Phase transition in random circuit sampling

A Morvan, B Villalonga, X Mi, S Mandra… - arXiv preprint arXiv …, 2023 - arxiv.org
Undesired coupling to the surrounding environment destroys long-range correlations on
quantum processors and hinders the coherent evolution in the nominally available …

Quantum random number generation

X Ma, X Yuan, Z Cao, B Qi, Z Zhang - npj Quantum Information, 2016 - nature.com
Quantum physics can be exploited to generate true random numbers, which have important
roles in many applications, especially in cryptography. Genuine randomness from the …

Fully device independent quantum key distribution

U Vazirani, T Vidick - Communications of the ACM, 2019 - dl.acm.org
Quantum cryptography promises levels of security that are impossible to attain in a classical
world. Can this security be guaranteed to classical users of a quantum protocol, who may …

Pseudorandomness

SP Vadhan - … and Trends® in Theoretical Computer Science, 2012 - nowpublishers.com
This is a survey of pseudorandomness, the theory of efficiently generating objects that" look
random" despite being constructed using little or no randomness. This theory has …

Information-theoretically secret key generation for fading wireless channels

C Ye, S Mathur, A Reznik, Y Shah… - IEEE Transactions …, 2010 - ieeexplore.ieee.org
The multipath-rich wireless environment associated with typical wireless usage scenarios is
characterized by a fading channel response that is time-varying, location-sensitive, and …

Derandomizing polynomial identity tests means proving circuit lower bounds

V Kabanets, R Impagliazzo - Proceedings of the thirty-fifth annual ACM …, 2003 - dl.acm.org
We show that derandomizing Polynomial Identity Testing is, essentially, equivalent to
proving circuit lower bounds for NEXP. More precisely, we prove that if one can test in …

Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors

O Reingold, S Vadhan… - Proceedings 41st Annual …, 2000 - ieeexplore.ieee.org
The main contribution is a new type of graph product, which we call the zig-zag product.
Taking a product of a large graph with a small graph, the resulting graph inherits (roughly) its …

A survey on secret key generation mechanisms on the physical layer in wireless networks

YEH Shehadeh, D Hogrefe - Security and Communication …, 2015 - Wiley Online Library
Traditional security mechanisms are mainly based on the distribution of shared secret keys.
Yet, this task is nontrivial in large wireless networks, because of mobility and scalability …

Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes

V Guruswami, C Umans, S Vadhan - Journal of the ACM (JACM), 2009 - dl.acm.org
We give an improved explicit construction of highly unbalanced bipartite expander graphs
with expansion arbitrarily close to the degree (which is polylogarithmic in the number of …

Postprocessing for quantum random-number generators: Entropy evaluation and randomness extraction

X Ma, F Xu, H Xu, X Tan, B Qi, HK Lo - Physical Review A—Atomic, Molecular …, 2013 - APS
Quantum random-number generators (QRNGs) can offer a means to generate information-
theoretically provable random numbers, in principle. In practice, unfortunately, the quantum …