2020
DOI: 10.48550/arxiv.2009.08897
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Semi-device independent randomness from d-outcome continuous-variable detection

Hamid Tebyanian,
Marco Avesani,
Giuseppe Vallone
et al.

Abstract: Recently, semi-device independent protocols have attracted increasing attention, guaranteeing security with few hypotheses and experimental simplicity. In this paper, we demonstrate a manyoutcomes scheme with the binary phase-shift keying (BPSK) for a semi-device independent protocol based on the energy assumption. We show in theory that the number of certified random bits of the d-outcomes system outperforms the standard scheme (binary-outcomes). Furthermore, we compare the results of two well-known measureme… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
5
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…source-DI [16][17][18][19] have trusted measurement devices, or measurement-DI [20,21], where the source device is trusted. At the same time, there are protocols with weaker assumptions, e.g., bounding the state's overlap or energy [22][23][24][25], granting a higher level of security.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…source-DI [16][17][18][19] have trusted measurement devices, or measurement-DI [20,21], where the source device is trusted. At the same time, there are protocols with weaker assumptions, e.g., bounding the state's overlap or energy [22][23][24][25], granting a higher level of security.…”
Section: Introductionmentioning
confidence: 99%
“…This uncertainty can be exploited, as in this protocol, to generate secure and private random numbers. A security estimation based on state overlap and unambiguous state discrimination was first derived in [23,27] and later implemented for coherent detection schemes in [22,24,25].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…This has led to protocols for quantum key distribution [1,2], random number generation [3,4], random access coding [5][6][7], numerous quantum certification protocols [8][9][10][11][12][13][14][15][16][17][18] and several experiments [18][19][20][21][22][23][24]. More recently, also alternative settings have been investigated, based on a bound on the overlap [25][26][27], energy [28][29][30][31] and information content [32,33] of the states.…”
mentioning
confidence: 99%