Matej Pivoluska
Masaryk University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Matej Pivoluska.
Physical Review A | 2012
Jan Bouda; Matej Pivoluska; Martin Plesch; Colin Wilmott
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this Letter we show that the security of QKD protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels.
Physical Review A | 2014
Jan Bouda; Marcin Pawlowski; Matej Pivoluska; Martin Plesch
In this paper we design a protocol to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy block source in a device independent setting. The protocol employs Mermin devices that exhibit super-classical correlations. Number of devices used scales polynomially in the length of the block n, containing entropy of at least two bits. Our protocol is robust, it can tolerate devices that malfunction with a probability dropping polynomially in n at the cost of constant increase of the number of devices used.
Physical Review A | 2014
Jan Bouda; Marcin Pawlowski; Matej Pivoluska; Martin Plesch
Expansion and amplification of weak randomness play a crucial role in many security protocols. Using quantum devices, such procedure is possible even without trusting the devices used, by utilizing correlations between outcomes of parts of the devices. We show here how to extract random bits with an arbitrarily low bias from single arbitrarily weak min-entropy block source in a device independent setting. To do this we use Mermin devices that exhibit super-classical correlations. The number of devices used scales polynomially in the length of the random sequence n. Our protocol is robust, it can tolerate devices that malfunction with probability decreasing polynomially in n at the cost of minor increase in the number of devices used.
New Journal of Physics | 2016
Matej Pivoluska; Martin Plesch
A
Nature Physics | 2018
Jessica Bavaresco; Natalia Herrera Valencia; Claude Klöckl; Matej Pivoluska; Paul Erker; Nicolai Friis; Mehul Malik; Marcus Huber
\mathrm{CHSH}_{q}
Physical Review A | 2016
Matej Pivoluska; Marcin Pawlowski; Martin Plesch
game is a generalization of the standard two player
New Journal of Physics | 2018
Martin Plesch; Matej Pivoluska
\mathrm{CHSH}
Physical Review A | 2017
Martin Plesch; Marcin Pawlowski; Matej Pivoluska
game, having
conference on theory of quantum computation communication and cryptography | 2014
Jan Bouda; Marcin Pawlowski; Matej Pivoluska; Martin Plesch
q
arXiv: Quantum Physics | 2013
Martin Plesch; Matej Pivoluska
different input and output options. In contrast to the binary game, the best classical and quantum winning strategies are not known exactly. In this paper we provide a constructive classical strategy for winning a