Skip to main content

Showing 1–9 of 9 results for author: Arnault, F

.
  1. arXiv:2003.00124  [pdf, other

    quant-ph

    Quantum Random Number Generator based on Violations of the Free CHSH-3 Inequality

    Authors: Don Jean Baptiste Anoman, François Arnault, Simone Naldi

    Abstract: We describe a protocol for generating random numbers based on the existence of quantum violations of a free Clauser-Horne-Shimony-Holt inequality, namely CHSH-3. Our method uses semidefinite programming relaxations to compute such violations. In a standard setting the CHSH-3 inequality involves two separated qutrits and compatible measurement, that is, commuting with each other, yielding the known… ▽ More

    Submitted 30 July, 2020; v1 submitted 28 February, 2020; originally announced March 2020.

    Comments: 11 pages, 1 figure ; it replaces the preprint "Maximal violations of CHSH-3 inequality" of the same authors

    MSC Class: 81P94 (Primary); 81P40

  2. arXiv:2002.07675  [pdf, ps, other

    quant-ph

    Random generation with the spin of a qutrit

    Authors: François ARNAULT, Don ANOMAN

    Abstract: We consider the use of a single qutrit for random generation. This is possible because single qutrits exhibit contextuality features. We aim to optimize the entropy of the generated sequence. To do this, we do not rely on the KCBS inequality but instead on the use of a specific state and a check for fidelity. By the way, we show that this check can be considered as a variant of the CHSH inequality… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: 7 pages

    MSC Class: 81P94 (Primary); 81P40

  3. arXiv:1504.08161  [pdf, ps, other

    quant-ph

    A Quantum Key Distribution Protocol for qudits with better noise resistance

    Authors: Zoé Amblard, François Arnault

    Abstract: The Ekert quantum key distribution protocol uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdrop**. The N-DEB protocol uses instead pairs of entangled qudits to achieve better noise resistance than the Ekert protocol. It performs checks based on the Bell CGLMP inequality for qudits. In this paper, we present the generalization for qudits of our protoc… ▽ More

    Submitted 30 April, 2015; originally announced April 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1404.4199

    MSC Class: 81P94

  4. Quantum entanglement from random measurements

    Authors: Minh Cong Tran, Borivoje Dakic, Francois Arnault, Wieslaw Laskowski, Tomasz Paterek

    Abstract: We show that the expectation value of squared correlations measured along random local directions is an identifier of quantum entanglement in pure states which can be directly experimentally assessed if two copies of the state were available. Entanglement can therefore be detected by parties who do not share a common reference frame and whose local reference frames, such as polarisers or Stern-Ger… ▽ More

    Submitted 12 October, 2015; v1 submitted 18 November, 2014; originally announced November 2014.

    Journal ref: Phys. Rev. A 92, 050301 (2015)

  5. arXiv:1404.4199  [pdf, other

    quant-ph cs.CR

    A qutrit Quantum Key Distribution protocol with better noise resistance

    Authors: François Arnault, Zoé Amblard

    Abstract: The Ekert quantum key distribution protocol uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdrop**. The 3DEB protocol uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3. In this paper, we present a new protocol, which also uses pairs… ▽ More

    Submitted 16 April, 2014; originally announced April 2014.

    Comments: 11 pages

    MSC Class: 81P94

  6. arXiv:1402.0344  [pdf, ps, other

    math.NT cs.CR cs.DM

    Formes quadratiques de discriminants emboîtés

    Authors: François Arnault

    Abstract: Quadratic forms with embedded discriminants. Integral binary quadratic forms have multiple applications, for example in factorization or cryptography. The Nice family of cryptographic systems makes use of quadratic forms with different discriminants $\pm p$, and $\pm pq^2$ where $p$, $q$ are large primes. This paper shows the precise links between forms with $D$ discriminant and forms with $Df^2$… ▽ More

    Submitted 3 February, 2014; originally announced February 2014.

    Comments: 7 pages. In French

    MSC Class: 68R99; 11Y05

  7. A complete set of multidimensional Bell inequalities

    Authors: François Arnault

    Abstract: We give a multidimensional generalisation of the complete set of Bell-correlation inequalities given by Werner and Wolf, and by Zukowski and Brukner, for the two-dimensional case. Our construction applies for the n parties, two-observables case, where each observable is d-valued. The d^{d^n} inequalities obtained involve homogeneous polynomials. They define the facets of a polytope in a complex ve… ▽ More

    Submitted 24 October, 2011; v1 submitted 12 July, 2011; originally announced July 2011.

    Comments: 14 pages, 1 figure. Plain TeX file This version 2 adds Section 7 about violations. Section 8 (the case d=3) and bibliography have been extended accordingly

  8. Construction of self-dual normal bases and their complexity

    Authors: François Arnault, Erik Jarl Pickett, Stéphane Vinatier

    Abstract: Recent work of Pickett has given a construction of self-dual normal bases for extensions of finite fields, whenever they exist. In this article we present these results in an explicit and constructive manner and apply them, through computer search, to identify the lowest complexity of self-dual normal bases for extensions of low degree. Comparisons to similar searches amongst normal bases show tha… ▽ More

    Submitted 6 May, 2011; v1 submitted 28 July, 2010; originally announced July 2010.

    Journal ref: Finite Fields and their Applications, Vol 18, Issue 2, 2012, pp 458-472

  9. arXiv:1004.4806  [pdf, ps, other

    cs.CR

    Revisiting LFSMs

    Authors: François Arnault, Thierry Berger, Marine Minier, Benjamin Pousse

    Abstract: Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many cryptographic applications such as design of stream ciphers or pseudo-random generation. LFSRs could be seen as particular LFSMs without inputs. In this pap… ▽ More

    Submitted 25 March, 2011; v1 submitted 27 April, 2010; originally announced April 2010.

    Comments: Submitted to IEEE-IT