Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Piotr Mironowicz is active.

Publication


Featured researches published by Piotr Mironowicz.


Physical Review A | 2015

Robust amplification of Santha-Vazirani sources with three devices

Piotr Mironowicz; Rodrigo Gallego; Marcin Pawlowski

We demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness. It has a very important property that for any quality the required violation is strictly lower than possible to obtain using quantum resources. Among other things, it means that the protocol takes a finite amount of time to amplify arbitrarily weak randomness.


Physical Review A | 2014

Properties of dimension witnesses and their semidefinite programming relaxations

Piotr Mironowicz; Hong-Wei Li; Marcin Pawlowski

In this paper we develop a method for investigating semi-device-independent randomness expansion protocols that was introduced in [Li et al., Phys. Rev. A


Physical Review A | 2013

Relationship between semi- and fully-device-independent protocols

Hong-Wei Li; Piotr Mironowicz; Marcin Pawlowski; Zhen-Qiang Yin; Yu-Chun Wu; Shuang Wang; Wei Chen; Hong-Gang Hu; Guang-Can Guo; Zheng-Fu Han

\mathbf{87}


Physical Review A | 2015

Device-independent quantum key distribution based on measurement inputs

Ramij Rahaman; Matthew G. Parker; Piotr Mironowicz; Marcin Pawlowski

, 020302(R) (2013)]. This method allows to lower-bound, with semi-definite programming, the randomness obtained from random number generators based on dimension witnesses. We also investigate the robustness of some randomness expanders using this method. We show the role of an assumption about the trace of the measurement operators and a way to avoid it. The method is also generalized to systems of arbitrary dimension, and for a more general form of dimension witnesses, than it the previous paper. Finally, we introduce a procedure of dimension witness reduction, which can be used to obtain from an existing witness a new one with higher amount of certifiable randomness. The presented methods finds an application for experiments [Ahrens et al., Phys. Rev. Lett.


Physical Review A | 2017

Complementarity between entanglement-assisted and quantum distributed random access code

Alley Hameedi; Debashis Saha; Piotr Mironowicz; Marcin Pawlowski; Mohamed Bourennane

\mathbf{112}


Physical Review A | 2013

Robustness of quantum-randomness expansion protocols in the presence of noise

Piotr Mironowicz; Marcin Pawlowski

, 140401 (2014)].


New Journal of Physics | 2016

Increased certification of semi-device independent random numbers using many inputs and more post-processing

Piotr Mironowicz; Armin Tavakoli; Alley Hameedi; Breno Marques; Marcin Pawlowski; Mohamed Bourennane

We study the relation between semi and fully device independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter and vice versa. This relation provides us with interesting results for both scenarios. First, we find new random number generation protocols with higher bit rates for both the semi and fully device independent cases. As a byproduct, we obtain whole new classes of Bell inequalities and dimension witnesses. Then, we show how optimization methods used in studies on Bell inequalities can be adopted for dimension witnesses.


arXiv: Quantum Physics | 2013

Amplification of arbitrarily weak randomness

Piotr Mironowicz; Marcin Pawlowski

We provide an analysis of a new family of device independent quantum key distribution (QKD) protocols with several novel features: (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings; (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key. The main advantage of these protocols is a smaller vulnerability to imperfect random number generators made possible by feature (a). We prove the security and the robustness of such protocols. We show that using our method it is possible to construct a QKD protocol which retains its security even if the source of randomness used by communicating parties is strongly biased. As a proof of principle, an explicit example of a protocol based on the Hardys paradox is presented. Moreover, in the noiseless case, the protocol is secure in a natural way against any type of memory attack, and thus allows to reuse the device in subsequent rounds. We also analyse the robustness of the protocol using semi-definite programming methods. Finally, we present a post-processing method, and observe a paradoxical property that rejecting some random part of the private data can increase the key rate of the protocol.


Physical Review A | 2018

Trade-offs in multiparty Bell-inequality violations in qubit networks

Ravishankar Ramanathan; Piotr Mironowicz

Collaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classica ...


arXiv: Quantum Physics | 2018

Applications of semi-definite optimization in quantum information protocols

Piotr Mironowicz

In this paper we investigate properties of several randomness generation protocols in the device independent framework. Using Bell-type inequalities it is possible to certify that the numbers generated by an untrusted device are indeed random. We present a selection of certificates which guarantee two bits of randomness for each run of the experiment in the noiseless case and require the parties to share a maximally entangled state. To compare them we study their efficiency in the presence of white noise. We find that for different amounts of noise different operators are optimal for certifying most randomness. Therefore the vendor of the device should use different protocols depending on the amount of noise expected to occur. Another of our results that we find particularly interesting is that using a single Bell operator as a figure of merit is rarely optimal.

Collaboration


Dive into the Piotr Mironowicz's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Breno Marques

University of São Paulo

View shared research outputs
Top Co-Authors

Avatar

Hong-Wei Li

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Pawel Horodecki

Gdańsk University of Technology

View shared research outputs
Top Co-Authors

Avatar

Paweł Należyty

Nicolaus Copernicus University in Toruń

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge