*A new research article outlines another aspect of Quantum Cryptography*

In "No Signaling and quantum key distribution", a new paper published in Physical *Review Letters* 95 (010503 – 2005), Barrett, Hardy and Kent give the first example of a way of implementing quantum cryptography which is provably secure - even if quantum theory is incorrect, so long as a successor theory shares with quantum theory the features which make faster-than-light signaling impossible.

The scheme can be implemented by two parties (Alice and Bob) who know quantum theory but know nothing about the precise form of any successor theory, and is secure against a "post-quantum" eavesdropper, Eve, even if she knows the successor theory and has arbitrary post-quantum technology available to her.

**Related link:** Perimeter Institute for Theoretical Physics

**Explore further:**
Physicists bind single-atom sheets with the same force geckos use to climb walls

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.Sign in to get notified via email when new comments are made.