IQN Hub, based at Heriot-Watt 探花直播. 鈥淭his exciting demonstration is precisely the kind of work the Integrated Quantum Networks Hub will support over the coming years, developing the technologies, protocols and standards which will establish a resilient, future-proof, national quantum communications infrastructure.鈥</p> <p> 探花直播current UKQN covers two metropolitan quantum networks around Bristol and Cambridge, which are connected via a 鈥榖ackbone鈥 of four long-distance optical fibre links spanning 410 kilometres with three intermediate nodes.</p> <p> 探花直播network uses single-mode fibre over the EPSRC National Dark Fibre Facility (which provides dedicated fibre for research purposes), and low-loss optical switches allowing network reconfiguration of both classical and quantum signal traffic.</p> <p> 探花直播team will pursue this work further through a newly funded EPSRC project, the <a href="https://iqnhub.org/">Integrated Quantum Networks Hub</a>, whose vision is to establish quantum networks at all distance scales, from local networking of quantum processors to national-scale entanglement networks for quantum-safe communication, distributed computing and sensing, all the way to intercontinental networking via low-earth orbit satellites.</p> <p>聽</p> <p><em><strong>Reference:</strong><br /> R. Yang et al. 鈥楢 UK Nationwide Heterogeneous Quantum Network.鈥 Paper presented at the 2025 Optical Fiber Communications Conference and Exhibition (OFC): <a href="https://www.ofcconference.org/en-us/home/schedule/">https://www.ofcconference.org/en-us/home/schedule/</a></em></p> </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Researchers have successfully demonstrated the UK鈥檚 first long-distance ultra-secure transfer of data over a quantum communications network, including the UK鈥檚 first long-distance quantum-secured video call.</p> </p></div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://www.gettyimages.co.uk/detail/photo/rendering-motion-graphic-of-futuristic-abstract-royalty-free-image/1400360356" target="_blank">MR.Cole_Photographer via Getty Images</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Abstract background</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://creativecommons.org/licenses/by-nc-sa/4.0/" rel="license"><img alt="Creative Commons License." src="/sites/www.cam.ac.uk/files/inner-images/cc-by-nc-sa-4-license.png" style="border-width: 0px; width: 88px; height: 31px;" /></a><br /> 探花直播text in this work is licensed under a <a href="https://creativecommons.org/licenses/by-nc-sa/4.0/">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License</a>. Images, including our videos, are Copyright 漏 探花直播 of Cambridge and licensors/contributors as identified. All rights reserved. We make our image and video content available in a number of ways 鈥 on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p> </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Mon, 07 Apr 2025 23:38:58 +0000 sc604 248937 at Talking about a revolution: 25 years of BT and Cambridge /stories/working-with-BT <div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>Cambridge and BT have been working together for more than 25 years developing new technologies, exploring human behaviour and considering how those two things come together to shape our world.</p> </p></div></div></div> Fri, 14 Oct 2022 09:24:46 +0000 skbf2 234701 at Ultra-secure form of virtual money proposed /research/news/ultra-secure-form-of-virtual-money-proposed <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/crop2_5.jpg?itok=fbiytRdz" alt="" title="Fiber Optic Cable Blue, Credit: chaitawat" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p> 探花直播theoretical framework, dubbed 鈥楽-money鈥, could ensure completely unforgeable and secure authentication, and allow faster and more flexible responses than any existing financial technology, harnessing the combined power of quantum theory and relativity. In fact, it could conceivably make it possible to conduct commerce across the Solar System and beyond, without long time lags, although commerce on a galactic scale is a fanciful notion at this point.</p> <p>Researchers aim to begin testing its practicality on a smaller, Earth-bound scale later this year. S-money requires very fast computations, but may be feasible with current computing technology. <a href="https://royalsocietypublishing.org/doi/10.1098/rspa.2019.0170">Details</a> are published in the <em>Proceedings of the Royal Society A</em>.</p> <p>鈥淚t鈥檚 a slightly different way of thinking about money: instead of something that we hold in our hands or in our bank accounts, money could be thought of as something that you need to get to a certain point in space and time, in response to data that鈥檚 coming from lots of other points in space and time,鈥 said Professor Adrian Kent, from Cambridge鈥檚 Department of Applied Mathematics and Theoretical Physics, who authored the paper.</p> <p> 探花直播framework developed by Professor Kent can be thought of as secure virtual tokens generated by communications between various points on a financial network, which respond flexibly to real-time data across the world and 鈥榤aterialise鈥 so that they can be used at the optimal place and time. It allows users to respond to events faster than familiar types of money, both physical and digital, which follow definite paths through space.</p> <p> 探花直播tokens can be securely traded without delays for cross-checking or verification across the network, while eliminating any risk of double-trading. One way of guaranteeing this uses the power of quantum theory, the physics of the subatomic world that Einstein famously dismissed as 鈥渟pooky鈥.</p> <p> 探花直播user鈥檚 privacy is maintained by protocols such as bit commitment, which is a mathematical version of a securely sealed envelope. Data are delivered from party A to party B in a locked state that cannot be changed once sent and can only be revealed when party A provides the key 鈥 with security guaranteed, even if either of the parties tries to cheat.</p> <p>Other researchers have developed theoretical frameworks for 鈥榪uantum鈥 money, which is based on the strange behaviour of particles at the subatomic scale. While using quantum money for real world transactions may be possible someday, according to Kent, at the moment it is technologically impossible to keep quantum money secure for any appreciable length of time.</p> <p>鈥淨uantum money, insofar as it鈥檚 currently understood, would require long-term storage of quantum states, or quantum memory,鈥 said Kent. 鈥淭his would require an awful lot of resources, and even if it becomes technologically feasible, it may be incredibly expensive.鈥</p> <p>While the S-money system requires large computational overhead, it may be feasible with current computer technology. Later this year, Kent and his colleagues hope to conduct some proof-of-concept testing working with the Quantum Communications Hub, of which the 探花直播 of Cambridge is a partner institution. 聽They hope to understand how fast S-money can be issued and spent on a network using off-the-shelf technologies.</p> <p>鈥淲e鈥檙e trying to understand the practicalities and understand the advantages and disadvantages,鈥 said Kent.</p> <p>Patent applications for the research have been filed by Cambridge Enterprise, the 探花直播鈥檚 commercialisation arm.</p> <p><strong><em>Reference:</em></strong><br /> <em>Adrian Kent. 鈥<a href="https://royalsocietypublishing.org/doi/10.1098/rspa.2019.0170">S-money: virtual tokens for a relativistic economy</a>.鈥 Proceedings of the Royal Society A (2019). DOI: 10.1098/rspa.2019.0170</em></p> </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>A new type of money that allows users to make decisions based on information arriving at different locations and times, and that could also protect against attacks from quantum computers, has been proposed by a researcher at the 探花直播 of Cambridge.</p> </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">Instead of something that we hold in our hands or in our bank accounts, money could be thought of as something that you need to get to a certain point in space and time</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Adrian Kent</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="https://pixabay.com/photos/fiber-optic-cable-blue-network-2749588/" target="_blank">chaitawat</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Fiber Optic Cable Blue</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br /> 探花直播text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>. Images, including our videos, are Copyright 漏 探花直播 of Cambridge and licensors/contributors as identified.聽 All rights reserved. We make our image and video content available in a number of ways 鈥 as here, on our <a href="/">main website</a> under its <a href="/about-this-site/terms-and-conditions">Terms and conditions</a>, and on a <a href="/about-this-site/connect-with-us">range of channels including social media</a> that permit your use and sharing of our content under their respective Terms.</p> </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div><div class="field field-name-field-license-type field-type-taxonomy-term-reference field-label-above"><div class="field-label">Licence type:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/imagecredit/public-domain">Public Domain</a></div></div></div> Tue, 07 May 2019 23:00:50 +0000 sc604 205202 at Laser technique promises super-fast and super-secure quantum cryptography /research/news/laser-technique-promises-super-fast-and-super-secure-quantum-cryptography <div class="field field-name-field-news-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><img class="cam-scale-with-grid" src="/sites/default/files/styles/content-580x288/public/news/research/news/pic_4.png?itok=FjzSB_Rb" alt="Depiction of indistinguishable photons leaving through the same output port of a beam splitter" title="Depiction of indistinguishable photons leaving through the same output port of a beam splitter, Credit: Lucian Comandar" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Researchers have developed a new method to overcome one of the main issues in implementing a quantum cryptography system, raising the prospect of a useable 鈥榰nbreakable鈥 method for sending sensitive information hidden inside particles of light.</p>&#13; &#13; <p>By 鈥榮eeding鈥 one laser beam inside another, the researchers, from the 探花直播 of Cambridge and Toshiba Research Europe, have demonstrated that it is possible to distribute encryption keys at rates between two and six orders of magnitude higher than earlier attempts at a real-world quantum cryptography system. 探花直播<a href="https://dx.doi.org/10.1038/nphoton.2016.50" target="_blank">results</a> are reported in the journal <em>Nature Photonics</em>.</p>&#13; &#13; <p>Encryption is a vital part of modern life, enabling sensitive information to be shared securely. In conventional cryptography, the sender and receiver of a particular piece of information decide the encryption code, or key, up front, so that only those with the key can decrypt the information. But as computers get faster and more powerful, encryption codes get easier to break.</p>&#13; &#13; <p>Quantum cryptography promises 鈥榰nbreakable鈥 security by hiding information in particles of light, or photons, emitted from lasers. In this form of cryptography, quantum mechanics are used to randomly generate a key. 探花直播sender, who is normally designated as Alice, sends the key via polarised photons, which are sent in different directions. 探花直播receiver, normally designated as Bob, uses photon detectors to measure which direction the photons are polarised, and the detectors translate the photons into bits, which, assuming Bob has used the correct photon detectors in the correct order, will give him the key.</p>&#13; &#13; <p> 探花直播strength of quantum cryptography is that if an attacker tries to intercept Alice and Bob鈥檚 message, the key itself changes, due to the properties of quantum mechanics. Since it was first proposed in the 1980s, quantum cryptography has promised the possibility of unbreakable security. 鈥淚n theory, the attacker could have all of the power possible under the laws of physics, but they still wouldn鈥檛 be able to crack the code,鈥 said the paper鈥檚 first author Lucian Comandar, a PhD student at Cambridge鈥檚 Department of Engineering and Toshiba鈥檚 Cambridge Research Laboratory.</p>&#13; &#13; <p>However, issues with quantum cryptography arise when trying to construct a useable system. In reality, it is a back and forth game: inventive attacks targeting different components of the system are constantly being developed, and countermeasures to foil attacks are constantly being developed in response.</p>&#13; &#13; <p> 探花直播components that are most frequently attacked by hackers are the photon detectors, due to their high sensitivity and complex design 鈥 it is usually the most complex components that are the most vulnerable. As a response to attacks on the detectors, researchers developed a new quantum cryptography protocol known as measurement-device-independent quantum key distribution (MDI-QKD).</p>&#13; &#13; <p>In this method, instead of each having a detector, Alice and Bob send their photons to a central node, referred to as Charlie. Charlie lets the photons pass through a beam splitter and measures them. 探花直播results can disclose the correlation between the bits, but not disclose their values, which remain secret. In this set-up, even if Charlie tries to cheat, the information will remain secure.</p>&#13; &#13; <p>MDI-QKD has been experimentally demonstrated, but the rates at which information can be sent are too slow for real-world application, mostly due to the difficulty in creating indistinguishable particles from different lasers. To make it work, the laser pulses sent through Charlie鈥檚 beam splitter need to be (relatively) long, restricting rates to a few hundred bits per second (bps) or less.</p>&#13; &#13; <p> 探花直播method developed by the Cambridge researchers overcomes the problem by using a technique known as pulsed laser seeding, in which one laser beam injects photons into another. This makes the laser pulses more visible to Charlie by reducing the amount of 鈥榯ime jitter鈥 in the pulses, so that much shorter pulses can be used. Pulsed laser seeding is also able to randomly change the phase of the laser beam at very high rates. 探花直播result of using this technique in a MDI-QKD setup would enable rates as high as 1 megabit per second, representing an improvement of two to six orders of magnitude over previous efforts.</p>&#13; &#13; <p>鈥淭his protocol gives us the highest possible degree of security at very high clock rates,鈥 said Comandar. 鈥淚t could point the way to a practical implementation of quantum cryptography.鈥</p>&#13; &#13; <p><strong><em>Reference:</em></strong><br /><em>L.C. Comandar et al. 鈥<a href="https://dx.doi.org/10.1038/nphoton.2016.50" target="_blank">Quantum key distribution without detector vulnerabilities using optically seeded lasers</a>.鈥 Nature Photonics (2016). DOI: 10.1038/nphoton.2016.50</em></p>&#13; </div></div></div><div class="field field-name-field-content-summary field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><p>A new method of implementing an 鈥榰nbreakable鈥 quantum cryptographic system is able to transmit information at rates more than ten times faster than previous attempts.</p>&#13; </p></div></div></div><div class="field field-name-field-content-quote field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even">This protocol gives us the highest possible degree of security at very high clock rates</div></div></div><div class="field field-name-field-content-quote-name field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Lucian Comandar</div></div></div><div class="field field-name-field-image-credit field-type-link-field field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/" target="_blank">Lucian Comandar</a></div></div></div><div class="field field-name-field-image-desctiprion field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Depiction of indistinguishable photons leaving through the same output port of a beam splitter</div></div></div><div class="field field-name-field-cc-attribute-text field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://creativecommons.org/licenses/by/4.0/" rel="license"><img alt="Creative Commons License" src="https://i.creativecommons.org/l/by/4.0/88x31.png" style="border-width:0" /></a><br />&#13; 探花直播text in this work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/" rel="license">Creative Commons Attribution 4.0 International License</a>. For image use please see separate credits above.</p>&#13; </div></div></div><div class="field field-name-field-show-cc-text field-type-list-boolean field-label-hidden"><div class="field-items"><div class="field-item even">Yes</div></div></div> Mon, 04 Apr 2016 15:06:38 +0000 sc604 170652 at