Turning an optical fibre into a giant laser may allow for practical key generation without requiring fragile quantum states.
References
Gisin, N., Ribordy, G., Tittel, W. & Zbinden, H. Rev. Mod. Phys. 74, 145–195 (2002).
A Quantum Information Science and Technology Roadmap — Part 2: Quantum Cryptography (Quantum Cryptography Technology Experts Panel, July 2004); <http://qist.lanl.gov/pdfs/whole_roadmap.pdf>.
Scheuer, J. & Yariv, A. Phys. Rev. Lett. 97, 140502 (2006).
Hodara, H. et al. Fiber Integ. Opt. 22, 47–61 (2003).
Kish, L. B. Phys. Lett. A 352, 178–182 (2005).
Yuen H. P. & Kim, A. M. Phys. Lett. A 241, 135–128 (1998).
Maurer, U. M. J. Cryptology 5, 53–66 (1992).
<http://www.idquantique.com>
<http://www.magiqtech.com>
Stinson, D. R. Cryptography: Theory and Practice (CRC, Boca Raton, Florida, 1995).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Kanter, G., Kumar, P. Keeping cryptographic keys safe. Nature Photon 1, 15–16 (2007). https://doi.org/10.1038/nphoton.2006.62
Issue Date:
DOI: https://doi.org/10.1038/nphoton.2006.62
- Springer Nature Limited