2014
DOI: 10.48550/arxiv.1402.0489
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
58
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(59 citation statements)
references
References 46 publications
1
58
0
Order By: Relevance
“…The following lemma generalises a classical result originally proposed in [43]. It follows rather directly from similar statements proved in [52,50,35,33].…”
Section: Necessity Of the Markov Chain Conditionssupporting
confidence: 74%
See 1 more Smart Citation
“…The following lemma generalises a classical result originally proposed in [43]. It follows rather directly from similar statements proved in [52,50,35,33].…”
Section: Necessity Of the Markov Chain Conditionssupporting
confidence: 74%
“…For these entropies, we derive a novel chain rule, which forms the core technical part of our proof. In addition, some of the concepts used in this work generalise techniques proposed in the recent security proofs for device-independent cryptography presented in [33,34]. In particular, the dominant terms of the lower bound on the amount of randomness obtained in [34], called rate curves, are similar to the tradeoff functions considered here (cf.…”
Section: Introductionmentioning
confidence: 95%
“…We learn from the above that the considered bound entangled state and measurements, which can produce randomness, cannot produce a key using a one-way DIQKD protocol. 10 This does not mean that other more complex protocols cannot use this state to produce a key in a DI way. Yet, as bound entangled states are a useful resource also for one-way device-dependent QKD protocols [30,36], considering one-way DIQKD as above is an interesting starting point.…”
Section: B First Evidencementioning
confidence: 99%
“…The focus of the previous works so far was to lower -bound the key rate, i.e., to find the minimal length of a key that can be created, in terms of the relevant parameters of the protocol. With improved lower bounds over the years [8][9][10], a tight lower bound was recently provided [11,12]. 2 These lower bounds can be seen as a statement regarding the minimal amount of key that can be extracted from an entangled state, winning the CHSH game with a certain probability, using the standard DIQKD protocol.…”
Section: Introductionmentioning
confidence: 99%
“…To design a device independent random number generator, one can use the fact that states exhibiting super-classical correlation properties exhibit intrinsic randomness if measured locally. A line of research was devoted to expansion of free randomness using quantum devices (see e. g. [8,9,10,11,12]), which, in the spirit of seeded randomness extractors, expands the length of preexisting independent random seed. Recently several researchers attempted to solve the problem of perfect randomness production, suggesting ways to amplify existing weak randomness with the use of untrusted quantum devices (characterized either as Santha-Vazirani source [13,14,15,16,17] or min-entropy source [18,19]).…”
Section: Introductionmentioning
confidence: 99%