2020
DOI: 10.1109/tit.2019.2960252
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Quantum-Secure Device-Independent Randomness Expansion

Abstract: A device-independent randomness expansion protocol aims to take an initial random seed and generate a longer one without relying on details of how the devices operate for security. A large amount of work to date has focussed on a particular protocol based on spot-checking devices using the CHSH inequality.Here we show how to derive randomness expansion rates for a wide range of protocols, with security against a quantum adversary. Our technique uses semidefinite programming and a recent improvement of the entr… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
66
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 41 publications
(66 citation statements)
references
References 64 publications
(158 reference statements)
0
66
0
Order By: Relevance
“…The conceptual difference between our work and previous works [5,[8][9][10][13][14][15]29] for addressing quantum side information in the device-independent scenario lies in that previous works require quantifying randomness as a function of violations of fixed Bell inequalities before performing security analysis with finite data. Although Bell violations and deviceindependent randomness are related, they are inequivalent quantities: a stronger violation of a fixed Bell inequality does not necessarily certify a larger amount of device-independent randomness [30].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…The conceptual difference between our work and previous works [5,[8][9][10][13][14][15]29] for addressing quantum side information in the device-independent scenario lies in that previous works require quantifying randomness as a function of violations of fixed Bell inequalities before performing security analysis with finite data. Although Bell violations and deviceindependent randomness are related, they are inequivalent quantities: a stronger violation of a fixed Bell inequality does not necessarily certify a larger amount of device-independent randomness [30].…”
Section: Introductionmentioning
confidence: 99%
“…Many DIRG protocols [3][4][5][6][7][8][9][10][11][12][13][14][15] have been developed in the past ten years. They are different in the following aspects: the specific requirements on quantum devices, the Bell-test configuration applied, the security level achieved, and the asymptotic randomness rate and finite-data efficiency exhibited.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…It is still an open problem whether any other Bell inequality can lead to better performance for DIQKD than the CHSH inequality. Recently, an extensive analysis of the performance of different Bell inequalities for the task of randomness expansion was presented in [120]. For collective attacks, the key ingredients to derive Theorem 2 are the asymptotic equipartition property (Theorem 7) and Lemma 2.…”
Section: 32mentioning
confidence: 99%