2019
DOI: 10.1038/s41534-019-0208-1
|View full text |Cite
|
Sign up to set email alerts
|

Quantum random number generation with uncharacterized laser and sunlight

Abstract: The entropy or randomness source is an essential ingredient in random number generation. Quantum random number generators generally require well modeled and calibrated light sources, such as a laser, to generate randomness. With uncharacterized light sources, such as sunlight or an uncharacterized laser, genuine randomness is practically hard to be quantified or extracted owing to its unknown or complicated structure. By exploiting a recently proposed source-independent randomness generation protocol, we theor… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 32 publications
0
15
0
Order By: Relevance
“…Unfortunately, since an adversary (Eve) can emit arbitrary signals into detectors, the detection component is more vulnerable to quantum hacking attacks than the source [31]. To guarantee the security of detection, detection devices should be carefully characterized to evaluate device imperfections [32,33]. However, detector blinding attacks [34][35][36], the most powerful attack targeting detectors, have not yet been efficiently solved.…”
Section: Qrngsmentioning
confidence: 99%
“…Unfortunately, since an adversary (Eve) can emit arbitrary signals into detectors, the detection component is more vulnerable to quantum hacking attacks than the source [31]. To guarantee the security of detection, detection devices should be carefully characterized to evaluate device imperfections [32,33]. However, detector blinding attacks [34][35][36], the most powerful attack targeting detectors, have not yet been efficiently solved.…”
Section: Qrngsmentioning
confidence: 99%
“…Note that when the using memory and the not using memory cases exploit the generalized and flip coin operators ( 6) and ( 7), the gammas ( 22) and ( 23) employ the maximum probabilities ( 9) and (10)…”
Section: B the Using Memory And Not Using Memory Casesmentioning
confidence: 99%
“…Furthermore, they are highly practical, leading to Gbps implementations [28]. Finally, by not trusting the source, several fascinating possibilities are open, including the use of sunlight as the source [29]. For a general survey of QRNG protocols and their security models, the reader is referred to [30].…”
Section: Application To Quantum Random Number Generatorsmentioning
confidence: 99%