Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • News & Views
  • Published:

Quantum cryptography

Know your enemy

Quantum cryptographic schemes ensure security by sacrificing data to detect tampering. Now, an approach shows that monitoring disturbance is not essential because the limit on leaked information can be known in advance.

This is a preview of subscription content, access via your institution

Access options

Buy this article

Prices may be subject to local taxes which are calculated during checkout

Figure 1: Schematic representation of symmetric-key cryptography.

References

  1. Bennett, C. H. & Brassard, G. in Proc. IEEE Int. Conf. Comp. Syst. Signal Process. 175–179 (IEEE, 1984).

    Google Scholar 

  2. Heisenberg, W. Z. Phys. 43, 172–198 (1927).

    Article  ADS  Google Scholar 

  3. Sasaki T., Yamamoto Y. & Koashi, M. Nature 509, 475–478 (2014).

    Article  ADS  Google Scholar 

  4. Koashi, M. New J. Phys. 11, 045018 (2009).

    Article  ADS  MathSciNet  Google Scholar 

  5. Brassard, G., Lütkenhaus, N., Mor, T. & Sanders, B. C. Phys. Rev. Lett. 85, 1330–1333 (2000).

    Article  ADS  Google Scholar 

  6. Hwang, W.-Y. Phys. Rev. Lett. 91, 057901 (2003).

    Article  ADS  Google Scholar 

  7. Lo, H.-K., Ma, X. & Chen, K. Phys. Rev. Lett. 94, 230504 (2005).

    Article  ADS  Google Scholar 

  8. Wang, X.-B. Phys. Rev. Lett. 94, 230503 (2005).

    Article  ADS  Google Scholar 

  9. Lim, C. C. W., Curty, M., Walenta, N., Xu, F. & Zbinden, H. Phys. Rev. A 89, 022307 (2014).

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcos Curty.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Curty, M. Know your enemy. Nature Phys 10, 479–480 (2014). https://doi.org/10.1038/nphys3002

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1038/nphys3002

Search

Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing