Device-independent randomness expansion against quantum side information

The ability to produce random numbers that are unknown to any outside party is crucial for many applications. Device-independent randomness generation (DIRNG) allows new randomness to be provably generated, without needing to trust the devices used for the protocol. This provides strong guarantees about the security of the output, but comes at the price of requiring the violation of a Bell inequality to implement. A further challenge is to make the bounds in the security proofs tight enough to allow expansion with contemporary technology. Thus, while randomness has been generated in recent experiments, the amount of randomness consumed in doing so has been too high to certify expansion based on existing theory. Here we present an experiment that demonstrates device-independent randomness expansion (DIRNE), i.e., where the generated randomness surpasses that consumed. By developing a loophole-free Bell test setup with a single photon detection efficiency of around 81% and exploiting a spot-checking protocol, we achieve a net gain of $2.63\times10^8$ certified bits with soundness error $5.74\times10^{-8}$. The experiment ran for 220 hours corresponding to an average rate of randomness generation of 8202 bits/s. By developing the Entropy Accumulation Theorem (EAT), we established security against quantum adversaries. We anticipate that this work will lead to further improvements that push device-independence towards commercial viability.

[1]  L. Schmetterer Zeitschrift fur Wahrscheinlichkeitstheorie und Verwandte Gebiete. , 1963 .

[2]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[3]  Physical Review Letters 63 , 1989 .

[4]  Mamoru Hoshi,et al.  Interval algorithm for random number generation , 1997, IEEE Trans. Inf. Theory.

[5]  Thomas de Quincey [C] , 2000, The Works of Thomas De Quincey, Vol. 1: Writings, 1799–1820.

[6]  Ran Canetti,et al.  Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.

[7]  M. Ben-Or,et al.  General Security Definition and Composability for Quantum & Classical Protocols , 2004, quant-ph/0409062.

[8]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[9]  Robert König,et al.  The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.

[10]  Roger Colbeck,et al.  Quantum And Relativistic Protocols For Secure Multi-Party Computation , 2009, 0911.3814.

[11]  Stefano Pironio,et al.  Random numbers certified by Bell’s theorem , 2009, Nature.

[12]  Marco Tomamichel,et al.  Duality Between Smooth Min- and Max-Entropies , 2009, IEEE Transactions on Information Theory.

[13]  Robert König,et al.  Sampling of Min-Entropy Relative to Quantum Knowledge , 2007, IEEE Transactions on Information Theory.

[14]  Serge Fehr,et al.  Security and Composability of Randomness Expansion from Bell Inequalities , 2011, ArXiv.

[15]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[16]  Adrian Kent,et al.  Private randomness expansion with untrusted devices , 2010, 1011.4474.

[17]  Umesh V. Vazirani,et al.  Certifiable quantum dice: or, true random number generation secure against quantum adversaries , 2012, STOC '12.

[18]  Roger Colbeck,et al.  Free randomness can be amplified , 2011, Nature Physics.

[19]  Andrey M. Zubkov,et al.  A full proof of universal inequalities for the distribution function of the binomial law , 2012 .

[20]  Adrian Kent,et al.  Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.

[21]  Renato Renner,et al.  Cryptographic security of quantum key distribution , 2014, ArXiv.

[22]  Yaoyun Shi,et al.  Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices , 2014, STOC.

[23]  Matthew Coudron,et al.  Infinite randomness expansion with a constant number of devices , 2014, STOC.

[24]  이화영 X , 1960, Chinese Plants Names Index 2000-2009.

[25]  S. Wehner,et al.  Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres , 2015, Nature.

[26]  Robert W. Spekkens,et al.  Quantum Theory: Informational Foundations and Foils , 2015, 1805.11483.

[27]  A. Zeilinger,et al.  Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.

[28]  Omar Fawzi,et al.  Entropy Accumulation , 2016, Communications in Mathematical Physics.

[29]  Antonio Acín,et al.  Certified randomness in quantum physics , 2016, Nature.

[30]  E. Knill,et al.  A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).

[31]  Rourab Paul,et al.  NIST Statistical Test Suite , 2016 .

[32]  Thomas Vidick,et al.  Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.

[33]  Miguel Herrero-Collantes,et al.  Quantum random number generators , 2016, 1604.03304.

[34]  H. Weinfurter,et al.  Event-Ready Bell Test Using Entangled Atoms Simultaneously Closing Detection and Locality Loopholes. , 2016, Physical review letters.

[35]  Yaoyun Shi,et al.  N ov 2 01 4 Universal security for randomness expansion , 2014 .

[36]  Xiongfeng Ma,et al.  High speed device-independent quantum random number generation without detection loophole , 2017, 2018 Conference on Lasers and Electro-Optics (CLEO).

[37]  Alan Mink,et al.  Experimentally generated randomness certified by the impossibility of superluminal signals , 2018, Nature.

[38]  Yang Liu,et al.  Test of Local Realism into the Past without Detection and Locality Loopholes. , 2018, Physical review letters.

[39]  Yang Liu,et al.  Device-independent quantum random-number generation , 2018, Nature.

[40]  Le Phuc Thinh,et al.  Randomness Extraction from Bell Violation with Continuous Parametric Down-Conversion. , 2018, Physical review letters.

[41]  Omar Fawzi,et al.  M ay 2 01 8 Entropy accumulation with improved second-order , 2018 .

[42]  Emanuel Knill,et al.  Quantum Probability Estimation for Randomness with Quantum Side Information , 2018, 1806.04553.

[43]  S Wehner,et al.  Towards a realization of device-independent quantum key distribution , 2018, Quantum Science and Technology.

[44]  Omar Fawzi,et al.  Entropy Accumulation With Improved Second-Order Term , 2018, IEEE Transactions on Information Theory.

[45]  Roger Colbeck,et al.  An adaptive framework for quantum-secure device-independent randomness expansion , 2018, 1810.13346.

[46]  Carl A. Miller,et al.  Experimental Low-Latency Device-Independent Quantum Randomness. , 2018, Physical review letters.

[47]  P. Alam ‘Z’ , 2021, Composites Engineering: An A–Z Guide.

[48]  P. Alam,et al.  H , 1887, High Explosives, Propellants, Pyrotechnics.

[49]  P. Alam ‘A’ , 2021, Composites Engineering: An A–Z Guide.

[50]  P. Alam ‘S’ , 2021, Composites Engineering: An A–Z Guide.