Private Secure Randomness

نویسندگان

  • Nicolas Brunner
  • Nicolas Gisin
  • Charles Lim
چکیده

" To estimate the value of the CHSH inequality, we accumulate n = 3,016 successive entanglement events over the period of about one month. "

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Randomness Complexity

We consider the classic problem of n honest but curious players with private inputs x 1 ; : : : ; x n who wish to compute the value of a xed function F(x 1 ; ; x n) in such way that at the end of the protocol every player knows the value F(x 1 ; ; x n). Each pair of players is connected by a secure point-to-point communication channel. The players have unbounded computational resources and they...

متن کامل

Non-Interactive Secure Multiparty Computation

We introduce and study the notion of non-interactive secure multiparty computation (NIMPC). An NIMPC protocol for a function f(x1, . . . , xn) is specified by a joint probability distribution R = (R1, . . . , Rn) and local encoding functions Enci(xi, ri), 1 ≤ i ≤ n. Given correlated randomness (r1, . . . , rn) ∈R R, each party Pi, using its input xi and its randomness ri, computes the message m...

متن کامل

An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order

Passive physical attacks, like power analysis, pose a serious threat to the security of digital circuits. In this work, we introduce an efficient sidechannel protected Advanced Encryption Standard (AES) hardware design that is completely scalable in terms of protection order. Therefore, we revisit the private circuits scheme of Ishai et al. [13] which is known to be vulnerable to glitches. We d...

متن کامل

Perfect Secrecy under Deep Random assumption

We present a new idea to design perfectly secure information exchangeprotocol, based on a new form of randomness, called « Deep Randomness »,generated in such a way that probability distribution of the output signal ismade unknowledgeable for an observer. By limiting, thanks to DeepRandomness, the capacity of the opponent observer to perform bayesianinference over public...

متن کامل

Error Correction in the Bounded Storage Model

We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have inconsistent views of the public random source. Such errors seem inevitable in any implementation of the model. All previous schemes and protocols in the model assume a perfectly consistent view of the public source from all ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016