-
A mathematical foundation for self-testing: Lifting common assumptions
Authors:
Pedro Baptista,
Ranyiliu Chen,
Jędrzej Kaniewski,
David Rasmussen Lolck,
Laura Mančinska,
Thor Gabelgaard Nielsen,
Simon Schmidt
Abstract:
In this work we study the phenomenon of self-testing from the first principles, aiming to place this versatile concept on a rigorous mathematical footing. Self-testing allows a classical verifier to infer a quantum mechanical description of untrusted quantum devices that she interacts with in a black-box manner. Somewhat contrary to the black-box paradigm, existing self-testing results tend to pre…
▽ More
In this work we study the phenomenon of self-testing from the first principles, aiming to place this versatile concept on a rigorous mathematical footing. Self-testing allows a classical verifier to infer a quantum mechanical description of untrusted quantum devices that she interacts with in a black-box manner. Somewhat contrary to the black-box paradigm, existing self-testing results tend to presuppose conditions that constrain the operation of the untrusted devices. A common assumption is that these devices perform a projective measurement of a pure quantum state. Naturally, in the absence of any prior knowledge it would be appropriate to model these devices as measuring a mixed state using POVM measurements, since the purifying/dilating spaces could be held by the environment or an adversary.
We prove a general theorem allowing to remove these assumptions, thereby promoting most existing self-testing results to their assumption-free variants. On the other hand, we pin-point situations where assumptions cannot be lifted without loss of generality. As a key (counter)example we identify a quantum correlation which is a self-test only if certain assumptions are made. Remarkably, this is also the first example of a correlation that cannot be implemented using projective measurements on a bipartite state of full Schmidt rank. Finally, we compare existing self-testing definitions, establishing many equivalences as well as identifying subtle differences.
△ Less
Submitted 19 October, 2023;
originally announced October 2023.
-
Extremal points of the quantum set in the CHSH scenario: conjectured analytical solution
Authors:
Antoni Mikos-Nuszkiewicz,
Jędrzej Kaniewski
Abstract:
Quantum mechanics may revolutionise many aspects of modern information processing as it promises significant advantages in several fields such as cryptography, computing and metrology. Quantum cryptography for instance allows us to implement protocols which are device-independent, i.e. they can be proven security under fewer assumptions. These protocols rely on using devices producing non-local st…
▽ More
Quantum mechanics may revolutionise many aspects of modern information processing as it promises significant advantages in several fields such as cryptography, computing and metrology. Quantum cryptography for instance allows us to implement protocols which are device-independent, i.e. they can be proven security under fewer assumptions. These protocols rely on using devices producing non-local statistics and ideally these statistics would correspond to extremal points of the quantum set in the probability space. However, even in the CHSH scenario (the simplest non-trivial Bell scenario) we do not have a full understanding of the extremal quantum points. In fact, there are only a couple of analytic families of such points. Our first contribution is to introduce two new families of analytical quantum extremal points by providing solutions to two new families of Bell functionals. In the second part we focus on develo** an analytical criteria for extremality in the CHSH scenario. A well-known Tsirelson-Landau-Masanes criterion only applies to points with uniform marginals, but a generalisation has been suggested in a sequence of works by Satoshi Ishizaka. We combine these conditions into a standalone conjecture, explore their technical details and discuss their suitability. Based on the understanding acquired, we propose a new set of conditions with an elegant mathematical form and an intuitive physical interpretation. Finally, we verify that both sets of conditions give correct predictions on the new families of quantum extremal points.
△ Less
Submitted 4 May, 2023; v1 submitted 21 February, 2023;
originally announced February 2023.
-
Biased Random Access Codes
Authors:
Gabriel Pereira Alves,
Nicolas Gigena,
Jędrzej Kaniewski
Abstract:
A random access code (RAC) is a communication task in which the sender encodes a random message into a shorter one to be decoded by the receiver so that a randomly chosen character of the original message is recovered with some probability. Both the message and the character to be recovered are assumed to be uniformly distributed. In this paper, we extend this protocol by allowing more general dis…
▽ More
A random access code (RAC) is a communication task in which the sender encodes a random message into a shorter one to be decoded by the receiver so that a randomly chosen character of the original message is recovered with some probability. Both the message and the character to be recovered are assumed to be uniformly distributed. In this paper, we extend this protocol by allowing more general distributions of these inputs, which alters the encoding and decoding strategies optimizing the protocol performance, with either classical or quantum resources. We approach the problem of optimizing the performance of these biased RACs with both numerical and analytical tools. On the numerical front, we present algorithms that allow a numerical evaluation of the optimal performance over both classical and quantum strategies and provide a Python package designed to implement them, called RAC-tools. We then use this numerical tool to investigate single-parameter families of biased RACs in the $n^2 \mapsto 1$ and $2^d \mapsto 1$ scenarios. For RACs in the $n^2 \mapsto 1$ scenario, we derive a general upper bound for the cases in which the inputs are not correlated, which coincides with the quantum value for $n=2$ and, in some cases for $n=3$. Moreover, it is shown that attaining this upper bound self-tests pairs or triples of rank-1 projective measurements, respectively. An analogous upper bound is derived for the value of RACs in the $2^d \mapsto 1$ scenario, which is shown to be always attainable using mutually unbiased measurements if the distribution of input strings is unbiased.
△ Less
Submitted 12 October, 2023; v1 submitted 16 February, 2023;
originally announced February 2023.
-
Mutually Unbiased Measurements, Hadamard Matrices, and Superdense Coding
Authors:
Máté Farkas,
Jędrzej Kaniewski,
Ashwin Nayak
Abstract:
Mutually unbiased bases (MUBs) are highly symmetric bases on complex Hilbert spaces, and the corresponding rank-1 projective measurements are ubiquitous in quantum information theory. In this work, we study a recently introduced generalization of MUBs called mutually unbiased measurements (MUMs). These measurements inherit the essential property of complementarity from MUBs, but the Hilbert space…
▽ More
Mutually unbiased bases (MUBs) are highly symmetric bases on complex Hilbert spaces, and the corresponding rank-1 projective measurements are ubiquitous in quantum information theory. In this work, we study a recently introduced generalization of MUBs called mutually unbiased measurements (MUMs). These measurements inherit the essential property of complementarity from MUBs, but the Hilbert space dimension is no longer required to match the number of outcomes. This operational complementarity property renders MUMs highly useful for device-independent quantum information processing. It has been shown that MUMs are strictly more general than MUBs. In this work we provide a complete proof of the characterization of MUMs that are direct sums of MUBs. We then proceed to construct new examples of MUMs that are not direct sums of MUBs. A crucial technical tool for these construction is a correspondence with quaternionic Hadamard matrices, which allows us to map known examples of such matrices to MUMs that are not direct sums of MUBs. Furthermore, we show that -- in stark contrast with MUBs -- the number of MUMs for a fixed outcome number is unbounded. Next, we focus on the use of MUMs in quantum communication. We demonstrate how any pair of MUMs with d outcomes defines a d-dimensional superdense coding protocol. Using MUMs that are not direct sums of MUBs, we disprove a recent conjecture due to Nayak and Yuen on the rigidity of superdense coding for infinitely many dimensions. The superdense coding protocols arising in the refutation reveal how shared entanglement may be used in a manner heretofore unknown.
△ Less
Submitted 12 October, 2023; v1 submitted 25 April, 2022;
originally announced April 2022.
-
Quantum value for a family of $I_{3322}$-like Bell functionals
Authors:
N. Gigena,
J. Kaniewski
Abstract:
We introduce a three-parameter family of Bell functionals that extends those studied in reference [Phys. Rev. Research 2, 033420 (2020)] by including a marginal contribution. An analysis of their quantum value naturally splits the family into two branches, and for the first of them we show that this value is given by a simple function of the parameters defining the functionals. In this case we com…
▽ More
We introduce a three-parameter family of Bell functionals that extends those studied in reference [Phys. Rev. Research 2, 033420 (2020)] by including a marginal contribution. An analysis of their quantum value naturally splits the family into two branches, and for the first of them we show that this value is given by a simple function of the parameters defining the functionals. In this case we completely characterise the realisations attaining the optimal value and show that these functionals can be used to self-test any partially entangled state of two qubits. The optimal measurements, however, are not unique and form a one-parameter family of qubit measurements. The second branch, which includes the well-known $I_{3322}$ functional, is studied numerically. We identify the region in the parameter space where the quantum value can be attained, with two-dimensional systems and characterise the state and measurements attaining this value. Finally, we show that the set of realisations introduced in reference [Phys. Rev. A 82, 022116 (2010)] to obtain the maximal violation of the $I_{3322}$ inequality succeeds in approaching the optimal value for a large subset of the functionals in this branch. In these cases we analyse and discuss the main features of the optimal realisations.
△ Less
Submitted 3 March, 2022;
originally announced March 2022.
-
Optimality of any pair of incompatible rank-one projective measurements for some non-trivial Bell inequality
Authors:
Gabriel Pereira Alves,
Jędrzej Kaniewski
Abstract:
Bell non-locality represents one of the most striking departures of quantum mechanics from classical physics. It shows that correlations between space-like separated systems allowed by quantum mechanics are stronger than those present in any classical theory. In a recent work [Sci. Adv. 7, eabc3847 (2021)], a family of Bell functionals tailored to mutually unbiased bases (MUBs) is proposed. For th…
▽ More
Bell non-locality represents one of the most striking departures of quantum mechanics from classical physics. It shows that correlations between space-like separated systems allowed by quantum mechanics are stronger than those present in any classical theory. In a recent work [Sci. Adv. 7, eabc3847 (2021)], a family of Bell functionals tailored to mutually unbiased bases (MUBs) is proposed. For these functionals, the maximal quantum violation is achieved if the two measurements performed by one of the parties are constructed out of MUBs of a fixed dimension. Here, we generalize this construction to an arbitrary incompatible pair of rank-one projective measurements. By constructing a new family of Bell functionals, we show that for any such pair there exists a Bell inequality that is maximally violated by this pair. Moreover, when investigating the robustness of these violations to noise, we demonstrate that the realization which is most robust to noise is not generated by MUBs.
△ Less
Submitted 30 August, 2022; v1 submitted 14 December, 2021;
originally announced December 2021.
-
Quantifying incompatibility of quantum measurements through non-commutativity
Authors:
Krzysztof Mordasewicz,
Jędrzej Kaniewski
Abstract:
The existence of incompatible measurements, i.e. measurements which cannot be performed simultaneously on a single copy of a quantum state, constitutes an important distinction between quantum mechanics and classical theories. While incompatibility might at first glance seem like an obstacle, it turns to be a necessary ingredient to achieve the so-called quantum advantage in various operational ta…
▽ More
The existence of incompatible measurements, i.e. measurements which cannot be performed simultaneously on a single copy of a quantum state, constitutes an important distinction between quantum mechanics and classical theories. While incompatibility might at first glance seem like an obstacle, it turns to be a necessary ingredient to achieve the so-called quantum advantage in various operational tasks like random access codes or key distribution. To improve our understanding of how to quantify incompatibility of quantum measurements, we define and explore a family of incompatibility measures based on non-commutativity. We investigate some basic properties of these measures, we show that they satisfy some natural information-processing requirements and we fully characterize the pairs which achieve the highest incompatibility (in a fixed dimension). We also consider the behavior of our measures under different types of compositions. Finally, to link our new measures to existing results, we relate them to a robustness-based incompatibility measure and two operational scenarios: random access codes and entropic uncertainty relations.
△ Less
Submitted 22 November, 2021; v1 submitted 20 October, 2021;
originally announced October 2021.
-
Near-maximal two-photon entanglement for quantum communications at 2.1 $μ$m
Authors:
Adetunmise C. Dada,
Jędrzej Kaniewski,
Corin Gawith,
Martin Lavery,
Robert H. Hadfield,
Daniele Faccio,
Matteo Clerici
Abstract:
Owing to a reduced solar background and low propagation losses in the atmosphere, the 2- to 2.5-$μ$m waveband is a promising candidate for daylight quantum communication. This spectral region also offers low losses and low dispersion in hollow-core fibers and in silicon waveguides. We demonstrate for the first time near-maximally entangled photon pairs at 2.1 $μ$m that could support device indepen…
▽ More
Owing to a reduced solar background and low propagation losses in the atmosphere, the 2- to 2.5-$μ$m waveband is a promising candidate for daylight quantum communication. This spectral region also offers low losses and low dispersion in hollow-core fibers and in silicon waveguides. We demonstrate for the first time near-maximally entangled photon pairs at 2.1 $μ$m that could support device independent quantum key distribution (DIQKD) assuming sufficiently high channel efficiencies. The state corresponds to a positive secure-key rate (0.254 bits/pair, with a quantum bit error rate of 3.8%) based on measurements in a laboratory setting with minimal channel loss and transmission distance. This is promising for the future implementation of DIQKD at 2.1 $μ$m.
△ Less
Submitted 25 October, 2021; v1 submitted 18 June, 2021;
originally announced June 2021.
-
Mutually unbiased bases and symmetric informationally complete measurements in Bell experiments
Authors:
Armin Tavakoli,
Máté Farkas,
Denis Rosset,
Jean-Daniel Bancal,
Jędrzej Kaniewski
Abstract:
Mutually unbiased bases (MUBs) and symmetric informationally complete projectors (SICs) are crucial to many conceptual and practical aspects of quantum theory. Here, we develop their role in quantum nonlocality by: i) introducing families of Bell inequalities that are maximally violated by $d$-dimensional MUBs and SICs respectively, ii) proving device-independent certification of natural operation…
▽ More
Mutually unbiased bases (MUBs) and symmetric informationally complete projectors (SICs) are crucial to many conceptual and practical aspects of quantum theory. Here, we develop their role in quantum nonlocality by: i) introducing families of Bell inequalities that are maximally violated by $d$-dimensional MUBs and SICs respectively, ii) proving device-independent certification of natural operational notions of MUBs and SICs, and iii) using MUBs and SICs to develop optimal-rate and nearly optimal-rate protocols for device independent quantum key distribution and device-independent quantum random number generation respectively. Moreover, we also present the first example of an extremal point of the quantum set of correlations which admits physically inequivalent quantum realisations. Our results elaborately demonstrate the foundational and practical relevance of the two most important discrete Hilbert space structures to the field of quantum nonlocality.
△ Less
Submitted 20 October, 2020; v1 submitted 6 December, 2019;
originally announced December 2019.
-
A weak form of self-testing
Authors:
Jędrzej Kaniewski
Abstract:
The concept of self-testing (or rigidity) refers to the fact that for certain Bell inequalities the maximal violation can be achieved in an essentially unique manner. In this work we present a family of Bell inequalities which are maximally violated by multiple inequivalent quantum realisations. We completely characterise the quantum realisations achieving the maximal violation and we show that ea…
▽ More
The concept of self-testing (or rigidity) refers to the fact that for certain Bell inequalities the maximal violation can be achieved in an essentially unique manner. In this work we present a family of Bell inequalities which are maximally violated by multiple inequivalent quantum realisations. We completely characterise the quantum realisations achieving the maximal violation and we show that each of them requires a maximally entangled state of two qubits. This implies the existence of a new, weak form of self-testing in which the maximal violation allows us to identify the state, but does not fully determine the measurements. From the geometric point of view the set of probability points that saturate the quantum bound is a line segment. We then focus on a particular member of the family and show that the self-testing statement is robust, i.e. that observing a non-maximal violation allows us to make a quantitative statement about the unknown state. To achieve this we present a new construction of extraction channels and analyse their performance. For completeness we provide two independent approaches: analytical and numerical. The noise robustness, i.e. the amount of white noise at which the bound becomes trivial, of the analytical bound is rather small (~0.06%), but the numerical method takes us into an experimentally-relevant regime (~5%). We conclude by investigating the amount of randomness that can be certified using these Bell violations. Perhaps surprisingly, we find that the qualitative behaviour resembles the behaviour of rigid inequalities like the Clauser-Horne-Shimony-Holt inequality. This shows that at least for some device-independent applications rigidity is not a necessary ingredient.
△ Less
Submitted 21 September, 2020; v1 submitted 1 October, 2019;
originally announced October 2019.
-
Self-testing quantum systems of arbitrary local dimension with minimal number of measurements
Authors:
Shubhayan Sarkar,
Debashis Saha,
Jędrzej Kaniewski,
Remigiusz Augusiak
Abstract:
Bell nonlocality as a resource for device independent certification schemes has been studied extensively in recent years. The strongest form of device independent certification is referred to as self-testing, which given a device certifies the promised quantum state as well as quantum measurements performed on it without any knowledge of the internal workings of the device. In spite of various res…
▽ More
Bell nonlocality as a resource for device independent certification schemes has been studied extensively in recent years. The strongest form of device independent certification is referred to as self-testing, which given a device certifies the promised quantum state as well as quantum measurements performed on it without any knowledge of the internal workings of the device. In spite of various results on self-testing protocols, it remains a highly nontrivial problem to propose a certification scheme of qudit-qudit entangled states based on violation of a single $d$-outcome Bell inequality. Here we address this problem and propose a self-testing protocol for the maximally entangled state of any local dimension using the minimum number of measurements possible, i.e., two per subsystem. Our self-testing result can be used to establish unbounded randomness expansion, $\log_2d$ perfect random bits, while it requires only one random bit to encode the measurement choice.
△ Less
Submitted 2 October, 2019; v1 submitted 27 September, 2019;
originally announced September 2019.
-
Incompatibility robustness of quantum measurements: a unified framework
Authors:
Sébastien Designolle,
Máté Farkas,
Jędrzej Kaniewski
Abstract:
In quantum mechanics performing a measurement is an invasive process which generally disturbs the system. Due to this phenomenon, there exist incompatible quantum measurements, i.e., measurements that cannot be simultaneously performed on a single copy of the system. It is then natural to ask what the most incompatible quantum measurements are. To answer this question, several measures have been p…
▽ More
In quantum mechanics performing a measurement is an invasive process which generally disturbs the system. Due to this phenomenon, there exist incompatible quantum measurements, i.e., measurements that cannot be simultaneously performed on a single copy of the system. It is then natural to ask what the most incompatible quantum measurements are. To answer this question, several measures have been proposed to quantify how incompatible a set of measurements is, however their properties are not well-understood. In this work, we develop a general framework that encompasses all the commonly used measures of incompatibility based on robustness to noise. Moreover, we propose several conditions that a measure of incompatibility should satisfy, and investigate whether the existing measures comply with them. We find that some of the widely used measures do not fulfil these basic requirements. We also show that when looking for the most incompatible pairs of measurements, we obtain different answers depending on the exact measure. For one of the measures, we analytically prove that projective measurements onto two mutually unbiased bases are among the most incompatible pairs in every dimension. However, for some of the remaining measures we find that some peculiar measurements turn out to be even more incompatible.
△ Less
Submitted 31 March, 2020; v1 submitted 2 June, 2019;
originally announced June 2019.
-
Robust self-testing of two-qubit states
Authors:
Tim Coopmans,
Jędrzej Kaniewski,
Christian Schaffner
Abstract:
It is well-known that observing nonlocal correlations allows us to draw conclusions about the quantum systems under consideration. In some cases this yields a characterisation which is essentially complete, a phenomenon known as self-testing. Self-testing becomes particularly interesting if we can make the statement robust, so that it can be applied to a real experimental setup. For the simplest s…
▽ More
It is well-known that observing nonlocal correlations allows us to draw conclusions about the quantum systems under consideration. In some cases this yields a characterisation which is essentially complete, a phenomenon known as self-testing. Self-testing becomes particularly interesting if we can make the statement robust, so that it can be applied to a real experimental setup. For the simplest self-testing scenarios the most robust bounds come from the method based on operator inequalities. In this work we elaborate on this idea and apply it to the family of tilted CHSH inequalities. These inequalities are maximally violated by partially entangled two-qubit states and our goal is to estimate the quality of the state based only on the observed violation. For these inequalities we have reached a candidate bound and while we have not been able to prove it analytically, we have gathered convincing numerical evidence that it holds. Our final contribution is a proof that in the usual formulation, the CHSH inequality only becomes a self-test when the violation exceeds a certain threshold. This shows that self-testing scenarios fall into two distinct classes depending on whether they exhibit such a threshold or not.
△ Less
Submitted 31 March, 2020; v1 submitted 3 February, 2019;
originally announced February 2019.
-
Maximal randomness from partially entangled states
Authors:
Erik Woodhead,
Jędrzej Kaniewski,
Boris Bourdoncle,
Alexia Salavrakos,
Joseph Bowles,
Antonio Acín,
Remigiusz Augusiak
Abstract:
We investigate how much randomness can be extracted from a generic partially entangled pure state of two qubits in a device-independent setting, where a Bell test is used to certify the correct functioning of the apparatus. For any such state, we first show that two bits of randomness are always attainable both if projective measurements are used to generate the randomness globally or if a nonproj…
▽ More
We investigate how much randomness can be extracted from a generic partially entangled pure state of two qubits in a device-independent setting, where a Bell test is used to certify the correct functioning of the apparatus. For any such state, we first show that two bits of randomness are always attainable both if projective measurements are used to generate the randomness globally or if a nonprojective measurement is used to generate the randomness locally. We then prove that the maximum amount of randomness that can be generated using nonprojective measurements globally is restricted to between approximately 3.58 and 3.96 bits. The upper limit rules out that a bound of four bits potentially obtainable with extremal qubit measurements can be attained. We point out this is a consequence of the fact that nonprojective qubit measurements with four outcomes can only be self-tested to a limited degree in a Bell experiment.
△ Less
Submitted 13 November, 2020; v1 submitted 21 January, 2019;
originally announced January 2019.
-
Self-testing entangled measurements in quantum networks
Authors:
Marc-Olivier Renou,
Jędrzej Kaniewski,
Nicolas Brunner
Abstract:
Self-testing refers to the possibility of characterizing an unknown quantum device based only on the observed statistics. Here we develop methods for self-testing entangled quantum measurements, a key element for quantum networks. Our approach is based on the natural assumption that separated physical sources in a network should be considered independent. This provides a natural formulation of the…
▽ More
Self-testing refers to the possibility of characterizing an unknown quantum device based only on the observed statistics. Here we develop methods for self-testing entangled quantum measurements, a key element for quantum networks. Our approach is based on the natural assumption that separated physical sources in a network should be considered independent. This provides a natural formulation of the problem of certifying entangled measurements. Considering the setup of entanglement swap**, we derive a robust self-test for the Bell-state measurement, tolerating noise levels up to 5%. We also discuss generalizations to other entangled measurements.
△ Less
Submitted 23 May, 2022; v1 submitted 13 July, 2018;
originally announced July 2018.
-
Maximal nonlocality from maximal entanglement and mutually unbiased bases, and self-testing of two-qutrit quantum systems
Authors:
Jędrzej Kaniewski,
Ivan Šupić,
Jordi Tura,
Flavio Baccari,
Alexia Salavrakos,
Remigiusz Augusiak
Abstract:
Bell inequalities are an important tool in device-independent quantum information processing because their violation can serve as a certificate of relevant quantum properties. Probably the best known example of a Bell inequality is due to Clauser, Horne, Shimony and Holt (CHSH), which is defined in the simplest scenario involving two dichotomic measurements and whose all key properties are well un…
▽ More
Bell inequalities are an important tool in device-independent quantum information processing because their violation can serve as a certificate of relevant quantum properties. Probably the best known example of a Bell inequality is due to Clauser, Horne, Shimony and Holt (CHSH), which is defined in the simplest scenario involving two dichotomic measurements and whose all key properties are well understood. There have been many attempts to generalise the CHSH Bell inequality to higher-dimensional quantum systems, however, for most of them the maximal quantum violation---the key quantity for most device-independent applications---remains unknown. On the other hand, the constructions for which the maximal quantum violation can be computed, do not preserve the natural property of the CHSH inequality, namely, that the maximal quantum violation is achieved by the maximally entangled state and measurements corresponding to mutually unbiased bases. In this work we propose a novel family of Bell inequalities which exhibit precisely these properties, and whose maximal quantum violation can be computed analytically. In the simplest scenario it recovers the CHSH Bell inequality. These inequalities involve $d$ measurements settings, each having $d$ outcomes for an arbitrary prime number $d\geq 3$. We then show that in the three-outcome case our Bell inequality can be used to self-test the maximally entangled state of two-qutrits and three mutually unbiased bases at each site. Yet, we demonstrate that in the case of more outcomes, their maximal violation does not allow for self-testing in the standard sense, which motivates the definition of a new weak form of self-testing. The ability to certify high-dimensional MUBs makes these inequalities attractive from the device-independent cryptography point of view.
△ Less
Submitted 21 October, 2019; v1 submitted 9 July, 2018;
originally announced July 2018.
-
Self-testing mutually unbiased bases in the prepare-and-measure scenario
Authors:
Máté Farkas,
Jędrzej Kaniewski
Abstract:
Mutually unbiased bases (MUBs) constitute the canonical example of incompatible quantum measurements. One standard application of MUBs is the task known as quantum random access code (QRAC), in which classical information is encoded in a quantum system, and later part of it is recovered by performing a quantum measurement. We analyse a specific class of QRACs, known as the $2^{d} \to 1$ QRAC, in w…
▽ More
Mutually unbiased bases (MUBs) constitute the canonical example of incompatible quantum measurements. One standard application of MUBs is the task known as quantum random access code (QRAC), in which classical information is encoded in a quantum system, and later part of it is recovered by performing a quantum measurement. We analyse a specific class of QRACs, known as the $2^{d} \to 1$ QRAC, in which two classical dits are encoded in a $d$-dimensional quantum system. It is known that among rank-1 projective measurements MUBs give the best performance. We show (for every $d$) that this cannot be improved by employing non-projective measurements. Moreover, we show that the optimal performance can only be achieved by measurements which are rank-1 projective and mutually unbiased. In other words, the $2^{d} \to 1$ QRAC is a self-test for a pair of MUBs in the prepare-and-measure scenario. To make the self-testing statement robust we propose measures which characterise how well a pair of (not necessarily projective) measurements satisfies the MUB conditions and show how to estimate these measures from the observed performance. Similarly, we derive explicit bounds on operational quantities like the incompatibility robustness or the amount of uncertainty generated by the uncharacterised measurements. For low dimensions the robustness of our bounds is comparable to that of currently available technology, which makes them relevant for existing experiments. Lastly, our results provide essential support for a recently proposed method for solving the long-standing existence problem of MUBs.
△ Less
Submitted 31 March, 2020; v1 submitted 1 March, 2018;
originally announced March 2018.
-
Self-testing quantum states and measurements in the prepare-and-measure scenario
Authors:
Armin Tavakoli,
Jędrzej Kaniewski,
Tamás Vértesi,
Denis Rosset,
Nicolas Brunner
Abstract:
The goal of self-testing is to characterize an a priori unknown quantum system based solely on measurement statistics, i.e. using an uncharacterized measurement device. Here we develop self-testing methods for quantum prepare-and-measure experiments, thus not necessarily relying on entanglement and/or violation of a Bell inequality. We present noise-robust techniques for self-testing sets of quant…
▽ More
The goal of self-testing is to characterize an a priori unknown quantum system based solely on measurement statistics, i.e. using an uncharacterized measurement device. Here we develop self-testing methods for quantum prepare-and-measure experiments, thus not necessarily relying on entanglement and/or violation of a Bell inequality. We present noise-robust techniques for self-testing sets of quantum states and measurements, assuming an upper bound on the Hilbert space dimension. We discuss in detail the case of a $2 \rightarrow 1$ random access code with qubits, for which we provide analytically optimal self-tests. The simplicity and noise robustness of our methods should make them directly applicable to experiments.
△ Less
Submitted 11 September, 2018; v1 submitted 25 January, 2018;
originally announced January 2018.
-
Geometry of the set of quantum correlations
Authors:
Koon Tong Goh,
Jędrzej Kaniewski,
Elie Wolfe,
Tamás Vértesi,
Xingyao Wu,
Yu Cai,
Yeong-Cherng Liang,
Valerio Scarani
Abstract:
It is well known that correlations predicted by quantum mechanics cannot be explained by any classical (local-realistic) theory. The relative strength of quantum and classical correlations is usually studied in the context of Bell inequalities, but this tells us little about the geometry of the quantum set of correlations. In other words, we do not have good intuition about what the quantum set ac…
▽ More
It is well known that correlations predicted by quantum mechanics cannot be explained by any classical (local-realistic) theory. The relative strength of quantum and classical correlations is usually studied in the context of Bell inequalities, but this tells us little about the geometry of the quantum set of correlations. In other words, we do not have good intuition about what the quantum set actually looks like. In this paper we study the geometry of the quantum set using standard tools from convex geometry. We find explicit examples of rather counter-intuitive features in the simplest non-trivial Bell scenario (two parties, two inputs and two outputs) and illustrate them using 2-dimensional slice plots. We also show that even more complex features appear in Bell scenarios with more inputs or more parties. Finally, we discuss the limitations that the geometry of the quantum set imposes on the task of self-testing.
△ Less
Submitted 7 February, 2018; v1 submitted 16 October, 2017;
originally announced October 2017.
-
Self-testing of binary observables based on commutation
Authors:
Jędrzej Kaniewski
Abstract:
We consider the problem of certifying binary observables based on a Bell inequality violation alone, a task known as self-testing of measurements. We introduce a family of commutation-based measures, which encode all the distinct arrangements of two projective observables on a qubit. These quantities by construction take into account the usual limitations of self-testing and since they are "weight…
▽ More
We consider the problem of certifying binary observables based on a Bell inequality violation alone, a task known as self-testing of measurements. We introduce a family of commutation-based measures, which encode all the distinct arrangements of two projective observables on a qubit. These quantities by construction take into account the usual limitations of self-testing and since they are "weighted" by the (reduced) state, they automatically deal with rank-deficient reduced density matrices. We show that these measures can be estimated from the observed Bell violation in several scenarios and the proofs rely only on standard linear algebra. The trade-offs turn out to be tight and, in particular, they give non-trivial statements for arbitrarily small violations. On the other extreme, observing the maximal violation allows us to deduce precisely the form of the observables, which immediately leads to a complete rigidity statement. In particular, we show that for all $n \geq 3$ the $n$-partite Mermin-Ardehali-Belinskii-Klyshko inequality self-tests the $n$-partite Greenberger-Horne-Zeilinger state and maximally incompatible qubit measurements on every party. Our results imply that any pair of projective observables on a qubit can be certified in a truly robust manner. Finally, we show that commutation-based measures give a convenient way of expressing relations among more than two observables.
△ Less
Submitted 12 September, 2017; v1 submitted 22 February, 2017;
originally announced February 2017.
-
Device-independence for two-party cryptography and position verification
Authors:
Jeremy Ribeiro,
Le Phuc Thinh,
Jedrzej Kaniewski,
Jonas Helsen,
Stephanie Wehner
Abstract:
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. U…
▽ More
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we give device-independent security proofs of two-party cryptography and Position Verification for memoryless devices under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation and we show that security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.
△ Less
Submitted 28 June, 2016;
originally announced June 2016.
-
Quantum preparation uncertainty and lack of information
Authors:
Filip Rozpędek,
Jędrzej Kaniewski,
Patrick J. Coles,
Stephanie Wehner
Abstract:
The quantum uncertainty principle famously predicts that there exist measurements that are inherently incompatible, in the sense that their outcomes cannot be predicted simultaneously. In contrast, no such uncertainty exists in the classical domain, where all uncertainty results from ignorance about the exact state of the physical system. Here, we critically examine the concept of preparation unce…
▽ More
The quantum uncertainty principle famously predicts that there exist measurements that are inherently incompatible, in the sense that their outcomes cannot be predicted simultaneously. In contrast, no such uncertainty exists in the classical domain, where all uncertainty results from ignorance about the exact state of the physical system. Here, we critically examine the concept of preparation uncertainty and ask whether similarly in the quantum regime, some of the uncertainty that we observe can actually also be understood as a lack of information (LOI), albeit a lack of quantum information. We answer this question affirmatively by showing that for the well known measurements employed in BB84 quantum key distribution, the amount of uncertainty can indeed be related to the amount of available information about additional registers determining the choice of the measurement. We proceed to show that also for other measurements the amount of uncertainty is in part connected to a LOI. Finally, we discuss the conceptual implications of our observation to the security of cryptographic protocols that make use of BB84 states.
△ Less
Submitted 23 February, 2017; v1 submitted 17 June, 2016;
originally announced June 2016.
-
Analytic and nearly optimal self-testing bounds for the Clauser-Horne-Shimony-Holt and Mermin inequalities
Authors:
Jędrzej Kaniewski
Abstract:
Self-testing refers to the phenomenon that certain extremal quantum correlations (almost) uniquely identify the quantum system under consideration. For instance observing the maximal violation of the CHSH inequality certifies that the two parties share a singlet. While self-testing results are known for several classes of states, in many cases they are only applicable if the observed statistics ar…
▽ More
Self-testing refers to the phenomenon that certain extremal quantum correlations (almost) uniquely identify the quantum system under consideration. For instance observing the maximal violation of the CHSH inequality certifies that the two parties share a singlet. While self-testing results are known for several classes of states, in many cases they are only applicable if the observed statistics are almost perfect, which makes them unsuitable for practical applications. Practically relevant self-testing bounds are much less common and moreover they all result from a single numerical method (with one exception which we discuss in detail). In this work we present a new technique for proving analytic self-testing bounds of practically relevant robustness. We obtain improved bounds for the case of self-testing the singlet using the CHSH inequality (in particular we show that non-trivial fidelity with the singlet can be achieved as long as the violation exceeds $β^{*} = (16 + 14 \sqrt{2})/17 \approx 2.11$). In case of self-testing the tripartite GHZ state using the Mermin inequality we derive a bound which not only improves on previously known results but turns out to be tight. We discuss other scenarios to which our technique can be immediately applied.
△ Less
Submitted 11 August, 2016; v1 submitted 27 April, 2016;
originally announced April 2016.
-
Device-independent two-party cryptography secure against sequential attacks
Authors:
Jędrzej Kaniewski,
Stephanie Wehner
Abstract:
The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we init…
▽ More
The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. Device-independent two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice's setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.
△ Less
Submitted 9 May, 2016; v1 submitted 25 January, 2016;
originally announced January 2016.
-
Relativistic quantum cryptography
Authors:
Jędrzej Kaniewski
Abstract:
In this thesis we explore the benefits of relativistic constraints for cryptography. We first revisit non-communicating models and its applications in the context of interactive proofs and cryptography. We propose bit commitment protocols whose security hinges on communication constraints and investigate its limitations. We explain how some non-communicating models can be justified by special rela…
▽ More
In this thesis we explore the benefits of relativistic constraints for cryptography. We first revisit non-communicating models and its applications in the context of interactive proofs and cryptography. We propose bit commitment protocols whose security hinges on communication constraints and investigate its limitations. We explain how some non-communicating models can be justified by special relativity and study the limitations of such models. In particular, we present a framework for analysing security of multiround relativistic protocols. The second part of the thesis is dedicated to analysing specific protocols. We start by considering a recently proposed two-round quantum bit commitment protocol. We propose a fault-tolerant variant of the protocol, present a complete security analysis and report on an experimental implementation performed in collaboration with an experimental group at the University of Geneva. We also propose a new, multiround classical bit commitment protocol and prove its security against classical adversaries. This demonstrates that in the classical world an arbitrarily long commitment can be achieved even if the agents are restricted to occupy a finite region of space. Moreover, the protocol is easy to implement and we report on an experiment performed in collaboration with the Geneva group.
△ Less
Submitted 2 December, 2015;
originally announced December 2015.
-
Understanding nature from experimental observations: a theory independent test for gravitational decoherence
Authors:
C. Pfister,
J. Kaniewski,
M. Tomamichel,
A. Mantri,
R. Schmucker,
N. McMahon,
G. Milburn,
S. Wehner
Abstract:
Quantum mechanics and the theory of gravity are presently not compatible. A particular question is whether gravity causes decoherence - an unavoidable source of noise. Several models for gravitational decoherence have been proposed, not all of which can be described quantum mechanically. In parallel, several experiments have been proposed to test some of these models, where the data obtained by su…
▽ More
Quantum mechanics and the theory of gravity are presently not compatible. A particular question is whether gravity causes decoherence - an unavoidable source of noise. Several models for gravitational decoherence have been proposed, not all of which can be described quantum mechanically. In parallel, several experiments have been proposed to test some of these models, where the data obtained by such experiments is analyzed assuming quantum mechanics. Since we may need to modify quantum mechanics to account for gravity, however, one may question the validity of using quantum mechanics as a calculational tool to draw conclusions from experiments concerning gravity.
Here we propose an experiment to estimate gravitational decoherence whose conclusions hold even if quantum mechanics would need to be modified. We first establish a general information-theoretic notion of decoherence which reduces to the standard measure within quantum mechanics. Second, drawing on ideas from quantum information, we propose a very general experiment that allows us to obtain a quantitative estimate of decoherence of any physical process for any physical theory satisfying only very mild conditions.Finally, we propose a concrete experiment using optomechanics to estimate gravitational decoherence in any such theory, including quantum mechanics as a special case.
Our work raises the interesting question whether other properties of nature could similarly be established from experimental observations alone - that is, without already having a rather well formed theory of nature like quantum mechanics to make sense of experimental data.
△ Less
Submitted 2 March, 2015;
originally announced March 2015.
-
Query complexity in expectation
Authors:
Jedrzej Kaniewski,
Troy Lee,
Ronald de Wolf
Abstract:
We study the query complexity of computing a function f:{0,1}^n-->R_+ in expectation. This requires the algorithm on input x to output a nonnegative random variable whose expectation equals f(x), using as few queries to the input x as possible. We exactly characterize both the randomized and the quantum query complexity by two polynomial degrees, the nonnegative literal degree and the sum-of-squar…
▽ More
We study the query complexity of computing a function f:{0,1}^n-->R_+ in expectation. This requires the algorithm on input x to output a nonnegative random variable whose expectation equals f(x), using as few queries to the input x as possible. We exactly characterize both the randomized and the quantum query complexity by two polynomial degrees, the nonnegative literal degree and the sum-of-squares degree, respectively. We observe that the quantum complexity can be unboundedly smaller than the classical complexity for some functions, but can be at most polynomially smaller for functions with range {0,1}.
These query complexities relate to (and are motivated by) the extension complexity of polytopes. The linear extension complexity of a polytope is characterized by the randomized communication complexity of computing its slack matrix in expectation, and the semidefinite (psd) extension complexity is characterized by the analogous quantum model. Since query complexity can be used to upper bound communication complexity of related functions, we can derive some upper bounds on psd extension complexity by constructing efficient quantum query algorithms. As an example we give an exponentially-close entrywise approximation of the slack matrix of the perfect matching polytope with psd-rank only 2^{n^{1/2+epsilon}}. Finally, we show there is a precise sense in which randomized/quantum query complexity in expectation corresponds to the Sherali-Adams and Lasserre hierarchies, respectively.
△ Less
Submitted 26 November, 2014;
originally announced November 2014.
-
Practical relativistic bit commitment
Authors:
Tommaso Lunghi,
Jędrzej Kaniewski,
Felix Bussieres,
Raphael Houlmann,
Marco Tomamichel,
Stephanie Wehner,
Hugo Zbinden
Abstract:
Bit commitment is a fundamental cryptographic primitive in which Alice wishes to commit a secret bit to Bob. Perfectly secure bit commitment between two mistrustful parties is impossible through asynchronous exchange of quantum information. Perfect security is however possible when Alice and Bob each split into several agents exchanging classical information at times and locations suitably chosen…
▽ More
Bit commitment is a fundamental cryptographic primitive in which Alice wishes to commit a secret bit to Bob. Perfectly secure bit commitment between two mistrustful parties is impossible through asynchronous exchange of quantum information. Perfect security is however possible when Alice and Bob each split into several agents exchanging classical information at times and locations suitably chosen to satisfy specific relativistic constraints. In this Letter we first revisit a previously proposed scheme that realizes bit commitment using only classical communication. We prove that the protocol is secure against quantum adversaries for a duration limited by the light-speed communication time between the locations of the agents. We then propose a novel multi-round scheme based on finite-field arithmetic that extends the commitment time beyond this limit, and we prove its security against classical attacks. Finally, we present an implementation of these protocols using dedicated hardware and we show how it could be used to realize commitments of duration ranging up to 212 milliseconds by agents occupying antipodal locations on the Earth.
△ Less
Submitted 24 June, 2015; v1 submitted 18 November, 2014;
originally announced November 2014.
-
Equivalence of wave-particle duality to entropic uncertainty
Authors:
Patrick J. Coles,
Jędrzej Kaniewski,
Stephanie Wehner
Abstract:
Interferometers capture a basic mystery of quantum mechanics: a single particle can exhibit wave behavior, yet that wave behavior disappears when one tries to determine the particle's path inside the interferometer. This idea has been formulated quantitively as an inequality, e.g., by Englert and Jaeger, Shimony, and Vaidman, which upper bounds the sum of the interference visibility and the path d…
▽ More
Interferometers capture a basic mystery of quantum mechanics: a single particle can exhibit wave behavior, yet that wave behavior disappears when one tries to determine the particle's path inside the interferometer. This idea has been formulated quantitively as an inequality, e.g., by Englert and Jaeger, Shimony, and Vaidman, which upper bounds the sum of the interference visibility and the path distinguishability. Such wave-particle duality relations (WPDRs) are often thought to be conceptually inequivalent to Heisenberg's uncertainty principle, although this has been debated. Here we show that WPDRs correspond precisely to a modern formulation of the uncertainty principle in terms of entropies, namely the min- and max-entropies. This observation unifies two fundamental concepts in quantum mechanics. Furthermore, it leads to a robust framework for deriving novel WPDRs by applying entropic uncertainty relations to interferometric models. As an illustration, we derive a novel relation that captures the coherence in a quantum beam splitter.
△ Less
Submitted 15 September, 2014; v1 submitted 19 March, 2014;
originally announced March 2014.
-
Entropic uncertainty from effective anti-commutators
Authors:
Jędrzej Kaniewski,
Marco Tomamichel,
Stephanie Wehner
Abstract:
We investigate entropic uncertainty relations for two or more binary measurements, for example spin-$\frac{1}{2}$ or polarisation measurements. We argue that the effective anti-commutators of these measurements, i.e. the anti-commutators evaluated on the state prior to measuring, are an expedient measure of measurement incompatibility. Based on the knowledge of pairwise effective anti-commutator…
▽ More
We investigate entropic uncertainty relations for two or more binary measurements, for example spin-$\frac{1}{2}$ or polarisation measurements. We argue that the effective anti-commutators of these measurements, i.e. the anti-commutators evaluated on the state prior to measuring, are an expedient measure of measurement incompatibility. Based on the knowledge of pairwise effective anti-commutators we derive a class of entropic uncertainty relations in terms of conditional Rényi entropies. Our uncertainty relations are formulated in terms of effective measures of incompatibility, which can be certified device-independently. Consequently, we discuss potential applications of our findings to device-independent quantum cryptography. Moreover, to investigate the tightness of our analysis we consider the simplest (and very well-studied) scenario of two measurements on a qubit. We find that our results outperform the celebrated bound due to Maassen and Uffink [Phys. Rev. Lett. 60, 1103 (1988)] and provide a new analytical expression for the minimum uncertainty which also outperforms some recent bounds based on majorisation.
△ Less
Submitted 23 February, 2014;
originally announced February 2014.
-
Experimental bit commitment based on quantum communication and special relativity
Authors:
T. Lunghi,
J. Kaniewski,
F. Bussieres,
R. Houlmann,
M. Tomamichel,
A. Kent,
N. Gisin,
S. Wehner,
H. Zbinden
Abstract:
Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit to Alice. Perfectly secure bit commitment has been proven impossible through asynchronous exchange of classical and quantum information. Perfect security is however possible by restraining the exchange of classical and quantum information to suitably chosen relativistic constraints. This requires A…
▽ More
Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit to Alice. Perfectly secure bit commitment has been proven impossible through asynchronous exchange of classical and quantum information. Perfect security is however possible by restraining the exchange of classical and quantum information to suitably chosen relativistic constraints. This requires Alice (and Bob) to split into two remote agents performing space-like separated classical communication, and in one agent exchanging quantum bits with the other party. The duration of the commitment is given by the distance between the two remote agents. The original protocol requires the quantum communication to happen at a precise location and time with respect to the classical communication. We show how the protocol can be modified to relax this constraint such that the quantum part of the protocol can be performed at any time before the actual commitment, making it much more practical. Finally, we present an experimental demonstration of this protocol realized with a commercial quantum key distribution system and with synchronized classical agents located in Geneva and Singapore, yielding a commitment time of 15 ms. Our work includes a complete security analysis, accounting for experimental imperfections (multi-photon emission, transmission loss, detector inefficiency and dark counts) and finite statistics.
△ Less
Submitted 19 July, 2013; v1 submitted 20 June, 2013;
originally announced June 2013.
-
A Monogamy-of-Entanglement Game With Applications to Device-Independent Quantum Cryptography
Authors:
Marco Tomamichel,
Serge Fehr,
Jędrzej Kaniewski,
Stephanie Wehner
Abstract:
We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement performed by a third party in a random basis on that system. Intuitively, by the uncertainty principle and the monogamy of entanglement, the probability that both players simultaneously succeed in guessing the outcome correctly is bounded. We are in…
▽ More
We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement performed by a third party in a random basis on that system. Intuitively, by the uncertainty principle and the monogamy of entanglement, the probability that both players simultaneously succeed in guessing the outcome correctly is bounded. We are interested in the question of how the success probability scales when many such games are performed in parallel. We show that any strategy that maximizes the probability to win every game individually is also optimal for the parallel repetition of the game. Our result implies that the optimal guessing probability can be achieved without the use of entanglement. We explore several applications of this result. First, we show that it implies security for standard BB84 quantum key distribution when the receiving party uses fully untrusted measurement devices, i.e. we show that BB84 is one-sided device independent. Second, we show how our result can be used to prove security of a one-round position-verification scheme. Finally, we generalize a well-known uncertainty relation for the guessing probability to quantum side information.
△ Less
Submitted 3 October, 2013; v1 submitted 16 October, 2012;
originally announced October 2012.
-
Secure bit commitment from relativistic constraints
Authors:
Jędrzej Kaniewski,
Marco Tomamichel,
Esther Hänggi,
Stephanie Wehner
Abstract:
We investigate two-party cryptographic protocols that are secure under assumptions motivated by physics, namely relativistic assumptions (no-signalling) and quantum mechanics. In particular, we discuss the security of bit commitment in so-called split models, i.e. models in which at least some of the parties are not allowed to communicate during certain phases of the protocol. We find the minima…
▽ More
We investigate two-party cryptographic protocols that are secure under assumptions motivated by physics, namely relativistic assumptions (no-signalling) and quantum mechanics. In particular, we discuss the security of bit commitment in so-called split models, i.e. models in which at least some of the parties are not allowed to communicate during certain phases of the protocol. We find the minimal splits that are necessary to evade the Mayers-Lo-Chau no-go argument and present protocols that achieve security in these split models. Furthermore, we introduce the notion of local versus global command, a subtle issue that arises when the split committer is required to delegate non-communicating agents to open the commitment. We argue that classical protocols are insecure under global command in the split model we consider. On the other hand, we provide a rigorous security proof in the global command model for Kent's quantum protocol [Kent 2011, Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes]. The proof employs two fundamental principles of modern physics, the no-signalling property of relativity and the uncertainty principle of quantum mechanics.
△ Less
Submitted 3 September, 2013; v1 submitted 8 June, 2012;
originally announced June 2012.