Quantum cryptographic schemes ensure security by sacrificing data to detect tampering. Now, an approach shows that monitoring disturbance is not essential because the limit on leaked information can be known in advance.
This is a preview of subscription content, access via your institution
Access options
Subscribe to this journal
Receive 12 print issues and online access
$209.00 per year
only $17.42 per issue
Buy this article
- Purchase on Springer Link
- Instant access to full article PDF
Prices may be subject to local taxes which are calculated during checkout
References
Bennett, C. H. & Brassard, G. in Proc. IEEE Int. Conf. Comp. Syst. Signal Process. 175–179 (IEEE, 1984).
Heisenberg, W. Z. Phys. 43, 172–198 (1927).
Sasaki T., Yamamoto Y. & Koashi, M. Nature 509, 475–478 (2014).
Koashi, M. New J. Phys. 11, 045018 (2009).
Brassard, G., Lütkenhaus, N., Mor, T. & Sanders, B. C. Phys. Rev. Lett. 85, 1330–1333 (2000).
Hwang, W.-Y. Phys. Rev. Lett. 91, 057901 (2003).
Lo, H.-K., Ma, X. & Chen, K. Phys. Rev. Lett. 94, 230504 (2005).
Wang, X.-B. Phys. Rev. Lett. 94, 230503 (2005).
Lim, C. C. W., Curty, M., Walenta, N., Xu, F. & Zbinden, H. Phys. Rev. A 89, 022307 (2014).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Curty, M. Know your enemy. Nature Phys 10, 479–480 (2014). https://doi.org/10.1038/nphys3002
Published:
Issue Date:
DOI: https://doi.org/10.1038/nphys3002