{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T03:17:40Z","timestamp":1776309460441,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"7700","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Nature"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1038\/s41586-018-0019-0","type":"journal-article","created":{"date-parts":[[2018,3,31]],"date-time":"2018-03-31T15:41:32Z","timestamp":1522510892000},"page":"223-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":175,"title":["Experimentally generated randomness certified by the impossibility of superluminal signals"],"prefix":"10.1038","volume":"556","author":[{"given":"Peter","family":"Bierhorst","sequence":"first","affiliation":[]},{"given":"Emanuel","family":"Knill","sequence":"additional","affiliation":[]},{"given":"Scott","family":"Glancy","sequence":"additional","affiliation":[]},{"given":"Yanbao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Mink","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Jordan","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Rommal","sequence":"additional","affiliation":[]},{"given":"Yi-Kai","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bradley","family":"Christensen","sequence":"additional","affiliation":[]},{"given":"Sae Woo","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Martin J.","family":"Stevens","sequence":"additional","affiliation":[]},{"given":"Lynden K.","family":"Shalm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1038\/nature20119","volume":"540","author":"A Ac\u00edn","year":"2016","unstructured":"Ac\u00edn, A. & Masanes, L. Certified randomness in quantum physics. Nature 540, 213\u2013219 (2016).","journal-title":"Nature"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"012336","DOI":"10.1103\/PhysRevA.87.012336","volume":"87","author":"S Pironio","year":"2013","unstructured":"Pironio, S. & Massar, S. Security of practical private randomness generation. Phys. Rev. A 87, 012336 (2013).","journal-title":"Phys. Rev. A"},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2885493","volume":"63","author":"CA Miller","year":"2016","unstructured":"Miller, C. A. & Shi, Y. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices. J. ACM 63, 33 (2016).","journal-title":"J. ACM"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"095305","DOI":"10.1088\/1751-8113\/44\/9\/095305","volume":"44","author":"R Colbeck","year":"2011","unstructured":"Colbeck, R. & Kent, A. Private randomness expansion with untrusted devices. J. Phys. A 44, 095305 (2011).","journal-title":"J. Phys. A"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1038\/nature09008","volume":"464","author":"S Pironio","year":"2010","unstructured":"Pironio, S. et al. Random numbers certified by Bell\u2019s theorem. Nature 464, 1021\u20131024 (2010).","journal-title":"Nature"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Vazirani, U. & Vidick, T. Certifiable quantum dice - or, exponential randomness expansion. In STOC\u201912 Proc. 44th Annual ACM Symposium on Theory of Computing (ed. Pitassi, T.) 61\u201376 (2012).","DOI":"10.1145\/2213977.2213984"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"012335","DOI":"10.1103\/PhysRevA.87.012335","volume":"87","author":"S Fehr","year":"2013","unstructured":"Fehr, S., Gelles, R. & Schaffner, C. Security and composability of randomness expansion from Bell inequalities. Phys. Rev. A 87, 012335 (2013).","journal-title":"Phys. Rev. A"},{"key":"19_CR8","unstructured":"Chung, K.-M., Shi, Y. & Wu, X. Physical randomness extractors: generating random numbers with minimal assumptions. Preprint at https:\/\/arxiv.org\/abs\/1402.4797 (2014)."},{"key":"19_CR9","doi-asserted-by":"publisher","first-page":"013035","DOI":"10.1088\/1367-2630\/16\/1\/013035","volume":"16","author":"O Nieto-Silleras","year":"2014","unstructured":"Nieto-Silleras, O., Pironio, S. & Silman, J. Using complete measurement statistics for optimal device-independent randomness evaluation. New J. Phys. 16, 013035 (2014).","journal-title":"New J. Phys."},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"033011","DOI":"10.1088\/1367-2630\/16\/3\/033011","volume":"16","author":"J-D Bancal","year":"2014","unstructured":"Bancal, J.-D., Sheridan, L. & Scarani, V. More randomness from the same data. New J. Phys. 16, 033011 (2014).","journal-title":"New J. Phys."},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"035007","DOI":"10.1088\/1367-2630\/18\/3\/035007","volume":"18","author":"L Thinh","year":"2016","unstructured":"Thinh, L., de la Torre, G., Bancal, J.-D., Pironio, P. & Scarani, V. Randomness in post-selected events. New J. Phys. 18, 035007 (2016).","journal-title":"New J. Phys."},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1038\/nature15759","volume":"526","author":"B Hensen","year":"2015","unstructured":"Hensen, B. et al. Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature 526, 682\u2013686 (2015).","journal-title":"Nature"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"250402","DOI":"10.1103\/PhysRevLett.115.250402","volume":"115","author":"LK Shalm","year":"2015","unstructured":"Shalm, L. K. et al. Strong loophole-free test of local realism. Phys. Rev. Lett. 115, 250402 (2015).","journal-title":"Phys. Rev. Lett."},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"250401","DOI":"10.1103\/PhysRevLett.115.250401","volume":"115","author":"M Giustina","year":"2015","unstructured":"Giustina, M. et al. Significant-loophole-free test of Bell\u2019s theorem with entangled photons. Phys. Rev. Lett. 115, 250401 (2015).","journal-title":"Phys. Rev. Lett."},{"key":"19_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding Cryptography","author":"C Paar","year":"2010","unstructured":"Paar, C. & Pelzl, J. Understanding Cryptography\u00a0(Springer, Heidelberg, 2010)."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Fischer, M. J., Iorga, M. & Peralta, R. A public randomness service. In Proc. International Conference on Security and Cryptography (SECRYPT 2011) (eds Lopez, J. & Samarati, P.) 434\u2013438 (2011).","DOI":"10.5220\/0003612604340438"},{"key":"19_CR17","first-page":"195","volume":"1","author":"JS Bell","year":"1964","unstructured":"Bell, J. S. On the Einstein Podolsky Rosen paradox. Phys. Phys. Fiz. 1, 195\u2013200 (1964).","journal-title":"Phys. Phys. Fiz."},{"key":"19_CR18","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1111\/j.1746-8361.1985.tb01249.x","volume":"39","author":"JS Bell","year":"1985","unstructured":"Bell, J. S., Shimony, A., Horne, M. A. & Clauser, J. F. An exchange on local beables. Dialectica 39, 85\u201396 (1985).","journal-title":"Dialectica"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Mayers, D. & Yao, A. Quantum cryptography with imperfect apparatus. In FOCS\u201998 Proc. 39th Annual Symposium on Foundations of Computer Science (ed Motwani, R.) 503\u2013509 (1998).","DOI":"10.1109\/SFCS.1998.743501"},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.98.230501","volume":"98","author":"A Ac\u00edn","year":"2007","unstructured":"Ac\u00edn, A. et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).","journal-title":"Phys. Rev. Lett."},{"key":"19_CR21","doi-asserted-by":"publisher","first-page":"010503","DOI":"10.1103\/PhysRevLett.120.010503","volume":"120","author":"Y Liu","year":"2018","unstructured":"Liu, Y. et al. High-speed device-independent quantum random number generation without a detection loophole. Phys. Rev. Lett. 120, 010503 (2018).","journal-title":"Phys. Rev. Lett."},{"key":"19_CR22","doi-asserted-by":"publisher","first-page":"010402","DOI":"10.1103\/PhysRevLett.119.010402","volume":"119","author":"W Rosenfeld","year":"2017","unstructured":"Rosenfeld, W. et al. Event-ready Bell test using entangled atoms simultaneously closing detection and locality loopholes. Phys. Rev. Lett. 119, 010402 (2017).","journal-title":"Phys. Rev. Lett."},{"key":"19_CR23","unstructured":"Abell\u00e1n, C. et al. Challenging local realism with human choices. Nature (in the press)."},{"key":"19_CR24","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1103\/RevModPhys.86.419","volume":"86","author":"N Brunner","year":"2014","unstructured":"Brunner, N., Cavalcanti, D., Pironio, S., Scarani, V. & Wehner, S. Bell nonlocality. Rev. Mod. Phys. 86, 419\u2013478 (2014).","journal-title":"Rev. Mod. Phys."},{"key":"19_CR25","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/BF00417500","volume":"4","author":"BS Cirel\u2019son","year":"1980","unstructured":"Cirel\u2019son, B. S. Quantum generalizations of Bell\u2019s inequality. Lett. Math. Phys. 4, 93\u2013100 (1980).","journal-title":"Lett. Math. Phys."},{"key":"19_CR26","doi-asserted-by":"publisher","first-page":"073013","DOI":"10.1088\/1367-2630\/10\/7\/073013","volume":"10","author":"M Navascu\u00e9s","year":"2008","unstructured":"Navascu\u00e9s, M., Pironio, S. & Ac\u00edn, A. A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations. New J. Phys. 10, 073013 (2008).","journal-title":"New J. Phys."},{"key":"19_CR27","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1145\/502090.502099","volume":"48","author":"L Trevisan","year":"2001","unstructured":"Trevisan, L. Extractors and pseudorandom generators. J. Assoc. Comput. Mach. 48, 860\u2013879 (2001).","journal-title":"J. Assoc. Comput. Mach."},{"key":"19_CR28","unstructured":"Mauerer, W., Portmann, C. & Scholz, V. B. A modular framework for randomness extraction based on Trevisan\u2019s construction. Preprint at https:\/\/arxiv.org\/abs\/1212.0520 (2012)."},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Coudron, M. & Yuen, H. Infinite randomness expansion with a constant number of devices. In STOC\u201914 Proc. 46th Annual ACM Symposium on Theory of Computing (ed Shmoys, D.) 427\u2013436 (2014).","DOI":"10.1145\/2591796.2591873"},{"key":"19_CR30","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-02307-4","volume":"9","author":"R Arnon-Friedman","year":"2018","unstructured":"Arnon-Friedman, R., Dupuis, F., Fawzi, O., Renner, R. & Vidick, T. Practical device-independent quantum cryptography via entropy accumulation. Nat. Commun. 9, 459 (2018).","journal-title":"Nat. Commun."},{"key":"19_CR31","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1137\/15M1044333","volume":"46","author":"C Miller","year":"2017","unstructured":"Miller, C. & Shi, Y. Universal security for randomness expansion from the spot-checking protocol. SIAM J. Comput. 46, 1304\u20131335 (2017).","journal-title":"SIAM J. Comput."},{"key":"19_CR32","doi-asserted-by":"publisher","first-page":"062118","DOI":"10.1103\/PhysRevA.84.062118","volume":"84","author":"Y Zhang","year":"2011","unstructured":"Zhang, Y., Glancy, S. & Knill, E. Asymptotically optimal data analysis for rejecting local realism. Phys. Rev. A 84, 062118 (2011).","journal-title":"Phys. Rev. A"},{"key":"19_CR33","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1038\/nphoton.2013.13","volume":"7","author":"F Marsili","year":"2013","unstructured":"Marsili, F. et al. Detecting single infrared photons with 93% system efficiency. Nat. Photon. 7, 210\u2013214 (2013).","journal-title":"Nat. Photon."}],"container-title":["Nature"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.nature.com\/articles\/s41586-018-0019-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.nature.com\/articles\/s41586-018-0019-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.nature.com\/articles\/s41586-018-0019-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T08:56:07Z","timestamp":1751532967000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s41586-018-0019-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":33,"journal-issue":{"issue":"7700","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["19"],"URL":"https:\/\/doi.org\/10.1038\/s41586-018-0019-0","relation":{},"ISSN":["0028-0836","1476-4687"],"issn-type":[{"value":"0028-0836","type":"print"},{"value":"1476-4687","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]},"assertion":[{"value":"6 April 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}