Skip to main content
NIST Author Manuscripts logoLink to NIST Author Manuscripts
. Author manuscript; available in PMC: 2019 May 9.
Published in final edited form as: Phys Rev A (Coll Park). 2018;97:10.1103/PhysRevA.97.032324. doi: 10.1103/PhysRevA.97.032324

Local Randomness: Examples and Application*

Honghao Fu 1, Carl A Miller 1,2
PMCID: PMC6508616  NIHMSID: NIHMS971681  PMID: 31080937

Abstract

When two players achieve a superclassical score at a nonlocal game, their outputs must contain intrinsic randomness. This fact has many useful implications for quantum cryptography. Recently it has been observed (C. Miller, Y. Shi, Quant. Inf. & Comp. 17, pp. 0595-0610, 2017) that such scores also imply the existence of local randomness — that is, randomness known to one player but not to the other. This has potential implications for cryptographic tasks between two cooperating but mistrustful players. In the current paper we bring this notion toward practical realization, by offering a near-optimal bound on local randomness for the CHSH game, and also proving the security of a cryptographic application of local randomness (single-bit certified deletion).


Device-independent quantum cryptography [8, 10] is based on the observation that any Bell inequality violation guarantees the existence of intrinsic randomness. In particular, the outputs of such an inequality are known to be unpredictable to an arbitrary adversary. Work in this field over more than a decade has culminated in recent proofs of security for quantum key distribution and randomness expansion that are immune to any errors in quantum hardware [22, 23, 11, 13, 7, 5].

It has more recently been observed [12] that when two spatially separated parties violate a Bell inequality, then the outputs of either player must contain some unpredictability to the other player. Whereas global randomness (randomness possessed by both parties) is useful in cryptographic tasks in which two players are cooperating, local randomness (randomness possessed by one party and unknown to the other) is potentially useful in cryptographic settings where the parties are interacting but do not trust one another. This invites an exploration of quantum cryptographic protocols that are immunized both against imperfections in the quantum hardware and (possibly coordinated) cheating by one of the players.

Suppose that a nonlocal game G with complete support1 is played by two players, Alice and Bob, where Alice’s input and output alphabets are A and X, respectively, and Bob’s input and output alphabets are B and Y, respectively. A referee chooses an input pair (a, b) according to a fixed distribution and distributes a to Alice and b to Bob, who return x and y respectively. The results of [12] assert that if the expected score of Alice and Bob’s strategy exceeds the best possible classical score by, then Bob will not be able to guess Alice’s output with probability better than (1 − ΩG(ε2)), even if he were given Alice’s input. In other words, the pair (a, x) is necessarily more random to Bob than the input letter a alone. This is an example of blind randomness expansion, where the word “blind” is used because one player is blind to the randomness generated by the other. (This can be compared to the notion of “bound randomness” in the three-party setting of [1].)

The results of [12] are highly general but numerically weak. The goals of the current paper are (1) to demonstrate techniques that prove numerically strong bounds on local randomness, and (2) to demonstrate the power of local randomness by proving security for a specific application (one-shot certified deletion). Our study is focused on two example games, the CHSH game and the Magic Square game.

Sections 1–3 review some necessary background and then outline the Navascues-Pironio-Acin (NPA) hierarchy [14], which has been previously used to prove lower bounds on global randomness [15]. The key difference in the case of local randomness is that we must bound the behavior of a party (Bob) who is making two sequential measurements on a single system, rather than a single measurements on two separated systems as in the case of global randomness. Fortunately, the NPA hierarchy can be adapted to handle sequential measurements, as observed in [6, 16]. Using such an adapted approach, we compute a function F such that any superclassical score of s at the CHSH game guarantees that Bob cannot recover Alice’s output with probability greater than F (s). The function F that we obtain is shown to be optimal within a margin of 0.02. (See Figure 1).

Figure 1.

Figure 1

Plot of the upper bound of P2 against P1 ∈ (0.75, 0.85).

A downside of the CHSH game is that, even when a perfectly optimal strategy is used by Alice and Bob, Bob still has approximately an 85% chance of guessing Alice’s output bit. For some cryptographic purposes it is more useful for the player to have a bit that approximates a perfect coin flip. In Section 4 we study the Magic Square game. This game is large enough that is computationally difficult to apply the methods from Sections 2–3, and so instead we apply the notion of quantum rigidity, which asserts that certain nonlocal games have unique winning strategies. It was recently shown that the Magic Square game [25] is rigid. We build off of the proof in [25] to show that in any strategy for Magic Square which achieves an expected score of 1 – ε, Alice obtains a bit that Bob cannot guess with probability greater than 1/2+O(ε). (See Corollary 3.)

Lastly, in Section 5 we provide an initial application of device-independent local randomness by showing that it enables single-bit certified deletion. In this cryptographic problem, Bob possesses an encrypted bit m which could be read with a key, k, possessed only by Alice, and the goal is for Alice and Bob to interact through classical communication only so that Bob can certifiably delete his copy of m. The resulting deleted state must be unreadable even if Bob were to later learn k. We prove that any multi-use device that performs well at the Magic Square game can be used for certified deletion. A formal statement is given in Theorem 4. Roughly, the probability that Bob can recover the bit m after deletion is shown to be no more than 12+O(ε), where ε denotes the average probability that the device loses the Magic Square game, and the probability that Bob can recover m before deletion is 1 − O(ε).

Our result can be compared to other cryptographic tasks for mistrustful parties in the device-independent setting. Coin-flipping and bit commitment have been proven in the device-independent setting [19, 4, 3] with constant (rather than vanishing) bias. Also, strong cryptographic primitives have been proven under additional assumptions such as limited quantum storage [9, 18, 17] and relativistic assumptions [2]. Exploring the upper limits of device-independence in the mistrustful setting appears to be an interesting open problem.

1 Preliminaries

In this section, we introduce the concepts that formally define nonlocal games and related notations used through out this paper, starting with the definition of a 2-player correlation.

Our notation follows [12]. A 2-player (input-output) correlation is a vector (P (xy|ab)) of nonnegative reals, indexed by a,b,x,yA×B×X×Y, satisfying xyP(xy|ab)=1 for all pairs (a, b). We denote by A the set of all inputs to Alice and by B the set of all inputs to Bob. The output sets are denoted by X and Y for Alice and Bob, respectively. The correlation should satisfy the no-signaling condition, which is that the quantities

P(x|a):=yP(xy|ab),P(y|b):=xP(xy|ab) (1)

are independent of b and a, respectively.

A 2-player game is a pair (q, H) where

q:A×B[0,1] (2)

is a probability distribution and

H:A×B×X×Y[0,1] (3)

is a function. If q(a, b) ≠ 0 for all aA and bB, the game is said to have a complete support. The expected score associated to such a game for a 2-player correlation (P(xy|ab)) is

a,b,x,yq(a,b)H(a,b,x,y)P(xy|ab). (4)

We extend the notation by writing q(a)=bq(a,b),q(b)=aq(a,b).

A 2-player strategy is a 5-tuple

Γ=(D,E,{{Aax}x}a,{{Bby}y}b,Ψ) (5)

such that D, E are finite dimensional Hilbert spaces, {{Aax}x}a is a family of X-valued positive operator valued measures (POVMs) on D (indexed by A), {{Bby}y}b is a family of Y-valued positive operator valued measures on E, and Ψ is a density operator on DE. In this paper, we assume without loss of generality that Ψ is pure, written as Ψ = 〉 〈ψ|, and that the operators Aax and Bby are all projectors. We say that the strategy Γ achieves the 2-player correlation (P (xy|ab)) if P (xy|ab) = Tr[Ψ(AaxBby)] for all a, b, x, y.

2 Navascues-Pironio-Acin hierarchy

The Navascues-Pironio-Acin hierarchy, or NPA hierarchy, was introduced to characterize quantum correlations. We briefly sketch the idea behind the hierarchy and refer the reader to [14] for the formal treatment. The NPA hierarchy is an infinite series of conditions which must be satisfied by any quantum correlation.

In the measurement scenario, we assume Alice and Bob share state |ψ〉 and will apply some measurements determined by the inputs. For compatibility with [14], we use a different notation in this section and assume that each output letter is associated to a unique input letter — i.e., each output letter xX is uniquely associated to a single input A(x). If Alice is given input a, then her only valid outputs are those for which A(x) = a.

A behavior P in this measurement scenario is a set of nonnegative values such that xA1(a),yB1(b)P(x,y)=1 for any aA, bB. (This is essentially the same as a correlation, but more simply expressed.) The definition of a quantum behavior is as follows.

Definition 1

A behavior P is a quantum behavior if there exists a pure state 〉 in a Hilbert space H, a set of measurement operators {Ex:xX} for Alice, and a set of measurement operators {Ey:yY} for Bob, such that xX and yY

P(x,y)=ψ|ExEy|ψ, (6)

with the measurement operators E satisfying

  1. Ex=Ex and Ey=Ey,

  2. ExEx¯=δxx¯ExifA(x)=A(x¯) and EyEy¯=δyy¯EyifB(y)=B(y¯),

  3. xA1(a)Ex=I and yB1(b)Ey=I for all a, and

  4. [Ex, Ey] = 0.

The set of all the quantum behaviors is denoted by Q.

The first three properties ensure that the operators Ex and Ey are projectors and define proper measurements. The fourth property ensures that the measurements by Alice and Bob do not interfere with one another. This definition is similar to the definition of a quantum correlation, but is based on commutativity rather than bipartiteness. Under these definitions, every quantum correlation yields a quantum behavior (i.e., by setting Ex=AaxI, Ey=IBby) but not necessarily vice versa [20].

The idea of the hierarchy is that if we let O be any finite set of operators that can be expressed as finite products of elements of the set {Ex}x ∪ {Ey}y (for example, Ex or ExEy Ey′), then the matrix Γ given by

Γij=ψ|OiOj|ψ (7)

where Oi, Oj vary over the elements of O, must be positive semidefinite. Additionally, there are some independent equalities (which depend on the setting) which must be satisfied by the entries of Γ.

We define a sequence of such matrices (certificates) as follows. Since some of the Oi’s can be expressed in multiple ways as products of operators from {Ex}x ∪ {Ey}y, we define the length of the operator to be the minimum number of projectors needed to generate it. For any k ≥ 1, the kth certificate matrix Γ(k) is the matrix associated to the set O of all operators of length at most k. The fact that Γ(k) must be positive semidefinite constrains the possible entries in Γ(k), and in particular constrains the values P (x, y) = 〈ψ | ExEy | ψ〉 which can occur in a quantum behavior. Thus we obtain a hierarchy of constraints on the set of all quantum behaviors.

Measuring the amount of local randomness after a nonlocal game is not as simple as constraining quantum behaviors (Definition 1) since in particular, measurements that Bob uses to guess Alice’s output may not commute with the the measurements he used to play the game. Fortunately, the NPA hierarchy can also be adapted to scenarios which involve sequential measurements [6, 16]. In the next section, we apply an adaptation of the NPA hierarchy to study local randomness for the CHSH game.

3 Local randomness from the NPA hierarchy

The goal of this section is to derive an upper bound on Bob’s probability of guessing Alice’s after playing the CHSH game with her. First, Alice gets input aA and outputs xX. Bob gets input bB and outputs yY. Then, Bob gets Alice’s input a and outputs xX.

As usual, we assume that Alice and Bob share some pure state |ψ〉. Alice’s projective measurement for input a and output x is Aax. Similarly, the projective measurement operator for input b and output y is Bby.

The winning probability of the CHSH game is

P1=1/4(Pr(00|00)+Pr(11|00)+Pr(00|01)+Pr(11|01)+Pr(00|10)+Pr(11|10)+Pr(01|11)+Pr(10|11)), (8)

where Pr(xy|ab) = 〈ψ|AaxBby〉. Since for any input a and b, Aa1=IAa0 and Ba1=IBb0, we can express P1 in terms of the projectors as

P1=ψ|(3412A0012B00+12A00B00+12A00B10+12A10B0012A10B10)|ψ. (9)

When Bob wants to guess Alice’s output x given a and b, the probability that he can guess correctly is

P2=1/4b,y(Pr(0y0|0b)+Pr(1y1|0b)+Pr(0y0|1b)+Pr(1y1|1b)) (10)

where

Pr(xyz|ab)=ψ|AaxBbyBabxBabxBbyAax|ψ=ψ|AaxBbyBabxBby|ψ. (11)

The measurement {{Babx}x}ab is a set of measurements indexed by (a,b)A×B,2 The two measurements {{Bby}y}b and {{Babx}x}ab commute with {{Aax}x}a.

The probability P2 can be expressed in terms of the projectors as

P2=14ψ|S|ψ (12)

where

14S=I12(A00+A10)14(B000+B010+B100+B110)+12(A00B000+A00B010+A10B100+A10B110)+14(B00B000+B000B00+B10B010+B010B10+B00B100+B100B00+B10B110+B110B10)12(A00B00B000+A00B000B00+B00B000B00)12(A00B10B010+A00B010B10+B10B010B10)12(A10B00B100+A10B100B00+B00B100B00)12(A10B10B110+A10B110B10+B10B110B10)+A00B00B000B00+A00B10B010B10+A10B00B100B00+A10B10B110B10. (13)

Here we use the relation Bab1=IBab0 as well.

To derive the semidefinite programming instance, the constraints include the expression of P1 and the commutation relations. We use the third-order certificate to maximize P2 for a given P1 and get the following plot.

The data points from left to right are 1.0115, 0.995645, 0.977018, 0.95783, 0.938371, 0.918742, 0.898992, 0.879149 and 0.859229. The plot above is an upper bound on Bob’s guessing probability. In order to determine how close it is to the actual guessing probability, we will next find a lower bound of the guessing probability.

First note that the optimal strategy for CHSH involves Alice and Bob sharing a Bell state |Φ+=12(|00+|11), and Alice performing the X or Z measurement when her input is 0 or 1, respectively, and Bob performing the (X+Z)/2 or (XZ)/2 measurement when his input is 0 or 1, respectively. This strategy achieves a score of 12+24 at CHSH, and moreover Bob can guess Alice’s output given her input with probability 12+24, by simply guessing x ⊕ (ab).

Consider the scenario where Alice and Bob share a random coin R. With probability r or 1 − r, the coin R has value 0 or 1, respectively. If R = 0, then Alice and Bob always output 0, and if R = 1, then Alice and Bob play the optimal CHSH strategy. In the former case, Bob can perfectly guess Alice’s output, while in the latter case, he can guess her output with probability 12+24.

Therefore, the expressions of P1 and P2 in terms of r for this strategy are

P1(r)=34r+2+24(1r) (14)

and

P2(r)=1r+2+24(1r). (15)

Then the expression of P2 in terms of P1 is

P2=1+3242P1. (16)

Combining the lower and upper bound, we get the plot in Figure 2.

Figure 2.

Figure 2

Plot of the lower and upper bounds of P2 against P1 ∈ (0.75, 0.85).

The optimal (blind) rate curve for CHSH must lie in between the red and blue curves in Figure 2.

4 Local randomness from rigidity

For games with larger alphabets than the CHSH game, using the above adaptation of the NPA hierarchy is more difficult because of the size of the certificates. In the current section we explore how techniques from quantum rigidity can be used to prove blind rate curves. The approach in the current section requires less computation than the NPA hierachy approach, and although the rate curve we achieve lacks the near-optimal properties of our rate curve for CHSH (Figure 1), it is still optimal as the score threshold approaches the optimal quantum score.

We study the Magic Square game, which, like CHSH, is a game with two players, Alice and Bob. The input alphabets for Alice and Bob are A=B={0,1,2}, and the output alphabets are the sets of bit strings X={000,011,101,110} for Alice and Y={100,010,001,111} for Bob. The game is won if the inputs a, b and outputs x, y satisfy xb = ya, meaning that the b-th bit of x equals the a-th bit of y.

A strategy for the Magic Square game consists of a pure state |ψHAHB, and projective measurement families {{Aax}x}a on HA and {{Bby}y}b on HB. Note that we can let

Fabz=xb=zAax (17)
Gabz=ya=zBby (18)
Fab=Fab0Fab1 (19)
Gab=Gab0Gab1, (20)

and then the measurements will satisfy ΠaFab = I, ΠaGab = −I, [Fab, Fab] = 0, [Gab, Gab] = 0. The measurement operators Aax and Bby can be recovered from {Fab}, {Gab}, and thus to specify a strategy it suffices to specify |ψ〉, {Fab}, {Gab}. We refer to the triple (|ψ〉, {Fab}, {Gab}) as a reflection strategy for the Magic Square game.

The next proposition asserts that in a high-performing strategy, if Alice measures with Fab and Bob measures with Gab, with a ≠ a′, b ≠ b′, then the outcome of Alice’s measurement is nearly undetectable to Bob. The proof builds on the recent rigidity proof for the Magic Square game [25].

Proposition 2

Let a, a′, b, b′ ∈ {0, 1, 2}, z ∈ {0, 1} be such that aa′, bb. Let (|ψ〉, {Fab}, {Gab}) be a reflection strategy for the Magic Square game which achieves an expected score of 1 − δ. Then, the post-measurement states

TrA[(Fab0Gabz)|ψψ|(Fab0Gabz)] (21)

and

TrA[(Fab1Gabz)|ψψ|(Fab1Gabz)] (22)

are separated by trace distance at most O(δ).

Proof

By symmetry, it suffices to address the single case where a = b = 0, a′ = b′ = 1, z = 0, so we will assume those values from now on. From Appendix C in [25], we have the following inequalities:

F00G00|ψ|ψO(δ) (23)
F11G11|ψ|ψO(δ) (24)
F00G11|ψ+F11G00|ψO(δ) (25)

Let |ψ=ijψij|ij and let R:HAHB be defined by R=ijψij|ji|. Our goal then translates into the following: we wish to show that

G110RF000RG110G110RF001RG1101O(δ), (26)

or equivalently,

(G11+I2)RF00R(G11+I2)1O(δ), (27)

Observe the following inequalities, where we use inequalities (23)–(25) and the Cauchy-Schwarz inequality ||BC||1 ≤ ||B||2 ||C||2, combined with the fact that ||R||2 = 1. Let the expression S=O(ε)T denote ||ST||1O(ε).

(G11+I2)RF00R(G11+I2)=14(G11RF00RG11+G11RF00R+RF00RG11+RF00R)=Oε14(G11RF00RG11G00RF11RRF11RG00+RF00R)=Oε14(G11RF00RG11G00RRG11G11RRG00+RF00R)=Oε14(G11RF00RG11RF00RG11G11RF00R+RF00R)=Oε(IG112)RF00R(IG112).

Since the operator in the first term in this chain of approximations has orthogonal support from the operator in the last chain, we therefore have

(G11+I2)RF00R(G11+I2)1O(ε), (28)

as desired. □

The next corollary follows easily.

Corollary 3

Let (|ψ,{{Aax}x}a,{{Bby}y}b) be a strategy for the Magic Square game which achieves an expected score of 1 − δ. Let a, b, b′ ∈ {1, 2, 3} be such that b b′, and suppose that the strategy is executed on inputs a, b and outputs x, y are obtained. Then the probability that Bob can subsequently guess xb given b′ is no more than 12+O(δ).

5 The deletion certification protocol

We next focus on the problem of certified deletion, which we describe as follows. Alice wishes to interact with an untrusted device (Da) and a second party (Bob) so as to prepare for herself a random bit m and a classical string k, such that after the interaction is complete the following conditions hold:

  1. If Alice were to give k to Bob immediately, then Bob could recover the bit m.

  2. There is a deletion procedure that Alice and Bob can carry out, involving classical communication only, such that after the protocol is over Bob will not be able to recover m even if he were given k.

Note that this procedure can be used as a form of encryption: if Alice has a predetermined secret message bit y ∈ {0, 1} which she wishes to encrypt, then she can execute the same preparation procedure and then transmit the XOR bit ym to Bob. Recovering or deleting y is then equivalent to recovering or deleting m.

Variants of this problem have been studied in other settings (e.g., [21] in a computational setting, [18, 9] in a bounded storage model). Our setting is the device-independent setting, where the honest user Alice does not trust the quantum processes used in the protocol. Our protocol is based on the Magic Square game. We make the following assumptions:

  1. Alice and Bob possess an untrusted 2-part device D = (Da, Db) which is compatible with the Magic Square game.

  2. Alice has the ability to generate private (trusted) randomness.

  3. Alice’s device Da does not communicate information to Bob or to Db once the protocol is underway.

  4. Alice and Bob have the ability to communicate classically.

No assumptions are made about Bob’s behavior — in particular, he may perform arbitrary operations on any quantum information that is contained inside of the device Db that he possesses.3

It is helpful to change notation from the previous section. The protocol will contain a sequence of inputs to the Magic Square game which will be denoted by v=(v1,v2,,vn)=(v1a,v1b,,vna,vnb). The sequence of the outputs will be h=(h1,h2,,hn)=(h1a,h1b,,hna,hnb). The initial preparation protocol is given Figure 3.

Figure 3.

Figure 3

The preparation protocol (PREP)

We wish to show first that it is possible for Bob to determine m if he were given k. This is straightforward: if the device D = (Da, Db) were such that it wins the Magic Square game with probability 1 at each use, then the protocol in Figure 4 successfully determines m with probability 1 – ε.

Figure 4.

Figure 4

The recovery protocol (REC)

Next we wish to show that there is a protocol which makes m unrecoverable for Bob (even while it allows Bob to know the key k after the protocol is completed, and allows him to have access to all remaining quantum information in the device Db). We use the protocol DEL in Figure 5, which is also meant to follow the protocol PREP in Figure 3. The protocol has Bob play his side of the Magic Square game and then has Alice check the resulting score. Then at the conclusion of the protocol, Alice reveals the key k to Bob (which is merely a convenience for stating the security of the protocol).

Figure 5.

Figure 5

The deletion protocol (DEL)

Note that at step 4 in Figure 5, the interactions must be done in sequence (i.e., Alice waits to receive hib before revealing vi+1b). Bob can use his device Db to obtain his outputs, but we do not require that.

The following theorem asserts the security of the deletion protocol DEL. Let SUCC denote the event that Alice “accepts” at step 5 in Figure 5.

Theorem 4

Assume that P (SUCC) > 0 in protocol DEL. Then, the probability that Bob can guess m at the conclusion of the protocol, conditioned on SUCC, is upper bounded by

12+O(ε+N1/4)+eΩ(N)P(SUCC). (29)

For the proof of Theorem 4, we will need the following lemma.

Lemma 5

Let Ii denote indicator variable for the event that the ith round is won. Let

Ii=E(Ii|Ii1Ii2I1), (30)

and letI¯=(iIi)/N. Then for any μ > 0,

Pr(SUCC(I¯<1εμ))eNμ22. (31)

Proof

Let I¯=(iIi)/N. Let

Zi=j=1i(IjIj). (32)

Then {Z0, Z1, …, ZN } is a martingale:

E(Zi+1|Zi,,Z1)=Zi+E(Ii+1|IiI1)Ii+1=Zi. (33)

Therefore by Azuma’s inequality, the probability of the event i(Zi)>μ is upper bounded by eNμ22. The event in inequality (31) implies i(Zi)>μ, and the desired result follows. □

Now we can prove the main theorem of this section.

Proof of Theorem 4

By Corollary 3, for any i and any c{0,1,2}\vib, the probability that Bob can guess the cth bit of hia is upper bounded by 12+O(1Ii). Therefore, the probability that Bob can guess m at the conclusion of the protocol DEL is no more than

[i=1N(12+O(1Ii))]/N, (34)

which by the concavity of the square root function is upper bounded by

12+O(1I¯), (35)

For any μ > 0, we have by Lemma 5,

Pr[I¯1εμ|SUCC]1eNμ2/2Pr(SUCC), (36)

and therefore, conditioned on SUCC, Bob’s probability of guessing m is upper bounded by

12+O(ε+μ)+eNμ2/2Pr(SUCC). (37)

Setting μ = N−1/4 yields the desired result.

Acknowledgments

This work is a contribution of the National Institute of Standards and Technology and is not subject to U.S. copyright. The authors thank Peter Bierhorst for helpful comments on the paper.

Footnotes

*

This work was supported by NSF grant 1526928.

1

A nonlocal game G has complete support if the input distribution is nonzero on all elements of.

2

Note that it not necessary to make Bob’s second measurement depend on the outcome of his first measurement, since that outcome (y) is recoverable from the postmeasurement state of his first measurement.

3

We could model Bob’s behavior simply by allowing him to possess a quantum system Q and to perform arbitrary operations on it. We have chosen to allow him to have a device because it is easier to express his behavior in the case where he is honest.

References

  • 1.Acín Antonio, Cavalcanti Daniel, Passaro Elsa, Pironio Stefano, Skrzypczyk Paul. Necessary detection efficiencies for secure quantum key distribution and bound randomness. Phys Rev A. 2016 Jan;93:012319. [Google Scholar]
  • 2.Adlam Emily, Kent Adrian. Device-independent relativistic quantum bit commitment. Physical Review A. 2015;92(022315) [Google Scholar]
  • 3.Aharon N, Massar S, Pironio S, Silman J. Device-independent bit commitment based on the chsh inequality. New Journal of Physics. 2016;18(2):025014. [Google Scholar]
  • 4.Aharon Nati, Chailloux Andre, Kerenidis Iordanis, Massar Serge, Pironio Stefano. Weak coin flipping in a device-independent setting. In: Bacon Dave, Roetteler Martin, Martin-Delgado Miguel., editors. Proceedings of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography (TQC), number 6745 in Lecture Notes in Computer Science. 2011. pp. 1–12. [Google Scholar]
  • 5.Arnon-Friedman Rotem, Renner Renato, Vidick Thomas. Simple and tight device-independent security proofs. arXiv:1607.01797. 2016 [Google Scholar]
  • 6.Budroni Costantino, Moroder Tobias, Kleinmann Matthias, Gühne Otfried. Bounding temporal quantum correlations. Physical Review Letters. 2013;111(2):020403. doi: 10.1103/PhysRevLett.111.020403. [DOI] [PubMed] [Google Scholar]
  • 7.Dupuis Frederic, Fawzi Omar, Renner Renato. Entropy accumulation. arXiv:1607.01796. 2016 [Google Scholar]
  • 8.Ekert Artur K. Quantum cryptography based on bell’s theorem. Phys Rev Lett. 1991 Aug;67:661–663. doi: 10.1103/PhysRevLett.67.661. [DOI] [PubMed] [Google Scholar]
  • 9.Kaniewski Jedrzej, Wehner Stephanie. Device-independent two-party cryptography secure against sequential attacks. New Journal of Physics. 2016 May;18 [Google Scholar]
  • 10.Mayers Dominic, Yao Andrew. Foundations of Computer Science, 1998 Proceedings 39th Annual Symposium on. IEEE; 1998. Quantum cryptography with imperfect apparatus; pp. 503–509. [Google Scholar]
  • 11.Miller Carl A, Shi Yaoyun. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices. J ACM. 2016 Oct;63(4):33:1–33:63. [Google Scholar]
  • 12.Miller Carl A, Shi Yaoyun. Randomness in nonlocal games between mistrustful players. Quantum Information & Computation. 2017;17(7&8):0595–0610. [PMC free article] [PubMed] [Google Scholar]
  • 13.Miller Carl A, Shi Yaoyun. Universal security for randomness expansion from the spot-checking protocol. SIAM Journal on Computing. 2017;46(4):1304–1335. [Google Scholar]
  • 14.Navascues Miguel, Pironio Stefano, Acin Antonio. A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations. New Journal of Physics. 2008;10 [Google Scholar]
  • 15.Pironio S, Acín A, Massar S, de la Giroday AB, Matsukevich DN, Maunz P, Olmschenk S, Hayes D, Luo L, Manning TA, et al. Random numbers certified by bell’s theorem. Nature. 2010;464(7291):1021. doi: 10.1038/nature09008. [DOI] [PubMed] [Google Scholar]
  • 16.Pironio Stefano, Navascués Miguel, Acin Antonio. Convergent relaxations of polynomial optimization problems with noncommuting variables. SIAM Journal on Optimization. 2010;20(5):2157–2180. [Google Scholar]
  • 17.Riberio Jeremy, Murta Glaucia, Wehner Stephanie. Fully general device-independence for two-party cryptography and position verification. arXiv:1609.08487. 2016 [Google Scholar]
  • 18.Riberio Jeremy, Thinh Le Phuc, Kaniewski Jedrzej, Helsen Jonas, Wehner Stephanie. Device-independence for two-party cryptography and position verification. arXiv:1606.08750. 2016 Jun; [Google Scholar]
  • 19.Silman J, Chailloux A, Aharon N, Kerenidis I, Pironio S, Massar S. Fully distrustful quantum bit commitment and coin flipping. Phys Rev Lett. 2011 Jun;106:220501. doi: 10.1103/PhysRevLett.106.220501. [DOI] [PubMed] [Google Scholar]
  • 20.Slofstra William. Tsirelson’s problem and an embedding theorem for groups arising from non-local games. arXiv:1606.03140. 2016 [Google Scholar]
  • 21.Unruh Dominique. Revocable quantum timed-release encryption. J ACM. 2015 Dec;62(6):49:1–49:76. [Google Scholar]
  • 22.Vazirani Umesh, Vidick Thomas. Proceedings of the Forty-fourth Annual ACM Symposium on Theory of Computing, STOC ’12. New York, NY, USA: ACM; 2012. Certifiable quantum dice: Or, true random number generation secure against quantum adversaries; pp. 61–76. [Google Scholar]
  • 23.Vazirani Umesh, Vidick Thomas. Fully device-independent quantum key distribution. Phys Rev Lett. 2014 Sep;113:140501. doi: 10.1103/PhysRevLett.113.140501. [DOI] [PubMed] [Google Scholar]
  • 24.Wu Xiangyao, Bancal Jean-Daniel, McKague Matthew, Scarani Valerio. Device-independent parallel self-testing of two singlets. arXiv:1512.02074v2. 2016 [Google Scholar]
  • 25.Wu Xingyao, Bancal Jean-Daniel, McKague Matthew, Scarani Valerio. Device-independent parallel self-testing of two singlets. Physical Review A. 2016 Jun;93:062121. [Google Scholar]

RESOURCES