Results 11 to 20 of about 4,469 (136)

Device-independent bit commitment based on the CHSH inequality

open access: yesNew Journal of Physics, 2016
Bit commitment and coin flipping occupy a unique place in the device-independent landscape, as the only device-independent protocols thus far suggested for these tasks are reliant on tripartite GHZ correlations.
N Aharon, S Massar, S Pironio, J Silman
doaj   +2 more sources

Randomness in post-selected events

open access: yesNew Journal of Physics, 2016
Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little ...
Le Phuc Thinh   +4 more
doaj   +3 more sources

Quantum violations in the Instrumental scenario and their relations to the Bell scenario [PDF]

open access: yesQuantum, 2019
The causal structure of any experiment implies restrictions on the observable correlations between measurement outcomes, which are different for experiments exploiting classical, quantum, or post-quantum resources. In the study of Bell nonlocality, these
Thomas Van Himbeeck   +5 more
doaj   +3 more sources

Gianni La Bella. Eduardo Francisco Pironio. Biografia di un cristiano latinoamericano. (Prefacio del Papa Francisco). Milán: Guerini e associati, 2023, 267 pp.

open access: yesRevista Teología
El cardenal argentino Eduardo Pironio (1920-1998) fue uno de los protagonistas de la Iglesia en América Latina durante el siglo XX. Su influencia en la renovación del catolicismo latinoamericano es indiscutible.
Federico Tavelli
doaj   +1 more source

Simple and practical DIQKD security analysis via BB84-type uncertainty relations and Pauli correlation constraints [PDF]

open access: yesQuantum, 2022
According to the entropy accumulation theorem, proving the unconditional security of a device-independent quantum key distribution protocol reduces to deriving tradeoff functions, i.e., bounds on the single-round von Neumann entropy of the raw key as a ...
Michele Masini   +2 more
doaj   +1 more source

Device-independent quantum key distribution with asymmetric CHSH inequalities [PDF]

open access: yesQuantum, 2021
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if they observe sufficiently strong correlations.
Erik Woodhead   +2 more
doaj   +1 more source

Teología Y Santidad

open access: yesDios y el Hombre, 2022
El autor expone su mirada acerca de la importancia del estudio de la Teología para el cristiano, deteniéndose especialmente en la formación de los sacerdotes.
Eduardo Francisco Pironio
doaj   +1 more source

An asymptotic threshold of sufficient randomness for causal inference

open access: yesStat, Volume 12, Issue 1, January/December 2023., 2023
For sensitivity analysis with stochastic counterfactuals, we introduce a methodology to characterize uncertainty in causal inference from natural experiments. Our sensitivity parameters are standardized measures of variation in propensity and prognosis probabilities, and one minus their geometric mean is an intuitive measure of randomness in the data ...
Brian Knaeble   +2 more
wiley   +1 more source

Informationally restricted correlations: a general framework for classical and quantum systems [PDF]

open access: yesQuantum, 2022
We introduce new methods and tools to study and characterise classical and quantum correlations emerging from prepare-and-measure experiments with informationally restricted communication.
Armin Tavakoli   +3 more
doaj   +1 more source

Device-independent randomness generation with sublinear shared quantum resources [PDF]

open access: yesQuantum, 2018
In quantum cryptography, device-independent (DI) protocols can be certified secure without requiring assumptions about the inner workings of the devices used to perform the protocol.
Cédric Bamps   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy