Security and Composability of Randomness Expansion from Bell Inequalities

The nonlocal behavior of quantum mechanics can be used to generate guaranteed fresh randomness from an untrusted device that consists of two nonsignalling components; since the generation process requires some initial fresh randomness to act as a catalyst, one also speaks of randomness expansion. R. Colbeck and A. Kent [J. Phys. A 44, 095305 (2011)] proposed the first method for generating randomness from untrusted devices, but without providing a rigorous analysis. This was addressed subsequently by S. Pironio et al. [Nature (London) 464, 1021 (2010)], who aimed at deriving a lower bound on the min-entropy of the data extracted from an untrusted device based only on the observed nonlocal behavior of the device. Although that article succeeded in developing important tools for reaching the stated goal, the proof itself contained a bug, and the given formal claim on the guaranteed amount of min-entropy needs to be revisited. In this paper we build on the tools provided by Pironio et al. and obtain a meaningful lower bound on the min-entropy of the data produced by an untrusted device based on the observed nonlocal behavior of the device. Our main result confirms the essence of the (improperly formulated) claims of Pironio et al. and puts them on solid ground. We also address the question of composability and show that different untrusted devices can be composed in an alternating manner under the assumption that they are not entangled. This enables superpolynomial randomness expansion based on two untrusted yet unentangled devices.

[1]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[2]  J. Bell On the Einstein-Podolsky-Rosen paradox , 1964 .

[3]  Robert König,et al.  The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.

[4]  U. Vazirani,et al.  Certifiable quantum dice , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[5]  Adrian Kent,et al.  Private randomness expansion with untrusted devices , 2010, 1011.4474.

[6]  R. Rosenfeld Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[7]  Stefano Pironio,et al.  Random numbers certified by Bell’s theorem , 2009, Nature.

[8]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .

[9]  Umesh V. Vazirani,et al.  Certifiable Quantum Dice - Or, testable exponential randomness expansion , 2011, 1111.6054.

[10]  G. D. Liveing,et al.  The University of Cambridge , 1897, British medical journal.

[11]  Stefano Pironio,et al.  Randomness versus nonlocality and entanglement. , 2011, Physical review letters.

[12]  Roger Colbeck,et al.  Prisoners of their own device: Trojan attacks on device-independent quantum cryptography , 2012 .

[13]  Adrian Kent,et al.  Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.

[14]  Armin Grün ETH Zurich, Switzerland , 2005 .

[15]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[16]  Stefano Pironio,et al.  Device-independent randomness expansion secure against quantum adversaries , 2011 .

[17]  A. Acín,et al.  Bounding the set of quantum correlations. , 2006, Physical review letters.

[18]  Axthonv G. Oettinger,et al.  IEEE Transactions on Information Theory , 1998 .

[19]  A. Acín,et al.  A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations , 2008, 0803.4290.

[20]  Stefano Pironio,et al.  Security of practical private randomness generation , 2011, 1111.6056.

[21]  Anindya De,et al.  Trevisan's Extractor in the Presence of Quantum Side Information , 2009, SIAM J. Comput..

[22]  Roger Colbeck,et al.  Quantum And Relativistic Protocols For Secure Multi-Party Computation , 2009, 0911.3814.

[23]  Joseph F. Traub,et al.  Algorithms and Complexity: New Directions and Recent Results , 1976 .