Bounds on semi-device-independent quantum random number expansion capabilities
Abstract
The randomness expansion capabilities of semi-device-independent (SDI) prepare and measure protocols are analyzed under the sole assumption that the Hilbert state dimension is known. It’s explicitly proved that the maximum certifiable entropy that can be obtained through this set of protocols is and the same is independent of the dimension witnesses used to certify the protocol. The minimum number of preparation and measurement settings required to achieve this entropy is also proven. An SDI protocol that generates the maximum output entropy with the least amount of input setting is provided. An analytical relationship between the entropy generated and the witness value is obtained. It’s also established that certifiable entropy can be generated as soon as dimension witness crosses the classical bound, making the protocol noise-robust and useful in practical applications.
I Introduction
Randomness plays an important role in simulation algorithms [1, 2, 3], cryptography [4, 5, 6], fundamental sciences [7, 8, 9] and much research has been devoted to the generation of random numbers [10]. Deterministic algorithms can at best create ‘pseudo-random numbers’ that mimic the statistics of ‘true’ random numbers [11]. One needs access to unpredictable physical processes in order to generate truly random numbers [10, 12]. Quantum theory provides well-defined theoretical models which are inherently probabilistic and serve us with good entropy sources to extract randomness [13]. Generating randomness from quantum systems is a matured field [14]. There are now even commercially available quantum random number generators (QRNGs) [15, 16, 17]. These devices are based on methods that are only applicable to their specific experimental setup and corresponding entropy estimates of the output randomness depend on a number of assumptions. Ultimately, these devices require a level of trust in the manufacturer which is not ideal for a number of reasons [10].
For the above-mentioned reasons, it is highly advantageous to have a setup that provides certifiable entropy while making minimal assumptions about its working. Device-independent QRNGs (DI-QRNGs) [18, 19] provide a solution to this problem. By consuming input randomness and using non-locality of quantum theory it can, theoretically, certify the output randomness without characterizing the inner workings of the setup. There has also been numerous experimental demonstrations of this approach [20, 21, 22, 23]. However, protocols for DI-QRNG suffer from practical issues which make them hard to implement outside of a laboratory setup compared to one-way protocols commonly used in commercial devices.
A more practical approach to random number generation is provided by the so-called semi-device-independent QRNGs (SDI-QRNGs) [24, 25, 26, 27, 28, 29]. Unlike, DI-QRNG, complete knowledge of a part of the setup used for random number generation is allowed in SDI-QRNGs. Even though this incurs a weaker form of security compared to the DI counter part, it is much more practical. Realistically, there might be parts of the device that are more error-prone than others. The SDI approach lets you design protocols that can still generate certifiable randomness while leaving such parts uncharacterized [30, 31, 32, 33]. These protocols are also easier to implement since non-local sources are not required and is thus more consumer-friendly. Hence the entropy generation capabilities of the SDI protocols are of particular interest to cryptographers and others who use random numbers for various practical purposes.
In this work, we derive a general upper bound on the amount of entropy generated by a class of SDI protocols. Specifically, we consider prepare and measure protocols of two-dimensional systems and two-outcome measurements. Even though various protocols belonging to this class have been studied previously [24, 25], their analysis has been restricted to some particular dimension witnesses which are used to distinguish quantum processes from classical processes. Our results, however, are independent of dimensional witnesses. We prove that the maximum amount of entropy which could be generated by any protocol of this class is equal to . Moreover, the minimum number of preparation and measurement settings to certify this much entropy is also proven. We give an explicit example of a unique protocol that matches these bounds, proving them to be tight.
Furthermore, we derive an analytical relationship between the witness values and the entropy generated with this protocol.
The rest of the paper is organized as follows. In Section II, we briefly describe the SDI model and state some definitions that we use in the subsequent sections. Section III contains results on the limits of output/input randomness. We report an explicit protocol matching these limits and its subsequent analysis in Section IV. In Section V, we present a brief discussion along with some relevant open questions for further research.
II Semi-Device Independent Model
We first illustrate the general structure of the SDI-QRNG protocol that we have considered here. It involves two black boxes shielded from the outside world (see Figure 1). One of the devices (boxes) is used for state preparation while the other one is used for the measurement. The preparation black box, has settings, and the measurement black box, has settings; . Depending on the randomly chosen setting among , outputs a quantum system , (we use to denote a set of cardinality ), which will then be sent to the second black box for measurement. We assume that the state ; is a two-dimensional system. The measurement device takes as input and measures it in one of the randomly chosen settings and outputs . This forms one round of the prepare and measure protocol. We can repeat this procedure multiple times to get a probability distribution given by
(1) |
where is the measurement operator acting on with input parameter and output .
In order to identify whether the probability distributions truly have a quantum origin or not, dimension witnesses of the form
(2) |
are usually used, where are real coefficients and
Under such dimension witnesses, an SDI protocol does not demand any restriction on pre-shared classical correlations between the preparation and measurement devices [34]. Although we do assume that they don’t share any quantum correlations. If we denote by and the classical and quantum upper-bounds of the witness value using two-dimensional systems, whenever,
(3) |
we can be certain that the protocol has no classical description [34, 24]. Hence the output of is truly probabilistic in nature and can be used to extract randomness [35, 36].
The entropy in the output can be quantified by the following min-entropy function [37]
(4) |
This entropy is considered to be ‘certifiable’ if the corresponding probability distribution satisfies the constraint Equation 3.
Since our witnesses defined by Equation 2 are linear in probabilities, we just need to consider pure states for our analysis as any arbitrary mixed state can be written as a convex combination of pure states [34]. It has also been proven that POVMs can be depicted as
a convex combinations of projective measurements in the case of two-measurement outcomes [38, 39].
Furthermore, its known that projective measurements on two dimensional systems can be represented as antipodal unit vectors on the Bloch sphere. In general, the basis elements can be expressed as
(5) |
where is a unit vector on the Bloch sphere and , the Pauli matrices. For preparations, it is enough to consider pure states represented using unit vectors as
(6) |
Under this representation, probability distribution can be expressed as
(7) |
We may now proceed to prove some general results related to the capabilities of SDI-QRNGs using the definitions and notations introduced in this section.

III Results: Bounds on certifiable entropy
Theorem 1.
A prepare and measure protocol of two-dimensional systems and two-outcome measurements can generate at most bits of certifiable entropy.
Proof.
Maximizing the entropy in Equation 4 amounts to minimizing the quantity over all prepare and measure protocols. We shall achieve this by first defining a lower bound for the quantity to be minimized and then deriving the lowest possible value for the lower bound.
Consider the quantity
where the average is taken over all the measurement settings. Since mean over a set is lower than the maximum of a set, forms a lower bound to .
We may now derive an expression for .
Let us represent the measurement basis for measurement settings as
Each of these measurement bases can be represented by a diameter of the Bloch sphere with the basis elements as its endpoints. For example the basis represents a diameter with and as its endpoints. It is trivial to see that given any two non-perpendicular diameters of a sphere in the smallest angle between them would be less than or equal to . To further illustrate our point, let us consider the bases and. If the angle between the vectors and is greater than , then the angle between and will definitely be less than ; for any .
Keeping the above arguments in mind, consider a particular case: , with measurement bases as and . If we consider the angle between and to be less than or equal to , then the state with maximizes , yielding . It is easy to see that is minimum when and are perpendicular to each other.
For now, let us assume that , where is the angle between the measurement vectors and for . This is in general not true for but we will give an argument at the end of the proof as to why this assumption is valid enough to find out the minimum value of .
Given this setup, consider with . Note that given the choice of measurement vectors , this state maximizes since it lies along the average direction of the measurement vectors. Simplification yields
(8) |
We can represent Equation 8 as
(9) |
Lemma 1.
For unit vectors that lie in an octant of a sphere in , the minimum of the sum of cosines of the angles formed between them is equal to where for positive integers and .
Proof.
Consider vectors . The sum to be minimized is
We can rewrite it as
The terms in the bracket is equal to
Since every vector lies in the same octant, the dot product is minimized when is along one of the axis. We can repeat the same process for every other vector until all of them lines up with one of the axes. We have three scenarios based on the value of ;
-
•
: It is trivial to see that the sum is minimum when the vectors are equally distributed among the axes; vectors along each axis. The sum of cosines is equal to .
-
•
: An additional vector along any one of the axes, say axis. The sum becomes .
-
•
: Consider the sum of vectors
Since they have an arrangement dictated by the previous case, the vector should end up at or axis. The sum becomes .
Putting it all together, we have the sum as
Simplifying it we obtain
∎
Since our measurement vectors are atmost away from each other, we can consider them to lie in the same octant. Applying Lemma 1, Equation 9 becomes,
(10) |
Substituting we obtain
(11) |
Thus, for , we have
(12) | |||||
For , and as . Thus in general,
∎
Note that our assumption that for is valid enough since the minimum value for is obtained when the measurement vectors are along the D axes. This implies that by induction, using as the initial step and the freedom to relabel any measurement basis, we can take any measurement vectors to lie in the same octant.
Theorem 2.
A prepare and measure protocol of two-dimensional systems needs at least preparation settings and measurement settings to generate the maximum amount of entropy.
Proof.
From Theorem 1, the maximum entropy is generated when . For , we have the minimum number of measurement settings, . We will now try to minimise the number of preparation settings when .
As for the number of preparation settings , note that it can’t be since the states will be perfectly distinguishable; there is no entropy in the output. When and , a general dimension witness defined by Equation 2 can be expressed as
(13) | |||||
From Theorem 1, maximum entropy generation needs at least measurement settings. Since maximization is over the entire probability distribution, this holds for every preparation setting. Hence, none of the coefficients can be for a witness which acheives the maximum entropy. For example, suppose is . This implies that the state depends only on the measurement bases and ; lies in the plane defined by and . Subsequently, for a given witness value, .
Now that we have established that all coefficients in Equation 13 are non-zero, we can model it as an QRAC-like protocol where preparation states correspond to bit strings and measurement settings determine which bit to guess. Positive coefficients are mapped to bit and negative coefficients to bit . For example, consider
(14) | |||||
Based on our construction, can be defined as the average success probability of an QRAC protocol where preparation states are represented as and measurement settings dictate which one of the three bits to guess.
For any such task we can construct a protocol based on the QRAC (cf. Figure 2) whose average probability would be greater than , implying the entropy generated will be lesser than (since : represents any of the -bit strings and denotes the bit of that string).
The protocol is represented using Figure 2. A bit string can be written as where and is the third bit (which could be different for different strings). The task is then straightforward; encode the strings on any three of the four possible states using QRAC, where the encoding can be represented as
Decode the first two bits using the measurement bases given by
and their corresponding Bloch vectors
Decode the third bit using
Given the choice of measurement bases and prepared states the average probability is found to be at least,
Hence for such a protocol we have average probability greater than which is greater than .

∎
IV A specific protocol
An explicit protocol to achieve using preparation settings and measurement settings is given here. It corresponds to an QRAC-like protocol in which the preparation party encodes one of the strings to a single qubit and the measurement party attempts to decode by suitable measurements. Using arguments similar to those used for proving Theorem 2, this protocol can be proven to be unique up to some relabelling of the measurement bases. A suitable dimension witness is provided by
(15) |
and whenever
(16) |
the protocol has no classical description. Equation 16 was derived from the results provided in [40]. They have treated the protocol as a generalized version of the QRAC protocol where attempts to decode, in addition to the bits encoded by , the parity of the bits as well. The average success probability of this particular protocol have previously found applications in the SDI security of QKD protocols [41]. The corresponding dimension witness has also been applied previously in self testing of POVMs [42, 43] and in reduction of symmetric dimension witnesses [44].
In order to achieve the maximal quantum value , we may
encode the bits using the states given by
and decode the bits using the measurement bases given by
with the corresponding Bloch vectors
Note that a general two-dimensional witness for preparation settings and measurement settings may not be able to produce the maximum amount of randomness. For example, consider the well known dimension witness [34, 45], defined as
. |
Since the choice of the state solely depends on the measurement basis, one can always take to be . This implies that ; no entropy is generated in this case. The choice of dimension witness is special in that regard and warrants further analysis. We will now derive an analytical bound on the min-entropy based on the value of the dimension witness. The analysis and methods used is similar to what have been done in [46, 47].
Using Equation 5 and Equation 6, Equation 15 can be written as
|
||||
where the first inequality follows from . Using Equation 9 we can write for our example as
(18) |
In order to obtain a bounded value of as a function of we will use the extreme value problem of multi-variable function. Changing variables as
and applying it to LABEL:Wlong, we obtain
(19) |
where is one of the real roots of equation set with variables given by,
(20) |
The equation set provided above is obtained by taking the derivatives of LABEL:Wlong with respect to and . It turns out that the solutions of Equation 20 should satisfy the condition
(21) |

Since is defined as , by Equation 21 all the terms in the summation are equal. This means that when is maximized, is equivalent to . Hence the maximization will yield a tight upper bound on the randomness generated by this protocol. Also, Equation 21 reduces our problem to a single variable one.
Substituting Equation 21 in LABEL:Wlong and Equation 18, we get
(22) |
Solving Equation 22 we obtain
(23) |

This forms a min-entropy bound for the particular protocol as shown in Figure 4. Since the choice of angles is unique when i.e.,
it yields the maximum amount of certifiable randomness; . Also note that since forms an upper bound to the average success probability of the protocol, Equation 23 implies that certifiable randomness can be generated as soon as one violates the classical bound on witness. This is particularly relevant in practical setups, which might not be able to achieve the maximum possible quantum violation. The protocols is thus noise-robust, and has immediate applications in practical SDI-QRNG setups.
Since we assume that devices are shielded from the outside world, the randomness used to choose the input settings in each round can be used for other purposes. Hence the total output randomness from each round is more than what is being used to start the process. In order to increase randomness expansion even further, one can consider using a fixed subset of input setting for randomness generation for most rounds and a randomly chosen input setting for rest of the rounds [48, 46, 49]. If the number of rounds is large enough, one can use the subset of rounds wherein the input setting where randomly chosen in order to estimate the witness value [20].
V Discussions and outlook
A tight bound on the entropy generation rate is derived for SDI prepare and measure protocols for two-dimensional systems and two-outcome measurements solely from geometrical arguments. The maximum entropy generated from such a class of protocols is found to be equal to . Here it will be apt to note the results of a previous work [50] which suggests an upper bound on the certifiable randomness from a quantum black box as , where is the number of outputs for a measurement ( in our case) and is the number of preparation settings. For the particular class of protocols that we are considering, this result forms a trivial bound of bit of certifiable entropy. Our results are much more strict in that regard. It was also conjectured in [25] that QRAC generates the maximum amount of randomness among QRAC protocols. We have proved that this is indeed the case. Our results are more general than QRAC protocols and also independent of any dimension witness. We have also provided an explicit protocol generating the maximum amount of entropy while having the least amount of input settings. The protocol generates as much entropy as QRAC protocol does, however it requires lesser input settings. Note that even though the protocol generates maximum entropy when , it still remains an open question if one can extract more randomness than what is given in Figure 4 when . Since Equation 23 is tied to a specific dimension witness i.e., , it would be worthwhile to investigate whether the methods by Wang et. al. [51] would be able to extract more randomness when . Inspired by the DI approach used in [49, 52], they used the full observed statistics to certify randomness rather than restricting to a particular inequality.
The results reported here are not only new and useful, it also opens up possibilities for a set of interesting investigations. An immediate generalisation of the presented work would be to consider the limits on entropy generation for -outcome measurements on -dimensional systems; . It would also be interesting to investigate the randomness expansion capabilities of such protocols with partially free random sources as the input seed [53, 54]. Given the advantage of our protocol over the QRAC with perfect random sources, it would be interesting to see a comparison with partially free sources [55]. Another possible avenue for research would be to consider the randomness generation ability for multiple users as discussed in [56].
Acknowledgment
Authors acknowledge the support from the QUEST scheme of Interdisciplinary Cyber Physical Systems (ICPS) program of the Department of Science and Technology (DST), India (Grant No.: DST/ICPS/QuST/Theme-1/2019/14 (Q80)). They also thank Manik Banik, Ram Krishna Patra, Sandeep Mishra, R Srikanth, H. S. Karthik, H. Akshata Shenoy and Kishore Thapliyal for their interest and feedback on the work.
References
- Metropolis and Ulam [1949] N. Metropolis and S. Ulam, Journal of the American Statistical Association 44, 335 (1949).
- Karp [1991] R. M. Karp, Discrete Applied Mathematics 34, 165 (1991).
- Motwani and Raghavan [1996] R. Motwani and P. Raghavan, ACM Computing Surveys 28, 33–37 (1996).
- Shannon [1949] C. E. Shannon, The Bell System Technical Journal 28, 656 (1949).
- Gennaro [2006] R. Gennaro, IEEE Security Privacy 4, 64 (2006).
- Bouda et al. [2012] J. Bouda, M. Pivoluska, M. Plesch, and C. Wilmott, Physical Review A 86, 062308 (2012).
- Bell [1964] J. S. Bell, Physics Physique Fizika 1, 195 (1964).
- Wheeler [1978] J. A. Wheeler, The “past” and the “delayed-choice” double-slit experiment, in Mathematical Foundations of Quantum Theory (Academic Press, 1978) pp. 9–48.
- Shadbolt et al. [2014] P. Shadbolt, J. C. F. Mathews, A. Laing, and J. L. O’Brien, Nature Physics 10, 278 (2014).
- Herrero-Collantes and Garcia-Escartin [2017] M. Herrero-Collantes and J. C. Garcia-Escartin, Reviews of Modern Physics 89, 015004 (2017).
- L’Ecuyer [2012] P. L’Ecuyer, Springer Handbooks of Computational Statistics , 35 (2012).
- Calude [2015] C. S. Calude, Indeterminism and randomness (2015).
- Ma et al. [2013] X. Ma, F. Xu, H. Xu, X. Tan, B. Qi, and H.-K. Lo, Physical Review A 87, 062327 (2013).
- Ma et al. [2016] X. Ma, X. Yuan, Z. Cao, B. Qi, and Z. Zhang, npj Quantum Information 2, 16021 (2016).
- Qua [2021] Quantum random number generation (qrng) - id quantique, https://www.idquantique.com/random-number-generation/overview/ (2021), (Accessed on 11/21/2021).
- Jacak et al. [2021] M. M. Jacak, P. Jóźwiak, J. Niemczuk, and J. E. Jacak, Scientific Reports 11, 16108 (2021).
- Huang et al. [2021] L. Huang, H. Zhou, K. Feng, and C. Xie, npj Quantum Information 7, 107 (2021).
- Colbeck [2009] R. Colbeck, Ph.D. thesis, University of Cambridge (2009), arXiv:quant-ph/0911.3814 .
- Colbeck and Kent [2010] R. Colbeck and A. Kent, Journal of Physics A 44, 095305 (2010).
- Pironio et al. [2010] S. Pironio, A. Acín, S. Massar, A. B. de la Giroday, D. N. Matsukevich, P. Maunz, S. Olmschenk, D. Hayes, L. Luo, T. A. Manning, and C. Monroe, Nature 464, 1021 (2010).
- Pironio and Massar [2013] S. Pironio and S. Massar, Physical Review A 87, 012336 (2013).
- Liu et al. [2018] Y. Liu, Q. Zhao, M.-H. Li, J.-Y. Guan, Y. Zhang, B. Bai, W. Zhang, W.-Z. Liu, C. Wu, X. Yuan, H. Li, W. J. Munro, Z. Wang, L. You, J. Zhang, X. Ma, J. Fan, Q. Zhang, and J.-W. Pan, Nature 562, 548 (2018).
- Liu et al. [2021] W.-Z. Liu, M.-H. Li, S. Ragy, S.-R. Zhao, B. Bai, Y. Liu, P. J. Brown, J. Zhang, R. Colbeck, J. Fan, Q. Zhang, and J.-W. Pan, Nature Physics 17, 448 (2021).
- Li et al. [2011] H.-W. Li, Z.-Q. Yin, Y.-C. Wu, X.-B. Zou, S. Wang, W. Chen, G.-C. Guo, and Z.-F. Han, Physical Review A 84, 034301 (2011).
- Li et al. [2012] H.-W. Li, M. Pawłowski, Z.-Q. Yin, G.-C. Guo, and Z.-F. Han, Physical Review A 85, 052308 (2012).
- Rusca et al. [2019] D. Rusca, T. van Himbeeck, A. Martin, J. B. Brask, W. Shi, S. Pironio, N. Brunner, and H. Zbinden, Physical Review A 100, 062338 (2019).
- Nie et al. [2016] Y.-Q. Nie, J.-Y. Guan, H. Zhou, Q. Zhang, X. Ma, J. Zhang, and J.-W. Pan, Physical Review A 94, 060301 (2016).
- Cao et al. [2016] Z. Cao, H. Zhou, X. Yuan, and X. Ma, Physical Review X 6, 011020 (2016).
- Tavakoli [2021] A. Tavakoli, Physical Review Letters 126, 210503 (2021).
- Lunghi et al. [2015] T. Lunghi, J. B. Brask, C. C. W. Lim, Q. Lavigne, J. Bowles, A. Martin, H. Zbinden, and N. Brunner, Physical Review Letters 114, 150501 (2015).
- Brask et al. [2017] J. B. Brask, A. Martin, W. Esposito, R. Houlmann, J. Bowles, H. Zbinden, and N. Brunner, Physical Review Applied 7, 054018 (2017).
- Avesani et al. [2021] M. Avesani, H. Tebyanian, P. Villoresi, and G. Vallone, Physical Review Applied 15, 034034 (2021).
- Pivoluska et al. [2021] M. Pivoluska, M. Plesch, M. Farkas, N. Ružičková, C. Flegel, N. H. Valencia, W. McCutcheon, M. Malik, and E. A. Aguilar, npj Quantum Information 7, 50 (2021).
- Gallego et al. [2010] R. Gallego, N. Brunner, C. Hadley, and A. Acín, Physical Review Letters 105, 230501 (2010).
- Trevisan [2001] L. Trevisan, J. ACM 48, 860–879 (2001).
- Carter and Wegman [1979] J. Carter and M. N. Wegman, Journal of Computer and System Sciences 18, 143 (1979).
- Konig et al. [2009] R. Konig, R. Renner, and C. Schaffner, IEEE Transactions on Information Theory 55, 4337 (2009).
- Masanes [2005] L. Masanes, Extremal quantum correlations for n parties with two dichotomic observables per site (2005), arXiv:quant-ph/0512100 .
- Tomamichel and Hänggi [2013] M. Tomamichel and E. Hänggi, Journal of Physics A: Mathematical and Theoretical 46, 055301 (2013).
- Mannalath et al. [2021] V. Mannalath, R. K. Patra, M. Janpandit, S. Sen, M. Banik, and A. Chaturvedi, Physical Review A 104, 012420 (2021).
- Pawłowski and Brunner [2011] M. Pawłowski and N. Brunner, Physical Review A 84, 010302 (2011).
- Tavakoli et al. [2020] A. Tavakoli, M. Smania, T. Vértesi, N. Brunner, and M. Bourennane, Science Advances 6, eaaw6664 (2020).
- Mironowicz and Pawłowski [2019] P. Mironowicz and M. Pawłowski, Physical Review A 100, 030301 (2019).
- Mironowicz et al. [2014] P. Mironowicz, H.-W. Li, and M. Pawłowski, Physical Review A 90, 022322 (2014).
- Hendrych et al. [2012] M. Hendrych, R. Gallego, M. Mičuda, N. Brunner, A. Acín, and J. P. Torres, Nature Physics 8, 588 (2012).
- Li et al. [2015a] H.-W. Li, Z.-Q. Yin, M. Pawłowski, G.-C. Guo, and Z.-F. Han, Physical Review A 91, 032305 (2015a).
- Li et al. [2015b] D.-D. Li, Q.-Y. Wen, Y.-K. Wang, Y.-Q. Zhou, and F. Gao, Scientific Reports 5, 15543 (2015b).
- Mironowicz et al. [2016] P. Mironowicz, A. Tavakoli, A. Hameedi, B. Marques, M. Pawłowski, and M. Bourennane, New Journal of Physics 18, 065004 (2016).
- Bancal et al. [2014] J.-D. Bancal, L. Sheridan, and V. Scarani, New Journal of Physics 16, 033011 (2014).
- Ioannou et al. [2019] M. Ioannou, J. B. Brask, and N. Brunner, Physical Review A 99, 052338 (2019).
- Wang et al. [2015] Y.-K. Wang, S.-J. Qin, X. Wu, F. Gao, and Q.-Y. Wen, Physical Review A 92, 052321 (2015).
- Nieto-Silleras et al. [2014] O. Nieto-Silleras, S. Pironio, and J. Silman, New Journal of Physics 16, 013035 (2014).
- Colbeck and Renner [2012] R. Colbeck and R. Renner, Nature Physics 8, 450 (2012).
- Zhou et al. [2015] Y.-Q. Zhou, H.-W. Li, Y.-K. Wang, D.-D. Li, F. Gao, and Q.-Y. Wen, Physical Review A 92, 022331 (2015).
- Zhou et al. [2016] Y.-Q. Zhou, F. Gao, D.-D. Li, X.-H. Li, and Q.-Y. Wen, Physical Review A 94, 032318 (2016).
- Wang et al. [2021] X. Wang, J. Yuan, Y. Zhou, Y. Liu, and L. Fan, Quantum Information Processing 20, 346 (2021).