{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:13:07Z","timestamp":1764936787551,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1318070, 1216729, 1017335"],"award-info":[{"award-number":["1318070, 1216729, 1017335"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2011CBA00300, 2011CBA00301"],"award-info":[{"award-number":["2011CBA00300, 2011CBA00301"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2591796.2591843","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T12:01:58Z","timestamp":1443700918000},"page":"417-426","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices"],"prefix":"10.1145","author":[{"given":"Carl A.","family":"Miller","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI"}]},{"given":"Yaoyun","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.062326"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.110.010503"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.010503"},{"volume-title":"Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, 11: 175--179","year":"1984","author":"Bennett C.","key":"e_1_3_2_2_4_1"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"E. Biham M. Boyer P. O. Boykin T. Mor and V. Roychowdhury. A proof of the security of quantum key distribution. Journal of Cryptology: the journal of the International Association for Cryptologic Research 19(4):381--439 Oct. 2006.  E. Biham M. Boyer P. O. Boykin T. Mor and V. Roychowdhury. A proof of the security of quantum key distribution. Journal of Cryptology: the journal of the International Association for Cryptologic Research 19(4):381--439 Oct. 2006.","DOI":"10.1007\/s00145-005-0011-3"},{"key":"e_1_3_2_2_6_1","unstructured":"K.-M. Chung X. Wu and Y. Shi. Physical randomness extractors. arXiv:1402.4797 2014.  K.-M. Chung X. Wu and Y. Shi. Physical randomness extractors. arXiv:1402.4797 2014."},{"volume-title":"University of Cambridge","year":"2006","author":"Colbeck R.","key":"e_1_3_2_2_7_1"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/44\/9\/095305"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2300"},{"key":"e_1_3_2_2_10_1","unstructured":"M.\n       \n      Coudron T.\n       \n      Vidick and \n      \n      \n      H.\n       \n      Yuen\n      \n  \n  . \n  Robust randomness amplifiers: Upper and lower bounds. In P. Raghavendra S. Raskhodnikova K. Jansen and J. D. P. Rolim editors Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques - 16th International Workshop APPROX\n   \n  2013 and 17th International Workshop RANDOM\n   2013 Berkeley CA USA August 21-23 2013. Proceedings volume \n  8096\n   of \n  Lecture Notes in Computer Science pages \n  468\n  --\n  483\n  . \n  Springer 2013.  M. Coudron T. Vidick and H. Yuen. Robust randomness amplifiers: Upper and lower bounds. In P. Raghavendra S. Raskhodnikova K. Jansen and J. D. P. Rolim editors Approximation Randomization and Combinatorial Optimization. Algorithms and Techniques - 16th International Workshop APPROX 2013 and 17th International Workshop RANDOM 2013 Berkeley CA USA August 21-23 2013. Proceedings volume 8096 of Lecture Notes in Computer Science pages 468--483. Springer 2013."},{"key":"e_1_3_2_2_11_1","unstructured":"M. Coudron and H. Yuen. Infinite randomness expansion and amplification with a constant number of devices. arXiv:1310.6755.  M. Coudron and H. Yuen. Infinite randomness expansion and amplification with a constant number of devices. arXiv:1310.6755."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/100813683"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.88.012323"},{"key":"e_1_3_2_2_14_1","unstructured":"F. Dupuis O. Fawzi and S. Wehner. Entanglement sampling and applications May 06 2013. arxiv: 1305.1316.  F. Dupuis O. Fawzi and S. Wehner. Entanglement sampling and applications May 06 2013. arxiv:1305.1316."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.012335"},{"volume-title":"Kluwer","year":"1989","author":"Greenberger D.","key":"e_1_3_2_2_17_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.5"},{"volume-title":"Proceedings of the 21st USENIX Security Symposium","year":"2012","author":"Heninger N.","key":"e_1_3_2_2_19_1"},{"key":"e_1_3_2_2_20_1","unstructured":"V. Jaksic Y. Ogata Y. Pautrat and C.-A. Pillet. Entropic fluctuations in quantum statistical mechanics. an introduction. Quantum Theory from Small to Large Scales: Lecture Notes of the Les Houches Summer School 95 Aug. 2010.  V. Jaksic Y. Ogata Y. Pautrat and C.-A. Pillet. Entropic fluctuations in quantum statistical mechanics. an introduction. Quantum Theory from Small to Large Scales: Lecture Notes of the Les Houches Summer School 95 Aug. 2010."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.283.5410.2050"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/382780.382781"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/795664.796390"},{"key":"e_1_3_2_2_24_1","unstructured":"M. McKague. Self-testing graph states. arXiv:1010.1989 2010.  M. McKague. Self-testing graph states. arXiv:1010.1989 2010."},{"key":"e_1_3_2_2_25_1","unstructured":"C. A. Miller and Y. Shi. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices. arXiv:1402.0489.  C. A. Miller and Y. Shi. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices. arXiv:1402.0489."},{"key":"e_1_3_2_2_26_1","series-title":"LIPIcs","first-page":"254","volume-title":"8th Conference on the Theory of Quantum Computation","author":"Miller C. A.","year":"2013"},{"key":"e_1_3_2_2_27_1","unstructured":"M. M\u00fcller-Lennert F. Dupuis O. Szehr S. Fehr and M. Tomamichel. On quantum R\u00e9nyi entropies: a new definition and some properties June 26 2013. arXiv: 1306.3142. Comment: several conjectures are resolved; see also arXiv:1306.5358 and arXiv:1306.5920.  M. M\u00fcller-Lennert F. Dupuis O. Szehr S. Fehr and M. Tomamichel. On quantum R\u00e9nyi entropies: a new definition and some properties June 26 2013. arXiv:1306.3142. Comment: several conjectures are resolved; see also arXiv:1306.5358 and arXiv:1306.5920."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.80.1083"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature08400"},{"volume-title":"The New York Times","year":"2013","author":"Perlroth N.","key":"e_1_3_2_2_30_1"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature09008"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.012336"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature12035"},{"volume-title":"NDSS. The Internet Society","year":"2010","author":"Ristenpart T.","key":"e_1_3_2_2_34_1"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2032797"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.106.110506"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/502090.502099"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554802"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2213984"},{"key":"e_1_3_2_2_41_1","unstructured":"M. M. Wilde A. Winter and D. Yang. Strong converse for the classical capacity of entanglement-breaking channels. arXiv:1306.1586 2013.  M. M. Wilde A. Winter and D. Yang. Strong converse for the classical capacity of entanglement-breaking channels. arXiv:1306.1586 2013."}],"event":{"name":"STOC '14: Symposium on Theory of Computing","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"New York New York","acronym":"STOC '14"},"container-title":["Proceedings of the forty-sixth annual ACM symposium on Theory of computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591796.2591843","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591796.2591843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:45Z","timestamp":1750229745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591796.2591843"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":41,"alternative-id":["10.1145\/2591796.2591843","10.1145\/2591796"],"URL":"https:\/\/doi.org\/10.1145\/2591796.2591843","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}