129 research outputs found

    All CHSH polytopes

    Full text link
    The correlations that admit a local hidden-variable model are described by a family of polytopes, whose facets are the Bell inequalities. The CHSH inequality is the simplest such Bell inequality and is a facet of every Bell polytope. We investigate for which Bell polytopes the CHSH inequality is also the unique (non-trivial) facet. We prove that the CHSH inequality is the unique facet for all bipartite polytopes where at least one party has a binary choice of dichotomic measurements, irrespective of the number of measurement settings and outcomes for the other party. Based on numerical results, we conjecture that it is also the unique facet for all bipartite polytopes involving two measurements per party where at least one measurement is dichotomic. Finally, we remark that these two situations can be the only ones for which the CHSH inequality is the unique facet, i.e., any polytope that does not correspond to one of these two cases necessarily has facets that are not of the CHSH form. As a byproduct of our approach, we derive a new family of facet inequalities

    Random 'choices' and the locality loophole

    Full text link
    It has been claimed that to close the locality loophole in a Bell experiment, random numbers of quantum origin should be used for selecting the measurement settings. This is how it has been implemented in all recent Bell experiment addressing this loophole. I point out in this note that quantum random number generators are unnecessary for such experiments and that a Bell experiment with a pseudo-random (but otherwise completely deterministic) mechanism for selecting the measurement settings, such as taking a hash function of the latest million tweets with the hashtag #quantum, would be as convincing, or even more, than one using quantum random number generators.Comment: This note is based on a talk I gave at the GISIN'14 workshop in September 2014 and at the Randomness in Quantum Physics and Beyond conference in May 201

    Effects of preparation and measurement misalignments on the security of the BB84 quantum key distribution protocol

    Full text link
    The ideal Bennett-Brassard 1984 (BB84) quantum key distribution protocol is based on the preparation and measurement of qubits in two alternative bases differing by an angle of pi/2. Any real implementation of the protocol, though, will inevitably introduce misalignments in the preparation of the states and in the alignment of the measurement bases with respect to this ideal situation. Various security proofs take into account (at least partially) such errors, i.e., show how Alice and Bob can still distil a secure key in the presence of these imperfections. Here, we consider the complementary problem: how can Eve exploit misalignments to obtain more information about the key than would be possible in an ideal implementation? Specifically, we investigate the effects of misalignment errors on the security of the BB84 protocol in the case of individual attacks, where necessary and sufficient conditions for security are known. Though the effects of these errors are small for expected deviations from the perfect situation, our results nevertheless show that Alice and Bob can incorrectly conclude that they have established a secure key if the inevitable experimental errors in the state preparation and in the alignment of the measurements are not taken into account. This gives further weight to the idea that the formulation and security analysis of any quantum cryptography protocol should be based on realistic assumptions about the properties of the apparatus used. Additionally, we note that BB84 seems more robust against alignment imperfections if both the x and z bases are used to generate the key

    Popescu-Rohrlich correlations as a unit of nonlocality

    Get PDF
    A set of nonlocal correlations that have come to be known as a PR box suggest themselves as a natural unit of nonlocality, much as a singlet is a natural unit of entanglement. We present two results relevant to this idea. One is that a wide class of multipartite correlations can be simulated using local operations on PR boxes only. We show this with an explicit scheme, which has the interesting feature that the number of PR boxes required is related to the computational resources necessary to represent a function defining the multipartite box. The second result is that there are quantum multipartite correlations, arising from measurements on a cluster state, that cannot be simulated with n PR boxes, for any n.Comment: 5 pages, no figures. v2: minor modification

    Maximally Non-Local and Monogamous Quantum Correlations

    Get PDF
    We introduce a version of the chained Bell inequality for an arbitrary number of measurement outcomes, and use it to give a simple proof that the maximally entangled state of two d dimensional quantum systems has no local component. That is, if we write its quantum correlations as a mixture of local correlations and general (not necessarily quantum) correlations, the coefficient of the local correlations must be zero. This suggests an experimental programme to obtain as good an upper bound as possible on the fraction of local states, and provides a lower bound on the amount of classical communication needed to simulate a maximally entangled state in dxd dimensions. We also prove that the quantum correlations violating the inequality are monogamous among non-signalling correlations, and hence can be used for quantum key distribution secure against post-quantum (but non-signalling) eavesdroppers.Comment: 5 pages, no figure

    Quantifying the randomness of copies of noisy Popescu-Rohrlich correlations

    Full text link
    In a no-signaling world, the outputs of a nonlocal box cannot be completely predetermined, a feature that is exploited in many quantum information protocols exploiting non-locality, such as device-independent randomness generation and quantum key distribution. This relation between non-locality and randomness can be formally quantified through the min-entropy, a measure of the unpredictability of the outputs that holds conditioned on the knowledge of any adversary that is limited only by the no-signaling principle. This quantity can easily be computed for the noisy Popescu-Rohrlich (PR) box, the paradigmatic example of non-locality. In this paper, we consider the min-entropy associated to several copies of noisy PR boxes. In the case where n noisy PR-boxes are implemented using n non-communicating pairs of devices, it is known that each PR-box behaves as an independent biased coin: the min-entropy per PR-box is constant with the number of copies. We show that this doesn't hold in more general scenarios where several noisy PR-boxes are implemented from a single pair of devices, either used sequentially n times or producing n outcome bits in a single run. In this case, the min-entropy per PR-box is smaller than the min-entropy of a single PR-box, and it decreases as the number of copies increases.Comment: 14 pages + 8 figures. Mathematica files attached. Comments welcom

    Bounding the set of quantum correlations

    Get PDF
    We introduce a hierarchy of conditions necessarily satisfied by any distribution P(ab) representing the probabilities for two separate observers to obtain outcomes a and b when making local measurements on a shared quantum state. Each condition in this hierarchy is formulated as a semidefinite program. Our approach can be used to obtain upper-bounds on the quantum violation of an arbitrary Bell inequality. It yields, for instance, tight bounds for the violations of the Collins et al. inequalities.Comment: 5 pages, no figures. v2: minor modification

    Proposal for Implementing Device-Independent Quantum Key Distribution based on a Heralded Qubit Amplification

    Full text link
    In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploited to establish a shared key that is secure independently of the internal workings of the QKD devices. An experimental implementation of DIQKD, however, is still awaited, since hitherto all optical Bell tests are subject to the detection loophole, making the protocol unsecured. In particular, photon losses in the quantum channel represent a fundamental limitation for DIQKD. Here, we introduce a heralded qubit amplifier based on single-photon sources and linear optics that provides a realistic solution to overcome the problem of channel losses in Bell tests.Comment: 5 pages, 4 figures, 6 page appendi

    Hyperdense coding and superadditivity of classical capacities in hypersphere theories

    Full text link
    In quantum superdense coding, two parties previously sharing entanglement can communicate a two bit message by sending a single qubit. We study this feature in the broader framework of general probabilistic theories. We consider a particular class of theories in which the local state space of the communicating parties corresponds to Euclidean hyperballs of dimension n (the case n = 3 corresponds to the Bloch ball of quantum theory). We show that a single n-ball can encode at most one bit of information, independently of n. We introduce a bipartite extension of such theories for which there exist dense coding protocols such that log_2 (n+1) bits are communicated if entanglement is previously shared by the communicating parties. For n > 3, these protocols are more powerful than the quantum one, because more than two bits are communicated by transmission of a system that locally encodes at most one bit. We call this phenomenon hyperdense coding. Our hyperdense coding protocols imply superadditive classical capacities: two entangled systems can encode log_2 (n+1) > 2 bits, even though each system individually encodes at most one bit. In our examples, hyperdense coding and superadditivity of classical capacities come at the expense of violating tomographic locality or dynamical continuous reversibility.Comment: Expanded discussion in response to referee comments. Accepted for publication in New Journal of Physic
    • …
    corecore