File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Amplifying the Randomness of Weak Sources Correlated with Devices

TitleAmplifying the Randomness of Weak Sources Correlated with Devices
Authors
Keywordsrandom number generation
Quantum cryptography
Issue Date2017
Citation
IEEE Transactions on Information Theory, 2017, v. 63, n. 11, p. 7592-7611 How to Cite?
Abstract© 1963-2012 IEEE. The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition for devices, namely that any string of SV source bits remains weakly random conditioned upon any other bit string from the same SV source and the outputs obtained when this further string is input into the devices. Assuming this condition, we show that a quantum device using a singlet state to violate the chained Bell inequalities leads to full randomness in the asymptotic scenario of a large number of settings, for a restricted set of SV sources (with 0 \varepsilon < (2-(1/12) - 1)/(2(2-(1/12) + 1)) 0.0144 ). We also study a device-independent protocol that allows for correlations between the sequence of boxes used in the protocol and the SV source bits used to choose the particular box from whose output the randomness is obtained. Assuming the SV-like condition for devices, we show that the honest parties can achieve amplification of the weak source, for the parameter range 0varepsilon <0.0132 , against a class of attacks given as a mixture of product box sequences, made of extremal no-signaling boxes, with additional symmetry conditions. Composable security proof against this class of attacks is provided.
Persistent Identifierhttp://hdl.handle.net/10722/276551
ISSN
2023 Impact Factor: 2.2
2023 SCImago Journal Rankings: 1.607
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorWojewodka, Hanna-
dc.contributor.authorBrandao, Fernando G.S.L.-
dc.contributor.authorGrudka, Andrzej-
dc.contributor.authorHorodecki, Karol-
dc.contributor.authorHorodecki, Michal-
dc.contributor.authorHorodecki, Pawel-
dc.contributor.authorPawlowski, Marcin-
dc.contributor.authorRamanathan, Ravishankar-
dc.contributor.authorStankiewicz, MacIej-
dc.date.accessioned2019-09-18T08:33:57Z-
dc.date.available2019-09-18T08:33:57Z-
dc.date.issued2017-
dc.identifier.citationIEEE Transactions on Information Theory, 2017, v. 63, n. 11, p. 7592-7611-
dc.identifier.issn0018-9448-
dc.identifier.urihttp://hdl.handle.net/10722/276551-
dc.description.abstract© 1963-2012 IEEE. The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition for devices, namely that any string of SV source bits remains weakly random conditioned upon any other bit string from the same SV source and the outputs obtained when this further string is input into the devices. Assuming this condition, we show that a quantum device using a singlet state to violate the chained Bell inequalities leads to full randomness in the asymptotic scenario of a large number of settings, for a restricted set of SV sources (with 0 \varepsilon < (2-(1/12) - 1)/(2(2-(1/12) + 1)) 0.0144 ). We also study a device-independent protocol that allows for correlations between the sequence of boxes used in the protocol and the SV source bits used to choose the particular box from whose output the randomness is obtained. Assuming the SV-like condition for devices, we show that the honest parties can achieve amplification of the weak source, for the parameter range 0varepsilon <0.0132 , against a class of attacks given as a mixture of product box sequences, made of extremal no-signaling boxes, with additional symmetry conditions. Composable security proof against this class of attacks is provided.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Information Theory-
dc.subjectrandom number generation-
dc.subjectQuantum cryptography-
dc.titleAmplifying the Randomness of Weak Sources Correlated with Devices-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TIT.2017.2738010-
dc.identifier.scopuseid_2-s2.0-85028975638-
dc.identifier.volume63-
dc.identifier.issue11-
dc.identifier.spage7592-
dc.identifier.epage7611-
dc.identifier.isiWOS:000413318900044-
dc.identifier.issnl0018-9448-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats