Please use this identifier to cite or link to this item:
https://doi.org/10.1088/1367-2630/18/3/035007
Title: | Randomness in post-selected events | Authors: | Thinh L.P. Torre G.D.L. Bancal J.-D. Pironio S. Scarani V. |
Keywords: | Bells Data handling Asymptotic limits Bell test Bell-inequality violations Computational time Cryptographic applications device independent post-selection Quantum randomness Random processes |
Issue Date: | 2016 | Publisher: | Institute of Physics Publishing | Citation: | Thinh L.P., Torre G.D.L., Bancal J.-D., Pironio S., Scarani V. (2016). Randomness in post-selected events. New Journal of Physics 18 (3) : 35007. ScholarBank@NUS Repository. https://doi.org/10.1088/1367-2630/18/3/035007 | Abstract: | Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little randomness. This raises the question as to whether randomness can be extracted only from the smaller post-selected subset corresponding to proper detection events, instead of from the entire set of data. This could in principle be feasible without opening an analogue of the detection loophole as long as the min-entropy of the post-selected data is evaluated by taking all the information into account, including no-detection events. The possibility of extracting randomness from a short string has a practical advantage, because it reduces the computational time of the extraction. Here, we investigate the above idea in a simple scenario, where the devices and the adversary behave according to i.i.d. strategies. We show that indeed almost all the randomness is present in the pair of outcomes for which at least one detection happened. We further show that in some cases applying a pre-processing on the data can capture features that an analysis based on global frequencies only misses, thus resulting in the certification of more randomness. We then briefly consider non-i.i.d strategies and provide an explicit example of such a strategy that is more powerful than any i.i.d. one even in the asymptotic limit of infinitely many measurement rounds, something that was not reported before in the context of Bell inequalities. © 2016 IOP Publishing Ltd and Deutsche Physikalische Gesellschaft. | Source Title: | New Journal of Physics | URI: | https://scholarbank.nus.edu.sg/handle/10635/175260 | ISSN: | 1367-2630 | DOI: | 10.1088/1367-2630/18/3/035007 |
Appears in Collections: | Staff Publications Elements |
Show full item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_1088_1367-2630_18_3_035007.pdf | 912.39 kB | Adobe PDF | OPEN | None | View/Download |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.