14 research outputs found
Tight Bounds for the Pearle-Braunstein-Caves Chained Inequality Without the Fair-Coincidence Assumption
In any Bell test, loopholes can cause issues in the interpretation of the
results, since an apparent violation of the inequality may not correspond to a
violation of local realism. An important example is the coincidence-time
loophole that arises when detector settings might influence the time when
detection will occur. This effect can be observed in many experiments where
measurement outcomes are to be compared between remote stations because the
interpretation of an ostensible Bell violation strongly depends on the method
used to decide coincidence. The coincidence-time loophole has previously been
studied for the Clauser-Horne-Shimony-Holt (CHSH) and Clauser-Horne (CH)
inequalities, but recent experiments have shown the need for a generalization.
Here, we study the generalized "chained" inequality by Pearle-Braunstein-Caves
(PBC) with two or more settings per observer. This inequality has applications
in, for instance, Quantum Key Distribution where it has been used to
re-establish security. In this paper we give the minimum coincidence
probability for the PBC inequality for all N and show that this bound is tight
for a violation free of the fair-coincidence assumption. Thus, if an experiment
has a coincidence probability exceeding the critical value derived here, the
coincidence-time loophole is eliminated.Comment: 7 pages, 2 figures, minor correction
Energy-time entanglement, Elements of Reality, and Local Realism
The Franson interferometer, proposed in 1989 [J. D. Franson, Phys. Rev. Lett.
62:2205-2208 (1989)], beautifully shows the counter-intuitive nature of light.
The quantum description predicts sinusoidal interference for specific outcomes
of the experiment, and these predictions can be verified in experiment. In the
spirit of Einstein, Podolsky, and Rosen it is possible to ask if the
quantum-mechanical description (of this setup) can be considered complete. This
question will be answered in detail in this paper, by delineating the quite
complicated relation between energy-time entanglement experiments and
Einstein-Podolsky-Rosen (EPR) elements of reality. The mentioned sinusoidal
interference pattern is the same as that giving a violation in the usual Bell
experiment. Even so, depending on the precise requirements made on the local
realist model, this can imply a) no violation, b) smaller violation than usual,
or c) full violation of the appropriate statistical bound. Alternatives include
a) using only the measurement outcomes as EPR elements of reality, b) using the
emission time as EPR element of reality, c) using path realism, or d) using a
modified setup. This paper discusses the nature of these alternatives and how
to choose between them. The subtleties of this discussion needs to be taken
into account when designing and setting up experiments intended to test local
realism. Furthermore, these considerations are also important for quantum
communication, for example in Bell-inequality-based quantum cryptography,
especially when aiming for device independence.Comment: 18 pages, 7 figures, v2 rewritten and extende
High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities
The violation of Bell's inequality requires a well-designed experiment to
validate the result. In experiments using energy-time and time-bin
entanglement, initially proposed by Franson in 1989, there is an intrinsic
loophole due to the high postselection. To obtain a violation in this type of
experiment, a chained Bell inequality must be used. However, the local realism
bound requires a high visibility in excess of 94.63 percent in the time-bin
entangled state. In this work, we show how such a high visibility can be
reached in order to violate a chained Bell inequality with 6, 8 and 10 terms.Comment: 8 pages, 4 figure
Comment on "Inherent security of phase coding quantum key distribution systems against detector blinding attacks" [Laser Phys. Lett. 15, 095203 (2018)]
This is a brief comment on the Letter by Balygin and his coworkers [Laser
Phys. Lett. 15, 095203 (2018)]. We point out an error that invalidates the
Letter's conclusions.Comment: 2 page
A Classical-Light Attack on Energy-Time Entangled Quantum Key Distribution, and Countermeasures
Quantum key distribution (QKD) is an application of quantum mechanics that allowstwo parties to communicate with perfect secrecy. Traditional QKD uses polarization of individual photons, but the development of energy-time entanglement could lead to QKD protocols robust against environmental effects. The security proofs of energy-time entangled QKD rely on a violation of the Bell inequality to certify the system as secure. This thesis shows that the Bell violation can be faked in energy-time entangled QKD protocols that involve a postselection step, such as Franson-based setups. Using pulsed and phase-modulated classical light, it is possible to circumvent the Bell test which allows for a local hidden-variable model to give the same predictions as the quantum-mechanical description. We show that this attack works experimentally and also how energy-time-entangled systems can be strengthened to avoid our attack
Breaking the Unbreakable : Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography
In this thesis we study device-independent quantum key distribution based on energy-time entanglement. This is a method for cryptography that promises not only perfect secrecy, but also to be a practical method for quantum key distribution thanks to the reduced complexity when compared to other quantum key distribution protocols. However, there still exist a number of loopholes that must be understood and eliminated in order to rule out eavesdroppers. We study several relevant loopholes and show how they can be used to break the security of energy-time entangled systems. Attack strategies are reviewed as well as their countermeasures, and we show how full security can be re-established. Quantum key distribution is in part based on the profound no-cloning theorem, which prevents physical states to be copied at a microscopic level. This important property of quantum mechanics can be seen as Nature's own copy-protection, and can also be used to create a currency based on quantummechanics, i.e., quantum money. Here, the traditional copy-protection mechanisms of traditional coins and banknotes can be abandoned in favor of the laws of quantum physics. Previously, quantum money assumes a traditional hierarchy where a central, trusted bank controls the economy. We show how quantum money together with a blockchain allows for Quantum Bitcoin, a novel hybrid currency that promises fast transactions, extensive scalability, and full anonymity.En viktig konsekvens av kvantmekaniken är att okända kvanttillstånd inte kan klonas. Denna insikt har gett upphov till kvantkryptering, en metod för två parter att med perfekt säkerhet kommunicera hemligheter. Ett komplett bevis för denna säkerhet har dock låtit vänta på sig eftersom en attackerare i hemlighet kan manipulera utrustningen så att den läcker information. Som ett svar på detta utvecklades apparatsoberoende kvantkryptering som i teorin är immun mot sådana attacker. Apparatsoberoende kvantkryptering har en mycket högre grad av säkerhet än vanlig kvantkryptering, men det finns fortfarande ett par luckor som en attackerare kan utnyttja. Dessa kryphål har tidigare inte tagits på allvar, men denna avhandling visar hur även små svagheter i säkerhetsmodellen läcker information till en attackerare. Vi demonstrerar en praktisk attack där attackeraren aldrig upptäcks trots att denne helt kontrollerar systemet. Vi visar också hur kryphålen kan förhindras med starkare säkerhetsbevis. En annan tillämpning av kvantmekanikens förbud mot kloning är pengar som använder detta naturens egna kopieringsskydd. Dessa kvantpengar har helt andra egenskaper än vanliga mynt, sedlar eller digitala banköverföringar. Vi visar hur man kan kombinera kvantpengar med en blockkedja, och man får då man en slags "kvant-Bitcoin". Detta nya betalningsmedel har fördelar över alla andra betalsystem, men nackdelen är att det krävs en kvantdator
Comment on "Franson Interference Generated by a Two-Level System"
In a recent Letter [Phys. Rev. Lett. 118, 030501 (2017)], Peiris, Konthasinghe, and Muller report a Franson interferometry experiment using pairs of photons generated from a two-level semiconductor quantum dot. The authors report a visibility of 66% and claim that this visibility “goes beyond the classical limit of 50% and approaches the limit of violation of Bell’s inequalities (70.7%).” We explain why we do not agree with this last statement and how to fix the problem