메뉴 건너뛰기




Volumn 87, Issue 1, 2013, Pages

Security of practical private randomness generation

Author keywords

[No Author keywords available]

Indexed keywords

BELL INEQUALITIES; DEVICE INDEPENDENCE; ENTANGLED QUANTUM SYSTEMS; LAY-OUT; MEASURED SYSTEM; QUANTUM DEVICE; RANDOM NUMBERS; RANDOM SEEDS; SIDE INFORMATION; THEORETICAL FRAMEWORK;

EID: 84873172592     PISSN: 10502947     EISSN: 10941622     Source Type: Journal    
DOI: 10.1103/PhysRevA.87.012336     Document Type: Article
Times cited : (149)

References (51)
  • 5
    • 75749110605 scopus 로고    scopus 로고
    • OPLEDP 0146-9592 10.1364/OL.35.000312
    • B. Qi, Y.-M. Chi, H.-K. Lo, and L. Qian, Opt. Lett. OPLEDP 0146-9592 10.1364/OL.35.000312 35, 312 (2010).
    • (2010) Opt. Lett. , vol.35 , pp. 312
    • Qi, B.1    Chi, Y.-M.2    Lo, H.-K.3    Qian, L.4
  • 7
    • 77952020607 scopus 로고    scopus 로고
    • OPEXFF 1094-4087 10.1364/OE.18.009351
    • M. A. Wayne and P. G. Kwiat, Opt. Express OPEXFF 1094-4087 10.1364/OE.18.009351 18, 9351 (2010).
    • (2010) Opt. Express , vol.18 , pp. 9351
    • Wayne, M.A.1    Kwiat, P.G.2
  • 8
    • 62349115065 scopus 로고    scopus 로고
    • in edited by Ç Koç (Springer, New York
    • W. Schindler, in Cryptographic Engineering, edited by, Ç Koç, (Springer, New York, 2009), p. 25.
    • (2009) Cryptographic Engineering , pp. 25
    • Schindler, W.1
  • 10
    • 0037141032 scopus 로고    scopus 로고
    • PYLAAG 0375-9601 10.1016/S0375-9601(02)00438-3
    • A. Valentini, Phys. Lett. A PYLAAG 0375-9601 10.1016/S0375-9601(02)00438- 3 297, 273 (2002).
    • (2002) Phys. Lett. A , vol.297 , pp. 273
    • Valentini, A.1
  • 11
    • 27144477301 scopus 로고    scopus 로고
    • No signaling and quantum key distribution
    • DOI 10.1103/PhysRevLett.95.010503, 010503
    • J. Barrett, L. Hardy, and A. Kent, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.95.010503 95, 010503 (2005). (Pubitemid 41506418)
    • (2005) Physical Review Letters , vol.95 , Issue.1 , pp. 1-4
    • Barrett, J.1    Hardy, L.2    Kent, A.3
  • 13
    • 84873175000 scopus 로고    scopus 로고
    • Ph.D. dissertation, University of Cambridge
    • R. Colbeck, Ph.D. dissertation, University of Cambridge, 2007.
    • (2007)
    • Colbeck, R.1
  • 14
    • 79951824304 scopus 로고    scopus 로고
    • 1751-8113 10.1088/1751-8113/44/9/095305
    • R. Colbeck and A. Kent, J. Phys. A 1751-8113 10.1088/1751-8113/44/9/ 095305 44, 095305 (2011).
    • (2011) J. Phys. A , vol.44 , pp. 095305
    • Colbeck, R.1    Kent, A.2
  • 15
    • 77951110792 scopus 로고    scopus 로고
    • NATUAS 0028-0836 10.1038/nature09008
    • S. Pironio, Nature (London) NATUAS 0028-0836 10.1038/nature09008 464, 1021 (2010).
    • (2010) Nature (London) , vol.464 , pp. 1021
    • Pironio, S.1
  • 16
    • 0343152990 scopus 로고
    • PRLTAO 0031-9007 10.1103/PhysRevLett.67.661
    • A. K. Ekert, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.67.661 67, 661 (1991).
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661
    • Ekert, A.K.1
  • 18
    • 33748942504 scopus 로고    scopus 로고
    • From Bell's theorem to secure quantum key distribution
    • DOI 10.1103/PhysRevLett.97.120405
    • A. Acín, N. Gisin, and L. Masanes, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.97.120405 97, 120405 (2006). (Pubitemid 44434927)
    • (2006) Physical Review Letters , vol.97 , Issue.12 , pp. 120405
    • Acin, A.1    Gisin, N.2    Masanes, L.3
  • 24
    • 84873182077 scopus 로고    scopus 로고
    • Specifically, the problem lies with Eqs. (3) and (A9) of the Supplementary Information of Ref. and with the final steps leading to these equations.
    • Specifically, the problem lies with Eqs. (3) and (A9) of the Supplementary Information of Ref. and with the final steps leading to these equations.
  • 25
    • 84873157979 scopus 로고    scopus 로고
    • PLRAAN 1050-2947 10.1103/PhysRevA.87.012335
    • S. Fehr, R. Gelles, and C. Schaffner, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.87.012335 87, 012335 (2013).
    • (2013) Phys. Rev. A , vol.87 , pp. 012335
    • Fehr, S.1    Gelles, R.2    Schaffner, C.3
  • 27
    • 84873101988 scopus 로고    scopus 로고
    • Note that previous versions of these results claimed security against quantum side information, but both proofs were incorrect.
    • Note that previous versions of these results claimed security against quantum side information, but both proofs were incorrect.
  • 31
    • 78650161554 scopus 로고    scopus 로고
    • NJOPFM 1367-2630 10.1088/1367-2630/12/11/113026
    • F. Xu, B. Qi, and H.-K. Lo, New J. Phys. NJOPFM 1367-2630 10.1088/1367-2630/12/11/113026 12, 113026 (2010).
    • (2010) New J. Phys. , vol.12 , pp. 113026
    • Xu, F.1    Qi, B.2    Lo, H.-K.3
  • 32
    • 84873187462 scopus 로고    scopus 로고
    • Note in particular that it is highly unlikely that the attack reported in Ref. would spontaneously occur in nonmalicious devices.
    • Note in particular that it is highly unlikely that the attack reported in Ref. would spontaneously occur in nonmalicious devices.
  • 33
    • 84873159757 scopus 로고    scopus 로고
    • HotBits: Genuine random numbers, generated by radioactive decay
    • HotBits: Genuine random numbers, generated by radioactive decay, http://www.fourmilab.ch/hotbits.
  • 34
    • 84873192752 scopus 로고    scopus 로고
    • Random.org
    • Random.org, http://www.random.org.
  • 35
    • 84873198760 scopus 로고    scopus 로고
    • entropypool and entropy filter
    • entropypool and entropy filter, http://random.hd.org/index.html.
  • 38
    • 84873208463 scopus 로고    scopus 로고
    • Note that the definition of (classical) extractors does not usually involve side information, but the definition given here and the conventional one can be shown to be essentially equivalent.
    • Note that the definition of (classical) extractors does not usually involve side information, but the definition given here and the conventional one can be shown to be essentially equivalent.
  • 39
    • 84858033972 scopus 로고    scopus 로고
    • PRLTAO 0031-9007 10.1103/PhysRevLett.108.100402
    • A. Acin, S. Massar, and S. Pironio, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.108.100402 108, 100402 (2012).
    • (2012) Phys. Rev. Lett. , vol.108 , pp. 100402
    • Acin, A.1    Massar, S.2    Pironio, S.3
  • 40
    • 33846400098 scopus 로고    scopus 로고
    • Bounding the set of quantum correlations
    • DOI 10.1103/PhysRevLett.98.010401
    • M. Navascués, S. Pironio, and A. Acín, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.98.010401 98, 010401 (2007); (Pubitemid 46135119)
    • (2007) Physical Review Letters , vol.98 , Issue.1 , pp. 010401
    • Navascues, M.1    Pironio, S.2    Acin, A.3
  • 41
    • 47349117564 scopus 로고    scopus 로고
    • NJOPFM 1367-2630 10.1088/1367-2630/10/7/073013
    • M. Navascués, S. Pironio, and A. Acín, New J. Phys. NJOPFM 1367-2630 10.1088/1367-2630/10/7/073013 10, 073013 (2008).
    • (2008) New J. Phys. , vol.10 , pp. 073013
    • Navascués, M.1    Pironio, S.2    Acín, A.3
  • 43
    • 84873191367 scopus 로고    scopus 로고
    • This is the novel ingredient that fixes the issue in Ref..
    • This is the novel ingredient that fixes the issue in Ref..
  • 49
    • 84873156354 scopus 로고    scopus 로고
    • Note, however, that even in a trusted provider situation, condition may fail if the adversary can modify the behavior of the devices by controlling external parameters such as the power supply of the devices.
    • Note, however, that even in a trusted provider situation, condition may fail if the adversary can modify the behavior of the devices by controlling external parameters such as the power supply of the devices.
  • 50
    • 84871796284 scopus 로고    scopus 로고
    • PRLTAO 0031-9007 10.1103/PhysRevLett.110.010503
    • J. Barrett, R. Colbeck, and A. Kent, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.110.010503 110, 010503 (2013).
    • (2013) Phys. Rev. Lett. , vol.110 , pp. 010503
    • Barrett, J.1    Colbeck, R.2    Kent, A.3
  • 51
    • 39849104298 scopus 로고    scopus 로고
    • The bounded-storage model in the presence of a quantum adversary
    • DOI 10.1109/TIT.2007.913245
    • R. Koenig and B. Terhal, IEEE Trans. Inf. Theory 0018-9448 10.1109/TIT.2007.913245 54, 749 (2008). (Pubitemid 351314663)
    • (2008) IEEE Transactions on Information Theory , vol.54 , Issue.2 , pp. 749-762
    • Konig, R.T.1    Terhal, B.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.