{"id":"https://openalex.org/W2613903324","doi":"https://doi.org/10.1109/jsait.2020.3012498","title":"Device-Independent Randomness Amplification and Privatization","display_name":"Device-Independent Randomness Amplification and Privatization","publication_year":2020,"publication_date":"2020-07-31","ids":{"openalex":"https://openalex.org/W2613903324","doi":"https://doi.org/10.1109/jsait.2020.3012498","mag":"2613903324"},"language":"en","primary_location":{"id":"doi:10.1109/jsait.2020.3012498","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsait.2020.3012498","pdf_url":"https://ieeexplore.ieee.org/ielx7/8700143/9204492/09153851.pdf","source":{"id":"https://openalex.org/S4210211895","display_name":"IEEE Journal on Selected Areas in Information Theory","issn_l":"2641-8770","issn":["2641-8770"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/8700143/9204492/09153851.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Max Kessler","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Max Kessler","raw_affiliation_strings":["Institute for Theoretical Physics, ETH-Z\u00fcrich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Institute for Theoretical Physics, ETH-Z\u00fcrich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":null,"display_name":"Rotem Arnon-Friedman","orcid":"https://orcid.org/0000-0002-5808-6279"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rotem Arnon-Friedman","raw_affiliation_strings":["Electrical Engineering and Computer Science Department, University of California at Berkeley, Berkeley, USA"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science Department, University of California at Berkeley, Berkeley, USA","institution_ids":["https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":2.4469,"has_fulltext":true,"cited_by_count":25,"citation_normalized_percentile":{"value":0.90979634,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"1","issue":"2","first_page":"568","last_page":"584"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2517000138759613,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2517000138759613,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.20080000162124634,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.1728000044822693,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.8901000022888184},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.5611000061035156},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5008999705314636},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.49390000104904175},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47130000591278076},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.41940000653266907},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.41130000352859497},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.40389999747276306},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.34299999475479126}],"concepts":[{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.8901000022888184},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.5611000061035156},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5008999705314636},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49549999833106995},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.49390000104904175},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.48030000925064087},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47130000591278076},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.41940000653266907},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.41130000352859497},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.40389999747276306},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.398499995470047},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.34299999475479126},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.34130001068115234},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3393999934196472},{"id":"https://openalex.org/C5320026","wikidata":"https://www.wikidata.org/wiki/Q2122216","display_name":"Quantum information science","level":4,"score":0.33570000529289246},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.33160001039505005},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.3314000070095062},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.32019999623298645},{"id":"https://openalex.org/C203087015","wikidata":"https://www.wikidata.org/wiki/Q378201","display_name":"Qubit","level":3,"score":0.2775999903678894},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.27469998598098755},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.2694999873638153},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.26809999346733093},{"id":"https://openalex.org/C114671716","wikidata":"https://www.wikidata.org/wiki/Q17142987","display_name":"No-teleportation theorem","level":5,"score":0.26649999618530273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2655999958515167},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.25099998712539673},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.2506999969482422}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jsait.2020.3012498","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsait.2020.3012498","pdf_url":"https://ieeexplore.ieee.org/ielx7/8700143/9204492/09153851.pdf","source":{"id":"https://openalex.org/S4210211895","display_name":"IEEE Journal on Selected Areas in Information Theory","issn_l":"2641-8770","issn":["2641-8770"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Information Theory","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1705.04148","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1705.04148","pdf_url":"https://arxiv.org/pdf/1705.04148","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1109/jsait.2020.3012498","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsait.2020.3012498","pdf_url":"https://ieeexplore.ieee.org/ielx7/8700143/9204492/09153851.pdf","source":{"id":"https://openalex.org/S4210211895","display_name":"IEEE Journal on Selected Areas in Information Theory","issn_l":"2641-8770","issn":["2641-8770"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Information Theory","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1021231585","display_name":null,"funder_award_id":"FA9550-19-1-020","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G1514697003","display_name":null,"funder_award_id":"FA9550-16-1-0245","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G1523888516","display_name":null,"funder_award_id":"FA9550-","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G230078430","display_name":null,"funder_award_id":"FA9550-16","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G3392305090","display_name":null,"funder_award_id":"-16-1-","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G3616359867","display_name":null,"funder_award_id":"FA9550-16-1","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G462004892","display_name":null,"funder_award_id":"FA9550-19-1-0202","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G5809100787","display_name":null,"funder_award_id":"FA9550","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320924","display_name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","ror":"https://ror.org/00yjd3n13"},{"id":"https://openalex.org/F4320321652","display_name":"Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich","ror":"https://ror.org/05a28rw58"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2613903324.pdf","grobid_xml":"https://content.openalex.org/works/W2613903324.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W1709784975","https://openalex.org/W1747768630","https://openalex.org/W1852482352","https://openalex.org/W1931557763","https://openalex.org/W1969551467","https://openalex.org/W1976815826","https://openalex.org/W1982305921","https://openalex.org/W1986293140","https://openalex.org/W1995875735","https://openalex.org/W2028815089","https://openalex.org/W2034377058","https://openalex.org/W2051051926","https://openalex.org/W2062739241","https://openalex.org/W2082730452","https://openalex.org/W2135830616","https://openalex.org/W2139071790","https://openalex.org/W2143255200","https://openalex.org/W2151303208","https://openalex.org/W2164253138","https://openalex.org/W2166302514","https://openalex.org/W2170184539","https://openalex.org/W2174298480","https://openalex.org/W2288095892","https://openalex.org/W2302738770","https://openalex.org/W2327826370","https://openalex.org/W2337218539","https://openalex.org/W2494499351","https://openalex.org/W2535210057","https://openalex.org/W2560581185","https://openalex.org/W2762179548","https://openalex.org/W2785593271","https://openalex.org/W2990961515","https://openalex.org/W4211058570","https://openalex.org/W6671082024"],"related_works":[],"abstract_inverted_index":{"Secret":[0],"and":[1,37,70,88,119,143,192],"perfect":[2,38],"randomness":[3,39,110],"is":[4,12,20,105,155],"an":[5],"essential":[6],"resource":[7],"in":[8,58,96,188],"cryptography.":[9],"Yet,":[10],"it":[11],"not":[13,31],"even":[14,57],"clear":[15],"that":[16,23,79,152,159],"such":[17,54],"exists.":[18],"It":[19],"well":[21],"known":[22],"the":[24,49,59,72,97,106,114,130,156,189],"tools":[25],"of":[26,74,99,121,132,178],"classical":[27],"computer":[28],"science":[29],"do":[30],"allow":[32],"us":[33],"to":[34,93,108,184],"create":[35],"secret":[36,91],"from":[40],"a":[41,55,75,90,100,122,133,175,181,193],"single":[42,82],"weak":[43],"public":[44,83,123],"source.":[45],"Quantum":[46],"physics,":[47],"on":[48],"other":[50],"hand,":[51],"allows":[52],"for":[53,195],"process,":[56],"most":[60],"paranoid":[61],"cryptographic":[62],"sense":[63],"termed":[64],"\u201cdevice-independent":[65],"quantum":[66,101],"cryptography\u201d.":[67],"We":[68,167],"propose":[69],"prove":[71],"security":[73],"new":[76,173],"device-independent":[77,190],"protocol":[78,154,158],"takes":[80],"any":[81],"Santha-Vazirani":[84,124],"source":[85,125],"as":[86],"input":[87],"creates":[89],"close":[92],"uniform":[94],"string":[95],"presence":[98],"adversary.":[102],"Our":[103],"work":[104],"first":[107,157],"achieve":[109,168],"amplification":[111,118],"with":[112,126,135,164],"all":[113],"following":[115],"properties:":[116],"(1)":[117],"\u201cprivatization\u201d":[120],"arbitrary":[127],"bias":[128],"(2)":[129],"use":[131],"device":[134],"only":[136],"two":[137],"components":[138],"(3)":[139],"non-vanishing":[140],"extraction":[141],"rate":[142],"(4)":[144],"maximal":[145],"noise":[146],"tolerance.":[147],"In":[148],"particular,":[149],"this":[150],"implies":[151],"our":[153],"can":[160],"possibly":[161],"be":[162],"implemented":[163],"reachable":[165],"parameters.":[166],"these":[169],"by":[170],"combining":[171],"three":[172],"tools:":[174],"particular":[176],"family":[177],"Bell":[179],"inequalities,":[180],"proof":[182],"technique":[183],"lower":[185],"bound":[186],"entropy":[187],"setting,":[191],"framework":[194],"quantum-proof":[196],"multi-source":[197],"extractors.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2017-05-19T00:00:00"}
