2016
DOI: 10.1088/1367-2630/18/3/035007
|View full text |Cite
|
Sign up to set email alerts
|

Randomness in post-selected events

Abstract: Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little randomness. This raises the question as to whether randomness can be extracted only from the smaller post-selected subset corresponding to proper detection events, instead of from the entire set of data. This could in principle be feasible without opening an analogue of… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
15
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 33 publications
0
15
0
Order By: Relevance
“…(ii) which Bell setups are more robust against noise, or detection inefficiencies [89]? (iii) how to deal with detection inefficiencies [90]? This is nothing but the natural evolution of this research line, where theory and implementation are joining efforts to design more robust and feasible schemes.…”
Section: Discussionmentioning
confidence: 99%
“…(ii) which Bell setups are more robust against noise, or detection inefficiencies [89]? (iii) how to deal with detection inefficiencies [90]? This is nothing but the natural evolution of this research line, where theory and implementation are joining efforts to design more robust and feasible schemes.…”
Section: Discussionmentioning
confidence: 99%
“…For example, if predictable sources of noise infect the device, the output may become increasingly predictable without inducing the failure of statistical tests of randomness [3,4]. This issue has inspired the development of the field of device-independent quantum randomness generation in recent years [3,4,5,6,7,8,9,10,11,12]. In the deviceindependent paradigm, randomness is generated through an experiment called a Bell test [13].…”
mentioning
confidence: 99%
“…In a DIQKD protocol as described above, P g (ρ E|00 , ρ E|11 ) can be viewed as Eve's guessing probability for the outcome of A 0 B 0 , conditioned on the outcome being 00 or 11. A DI method to bound such guessing probabilities based on the distribution Pr AB|XY was described in [30], using the family of SDPs known as the NPA hierarchy [31]. We can hence apply this method to find whether Eq.…”
mentioning
confidence: 99%