Skip to main content

Thank you for visiting You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Quantum cryptography

Code-breakers confounded

Coherent-state quantum cryptography holds the promise of efficient, secure communication. An experimental demonstration shows that a secure key to the code can be exchanged, even if there is a large transmission loss.

This is a preview of subscription content

Access options

Buy article

Get time limited or full article access on ReadCube.


All prices are NET prices.


  1. Grosshans, F. et al. Nature 421, 238–241 (2003).

    ADS  CAS  Article  Google Scholar 

  2. Bennett, C. & Brassard, G. in Proc. IEEE Conf. Computers, Systems and Signal Processing 175–179 (IEEE, New York, 1984).

    Google Scholar 

  3. Wooters, W. K. & Zurek, W. H. Nature 299, 802–803 (1982).

    ADS  Article  Google Scholar 

  4. Cerf, N. J., Ipe, A. & Rottenberg, X. Phys. Rev. Lett. 85, 1754–1757 (2000).

    ADS  CAS  Article  Google Scholar 

  5. Braunstein, S. L. & Pati, A. K. Quantum Information Theory with Continuous Variables (Kluwer, Dordrecht, in the press).

  6. Furusawa, A. et al. Science 282, 706–709 (1998).

    ADS  CAS  Article  Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Mark Hillery.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Hillery, M. Code-breakers confounded. Nature 421, 224–225 (2003).

Download citation

  • Issue Date:

  • DOI:


Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing