Proceedings of the Forty-Sixth Annual ACM Symposium on Theory of Computing 2014
DOI: 10.1145/2591796.2591873
|View full text |Cite
|
Sign up to set email alerts
|

Infinite randomness expansion with a constant number of devices

Abstract: We present a device-independent randomness expansion protocol, involving only a constant number of non-signaling quantum devices, that achieves infinite expansion: starting with m bits of uniform private randomness, the protocol can produce an unbounded amount of certified randomness that is exp(−Ω(m 1/3 ))-close to uniform and secure against a quantum adversary. The only parameters which depend on the size of the input are the soundness of the protocol and the security of the output (both are inverse exponent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
64
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(64 citation statements)
references
References 27 publications
0
64
0
Order By: Relevance
“…In recent years several protocols for generating randomness in a DI way have been introduced [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17], with varying degrees of security, rate of randomness expansion, or noise robustness. They all, however, share the feature that they rely on the estimation of a single Bell expression.…”
Section: Conclusion and Open Questionsmentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years several protocols for generating randomness in a DI way have been introduced [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17], with varying degrees of security, rate of randomness expansion, or noise robustness. They all, however, share the feature that they rely on the estimation of a single Bell expression.…”
Section: Conclusion and Open Questionsmentioning
confidence: 99%
“…First, how to prove security against quantum side information when several Bell expressions or the full set of data generated in the experiment are taken into account? This is not a priori easy to answer since the analysis of most DIRNG protocols secure against quantum side information rely on Bell expressions with a particular structure [6,8,11] or, when they allow for arbitrary Bell expressions, do not optimally take into account the observed level of violation [17]. Second, we based the statistical analysis on the Azuma-Hoeffding inequality, but alternative deviation theorems [39] could be adapted to our setting.…”
Section: Conclusion and Open Questionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Randomness is said to be expanded as an initial seed is converted into a larger amount of randomness [8]. The original scheme of Ref.[7] was able to achieve quadratic randomness expansion, while later, more sophisticated schemes, have now been shown to achieve better expansion, including exponential and unbounded expansion [10][11][12][13][14][15][16].Einstein-Podolsky-Rosen (EPR) steering [17] is a second form of quantum nonlocality, that considers the correlations between measurement outcomes of one party, and the states prepared (or 'steered') for a second party. From a modern perspective it is understood to constitute a one-sided-deviceindependent (1SDI) form of nonlocality, since it only relies on the characterisation of one set of measuring devices [18].…”
mentioning
confidence: 99%
“…[13], who showed how to amplify such source of randomness with the use of only eight noncommunicating devices. Their work was quickly followed by that of Coudron and Yuan [14], who showed how to use 20 non-communicating devices to obtain arbitrary many bits from a Santha-Vazirani source.…”
mentioning
confidence: 99%