If a measurement is made on one half of a bipartite system then, conditioned on the outcome, the other half has a new reduced state. If these reduced states defy classical explanation — that is, if shared randomness cannot produce these reduced states for all possible measurements — the bipartite state is said to be steerable. Determining which states are steerable is a challenging problem even for low dimensions. In the case of two-qubit systems a criterion is known for T-states (that is, those with maximally mixed marginals) under projective measurements. In the current work we introduce the concept of keyring models — a special class of local hidden state model. When the measurements made correspond to real projectors, these allow us to study steerability beyond T-states. Using keyring models, we completely solve the steering problem for real projective measurements when the state arises from mixing a pure two-qubit state with uniform noise. We also give a partial solution in the case when the uniform noise is replaced by independent depolarizing channels. Our results imply that Werner states, which are a special case of the previous states, are unsteerable under real projective measurements if and only if their efficiency is at most 2/π.

1 aMiller, Carl1 aColbeck, Roger1 aShi, Yaoyun uhttp://aip.scitation.org/doi/full/10.1063/1.500619901513nas a2200133 4500008004100000245005700041210005600098260001500154520112400169100001601293700001701309700001601326856003701342 2017 eng d00aParallel Device-Independent Quantum Key Distribution0 aParallel DeviceIndependent Quantum Key Distribution c2017/03/153 aA prominent application of quantum cryptography is the distribution of cryptographic keys with unconditional security. Recently, such security was extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subsequent authors all require a sequential execution of N multiplayer games, where N is the security parameter. In this work, we prove unconditional security of a protocol where all games are executed in parallel. Our result further reduces the requirements for QKD (allowing for arbitrary information leakage within each players' lab) and opens the door to more efficient implementation. To the best of our knowledge, this is the first parallel security proof for a fully device-independent QKD protocol. Our protocol tolerates a constant level of device imprecision and achieves a linear key rate.

1 aJain, Rahul1 aMiller, Carl1 aShi, Yaoyun uhttps://arxiv.org/abs/1703.0542601545nas a2200145 4500008004100000245006100041210006100102260001500163300001400178490000700192520113000199100001701329700001601346856003701362 2017 eng d00aRandomness in nonlocal games between mistrustful players0 aRandomness in nonlocal games between mistrustful players c2017/06/15 a0595-06100 v173 aIf two quantum players at a nonlocal game G achieve a superclassical score, then their measurement outcomes must be at least partially random from the perspective of any third player. This is the basis for device-independent quantum cryptography. In this paper we address a related question: does a superclassical score at G guarantee that one player has created randomness from the perspective of the other player? We show that for complete-support games, the answer is yes: even if the second player is given the first player's input at the conclusion of the game, he cannot perfectly recover her output. Thus some amount of local randomness (i.e., randomness possessed by only one player) is always obtained when randomness is certified from nonlocal games with quantum strategies. This is in contrast to non-signaling game strategies, which may produce global randomness without any local randomness. We discuss potential implications for cryptographic protocols between mistrustful parties.

1 aMiller, Carl1 aShi, Yaoyun uhttps://arxiv.org/abs/1706.0498401611nas a2200133 4500008004100000245008000041210006900121260001500190490000700205520118300212100001701395700001601412856004901428 2017 eng d00aUniversal Security for Randomness Expansion from the Spot-Checking Protocol0 aUniversal Security for Randomness Expansion from the SpotCheckin c2017/08/010 v463 aColbeck (Thesis, 2006) proposed using Bell inequality violations to generate certified random numbers. While full quantum-security proofs have been given, it remains a major open problem to identify the broadest class of Bell inequalities and lowest performance requirements to achieve such security. In this paper, working within the broad class of spot-checking protocols, we prove exactly which Bell inequality violations can be used to achieve full security. Our result greatly improves the known noise tolerance for secure randomness expansion: for the commonly used CHSH game, full security was only known with a noise tolerance of 1.5%, and we improve this to 10.3%. We also generalize our results beyond Bell inequalities and give the first security proof for randomness expansion based on Kochen-Specker inequalities. The central technical contribution of the paper is a new uncertainty principle for the Schatten norm, which is based on the uniform convexity inequality of Ball, Carlen, and Lieb (Inventiones mathematicae, 115:463-482, 1994).

1 aMiller, Carl1 aShi, Yaoyun uhttp://epubs.siam.org/doi/10.1137/15M104433302103nas a2200229 4500008004100000022001400041245010900055210006900164260001500233300001700248490000700265520140200272653002101674653001901695653001201714653002501726653002901751653002101780100001701801700001601818856003901834 2016 eng d a0004-541100aRobust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices0 aRobust Protocols for Securely Expanding Randomness and Distribut c2016/10/26 a33:1–33:630 v633 aRandomness is a vital resource for modern-day information processing, especially for cryptography. A wide range of applications critically rely on abundant, high-quality random numbers generated securely. Here, we show how to expand a random seed at an exponential rate without trusting the underlying quantum devices. Our approach is secure against the most general adversaries, and has the following new features: cryptographic level of security, tolerating a constant level of imprecision in devices, requiring only unit size quantum memory (for each device component) in an honest implementation, and allowing a large natural class of constructions for the protocol. In conjunction with a recent work by Chung et al. [2014], it also leads to robust unbounded expansion using just 2 multipart devices. When adapted for distributing cryptographic keys, our method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance. The proof proceeds by showing that the Rényi divergence of the outputs of the protocol (for a specific bounding operator) decreases linearly as the protocol iterates. At the heart of the proof are a new uncertainty principle on quantum measurements and a method for simulating trusted measurements with untrusted devices.

10akey distribution10anonlocal games10aprivacy10aquantum cryptography10arandom-number generation10auntrusted device1 aMiller, Carl1 aShi, Yaoyun uhttp://doi.acm.org/10.1145/288549301399nas a2200193 4500008004100000245006100041210006000102260007900162300001400241490000700255520072700262653001900989653002501008653002901033653001701062100001701079700001601096856009301112 2013 eng d00aOptimal robust self-testing by binary nonlocal XOR games0 aOptimal robust selftesting by binary nonlocal XOR games bSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing a254–2620 v223 aSelf-testing a quantum apparatus means verifying the existence of a certain quantum state as well as the effect of the associated measuring devices based only on the statistics of the measurement outcomes. Robust (i.e., error-tolerant) self-testing quantum apparatuses are critical building blocks for quantum cryptographic protocols that rely on imperfect or untrusted devices. We devise a general scheme for proving optimal robust self-testing properties for tests based on nonlocal binary XOR games. We offer some simplified proofs of known results on self-testing, and also prove some new results.

10anonlocal games10aquantum cryptography10aRandom number generation10aSelf-testing1 aMiller, Carl1 aShi, Yaoyun uhttps://quics.umd.edu/publications/optimal-robust-self-testing-binary-nonlocal-xor-games