Device-independent randomness expansion against quantum side information
暂无分享,去创建一个
Roger Colbeck | Yang Liu | Jian-Wei Pan | Sammy Ragy | Si-Ran Zhao | Jingyun Fan | Jun Zhang | Wen-Zhao Liu | Ming-Han Li | Qiang Zhang | Bing Bai | Peter J. Brown | Peter J. Brown | Jian-Wei Pan | Yang Liu | Qiang Zhang | Jun Zhang | R. Colbeck | Sammy Ragy | Jingyun Fan | Ming-Han Li | Wen-Zhao Liu | B. Bai | Si-Ran Zhao
[1] L. Schmetterer. Zeitschrift fur Wahrscheinlichkeitstheorie und Verwandte Gebiete. , 1963 .
[2] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[3] Physical Review Letters 63 , 1989 .
[4] Mamoru Hoshi,et al. Interval algorithm for random number generation , 1997, IEEE Trans. Inf. Theory.
[5] Thomas de Quincey. [C] , 2000, The Works of Thomas De Quincey, Vol. 1: Writings, 1799–1820.
[6] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[7] M. Ben-Or,et al. General Security Definition and Composability for Quantum & Classical Protocols , 2004, quant-ph/0409062.
[8] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[9] Robert König,et al. The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.
[10] Roger Colbeck,et al. Quantum And Relativistic Protocols For Secure Multi-Party Computation , 2009, 0911.3814.
[11] Stefano Pironio,et al. Random numbers certified by Bell’s theorem , 2009, Nature.
[12] Marco Tomamichel,et al. Duality Between Smooth Min- and Max-Entropies , 2009, IEEE Transactions on Information Theory.
[13] Robert König,et al. Sampling of Min-Entropy Relative to Quantum Knowledge , 2007, IEEE Transactions on Information Theory.
[14] Serge Fehr,et al. Security and Composability of Randomness Expansion from Bell Inequalities , 2011, ArXiv.
[15] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[16] Adrian Kent,et al. Private randomness expansion with untrusted devices , 2010, 1011.4474.
[17] Umesh V. Vazirani,et al. Certifiable quantum dice: or, true random number generation secure against quantum adversaries , 2012, STOC '12.
[18] Roger Colbeck,et al. Free randomness can be amplified , 2011, Nature Physics.
[19] Andrey M. Zubkov,et al. A full proof of universal inequalities for the distribution function of the binomial law , 2012 .
[20] Adrian Kent,et al. Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.
[21] Renato Renner,et al. Cryptographic security of quantum key distribution , 2014, ArXiv.
[22] Yaoyun Shi,et al. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices , 2014, STOC.
[23] Matthew Coudron,et al. Infinite randomness expansion with a constant number of devices , 2014, STOC.
[24] 이화영. X , 1960, Chinese Plants Names Index 2000-2009.
[25] S. Wehner,et al. Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres , 2015, Nature.
[26] Robert W. Spekkens,et al. Quantum Theory: Informational Foundations and Foils , 2015, 1805.11483.
[27] A. Zeilinger,et al. Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.
[28] Omar Fawzi,et al. Entropy Accumulation , 2016, Communications in Mathematical Physics.
[29] Antonio Acín,et al. Certified randomness in quantum physics , 2016, Nature.
[30] E. Knill,et al. A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).
[31] Rourab Paul,et al. NIST Statistical Test Suite , 2016 .
[32] Thomas Vidick,et al. Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.
[33] Miguel Herrero-Collantes,et al. Quantum random number generators , 2016, 1604.03304.
[34] H. Weinfurter,et al. Event-Ready Bell Test Using Entangled Atoms Simultaneously Closing Detection and Locality Loopholes. , 2016, Physical review letters.
[35] Yaoyun Shi,et al. N ov 2 01 4 Universal security for randomness expansion , 2014 .
[36] Xiongfeng Ma,et al. High speed device-independent quantum random number generation without detection loophole , 2017, 2018 Conference on Lasers and Electro-Optics (CLEO).
[37] Alan Mink,et al. Experimentally generated randomness certified by the impossibility of superluminal signals , 2018, Nature.
[38] Yang Liu,et al. Test of Local Realism into the Past without Detection and Locality Loopholes. , 2018, Physical review letters.
[39] Yang Liu,et al. Device-independent quantum random-number generation , 2018, Nature.
[40] Le Phuc Thinh,et al. Randomness Extraction from Bell Violation with Continuous Parametric Down-Conversion. , 2018, Physical review letters.
[41] Omar Fawzi,et al. M ay 2 01 8 Entropy accumulation with improved second-order , 2018 .
[42] Emanuel Knill,et al. Quantum Probability Estimation for Randomness with Quantum Side Information , 2018, 1806.04553.
[43] S Wehner,et al. Towards a realization of device-independent quantum key distribution , 2018, Quantum Science and Technology.
[44] Omar Fawzi,et al. Entropy Accumulation With Improved Second-Order Term , 2018, IEEE Transactions on Information Theory.
[45] Roger Colbeck,et al. An adaptive framework for quantum-secure device-independent randomness expansion , 2018, 1810.13346.
[46] Carl A. Miller,et al. Experimental Low-Latency Device-Independent Quantum Randomness. , 2018, Physical review letters.
[47] P. Alam. ‘Z’ , 2021, Composites Engineering: An A–Z Guide.
[48] P. Alam,et al. H , 1887, High Explosives, Propellants, Pyrotechnics.
[49] P. Alam. ‘A’ , 2021, Composites Engineering: An A–Z Guide.
[50] P. Alam. ‘S’ , 2021, Composites Engineering: An A–Z Guide.