Quantum randomness protected against detection loophole attacks

نویسندگان

چکیده

Device and semi-device independent quantum randomness generators (DI- SDI-QRNGs) are crucial for applications requiring private randomness. However, they vulnerable to detection inefficiency attacks this limits severely their usage practical purposes. Here, we present a method protecting SDI-QRNGs in prepare-and-measure scenarios against attacks. The key idea is the introduction of blocking device that adds failures communication between preparation measurement devices. We prove that, any efficiency, there rate provides protection these experimentally demonstrate generation using weak coherent states standard avalanche photo-detectors.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Affine Detection Loophole in Quantum Data-Processing

Here is considered a specific detection loophole, that is relevant not only to testing of quantum nonlocality, but also to some other applications of quantum computations and communications. It is described by a simple affine relation between different quantum “data structures” like pure and mixed state, separable and inseparable one. It is shown also, that due to such relations imperfect devic...

متن کامل

Detection loophole attacks on semi-device-independent quantum and classical protocols

Semi-device-independent quantum protocols realize information tasks – e.g. secure key distribution, random access coding, and randomness generation – in a scenario where no assumption on the internal working of the devices used in the protocol is made, except their dimension. These protocols offer two main advantages: first, their implementation is often less demanding than fully-device-indepen...

متن کامل

CRT RSA Algorithm Protected Against Fault Attacks

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, we propose a new generic method of computing modular exponentiation and we prove its security in a realistic fault model. By construction, our pro...

متن کامل

Detection-loophole-free test of quantum nonlocality, and applications.

We present a source of entangled photons that violates a Bell inequality free of the "fair-sampling" assumption, by over 7 standard deviations. This violation is the first reported experiment with photons to close the detection loophole, and we demonstrate enough "efficiency" overhead to eventually perform a fully loophole-free test of local realism. The entanglement quality is verified by maxi...

متن کامل

Security Against Related Randomness Attacks via Reconstructive Extractors

This paper revisits related randomness attacks against public key encryption schemes as introduced by Paterson, Schuldt and Sibborn (PKC 2014). We present a general transform achieving security for public key encryption in the related randomness setting using as input any secure public key encryption scheme in combination with an auxiliaryinput reconstructive extractor. Specifically, we achieve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantum Information Processing

سال: 2021

ISSN: ['1573-1332', '1570-0755']

DOI: https://doi.org/10.1007/s11128-020-02948-3