Accumulation of Device-Independent Quantum Randomness against Time-Ordered No-Signalling Adversaries
- URL: http://arxiv.org/abs/2506.17020v1
- Date: Fri, 20 Jun 2025 14:18:15 GMT
- Title: Accumulation of Device-Independent Quantum Randomness against Time-Ordered No-Signalling Adversaries
- Authors: Ravishankar Ramanathan, Yuan Liu, Yutian Wu,
- Abstract summary: A key ingredient is to identify how the entropy in the raw outputs of a Bell test accumulates over $n$ sequential runs.<n>We show that despite the findings for small $n$, the min-entropy does in fact accumulate linearly for large $n$.
- Score: 3.7482527016282963
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The question of security of practical device-independent protocols against no-signalling adversaries, the ultimate form of cryptographic security, has remained open. A key ingredient is to identify how the entropy in the raw outputs of a Bell test accumulates over $n$ sequential runs (termed time-ordered no-signalling) against a no-signalling adversary. Previous numerical and analytical investigations for small $n$ ($\leq 5$) had suggested that the min-entropy might not accumulate linearly in contrast to the case of quantum adversaries. Here we point out that despite the findings for small $n$, the min-entropy does in fact accumulate linearly for large $n$. We illustrate the difference in randomness accumulation against quantum and no-signalling adversaries with the paradigmatic example of the Chained Bell test for which we analytically derive the min-entropy. Finally, we illustrate the power of the no-signalling adversary by providing a class of attacks that allow an eavesdropper to perfectly guess the outputs of one player in general bipartite Pseudotelepathy games.
Related papers
- Cloning Games, Black Holes and Cryptography [50.022147589030304]
We introduce a new toolkit for analyzing cloning games.<n>This framework allows us to analyze a new cloning game based on binary phase states.<n>We show that the binary phase variantally optimal bound offers quantitative insights into information scrambling in idealized models of black holes.
arXiv Detail & Related papers (2024-11-07T14:09:32Z) - "Nonlocality-of-a-single-photon'' based Quantum Key Distribution and Random Number Generation schemes and their device-independent security analysis [0.0]
Scheme involves a single photon 50-50 beam-split into two modes propagating to two spatially separated observation stations.<n>The physics and non-classicality of such an arrangement has been understood only recently.<n>We present a single-photon based device-independent quantum key distribution scheme secure even against no-signaling eavesdropping.
arXiv Detail & Related papers (2023-11-13T16:32:02Z) - Certified Randomness from Quantum Supremacy [5.313318620422295]
We propose an application for near-term quantum devices, namely, generating cryptographically certified random bits.
Our protocol repurposes the existing "quantum supremacy" experiments, based on random circuit sampling.
We show that our protocol's output is unpredictable even to a computationally unbounded adversary.
arXiv Detail & Related papers (2023-03-02T23:28:31Z) - Testing randomness of series generated in Bell's experiment [62.997667081978825]
We use a toy fiber optic based setup to generate binary series, and evaluate their level of randomness according to Ville principle.
Series are tested with a battery of standard statistical indicators, Hurst, Kolmogorov complexity, minimum entropy, Takensarity dimension of embedding, and Augmented Dickey Fuller and Kwiatkowski Phillips Schmidt Shin to check station exponent.
The level of randomness of series obtained by applying Toeplitz extractor to rejected series is found to be indistinguishable from the level of non-rejected raw ones.
arXiv Detail & Related papers (2022-08-31T17:39:29Z) - Quantum security and theory of decoherence [0.0]
We investigate how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism.
We derive a trade-off relation between eavesdropper's guessing probability $P_guess$ and the collective decoherence factor $Gamma.
arXiv Detail & Related papers (2022-05-25T17:25:28Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Tight Exponential Analysis for Smoothing the Max-Relative Entropy and
for Quantum Privacy Amplification [56.61325554836984]
The max-relative entropy together with its smoothed version is a basic tool in quantum information theory.
We derive the exact exponent for the decay of the small modification of the quantum state in smoothing the max-relative entropy based on purified distance.
arXiv Detail & Related papers (2021-11-01T16:35:41Z) - Hybrid no-signaling-quantum correlations [0.2085467441379275]
We introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term $textbfHNSQ$ in the multi-party Bell scenario.
Specifically, the set $textbfHNSQ$ is a super-quantum set of correlations derived from no-signaling assemblages.
In contrast to the usual no-signaling correlations, the new set allows for simple security of (one-sided)-device-independent applications against super-quantum adversaries.
arXiv Detail & Related papers (2021-07-14T17:40:42Z) - Adversarial Examples Detection with Bayesian Neural Network [57.185482121807716]
We propose a new framework to detect adversarial examples motivated by the observations that random components can improve the smoothness of predictors.
We propose a novel Bayesian adversarial example detector, short for BATer, to improve the performance of adversarial example detection.
arXiv Detail & Related papers (2021-05-18T15:51:24Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Random quantum circuits anti-concentrate in log depth [118.18170052022323]
We study the number of gates needed for the distribution over measurement outcomes for typical circuit instances to be anti-concentrated.
Our definition of anti-concentration is that the expected collision probability is only a constant factor larger than if the distribution were uniform.
In both the case where the gates are nearest-neighbor on a 1D ring and the case where gates are long-range, we show $O(n log(n)) gates are also sufficient.
arXiv Detail & Related papers (2020-11-24T18:44:57Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z) - Single trusted qubit is necessary and sufficient for quantum realisation
of extremal no-signaling correlations [0.2085467441379275]
We show that quantum statistics can never reproduce an extremal non-local point within the set of no-signaling boxes.
We prove a positive result showing that already a single trusted qubit is enough for quantum theory to produce a self-testable extremal point.
arXiv Detail & Related papers (2020-04-30T13:52:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.