2013
DOI: 10.48550/arxiv.1311.4547
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

True randomness from realistic quantum devices

Abstract: Even if the output of a Random Number Generator (RNG) is perfectly uniformly distributed, it may be correlated to pre-existing information and therefore be predictable. Statistical tests are thus not sufficient to guarantee that an RNG is usable for applications, e.g., in cryptography or gambling, where unpredictability is important. To enable such applications a stronger notion of randomness, termed "true randomness", is required, which includes independence from prior information.Quantum systems are particul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
82
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(82 citation statements)
references
References 30 publications
0
82
0
Order By: Relevance
“…Our framework can also be generalized to encapsulate potential quantum side information by considering the analysis described in Ref. [27]. A detailed cryptoanalysis of our framework can also increase the final throughput of the QRNG [47].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Our framework can also be generalized to encapsulate potential quantum side information by considering the analysis described in Ref. [27]. A detailed cryptoanalysis of our framework can also increase the final throughput of the QRNG [47].…”
Section: Discussionmentioning
confidence: 99%
“…They constitute a strong extractor which implies that the seed can be reused without sacrificing too much randomness. In recent development of QRNGs [20,22,26,27,43], they have been used to construct hashing functions such as the Toeplitz-hashing matrix. These constructions require a long (but reusable) seed [44].…”
Section: Randomness Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…Postprocessing: Finally, Alice applies privacy amplification to r, producing a final random string of size . As proven in [26], the hash function used for privacy amplification need only be chosen randomly once and then reused for each run of the protocol for a QRNG protocol of this nature.…”
Section: The Protocolmentioning
confidence: 99%
“…Consequently, the first step for analysing our experiment is to carefully calibrate and model the realistic photodiodes, which output noisy voltage measurements rather than exact photon numbers. More formally, following the approach of [35], we model the POVM describing our noisy, characterised measurements as a projective measurement on a larger system. For the case of our detectors (see Fig.…”
Section: Certifying Randomness With Realistic Devicesmentioning
confidence: 99%