15 research outputs found

    A causal modelling analysis of Bell scenarios in space-time: implications of jamming non-local correlations for relativistic causality principles

    Full text link
    Bell scenarios involve space-like separated measurements made by multiple parties. The standard no-signalling constraints ensure that such parties cannot signal superluminally by choosing their measurement settings. In tripartite Bell scenarios, relaxed non-signalling constraints have been proposed, which permit a class of post-quantum theories known as jamming non-local theories. To analyse whether no superluminal signalling continues to hold in these theories and, more generally, the role of non-signalling constraints in preserving relativistic causality principles, we apply a framework that we have recently developed for defining information-theoretic causal models in non-classical theories and their compatibility with relativistic causality in a space-time. We show that any theory that generates jamming correlations in a Bell scenario between space-like separated parties must necessarily do so through causal fine-tuning and by means of superluminal causal influences. Moreover, within our framework, we show that jamming theories can also lead to superluminal signalling (contrary to previous claims) unless it is ensured that certain systems are fundamentally inaccessible to agents and their interventions. Finally, we analyse relativistic causality in Bell scenarios showing that no-signalling constraints on correlations are generally insufficient for ruling out superluminal signalling when general interventions are also allowed. In this way, we identify necessary and sufficient conditions for ruling out superluminal signalling in Bell scenarios, and demonstrate through examples that the non-signalling constraints on correlations are neither necessary nor sufficient for ruling out causal loops. These results solidify our understanding of relativistic causality principles in information processing tasks in space-time, involving classical, quantum or post-quantum resources.Comment: 25+14 pages. This paper contains improved versions of some (previously unpublished) results from V. Vilasini's PhD thesis arXiv:2102.02393. Comments welcome

    Information-processing in theories constrained by no superluminal causation vs no superluminal signalling

    Full text link
    Relativistic causality principles constrain information processing possibilities in space-time. No superluminal causation (NSC) and no superluminal signaling (NSS) are two such principles which, although related, are distinct. In this work we study the consequence of these principles by considering the tasks of generating non-classical correlations within two space-time configurations. Considering theories constrained by NSC, we show that the first task is impossible in any classical theory and the second is impossible in any (possibly non-classical) theory. However, we construct a protocol enabling non-classical correlations to be generated in both configurations in a theory restricted by the weaker NSS principle. To do so we exploit theories that allow an effect called jamming. In our realisation, non-communicating agents sharing classical resources and assisted by jamming, can generate PR-box correlations. Using this protocol the violation of NSC without violating NSS would be verifiable. We discuss the implications of these findings for the speed of generation of non-classical correlations. Our work offers insights into the differences in information processing power of theories constrained by NSC, NSS and other relativistic causality principles.Comment: 5 pages + appendix, 2 figures. This paper contains improved versions of initial results included in VV's PhD thesis arXiv:2102.0239

    A general framework for consistent logical reasoning in Wigner's friend scenarios: subjective perspectives of agents within a single quantum circuit

    Full text link
    It is natural to expect a complete physical theory to have the ability to consistently model agents as physical systems of the theory. In [Nat. Comms. 9, 3711 (2018)], Frauchiger and Renner (FR) claim to show that when agents in quantum theory reason about each other's knowledge in a certain Wigner's friend scenario, they arrive at a logical contradiction. In light of this, Renner often poses the challenge: provide a set of reasoning rules that can be used to program quantum computers that may act as agents, which are (a) logically consistent (b) generalise to arbitrary Wigner's friend scenarios (c) efficiently programmable and (d) consistent with the temporal order of the protocol. Here we develop a general framework where we show that every logical Wigner's friend scenario (LWFS) can be mapped to a single temporally ordered quantum circuit, which allows agents in any LWFS to reason in a way that meets all four criteria of the challenge. Importantly, our framework achieves this general resolution without modifying classical logic or unitary quantum evolution or the Born rule, while allowing agents' perspectives to be fundamentally subjective. We analyse the FR protocol in detail, showing how the apparent paradox is resolved there. We show that apparent logical contradictions in any LWFS only arise when ignoring the choice of Heisenberg cut in scenarios where this choice does matter, and taking this dependence into account will always resolve the apparent paradox. Our results establish that universal applicability of quantum theory does not pose any threat to multi-agent logical reasoning and we discuss the implications of these results for FR's no-go theorem. Moreover, our formalism suggests the possibility of a truly relational and operational description of Wigner's friend scenarios that is consistent with quantum theory as well as probability theory applied to measurement outcomes.Comment: 33 + 14 pages, 10 figure

    Eliminate Sql Injection Using LINQ

    Get PDF

    Composable security in relativistic quantum cryptography

    Get PDF
    Relativistic protocols have been proposed to overcome certain impossibility results in classical and quantum cryptography. In such a setting, one takes the location of honest players into account, and uses the signalling limit given by the speed of light to constraint the abilities of dishonest agents. However, composing such protocols with each other to construct new cryptographic resources is known to be insecure in some cases. To make general statements about such constructions, a composable framework for modelling cryptographic security in Minkowski space is required. Here, we introduce a framework for performing such a modular security analysis of classical and quantum cryptographic schemes in Minkowski space. As an application, we show that (1) fair and unbiased coin flipping can be constructed from a simple resource called channel with delay; (2) biased coin flipping, bit commitment and channel with delay through any classical, quantum or post-quantum relativistic protocols are all impossible without further setup assumptions; (3) it is impossible to securely increase the delay of a channel, given several short-delay channels as ingredients. Results(1) and (3) imply in particular the non-composability of existing relativistic bit commitment and coin flipping protocols

    Multi-agent paradoxes beyond quantum theory

    Get PDF
    Which theories lead to a contradiction between simple reasoning principles and modelling observers' memories as physical systems? Frauchiger and Renner have shown that this is the case for quantum theory, with a thought experiment that leads to a multi-agent paradox. Here we generalize the conditions of the Frauchiger-Renner result so that they can be applied to arbitrary physical theories, and in particular to those expressed as generalized probabilistic theories (GPTs). We then apply them to a particular GPT, box world, and find a deterministic contradiction in the case where agents may share a PR box, which is stronger than the quantum paradox, in that it does not rely on post-selection. Obtaining an inconsistency for the framework of GPTs broadens the landscape of theories which are affected by the application of classical rules of reasoning to physical agents. In addition, we model how observers' memories may evolve in box world, in a way consistent with Barrett's criteria for allowed operations

    Analyzing causal structures using Tsallis entropies

    Get PDF
    Understanding cause-effect relationships is a crucial part of the scientific process. As Bell’s theorem shows, within a given causal structure, classical and quantum physics impose different constraints on the correlations that are realisable, a fundamental feature that has technological applications. However, in general it is difficult to distinguish the set of classical and quantum correlations within a causal structure. Here we investigate a method to do this based on using entropy vectors for Tsallis entropies. We derive constraints on the Tsallis entropies that are implied by (conditional) independence between classical random variables and apply these to causal structures. We find that the number of independent constraints needed to characterise the causal structure is prohibitively high that the computations required for the standard entropy vector method cannot be employed even for small causal structures. Instead, without solving the whole problem, we find new Tsallis entropic constraints for the triangle causal structure by generalising known Shannon constraints. Our results reveal new mathematical properties of classical and quantum Tsallis entropies and highlight difficulties of using Tsallis entropies for analysing causal structures

    Composable and Finite Computational Security of Quantum Message Transmission

    Full text link
    Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the literature are asymptotic, game-based, and not known to be composable. We show how to define finite, composable, computational security for secure quantum message transmission. The new definitions do not involve any games or oracles, they are directly operational: a scheme is secure if it transforms an insecure channel and a shared key into an ideal secure channel from Alice to Bob, i.e., one which only allows Eve to block messages and learn their size, but not change them or read them. By modifying the ideal channel to provide Eve with more or less capabilities, one gets an array of different security notions. By design these transformations are composable, resulting in composable security. Crucially, the new definitions are finite. Security does not rely on the asymptotic hardness of a computational problem. Instead, one proves a finite reduction: if an adversary can distinguish the constructed (real) channel from the ideal one (for some fixed security parameters), then she can solve a finite instance of some computational problem. Such a finite statement is needed to make security claims about concrete implementations. We then prove that (slightly modified versions of) protocols proposed in the literature satisfy these composable definitions. And finally, we study the relations between some game-based definitions and our composable ones. In particular, we look at notions of quantum authenticated encryption and QCCA2, and show that they suffer from the same issues as their classical counterparts: they exclude certain protocols which are arguably secure.Comment: 43+11 pages, 18 figures, v2: minor changes, extended version of the published pape

    A general framework for consistent logical reasoning in Wigner's friend scenarios: subjective perspectives of agents within a single quantum circuit

    No full text
    33 + 14 pages, 10 figuresIt is natural to expect a complete physical theory to have the ability to consistently model agents as physical systems of the theory. In [Nat. Comms. 9, 3711 (2018)], Frauchiger and Renner (FR) claim to show that when agents in quantum theory reason about each other's knowledge in a certain Wigner's friend scenario, they arrive at a logical contradiction. In light of this, Renner often poses the challenge: provide a set of reasoning rules that can be used to program quantum computers that may act as agents, which are (a) logically consistent (b) generalise to arbitrary Wigner's friend scenarios (c) efficiently programmable and (d) consistent with the temporal order of the protocol. Here we develop a general framework where we show that every logical Wigner's friend scenario (LWFS) can be mapped to a single temporally ordered quantum circuit, which allows agents in any LWFS to reason in a way that meets all four criteria of the challenge. Importantly, our framework achieves this general resolution without modifying classical logic or unitary quantum evolution or the Born rule, while allowing agents' perspectives to be fundamentally subjective. We analyse the FR protocol in detail, showing how the apparent paradox is resolved there. We show that apparent logical contradictions in any LWFS only arise when ignoring the choice of Heisenberg cut in scenarios where this choice does matter, and taking this dependence into account will always resolve the apparent paradox. Our results establish that universal applicability of quantum theory does not pose any threat to multi-agent logical reasoning and we discuss the implications of these results for FR's no-go theorem. Moreover, our formalism suggests the possibility of a truly relational and operational description of Wigner's friend scenarios that is consistent with quantum theory as well as probability theory applied to measurement outcomes
    corecore