Results 21 to 30 of about 4,651 (153)
Randomness in post-selected events
Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little ...
Le Phuc Thinh+4 more
doaj +3 more sources
Bounding the Plausibility of Physical Theories in a Device-Independent Setting via Hypothesis Testing [PDF]
The device-independent approach to physics is one where conclusions about physical systems (and hence of Nature) are drawn directly and solely from the observed correlations between measurement outcomes.
Yeong-Cherng Liang, Yanbao Zhang
doaj +2 more sources
Quantum violations in the Instrumental scenario and their relations to the Bell scenario [PDF]
The causal structure of any experiment implies restrictions on the observable correlations between measurement outcomes, which are different for experiments exploiting classical, quantum, or post-quantum resources. In the study of Bell nonlocality, these
Thomas Van Himbeeck+5 more
doaj +3 more sources
Device-Independent Quantum Key Distribution Based on Routed Bell Tests
Photon losses are the main obstacle to fully photonic implementations of device-independent quantum key distribution (DIQKD). Motivated by recent work showing that routed Bell scenarios offer increased robustness to detection inefficiencies for the ...
Tristan Le Roy-Deloison+3 more
doaj +2 more sources
El cardenal argentino Eduardo Pironio (1920-1998) fue uno de los protagonistas de la Iglesia en América Latina durante el siglo XX. Su influencia en la renovación del catolicismo latinoamericano es indiscutible.
Federico Tavelli
doaj +1 more source
Simple and practical DIQKD security analysis via BB84-type uncertainty relations and Pauli correlation constraints [PDF]
According to the entropy accumulation theorem, proving the unconditional security of a device-independent quantum key distribution protocol reduces to deriving tradeoff functions, i.e., bounds on the single-round von Neumann entropy of the raw key as a ...
Michele Masini+2 more
doaj +1 more source
An asymptotic threshold of sufficient randomness for causal inference
For sensitivity analysis with stochastic counterfactuals, we introduce a methodology to characterize uncertainty in causal inference from natural experiments. Our sensitivity parameters are standardized measures of variation in propensity and prognosis probabilities, and one minus their geometric mean is an intuitive measure of randomness in the data ...
Brian Knaeble+2 more
wiley +1 more source
Informationally restricted correlations: a general framework for classical and quantum systems [PDF]
We introduce new methods and tools to study and characterise classical and quantum correlations emerging from prepare-and-measure experiments with informationally restricted communication.
Armin Tavakoli+3 more
doaj +1 more source
Random numbers certified by Bell’s theorem [PDF]
Randomness is a fundamental feature of nature and a valuable resource for applications ranging from cryptography and gambling to numerical simulation of physical and biological systems.
Stefano Pironio+10 more
semanticscholar +1 more source
Device-independent security of quantum cryptography against collective attacks. [PDF]
We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate ...
A. Acín+5 more
semanticscholar +1 more source