2013
DOI: 10.1007/978-3-642-40328-6_33
|View full text |Cite
|
Sign up to set email alerts
|

Robust Randomness Amplifiers: Upper and Lower Bounds

Abstract: A recent sequence of works, initially motivated by the study of the nonlocal properties of entanglement, demonstrate that a source of information-theoretically certified randomness can be constructed based only on two simple assumptions: the prior existence of a short random seed and the ability to ensure that two black-box devices do not communicate (i.e. are nonsignaling). We call protocols achieving such certified amplification of a short random seed randomness amplifiers.We introduce a simple framework in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…A general version of the spot-checking protocol is shown in Figure 1. (In [7], this protocol was showed to be secure against classical adversaries. )…”
Section: Central Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…A general version of the spot-checking protocol is shown in Figure 1. (In [7], this protocol was showed to be secure against classical adversaries. )…”
Section: Central Resultsmentioning
confidence: 99%
“…(Without this requirement, the amount of seed needed to generate the random inputs would have to be at least linearly proportional to the number of extractable bits in the output.) This motivates a protocol which we import from [7], referred to here as the spot-checking protocol. A general version of the spot-checking protocol is shown in Figure 1.…”
Section: Central Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…By taking γ = Θ( log n n ) for instance we have used a polylogarithmic (in n) number of random bits and generated a linear number of bits n, thus achieving exponential randomness expansion. We refer the reader to [34], [37] for further discussions on the way to generate the random bits needed for the protocol.…”
Section: Chsh-based Di-re Protocolmentioning
confidence: 99%
“…The precise formalization of DIRE protocols is rather involved, and we direct the interested reader to the flourishing collection of works on the topic [CK11, PAM10, VV12, FGS13, AMP12, UZZ + 13, GL + 13, MS14, CSW14]. In particular the precise formulation of the model is a focus of [CVY13].…”
Section: Device-independent Randomness Expansion and Weak Cross-talkmentioning
confidence: 99%