2013
DOI: 10.1103/physreva.87.012335
|View full text |Cite
|
Sign up to set email alerts
|

Security and composability of randomness expansion from Bell inequalities

Abstract: The nonlocal behavior of quantum mechanics can be used to generate guaranteed fresh randomness from an untrusted device that consists of two nonsignalling components; since the generation process requires some initial fresh randomness to act as a catalyst, one also speaks of randomness expansion. R. Colbeck and A. Kent [J. Phys. A 44, 095305 (2011)] proposed the first method for generating randomness from untrusted devices, but without providing a rigorous analysis. This was addressed subsequently by S. Piro… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
139
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 87 publications
(140 citation statements)
references
References 16 publications
1
139
0
Order By: Relevance
“…Turning the intuition above into rigorous proofs turns out to be rather challenging. Classical security was proved in [Pironio et al, 2010], [Fehr et al, 2013], [Pironio and Massar, 2013], and in the later work [Coudron et al, 2013], which allowed a very broad class of nonlocal games. While useful, classical security does not guard against quantum adversaries, thus is inadequate as quantum computation is becoming a reality.…”
Section: The Problem and Its Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Turning the intuition above into rigorous proofs turns out to be rather challenging. Classical security was proved in [Pironio et al, 2010], [Fehr et al, 2013], [Pironio and Massar, 2013], and in the later work [Coudron et al, 2013], which allowed a very broad class of nonlocal games. While useful, classical security does not guard against quantum adversaries, thus is inadequate as quantum computation is becoming a reality.…”
Section: The Problem and Its Motivationsmentioning
confidence: 99%
“…As the error parameters decrease at an exponential rate, they are dominated by the first set of errors. To decrease the number of devices used in unbounded expansion, a possibility (used, e.g., in [Fehr et al, 2013]) is to cross-feed the outputs of two devices (i.e., give the output of one device as the input to another, and then vice versa). But there is an apparent obstacle for proving security for such an approach: once a device produces output, this output is now correlated with the device itself.…”
Section: Argumentsmentioning
confidence: 99%
“…Theorem: Let Pðk;ỹ;t;g;e j zÞ be the probability distribution of the variables generated during the protocol and the adversary's physical system e, z; and let P ideal ðk;ỹ;t;g;e j zÞ be the corresponding ideal distribution (11). The optimal probability of correctly guessing between the distributions P and P ideal satisfies…”
Section: Protocol Kmentioning
confidence: 99%
“…On the contrary, in Classe II, since Eve prepares the state, the inputs z must be generated with a process that is a priori guaranteed to be unknown to Eve. In other words, in these classes there is no randomness generation, but only randomness expansion -and, after a series of partial results [24,28,29], it has been proved that such expansion can in principle be unbounded [21]. The different adversarial classes discussed here are summarized in Table I.…”
Section: A Classes Of Adversarial Powermentioning
confidence: 99%