Quantum random number generators

M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …

Linear degree extractors and the inapproximability of max clique and chromatic number

D Zuckerman - Proceedings of the thirty-eighth annual ACM …, 2006 - dl.acm.org
A randomness extractor is an algorithm which extracts randomness from a low-quality
random source, using some additional truly random bits. We construct new extractors which …

Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes

V Guruswami, C Umans, S Vadhan - Journal of the ACM (JACM), 2009 - dl.acm.org
We give an improved explicit construction of highly unbalanced bipartite expander graphs
with expansion arbitrarily close to the degree (which is polylogarithmic in the number of …

Explicit two-source extractors and resilient functions

E Chattopadhyay, D Zuckerman - Proceedings of the forty-eighth annual …, 2016 - dl.acm.org
We explicitly construct an extractor for two independent sources on n bits, each with
polylogarithmic min-entropy. Our extractor outputs one bit and has polynomially small error …

Randomness in quantum mechanics: philosophy, physics and technology

MN Bera, A Acín, M Kuś, MW Mitchell… - Reports on progress …, 2017 - iopscience.iop.org
This progress report covers recent developments in the area of quantum randomness, which
is an extraordinarily interdisciplinary area that belongs not only to physics, but also to …

Two source extractors for asymptotically optimal entropy, and (many) more

X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …

Non-malleable secret sharing

V Goyal, A Kumar - Proceedings of the 50th Annual ACM SIGACT …, 2018 - dl.acm.org
A number of works have focused on the setting where an adversary tampers with the shares
of a secret sharing scheme. This includes literature on verifiable secret sharing, algebraic …

Trevisan's extractor in the presence of quantum side information

A De, C Portmann, T Vidick, R Renner - SIAM Journal on Computing, 2012 - SIAM
Randomness extraction involves the processing of purely classical information and is
therefore usually studied with in the framework of classical probability theory. However, such …

Extracting randomness using few independent sources

B Barak, R Impagliazzo, A Wigderson - SIAM Journal on Computing, 2006 - SIAM
In this work we give the first deterministic extractors from a constant number of weak sources
whose entropy rate is less than 1/2. Specifically, for every δ>0 we give an explicit …

End-to-end verifiable elections in the standard model

A Kiayias, T Zacharias, B Zhang - … on the Theory and Applications of …, 2015 - Springer
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is end-
to-end verifiable in the standard model, ie, without any additional “setup” assumption or …