Feeds

Spooky action at a distance is faster than light

Chinese boffins put the clock on information transfer between entangled particles

High performance access to file storage

As Einstein put it, it's impossible for anything – even information – to move faster than the speed of light. Yet the lower bound of that impossibility, the minimum speed at which entanglement can't possibly be transmitting information between two particles, appears to be around four orders of magnitude higher than c, the speed of light in a vacuum.

When describing his objections to quantum physics, one of Einstein's thought experiments was to consider the creation of a pair of entangled particles, which would retain the property of entanglement no matter how great the distance that might later separate them: the state of each entangled particle would somehow affect the other, no matter how great the distance separating them.

As far as Einsten was concerned, that was a no-no, since keeping entanglement intact demanded information transfer take place at greater than the speed of light – a violation of the general relativity.

So: since we know that entanglement exists (it's been observed and is the basis of so-called "quantum teleportation"), it's perfectly reasonable to ask at what rate the information transfer is violating general relativity?

According to this paper at Arxiv, once Earth's inertial frame of reference is taken into account, the lower bound of the speed of “spooky action” is 1.38 x 104 the speed of light in a vacuum.

The researchers say that to guarantee that what they were measuring was truly the result of entanglement – and not, for example, the outcome of coincidence – they needed to set at least one record, and observe a continuous violation of Bell's inequality for 12 hours.

Experimental setup for measuring the speed of spooky action

Source: University of Science and Technology of China

Since there needs to be enough separation between the two entangled photons as to enable a valid measurement of how long the entangled behaviour seems to pass from one particle to another, they also needed sufficient separation between the two ends of the experiment.

The researchers, from the Department of Modern Physics at the University of Science and Technology, China in Shanghai, separated their “Bob and Alice” photon detectors by 16 Km in the Qinghai Lake province: one device was placed at a scenic lookout, the other at a fish farm. Between the two is the photon source and its associated equipment.

To keep the experiment operation for 12 hours, the researchers say they created a tracking system ensuring that the signals weren't lost, and conducted the experiment at night-time so they didn't have to cope with daylight. ®

High performance access to file storage

More from The Register

next story
IBM Hursley Park: Where Big Blue buries the past, polishes family jewels
How the internet of things has deep roots in the English countryside
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Honeybee boffin STINGS OWN WEDDING TACKLE... for SCIENCE
Not the worst place to be stung, says one man
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.