Piotr Mironowicz
Gdańsk University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Piotr Mironowicz.
Physical Review A | 2015
Piotr Mironowicz; Rodrigo Gallego; Marcin Pawlowski
We demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness. It has a very important property that for any quality the required violation is strictly lower than possible to obtain using quantum resources. Among other things, it means that the protocol takes a finite amount of time to amplify arbitrarily weak randomness.
Physical Review A | 2014
Piotr Mironowicz; Hong-Wei Li; Marcin Pawlowski
In this paper we develop a method for investigating semi-device-independent randomness expansion protocols that was introduced in [Li et al., Phys. Rev. A
Physical Review A | 2013
Hong-Wei Li; Piotr Mironowicz; Marcin Pawlowski; Zhen-Qiang Yin; Yu-Chun Wu; Shuang Wang; Wei Chen; Hong-Gang Hu; Guang-Can Guo; Zheng-Fu Han
\mathbf{87}
Physical Review A | 2015
Ramij Rahaman; Matthew G. Parker; Piotr Mironowicz; Marcin Pawlowski
, 020302(R) (2013)]. This method allows to lower-bound, with semi-definite programming, the randomness obtained from random number generators based on dimension witnesses. We also investigate the robustness of some randomness expanders using this method. We show the role of an assumption about the trace of the measurement operators and a way to avoid it. The method is also generalized to systems of arbitrary dimension, and for a more general form of dimension witnesses, than it the previous paper. Finally, we introduce a procedure of dimension witness reduction, which can be used to obtain from an existing witness a new one with higher amount of certifiable randomness. The presented methods finds an application for experiments [Ahrens et al., Phys. Rev. Lett.
Physical Review A | 2017
Alley Hameedi; Debashis Saha; Piotr Mironowicz; Marcin Pawlowski; Mohamed Bourennane
\mathbf{112}
Physical Review A | 2013
Piotr Mironowicz; Marcin Pawlowski
, 140401 (2014)].
New Journal of Physics | 2016
Piotr Mironowicz; Armin Tavakoli; Alley Hameedi; Breno Marques; Marcin Pawlowski; Mohamed Bourennane
We study the relation between semi and fully device independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter and vice versa. This relation provides us with interesting results for both scenarios. First, we find new random number generation protocols with higher bit rates for both the semi and fully device independent cases. As a byproduct, we obtain whole new classes of Bell inequalities and dimension witnesses. Then, we show how optimization methods used in studies on Bell inequalities can be adopted for dimension witnesses.
arXiv: Quantum Physics | 2013
Piotr Mironowicz; Marcin Pawlowski
We provide an analysis of a new family of device independent quantum key distribution (QKD) protocols with several novel features: (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings; (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key. The main advantage of these protocols is a smaller vulnerability to imperfect random number generators made possible by feature (a). We prove the security and the robustness of such protocols. We show that using our method it is possible to construct a QKD protocol which retains its security even if the source of randomness used by communicating parties is strongly biased. As a proof of principle, an explicit example of a protocol based on the Hardys paradox is presented. Moreover, in the noiseless case, the protocol is secure in a natural way against any type of memory attack, and thus allows to reuse the device in subsequent rounds. We also analyse the robustness of the protocol using semi-definite programming methods. Finally, we present a post-processing method, and observe a paradoxical property that rejecting some random part of the private data can increase the key rate of the protocol.
Physical Review A | 2018
Ravishankar Ramanathan; Piotr Mironowicz
Collaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classica ...
arXiv: Quantum Physics | 2018
Piotr Mironowicz
In this paper we investigate properties of several randomness generation protocols in the device independent framework. Using Bell-type inequalities it is possible to certify that the numbers generated by an untrusted device are indeed random. We present a selection of certificates which guarantee two bits of randomness for each run of the experiment in the noiseless case and require the parties to share a maximally entangled state. To compare them we study their efficiency in the presence of white noise. We find that for different amounts of noise different operators are optimal for certifying most randomness. Therefore the vendor of the device should use different protocols depending on the amount of noise expected to occur. Another of our results that we find particularly interesting is that using a single Bell operator as a figure of merit is rarely optimal.