Commentary | Published:

Best of both worlds

Nature Physics volume 13, pages 34 (2017) | Download Citation

Secure communication is emerging as a significant challenge for our hyper-connected data-dependent society. The answer may lie in a clever combination of quantum and classical cryptographic techniques.

Access optionsAccess options

Rent or Buy article

Get time limited or full article access on ReadCube.

from$8.99

All prices are NET prices.

References

  1. 1.

    , & Commun. ACM 21, 120–126 (1978).

  2. 2.

    et al. Report on Post-Quantum Cryptography (NIST, US Department of Commerce, 2016);

  3. 3.

    , , & In Advances in Cryptology – CRYPTO 2016 207–237 (Springer, 2016).

  4. 4.

    & Design. Code. Cryptogr. 78, 351–382 (2016).

  5. 5.

    , & In Proc. 50th Annual IEEE Symp. on Foundations of Computer Science, 517–526 (IEEE, 2009).

  6. 6.

    , , & Nat. Phys. 9, 727–731 (2013).

  7. 7.

    Quant. Inf. Comp. 14, 1338–1371 (2014).

  8. 8.

    , & In Proc. 56th Annual IEEE Symp. on Foundations of Computer Science 810–824 (IEEE, 2015).

  9. 9.

    , , & IEEE Trans. Inf. Theory 58, 1962–1984 (2012).

  10. 10.

    et al. Nat. Commun. 2, 561 (2011).

  11. 11.

    et al. Nat. Commun. 5, 3717 (2014).

  12. 12.

    & Preprint at (2001).

  13. 13.

    et al. Phys. Rev. A 93, 012329 (2016).

  14. 14.

    , & In Advances in Cryptology – CRYPTO 2013 344–360 (Springer, 2013).

  15. 15.

    , & In Advances in Cryptology – CRYPTO 2012 794–811 (Springer, 2012).

  16. 16.

    , & In Advances in Cryptology – CRYPTO 2016 3–32 (Springer, 2016).

  17. 17.

    , , , & In Proc. 47th Annual IEEE Symp. on Foundations of Computer Science 249–260 (2006).

  18. 18.

    et al. Nat. Commun. 5, 5480 (2014).

  19. 19.

    & Phys. Rev. Lett. 102, 050502 (2009).

  20. 20.

    , & Quant. Inf. Comput. 16, 61–86 (2016).

  21. 21.

    & Phys. Rev. A 81, 062336 (2010).

  22. 22.

    , & In Advances in Cryptology – CRYPTO 2011 411–428 (Springer, 2011).

  23. 23.

    In Advances in Cryptology – CRYPTO 2013 380–397 (2013).

  24. 24.

    , , & SIAM J. Comput. 37, 1865–1890 (2008).

  25. 25.

    , & Phys. Rev. Lett. 100, 220502 (2008).

  26. 26.

    Phys. Rev. Lett. 83, 1447–1450 (1999).

  27. 27.

    , & Phys. Rev. Lett. 115, 205501 (2015).

Download references

Author information

Affiliations

  1. Eleni Diamanti and Elham Kashefi are at CNRS, Université Pierre et Marie Curie, 75005 Paris, France

    • Eleni Diamanti
    •  & Elham Kashefi
  2. E.K. is also at the University of Edinburgh, Edinburgh EH8 9AB, UK

    • Elham Kashefi

Authors

  1. Search for Eleni Diamanti in:

  2. Search for Elham Kashefi in:

Corresponding authors

Correspondence to Eleni Diamanti or Elham Kashefi.

About this article

Publication history

Published

DOI

https://doi.org/10.1038/nphys3972

Further reading

  • 1.

    Tackling Africa’s digital divide

    • Martin P. J. Lavery
    • , Mojtaba Mansour Abadi
    • , Ralf Bauer
    • , Gilberto Brambilla
    • , Ling Cheng
    • , Mitchell A. Cox
    • , Angela Dudley
    • , Andrew D. Ellis
    • , Nicolas K. Fontaine
    • , Anthony E. Kelly
    • , Christoph Marquardt
    • , Selaelo Matlhane
    • , Bienvenu Ndagano
    • , Francesco Petruccione
    • , Radan Slavík
    • , Filippo Romanato
    • , Carmelo Rosales-Guzmán
    • , Filippus S. Roux
    • , Kobus Roux
    • , Jian Wang
    •  & Andrew Forbes

    Nature Photonics (2018)

Newsletter Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing