The role of entanglement in energy-restricted communication and randomness generation
- URL: http://arxiv.org/abs/2510.27473v1
- Date: Fri, 31 Oct 2025 13:51:07 GMT
- Title: The role of entanglement in energy-restricted communication and randomness generation
- Authors: Carles Roch I Carceller, Armin Tavakoli,
- Abstract summary: In quantum communication, we consider the basic primitive for energy-constrained communication, namely the probabilistic transmission of a bit.<n>We find that these advantages can be unlocked by non-unitary encoding schemes that purposefully decohere the entangled state.<n>We leverage these insights to investigate the impact of entanglement for quantum random number generation.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: A promising platform for semi-device-independent quantum information is prepare-and-measure experiments restricted only by a bound on the energy of the communication. Here, we investigate the role of shared entanglement in such scenarios. For classical communication, we derive a general correlation criterion for nonlocal resources and use it to show that entanglement can fail to be a resource in standard tasks. For quantum communication, we consider the basic primitive for energy-constrained communication, namely the probabilistic transmission of a bit, and show that the advantages of entanglement only can be unlocked by non-unitary encoding schemes that purposefully decohere the entangled state. We also find that these advantages can be increased by using entanglement of higher dimension than qubit. We leverage these insights to investigate the impact of entanglement for quantum random number generation, which is a standard application of these systems but whose security so far only has been established against classical side information. In the low-energy regime, our attacks on the protocol indicate that the security remains largely intact, thereby paving the way for strengthened security without more complex setups and with negligible performance reductions.
Related papers
- Simultaneous Classical and Quantum Communications: Recent Progress and Three Challenges [52.931372025288844]
We explore novel protocols that enable simultaneous classical and quantum communications.<n>We extend quantum communication capabilities beyond traditional optical bands into the terahertz.<n>We identify open problems that must be addressed to facilitate practical implementation.
arXiv Detail & Related papers (2025-12-11T00:27:08Z) - Secure Quantum Relay Networks Using Distributed Entanglement without Classical Authentication [0.0]
Current quantum communication protocols rely heavily on classical authentication for message origin verification.<n>We propose a novel framework for secure quantum relay networks that completely avoids classical authentication.
arXiv Detail & Related papers (2025-07-07T20:25:10Z) - Device-independent secure correlations in sequential quantum scenarios [44.99833362998488]
Device-independent quantum information is attracting significant attention, particularly for its applications in information security.<n>We propose a systematic approach to designing sequential quantum protocols for device-independent security.<n>We analytically prove that, with this systematic construction, the resulting ideal correlations are secure in the sense that they cannot be reproduced as a statistical mixture of other correlations.
arXiv Detail & Related papers (2025-03-18T16:45:20Z) - Quantum Advantage: A Single Qubit's Experimental Edge in Classical Data Storage [5.669806907215807]
We implement an experiment on a photonic quantum processor establishing efficacy of the elementary quantum system in classical information storage.
Our work paves the way for immediate applications in near-term quantum technologies.
arXiv Detail & Related papers (2024-03-05T05:09:32Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Hierarchical certification of nonclassical network correlations [50.32788626697182]
We derive linear and nonlinear Bell-like inequalities for networks, whose violation certifies the absence of a minimum number of classical sources in them.
We insert this assumption, which leads to results more amenable to certification in experiments.
arXiv Detail & Related papers (2023-06-27T18:00:01Z) - Commitment capacity of classical-quantum channels [70.51146080031752]
We define various notions of commitment capacity for classical-quantum channels.
We prove matching upper and lower bound on it in terms of the conditional entropy.
arXiv Detail & Related papers (2022-01-17T10:41:50Z) - Efficient Quantum Voting with Information-Theoretic Security [0.0]
We show that the use of quantum networks can enable information-theoretic security for the desirable aspects of a distributed voting scheme.
In our approach, ballot information is encoded in quantum states that enable an exponential reduction in communication complexity.
arXiv Detail & Related papers (2021-12-28T18:10:44Z) - Experimental quantum key distribution certified by Bell's theorem [0.0]
cryptographic key exchange protocols traditionally rely on computational conjectures to provide security against eavesdropping attacks.
quantum key distribution protocols provide information-theoretic security against such attacks.
However, quantum protocols are subject to a new class of attacks exploiting implementation defects in the physical devices involved.
We present here the experimental realisation of a complete quantum key distribution protocol immune to these vulnerabilities.
arXiv Detail & Related papers (2021-09-29T17:52:48Z) - A single-qubit position verification protocol that is secure against
multi-qubit attacks [2.3857747529378917]
We show that minimal quantum resources, in the form of a single qubit, combined with classical communication are sufficient to thwart quantum adversaries.
More precisely, we show that the adversaries using an increasing amount of entanglement can be combatted solely by increasing the number of classical bits used in the protocol.
arXiv Detail & Related papers (2021-04-13T15:48:11Z) - Entanglement-assisted entanglement purification [62.997667081978825]
We present a new class of entanglement-assisted entanglement purification protocols that can generate high-fidelity entanglement from noisy, finite-size ensembles.
Our protocols can deal with arbitrary errors, but are best suited for few errors, and work particularly well for decay noise.
arXiv Detail & Related papers (2020-11-13T19:00:05Z) - Implementation of Continuous-Variable Quantum Key Distribution with Composable and One-Sided-Device-Independent Security Against Coherent Attacks [0.0]
State-of-the-art quantum key distribution requires composable security against coherent attacks.
We present an implementation of continuous-variable quantum key distribution satisfying these requirements.
Our work is a crucial step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.
arXiv Detail & Related papers (2014-06-24T09:20:24Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.