Randomness amplification against no-signaling adversaries using two devices
نویسندگان
چکیده
Ravishankar Ramanathan,1, 2 Fernando G.S.L. Brandão,3, 4 Karol Horodecki,1, 5 Michał Horodecki,1, 2 Paweł Horodecki,1, 6 and Hanna Wojewódka1, 2, 7 National Quantum Information Center of Gdańsk, 81-824 Sopot, Poland Institute of Theoretical Physics and Astrophysics, University of Gdańsk, 80-952 Gdańsk, Poland Quantum Architectures and Computations Group, Microsoft Research, Redmond, WA (USA) Department of Computer Science, University College London Institute of Informatics, University of Gdańsk, 80-952 Gdańsk, Poland Faculty of Applied Physics and Mathematics, Technical University of Gdańsk, 80-233 Gdańsk, Poland Institute of Mathematics, University of Gdańsk, 80-952 Gdańsk, Poland (Dated: April 24, 2015)
منابع مشابه
A Quantum-Proof Non-Malleable Extractor, With Application to Privacy Amplification against Active Quantum Adversaries
In privacy amplification, two mutually trusted parties aim to amplify the secrecy of an initial shared secret X in order to establish a shared private key K by exchanging messages over an insecure communication channel. If the channel is authenticated the task can be solved in a single round of communication using a strong randomness extractor; choosing a quantum-proof extractor allows one to e...
متن کاملRealistic noise-tolerant randomness amplification using finite number of devices.
Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However...
متن کاملPrivacy Amplification Against Active Quantum Adversaries
Privacy amplification is the task by which two cooperating parties transform a shared weak secret, about which an eavesdropper may have side information, into a uniformly random string uncorrelated from the eavesdropper. Privacy amplification against passive adversaries, where it is assumed that the communication is over a public but authenticated channel, can be achieved in the presence of cla...
متن کاملQuantum Randomness Expansion : Upper and Lower
A recent sequence of works, initially motivated by the study of the nonlocal properties of entanglement, demonstrate that a source of information-theoretically certified randomness can be constructed based only on two simple assumptions: the prior existence of a short random seed and the ability to ensure that two black-box devices do not communicate (i.e. are non-signaling). We call protocols ...
متن کاملRandomness expansion from untrusted quantum devices
Is it possible to obtain provable random numbers from an untrusted source? This question, if it can be answered affirmatively, is of great importance in cryptography, where random numbers are ubiquitous and it is necessary to guard against highly intelligent adversaries. Bad randomness is a problem: researchers have broken a large number of RSA keys on the internet due to insufficient randomnes...
متن کامل