392 research outputs found

    Random 'choices' and the locality loophole

    Full text link
    It has been claimed that to close the locality loophole in a Bell experiment, random numbers of quantum origin should be used for selecting the measurement settings. This is how it has been implemented in all recent Bell experiment addressing this loophole. I point out in this note that quantum random number generators are unnecessary for such experiments and that a Bell experiment with a pseudo-random (but otherwise completely deterministic) mechanism for selecting the measurement settings, such as taking a hash function of the latest million tweets with the hashtag #quantum, would be as convincing, or even more, than one using quantum random number generators.Comment: This note is based on a talk I gave at the GISIN'14 workshop in September 2014 and at the Randomness in Quantum Physics and Beyond conference in May 201

    All CHSH polytopes

    Full text link
    The correlations that admit a local hidden-variable model are described by a family of polytopes, whose facets are the Bell inequalities. The CHSH inequality is the simplest such Bell inequality and is a facet of every Bell polytope. We investigate for which Bell polytopes the CHSH inequality is also the unique (non-trivial) facet. We prove that the CHSH inequality is the unique facet for all bipartite polytopes where at least one party has a binary choice of dichotomic measurements, irrespective of the number of measurement settings and outcomes for the other party. Based on numerical results, we conjecture that it is also the unique facet for all bipartite polytopes involving two measurements per party where at least one measurement is dichotomic. Finally, we remark that these two situations can be the only ones for which the CHSH inequality is the unique facet, i.e., any polytope that does not correspond to one of these two cases necessarily has facets that are not of the CHSH form. As a byproduct of our approach, we derive a new family of facet inequalities

    Popescu-Rohrlich correlations as a unit of nonlocality

    Get PDF
    A set of nonlocal correlations that have come to be known as a PR box suggest themselves as a natural unit of nonlocality, much as a singlet is a natural unit of entanglement. We present two results relevant to this idea. One is that a wide class of multipartite correlations can be simulated using local operations on PR boxes only. We show this with an explicit scheme, which has the interesting feature that the number of PR boxes required is related to the computational resources necessary to represent a function defining the multipartite box. The second result is that there are quantum multipartite correlations, arising from measurements on a cluster state, that cannot be simulated with n PR boxes, for any n.Comment: 5 pages, no figures. v2: minor modification

    Maximally Non-Local and Monogamous Quantum Correlations

    Get PDF
    We introduce a version of the chained Bell inequality for an arbitrary number of measurement outcomes, and use it to give a simple proof that the maximally entangled state of two d dimensional quantum systems has no local component. That is, if we write its quantum correlations as a mixture of local correlations and general (not necessarily quantum) correlations, the coefficient of the local correlations must be zero. This suggests an experimental programme to obtain as good an upper bound as possible on the fraction of local states, and provides a lower bound on the amount of classical communication needed to simulate a maximally entangled state in dxd dimensions. We also prove that the quantum correlations violating the inequality are monogamous among non-signalling correlations, and hence can be used for quantum key distribution secure against post-quantum (but non-signalling) eavesdroppers.Comment: 5 pages, no figure

    Proposal for Implementing Device-Independent Quantum Key Distribution based on a Heralded Qubit Amplification

    Full text link
    In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploited to establish a shared key that is secure independently of the internal workings of the QKD devices. An experimental implementation of DIQKD, however, is still awaited, since hitherto all optical Bell tests are subject to the detection loophole, making the protocol unsecured. In particular, photon losses in the quantum channel represent a fundamental limitation for DIQKD. Here, we introduce a heralded qubit amplifier based on single-photon sources and linear optics that provides a realistic solution to overcome the problem of channel losses in Bell tests.Comment: 5 pages, 4 figures, 6 page appendi

    No-go theorems for \psi-epistemic models based on a continuity assumption

    Full text link
    The quantum state \psi is a mathematical object used to determine the probabilities of different outcomes when measuring a physical system. Its fundamental nature has been the subject of discussions since the inception of quantum theory: is it ontic, that is, does it correspond to a real property of the physical system? Or is it epistemic, that is, does it merely represent our knowledge about the system? Assuming a natural continuity assumption and a weak separability assumption, we show here that epistemic interpretations of the quantum state are in contradiction with quantum theory. Our argument is different from the recent proof of Pusey, Barrett, and Rudolph and it already yields a non-trivial constraint on \psi-epistemic models using a single copy of the system in question.Comment: Version 1 contains both theory and an illustrative experiment. Version 2 contains only the theory (the experiment with expanded discussion will be posted separatly at a later date). The main novelty of Version 2 is a detailed comparison in appendix 2 with L. Hardy arXiv:1205.14396. Version 2 is 6 pages of text and 1 figure; v3: minor change

    Effects of preparation and measurement misalignments on the security of the BB84 quantum key distribution protocol

    Full text link
    The ideal Bennett-Brassard 1984 (BB84) quantum key distribution protocol is based on the preparation and measurement of qubits in two alternative bases differing by an angle of pi/2. Any real implementation of the protocol, though, will inevitably introduce misalignments in the preparation of the states and in the alignment of the measurement bases with respect to this ideal situation. Various security proofs take into account (at least partially) such errors, i.e., show how Alice and Bob can still distil a secure key in the presence of these imperfections. Here, we consider the complementary problem: how can Eve exploit misalignments to obtain more information about the key than would be possible in an ideal implementation? Specifically, we investigate the effects of misalignment errors on the security of the BB84 protocol in the case of individual attacks, where necessary and sufficient conditions for security are known. Though the effects of these errors are small for expected deviations from the perfect situation, our results nevertheless show that Alice and Bob can incorrectly conclude that they have established a secure key if the inevitable experimental errors in the state preparation and in the alignment of the measurements are not taken into account. This gives further weight to the idea that the formulation and security analysis of any quantum cryptography protocol should be based on realistic assumptions about the properties of the apparatus used. Additionally, we note that BB84 seems more robust against alignment imperfections if both the x and z bases are used to generate the key

    Optimal randomness certification from one entangled bit

    Full text link
    By performing local projective measurements on a two-qubit entangled state one can certify in a device-independent way up to one bit of randomness. We show here that general measurements, defined by positive-operator-valued measures, can certify up to two bits of randomness, which is the optimal amount of randomness that can be certified from an entangled bit. General measurements thus provide an advantage over projective ones for device-independent randomness certification.Comment: 7 pages, 1 figure, computational details at http://nbviewer.ipython.org/github/peterwittek/ipython-notebooks/blob/master/Optimal%20randomness%20generation%20from%20entangled%20quantum%20states.ipyn

    Device-Independent Bit Commitment based on the CHSH Inequality

    Full text link
    Bit commitment and coin flipping occupy a unique place in the device-independent landscape, as the only device-independent protocols thus far suggested for these tasks are reliant on tripartite GHZ correlations. Indeed, we know of no other bipartite tasks, which admit a device-independent formulation, but which are not known to be implementable using only bipartite nonlocality. Another interesting feature of these protocols is that the pseudo-telepathic nature of GHZ correlations -- in contrast to the generally statistical character of nonlocal correlations, such as those arising in the violation of the CHSH inequality -- is essential to their formulation and analysis. In this work, we present a device-independent bit commitment protocol based on CHSH testing, which achieves the same security as the optimal GHZ-based protocol. The protocol is analyzed in the most general settings, where the devices are used repeatedly and may have long-term quantum memory. We also recast the protocol in a post-quantum setting where both honest and dishonest parties are restricted only by the impossibility of signaling, and find that overall the supra-quantum structure allows for greater security.Comment: 15 pages, 3 figure
    corecore