Results 11 to 20 of about 4,469 (136)
Device-independent bit commitment based on the CHSH inequality
Bit commitment and coin flipping occupy a unique place in the device-independent landscape, as the only device-independent protocols thus far suggested for these tasks are reliant on tripartite GHZ correlations.
N Aharon, S Massar, S Pironio, J Silman
doaj +2 more sources
Randomness in post-selected events
Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little ...
Le Phuc Thinh+4 more
doaj +3 more sources
Quantum violations in the Instrumental scenario and their relations to the Bell scenario [PDF]
The causal structure of any experiment implies restrictions on the observable correlations between measurement outcomes, which are different for experiments exploiting classical, quantum, or post-quantum resources. In the study of Bell nonlocality, these
Thomas Van Himbeeck+5 more
doaj +3 more sources
El cardenal argentino Eduardo Pironio (1920-1998) fue uno de los protagonistas de la Iglesia en América Latina durante el siglo XX. Su influencia en la renovación del catolicismo latinoamericano es indiscutible.
Federico Tavelli
doaj +1 more source
Simple and practical DIQKD security analysis via BB84-type uncertainty relations and Pauli correlation constraints [PDF]
According to the entropy accumulation theorem, proving the unconditional security of a device-independent quantum key distribution protocol reduces to deriving tradeoff functions, i.e., bounds on the single-round von Neumann entropy of the raw key as a ...
Michele Masini+2 more
doaj +1 more source
Device-independent quantum key distribution with asymmetric CHSH inequalities [PDF]
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if they observe sufficiently strong correlations.
Erik Woodhead+2 more
doaj +1 more source
El autor expone su mirada acerca de la importancia del estudio de la Teología para el cristiano, deteniéndose especialmente en la formación de los sacerdotes.
Eduardo Francisco Pironio
doaj +1 more source
An asymptotic threshold of sufficient randomness for causal inference
For sensitivity analysis with stochastic counterfactuals, we introduce a methodology to characterize uncertainty in causal inference from natural experiments. Our sensitivity parameters are standardized measures of variation in propensity and prognosis probabilities, and one minus their geometric mean is an intuitive measure of randomness in the data ...
Brian Knaeble+2 more
wiley +1 more source
Informationally restricted correlations: a general framework for classical and quantum systems [PDF]
We introduce new methods and tools to study and characterise classical and quantum correlations emerging from prepare-and-measure experiments with informationally restricted communication.
Armin Tavakoli+3 more
doaj +1 more source
Device-independent randomness generation with sublinear shared quantum resources [PDF]
In quantum cryptography, device-independent (DI) protocols can be certified secure without requiring assumptions about the inner workings of the devices used to perform the protocol.
Cédric Bamps+2 more
doaj +1 more source