Secure communication is emerging as a significant challenge for our hyper-connected data-dependent society. The answer may lie in a clever combination of quantum and classical cryptographic techniques.
This is a preview of subscription content, access via your institution
Access options
Access Nature and 54 other Nature Portfolio journals
Get Nature+, our best-value online-access subscription
$29.99 / 30 days
cancel any time
Subscribe to this journal
Receive 12 print issues and online access
$209.00 per year
only $17.42 per issue
Rent or buy this article
Get just this article for as long as you need it
$39.95
Prices may be subject to local taxes which are calculated during checkout
References
Rivest, R., Shamir, A. & Adleman, L. Commun. ACM 21, 120–126 (1978).
Chen, L. et al. Report on Post-Quantum Cryptography (NIST, US Department of Commerce, 2016); http://go.nature.com/2gY56xB
Kaplan, M., Leurent, G., Leverrier, A. & Naya-Plasencia, M. In Advances in Cryptology – CRYPTO 2016 207–237 (Springer, 2016).
Broadbent, A. & Schaffner, C. Design. Code. Cryptogr. 78, 351–382 (2016).
Broadbent A., Fitzsimons, J. & Kashefi, E. In Proc. 50th Annual IEEE Symp. on Foundations of Computer Science, 517–526 (IEEE, 2009).
Barz, S., Fitzsimons, J. F., Kashefi, E. & Walther, P. Nat. Phys. 9, 727–731 (2013).
Gottesman, D. Quant. Inf. Comp. 14, 1338–1371 (2014).
Leverrier, A., Tillich, J.-P. & Zémor, G. In Proc. 56th Annual IEEE Symp. on Foundations of Computer Science 810–824 (IEEE, 2015).
Konig, R., Wehner, S., & Wullschleger, J. IEEE Trans. Inf. Theory 58, 1962–1984 (2012).
Berlín, G. et al. Nat. Commun. 2, 561 (2011).
Pappa, A. et al. Nat. Commun. 5, 3717 (2014).
Gottesman, D. & Chuang, I. Preprint at https://arxiv.org/abs/quant-ph/0105032 (2001).
Donaldson, R. J. et al. Phys. Rev. A 93, 012329 (2016).
Broadbent, A., Gutoski, G. & Stebila, D. In Advances in Cryptology – CRYPTO 2013 344–360 (Springer, 2013).
Dupuis, F., Nielsen, J. B. & Salvail, L. In Advances in Cryptology – CRYPTO 2012 794–811 (Springer, 2012).
Dulek, Y., Schaffner, C. & Speelman, F. In Advances in Cryptology – CRYPTO 2016 3–32 (Springer, 2016).
Ben-Or, M., Crépeau, C., Gottesman, D., Hassidim, A. & Smith, A. In Proc. 47th Annual IEEE Symp. on Foundations of Computer Science 249–260 (2006).
Bell, B. A. et al. Nat. Commun. 5, 5480 (2014).
Anders, J. & Browne, D. E. Phys. Rev. Lett. 102, 050502 (2009).
Dunjko, V., Kapourniotis, T. & Kashefi, E. Quant. Inf. Comput. 16, 61–86 (2016).
Loukopoulos, K. & Browne, D. E. Phys. Rev. A 81, 062336 (2010).
Hallgren, S., Smith, A. & Song, F. In Advances in Cryptology – CRYPTO 2011 411–428 (Springer, 2011).
Unruh, D. In Advances in Cryptology – CRYPTO 2013 380–397 (2013).
Damgård, I. B., Fehr, S., Salvail, L. & Schaffner, C. SIAM J. Comput. 37, 1865–1890 (2008).
Wehner, S., Schaffner, C. & Terhal, B. M. Phys. Rev. Lett. 100, 220502 (2008).
Kent, A. Phys. Rev. Lett. 83, 1447–1450 (1999).
Chakraborty, K., Chailloux, A. & Leverrier, A. Phys. Rev. Lett. 115, 205501 (2015).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Diamanti, E., Kashefi, E. Best of both worlds. Nature Phys 13, 3–4 (2017). https://doi.org/10.1038/nphys3972
Published:
Issue Date:
DOI: https://doi.org/10.1038/nphys3972
This article is cited by
-
Tackling Africa’s digital divide
Nature Photonics (2018)