SlideShare a Scribd company logo
Quantum Entanglement:
Cryptography and Communication
(for information only)
Chih-Yun Lo cylo112@iii.org.tw, grimmg@ee.tku.edu.tw
Yi-Hsueh Tsai lucas@iii.org.tw
3GPP TSG-SA WG1 Meeting #71 ad hoc on SMARTER (5G) S1-153007
Vancouver, Canada, 19 – 21, October, 2015
Agenda Item: 3.6 Other contributions to 22.891
Source: Institute for Information Industry (III)
1
Outline
1. Introduction
2. Quantum Entanglement
3. Quantum Cryptography - Quantum Key Distribution
4. Physical Limit for E2E Time Delay - Speed of Light
5. Shorten E2E Delay - Faster-Than-Light Communication
6. Conclusions
2
Introduction
• Quantum entanglement is a quantum mechanical phenomenon in
which the quantum states of two or more objects have to be described
with reference to each other, even though the individual objects may be
spatially separated.
• This leads to correlations between observable physical properties of the
systems. It is possible to prepare two particles in a single quantum
state such that when one is observed to be spin-up, the other one will
always be observed to be spin-down and vice versa, this despite the
fact that it is impossible to predict, according to quantum mechanics,
which set of measurements will be observed.
• As a result, measurements performed on one system seem to be
instantaneously influencing other systems entangled with it.
3Source: http://www.sciencedaily.com/terms/quantum_entanglement.htm
Quantum Entanglement
• Quantum entanglement has applications in the emerging
technologies of quantum computing and quantum
cryptography, and has been used to realize quantum
teleportation experimentally.
• At the same time, it prompts some of the more philosophically
oriented discussions concerning quantum theory.
• The correlations predicted by quantum mechanics, and
observed in experiment, reject the principle of local realism,
which is that information about the state of a system should
only be mediated by interactions in its immediate surroundings.
4Source: http://www.sciencedaily.com/terms/quantum_entanglement.htm
Quantum Cryptography - Quantum Key Distribution
The principle of operation of a Quantum Key Distribution (QKD) system:
 Two stations (Alice and Bob) are linked together with a quantum channel and a classical channel.
 Alice generates a random stream of qubits (quantum bits) that are sent over the quantum channel.
 Upon reception of the stream Bob and Alice — using the classical channel — perform classical
operations to check if an eavesdropper has tried to extract information on the qubits stream.
5
 The presence of an eavesdropper is revealed by the
imperfect correlation between the two lists of bits
obtained after the transmission of qubits between the
emitter and the receiver.
 If the correlation is high enough, a perfectly secure
symmetric key can be created from these two lists of
bits.
 In the opposite case, when an eavesdropper Eve has
listened in on the quantum channel, the key
generation process has to be aborted and started again.
Source: http://quantumrepeaters.eu/index.php/qcomm/industry
Physical Limit for E2E Time Delay - Speed of Light
The propagation delay is limited by physics,
i.e. the speed of light (299 792 458 meters per
second) in air and 2/3 of the speed of light in
fiber connection. With these limits, 1ms one
way transmission latency can be mapped to
300 km air propagation or 200 km for fiber
based transmission as shown in left Figure.
6
A.3 Conclusions
1. Local Communication:
 E2E time delay can not be less than 1ms.
2. Remote Communication:
 E2E time delay can not be less than 10ms. Source: 3GPP TR 22.891 v.1.0.0
Shorten E2E Delay - FTL Communication
In order to shorten E2E delay, technology regarding Faster-
Than-Light (FTL) communication is required.
– FTL communication refer to the propagation of information
faster than the speed of light.
– Quantum entanglement might give the superficial
impression of allowing communication of information faster
than light.
– In fact, it does not enable the transmission of classical
information faster than the speed of light.
7Source: http://math.ucr.edu/home/baez/physics/Relativity/SpeedOfLight/FTL.html
Conclusions
1. To improve communication security, quantum cryptography
could be considered.
2. To shorten E2E delay, technology regarding Faster-Than-
Light (FTL) communication is required.
Need a Nobel Prizes Winner in Physics!
8
9

More Related Content

What's hot

Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Samrand Hassan
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglement
pixiejen
 
Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?
Stefano Franco
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
Fenny Thakrar
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Arslaan Shamim
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Samira Riki
 
Quantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic ConceptsQuantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic Concepts
Melanie Swan
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Komal Gupta
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
Kumar Abhijeet
 
Quantum entanglement
Quantum entanglementQuantum entanglement
Quantum entanglementAKM666
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Deepankar Sandhibigraha
 
quantum computing
quantum computingquantum computing
quantum computing
ManishKumarMajumdar1
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
dharmsinghggu
 
Ion trap quantum computation
Ion trap quantum computationIon trap quantum computation
Ion trap quantum computation
Gabriel O'Brien
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
Shahrikh Khan
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
Prasanna Venkatesan
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
inside-BigData.com
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Elias Saadeh
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Swasat Dutta
 
Quantum computing
Quantum computingQuantum computing

What's hot (20)

Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglement
 
Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic ConceptsQuantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic Concepts
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum entanglement
Quantum entanglementQuantum entanglement
Quantum entanglement
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
quantum computing
quantum computingquantum computing
quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Ion trap quantum computation
Ion trap quantum computationIon trap quantum computation
Ion trap quantum computation
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 

Viewers also liked

Reward week 1 bus681
Reward week 1   bus681Reward week 1   bus681
Reward week 1 bus681
E Alden
 
Hybrid cloud iaa-s_office-365-azure_sharepoint-konferenz-wien-2013_ankbs_mich...
Hybrid cloud iaa-s_office-365-azure_sharepoint-konferenz-wien-2013_ankbs_mich...Hybrid cloud iaa-s_office-365-azure_sharepoint-konferenz-wien-2013_ankbs_mich...
Hybrid cloud iaa-s_office-365-azure_sharepoint-konferenz-wien-2013_ankbs_mich...Michael Kirst-Neshva
 
Merkel double wiper_pt-1
Merkel double wiper_pt-1Merkel double wiper_pt-1
Merkel double wiper_pt-1
walleseals
 
Summary of first term
Summary of first termSummary of first term
Summary of first termanaiktak
 
Ethompson unit 30 lo1 powerpoint
Ethompson unit 30   lo1 powerpointEthompson unit 30   lo1 powerpoint
Ethompson unit 30 lo1 powerpoint
Nick Crafts
 
The Fear of Running out of Money
The Fear of Running out of MoneyThe Fear of Running out of Money
The Fear of Running out of Money
wmgna
 
Qewe
QeweQewe
Difrentiation
DifrentiationDifrentiation
Difrentiationlecturer
 
Ignition toyota igt
Ignition toyota igtIgnition toyota igt
Ignition toyota igtToni Gim
 
Kite introduction
Kite introductionKite introduction
Kite introduction
kitehitech
 
Happy Paths: UX Tested, Unicorn Approved -- Katie Swindler
Happy Paths: UX Tested, Unicorn Approved -- Katie SwindlerHappy Paths: UX Tested, Unicorn Approved -- Katie Swindler
Happy Paths: UX Tested, Unicorn Approved -- Katie Swindler
WIADchicago
 
Unit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPTUnit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPT
Jenny Hubbard
 
Baby & Kids Volume 3 - Vector Graphic Artworks
Baby & Kids Volume 3 - Vector Graphic ArtworksBaby & Kids Volume 3 - Vector Graphic Artworks
Baby & Kids Volume 3 - Vector Graphic Artworks
TZipp
 
스타토토⊙o⊙Wifi89,cOm(카톡: XaZa⊙o⊙ 실시간토토 실 시간배팅
스타토토⊙o⊙Wifi89,cOm(카톡: XaZa⊙o⊙  실시간토토  실  시간배팅스타토토⊙o⊙Wifi89,cOm(카톡: XaZa⊙o⊙  실시간토토  실  시간배팅
스타토토⊙o⊙Wifi89,cOm(카톡: XaZa⊙o⊙ 실시간토토 실 시간배팅
fdghjhj
 
Student Facilitator Presentation
Student Facilitator PresentationStudent Facilitator Presentation
Student Facilitator Presentation
Zoe Christo
 
Kessan 1708682945115077
Kessan 1708682945115077Kessan 1708682945115077
Kessan 1708682945115077yoshikawa0521
 

Viewers also liked (20)

Reward week 1 bus681
Reward week 1   bus681Reward week 1   bus681
Reward week 1 bus681
 
Hybrid cloud iaa-s_office-365-azure_sharepoint-konferenz-wien-2013_ankbs_mich...
Hybrid cloud iaa-s_office-365-azure_sharepoint-konferenz-wien-2013_ankbs_mich...Hybrid cloud iaa-s_office-365-azure_sharepoint-konferenz-wien-2013_ankbs_mich...
Hybrid cloud iaa-s_office-365-azure_sharepoint-konferenz-wien-2013_ankbs_mich...
 
Merkel double wiper_pt-1
Merkel double wiper_pt-1Merkel double wiper_pt-1
Merkel double wiper_pt-1
 
D11jl
D11jlD11jl
D11jl
 
Summary of first term
Summary of first termSummary of first term
Summary of first term
 
Ethompson unit 30 lo1 powerpoint
Ethompson unit 30   lo1 powerpointEthompson unit 30   lo1 powerpoint
Ethompson unit 30 lo1 powerpoint
 
The Fear of Running out of Money
The Fear of Running out of MoneyThe Fear of Running out of Money
The Fear of Running out of Money
 
Qewe
QeweQewe
Qewe
 
Difrentiation
DifrentiationDifrentiation
Difrentiation
 
Ignition toyota igt
Ignition toyota igtIgnition toyota igt
Ignition toyota igt
 
Hap7 18 a
Hap7 18 aHap7 18 a
Hap7 18 a
 
Kite introduction
Kite introductionKite introduction
Kite introduction
 
Happy Paths: UX Tested, Unicorn Approved -- Katie Swindler
Happy Paths: UX Tested, Unicorn Approved -- Katie SwindlerHappy Paths: UX Tested, Unicorn Approved -- Katie Swindler
Happy Paths: UX Tested, Unicorn Approved -- Katie Swindler
 
Unit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPTUnit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPT
 
Baby & Kids Volume 3 - Vector Graphic Artworks
Baby & Kids Volume 3 - Vector Graphic ArtworksBaby & Kids Volume 3 - Vector Graphic Artworks
Baby & Kids Volume 3 - Vector Graphic Artworks
 
Rescue1.asd
Rescue1.asdRescue1.asd
Rescue1.asd
 
스타토토⊙o⊙Wifi89,cOm(카톡: XaZa⊙o⊙ 실시간토토 실 시간배팅
스타토토⊙o⊙Wifi89,cOm(카톡: XaZa⊙o⊙  실시간토토  실  시간배팅스타토토⊙o⊙Wifi89,cOm(카톡: XaZa⊙o⊙  실시간토토  실  시간배팅
스타토토⊙o⊙Wifi89,cOm(카톡: XaZa⊙o⊙ 실시간토토 실 시간배팅
 
Student Facilitator Presentation
Student Facilitator PresentationStudent Facilitator Presentation
Student Facilitator Presentation
 
Kessan 1708682945115077
Kessan 1708682945115077Kessan 1708682945115077
Kessan 1708682945115077
 
DGAE
DGAEDGAE
DGAE
 

Similar to Quantum Entanglement - Cryptography and Communication

32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
Alexander Decker
 
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfQuantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
KienBuiXuan3
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
Ahmed Banafa
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
ijcisjournal
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
IJCNCJournal
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
ijwmn
 
Multimedia traffic routing in multilayer wdm networks
Multimedia traffic routing in multilayer wdm networksMultimedia traffic routing in multilayer wdm networks
Multimedia traffic routing in multilayer wdm networks
Alexander Decker
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
journal ijrtem
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
IJRTEMJOURNAL
 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
International Journal of Engineering Inventions www.ijeijournal.com
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
IJRAT
 
Collision tolerant and collision free packet scheduling for underwater acoust...
Collision tolerant and collision free packet scheduling for underwater acoust...Collision tolerant and collision free packet scheduling for underwater acoust...
Collision tolerant and collision free packet scheduling for underwater acoust...
Pvrtechnologies Nellore
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
IOSR Journals
 
GPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksGPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic Networks
CSCJournals
 
Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoust...
Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoust...Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoust...
Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoust...
1crore projects
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
ijujournal
 
Plasmonics-A New Device Technology
Plasmonics-A New Device TechnologyPlasmonics-A New Device Technology
Plasmonics-A New Device Technology
ijsrd.com
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
Polytechnique Montreal
 

Similar to Quantum Entanglement - Cryptography and Communication (20)

32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfQuantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
 
Multimedia traffic routing in multilayer wdm networks
Multimedia traffic routing in multilayer wdm networksMultimedia traffic routing in multilayer wdm networks
Multimedia traffic routing in multilayer wdm networks
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
Collision tolerant and collision free packet scheduling for underwater acoust...
Collision tolerant and collision free packet scheduling for underwater acoust...Collision tolerant and collision free packet scheduling for underwater acoust...
Collision tolerant and collision free packet scheduling for underwater acoust...
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
GPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksGPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic Networks
 
Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoust...
Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoust...Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoust...
Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoust...
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Plasmonics-A New Device Technology
Plasmonics-A New Device TechnologyPlasmonics-A New Device Technology
Plasmonics-A New Device Technology
 
MAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio NetworksMAC Protocol for Cognitive Radio Networks
MAC Protocol for Cognitive Radio Networks
 

More from Yi-Hsueh Tsai

5G Sandardization
5G Sandardization5G Sandardization
5G Sandardization
Yi-Hsueh Tsai
 
S1 154010 Summary of CEPT Report 52 regarding BDA2GC
S1 154010 Summary of CEPT Report 52 regarding BDA2GCS1 154010 Summary of CEPT Report 52 regarding BDA2GC
S1 154010 Summary of CEPT Report 52 regarding BDA2GC
Yi-Hsueh Tsai
 
LTE Release 13 and SMARTER – Road Towards 5G
LTE Release 13 and SMARTER – Road Towards 5GLTE Release 13 and SMARTER – Road Towards 5G
LTE Release 13 and SMARTER – Road Towards 5G
Yi-Hsueh Tsai
 
S1-153199 Use Case and Requirements for DA2GC
S1-153199 Use Case and Requirements for DA2GCS1-153199 Use Case and Requirements for DA2GC
S1-153199 Use Case and Requirements for DA2GC
Yi-Hsueh Tsai
 
Use Case and Requirements for Broadband Direct Air to Ground Communications (...
Use Case and Requirements for Broadband Direct Air to Ground Communications (...Use Case and Requirements for Broadband Direct Air to Ground Communications (...
Use Case and Requirements for Broadband Direct Air to Ground Communications (...
Yi-Hsueh Tsai
 
Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)
Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)
Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)
Yi-Hsueh Tsai
 
SMARTER Building Block: enhanced Mobile BroadBand (eMBB)
SMARTER Building Block: enhanced Mobile BroadBand (eMBB)SMARTER Building Block: enhanced Mobile BroadBand (eMBB)
SMARTER Building Block: enhanced Mobile BroadBand (eMBB)
Yi-Hsueh Tsai
 
Use Cases and Requirements for Isolated EUTRAN Operation
Use Cases and Requirements for Isolated EUTRAN OperationUse Cases and Requirements for Isolated EUTRAN Operation
Use Cases and Requirements for Isolated EUTRAN Operation
Yi-Hsueh Tsai
 
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
Yi-Hsueh Tsai
 
3GPP TR 22.885 study on LTE support for V2X services
3GPP TR 22.885 study on LTE support for V2X services3GPP TR 22.885 study on LTE support for V2X services
3GPP TR 22.885 study on LTE support for V2X services
Yi-Hsueh Tsai
 
Enhanced ue assisted positioning use case (s1-151008)
Enhanced ue assisted positioning use case (s1-151008)Enhanced ue assisted positioning use case (s1-151008)
Enhanced ue assisted positioning use case (s1-151008)
Yi-Hsueh Tsai
 
Public safety ue assisted positioning use case (s1-151007)
Public safety ue assisted positioning use case (s1-151007)Public safety ue assisted positioning use case (s1-151007)
Public safety ue assisted positioning use case (s1-151007)Yi-Hsueh Tsai
 
Public safety ue assisted positioning use case (s1-151007)
Public safety ue assisted positioning use case (s1-151007)Public safety ue assisted positioning use case (s1-151007)
Public safety ue assisted positioning use case (s1-151007)
Yi-Hsueh Tsai
 
Indoor positioning based on enhanced utdoa (R1-150419)
Indoor positioning based on enhanced utdoa (R1-150419)Indoor positioning based on enhanced utdoa (R1-150419)
Indoor positioning based on enhanced utdoa (R1-150419)
Yi-Hsueh Tsai
 
Automotive Use Cases for LTE-based V2X Study Item
Automotive Use Cases for LTE-based V2X Study ItemAutomotive Use Cases for LTE-based V2X Study Item
Automotive Use Cases for LTE-based V2X Study Item
Yi-Hsueh Tsai
 
Study on LTE support for V2X services
Study on LTE support for V2X servicesStudy on LTE support for V2X services
Study on LTE support for V2X services
Yi-Hsueh Tsai
 
Treaty of San Francisco
Treaty of San FranciscoTreaty of San Francisco
Treaty of San Francisco
Yi-Hsueh Tsai
 
V2X Communication in 3GPP (S1-144374)
V2X Communication in 3GPP (S1-144374)V2X Communication in 3GPP (S1-144374)
V2X Communication in 3GPP (S1-144374)
Yi-Hsueh Tsai
 
LTE direct in unlicensed spectrum
LTE direct in unlicensed spectrumLTE direct in unlicensed spectrum
LTE direct in unlicensed spectrum
Yi-Hsueh Tsai
 
STR Radios and STR Media Access
STR Radios and STR Media AccessSTR Radios and STR Media Access
STR Radios and STR Media Access
Yi-Hsueh Tsai
 

More from Yi-Hsueh Tsai (20)

5G Sandardization
5G Sandardization5G Sandardization
5G Sandardization
 
S1 154010 Summary of CEPT Report 52 regarding BDA2GC
S1 154010 Summary of CEPT Report 52 regarding BDA2GCS1 154010 Summary of CEPT Report 52 regarding BDA2GC
S1 154010 Summary of CEPT Report 52 regarding BDA2GC
 
LTE Release 13 and SMARTER – Road Towards 5G
LTE Release 13 and SMARTER – Road Towards 5GLTE Release 13 and SMARTER – Road Towards 5G
LTE Release 13 and SMARTER – Road Towards 5G
 
S1-153199 Use Case and Requirements for DA2GC
S1-153199 Use Case and Requirements for DA2GCS1-153199 Use Case and Requirements for DA2GC
S1-153199 Use Case and Requirements for DA2GC
 
Use Case and Requirements for Broadband Direct Air to Ground Communications (...
Use Case and Requirements for Broadband Direct Air to Ground Communications (...Use Case and Requirements for Broadband Direct Air to Ground Communications (...
Use Case and Requirements for Broadband Direct Air to Ground Communications (...
 
Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)
Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)
Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)
 
SMARTER Building Block: enhanced Mobile BroadBand (eMBB)
SMARTER Building Block: enhanced Mobile BroadBand (eMBB)SMARTER Building Block: enhanced Mobile BroadBand (eMBB)
SMARTER Building Block: enhanced Mobile BroadBand (eMBB)
 
Use Cases and Requirements for Isolated EUTRAN Operation
Use Cases and Requirements for Isolated EUTRAN OperationUse Cases and Requirements for Isolated EUTRAN Operation
Use Cases and Requirements for Isolated EUTRAN Operation
 
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...
 
3GPP TR 22.885 study on LTE support for V2X services
3GPP TR 22.885 study on LTE support for V2X services3GPP TR 22.885 study on LTE support for V2X services
3GPP TR 22.885 study on LTE support for V2X services
 
Enhanced ue assisted positioning use case (s1-151008)
Enhanced ue assisted positioning use case (s1-151008)Enhanced ue assisted positioning use case (s1-151008)
Enhanced ue assisted positioning use case (s1-151008)
 
Public safety ue assisted positioning use case (s1-151007)
Public safety ue assisted positioning use case (s1-151007)Public safety ue assisted positioning use case (s1-151007)
Public safety ue assisted positioning use case (s1-151007)
 
Public safety ue assisted positioning use case (s1-151007)
Public safety ue assisted positioning use case (s1-151007)Public safety ue assisted positioning use case (s1-151007)
Public safety ue assisted positioning use case (s1-151007)
 
Indoor positioning based on enhanced utdoa (R1-150419)
Indoor positioning based on enhanced utdoa (R1-150419)Indoor positioning based on enhanced utdoa (R1-150419)
Indoor positioning based on enhanced utdoa (R1-150419)
 
Automotive Use Cases for LTE-based V2X Study Item
Automotive Use Cases for LTE-based V2X Study ItemAutomotive Use Cases for LTE-based V2X Study Item
Automotive Use Cases for LTE-based V2X Study Item
 
Study on LTE support for V2X services
Study on LTE support for V2X servicesStudy on LTE support for V2X services
Study on LTE support for V2X services
 
Treaty of San Francisco
Treaty of San FranciscoTreaty of San Francisco
Treaty of San Francisco
 
V2X Communication in 3GPP (S1-144374)
V2X Communication in 3GPP (S1-144374)V2X Communication in 3GPP (S1-144374)
V2X Communication in 3GPP (S1-144374)
 
LTE direct in unlicensed spectrum
LTE direct in unlicensed spectrumLTE direct in unlicensed spectrum
LTE direct in unlicensed spectrum
 
STR Radios and STR Media Access
STR Radios and STR Media AccessSTR Radios and STR Media Access
STR Radios and STR Media Access
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Quantum Entanglement - Cryptography and Communication

  • 1. Quantum Entanglement: Cryptography and Communication (for information only) Chih-Yun Lo cylo112@iii.org.tw, grimmg@ee.tku.edu.tw Yi-Hsueh Tsai lucas@iii.org.tw 3GPP TSG-SA WG1 Meeting #71 ad hoc on SMARTER (5G) S1-153007 Vancouver, Canada, 19 – 21, October, 2015 Agenda Item: 3.6 Other contributions to 22.891 Source: Institute for Information Industry (III) 1
  • 2. Outline 1. Introduction 2. Quantum Entanglement 3. Quantum Cryptography - Quantum Key Distribution 4. Physical Limit for E2E Time Delay - Speed of Light 5. Shorten E2E Delay - Faster-Than-Light Communication 6. Conclusions 2
  • 3. Introduction • Quantum entanglement is a quantum mechanical phenomenon in which the quantum states of two or more objects have to be described with reference to each other, even though the individual objects may be spatially separated. • This leads to correlations between observable physical properties of the systems. It is possible to prepare two particles in a single quantum state such that when one is observed to be spin-up, the other one will always be observed to be spin-down and vice versa, this despite the fact that it is impossible to predict, according to quantum mechanics, which set of measurements will be observed. • As a result, measurements performed on one system seem to be instantaneously influencing other systems entangled with it. 3Source: http://www.sciencedaily.com/terms/quantum_entanglement.htm
  • 4. Quantum Entanglement • Quantum entanglement has applications in the emerging technologies of quantum computing and quantum cryptography, and has been used to realize quantum teleportation experimentally. • At the same time, it prompts some of the more philosophically oriented discussions concerning quantum theory. • The correlations predicted by quantum mechanics, and observed in experiment, reject the principle of local realism, which is that information about the state of a system should only be mediated by interactions in its immediate surroundings. 4Source: http://www.sciencedaily.com/terms/quantum_entanglement.htm
  • 5. Quantum Cryptography - Quantum Key Distribution The principle of operation of a Quantum Key Distribution (QKD) system:  Two stations (Alice and Bob) are linked together with a quantum channel and a classical channel.  Alice generates a random stream of qubits (quantum bits) that are sent over the quantum channel.  Upon reception of the stream Bob and Alice — using the classical channel — perform classical operations to check if an eavesdropper has tried to extract information on the qubits stream. 5  The presence of an eavesdropper is revealed by the imperfect correlation between the two lists of bits obtained after the transmission of qubits between the emitter and the receiver.  If the correlation is high enough, a perfectly secure symmetric key can be created from these two lists of bits.  In the opposite case, when an eavesdropper Eve has listened in on the quantum channel, the key generation process has to be aborted and started again. Source: http://quantumrepeaters.eu/index.php/qcomm/industry
  • 6. Physical Limit for E2E Time Delay - Speed of Light The propagation delay is limited by physics, i.e. the speed of light (299 792 458 meters per second) in air and 2/3 of the speed of light in fiber connection. With these limits, 1ms one way transmission latency can be mapped to 300 km air propagation or 200 km for fiber based transmission as shown in left Figure. 6 A.3 Conclusions 1. Local Communication:  E2E time delay can not be less than 1ms. 2. Remote Communication:  E2E time delay can not be less than 10ms. Source: 3GPP TR 22.891 v.1.0.0
  • 7. Shorten E2E Delay - FTL Communication In order to shorten E2E delay, technology regarding Faster- Than-Light (FTL) communication is required. – FTL communication refer to the propagation of information faster than the speed of light. – Quantum entanglement might give the superficial impression of allowing communication of information faster than light. – In fact, it does not enable the transmission of classical information faster than the speed of light. 7Source: http://math.ucr.edu/home/baez/physics/Relativity/SpeedOfLight/FTL.html
  • 8. Conclusions 1. To improve communication security, quantum cryptography could be considered. 2. To shorten E2E delay, technology regarding Faster-Than- Light (FTL) communication is required. Need a Nobel Prizes Winner in Physics! 8
  • 9. 9