-
Information-processing in theories constrained by no superluminal causation vs no superluminal signalling
Authors:
V. Vilasini,
Roger Colbeck
Abstract:
Relativistic causality principles constrain information processing possibilities in space-time. No superluminal causation (NSC) and no superluminal signaling (NSS) are two such principles which, although related, are distinct. In this work we study the consequence of these principles by considering the tasks of generating non-classical correlations within two space-time configurations. Considering…
▽ More
Relativistic causality principles constrain information processing possibilities in space-time. No superluminal causation (NSC) and no superluminal signaling (NSS) are two such principles which, although related, are distinct. In this work we study the consequence of these principles by considering the tasks of generating non-classical correlations within two space-time configurations. Considering theories constrained by NSC, we show that the first task is impossible in any classical theory and the second is impossible in any (possibly non-classical) theory. However, we construct a protocol enabling non-classical correlations to be generated in both configurations in a theory restricted by the weaker NSS principle. To do so we exploit theories that allow an effect called jamming. In our realisation, non-communicating agents sharing classical resources and assisted by jamming, can generate PR-box correlations. Using this protocol the violation of NSC without violating NSS would be verifiable. We discuss the implications of these findings for the speed of generation of non-classical correlations. Our work offers insights into the differences in information processing power of theories constrained by NSC, NSS and other relativistic causality principles.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
A causal modelling analysis of Bell scenarios in space-time: implications of jamming non-local correlations for relativistic causality principles
Authors:
V. Vilasini,
Roger Colbeck
Abstract:
Bell scenarios involve space-like separated measurements made by multiple parties. The standard no-signalling constraints ensure that such parties cannot signal superluminally by choosing their measurement settings. In tripartite Bell scenarios, relaxed non-signalling constraints have been proposed, which permit a class of post-quantum theories known as jamming non-local theories. To analyse wheth…
▽ More
Bell scenarios involve space-like separated measurements made by multiple parties. The standard no-signalling constraints ensure that such parties cannot signal superluminally by choosing their measurement settings. In tripartite Bell scenarios, relaxed non-signalling constraints have been proposed, which permit a class of post-quantum theories known as jamming non-local theories. To analyse whether no superluminal signalling continues to hold in these theories and, more generally, the role of non-signalling constraints in preserving relativistic causality principles, we apply a framework that we have recently developed for defining information-theoretic causal models in non-classical theories and their compatibility with relativistic causality in a space-time. We show that any theory that generates jamming correlations in a Bell scenario between space-like separated parties must necessarily do so through causal fine-tuning and by means of superluminal causal influences. Moreover, within our framework, we show that jamming theories can also lead to superluminal signalling (contrary to previous claims) unless it is ensured that certain systems are fundamentally inaccessible to agents and their interventions. Finally, we analyse relativistic causality in Bell scenarios showing that no-signalling constraints on correlations are generally insufficient for ruling out superluminal signalling when general interventions are also allowed. In this way, we identify necessary and sufficient conditions for ruling out superluminal signalling in Bell scenarios, and demonstrate through examples that the non-signalling constraints on correlations are neither necessary nor sufficient for ruling out causal loops. These results solidify our understanding of relativistic causality principles in information processing tasks in space-time, involving classical, quantum or post-quantum resources.
△ Less
Submitted 30 November, 2023;
originally announced November 2023.
-
Device-independent quantum key distribution with arbitrarily small nonlocality
Authors:
Lewis Wooltorton,
Peter Brown,
Roger Colbeck
Abstract:
Device-independent quantum key distribution (DIQKD) allows two users to set up shared cryptographic key without the need to trust the quantum devices used. Doing so requires nonlocal correlations between the users. However, in [Phys. Rev. Lett. 127, 050503 (2021)] it was shown that for known protocols nonlocality is not always sufficient, leading to the question of whether there is a fundamental l…
▽ More
Device-independent quantum key distribution (DIQKD) allows two users to set up shared cryptographic key without the need to trust the quantum devices used. Doing so requires nonlocal correlations between the users. However, in [Phys. Rev. Lett. 127, 050503 (2021)] it was shown that for known protocols nonlocality is not always sufficient, leading to the question of whether there is a fundamental lower bound on the minimum amount of nonlocality needed for any DIQKD implementation. Here we show that no such bound exists, giving schemes that achieve key with correlations arbitrarily close to the local set. Furthermore, some of our constructions achieve the maximum of 1 bit of key per pair of entangled qubits. We achieve this by studying a family of Bell-inequalities that constitute all self-tests of the maximally entangled state with a single linear Bell expression. Within this family there exist non-local correlations with the property that one pair of inputs yield outputs arbitrarily close to perfect key. Such correlations exist for a range of Clauser-Horne-Shimony-Holt (CHSH) values, including those arbitrarily close to the classical bound. Finally, we show the existence of quantum correlations that can generate both perfect key and perfect randomness simultaneously, whilst also displaying arbitrarily small CHSH violation; this opens up the possibility of a new class of cryptographic protocol.
△ Less
Submitted 24 May, 2024; v1 submitted 18 September, 2023;
originally announced September 2023.
-
Expanding bipartite Bell inequalities for maximum multi-partite randomness
Authors:
Lewis Wooltorton,
Peter Brown,
Roger Colbeck
Abstract:
Nonlocal tests on multipartite quantum correlations form the basis of protocols that certify randomness in a device-independent (DI) way. Such correlations admit a rich structure, making the task of choosing an appropriate test difficult. For example, extremal Bell inequalities are tight witnesses of nonlocality, however achieving their maximum violation places constraints on the underlying quantu…
▽ More
Nonlocal tests on multipartite quantum correlations form the basis of protocols that certify randomness in a device-independent (DI) way. Such correlations admit a rich structure, making the task of choosing an appropriate test difficult. For example, extremal Bell inequalities are tight witnesses of nonlocality, however achieving their maximum violation places constraints on the underlying quantum system, which can reduce the rate of randomness generation. As a result there is often a trade-off between maximum randomness and the amount of violation of a given Bell inequality. Here, we explore this trade-off for more than two parties. More precisely, we study the maximum amount of randomness that can be certified by correlations exhibiting a violation of the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality. We find that maximum quantum violation and maximum randomness are incompatible for any even number of parties, with incompatibility diminishing as the number of parties grow, and conjecture the precise trade-off. We also show that maximum MABK violation is not necessary for maximum randomness for odd numbers of parties. To obtain our results, we derive new families of Bell inequalities certifying maximum randomness from a technique for randomness certification, which we call "expanding Bell inequalities". Our technique allows one to take a bipartite Bell expression, known as the seed, and transform it into a multipartite Bell inequality tailored for randomness certification, showing how intuition learned in the bipartite case can find use in more complex scenarios.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Multi-system measurements in generalized probabilistic theories and their role in information processing
Authors:
Giorgos Eftaxias,
Mirjam Weilenmann,
Roger Colbeck
Abstract:
Generalized probabilistic theories (GPTs) provide a framework in which a range of possible theories can be examined, including classical theory, quantum theory and those beyond. In general, enlarging the state space of a GPT leads to fewer possible measurements because the additional states give stronger constraints on the set of effects, the constituents of measurements. This can have implication…
▽ More
Generalized probabilistic theories (GPTs) provide a framework in which a range of possible theories can be examined, including classical theory, quantum theory and those beyond. In general, enlarging the state space of a GPT leads to fewer possible measurements because the additional states give stronger constraints on the set of effects, the constituents of measurements. This can have implications for information processing. In boxworld, for example, a GPT in which any no-signalling distribution can be realised, there is no analogue of a measurement in the Bell basis and hence the analogue of entanglement swap** is impossible. A comprehensive study of measurements on multiple systems in boxworld has been lacking. Here we consider such measurements in detail, distinguishing those that can be performed by interacting with individual systems sequentially (termed wirings), and the more interesting set of those that cannot. We compute all the possible boxworld effects for cases with small numbers of inputs, outputs and parties, identifying those that are wirings. The large state space of boxworld leads to a small effect space and hence the effects of boxworld are widely applicable in GPTs. We also show some possible uses of non-wirings for information processing by studying state discrimination, nonlocality distillation and the boxworld analogue of nonlocality without entanglement. Finally, we connect our results to the study of logically consistent classical processes and to the composition of contextuality scenarios. By enhancing understanding of measurements in boxworld, our results could be useful in studies of possible underlying principles on which quantum theory can be based.
△ Less
Submitted 12 January, 2024; v1 submitted 9 September, 2022;
originally announced September 2022.
-
Impossibility of superluminal signalling in Minkowski space-time does not rule out causal loops
Authors:
V. Vilasini,
Roger Colbeck
Abstract:
Causality is fundamental to science, but it appears in several different forms. One is relativistic causality, which is tied to a space-time structure and forbids signalling outside the future. A second is an operational notion of causation that considers the flow of information between physical systems and interventions on them. In [Vilasini and Colbeck, Phys. Rev. A. 106, 032204 (2022)], we prop…
▽ More
Causality is fundamental to science, but it appears in several different forms. One is relativistic causality, which is tied to a space-time structure and forbids signalling outside the future. A second is an operational notion of causation that considers the flow of information between physical systems and interventions on them. In [Vilasini and Colbeck, Phys. Rev. A. 106, 032204 (2022)], we propose a framework for characterising when a causal model can coexist with relativistic principles such as no superluminal signalling, while allowing for cyclic and non-classical causal influences and the possibility of causation without signalling. In a theory without superluminal causation, both superluminal signalling and causal loops are not possible in Minkowski space-time. Here we demonstrate that if we only forbid superluminal signalling, superluminal causation remains possible and show the mathematical possibility of causal loops that can be embedded in a Minkowski space-time without leading to superluminal signalling. The existence of such loops in the given space-time could in principle be operationally verified using interventions. This establishes that the physical principle of no superluminal signalling is not by itself sufficient to rule out causal loops between Minkowski space-time events. Interestingly, the conditions required to rule out causal loops in a space-time depend on the dimension. Whether such loops are possible in three spatial dimensions remains an important open question.
△ Less
Submitted 7 September, 2022; v1 submitted 26 June, 2022;
originally announced June 2022.
-
Advantages of multi-copy nonlocality distillation and its application to minimizing communication complexity
Authors:
Giorgos Eftaxias,
Mirjam Weilenmann,
Roger Colbeck
Abstract:
Nonlocal correlations are a central feature of quantum theory, and understanding why quantum theory has a limited amount of nonlocality is a fundamental problem. Since nonlocality also has technological applications, e.g., for device-independent cryptography, it is useful to understand it as a resource and, in particular, whether and how different types of nonlocality can be interconverted. Here w…
▽ More
Nonlocal correlations are a central feature of quantum theory, and understanding why quantum theory has a limited amount of nonlocality is a fundamental problem. Since nonlocality also has technological applications, e.g., for device-independent cryptography, it is useful to understand it as a resource and, in particular, whether and how different types of nonlocality can be interconverted. Here we focus on nonlocality distillation which involves using several copies of a nonlocal resource to generate one with more nonlocality. We introduce several distillation schemes which distil an extended part of the set of nonlocal correlations including quantum correlations. Our schemes are based on a natural set of operational procedures known as wirings that can be applied regardless of the underlying theory. Some are sequential algorithms that repeatedly use a two-copy protocol, while others are genuine three-copy distillation protocols. In some regions we prove that genuine three-copy protocols are strictly better than two-copy protocols. By applying our new protocols we also increase the region in which nonlocal correlations are known to give rise to trivial communication complexity. This brings us closer to an understanding of the sets of nonlocal correlations that can be recovered from information-theoretic principles, which, in turn, enhances our understanding of what is special about quantum theory.
△ Less
Submitted 7 March, 2023; v1 submitted 6 June, 2022;
originally announced June 2022.
-
Tight analytic bound on the trade-off between device-independent randomness and nonlocality
Authors:
Lewis Wooltorton,
Peter Brown,
Roger Colbeck
Abstract:
Two parties sharing entangled quantum systems can generate correlations that cannot be produced using only shared classical resources. These nonlocal correlations are a fundamental feature of quantum theory but also have practical applications. For instance, they can be used for device-independent (DI) random number generation, whose security is certified independently of the operations performed…
▽ More
Two parties sharing entangled quantum systems can generate correlations that cannot be produced using only shared classical resources. These nonlocal correlations are a fundamental feature of quantum theory but also have practical applications. For instance, they can be used for device-independent (DI) random number generation, whose security is certified independently of the operations performed inside the devices. The amount of certifiable randomness that can be generated from some given non-local correlations is a key quantity of interest. Here we derive tight analytic bounds on the maximum certifiable randomness as a function of the nonlocality as expressed using the Clauser-Horne-Shimony-Holt (CHSH) value. We show that for every CHSH value greater than the local value ($2$) and up to $3\sqrt{3}/2\approx2.598$ there exist quantum correlations with that CHSH value that certify a maximal two bits of global randomness. Beyond this CHSH value the maximum certifiable randomness drops. We give a second family of Bell inequalities for CHSH values above $3\sqrt{3}/2$, and show that they certify the maximum possible randomness for the given CHSH value. Our work hence provides an achievable upper bound on the amount of randomness that can be certified for any CHSH value. We illustrate the robustness of our results, and how they could be used to improve randomness generation rates in practice, using a Werner state noise model.
△ Less
Submitted 5 October, 2022; v1 submitted 29 April, 2022;
originally announced May 2022.
-
A general framework for cyclic and fine-tuned causal models and their compatibility with space-time
Authors:
V. Vilasini,
Roger Colbeck
Abstract:
Causal modelling is a tool for generating causal explanations of observed correlations and has led to a deeper understanding of correlations in quantum networks. Existing frameworks for quantum causality tend to focus on acyclic causal structures that are not fine-tuned i.e., where causal connections between variables necessarily create correlations between them. However, fine-tuned causal models…
▽ More
Causal modelling is a tool for generating causal explanations of observed correlations and has led to a deeper understanding of correlations in quantum networks. Existing frameworks for quantum causality tend to focus on acyclic causal structures that are not fine-tuned i.e., where causal connections between variables necessarily create correlations between them. However, fine-tuned causal models (which permit causation without correlation) play a crucial role in cryptography, and cyclic causal models can be used to model physical processes involving feedback and may also be relevant in exotic solutions of general relativity. Here we develop a causal modelling framework capable of dealing with these general scenarios. The key feature of our framework is that it allows operational and relativistic notions of causality to be independently defined and for connections between them to be established in a theory-independent manner. The framework first gives an operational way to study causation that allows for cyclic, fine-tuned and non-classical causal influences. We then consider how a causal model can be embedded in a space-time structure (modelled as a partial order) and propose a compatibility condition for ensuring that the embedded causal model does not allow signalling outside the space-time future. We identify several distinct classes of causal loops that can arise in our framework, showing that compatibility with a space-time can rule out only some of them. We discuss conditions for preventing superluminal signalling within arbitrary (and possibly cyclic) causal structures and consider models of causation in post-quantum theories admitting so-called jamming correlations. Finally, this work introduces the concept of a "higher-order affects relation", which is useful for causal discovery in fined-tuned causal models.
△ Less
Submitted 7 September, 2022; v1 submitted 24 September, 2021;
originally announced September 2021.
-
Improved device-independent randomness expansion rates using two sided randomness
Authors:
Rutvij Bhavsar,
Sammy Ragy,
Roger Colbeck
Abstract:
A device-independent randomness expansion protocol aims to take an initial random string and generate a longer one, where the security of the protocol does not rely on knowing the inner workings of the devices used to run it. In order to do so, the protocol tests that the devices violate a Bell inequality and one then needs to bound the amount of extractable randomness in terms of the observed vio…
▽ More
A device-independent randomness expansion protocol aims to take an initial random string and generate a longer one, where the security of the protocol does not rely on knowing the inner workings of the devices used to run it. In order to do so, the protocol tests that the devices violate a Bell inequality and one then needs to bound the amount of extractable randomness in terms of the observed violation. The entropy accumulation theorem lower bounds the extractable randomness of a protocol with many rounds in terms of the single-round von Neumann entropy of any strategy achieving the observed score. Tight bounds on the von Neumann entropy are known for the one-sided randomness (i.e., where the randomness from only one party is used) when using the Clauser-Horne-Shimony-Holt (CHSH) game. Here we investigate the possible improvement that could be gained using the two-sided randomness. We generate upper bounds on this randomness by attempting to find the optimal eavesdrop** strategy, providing analytic formulae in two cases. We additionally compute lower bounds that outperform previous ones and can be made arbitrarily tight (at the expense of more computation time). These bounds get close to our upper bounds, and hence we conjecture that our upper bounds are tight. We also consider a modified protocol in which the input randomness is recycled. This modified protocol shows the possibility of rate gains of several orders of magnitude based on recent experimental parameters, making device-independent randomness expansion significantly more practical. It also enables the locality loophole to be closed while expanding randomness in a way that typical spot-checking protocols do not.
△ Less
Submitted 2 March, 2023; v1 submitted 12 March, 2021;
originally announced March 2021.
-
Towards correlation self-testing of quantum theory in the adaptive Clauser-Horne-Shimony-Holt game
Authors:
Mirjam Weilenmann,
Roger Colbeck
Abstract:
Correlation self-testing of a theory addresses the question of whether we can identify the set of correlations realisable in a theory from its performance in a particular information processing task. Applied to quantum theory it aims to identify an information processing task whose optimal performance is achieved only by theories realising the same correlations as quantum theory in any causal stru…
▽ More
Correlation self-testing of a theory addresses the question of whether we can identify the set of correlations realisable in a theory from its performance in a particular information processing task. Applied to quantum theory it aims to identify an information processing task whose optimal performance is achieved only by theories realising the same correlations as quantum theory in any causal structure. In [Phys. Rev. Lett. 125 060406 (2020)] we introduced a candidate task for this, the adaptive CHSH game. Here, we analyse the maximum probability of winning this game in different generalised probabilistic theories. We show that theories with a joint state space given by the minimal or the maximal tensor product are inferior to quantum theory, before considering other tensor products in theories whose elementary systems have various two-dimensional state spaces. For these, we find no theories that outperform quantum theory in the adaptive CHSH game and prove that it is impossible to recover the quantum performance in various cases. This is the first step towards a general solution that, if successful, will have wide-ranging consequences, in particular, enabling an experiment that could rule out all theories in which the set of realisable correlations does not coincide with the quantum set.
△ Less
Submitted 16 January, 2024; v1 submitted 10 September, 2020;
originally announced September 2020.
-
Quantum Circuits for Sparse Isometries
Authors:
Emanuel Malvetti,
Raban Iten,
Roger Colbeck
Abstract:
We consider the task of breaking down a quantum computation given as an isometry into C-NOTs and single-qubit gates, while kee** the number of C-NOT gates small. Although several decompositions are known for general isometries, here we focus on a method based on Householder reflections that adapts well in the case of sparse isometries. We show how to use this method to decompose an arbitrary iso…
▽ More
We consider the task of breaking down a quantum computation given as an isometry into C-NOTs and single-qubit gates, while kee** the number of C-NOT gates small. Although several decompositions are known for general isometries, here we focus on a method based on Householder reflections that adapts well in the case of sparse isometries. We show how to use this method to decompose an arbitrary isometry before illustrating that the method can lead to significant improvements in the case of sparse isometries. We also discuss the classical complexity of this method and illustrate its effectiveness in the case of sparse state preparation by applying it to randomly chosen sparse states.
△ Less
Submitted 9 March, 2021; v1 submitted 29 May, 2020;
originally announced June 2020.
-
Arbitrarily many independent observers can share the nonlocality of a single maximally entangled qubit pair
Authors:
Peter J. Brown,
Roger Colbeck
Abstract:
Alice and Bob each have half of a pair of entangled qubits. Bob measures his half and then passes his qubit to a second Bob who measures again and so on. The goal is to maximize the number of Bobs that can have an expected violation of the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality with the single Alice. This scenario was introduced in [Phys. Rev. Lett. 114, 250401 (2015)] where the authors…
▽ More
Alice and Bob each have half of a pair of entangled qubits. Bob measures his half and then passes his qubit to a second Bob who measures again and so on. The goal is to maximize the number of Bobs that can have an expected violation of the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality with the single Alice. This scenario was introduced in [Phys. Rev. Lett. 114, 250401 (2015)] where the authors mentioned evidence that when the Bobs act independently and with unbiased inputs then at most two of them can expect to violate the CHSH inequality with Alice. Here we show that, contrary to this evidence, arbitrarily many independent Bobs can have an expected CHSH violation with the single Alice. Our proof is constructive and our measurement strategies can be generalized to work with a larger class of two-qubit states that includes all pure entangled two-qubit states. Since violation of a Bell inequality is necessary for device-independent tasks, our work represents a step towards an eventual understanding of the limitations on how much device-independent randomness can be robustly generated from a single pair of qubits.
△ Less
Submitted 26 August, 2020; v1 submitted 26 March, 2020;
originally announced March 2020.
-
Self-testing of physical theories, or, is quantum theory optimal with respect to some information-processing task?
Authors:
Mirjam Weilenmann,
Roger Colbeck
Abstract:
Self-testing usually refers to the task of taking a given set of observed correlations that are assumed to arise via a process that is accurately described by quantum theory, and trying to infer the quantum state and measurements. In other words it is concerned with the question of whether we can tell what quantum black-box devices are doing by looking only at their input-output behaviour and is k…
▽ More
Self-testing usually refers to the task of taking a given set of observed correlations that are assumed to arise via a process that is accurately described by quantum theory, and trying to infer the quantum state and measurements. In other words it is concerned with the question of whether we can tell what quantum black-box devices are doing by looking only at their input-output behaviour and is known to be possible in several cases. Here we introduce a more general question: is it possible to self-test a theory, and, in particular, quantum theory? More precisely, we ask whether within a particular causal structure there are tasks that can only be performed in theories that have the same correlations as quantum mechanics in any scenario. We present a candidate task for such a correlation self-test and analyse it in a range of generalised probabilistic theories (GPTs), showing that none of these perform better than quantum theory. A generalisation of our results showing that all non-quantum GPTs are strictly inferior to quantum mechanics for this task would point to a new way to axiomatise quantum theory, and enable an experimental test that simultaneously rules out such GPTs.
△ Less
Submitted 16 January, 2024; v1 submitted 29 February, 2020;
originally announced March 2020.
-
Device-independent randomness expansion against quantum side information
Authors:
Wen-Zhao Liu,
Ming-Han Li,
Sammy Ragy,
Si-Ran Zhao,
Bing Bai,
Yang Liu,
Peter J. Brown,
Jun Zhang,
Roger Colbeck,
**gyun Fan,
Qiang Zhang,
Jian-Wei Pan
Abstract:
The ability to produce random numbers that are unknown to any outside party is crucial for many applications. Device-independent randomness generation does not require trusted devices and therefore provides strong guarantees of the security of the output, but it comes at the price of requiring the violation of a Bell inequality for implementation. A further challenge is to make the bounds in the s…
▽ More
The ability to produce random numbers that are unknown to any outside party is crucial for many applications. Device-independent randomness generation does not require trusted devices and therefore provides strong guarantees of the security of the output, but it comes at the price of requiring the violation of a Bell inequality for implementation. A further challenge is to make the bounds in the security proofs tight enough to allow randomness expansion with contemporary technology. Although randomness has been generated in recent experiments, the amount of randomness consumed in doing so has been too high to certify expansion based on existing theory. Here we present an experiment that demonstrates device-independent randomness expansion. By develo** a Bell test setup with a single-photon detection efficiency of around $84\%$ and by using a spot-checking protocol, we achieve a net gain of $2.57\times10^8$ certified bits with a soundness error $3.09\times10^{-12}$. The experiment ran for $19.2$ h, which corresponds to an average rate of randomness generation of $13,527$ bits per second. By develo** the entropy accumulation theorem, we establish security against quantum adversaries. We anticipate that this work will lead to further improvements that push device-independence towards commercial viability.
△ Less
Submitted 12 October, 2021; v1 submitted 23 December, 2019;
originally announced December 2019.
-
On the insufficiency of entropic inequalities for detecting non-classicality in the Bell causal structure
Authors:
V. Vilasini,
Roger Colbeck
Abstract:
Classical and quantum physics impose different constraints on the joint probability distributions of observed variables in a causal structure. These differences mean that certain correlations can be certified as non-classical, which has both foundational and practical importance. Rather than working with the probability distribution itself, it can instead be convenient to work with the entropies o…
▽ More
Classical and quantum physics impose different constraints on the joint probability distributions of observed variables in a causal structure. These differences mean that certain correlations can be certified as non-classical, which has both foundational and practical importance. Rather than working with the probability distribution itself, it can instead be convenient to work with the entropies of the observed variables. In the Bell causal structure with two inputs and outputs per party, a technique that uses entropic inequalities is known that can always identify non-classical correlations. Here we consider the analogue of this technique in the generalization of this scenario to more outcomes. We identify a family of non-classical correlations in the Bell scenario with two inputs and three outputs per party whose non-classicality cannot be detected through the direct analogue of the previous technique. We also show that use of Tsallis entropy instead of Shannon entropy does not help in this case. Furthermore, we give evidence that natural extensions of the technique also do not help. More precisely, our evidence suggests that even if we allow the observed correlations to be post-processed according to a natural class of non-classicality non-generating operations, entropic inequalities for either the Shannon or Tsallis entropies cannot detect the non-classicality, and hence that entropic inequalities are generally not sufficient to detect non-classicality in the Bell causal structure. In addition, for the bipartite Bell scenario with two inputs and three outputs we find the vertex description of the polytope of non-signalling distributions that satisfy all of the CHSH-type inequalities, which is one of the main regions of investigation in this work.
△ Less
Submitted 18 July, 2020; v1 submitted 2 December, 2019;
originally announced December 2019.
-
Analysing causal structures using Tsallis entropies
Authors:
V. Vilasini,
Roger Colbeck
Abstract:
Understanding cause-effect relationships is a crucial part of the scientific process. As Bell's theorem shows, within a given causal structure, classical and quantum physics impose different constraints on the correlations that are realisable, a fundamental feature that has technological applications. However, in general it is difficult to distinguish the set of classical and quantum correlations…
▽ More
Understanding cause-effect relationships is a crucial part of the scientific process. As Bell's theorem shows, within a given causal structure, classical and quantum physics impose different constraints on the correlations that are realisable, a fundamental feature that has technological applications. However, in general it is difficult to distinguish the set of classical and quantum correlations within a causal structure. Here we investigate a method to do this based on using entropy vectors for Tsallis entropies. We derive constraints on the Tsallis entropies that are implied by (conditional) independence between classical random variables and apply these to causal structures. We find that the number of independent constraints needed to characterise the causal structure is prohibitively high such that the computations required for the standard entropy vector method cannot be employed even for small causal structures. Instead, without solving the whole problem, we find new Tsallis entropic constraints for the triangle causal structure by generalising known Shannon constraints. Our results reveal new mathematical properties of classical and quantum Tsallis entropies and highlight difficulties of using Tsallis entropies for analysing causal structures.
△ Less
Submitted 8 February, 2021; v1 submitted 4 July, 2019;
originally announced July 2019.
-
Advances in Quantum Cryptography
Authors:
S. Pirandola,
U. L. Andersen,
L. Banchi,
M. Berta,
D. Bunandar,
R. Colbeck,
D. Englund,
T. Gehring,
C. Lupo,
C. Ottaviani,
J. Pereira,
M. Razavi,
J. S. Shaari,
M. Tomamichel,
V. C. Usenko,
G. Vallone,
P. Villoresi,
P. Wallden
Abstract:
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduction and a state of…
▽ More
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduction and a state of the art description of the recent advances in the field, both theoretically and experimentally. We start by reviewing protocols of quantum key distribution based on discrete variable systems. Next we consider aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems. We will then discuss the ultimate limits of point-to-point private communications and how quantum repeaters and networks may overcome these restrictions. Finally, we will discuss some aspects of quantum cryptography beyond standard quantum key distribution, including quantum data locking and quantum digital signatures.
△ Less
Submitted 4 June, 2019;
originally announced June 2019.
-
Introduction to UniversalQCompiler
Authors:
Raban Iten,
Oliver Reardon-Smith,
Emanuel Malvetti,
Luca Mondada,
Gabrielle Pauvert,
Ethan Redmond,
Ravjot Singh Kohli,
Roger Colbeck
Abstract:
We introduce an open source software package UniversalQCompiler written in Mathematica that allows the decomposition of arbitrary quantum operations into a sequence of single-qubit rotations (with arbitrary rotation angles) and controlled-NOT (C-NOT) gates. Together with the existing package QI, this allows quantum information protocols to be analysed and then compiled to quantum circuits. Our dec…
▽ More
We introduce an open source software package UniversalQCompiler written in Mathematica that allows the decomposition of arbitrary quantum operations into a sequence of single-qubit rotations (with arbitrary rotation angles) and controlled-NOT (C-NOT) gates. Together with the existing package QI, this allows quantum information protocols to be analysed and then compiled to quantum circuits. Our decompositions are based on Phys. Rev. A 93, 032318 (2016), and hence, for generic operations, they are near optimal in terms of the number of gates required. UniversalQCompiler allows the compilation of any isometry (in particular, it can be used for unitaries and state preparation), quantum channel, positive-operator valued measure (POVM) or quantum instrument, although the run time becomes prohibitive for large numbers of qubits. The resulting circuits can be displayed graphically within Mathematica or exported to LaTeX. We also provide functionality to translate the circuits to OpenQASM, the quantum assembly language used, for instance, by the IBM Q Experience.
△ Less
Submitted 29 March, 2021; v1 submitted 1 April, 2019;
originally announced April 2019.
-
Bell Inequalities From No-Signalling Distributions
Authors:
Thomas Cope,
Roger Colbeck
Abstract:
A Bell inequality is a constraint on a set of correlations whose violation can be used to certify non-locality. They are instrumental for device-independent tasks such as key distribution or randomness expansion. In this work we consider bipartite Bell inequalities where two parties have $m_A$ and $m_B$ possible inputs and give $n_A$ and $n_B$ possible outputs, referring to this as the…
▽ More
A Bell inequality is a constraint on a set of correlations whose violation can be used to certify non-locality. They are instrumental for device-independent tasks such as key distribution or randomness expansion. In this work we consider bipartite Bell inequalities where two parties have $m_A$ and $m_B$ possible inputs and give $n_A$ and $n_B$ possible outputs, referring to this as the $(m_A, m_B, n_A, n_B)$ scenario. By exploiting knowledge of the set of extremal no-signalling distributions, we find all 175 Bell inequality classes in the (4, 4, 2, 2) scenario, as well as providing a partial list of 18277 classes in the (4, 5, 2, 2) scenario. We also use a probabilistic algorithm to obtain 5 classes of inequality in the (2, 3, 3, 2) scenario, which we confirmed to be complete, 25 classes in the (3, 3, 2, 3) scenario, and a partial list of 21170 classes in the (3, 3, 3, 3) scenario. Our inequalities are given in supplementary files. Finally, we discuss the application of these inequalities to the detection loophole problem, and provide new lower bounds on the detection efficiency threshold for small numbers of inputs and outputs.
△ Less
Submitted 16 August, 2019; v1 submitted 24 December, 2018;
originally announced December 2018.
-
Analysing causal structures in generalised probabilistic theories
Authors:
Mirjam Weilenmann,
Roger Colbeck
Abstract:
Causal structures give us a way to understand the origin of observed correlations. These were developed for classical scenarios, but quantum mechanical experiments necessitate their generalisation. Here we study causal structures in a broad range of theories, which include both quantum and classical theory as special cases. We propose a method for analysing differences between such theories based…
▽ More
Causal structures give us a way to understand the origin of observed correlations. These were developed for classical scenarios, but quantum mechanical experiments necessitate their generalisation. Here we study causal structures in a broad range of theories, which include both quantum and classical theory as special cases. We propose a method for analysing differences between such theories based on the so-called measurement entropy. We apply this method to several causal structures, deriving new relations that separate classical, quantum and more general theories within these causal structures. The constraints we derive for the most general theories are in a sense minimal requirements of any causal explanation in these scenarios. In addition, we make several technical contributions that give insight for the entropic analysis of quantum causal structures. In particular, we prove that for any causal structure and for any generalised probabilistic theory, the set of achievable entropy vectors form a convex cone.
△ Less
Submitted 29 June, 2021; v1 submitted 11 December, 2018;
originally announced December 2018.
-
A framework for quantum-secure device-independent randomness expansion
Authors:
Peter J. Brown,
Sammy Ragy,
Roger Colbeck
Abstract:
A device-independent randomness expansion protocol aims to take an initial random seed and generate a longer one without relying on details of how the devices operate for security. A large amount of work to date has focussed on a particular protocol based on spot-checking devices using the CHSH inequality. Here we show how to derive randomness expansion rates for a wide range of protocols, with se…
▽ More
A device-independent randomness expansion protocol aims to take an initial random seed and generate a longer one without relying on details of how the devices operate for security. A large amount of work to date has focussed on a particular protocol based on spot-checking devices using the CHSH inequality. Here we show how to derive randomness expansion rates for a wide range of protocols, with security against a quantum adversary. Our technique uses semidefinite programming and a recent improvement of the entropy accumulation theorem. To support the work and facilitate its use, we provide code that can generate lower bounds on the amount of randomness that can be output based on the measured quantities in the protocol. As an application, we give a protocol that robustly generates up to two bits of randomness per entangled qubit pair, which is twice that established in existing analyses of the spot-checking CHSH protocol in the low noise regime.
△ Less
Submitted 25 September, 2019; v1 submitted 31 October, 2018;
originally announced October 2018.
-
Analysing causal structures with entropy
Authors:
Mirjam Weilenmann,
Roger Colbeck
Abstract:
A central question for causal inference is to decide whether a set of correlations fit a given causal structure. In general, this decision problem is computationally infeasible and hence several approaches have emerged that look for certificates of compatibility. Here we review several such approaches based on entropy. We bring together the key aspects of these entropic techniques with unified ter…
▽ More
A central question for causal inference is to decide whether a set of correlations fit a given causal structure. In general, this decision problem is computationally infeasible and hence several approaches have emerged that look for certificates of compatibility. Here we review several such approaches based on entropy. We bring together the key aspects of these entropic techniques with unified terminology, filling several gaps and establishing new connections regarding their relation, all illustrated with examples. We consider cases where unobserved causes are classical, quantum and post-quantum and discuss what entropic analyses tell us about the difference. This has applications to quantum cryptography, where it can be crucial to eliminate the possibility of classical causes. We discuss the achievements and limitations of the entropic approach in comparison to other techniques and point out the main open problems.
△ Less
Submitted 25 July, 2018; v1 submitted 26 September, 2017;
originally announced September 2017.
-
Keyring models: an approach to steerability
Authors:
Carl A. Miller,
Roger Colbeck,
Yaoyun Shi
Abstract:
If a measurement is made on one half of a bipartite system, then, conditioned on the outcome, the other half has a new reduced state. If these reduced states defy classical explanation -- that is, if shared randomness cannot produce these reduced states for all possible measurements -- the bipartite state is said to be steerable. Determining which states are steerable is a challenging problem even…
▽ More
If a measurement is made on one half of a bipartite system, then, conditioned on the outcome, the other half has a new reduced state. If these reduced states defy classical explanation -- that is, if shared randomness cannot produce these reduced states for all possible measurements -- the bipartite state is said to be steerable. Determining which states are steerable is a challenging problem even for low dimensions. In the case of two-qubit systems a criterion is known for T-states (that is, those with maximally mixed marginals) under projective measurements. In the current work we introduce the concept of keyring models -- a special class of local hidden state models. When the measurements made correspond to real projectors, these allow us to study steerability beyond T-states.
Using keyring models, we completely solve the steering problem for real projective measurements when the state arises from mixing a pure two-qubit state with uniform noise. We also give a partial solution in the case when the uniform noise is replaced by independent depolarizing channels.
△ Less
Submitted 9 February, 2018; v1 submitted 28 June, 2017;
originally announced June 2017.
-
Smooth manifold structure for extreme channels
Authors:
Raban Iten,
Roger Colbeck
Abstract:
A quantum channel from a system $A$ of dimension $d_A$ to a system $B$ of dimension $d_B$ is a completely positive trace-preserving map from complex $d_A\times d_A$ to $d_B\times d_B$ matrices, and the set of all such maps with Kraus rank $r$ has the structure of a smooth manifold. We describe this set in two ways. First, as a quotient space of (a subset of) the $rd_B\times d_A$ dimensional Stiefe…
▽ More
A quantum channel from a system $A$ of dimension $d_A$ to a system $B$ of dimension $d_B$ is a completely positive trace-preserving map from complex $d_A\times d_A$ to $d_B\times d_B$ matrices, and the set of all such maps with Kraus rank $r$ has the structure of a smooth manifold. We describe this set in two ways. First, as a quotient space of (a subset of) the $rd_B\times d_A$ dimensional Stiefel manifold. Secondly, as the set of all Choi-states of a fixed rank $r$. These two descriptions are topologically equivalent. This allows us to show that the set of all Choi-states corresponding to extreme channels from system $A$ to system $B$ of a fixed Kraus rank $r$ is a smooth submanifold of dimension $2rd_Ad_B-d_A^2-r^2$ of the set of all Choi-states of rank $r$. As an application, we derive a lower bound on the number of parameters required for a quantum circuit topology to be able to approximate all extreme channels from $A$ to $B$ arbitrarily well.
△ Less
Submitted 25 September, 2019; v1 submitted 8 October, 2016;
originally announced October 2016.
-
Quantum Circuits for Quantum Channels
Authors:
Raban Iten,
Roger Colbeck,
Matthias Christandl
Abstract:
We study the implementation of quantum channels with quantum computers while minimizing the experimental cost, measured in terms of the number of Controlled-NOT (C-NOT) gates required (single-qubit gates are free). We consider three different models. In the first, the Quantum Circuit Model (QCM), we consider sequences of single-qubit and C-NOT gates and allow qubits to be traced out at the end of…
▽ More
We study the implementation of quantum channels with quantum computers while minimizing the experimental cost, measured in terms of the number of Controlled-NOT (C-NOT) gates required (single-qubit gates are free). We consider three different models. In the first, the Quantum Circuit Model (QCM), we consider sequences of single-qubit and C-NOT gates and allow qubits to be traced out at the end of the gate sequence. In the second (RandomQCM), we also allow external classical randomness. In the third (MeasuredQCM) we also allow measurements followed by operations that are classically controlled on the outcomes. We prove lower bounds on the number of C-NOT gates required and give near-optimal decompositions in almost all cases. Our main result is a MeasuredQCM circuit for any channel from m qubits to n qubits that uses at most one ancilla and has a low C-NOT count. We give explicit examples for small numbers of qubits that provide the lowest known C-NOT counts.
△ Less
Submitted 10 May, 2017; v1 submitted 26 September, 2016;
originally announced September 2016.
-
Non-Shannon inequalities in the entropy vector approach to causal structures
Authors:
Mirjam Weilenmann,
Roger Colbeck
Abstract:
A causal structure is a relationship between observed variables that in general restricts the possible correlations between them. This relationship can be mediated by unobserved systems, modelled by random variables in the classical case or joint quantum systems in the quantum case. One way to differentiate between the correlations realisable by two different causal structures is to use entropy ve…
▽ More
A causal structure is a relationship between observed variables that in general restricts the possible correlations between them. This relationship can be mediated by unobserved systems, modelled by random variables in the classical case or joint quantum systems in the quantum case. One way to differentiate between the correlations realisable by two different causal structures is to use entropy vectors, i.e., vectors whose components correspond to the entropies of each subset of the observed variables. To date, the starting point for deriving entropic constraints within causal structures are the so-called Shannon inequalities (positivity of entropy, conditional entropy and conditional mutual information). In the present work we investigate what happens when non-Shannon entropic inequalities are included as well. We show that in general these lead to tighter outer approximations of the set of realisable entropy vectors and hence enable a sharper distinction of different causal structures. Since non-Shannon inequalities can only be applied amongst classical variables, it might be expected that their use enables an entropic distinction between classical and quantum causal structures. However, this remains an open question. We also introduce techniques for deriving inner approximations to the allowed sets of entropy vectors for a given causal structure. These are useful for proving tightness of outer approximations or for finding interesting regions of entropy space. We illustrate these techniques in several scenarios, including the triangle causal structure.
△ Less
Submitted 11 March, 2018; v1 submitted 6 May, 2016;
originally announced May 2016.
-
Inability of the entropy vector method to certify nonclassicality in linelike causal structures
Authors:
Mirjam Weilenmann,
Roger Colbeck
Abstract:
Bell's theorem shows that our intuitive understanding of causation must be overturned in light of quantum correlations. Nevertheless, quantum mechanics does not permit signalling and hence a notion of cause remains. Understanding this notion is not only important at a fundamental level, but also for technological applications such as key distribution and randomness expansion. It has recently been…
▽ More
Bell's theorem shows that our intuitive understanding of causation must be overturned in light of quantum correlations. Nevertheless, quantum mechanics does not permit signalling and hence a notion of cause remains. Understanding this notion is not only important at a fundamental level, but also for technological applications such as key distribution and randomness expansion. It has recently been shown that a useful way to decide which classical causal structures could give rise to a given set of correlations is to use entropy vectors. These are vectors whose components are the entropies of all subsets of the observed variables in the causal structure. The entropy vector method employs causal relationships among the variables to restrict the set of possible entropy vectors. Here, we consider whether the same approach can lead to useful certificates of non-classicality within a given causal structure. Surprisingly, we find that for a family of causal structures that include the usual bipartite Bell structure they do not. For all members of this family, no function of the entropies of the observed variables gives such a certificate, in spite of the existence of nonclassical correlations. It is therefore necessary to look beyond entropy vectors to understand cause from a quantum perspective.
△ Less
Submitted 18 October, 2016; v1 submitted 8 March, 2016;
originally announced March 2016.
-
Quantum Circuits for Isometries
Authors:
Raban Iten,
Roger Colbeck,
Ivan Kukuljan,
Jonathan Home,
Matthias Christandl
Abstract:
We consider the decomposition of arbitrary isometries into a sequence of single-qubit and Controlled-NOT (C-NOT) gates. In many experimental architectures, the C-NOT gate is relatively 'expensive' and hence we aim to keep the number of these as low as possible. We derive a theoretical lower bound on the number of C-NOT gates required to decompose an arbitrary isometry from m to n qubits, and give…
▽ More
We consider the decomposition of arbitrary isometries into a sequence of single-qubit and Controlled-NOT (C-NOT) gates. In many experimental architectures, the C-NOT gate is relatively 'expensive' and hence we aim to keep the number of these as low as possible. We derive a theoretical lower bound on the number of C-NOT gates required to decompose an arbitrary isometry from m to n qubits, and give three explicit gate decompositions that achieve this bound up to a factor of about two in the leading order. We also perform some bespoke optimizations for certain cases where m and n are small. In addition, we show how to apply our result for isometries to give decomposition schemes for arbitrary quantum operations and POVMs via Stinespring's theorem. These results will have an impact on experimental efforts to build a quantum computer, enabling them to go further with the same resources.
△ Less
Submitted 9 April, 2020; v1 submitted 27 January, 2015;
originally announced January 2015.
-
A system's wave function is uniquely determined by its underlying physical state
Authors:
Roger Colbeck,
Renato Renner
Abstract:
We address the question of whether the quantum-mechanical wave function $Ψ$ of a system is uniquely determined by any complete description $Λ$ of the system's physical state. We show that this is the case if the latter satisfies a notion of "free choice". This notion requires that certain experimental parameters---those that according to quantum theory can be chosen independently of other variable…
▽ More
We address the question of whether the quantum-mechanical wave function $Ψ$ of a system is uniquely determined by any complete description $Λ$ of the system's physical state. We show that this is the case if the latter satisfies a notion of "free choice". This notion requires that certain experimental parameters---those that according to quantum theory can be chosen independently of other variables---retain this property in the presence of $Λ$. An implication of this result is that, among all possible descriptions $Λ$ of a system's state compatible with free choice, the wave function $Ψ$ is as objective as $Λ$.
△ Less
Submitted 28 December, 2017; v1 submitted 27 December, 2013;
originally announced December 2013.
-
A short note on the concept of free choice
Authors:
Roger Colbeck,
Renato Renner
Abstract:
We argue that the concepts of "freedom of choice" and of "causal order" are intrinsically linked: a choice is considered "free" if it is correlated only to variables in its causal future. We discuss the implications of this to Bell-type scenarios, where two separate measurements are carried out, neither of which lies in the causal future of the other, and where one typically assumes that the measu…
▽ More
We argue that the concepts of "freedom of choice" and of "causal order" are intrinsically linked: a choice is considered "free" if it is correlated only to variables in its causal future. We discuss the implications of this to Bell-type scenarios, where two separate measurements are carried out, neither of which lies in the causal future of the other, and where one typically assumes that the measurement settings are chosen freely. Furthermore, we refute a recent criticism made by Ghirardi and Romano in [arXiv:1301.5040] and [arXiv:1302.1635] that we used an unphysical freedom of choice assumption in our previous works, [Nat. Commun. 2, 411 (2011)] and [Phys. Rev. Lett. 108, 150402 (2012)].
△ Less
Submitted 18 February, 2013;
originally announced February 2013.
-
Unconditionally secure device-independent quantum key distribution with only two devices
Authors:
Jonathan Barrett,
Roger Colbeck,
Adrian Kent
Abstract:
Device-independent quantum key distribution is the task of using uncharacterized quantum devices to establish a shared key between two users. If a protocol is secure regardless of the device behaviour, it can be used to generate a shared key even if the supplier of the devices is malicious. To date, all device-independent quantum key distribution protocols that are known to be secure require separ…
▽ More
Device-independent quantum key distribution is the task of using uncharacterized quantum devices to establish a shared key between two users. If a protocol is secure regardless of the device behaviour, it can be used to generate a shared key even if the supplier of the devices is malicious. To date, all device-independent quantum key distribution protocols that are known to be secure require separate isolated devices for each entangled pair, which is a significant practical limitation. We introduce a protocol that requires Alice and Bob to have only one device each. Although inefficient, our protocol is unconditionally secure against an adversarial supplier limited only by locally enforced signalling constraints.
△ Less
Submitted 11 October, 2012; v1 submitted 3 September, 2012;
originally announced September 2012.
-
The completeness of quantum theory for predicting measurement outcomes
Authors:
Roger Colbeck,
Renato Renner
Abstract:
The predictions that quantum theory makes about the outcomes of measurements are generally probabilistic. This has raised the question whether quantum theory can be considered complete, or whether there could exist alternative theories that provide improved predictions. Here we review recent work that considers arbitrary alternative theories, constrained only by the requirement that they are compa…
▽ More
The predictions that quantum theory makes about the outcomes of measurements are generally probabilistic. This has raised the question whether quantum theory can be considered complete, or whether there could exist alternative theories that provide improved predictions. Here we review recent work that considers arbitrary alternative theories, constrained only by the requirement that they are compatible with a notion of "free choice" (defined with respect to a natural causal order). It is shown that quantum theory is "maximally informative", i.e., there is no other compatible theory that gives improved predictions. Furthermore, any alternative maximally informative theory is necessarily equivalent to quantum theory. This means that the state a system has in such a theory is in one-to-one correspondence with its quantum-mechanical state (the wave function). In this sense, quantum theory is complete.
△ Less
Submitted 11 July, 2013; v1 submitted 20 August, 2012;
originally announced August 2012.
-
Memory Attacks on Device-Independent Quantum Cryptography
Authors:
Jonathan Barrett,
Roger Colbeck,
Adrian Kent
Abstract:
Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage or device degradation, this idea has excited much interest, and many device-independent schemes have be…
▽ More
Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defences include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defences as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each another (and no other party).
△ Less
Submitted 6 August, 2013; v1 submitted 20 January, 2012;
originally announced January 2012.
-
Uncertainty relations from simple entropic properties
Authors:
Patrick J. Coles,
Roger Colbeck,
Li Yu,
Michael Zwolak
Abstract:
Uncertainty relations provide constraints on how well the outcomes of incompatible measurements can be predicted, and, as well as being fundamental to our understanding of quantum theory, they have practical applications such as for cryptography and witnessing entanglement. Here we shed new light on the entropic form of these relations, showing that they follow from a few simple entropic propertie…
▽ More
Uncertainty relations provide constraints on how well the outcomes of incompatible measurements can be predicted, and, as well as being fundamental to our understanding of quantum theory, they have practical applications such as for cryptography and witnessing entanglement. Here we shed new light on the entropic form of these relations, showing that they follow from a few simple entropic properties, including the data processing inequality. We prove these relations without relying on the exact expression for the entropy, and hence show that a single technique applies to several entropic quantities, including the von Neumann entropy, min- and max-entropies and the Renyi entropies.
△ Less
Submitted 16 April, 2012; v1 submitted 2 December, 2011;
originally announced December 2011.
-
Is a system's wave function in one-to-one correspondence with its elements of reality?
Authors:
Roger Colbeck,
Renato Renner
Abstract:
Although quantum mechanics is one of our most successful physical theories, there has been a long-standing debate about the interpretation of the wave function---the central object of the theory. Two prominent views are that (i) it corresponds to an element of reality, i.e. an objective attribute that exists before measurement, and (ii) it is a subjective state of knowledge about some underlying r…
▽ More
Although quantum mechanics is one of our most successful physical theories, there has been a long-standing debate about the interpretation of the wave function---the central object of the theory. Two prominent views are that (i) it corresponds to an element of reality, i.e. an objective attribute that exists before measurement, and (ii) it is a subjective state of knowledge about some underlying reality. A recent result [Pusey et al. arXiv:1111.3328] has placed the subjective interpretation into doubt, showing that it would contradict certain physically plausible assumptions, in particular that multiple systems can be prepared such that their elements of reality are uncorrelated. Here we show, based only on the assumption that measurement settings can be chosen freely, that a system's wave function is in one-to-one correspondence with its elements of reality. This also eliminates the possibility that it can be interpreted subjectively.
△ Less
Submitted 12 April, 2012; v1 submitted 28 November, 2011;
originally announced November 2011.
-
Free randomness can be amplified
Authors:
Roger Colbeck,
Renato Renner
Abstract:
Are there fundamentally random processes in nature? Theoretical predictions, confirmed experimentally, such as the violation of Bell inequalities, point to an affirmative answer. However, these results are based on the assumption that measurement settings can be chosen freely at random, so assume the existence of perfectly free random processes from the outset. Here we consider a scenario in which…
▽ More
Are there fundamentally random processes in nature? Theoretical predictions, confirmed experimentally, such as the violation of Bell inequalities, point to an affirmative answer. However, these results are based on the assumption that measurement settings can be chosen freely at random, so assume the existence of perfectly free random processes from the outset. Here we consider a scenario in which this assumption is weakened and show that partially free random bits can be amplified to make arbitrarily free ones. More precisely, given a source of random bits whose correlation with other variables is below a certain threshold, we propose a procedure for generating fresh random bits that are virtually uncorrelated with all other variables. We also conjecture that such procedures exist for any non-trivial threshold. Our result is based solely on the no-signalling principle, which is necessary for the existence of free randomness.
△ Less
Submitted 18 June, 2013; v1 submitted 16 May, 2011;
originally announced May 2011.
-
An experimental test of all theories with predictive power beyond quantum theory
Authors:
Terence E. Stuart,
Joshua A. Slater,
Roger Colbeck,
Renato Renner,
Wolfgang Tittel
Abstract:
According to quantum theory, the outcomes of future measurements cannot (in general) be predicted with certainty. In some cases, even with a complete physical description of the system to be measured and the measurement apparatus, the outcomes of certain measurements are completely random. This raises the question, originating in the paper by Einstein, Podolsky and Rosen, of whether quantum mechan…
▽ More
According to quantum theory, the outcomes of future measurements cannot (in general) be predicted with certainty. In some cases, even with a complete physical description of the system to be measured and the measurement apparatus, the outcomes of certain measurements are completely random. This raises the question, originating in the paper by Einstein, Podolsky and Rosen, of whether quantum mechanics is the optimal way to predict measurement outcomes. Established arguments and experimental tests exclude a few specific alternative models. Here, we provide a complete answer to the above question, refuting any alternative theory with significantly more predictive power than quantum theory. More precisely, we perform various measurements on distant entangled photons, and, under the assumption that these measurements are chosen freely, we give an upper bound on how well any alternative theory could predict their outcomes. In particular, in the case where quantum mechanics predicts two equally likely outcomes, our results are incompatible with any theory in which the probability of a prediction is increased by more than ~0.19. Hence, we can immediately refute any already considered or yet-to-be-proposed alternative model with more predictive power than this.
△ Less
Submitted 30 April, 2011;
originally announced May 2011.
-
Experimental investigation of the uncertainty principle in the presence of quantum memory
Authors:
Robert Prevedel,
Deny R. Hamel,
Roger Colbeck,
Kent Fisher,
Kevin J. Resch
Abstract:
Heisenberg's uncertainty principle provides a fundamental limitation on an observer's ability to simultaneously predict the outcome when one of two measurements is performed on a quantum system. However, if the observer has access to a particle (stored in a quantum memory) which is entangled with the system, his uncertainty is generally reduced. This effect has recently been quantified by Berta et…
▽ More
Heisenberg's uncertainty principle provides a fundamental limitation on an observer's ability to simultaneously predict the outcome when one of two measurements is performed on a quantum system. However, if the observer has access to a particle (stored in a quantum memory) which is entangled with the system, his uncertainty is generally reduced. This effect has recently been quantified by Berta et al. [Nature Physics 6, 659 (2010)] in a new, more general uncertainty relation, formulated in terms of entropies. Using entangled photon pairs, an optical delay line serving as a quantum memory and fast, active feed-forward we experimentally probe the validity of this new relation. The behaviour we find agrees with the predictions of quantum theory and satisfies the new uncertainty relation. In particular, we find lower uncertainties about the measurement outcomes than would be possible without the entangled particle. This shows not only that the reduction in uncertainty enabled by entanglement can be significant in practice, but also demonstrates the use of the inequality to witness entanglement.
△ Less
Submitted 1 December, 2010;
originally announced December 2010.
-
Private Randomness Expansion With Untrusted Devices
Authors:
Roger Colbeck,
Adrian Kent
Abstract:
Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a…
▽ More
Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beam-splitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices---even ones created by an adversarial agent---while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion.
We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.
△ Less
Submitted 28 February, 2011; v1 submitted 19 November, 2010;
originally announced November 2010.
-
No extension of quantum theory can have improved predictive power
Authors:
Roger Colbeck,
Renato Renner
Abstract:
According to quantum theory, measurements generate random outcomes, in stark contrast with classical mechanics. This raises the question of whether there could exist an extension of the theory which removes this indeterminism, as suspected by Einstein, Podolsky and Rosen (EPR). Although this has been shown to be impossible, existing results do not imply that the current theory is maximally informa…
▽ More
According to quantum theory, measurements generate random outcomes, in stark contrast with classical mechanics. This raises the question of whether there could exist an extension of the theory which removes this indeterminism, as suspected by Einstein, Podolsky and Rosen (EPR). Although this has been shown to be impossible, existing results do not imply that the current theory is maximally informative. Here we ask the more general question of whether any improved predictions can be achieved by any extension of quantum theory. Under the assumption that measurements can be chosen freely, we answer this question in the negative: no extension of quantum theory can give more information about the outcomes of future measurements than quantum theory itself. Our result has significance for the foundations of quantum mechanics, as well as applications to tasks that exploit the inherent randomness in quantum theory, such as quantum cryptography.
△ Less
Submitted 9 August, 2011; v1 submitted 27 May, 2010;
originally announced May 2010.
-
Quantum And Relativistic Protocols For Secure Multi-Party Computation
Authors:
Roger Colbeck
Abstract:
After a general introduction, the thesis is divided into four parts. In the first, we discuss the task of coin tossing, principally in order to highlight the effect different physical theories have on security in a straightforward manner, but, also, to introduce a new protocol for non-relativistic strong coin tossing. This protocol matches the security of the best protocol known to date while usin…
▽ More
After a general introduction, the thesis is divided into four parts. In the first, we discuss the task of coin tossing, principally in order to highlight the effect different physical theories have on security in a straightforward manner, but, also, to introduce a new protocol for non-relativistic strong coin tossing. This protocol matches the security of the best protocol known to date while using a conceptually different approach to achieve the task.
In the second part variable bias coin tossing is introduced. This is a variant of coin tossing in which one party secretly chooses one of two biased coins to toss. It is shown that this can be achieved with unconditional security for a specified range of biases, and with cheat-evident security for any bias. We also discuss two further protocols which are conjectured to be unconditionally secure for any bias.
The third section looks at other two-party secure computations for which, prior to our work, protocols and no-go theorems were unknown. We introduce a general model for such computations, and show that, within this model, a wide range of functions are impossible to compute securely. We give explicit cheating attacks for such functions.
In the final chapter we discuss the task of expanding a private random string, while drop** the usual assumption that the protocol's user trusts her devices. Instead we assume that all quantum devices are supplied by an arbitrarily malicious adversary. We give two protocols that we conjecture securely perform this task. The first allows a private random string to be expanded by a finite amount, while the second generates an arbitrarily large expansion of such a string.
△ Less
Submitted 28 February, 2011; v1 submitted 19 November, 2009;
originally announced November 2009.
-
All reversible dynamics in maximally non-local theories are trivial
Authors:
David Gross,
Markus Mueller,
Roger Colbeck,
Oscar C. O. Dahlsten
Abstract:
A remarkable feature of quantum theory is non-locality (i.e. the presence of correlations which violate Bell inequalities). However, quantum correlations are not maximally non-local, and it is natural to ask whether there are compelling reasons for rejecting theories in which stronger violations are possible. To shed light on this question, we consider post-quantum theories in which maximally no…
▽ More
A remarkable feature of quantum theory is non-locality (i.e. the presence of correlations which violate Bell inequalities). However, quantum correlations are not maximally non-local, and it is natural to ask whether there are compelling reasons for rejecting theories in which stronger violations are possible. To shed light on this question, we consider post-quantum theories in which maximally non-local states (non-local boxes) occur. It has previously been conjectured that the set of dynamical transformations possible in such theories is severely limited. We settle the question affirmatively in the case of reversible dynamics, by completely characterizing all such transformations allowed in this setting. We find that the dynamical group is trivial, in the sense that it is generated solely by local operations and permutations of systems. In particular, no correlations can ever be created; non-local boxes cannot be prepared from product states (in other words, no analogues of entangling unitary operations exist), and classical computers can efficiently simulate all such processes.
△ Less
Submitted 1 March, 2010; v1 submitted 12 October, 2009;
originally announced October 2009.
-
The Uncertainty Principle in the Presence of Quantum Memory
Authors:
Mario Berta,
Matthias Christandl,
Roger Colbeck,
Joseph M. Renes,
Renato Renner
Abstract:
The uncertainty principle, originally formulated by Heisenberg, dramatically illustrates the difference between classical and quantum mechanics. The principle bounds the uncertainties about the outcomes of two incompatible measurements, such as position and momentum, on a particle. It implies that one cannot predict the outcomes for both possible choices of measurement to arbitrary precision, even…
▽ More
The uncertainty principle, originally formulated by Heisenberg, dramatically illustrates the difference between classical and quantum mechanics. The principle bounds the uncertainties about the outcomes of two incompatible measurements, such as position and momentum, on a particle. It implies that one cannot predict the outcomes for both possible choices of measurement to arbitrary precision, even if information about the preparation of the particle is available in a classical memory. However, if the particle is prepared entangled with a quantum memory, a device which is likely to soon be available, it is possible to predict the outcomes for both measurement choices precisely. In this work we strengthen the uncertainty principle to incorporate this case, providing a lower bound on the uncertainties which depends on the amount of entanglement between the particle and the quantum memory. We detail the application of our result to witnessing entanglement and to quantum key distribution.
△ Less
Submitted 28 February, 2011; v1 submitted 7 September, 2009;
originally announced September 2009.
-
Duality Between Smooth Min- and Max-Entropies
Authors:
Marco Tomamichel,
Roger Colbeck,
Renato Renner
Abstract:
In classical and quantum information theory, operational quantities such as the amount of randomness that can be extracted from a given source or the amount of space needed to store given data are normally characterized by one of two entropy measures, called smooth min-entropy and smooth max-entropy, respectively. While both entropies are equal to the von Neumann entropy in certain special cases…
▽ More
In classical and quantum information theory, operational quantities such as the amount of randomness that can be extracted from a given source or the amount of space needed to store given data are normally characterized by one of two entropy measures, called smooth min-entropy and smooth max-entropy, respectively. While both entropies are equal to the von Neumann entropy in certain special cases (e.g., asymptotically, for many independent repetitions of the given data), their values can differ arbitrarily in the general case.
In this work, a recently discovered duality relation between (non-smooth) min- and max-entropies is extended to the smooth case. More precisely, it is shown that the smooth min-entropy of a system A conditioned on a system B equals the negative of the smooth max-entropy of A conditioned on a purifying system C. This result immediately implies that certain operational quantities (such as the amount of compression and the amount of randomness that can be extracted from given data) are related. Such relations may, for example, have applications in cryptographic security proofs.
△ Less
Submitted 20 October, 2009; v1 submitted 29 July, 2009;
originally announced July 2009.
-
Defining the local part of a hidden variable model: a comment
Authors:
Roger Colbeck,
Renato Renner
Abstract:
In [Physical Review Letters 101, 050403 (2008)], we showed that quantum theory cannot be explained by a hidden variable model with a non-trivial local part. The purpose of this comment is to clarify our notion of local part, which seems to have caused some confusion in the recent literature. This notion is based on Bell's and demands that local hidden variables are physical, the idea being that,…
▽ More
In [Physical Review Letters 101, 050403 (2008)], we showed that quantum theory cannot be explained by a hidden variable model with a non-trivial local part. The purpose of this comment is to clarify our notion of local part, which seems to have caused some confusion in the recent literature. This notion is based on Bell's and demands that local hidden variables are physical, the idea being that, if discovered, they would not contradict basic physical principles. We explain why the recent supposed "counterexamples" that have appeared are not counterexamples to our theorem--in fact they are based on a definition of local hidden variables which would allow signalling and is therefore not physical.
△ Less
Submitted 5 February, 2010; v1 submitted 28 July, 2009;
originally announced July 2009.
-
Simple Channel Coding Bounds
Authors:
Ligong Wang,
Roger Colbeck,
Renato Renner
Abstract:
New channel coding converse and achievability bounds are derived for a single use of an arbitrary channel. Both bounds are expressed using a quantity called the "smooth 0-divergence", which is a generalization of Renyi's divergence of order 0. The bounds are also studied in the limit of large block-lengths. In particular, they combine to give a general capacity formula which is equivalent to the o…
▽ More
New channel coding converse and achievability bounds are derived for a single use of an arbitrary channel. Both bounds are expressed using a quantity called the "smooth 0-divergence", which is a generalization of Renyi's divergence of order 0. The bounds are also studied in the limit of large block-lengths. In particular, they combine to give a general capacity formula which is equivalent to the one derived by Verdu and Han.
△ Less
Submitted 28 July, 2010; v1 submitted 7 January, 2009;
originally announced January 2009.
-
A Fully Quantum Asymptotic Equipartition Property
Authors:
Marco Tomamichel,
Roger Colbeck,
Renato Renner
Abstract:
The classical asymptotic equipartition property is the statement that, in the limit of a large number of identical repetitions of a random experiment, the output sequence is virtually certain to come from the typical set, each member of which is almost equally likely. In this paper, we prove a fully quantum generalization of this property, where both the output of the experiment and side informa…
▽ More
The classical asymptotic equipartition property is the statement that, in the limit of a large number of identical repetitions of a random experiment, the output sequence is virtually certain to come from the typical set, each member of which is almost equally likely. In this paper, we prove a fully quantum generalization of this property, where both the output of the experiment and side information are quantum. We give an explicit bound on the convergence, which is independent of the dimensionality of the side information. This naturally leads to a family of Renyi-like quantum conditional entropies, for which the von Neumann entropy emerges as a special case.
△ Less
Submitted 12 May, 2009; v1 submitted 10 November, 2008;
originally announced November 2008.
-
Quantum Self-Correcting Stabilizer Codes
Authors:
Alastair Kay,
Roger Colbeck
Abstract:
In this paper, we explicitly construct (Abelian) anyonic excitations of arbitrary stabilizer Hamiltonians which are local on a 2D lattice of qubits. This leads directly to the conclusion that, in the presence of local thermal noise, such systems cannot be used for the fault-tolerant storage of quantum information by self-correction i.e. they are ruled out as candidates for a `quantum hard drive'…
▽ More
In this paper, we explicitly construct (Abelian) anyonic excitations of arbitrary stabilizer Hamiltonians which are local on a 2D lattice of qubits. This leads directly to the conclusion that, in the presence of local thermal noise, such systems cannot be used for the fault-tolerant storage of quantum information by self-correction i.e. they are ruled out as candidates for a `quantum hard drive'. We suggest that in 3D, the same construction leads to an argument that self-correction is impossible.
△ Less
Submitted 20 October, 2008;
originally announced October 2008.
-
Hidden variable models for quantum theory cannot have any local part
Authors:
Roger Colbeck,
Renato Renner
Abstract:
It was shown by Bell that no local hidden variable model is compatible with quantum mechanics. If, instead, one permits the hidden variables to be entirely non-local, then any quantum mechanical predictions can be recovered. In this paper, we consider general hidden variable models which can have both local and non-local parts. We then show the existence of (experimentally verifiable) quantum co…
▽ More
It was shown by Bell that no local hidden variable model is compatible with quantum mechanics. If, instead, one permits the hidden variables to be entirely non-local, then any quantum mechanical predictions can be recovered. In this paper, we consider general hidden variable models which can have both local and non-local parts. We then show the existence of (experimentally verifiable) quantum correlations that are incompatible with any hidden variable model having a non-trivial local part, such as the model proposed by Leggett.
△ Less
Submitted 16 January, 2008; v1 submitted 15 January, 2008;
originally announced January 2008.