-
Quantum Random Number Generator based on Violations of the Free CHSH-3 Inequality
Authors:
Don Jean Baptiste Anoman,
François Arnault,
Simone Naldi
Abstract:
We describe a protocol for generating random numbers based on the existence of quantum violations of a free Clauser-Horne-Shimony-Holt inequality, namely CHSH-3. Our method uses semidefinite programming relaxations to compute such violations. In a standard setting the CHSH-3 inequality involves two separated qutrits and compatible measurement, that is, commuting with each other, yielding the known…
▽ More
We describe a protocol for generating random numbers based on the existence of quantum violations of a free Clauser-Horne-Shimony-Holt inequality, namely CHSH-3. Our method uses semidefinite programming relaxations to compute such violations. In a standard setting the CHSH-3 inequality involves two separated qutrits and compatible measurement, that is, commuting with each other, yielding the known quantum bound of $1+\sqrt{11/3} \approx 2.9149$. In our framework, $d$-dimensional quantum systems (qudits) where $d$ is not fixed a priori, and measurement operators possibly not compatible, are allowed. This loss of constraints yields a higher value for the maximum expectation of the CHSH-3 inequality. Based on such upper bound on the violation of CHSH-3, we develop a random number generator of type prepare-and-measure, but with one part. Our protocol generates a maximal entropy and its security is based, through self testing arguments, on the attainability of the maximal violation of the free CHSH-3 for quantum systems.
△ Less
Submitted 30 July, 2020; v1 submitted 28 February, 2020;
originally announced March 2020.
-
Random generation with the spin of a qutrit
Authors:
François ARNAULT,
Don ANOMAN
Abstract:
We consider the use of a single qutrit for random generation. This is possible because single qutrits exhibit contextuality features. We aim to optimize the entropy of the generated sequence. To do this, we do not rely on the KCBS inequality but instead on the use of a specific state and a check for fidelity. By the way, we show that this check can be considered as a variant of the CHSH inequality…
▽ More
We consider the use of a single qutrit for random generation. This is possible because single qutrits exhibit contextuality features. We aim to optimize the entropy of the generated sequence. To do this, we do not rely on the KCBS inequality but instead on the use of a specific state and a check for fidelity. By the way, we show that this check can be considered as a variant of the CHSH inequality applied to pairs of photons or spin-1/2 particles (qutrits are often realized as a pair of indistinguishable qubits). The physical realisation of this random generator should be eased by the fact it needs only to implement spin operations and measurement, not general $\SU(3)$ qutrit manipulations.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
A Quantum Key Distribution Protocol for qudits with better noise resistance
Authors:
Zoé Amblard,
François Arnault
Abstract:
The Ekert quantum key distribution protocol uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdrop**. The N-DEB protocol uses instead pairs of entangled qudits to achieve better noise resistance than the Ekert protocol. It performs checks based on the Bell CGLMP inequality for qudits. In this paper, we present the generalization for qudits of our protoc…
▽ More
The Ekert quantum key distribution protocol uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdrop**. The N-DEB protocol uses instead pairs of entangled qudits to achieve better noise resistance than the Ekert protocol. It performs checks based on the Bell CGLMP inequality for qudits. In this paper, we present the generalization for qudits of our protocol h3DEB (for qutrits). This protocol also uses pairs of entangled qudits, but achieves even better noise resistance than N-DEB and is showed to be secure against the same family of cloning attacks than N-DEB. This gain of performance is obtained by using another inequality called here hCHSH-$d$. For each party, the hCHSH-$d$ inequality involves $2d$ observables. We explain how the parties can measure these observables and thus are able to check the violation of hCHSH-$d$. In the presence of noise, this violation allows the parties to ensure the secrecy of the key because it guarantees the absence of a local Trojan horse attack. The advantage of our proposed scheme is that it results in an increased resistance to noise while remaining secure against individual attacks.
△ Less
Submitted 30 April, 2015;
originally announced April 2015.
-
Quantum entanglement from random measurements
Authors:
Minh Cong Tran,
Borivoje Dakic,
Francois Arnault,
Wieslaw Laskowski,
Tomasz Paterek
Abstract:
We show that the expectation value of squared correlations measured along random local directions is an identifier of quantum entanglement in pure states which can be directly experimentally assessed if two copies of the state were available. Entanglement can therefore be detected by parties who do not share a common reference frame and whose local reference frames, such as polarisers or Stern-Ger…
▽ More
We show that the expectation value of squared correlations measured along random local directions is an identifier of quantum entanglement in pure states which can be directly experimentally assessed if two copies of the state were available. Entanglement can therefore be detected by parties who do not share a common reference frame and whose local reference frames, such as polarisers or Stern-Gerlach magnets, remain unknown. Furthermore, we also show that in every experimental run access to only one qubit from the macroscopic reference is sufficient to identify entanglement, violate a Bell inequality, and in fact observe all phenomena observable with macroscopic references. Finally, we provide a state-independent entanglement witness solely in terms of random correlations and emphasise how data gathered for a single random measurement setting per party reliably detects entanglement. This is only possible due to utilised randomness and should find practical applications in experimental confirmation of multi-photon entanglement or space experiments.
△ Less
Submitted 12 October, 2015; v1 submitted 18 November, 2014;
originally announced November 2014.
-
A qutrit Quantum Key Distribution protocol with better noise resistance
Authors:
François Arnault,
Zoé Amblard
Abstract:
The Ekert quantum key distribution protocol uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdrop**. The 3DEB protocol uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3. In this paper, we present a new protocol, which also uses pairs…
▽ More
The Ekert quantum key distribution protocol uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdrop**. The 3DEB protocol uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3. In this paper, we present a new protocol, which also uses pairs of entangled qutrits, but achieves even better noise resistance than 3DEB. This gain of performance is obtained by using another inequality called here hCHSH-3. As the hCHSH3 inequality involve products of observables which become incompatible when using quantum states, we show how the parties running the protocol can measure the violation of hCHSH3 in the presence of noise, to ensure the secrecy of the key.
△ Less
Submitted 16 April, 2014;
originally announced April 2014.
-
Formes quadratiques de discriminants emboîtés
Authors:
François Arnault
Abstract:
Quadratic forms with embedded discriminants. Integral binary quadratic forms have multiple applications, for example in factorization or cryptography. The Nice family of cryptographic systems makes use of quadratic forms with different discriminants $\pm p$, and $\pm pq^2$ where $p$, $q$ are large primes. This paper shows the precise links between forms with $D$ discriminant and forms with $Df^2$…
▽ More
Quadratic forms with embedded discriminants. Integral binary quadratic forms have multiple applications, for example in factorization or cryptography. The Nice family of cryptographic systems makes use of quadratic forms with different discriminants $\pm p$, and $\pm pq^2$ where $p$, $q$ are large primes. This paper shows the precise links between forms with $D$ discriminant and forms with $Df^2$ discriminant, which are crucial in the analysis of the systems Nice and theirs attacks. We also introduce the notion of semi-equivalence of binary quadratic forms, and give some characterizations of semi-equivalent forms, which are useful in the analysis of these attacks.
-----
Les formes quadratiques binaires fournissent un moyen explicite pour manipuler des idéaux de corps quadratiques, et leurs applications pratiques sont multiples. De nombreux algorithmes de factorisation les utilisent. Elle sont aussi utilisées en cryptographie, en particulier pour les systèmes Nice. Les systèmes de chiffrement Nice utilisent des formes quadratiques de discriminants $\pm p$ et $\pm pq^2$ où $p$ et $q$ sont des nombres premiers. Cet article précise les liens entre les formes de discriminant $D$ et celles de discriminant $Df^2$, ce qui est essentiel pour l'analyse de Nice et de ses attaques. Il introduit aussi la notion de formes quadratiques semi-équivalentes et en explicite plusieurs caractérisations, utiles pour l'analyse de ces attaques.
△ Less
Submitted 3 February, 2014;
originally announced February 2014.
-
A complete set of multidimensional Bell inequalities
Authors:
François Arnault
Abstract:
We give a multidimensional generalisation of the complete set of Bell-correlation inequalities given by Werner and Wolf, and by Zukowski and Brukner, for the two-dimensional case. Our construction applies for the n parties, two-observables case, where each observable is d-valued. The d^{d^n} inequalities obtained involve homogeneous polynomials. They define the facets of a polytope in a complex ve…
▽ More
We give a multidimensional generalisation of the complete set of Bell-correlation inequalities given by Werner and Wolf, and by Zukowski and Brukner, for the two-dimensional case. Our construction applies for the n parties, two-observables case, where each observable is d-valued. The d^{d^n} inequalities obtained involve homogeneous polynomials. They define the facets of a polytope in a complex vector space of dimension d^n. We also show that these inequalities are violated by Quantum Mechanics. We exhibit examples in the three-dimensional case.
△ Less
Submitted 24 October, 2011; v1 submitted 12 July, 2011;
originally announced July 2011.
-
Construction of self-dual normal bases and their complexity
Authors:
François Arnault,
Erik Jarl Pickett,
Stéphane Vinatier
Abstract:
Recent work of Pickett has given a construction of self-dual normal bases for extensions of finite fields, whenever they exist. In this article we present these results in an explicit and constructive manner and apply them, through computer search, to identify the lowest complexity of self-dual normal bases for extensions of low degree. Comparisons to similar searches amongst normal bases show tha…
▽ More
Recent work of Pickett has given a construction of self-dual normal bases for extensions of finite fields, whenever they exist. In this article we present these results in an explicit and constructive manner and apply them, through computer search, to identify the lowest complexity of self-dual normal bases for extensions of low degree. Comparisons to similar searches amongst normal bases show that the lowest complexity is often achieved from a self-dual normal basis.
△ Less
Submitted 6 May, 2011; v1 submitted 28 July, 2010;
originally announced July 2010.
-
Revisiting LFSMs
Authors:
François Arnault,
Thierry Berger,
Marine Minier,
Benjamin Pousse
Abstract:
Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many cryptographic applications such as design of stream ciphers or pseudo-random generation. LFSRs could be seen as particular LFSMs without inputs.
In this pap…
▽ More
Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many cryptographic applications such as design of stream ciphers or pseudo-random generation. LFSRs could be seen as particular LFSMs without inputs.
In this paper, we first recall the description of LFSMs using traditional matrices representation. Then, we introduce a new matrices representation with polynomial fractional coefficients. This new representation leads to sparse representations and implementations. As direct applications, we focus our work on the Windmill LFSRs case, used for example in the E0 stream cipher and on other general applications that use this new representation.
In a second part, a new design criterion called diffusion delay for LFSRs is introduced and well compared with existing related notions. This criterion represents the diffusion capacity of an LFSR. Thus, using the matrices representation, we present a new algorithm to randomly pick LFSRs with good properties (including the new one) and sparse descriptions dedicated to hardware and software designs. We present some examples of LFSRs generated using our algorithm to show the relevance of our approach.
△ Less
Submitted 25 March, 2011; v1 submitted 27 April, 2010;
originally announced April 2010.