Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Simple and tight device-independent security proofs
Device-independent security is the gold standard for quantum cryptography: not only is
security based entirely on the laws of quantum mechanics, but it holds irrespective of any a …
security based entirely on the laws of quantum mechanics, but it holds irrespective of any a …
Cryptomite: A versatile and user-friendly library of randomness extractors
Abstract We present $\texttt {Cryptomite} $, a Python library of randomness extractor
implementations. The library offers a range of two-source, seeded and deterministic …
implementations. The library offers a range of two-source, seeded and deterministic …
[HTML][HTML] Statistical testing of random number generators and their improvement using randomness extraction
Random number generators (RNGs) are notoriously challenging to build and test, especially
for cryptographic applications. While statistical tests cannot definitively guarantee an RNG's …
for cryptographic applications. While statistical tests cannot definitively guarantee an RNG's …
Device-independent randomness amplification and privatization
M Kessler, R Arnon-Friedman - IEEE Journal on Selected Areas …, 2020 - ieeexplore.ieee.org
Secret and perfect randomness is an essential resource in cryptography. Yet, it is not even
clear that such exists. It is well known that the tools of classical computer science do not …
clear that such exists. It is well known that the tools of classical computer science do not …
Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions
Over the past decades, quantum technology has seen consistent progress, with notable
recent developments in the field of quantum computers. Traditionally, this trend has been …
recent developments in the field of quantum computers. Traditionally, this trend has been …
Reductions to IID in device-independent quantum information processing
R Arnon-Friedman - arxiv preprint arxiv:1812.10922, 2018 - arxiv.org
The field of device-independent (DI) quantum information processing concerns itself with
devising and analysing protocols, such as quantum key distribution, without referring to the …
devising and analysing protocols, such as quantum key distribution, without referring to the …
Quantum measurement adversary
Multi-source extractors are functions that extract uniform randomness from multiple (weak)
sources of randomness. Quantum multi-source extractors were considered by Kasher and …
sources of randomness. Quantum multi-source extractors were considered by Kasher and …
[HTML][HTML] Practical randomness amplification and privatisation with implementations on quantum computers
We present an end-to-end and practical randomness amplification and privatisation protocol
based on Bell tests. This allows the building of device-independent random number …
based on Bell tests. This allows the building of device-independent random number …
Seedless Extractors for Device-Independent Quantum Cryptography
Device-independent (DI) quantum cryptography aims at providing secure cryptography with
minimal trust in, or characterisation of, the underlying quantum devices. An essential step in …
minimal trust in, or characterisation of, the underlying quantum devices. An essential step in …