392 research outputs found
Random 'choices' and the locality loophole
It has been claimed that to close the locality loophole in a Bell experiment,
random numbers of quantum origin should be used for selecting the measurement
settings. This is how it has been implemented in all recent Bell experiment
addressing this loophole. I point out in this note that quantum random number
generators are unnecessary for such experiments and that a Bell experiment with
a pseudo-random (but otherwise completely deterministic) mechanism for
selecting the measurement settings, such as taking a hash function of the
latest million tweets with the hashtag #quantum, would be as convincing, or
even more, than one using quantum random number generators.Comment: This note is based on a talk I gave at the GISIN'14 workshop in
September 2014 and at the Randomness in Quantum Physics and Beyond conference
in May 201
All CHSH polytopes
The correlations that admit a local hidden-variable model are described by a
family of polytopes, whose facets are the Bell inequalities. The CHSH
inequality is the simplest such Bell inequality and is a facet of every Bell
polytope. We investigate for which Bell polytopes the CHSH inequality is also
the unique (non-trivial) facet. We prove that the CHSH inequality is the unique
facet for all bipartite polytopes where at least one party has a binary choice
of dichotomic measurements, irrespective of the number of measurement settings
and outcomes for the other party. Based on numerical results, we conjecture
that it is also the unique facet for all bipartite polytopes involving two
measurements per party where at least one measurement is dichotomic. Finally,
we remark that these two situations can be the only ones for which the CHSH
inequality is the unique facet, i.e., any polytope that does not correspond to
one of these two cases necessarily has facets that are not of the CHSH form. As
a byproduct of our approach, we derive a new family of facet inequalities
Popescu-Rohrlich correlations as a unit of nonlocality
A set of nonlocal correlations that have come to be known as a PR box suggest
themselves as a natural unit of nonlocality, much as a singlet is a natural
unit of entanglement. We present two results relevant to this idea. One is that
a wide class of multipartite correlations can be simulated using local
operations on PR boxes only. We show this with an explicit scheme, which has
the interesting feature that the number of PR boxes required is related to the
computational resources necessary to represent a function defining the
multipartite box. The second result is that there are quantum multipartite
correlations, arising from measurements on a cluster state, that cannot be
simulated with n PR boxes, for any n.Comment: 5 pages, no figures. v2: minor modification
Maximally Non-Local and Monogamous Quantum Correlations
We introduce a version of the chained Bell inequality for an arbitrary number
of measurement outcomes, and use it to give a simple proof that the maximally
entangled state of two d dimensional quantum systems has no local component.
That is, if we write its quantum correlations as a mixture of local
correlations and general (not necessarily quantum) correlations, the
coefficient of the local correlations must be zero. This suggests an
experimental programme to obtain as good an upper bound as possible on the
fraction of local states, and provides a lower bound on the amount of classical
communication needed to simulate a maximally entangled state in dxd dimensions.
We also prove that the quantum correlations violating the inequality are
monogamous among non-signalling correlations, and hence can be used for quantum
key distribution secure against post-quantum (but non-signalling)
eavesdroppers.Comment: 5 pages, no figure
Proposal for Implementing Device-Independent Quantum Key Distribution based on a Heralded Qubit Amplification
In device-independent quantum key distribution (DIQKD), the violation of a
Bell inequality is exploited to establish a shared key that is secure
independently of the internal workings of the QKD devices. An experimental
implementation of DIQKD, however, is still awaited, since hitherto all optical
Bell tests are subject to the detection loophole, making the protocol
unsecured. In particular, photon losses in the quantum channel represent a
fundamental limitation for DIQKD. Here, we introduce a heralded qubit amplifier
based on single-photon sources and linear optics that provides a realistic
solution to overcome the problem of channel losses in Bell tests.Comment: 5 pages, 4 figures, 6 page appendi
No-go theorems for \psi-epistemic models based on a continuity assumption
The quantum state \psi is a mathematical object used to determine the
probabilities of different outcomes when measuring a physical system. Its
fundamental nature has been the subject of discussions since the inception of
quantum theory: is it ontic, that is, does it correspond to a real property of
the physical system? Or is it epistemic, that is, does it merely represent our
knowledge about the system? Assuming a natural continuity assumption and a weak
separability assumption, we show here that epistemic interpretations of the
quantum state are in contradiction with quantum theory. Our argument is
different from the recent proof of Pusey, Barrett, and Rudolph and it already
yields a non-trivial constraint on \psi-epistemic models using a single copy of
the system in question.Comment: Version 1 contains both theory and an illustrative experiment.
Version 2 contains only the theory (the experiment with expanded discussion
will be posted separatly at a later date). The main novelty of Version 2 is a
detailed comparison in appendix 2 with L. Hardy arXiv:1205.14396. Version 2
is 6 pages of text and 1 figure; v3: minor change
Effects of preparation and measurement misalignments on the security of the BB84 quantum key distribution protocol
The ideal Bennett-Brassard 1984 (BB84) quantum key distribution protocol is
based on the preparation and measurement of qubits in two alternative bases
differing by an angle of pi/2. Any real implementation of the protocol, though,
will inevitably introduce misalignments in the preparation of the states and in
the alignment of the measurement bases with respect to this ideal situation.
Various security proofs take into account (at least partially) such errors,
i.e., show how Alice and Bob can still distil a secure key in the presence of
these imperfections. Here, we consider the complementary problem: how can Eve
exploit misalignments to obtain more information about the key than would be
possible in an ideal implementation? Specifically, we investigate the effects
of misalignment errors on the security of the BB84 protocol in the case of
individual attacks, where necessary and sufficient conditions for security are
known. Though the effects of these errors are small for expected deviations
from the perfect situation, our results nevertheless show that Alice and Bob
can incorrectly conclude that they have established a secure key if the
inevitable experimental errors in the state preparation and in the alignment of
the measurements are not taken into account. This gives further weight to the
idea that the formulation and security analysis of any quantum cryptography
protocol should be based on realistic assumptions about the properties of the
apparatus used. Additionally, we note that BB84 seems more robust against
alignment imperfections if both the x and z bases are used to generate the key
Optimal randomness certification from one entangled bit
By performing local projective measurements on a two-qubit entangled state
one can certify in a device-independent way up to one bit of randomness. We
show here that general measurements, defined by positive-operator-valued
measures, can certify up to two bits of randomness, which is the optimal amount
of randomness that can be certified from an entangled bit. General measurements
thus provide an advantage over projective ones for device-independent
randomness certification.Comment: 7 pages, 1 figure, computational details at
http://nbviewer.ipython.org/github/peterwittek/ipython-notebooks/blob/master/Optimal%20randomness%20generation%20from%20entangled%20quantum%20states.ipyn
Device-Independent Bit Commitment based on the CHSH Inequality
Bit commitment and coin flipping occupy a unique place in the
device-independent landscape, as the only device-independent protocols thus far
suggested for these tasks are reliant on tripartite GHZ correlations. Indeed,
we know of no other bipartite tasks, which admit a device-independent
formulation, but which are not known to be implementable using only bipartite
nonlocality. Another interesting feature of these protocols is that the
pseudo-telepathic nature of GHZ correlations -- in contrast to the generally
statistical character of nonlocal correlations, such as those arising in the
violation of the CHSH inequality -- is essential to their formulation and
analysis. In this work, we present a device-independent bit commitment protocol
based on CHSH testing, which achieves the same security as the optimal
GHZ-based protocol. The protocol is analyzed in the most general settings,
where the devices are used repeatedly and may have long-term quantum memory. We
also recast the protocol in a post-quantum setting where both honest and
dishonest parties are restricted only by the impossibility of signaling, and
find that overall the supra-quantum structure allows for greater security.Comment: 15 pages, 3 figure
- …
