-
Composable framework for device-independent state certification
Authors:
Rutvij Bhavsar,
Lewis Wooltorton,
Joonwoo Bae
Abstract:
Certifying a quantum state in a device-independent (DI) manner, in which no trust is placed on the internal workings of any physical components, is a fundamental task bearing various applications in quantum information theory. The composability of a state certification protocol is key to its integration as a subroutine within information-theoretic protocols. In this work, we present a composable c…
▽ More
Certifying a quantum state in a device-independent (DI) manner, in which no trust is placed on the internal workings of any physical components, is a fundamental task bearing various applications in quantum information theory. The composability of a state certification protocol is key to its integration as a subroutine within information-theoretic protocols. In this work, we present a composable certification of quantum states in a DI manner under the assumption that a source prepares a finite sequence of independent quantum states that are not necessarily identical. We show that the security relies on the DI analog of the fidelity, called the extractability. We develop methods to compute this quantity under local operations and classical communication in certain Bell scenarios that self-test the singlet state, which may also be of independent interest. Finally, we demonstrate our framework by certifying the singlet states in a composable and DI manner using the Clauser-Horne-Shimony-Holt inequality.
△ Less
Submitted 11 May, 2025;
originally announced May 2025.
-
Enhancing key rates of QKD protocol by Coincidence Detection
Authors:
Tanya Sharma,
Rutvij Bhavsar,
Jayanth Ramakrishnan,
Pooja Chandravanshi,
Shashi Prabhakar,
Ayan Biswas,
R. P. Singh
Abstract:
In theory, quantum key distribution (QKD) provides unconditional security; however, its practical implementations are susceptible to exploitable vulnerabilities. This investigation tackles the constraints in practical QKD implementations using weak coherent pulses. We improve on the conventional approach of using decoy pulses by integrating it with the coincidence detection (CD) protocol. Addition…
▽ More
In theory, quantum key distribution (QKD) provides unconditional security; however, its practical implementations are susceptible to exploitable vulnerabilities. This investigation tackles the constraints in practical QKD implementations using weak coherent pulses. We improve on the conventional approach of using decoy pulses by integrating it with the coincidence detection (CD) protocol. Additionally, we introduce an easy-to-implement algorithm to compute asymptotic key rates for the protocol. Furthermore, we have carried out an experimental implementation of the protocol, where we demonstrate that monitoring coincidences in the decoy state protocol leads to enhanced key rates under realistic experimental conditions.
△ Less
Submitted 12 December, 2024; v1 submitted 29 February, 2024;
originally announced February 2024.
-
Comment on a no-go theorem for $ψ$-ontic models
Authors:
Laurens Walleghem,
Shashaank Khanna,
Rutvij Bhavsar
Abstract:
In a recent paper [Carcassi, Oldofredi and Aidala, Found Phys 54, 14 (2024)] it is claimed that the whole Harrigan--Spekkens framework of ontological models is inconsistent with quantum theory. They show this by showing that all pure quantum states in $ψ$-ontic models must be orthogonal. In this note, we identify some crucial mistakes in their argument to the extent that the main claim is incorrec…
▽ More
In a recent paper [Carcassi, Oldofredi and Aidala, Found Phys 54, 14 (2024)] it is claimed that the whole Harrigan--Spekkens framework of ontological models is inconsistent with quantum theory. They show this by showing that all pure quantum states in $ψ$-ontic models must be orthogonal. In this note, we identify some crucial mistakes in their argument to the extent that the main claim is incorrect.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
Improvements on Device Independent and Semi-Device Independent Protocols of Randomness Expansion
Authors:
Rutvij Bhavsar
Abstract:
To generate genuine random numbers, random number generators based on quantum theory are essential. However, ensuring that the process used to produce randomness meets desired security standards can pose challenges for traditional quantum random number generators. This thesis delves into Device Independent (DI) and Semi-Device Independent (semi-DI) protocols of randomness expansion, based on a min…
▽ More
To generate genuine random numbers, random number generators based on quantum theory are essential. However, ensuring that the process used to produce randomness meets desired security standards can pose challenges for traditional quantum random number generators. This thesis delves into Device Independent (DI) and Semi-Device Independent (semi-DI) protocols of randomness expansion, based on a minimal set of experimentally verifiable security assumptions. The security in DI protocols relies on the violation of Bell inequalities, which certify the quantum behavior of devices. The semi-DI protocols discussed in this thesis require the characterization of only one device - a power meter. These protocols exploit the fact that quantum states can be prepared such that they cannot be distinguished with certainty, thereby creating a randomness resource. In this study, we introduce enhanced DI and semi-DI protocols that surpass existing ones in terms of output randomness rate, security, or in some instances, both. Our analysis employs the Entropy Accumulation Theorem (EAT) to determine the extractable randomness for finite rounds. A notable contribution is the introduction of randomness expansion protocols that recycle input randomness, significantly enhancing finite round randomness rates for DI protocols based on the CHSH inequality violation. In the final section of the thesis, we delve into Generalized Probability Theories (GPTs), with a focus on Boxworld, the largest GPT capable of producing correlations consistent with relativity. A tractable criterion for identifying a Boxworld channel is presented.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Improved device-independent randomness expansion rates using two sided randomness
Authors:
Rutvij Bhavsar,
Sammy Ragy,
Roger Colbeck
Abstract:
A device-independent randomness expansion protocol aims to take an initial random string and generate a longer one, where the security of the protocol does not rely on knowing the inner workings of the devices used to run it. In order to do so, the protocol tests that the devices violate a Bell inequality and one then needs to bound the amount of extractable randomness in terms of the observed vio…
▽ More
A device-independent randomness expansion protocol aims to take an initial random string and generate a longer one, where the security of the protocol does not rely on knowing the inner workings of the devices used to run it. In order to do so, the protocol tests that the devices violate a Bell inequality and one then needs to bound the amount of extractable randomness in terms of the observed violation. The entropy accumulation theorem lower bounds the extractable randomness of a protocol with many rounds in terms of the single-round von Neumann entropy of any strategy achieving the observed score. Tight bounds on the von Neumann entropy are known for the one-sided randomness (i.e., where the randomness from only one party is used) when using the Clauser-Horne-Shimony-Holt (CHSH) game. Here we investigate the possible improvement that could be gained using the two-sided randomness. We generate upper bounds on this randomness by attempting to find the optimal eavesdropping strategy, providing analytic formulae in two cases. We additionally compute lower bounds that outperform previous ones and can be made arbitrarily tight (at the expense of more computation time). These bounds get close to our upper bounds, and hence we conjecture that our upper bounds are tight. We also consider a modified protocol in which the input randomness is recycled. This modified protocol shows the possibility of rate gains of several orders of magnitude based on recent experimental parameters, making device-independent randomness expansion significantly more practical. It also enables the locality loophole to be closed while expanding randomness in a way that typical spot-checking protocols do not.
△ Less
Submitted 2 March, 2023; v1 submitted 12 March, 2021;
originally announced March 2021.