local randomness
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 4)

H-INDEX

5
(FIVE YEARS 1)

Entropy ◽  
2021 ◽  
Vol 23 (12) ◽  
pp. 1694
Author(s):  
Neri Merhav

We consider the problem of encoding a deterministic source sequence (i.e., individual sequence) for the degraded wiretap channel by means of an encoder and decoder that can both be implemented as finite-state machines. Our first main result is a necessary condition for both reliable and secure transmission in terms of the given source sequence, the bandwidth expansion factor, the secrecy capacity, the number of states of the encoder and the number of states of the decoder. Equivalently, this necessary condition can be presented as a converse bound (i.e., a lower bound) on the smallest achievable bandwidth expansion factor. The bound is asymptotically achievable by Lempel–Ziv compression followed by good channel coding for the wiretap channel. Given that the lower bound is saturated, we also derive a lower bound on the minimum necessary rate of purely random bits needed for local randomness at the encoder in order to meet the security constraint. This bound too is achieved by the same achievability scheme. Finally, we extend the main results to the case where the legitimate decoder has access to a side information sequence, which is another individual sequence that may be related to the source sequence, and a noisy version of the side information sequence leaks to the wiretapper.


Quantum ◽  
2020 ◽  
Vol 4 ◽  
pp. 344 ◽  
Author(s):  
Joseph Bowles ◽  
Flavio Baccari ◽  
Alexia Salavrakos

An important problem in quantum information theory is that of bounding sets of correlations that arise from making local measurements on entangled states of arbitrary dimension. Currently, the best-known method to tackle this problem is the NPA hierarchy; an infinite sequence of semidefinite programs that provides increasingly tighter outer approximations to the desired set of correlations. In this work we consider a more general scenario in which one performs sequences of local measurements on an entangled state of arbitrary dimension. We show that a simple adaptation of the original NPA hierarchy provides an analogous hierarchy for this scenario, with comparable resource requirements and convergence properties. We then use the method to tackle some problems in device-independent quantum information. First, we show how one can robustly certify over 2.3 bits of device-independent local randomness from a two-quibt state using a sequence of measurements, going beyond the theoretical maximum of two bits that can be achieved with non-sequential measurements. Finally, we show tight upper bounds to two previously defined tasks in sequential Bell test scenarios.


2019 ◽  
Vol 461 ◽  
pp. 41-50
Author(s):  
Wentian Li ◽  
Dimitrios Thanos ◽  
Astero Provata

2018 ◽  
Vol 97 (3) ◽  
Author(s):  
Honghao Fu ◽  
Carl A. Miller
Keyword(s):  

2017 ◽  
Vol 17 (7&8) ◽  
pp. 595-610
Author(s):  
Carl A. Miller ◽  
Yaoyun Shi

If two quantum players at a nonlocal game G achieve a superclassical score, then their measurement outcomes must be at least partially random from the perspective of any third player. This is the basis for device-independent quantum cryptography. In this paper we address a related question: does a superclassical score at G guarantee that one player has created randomness from the perspective of the other player? We show that for complete-support games, the answer is yes: even if the second player is given the first player’s input at the conclusion of the game, he cannot perfectly recover her output. Thus some amount of local randomness (i.e., randomness possessed by only one player) is always obtained when randomness is certified from nonlocal games with quantum strategies. This is in contrast to non-signaling game strategies, which may produce global randomness without any local randomness. We discuss potential implications for cryptographic protocols between mistrustful parties.


2015 ◽  
Vol 13 (05) ◽  
pp. 1550029 ◽  
Author(s):  
Emily Adlam ◽  
Adrian Kent

We describe new unconditionally secure bit commitment schemes whose security is based on Minkowski causality and the monogamy of quantum entanglement. We first describe an ideal scheme that is purely deterministic, in the sense that neither party needs to generate any secret randomness at any stage. We also describe a variant that allows the committer to proceed deterministically, requires only local randomness generation from the receiver, and allows the commitment to be verified in the neighborhood of the unveiling point. We show that these schemes still offer near-perfect security in the presence of losses and errors, which can be made perfect if the committer uses an extra single random secret bit. We discuss scenarios where these advantages are significant.


Ecosphere ◽  
2014 ◽  
Vol 5 (9) ◽  
pp. art114 ◽  
Author(s):  
N. C. Cáceres ◽  
C. S. Dambros ◽  
G. L. Melo ◽  
J. Sponchiado ◽  
F. Della-Flora ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document