Quantum Internet: Mathematically secure encryption networks

   

Emma Down Under

 

Published on Sep 2, 2020

The process allows two parties to share, without the risk of interception, a secret key used to encrypt and decrypt the information.

But to date this technique has only been effective between two users, rather than a network of multiple users.

For a party of eight users to each send information to each other, for example, each one has to be establishing one-on-one connections with every other user.

One way of avoiding this is to add a third party to each transmission, but having this 'person in the middle' can be a security risk.

Sebastian Neumann at the Austrian Academy of Sciences, one of the experts involved in the project, explains the issue on a blackboard.