Randomness in post-selected events
Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little randomness. This raises the question as to whether rand...
Main Authors: | Le Phuc Thinh, Gonzalo de la Torre, Jean-Daniel Bancal, Stefano Pironio, Valerio Scarani |
---|---|
Format: | Article |
Language: | English |
Published: |
IOP Publishing
2016-01-01
|
Series: | New Journal of Physics |
Subjects: | |
Online Access: | https://doi.org/10.1088/1367-2630/18/3/035007 |
Similar Items
-
Improved device-independent randomness expansion rates using two sided randomness
by: Rutvij Bhavsar, et al.
Published: (2023-01-01) -
Higher amounts of loophole-free Bell violation using a heralded entangled source
by: Shuai Zhao, et al.
Published: (2019-01-01) -
Closing the Door on Quantum Nonlocality
by: Marian Kupczynski
Published: (2018-11-01) -
Device-independent randomness generation from several Bell estimators
by: Olmo Nieto-Silleras, et al.
Published: (2018-01-01) -
Observations of Bell Inequality Violations with Causal Isolation between Source and Detectors
by: Marc Jean Jose Fleury
Published: (2022-09-01)