Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • News & Views
  • Published:

Fibre Lasers

Keeping cryptographic keys safe

Turning an optical fibre into a giant laser may allow for practical key generation without requiring fragile quantum states.

This is a preview of subscription content, access via your institution

Access options

Rent or buy this article

Prices vary by article type

from$1.95

to$39.95

Prices may be subject to local taxes which are calculated during checkout

Figure 1: Mirrors representing '0' or '1' (Mo or M1; Mr is a reset mirror) are randomly chosen by Alice and Bob.

References

  1. Gisin, N., Ribordy, G., Tittel, W. & Zbinden, H. Rev. Mod. Phys. 74, 145–195 (2002).

    Article  ADS  Google Scholar 

  2. A Quantum Information Science and Technology Roadmap — Part 2: Quantum Cryptography (Quantum Cryptography Technology Experts Panel, July 2004); <http://qist.lanl.gov/pdfs/whole_roadmap.pdf>.

  3. Scheuer, J. & Yariv, A. Phys. Rev. Lett. 97, 140502 (2006).

  4. Hodara, H. et al. Fiber Integ. Opt. 22, 47–61 (2003).

    Article  ADS  Google Scholar 

  5. Kish, L. B. Phys. Lett. A 352, 178–182 (2005).

    Article  ADS  Google Scholar 

  6. Yuen H. P. & Kim, A. M. Phys. Lett. A 241, 135–128 (1998).

    Article  ADS  Google Scholar 

  7. Maurer, U. M. J. Cryptology 5, 53–66 (1992).

    MathSciNet  Google Scholar 

  8. <http://www.idquantique.com>

  9. <http://www.magiqtech.com>

  10. Stinson, D. R. Cryptography: Theory and Practice (CRC, Boca Raton, Florida, 1995).

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kanter, G., Kumar, P. Keeping cryptographic keys safe. Nature Photon 1, 15–16 (2007). https://doi.org/10.1038/nphoton.2006.62

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1038/nphoton.2006.62

Search

Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing