Security and composability of randomness expansion from Bell inequalities

Serge Fehr, Ran Gelles, Christian Schaffner

Research output: Contribution to journalArticlepeer-review

65 Scopus citations

Abstract

The nonlocal behavior of quantum mechanics can be used to generate guaranteed fresh randomness from an untrusted device that consists of two nonsignalling components; since the generation process requires some initial fresh randomness to act as a catalyst, one also speaks of randomness expansion. R. Colbeck and A. Kent [J. Phys. A1751-811310.1088/1751-8113/44/9/095305 44, 095305 (2011)] proposed the first method for generating randomness from untrusted devices, but without providing a rigorous analysis. This was addressed subsequently by S. Pironio, who aimed at deriving a lower bound on the min-entropy of the data extracted from an untrusted device based only on the observed nonlocal behavior of the device. Although that article succeeded in developing important tools for reaching the stated goal, the proof itself contained a bug, and the given formal claim on the guaranteed amount of min-entropy needs to be revisited. In this paper we build on the tools provided by Pironio and obtain a meaningful lower bound on the min-entropy of the data produced by an untrusted device based on the observed nonlocal behavior of the device. Our main result confirms the essence of the (improperly formulated) claims of Pironio and puts them on solid ground. We also address the question of composability and show that different untrusted devices can be composed in an alternating manner under the assumption that they are not entangled. This enables superpolynomial randomness expansion based on two untrusted yet unentangled devices.

Original languageEnglish
Article number012335
JournalPhysical Review A - Atomic, Molecular, and Optical Physics
Volume87
Issue number1
DOIs
StatePublished - 30 Jan 2013
Externally publishedYes

Fingerprint

Dive into the research topics of 'Security and composability of randomness expansion from Bell inequalities'. Together they form a unique fingerprint.

Cite this