# Local Randomness: Examples and Application.

@article{Fu2018LocalRE, title={Local Randomness: Examples and Application.}, author={H. Fu and Carl A. Miller}, journal={Physical review. A}, year={2018}, volume={97} }

When two players achieve a superclassical score at a nonlocal game, their outputs must contain intrinsic randomness. This fact has many useful implications for quantum cryptography. Recently it has been observed (C. Miller, Y. Shi, Quant. Inf. & Comp. 17, pp. 0595-0610, 2017) that such scores also imply the existence of local randomness - that is, randomness known to one player but not to the other. This has potential implications for cryptographic tasks between two cooperating but mistrustfulâ€¦Â Expand

#### Figures and Topics from this paper

#### 8 Citations

Composably secure device-independent encryption with certified deletion.

- Computer Science, Physics
- 2020

Quantum encryption with certified deletion

- Physics, Computer Science
- IACR Cryptol. ePrint Arch.
- 2020

Quantum Encryption with Certified Deletion: Public Key and Attribute-Based

- Computer Science
- IACR Cryptol. ePrint Arch.
- 2021

Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication

- Computer Science, Physics
- IACR Cryptol. ePrint Arch.
- 2021

Electrical scattering mechanism evolution in un-doped and halogen-doped Bi2O2Se single crystals.

- Materials Science, Medicine
- Journal of physics. Condensed matter : an Institute of Physics journal
- 2020

#### References

SHOWING 1-10 OF 26 REFERENCES

Randomness in nonlocal games between mistrustful players.

- Physics, Computer Science
- Quantum information & computation
- 2017

Universal Security for Randomness Expansion from the Spot-Checking Protocol

- Mathematics, Physics
- SIAM J. Comput.
- 2017

Fully distrustful quantum bit commitment and coin flipping.

- Computer Science, Medicine
- Physical review letters
- 2011

Certifiable quantum dice: or, true random number generation secure against quantum adversaries

- Mathematics, Computer Science
- STOC '12
- 2012

Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

- Physics, Mathematics
- STOC
- 2014

Simple and tight device-independent security proofs

- Computer Science, Physics
- SIAM J. Comput.
- 2019

Necessary detection efficiencies for secure quantum key distribution and bound randomness

- Physics
- 2016

Quantum cryptography with imperfect apparatus

- Computer Science, Physics
- Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)
- 1998