Quantum cryptography has been suggested as a way for two people to communicate in perfect secrecy. Now it has been shown practically that more than one listener can be brought in.
This is a preview of subscription content, access via your institution
Access options
Subscribe to this journal
Receive 51 print issues and online access
$199.00 per year
only $3.90 per issue
Buy this article
- Purchase on Springer Link
- Instant access to full article PDF
Prices may be subject to local taxes which are calculated during checkout
References
Hughes, R. J. et al. Contemp. Phys. 36, 149–163 (1995).
Townsend, P. D. Nature 385, 47–49 (1997).
Bennett, C. H. & Brassard, G. Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, Bangalore 175–179 (IEEE, New York, 1984).
Bennett, C. H. Phys. Rev. Lett. 68, 3121–3124 (1992).
Bennett, C. H. et al. J. Cryptogr. 5, 3–23 (1992).
Ekert, A. K. Phys. Rev. Lett. 67, 661–663 (1991).
Townsend, P. D. Electron. Lett. 30, 809–811 (1994).
Marand, C. & Townsend, P. D. Opt. Lett. 20, 1695–1697 (1995).
Franson, J. D. & lives, H. Appl. Opt. 33, 2949 (1994).
Muller, A., Zbinden, H. & Gisin, N. Nature 378, 449 (1995).
Muller, A. et al. Europhys. Lett. 33, 335 (1996).
Hughes, R. J. et al. Lecture Notes in Computer Science Vol. 1109, 329–342 (Springer, New York, 1996).
Jacobs, B. C. & Franson, J. D. Opt. Lett. 21, 1854–1856 (1996).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Hughes, R. Quantum security is spookily certain. Nature 385, 17–18 (1997). https://doi.org/10.1038/385017a0
Issue Date:
DOI: https://doi.org/10.1038/385017a0