What is the most efficient way to generate random numbers device-independently using a photon pair source based on spontaneous parametric down conversion (SPDC)? We consider this question by comparing two implementations of a detection-loophole-free Bell test. In particular, we study in detail a scenario where a heralded single photon source (HSPS) is used to herald path-entangled states, i.e. entanglement between two spatial modes sharing a single photon and where non-locality is revealed using photon counting preceded by small displacement operations. We start by giving a theoretical description of such a measurement. We then show how to optimize the Bell-CHSH violation through a non-perturbative calculation, taking the main experimental ...
In this paper we propose a quantum random number generator (QRNG) which utilises an entangled photon...
Randomness is a fundamental feature of nature and a valuable resource for applications ranging from ...
Bell inequality violations can be used to certify private randomness for use in cryptographic applic...
Abstract. Genuine randomness can be certified from Bell tests without any detailed assumptions on th...
Measurement outcomes on quantum systems exhibit inherent randomness and are fundamentally nondetermi...
We present a violation of the Clauser-Home-Shimony-Holt inequality without the fair sampling assumpt...
In the past two decades, the union of quantum mechanics and information science has led to significa...
Motivated by very recent experiments, we consider a scenario "`a la Bell" in which two protagonists ...
This project aims to develop a consistent source of entangled photon pairs to be used for quantum co...
One of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality....
Loophole-free Bell tests for quantum nonlocality and long-distance secure communication require phot...
Device-independent randomness generation and quantum key distribution protocols rely on a fundamenta...
In quantum cryptography, random number generators play a crucial role in the quantum key distributio...
Device-independent quantum key distribution (DIQKD) guarantees unconditional security of a secret ke...
According to quantum theory, the outcomes obtained by measuring an entangled state necessarily exhib...
In this paper we propose a quantum random number generator (QRNG) which utilises an entangled photon...
Randomness is a fundamental feature of nature and a valuable resource for applications ranging from ...
Bell inequality violations can be used to certify private randomness for use in cryptographic applic...
Abstract. Genuine randomness can be certified from Bell tests without any detailed assumptions on th...
Measurement outcomes on quantum systems exhibit inherent randomness and are fundamentally nondetermi...
We present a violation of the Clauser-Home-Shimony-Holt inequality without the fair sampling assumpt...
In the past two decades, the union of quantum mechanics and information science has led to significa...
Motivated by very recent experiments, we consider a scenario "`a la Bell" in which two protagonists ...
This project aims to develop a consistent source of entangled photon pairs to be used for quantum co...
One of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality....
Loophole-free Bell tests for quantum nonlocality and long-distance secure communication require phot...
Device-independent randomness generation and quantum key distribution protocols rely on a fundamenta...
In quantum cryptography, random number generators play a crucial role in the quantum key distributio...
Device-independent quantum key distribution (DIQKD) guarantees unconditional security of a secret ke...
According to quantum theory, the outcomes obtained by measuring an entangled state necessarily exhib...
In this paper we propose a quantum random number generator (QRNG) which utilises an entangled photon...
Randomness is a fundamental feature of nature and a valuable resource for applications ranging from ...
Bell inequality violations can be used to certify private randomness for use in cryptographic applic...