Random numbers certified by Bell’s theorem

@article{Pironio2010RandomNC,
  title={Random numbers certified by Bell’s theorem},
  author={S. Pironio and A. Ac{\'i}n and S. Massar and A. B. D. L. Giroday and D. Matsukevich and P. Maunz and S. Olmschenk and D. Hayes and L. Luo and T. Manning and C. Monroe},
  journal={Nature},
  year={2010},
  volume={464},
  pages={1021-1024}
}
Randomness is a fundamental feature of nature and a valuable resource for applications ranging from cryptography and gambling to numerical simulation of physical and biological systems. Random numbers, however, are difficult to characterize mathematically, and their generation must rely on an unpredictable physical process. Inaccuracies in the theoretical modelling of such processes or failures of the devices, possibly due to adversarial attacks, limit the reliability of random number… Expand
Security of practical private randomness generation
Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredictable if they violate a Bell inequality. This property can be used to generate certified randomnessExpand
Experimentally generated randomness certified by the impossibility of superluminal signals
TLDR
1,024 random bits that are uniformly distributed to within 10−12 and unpredictable assuming the impossibility of superluminal communication are generated and certified using a loophole-free Bell test and a protocol is described that is optimized for devices that are characterized by a low per-trial violation of Bell inequalities. Expand
Device-independent randomness generation from several Bell estimators
Device-independent randomness generation and quantum key distribution protocols rely on a fundamental relation between the non-locality of quantum theory and its random character. This relation isExpand
Device-independent quantum random-number generation
TLDR
Genuine, unpredictable quantum random-number generation that is provably secure against quantum and classical adversaries is demonstrated, certified by the loophole-free violation of a Bell inequality. Expand
Private random number generation through remote atom entanglement
TLDR
The non-local correlations between entangled quantum systems can be used to verify the generation of true random numbers, and this insight enables the construction of a private random number generator whose output can be verified as random through the violation of a Bell inequality. Expand
Continuous Variable Optimisation of Quantum Randomness and Probabilistic Linear Amplification
In the past decade, quantum communication protocols based on continuous variables (CV) has seen considerable development in both theoretical and experimental aspects. Nonetheless, challenges remainExpand
Realistic noise-tolerant randomness amplification using finite number of devices
TLDR
This work provides an error-tolerant protocol using a finite number of devices for amplifying arbitrary weak randomness into nearly perfect random bits, which are secure against a no-signalling adversary. Expand
Experimental quantum randomness generation invulnerable to the detection loophole
Random numbers are essential for multiple applications, including cryptography, financial security, digital rights management and scientific simulations. However, producing random numbers from aExpand
True randomness from realistic quantum devices
TLDR
Here this work provides a framework to analyse realistic QRNGs and to determine the post-processing that is necessary to turn their raw output into true randomness. Expand
Quantum Random Numbers : Certification and Generation
In this thesis we study the generation of randomness from quantum mechanical sources: quantum random number generators (QRNGs). Such devices are thought to provide a better quality of randomness thanExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 75 REFERENCES
Quantum Cryptography Based Solely on Bell's Theorem
TLDR
A new protocol is introduced which is efficient in terms of both classical and quantum communication, and that can tolerate noise in the quantum channel, and it is proved that it offers device-independent security under the sole assumption that certain non-signaling conditions are satisfied. Expand
Quantum cryptography with imperfect apparatus
  • D. Mayers, A. Yao
  • Computer Science, Physics
  • Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)
  • 1998
TLDR
This paper proposes and gives a concrete design for a new concept, self-checking source, which requires the manufacturer of the photon source to provide certain tests; these tests are designed such that, if passed, the source is guaranteed to be adequate for the security of the quantum key distribution protocol, even though the testing devices may not be built to the original specification. Expand
Secure self-calibrating quantum random-bit generator
Random-bit generators (RBGs) are key components of a variety of information processing applications ranging from simulations to cryptography. In particular, cryptographic systems require 'strong'Expand
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD followsExpand
No signaling and quantum key distribution.
TLDR
A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality. Expand
Trevisan's Extractor in the Presence of Quantum Side Information
TLDR
Here, it is shown that the well-known construction paradigm for extractors proposed by Trevisan is sound in the presence of quantum side information and exploited the modularity of this paradigm to give several concrete extractor constructions. Expand
Quantum And Relativistic Protocols For Secure Multi-Party Computation
TLDR
A new protocol for non-relativistic strong coin tossing is introduced, which matches the security of the best protocol known to date while using a conceptually different approach to achieve the task. Expand
Fast physical random bit generation with chaotic semiconductor lasers
Random number generators in digital information systems make use of physical entropy sources such as electronic and photonic noise to add unpredictability to deterministically generated pseudo-randomExpand
Self-testing of Quantum Circuits
We prove that a quantum circuit together with measurement apparatuses and EPR sources can be self-tested, i.e. fully verified without any reference to some trusted set of quantum devices. ToExpand
Experimental demonstration of time-shift attack against practical quantum key distribution systems
TLDR
This result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability $(\ensuremath{\sim}4%)$ to break the security of the system. Expand
...
1
2
3
4
5
...