-
Generalised Kochen-Specker Theorem for Finite Non-Deterministic Outcome Assignments
Authors:
Ravishankar Ramanathan
Abstract:
The Kochen-Specker (KS) theorem is a cornerstone result in quantum foundations, establishing that quantum correlations in Hilbert spaces of dimension $d \geq 3$ cannot be explained by (consistent) hidden variable theories that assign a single deterministic outcome to each measurement. Specifically, there exist finite sets of vectors in these dimensions such that no non-contextual deterministic (…
▽ More
The Kochen-Specker (KS) theorem is a cornerstone result in quantum foundations, establishing that quantum correlations in Hilbert spaces of dimension $d \geq 3$ cannot be explained by (consistent) hidden variable theories that assign a single deterministic outcome to each measurement. Specifically, there exist finite sets of vectors in these dimensions such that no non-contextual deterministic ($\{0,1\}$) outcome assignment is possible obeying the rules of exclusivity and completeness - that the sum of value assignments to any $d$ mutually orthogonal vectors be equal to $1$. Another central result in quantum foundations is Gleason's theorem that justifies the Born rule as a mathematical consequence of the quantum formalism. The KS theorem can be seen as a consequence of Gleason's theorem and the logical compactness theorem. Notably, Gleason's theorem also indicates the existence of KS-type finite vector constructions to rule out other finite alphabet outcome assignments beyond the $\{0,1\}$ case. Here, we propose a generalisation of the KS theorem that rules out hidden variable theories with outcome assignments in the set $\{0, p, 1-p, 1\}$ for $p \in [0,1/d) \cup (1/d, 1/2]$. The case $p = 1/2$ is especially physically significant. We show that in this case the result rules out (consistent) hidden variable theories that are fundamentally binary, i.e., theories where each measurement has fundamentally at most two outcomes (in contrast to the single deterministic outcome per measurement ruled out by KS). We present a device-independent application of this generalised KS theorem by constructing a two-player non-local game for which a perfect quantum winning strategy exists (a Pseudo-telepathy game) while no perfect classical strategy exists even if the players are provided with additional no-signaling resources of PR-box type (with marginal probabilities in $\{0,1/2,1\}$).
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Test of the physical significance of Bell nonlocality
Authors:
Carlos Vieira,
Ravishankar Ramanathan,
Adán Cabello
Abstract:
The experimental violation of a Bell inequality implies that at least one of a set of assumptions fails in nature. However, existing tests are inconclusive about which of the assumptions is the one that fails. Here, we show that there are quantum correlations that cannot be simulated with hidden variables that allow the slightest free will (or, equivalently, that limit, even minimally, retrocausal…
▽ More
The experimental violation of a Bell inequality implies that at least one of a set of assumptions fails in nature. However, existing tests are inconclusive about which of the assumptions is the one that fails. Here, we show that there are quantum correlations that cannot be simulated with hidden variables that allow the slightest free will (or, equivalently, that limit, even minimally, retrocausal influences) or restrict, even minimally, actions at a distance. This result goes beyond Bell's theorem and demolishes the arguably most attractive motivation for considering hidden-variable theories with measurement dependence or actions at distance, namely, that simulating quantum correlations typically requires a small amount of these resources. We show that there is a feasible experiment that can discard any hidden-variable theory allowing for arbitrarily small free will and having arbitrarily small limitations to actions at a distance. The experiment involves two observers, each of them choosing between two measurements with $2^N$ outcomes. The larger $N$ for which a specific Bell-like inequality is violated, the larger the set of excluded hidden-variable theories. In the limit of $N$ tending to infinity, the only alternatives to the absence of hidden variables are complete superdeterminism or complete parameter dependence. We also explore the implications of this result for quantum information.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
Impossibility of bipartite full nonlocality, all-versus-nothing proofs, and pseudo-telepathy in small Bell scenarios
Authors:
Yuan Liu,
Ho Yiu Chung,
Emmanuel Zambrini Cruzeiro,
Junior R. Gonzales-Ureta,
Ravishankar Ramanathan,
Adán Cabello
Abstract:
We show that the following statements are equivalent: (i) A quantum correlation p is in a face of the nonsignaling polytope that does not contain local points. (ii) p has local fraction zero; i.e., p has full nonlocality (FN). (iii) p provides an all-versus-nothing (AVN) or Greenberger-Horne-Zeilinger-like proof of nonlocality. (iv) p is a pseudo telepathy (PT) strategy. These connections imply th…
▽ More
We show that the following statements are equivalent: (i) A quantum correlation p is in a face of the nonsignaling polytope that does not contain local points. (ii) p has local fraction zero; i.e., p has full nonlocality (FN). (iii) p provides an all-versus-nothing (AVN) or Greenberger-Horne-Zeilinger-like proof of nonlocality. (iv) p is a pseudo telepathy (PT) strategy. These connections imply that a long-standing question posed by Gisin, Méthot, and Scarani of whether quantum PT is possible with minimal requirements is fundamental for quantum information, quantum computation, and foundations of quantum mechanics, and can be addressed by a variety of strategies. Here, by combining different methods, we show that the answer is negative: according to quantum mechanics, nature does not allow for FN/AVN/PT in the (3,3;3,2) Bell scenario. Moreover, we show that FN/AVN/PT is also impossible in (3,2;3,4). We also study (3,3;3,3) and found no example of FN/AVN/PT. We discuss the implications of these results and further applications of the methods presented.
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
(Almost-)Quantum Bell Inequalities and Device-Independent Applications
Authors:
Yuan Liu,
Ho Yiu Chung,
Ravishankar Ramanathan
Abstract:
Investigations of the boundary of the quantum correlation set through the derivation of quantum Bell inequalities have gained increased attention in recent years, which are related to Tsirelson's problem and have significant applications in DI information processing. However, determining quantum Bell inequalities is a notoriously difficult task and only isolated examples are known. In this paper,…
▽ More
Investigations of the boundary of the quantum correlation set through the derivation of quantum Bell inequalities have gained increased attention in recent years, which are related to Tsirelson's problem and have significant applications in DI information processing. However, determining quantum Bell inequalities is a notoriously difficult task and only isolated examples are known. In this paper, we present families of (almost-)quantum Bell inequalities and highlight three foundational and DI applications. Firstly, quantum correlations on the non-signaling boundary are crucial in the DI randomness extraction from weak sources. In the practical Bell scenario of two players with two k-outcome measurements, we derive quantum Bell inequalities that show a separation of the quantum boundary from nonlocal faces of the non-signaling polytope of dimension $\leq 4k-4$, extending previous results. As an immediate by-product of this, we give a general proof of Aumann's Agreement theorem for quantum systems and the almost-quantum correlations, which implies Aumann's agreement theorem is a reasonable physical principle in the context of epistemics to pick out both quantum theory and almost-quantum correlations from general no-signaling theories. Secondly, we present a family of quantum Bell inequalities in the two players with m binary measurements scenarios, that serve to self-test the two-qubit singlet and 2m measurements. Interestingly, this claim generalizes the result for m=2 discovered by Tsirelson-Landau-Masanes and shows an improvement over the state-of-the-art DIRA. Lastly, we use our quantum Bell inequalities to derive the general form of the principle of no advantage in nonlocal computation, which is an information-theoretic principle that serves to characterize the quantum correlation set. With this, we provide the most precise characterization of the quantum boundary known so far.
△ Less
Submitted 18 March, 2024; v1 submitted 12 September, 2023;
originally announced September 2023.
-
Unbounded Quantum Advantage in One-Way Strong Communication Complexity of a Distributed Clique Labelling Relation
Authors:
Sumit Rout,
Nitica Sakharwade,
Some Sankar Bhattacharya,
Ravishankar Ramanathan,
Paweł Horodecki
Abstract:
We investigate the one-way zero-error classical and quantum communication complexities for a class of relations induced by a distributed clique labelling problem. We consider two variants: 1) the receiver outputs an answer satisfying the relation - the traditional communication complexity of relations (CCR) and 2) the receiver has non-zero probabilities of outputting every valid answer satisfying…
▽ More
We investigate the one-way zero-error classical and quantum communication complexities for a class of relations induced by a distributed clique labelling problem. We consider two variants: 1) the receiver outputs an answer satisfying the relation - the traditional communication complexity of relations (CCR) and 2) the receiver has non-zero probabilities of outputting every valid answer satisfying the relation (equivalently, the relation can be fully reconstructed), that we denote the strong communication complexity of the relation (S-CCR). We prove that for the specific class of relations considered here when the players do not share any resources, there is no quantum advantage in the CCR task for any graph. On the other hand, we show that there exist, classes of graphs for which the separation between one-way classical and quantum communication in the S-CCR task grow with the order of the graph $m$, specifically, the quantum complexity is $O(1)$ while the classical complexity is $Ω(\log m)$. Secondly, we prove a lower bound (that is linear in the number of cliques) on the amount of shared randomness necessary to overcome the separation in the scenario of fixed restricted communication and connect this to the existence of Orthogonal Arrays. Finally, we highlight some applications of this task to semi-device-independent dimension witnessing as well as to the detection of Mutually Unbiased Bases.
△ Less
Submitted 26 July, 2023; v1 submitted 17 May, 2023;
originally announced May 2023.
-
Finite Device-Independent Extraction of a Block Min-Entropy Source against Quantum Adversaries
Authors:
Ravishankar Ramanathan
Abstract:
The extraction of randomness from weakly random seeds is a problem of central importance with multiple applications. In the device-independent setting, this problem of quantum randomness amplification has been mainly restricted to specific weak sources of Santha-Vazirani type, while extraction from the general min-entropy sources has required a large number of separated devices which is impractica…
▽ More
The extraction of randomness from weakly random seeds is a problem of central importance with multiple applications. In the device-independent setting, this problem of quantum randomness amplification has been mainly restricted to specific weak sources of Santha-Vazirani type, while extraction from the general min-entropy sources has required a large number of separated devices which is impractical. In this paper, we present a device-independent protocol for amplification of a single min-entropy source (consisting of two blocks of sufficiently high min-entropy) using a device consisting of two spatially separated components and show a proof of its security against general quantum adversaries.
△ Less
Submitted 19 April, 2023;
originally announced April 2023.
-
Optimal Measurement Structures for Contextuality Applications
Authors:
Yuan Liu,
Ravishankar Ramanathan,
Karol Horodecki,
Monika Rosicka,
Paweł Horodecki
Abstract:
The Kochen-Specker (KS) theorem is a corner-stone result in the foundations of quantum mechanics describing the fundamental difference between quantum theory and classical non-contextual theories. Recently specific substructures termed $01$-gadgets were shown to exist within KS proofs that capture the essential contradiction of the theorem. Here, we show these gadgets and their generalizations pro…
▽ More
The Kochen-Specker (KS) theorem is a corner-stone result in the foundations of quantum mechanics describing the fundamental difference between quantum theory and classical non-contextual theories. Recently specific substructures termed $01$-gadgets were shown to exist within KS proofs that capture the essential contradiction of the theorem. Here, we show these gadgets and their generalizations provide an optimal toolbox for contextuality applications including (i) constructing classical channels exhibiting entanglement-assisted advantage in zero-error communication, (ii) identifying large separations between quantum theory and binary generalised probabilistic theories, and (iii) finding optimal tests for contextuality-based semi-device-independent randomness generation. Furthermore, we introduce and study a generalisation to definite prediction sets for more general logical propositions, that we term higher-order gadgets. We pinpoint the role these higher-order gadgets play in KS proofs by identifying these as induced subgraphs within KS graphs and showing how to construct proofs of state-independent contextuality using higher-order gadgets as building blocks. The constructions developed here may help in solving some of the remaining open problems regarding minimal proofs of the Kochen-Specker theorem.
△ Less
Submitted 19 April, 2023; v1 submitted 27 June, 2022;
originally announced June 2022.
-
The rank of contextuality
Authors:
Karol Horodecki,
**gfang Zhou,
Maciej Stankiewicz,
Roberto Salazar,
Paweł Horodecki,
Robert Raussendorf,
Ryszard Horodecki,
Ravishankar Ramanathan,
Emily Tyhurst
Abstract:
Quantum contextuality is one of the most recognized resources in quantum communication and computing scenarios. We provide a new quantifier of this resource, the rank of contextuality (RC). We define RC as the minimum number of non-contextual behaviors that are needed to simulate a contextual behavior. We show that the logarithm of RC is a natural contextuality measure satisfying several propertie…
▽ More
Quantum contextuality is one of the most recognized resources in quantum communication and computing scenarios. We provide a new quantifier of this resource, the rank of contextuality (RC). We define RC as the minimum number of non-contextual behaviors that are needed to simulate a contextual behavior. We show that the logarithm of RC is a natural contextuality measure satisfying several properties considered in the spirit of the resource-theoretic approach. The properties include faithfulness, monotonicity, and additivity under tensor product. We also give examples of how to construct contextual behaviors with an arbitrary value of RC exhibiting a natural connection between this quantifier and the arboricity of an underlying hypergraph. We also discuss exemplary areas of research in which the new measure appears as a natural quantifier.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
Multipartite channel assemblages
Authors:
Michał Banacki,
Ravishankar Ramanathan,
Paweł Horodecki
Abstract:
Motivated by the recent studies on post-quantum steering, we generalize the notion of bipartite channel steering by introducing the concept of multipartite no-signaling channel assemblages. We first show that beyond the bipartite case, the no-signaling and quantum descriptions of channel assemblages do not coincide. Using the Choi-Jamiołkowski isomorphism, we present a complete characterization of…
▽ More
Motivated by the recent studies on post-quantum steering, we generalize the notion of bipartite channel steering by introducing the concept of multipartite no-signaling channel assemblages. We first show that beyond the bipartite case, the no-signaling and quantum descriptions of channel assemblages do not coincide. Using the Choi-Jamiołkowski isomorphism, we present a complete characterization of these classes of assemblages and use this characterization to provide sufficient conditions for extremality of quantum channel assemblages within the set of all no-signaling channel assemblages. Finally, we introduce and discuss a relaxed version of channel steering where only certain subsystems obey the no-signaling constraints. In this latter asymmetric scenario we show the possibility of certifying a perfect key bit that is secure against a general no-signaling eavesdropper.
△ Less
Submitted 22 September, 2022; v1 submitted 10 May, 2022;
originally announced May 2022.
-
Tilted Hardy paradoxes for device-independent randomness extraction
Authors:
Shuai Zhao,
Ravishankar Ramanathan,
Yuan Liu,
Paweł Horodecki
Abstract:
The device-independent paradigm has had spectacular successes in randomness generation, key distribution and self-testing, however most of these results have been obtained under the assumption that parties hold trusted and private random seeds. In efforts to relax the assumption of measurement independence, Hardy's non-locality tests have been proposed as ideal candidates. In this paper, we introd…
▽ More
The device-independent paradigm has had spectacular successes in randomness generation, key distribution and self-testing, however most of these results have been obtained under the assumption that parties hold trusted and private random seeds. In efforts to relax the assumption of measurement independence, Hardy's non-locality tests have been proposed as ideal candidates. In this paper, we introduce a family of tilted Hardy paradoxes that allow to self-test general pure two-qubit entangled states, as well as certify up to $1$ bit of local randomness. We then use these tilted Hardy tests to obtain an improvement in the generation rate in the state-of-the-art randomness amplification protocols for Santha-Vazirani (SV) sources with arbitrarily limited measurement independence. Our result shows that device-independent randomness amplification is possible for arbitrarily biased SV sources and from almost separable states. Finally, we introduce a family of Hardy tests for maximally entangled states of local dimension $4, 8$ as the potential candidates for DI randomness extraction to certify up to the maximum possible $2 \log d$ bits of global randomness.
△ Less
Submitted 12 September, 2023; v1 submitted 5 May, 2022;
originally announced May 2022.
-
No-signaling-proof randomness extraction from public weak sources
Authors:
Ravishankar Ramanathan,
Michał Banacki,
Paweł Horodecki
Abstract:
The extraction of randomness from weakly random seeds is a topic of central importance in cryptography. Weak sources of randomness can be considered to be either private or public, where public sources such as the NIST randomness beacon broadcast the random bits once they are generated. The problem of device-independent randomness extraction from weak public sources against no-signalling adversari…
▽ More
The extraction of randomness from weakly random seeds is a topic of central importance in cryptography. Weak sources of randomness can be considered to be either private or public, where public sources such as the NIST randomness beacon broadcast the random bits once they are generated. The problem of device-independent randomness extraction from weak public sources against no-signalling adversaries has remained open. In this paper, we show protocols for device-independent and one-sided device-independent amplification of randomness from weak public Santha Vazirani (SV) sources that use a finite number of devices and are secure against no-signaling adversaries. Specifically, under the assumption that the device behavior is as prescribed by quantum mechanics the protocols allow for amplification of public $ε$-SV sources for arbitrary initial $ε\in [0,0.5)$. On the other hand, when only the assumption of no-signaling between the components of the device is made, the protocols allow for amplification of a limited set of weak public SV sources.
△ Less
Submitted 28 September, 2021; v1 submitted 19 August, 2021;
originally announced August 2021.
-
Hybrid no-signaling-quantum correlations
Authors:
Michał Banacki,
Piotr Mironowicz,
Ravishankar Ramanathan,
Paweł Horodecki
Abstract:
Fundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local corre…
▽ More
Fundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term $\textbf{HNSQ}$ in the multi-party Bell scenario where some subsystems are locally quantum while the remaining subsystems are only constrained by the no-signaling principle. Specifically, the set $\textbf{HNSQ}$ is a super-quantum set of correlations derived from no-signaling assemblages by performing quantum measurements on the trusted subsystems. As a tool for optimization over the set $\textbf{HNSQ}$, we introduce an outer hierarchy of semi-definite programming approximations to the set following an approach put forward by Doherty-Parillo-Spedalieri. We then show that in contrast to the set $\textbf{NS}$ of no-signaling correlations, there exist extreme points of $\textbf{HNSQ}$ in the tripartite Bell scenario that admit quantum realization. We perform an extensive numerical analysis of the maximal violation of the facet Bell inequalities in the three-party binary input-output scenario and study the corresponding self-testing properties. In contrast to the usual no-signaling correlations, the new set allows for simple security proofs of (one-sided)-device-independent applications against super-quantum adversaries.
△ Less
Submitted 16 May, 2022; v1 submitted 14 July, 2021;
originally announced July 2021.
-
Large violations in Kochen Specker contextuality and their applications
Authors:
Ravishankar Ramanathan,
Yuan Liu,
Paweł Horodecki
Abstract:
The Kochen-Specker (KS) theorem is a fundamental result in quantum foundations that has spawned massive interest since its inception. We present state-independent non-contextuality inequalities with large violations, in particular, we exploit a connection between Kochen-Specker proofs and pseudo-telepathy games to show KS proofs in Hilbert spaces of dimension $d \geq 2^{17}$ with the ratio of quan…
▽ More
The Kochen-Specker (KS) theorem is a fundamental result in quantum foundations that has spawned massive interest since its inception. We present state-independent non-contextuality inequalities with large violations, in particular, we exploit a connection between Kochen-Specker proofs and pseudo-telepathy games to show KS proofs in Hilbert spaces of dimension $d \geq 2^{17}$ with the ratio of quantum value to classical bias being $O(\sqrt{d}/\log d)$. We study the properties of this KS set and show applications of the large violation. It has been recently shown that Kochen-Specker proofs always consist of substructures of state-dependent contextuality proofs called $01$-gadgets or bugs. We show a one-to-one connection between $01$-gadgets in $\mathbb{C}^d$ and Hardy paradoxes for the maximally entangled state in $\mathbb{C}^d \otimes \mathbb{C}^d$. We use this connection to construct large violation $01$-gadgets between arbitrary vectors in $\mathbb{C}^d$, as well as novel Hardy paradoxes for the maximally entangled state in $\mathbb{C}^d \otimes \mathbb{C}^d$, and give applications of these constructions. As a technical result, we show that the minimum dimension of the faithful orthogonal representation of a graph in $\mathbb{R}^d$ is not a graph monotone, a result that that may be of independent interest.
△ Less
Submitted 1 July, 2021; v1 submitted 30 June, 2021;
originally announced June 2021.
-
Single trusted qubit is necessary and sufficient for quantum realisation of extremal no-signaling correlations
Authors:
Ravishankar Ramanathan,
Michał Banacki,
Ricard Ravell Rodríguez,
Paweł Horodecki
Abstract:
Quantum statistics can be considered from the perspective of postquantum no-signaling theories in which either none or only a certain number of quantum systems are trusted. In these scenarios, the role of states is played by the so-called no-signaling boxes or no-signaling assemblages respectively. It has been shown so far that in the usual Bell non-locality scenario with a single measurement run,…
▽ More
Quantum statistics can be considered from the perspective of postquantum no-signaling theories in which either none or only a certain number of quantum systems are trusted. In these scenarios, the role of states is played by the so-called no-signaling boxes or no-signaling assemblages respectively. It has been shown so far that in the usual Bell non-locality scenario with a single measurement run, quantum statistics can never reproduce an extremal non-local point within the set of no-signaling boxes. We provide here a general no-go rule showing that the latter stays true even if arbitrary sequential measurements are allowed. On the other hand, we prove a positive result showing that already a single trusted qubit is enough for quantum theory to produce a self-testable extremal point within the corresponding set of no-signaling assemblages. This result opens up the possibility for security proofs of cryptographic protocols against general no-signaling adversaries.
△ Less
Submitted 17 May, 2022; v1 submitted 30 April, 2020;
originally announced April 2020.
-
All two-party facet Bell inequalities are violated by Almost Quantum correlations
Authors:
Ravishankar Ramanathan
Abstract:
The characterization of the set of quantum correlations is a problem of fundamental importance in quantum information. The question whether every proper (tight) Bell inequality is violated in Quantum theory is an intriguing one in this regard. Here, we make significant progress in answering this question, by showing that every tight Bell inequality is violated by 'Almost Quantum' correlations, a s…
▽ More
The characterization of the set of quantum correlations is a problem of fundamental importance in quantum information. The question whether every proper (tight) Bell inequality is violated in Quantum theory is an intriguing one in this regard. Here, we make significant progress in answering this question, by showing that every tight Bell inequality is violated by 'Almost Quantum' correlations, a semi-definite programming relaxation of the set of quantum correlations. As a consequence, we show that many (classes of) Bell inequalities including two-party correlation Bell inequalities and multi-outcome non-local computation games, that do not admit quantum violations, are not facets of the classical Bell polytope. To do this, we make use of the intriguing connections between Bell correlations and the graph-theoretic Lovász-theta set, discovered by Cabello-Severini-Winter (CSW). We also exploit connections between the cut polytope of graph theory and the classical correlation Bell polytope, to show that correlation Bell inequalities that define facets of the lower dimensional correlation polytope are violated in quantum theory. The methods also enable us to derive novel (almost) quantum Bell inequalities, which may be of independent interest for self-testing applications.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Practical No-Signalling proof Randomness Amplification using Hardy paradoxes and its experimental implementation
Authors:
Ravishankar Ramanathan,
Michał Horodecki,
Hammad Anwer,
Stefano Pironio,
Karol Horodecki,
Marcus Grünfeld,
Sadiq Muhammad,
Mohamed Bourennane,
Paweł Horodecki
Abstract:
Device-Independent (DI) security is the best form of quantum cryptography, providing information-theoretic security based on the very laws of nature. In its highest form, security is guaranteed against adversaries limited only by the no-superluminal signalling rule of relativity. The task of randomness amplification, to generate secure fully uniform bits starting from weakly random seeds, is of bo…
▽ More
Device-Independent (DI) security is the best form of quantum cryptography, providing information-theoretic security based on the very laws of nature. In its highest form, security is guaranteed against adversaries limited only by the no-superluminal signalling rule of relativity. The task of randomness amplification, to generate secure fully uniform bits starting from weakly random seeds, is of both cryptographic and foundational interest, being important for the generation of cryptographically secure random numbers as well as bringing deep connections to the existence of free-will. DI no-signalling proof protocols for this fundamental task have thus far relied on esoteric proofs of non-locality termed pseudo-telepathy games, complicated multi-party setups or high-dimensional quantum systems, and have remained out of reach of experimental implementation. In this paper, we construct the first practically relevant no-signalling proof DI protocols for randomness amplification based on the simplest proofs of Bell non-locality and illustrate them with an experimental implementation in a quantum optical setup using polarised photons. Technically, we relate the problem to the vast field of Hardy paradoxes, without which it would be impossible to achieve amplification of arbitrarily weak sources in the simplest Bell non-locality scenario consisting of two parties choosing between two binary inputs. Furthermore, we identify a deep connection between proofs of the celebrated Kochen-Specker theorem and Hardy paradoxes that enables us to construct Hardy paradoxes with the non-zero probability taking any value in $(0,1]$. Our methods enable us, under the fair-sampling assumption of the experiment, to realize up to $25$ bits of randomness in $20$ hours of experimental data collection from an initial private source of randomness $0.1$ away from uniform.
△ Less
Submitted 23 September, 2020; v1 submitted 27 October, 2018;
originally announced October 2018.
-
Complete extension: the non-signaling analog of quantum purification
Authors:
Marek Winczewski,
Tamoghna Das,
John H. Selby,
Karol Horodecki,
Paweł Horodecki,
Łukasz Pankowski,
Marco Piani,
Ravishankar Ramanathan
Abstract:
Deriving quantum mechanics from information-theoretic postulates is a recent research direction taken, in part, with the view of finding a beyond-quantum theory; once the postulates are clear, we can consider modifications to them. A key postulate is the purification postulate, which we propose to replace by a more generally applicable postulate that we call the complete extension postulate (CEP),…
▽ More
Deriving quantum mechanics from information-theoretic postulates is a recent research direction taken, in part, with the view of finding a beyond-quantum theory; once the postulates are clear, we can consider modifications to them. A key postulate is the purification postulate, which we propose to replace by a more generally applicable postulate that we call the complete extension postulate (CEP), i.e., the existence of an extension of a physical system from which one can generate any other extension. This new concept leads to a plethora of open questions and research directions in the study of general theories satisfying the CEP (which may include a theory that hyper-decoheres to quantum theory). For example, we show that the CEP implies the impossibility of bit-commitment. This is exemplified by a case study of the theory of non-signalling behaviors which we show satisfies the CEP. We moreover show that in certain cases the complete extension will not be pure, highlighting the key divergence from the purification postulate.
△ Less
Submitted 25 October, 2023; v1 submitted 4 October, 2018;
originally announced October 2018.
-
Gadget structures in proofs of the Kochen-Specker theorem
Authors:
Ravishankar Ramanathan,
Monika Rosicka,
Karol Horodecki,
Stefano Pironio,
Michał Horodecki,
Paweł Horodecki
Abstract:
The Kochen-Specker theorem is a fundamental result in quantum foundations that has spawned massive interest since its inception. We show that within every Kochen-Specker graph, there exist interesting subgraphs which we term $01$-gadgets, that capture the essential contradiction necessary to prove the Kochen-Specker theorem, i.e,. every Kochen-Specker graph contains a $01$-gadget and from every…
▽ More
The Kochen-Specker theorem is a fundamental result in quantum foundations that has spawned massive interest since its inception. We show that within every Kochen-Specker graph, there exist interesting subgraphs which we term $01$-gadgets, that capture the essential contradiction necessary to prove the Kochen-Specker theorem, i.e,. every Kochen-Specker graph contains a $01$-gadget and from every $01$-gadget one can construct a proof of the Kochen-Specker theorem. Moreover, we show that the $01$-gadgets form a fundamental primitive that can be used to formulate state-independent and state-dependent statistical Kochen-Specker arguments as well as to give simple constructive proofs of an "extended" Kochen-Specker theorem first considered by Pitowsky.
△ Less
Submitted 10 August, 2020; v1 submitted 29 June, 2018;
originally announced July 2018.
-
Quantum violations in the Instrumental scenario and their relations to the Bell scenario
Authors:
Thomas Van Himbeeck,
Jonatan Bohr Brask,
Stefano Pironio,
Ravishankar Ramanathan,
Ana Belén Sainz,
Elie Wolfe
Abstract:
The causal structure of any experiment implies restrictions on the observable correlations between measurement outcomes, which are different for experiments exploiting classical, quantum, or post-quantum resources. In the study of Bell nonlocality, these differences have been explored in great detail for more and more involved causal structures. Here, we go in the opposite direction and identify t…
▽ More
The causal structure of any experiment implies restrictions on the observable correlations between measurement outcomes, which are different for experiments exploiting classical, quantum, or post-quantum resources. In the study of Bell nonlocality, these differences have been explored in great detail for more and more involved causal structures. Here, we go in the opposite direction and identify the simplest causal structure which exhibits a separation between classical, quantum, and post-quantum correlations. It arises in the so-called Instrumental scenario, known from classical causal models. We derive inequalities for this scenario and show that they are closely related to well-known Bell inequalities, such as the Clauser-Horne-Shimony-Holt inequality, which enables us to easily identify their classical, quantum, and post-quantum bounds as well as strategies violating the first two. The relations that we uncover imply that the quantum or post-quantum advantages witnessed by the violation of our Instrumental inequalities are not fundamentally different from those witnessed by the violations of standard inequalities in the usual Bell scenario. However, non-classical tests in the Instrumental scenario require fewer input choices than their Bell scenario counterpart, which may have potential implications for device-independent protocols.
△ Less
Submitted 9 September, 2019; v1 submitted 11 April, 2018;
originally announced April 2018.
-
Bell monogamy relations in arbitrary qubit networks
Authors:
Minh Cong Tran,
Ravishankar Ramanathan,
Matthew McKague,
Dagomir Kaszlikowski,
Tomasz Paterek
Abstract:
Characterizing trade-offs between simultaneous violations of multiple Bell inequalities in a large network of qubits is computationally demanding. We propose a graph-theoretic approach to efficiently produce Bell monogamy relations in arbitrary arrangements of qubits. All the relations obtained for bipartite Bell inequalities are tight and leverage only a single Bell monogamy relation. This featur…
▽ More
Characterizing trade-offs between simultaneous violations of multiple Bell inequalities in a large network of qubits is computationally demanding. We propose a graph-theoretic approach to efficiently produce Bell monogamy relations in arbitrary arrangements of qubits. All the relations obtained for bipartite Bell inequalities are tight and leverage only a single Bell monogamy relation. This feature is unique to bipartite Bell inequalities, as we show that there is no finite set of such elementary monogamy relations for multipartite inequalities. Nevertheless, many tight monogamy relations for multipartite inequalities can be obtained with our method as shown in explicit examples.
△ Less
Submitted 20 November, 2018; v1 submitted 9 January, 2018;
originally announced January 2018.
-
A No-go theorem for device-independent security in relativistic causal theories
Authors:
Roberto Salazar,
Michał Kamon,
Dardo Goyeneche,
Karol Horodecki,
Debashis Saha,
Ravishankar Ramanathan,
Paweł Horodecki
Abstract:
A crucial task for secure communication networks is to determine the minimum of physical requirements to certify a cryptographic protocol. A widely accepted candidate for certification is the principle of relativistic causality which is equivalent to the disallowance of causal loops. Contrary to expectations, we demonstrate how correlations allowed by relativistic causality could be exploited to b…
▽ More
A crucial task for secure communication networks is to determine the minimum of physical requirements to certify a cryptographic protocol. A widely accepted candidate for certification is the principle of relativistic causality which is equivalent to the disallowance of causal loops. Contrary to expectations, we demonstrate how correlations allowed by relativistic causality could be exploited to break security for a broad class of multi-party protocols (all modern protocols belong to this class). As we show, deep roots of this dramatic lack of security lies in the fact that unlike in previous (quantum or no-signaling) scenarios the new theory "decouples" the property of extremality and that of statistical independence on environment variables. Finally, we find out, that the lack of security is accompanied by some advantage: the new correlations can reduce communication complexity better than the no-signaling ones. As a tool for analysis of this advantage, we characterize relativistic causal polytope by its extremal points in the simplest multi-party scenario that goes beyond the no-signaling paradigm.
△ Less
Submitted 27 September, 2020; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Trade-offs in multi-party Bell inequality violations in qubit networks
Authors:
Ravishankar Ramanathan,
Piotr Mironowicz
Abstract:
Two overlap** bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms…
▽ More
Two overlap** bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms of monogamies that allow for violations of a few inequalities at once. Here we systematically study monogamy relations between correlation Bell inequalities both within quantum theory and under the sole assumption of no signalling. We first investigate the trade-offs in Bell violations arising from the uncertainty relation for complementary binary observables, and exhibit several network configurations in which a tight trade-off arises in this fashion. We then derive a tight trade-off relation which cannot be obtained from the uncertainty relation showing that it does not capture monogamy entirely. The results are extended to Bell inequalities involving different number of parties and find applications in device-independent secret sharing and device-independent randomness extraction. Although two multipartite Bell inequalities may be violated simultaneously, we show that genuine multi-party non-locality, as evidenced by a generalised Svetlichny inequality, does exhibit monogamy property. Finally, using the relations derived we reveal the existence of flat regions in the set of quantum correlations.
△ Less
Submitted 12 April, 2017;
originally announced April 2017.
-
Measurement uncertainty from no-signaling and non-locality
Authors:
Justyna Łodyga,
Waldemar Kłobus,
Ravishankar Ramanathan,
Andrzej Grudka,
Michał Horodecki,
Ryszard Horodecki
Abstract:
One of the formulations of Heisenberg uncertainty principle, concerning so-called measurement uncertainty, states that the measurement of one observable modifies the statistics of the other. Here, we derive such a measurement uncertainty principle from two comprehensible assumptions: impossibility of instantaneous messaging at a distance (no-signaling), and violation of Bell inequalities (non-loca…
▽ More
One of the formulations of Heisenberg uncertainty principle, concerning so-called measurement uncertainty, states that the measurement of one observable modifies the statistics of the other. Here, we derive such a measurement uncertainty principle from two comprehensible assumptions: impossibility of instantaneous messaging at a distance (no-signaling), and violation of Bell inequalities (non-locality). The uncertainty is established for a pair of observables of one of two spatially separated systems that exhibit non-local correlations. To this end, we introduce a gentle form of measurement which acquires partial information about one of the observables. We then bound disturbance of the remaining observables by the amount of information gained from the gentle measurement, minus a correction depending on the degree of non-locality. The obtained quantitative expression resembles the quantum mechanical formulations, yet it is derived without the quantum formalism and complements the known qualitative effect of disturbance implied by non-locality and no-signaling.
△ Less
Submitted 31 January, 2017;
originally announced February 2017.
-
Relativistic Causality vs. No-Signaling as the limiting paradigm for correlations in physical theories
Authors:
Paweł Horodecki,
Ravishankar Ramanathan
Abstract:
The no-signaling constraints state that the probability distribution of the outputs of any subset of parties is independent of the inputs of the complementary set; here we re-examine these to see how they arise from relativistic causality. We show that while the usual no-signaling constraints are sufficient, in general they are not necessary to ensure that a theory does not violate causality. Depe…
▽ More
The no-signaling constraints state that the probability distribution of the outputs of any subset of parties is independent of the inputs of the complementary set; here we re-examine these to see how they arise from relativistic causality. We show that while the usual no-signaling constraints are sufficient, in general they are not necessary to ensure that a theory does not violate causality. Depending on the exact space-time coordinates of the measurement events in a multi-party Bell experiment, causality only imposes a subset of the usual no-signaling conditions. After revisiting the derivation of the two-party no-signaling constraints, we consider the three-party Bell scenario and characterise a space-time region in which a subset of the no-signaling conditions is sufficient to preserve causality. Secondly, we examine the implications for device-independent cryptography against an eavesdropper constrained only by the laws of relativity. We show an explicit attack in certain measurement configurations on a family of protocols based on the n-party Mermin inequalities that were previously proven secure under the old no-signaling conditions. We then show that security of two-party protocols can also be compromised when the eavesdropper's measurement configuration is not constrained. The monogamy of non-local correlations that underpin their use in secrecy can also be broken in certain space-time configurations. Thirdly, we inspect the notion of free-choice and propose a definition of free-choice in the multi-party Bell experiment. We then re-examine the question whether quantum correlations may admit explanations by finite speed superluminal influences. Finally, we study genuine multiparty non-locality and present a new class of causal bilocal models. We propose a new Svetlichny-type inequality that is satisfied by the causal bilocal model and show its violation within quantum theory.
△ Less
Submitted 21 November, 2016;
originally announced November 2016.
-
On the tightness of correlation inequalities with no quantum violation
Authors:
Ravishankar Ramanathan,
Marco Túlio Quintino,
Ana Belén Sainz,
Gláucia Murta,
Remigiusz Augusiak
Abstract:
We study the faces of the set of quantum correlations, i.e., the Bell and noncontextuality inequalities without any quantum violation. First, we investigate the question whether every proper (tight) Bell inequality for two parties, other than the trivial ones from positivity, normalization and no-signaling can be violated by quantum correlations, i.e., whether the classical Bell polytope or the sm…
▽ More
We study the faces of the set of quantum correlations, i.e., the Bell and noncontextuality inequalities without any quantum violation. First, we investigate the question whether every proper (tight) Bell inequality for two parties, other than the trivial ones from positivity, normalization and no-signaling can be violated by quantum correlations, i.e., whether the classical Bell polytope or the smaller correlation polytope share any facets with their respective quantum sets. To do this, we develop a recently derived bound on the quantum value of linear games based on the norms of game matrices to give a simple sufficient condition to identify linear games with no quantum advantage. Additionally we show how this bound can be extended to the general class of unique games, illustrating it for the case of three outcomes. We then show as a main result that the paradigmatic examples of correlation Bell inequalities with no quantum violation, namely the non-local computation games do not constitute tight Bell inequalities, not even for the correlation polytope. We also extend this to an arbitrary prime number of outcomes for a specific class of these games. We then study the faces in the simplest CHSH Bell scenario of binary dichotomic measurements, and identify edges in the set of quantum correlations in this scenario.
Finally, we relate the non-contextual polytope of single-party correlation inequalities with the cut polytope $CUT(\nabla G)$, where $G$ denotes the compatibility graph of observables in the contextuality scenario and $\nabla G$ denotes the suspension graph of $G$. We observe that there exist tight non-contextuality inequalities with no quantum violation, and furthermore that this set of inequalities is beyond those implied by the Consistent Exclusivity principle.
△ Less
Submitted 19 July, 2016;
originally announced July 2016.
-
Activation of monogamy in non-locality using local contextuality
Authors:
Debashis Saha,
Ravishankar Ramanathan
Abstract:
A unified view on the phenomenon of monogamy exhibited by Bell inequalities and non-contextuality inequalities arising from the no-signaling and no-disturbance principles is presented using the graph-theoretic method introduced in \textit{Phys. Rev. Lett. 109, 050404 (2012)}. We propose a novel type of trade-off, namely Bell inequalities that do not exhibit monogamy features of their own can be ac…
▽ More
A unified view on the phenomenon of monogamy exhibited by Bell inequalities and non-contextuality inequalities arising from the no-signaling and no-disturbance principles is presented using the graph-theoretic method introduced in \textit{Phys. Rev. Lett. 109, 050404 (2012)}. We propose a novel type of trade-off, namely Bell inequalities that do not exhibit monogamy features of their own can be activated to be monogamous by the addition of a local contextuality term. This is illustrated by means of the well-known $\mathcal{I}_{3322}$ inequality, and reveals a resource trade-off between bipartite correlations and the local purity of a single system. In the derivation of novel no-signaling monogamies, we uncover a new feature, namely that two-party Bell expressions that are trivially classically saturated can become non-trivial upon the addition of an expression involving a third party with a single measurement input.
△ Less
Submitted 16 March, 2017; v1 submitted 13 June, 2016;
originally announced June 2016.
-
Amplifying the randomness of weak sources correlated with devices
Authors:
Hanna Wojewodka,
Fernando G. S. L. Brandao,
Andrzej Grudka,
Michal Horodecki,
Karol Horodecki,
Pawel Horodecki,
Marcin Pawlowski,
Ravishankar Ramanathan,
Maciej Stankiewicz
Abstract:
The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this work, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we…
▽ More
The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this work, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition for devices, namely that any string of SV source bits remains weakly random conditioned upon any other bit string from the same SV source and the outputs obtained when this further string is input into the devices. Assuming this condition, we show that a quantum device using a~singlet state to violate the chained Bell inequalities leads to full randomness in the asymptotic scenario of a large number of settings, for a restricted set of SV sources (with $0 \leq \varepsilon < (2^{(1/12)} - 1)/(2(2^{(1/12)} + 1)) \approx 0.0144$).
We also study a device-independent protocol that allows for correlations between the sequence of boxes used in the protocol and the SV source bits used to choose the particular box from whose output the randomness is obtained.
Assuming the SV-like condition for devices, we show that the honest parties can achieve amplification of the weak source, for the parameter range $0 \leq \varepsilon<0.0132$, against a class of attacks given as a mixture of product box sequences, made of extremal no-signaling boxes, with additional symmetry conditions. Composable security proof against this class of attacks is provided.
△ Less
Submitted 13 November, 2018; v1 submitted 24 January, 2016;
originally announced January 2016.
-
Linear game non-contextuality and Bell inequalities - a graph-theoretic approach
Authors:
Piotr Gnaciński,
Monika Rosicka,
Ravishankar Ramanathan,
Karol Horodecki,
Michał Horodecki,
Paweł Horodecki,
Simone Severini
Abstract:
We study the classical and quantum values of one- and two-party linear games, an important class of unique games that generalizes the well-known XOR games to the case of non-binary outcomes. We introduce a ``constraint graph" associated to such a game, with the constraints defining the linear game represented by an edge-coloring of the graph. We use the graph-theoretic characterization to relate t…
▽ More
We study the classical and quantum values of one- and two-party linear games, an important class of unique games that generalizes the well-known XOR games to the case of non-binary outcomes. We introduce a ``constraint graph" associated to such a game, with the constraints defining the linear game represented by an edge-coloring of the graph. We use the graph-theoretic characterization to relate the task of finding equivalent games to the notion of signed graphs and switching equivalence from graph theory. We relate the problem of computing the classical value of single-party anti-correlation XOR games to finding the edge bipartization number of a graph, which is known to be MaxSNP hard, and connect the computation of the classical value of more general XOR-d games to the identification of specific cycles in the graph. We construct an orthogonality graph of the game from the constraint graph and study its Lovász theta number as a general upper bound on the quantum value even in the case of single-party contextual XOR-d games. Linear games possess appealing properties for use in device-independent applications such as randomness of the local correlated outcomes in the optimal quantum strategy. We study the possibility of obtaining quantum algebraic violation of these games, and show that no finite linear game possesses the property of pseudo-telepathy leaving the frequently used chained Bell inequalities as the natural candidates for such applications. We also show this lack of pseudo-telepathy for multi-party XOR-type inequalities involving two-body correlation functions.
△ Less
Submitted 17 November, 2015;
originally announced November 2015.
-
Quantum bounds on multiplayer linear games and device-independent witness of genuine tripartite entanglement
Authors:
Gláucia Murta,
Ravishankar Ramanathan,
Natália Móller,
Marcelo Terra Cunha
Abstract:
Here we study multiplayer linear games, a natural generalization of XOR games to multiple outcomes. We generalize a recently proposed efficiently computable bound, in terms of the norm of a game matrix, on the quantum value of 2-player games to linear games with $n$ players. As an example, we bound the quantum value of a generalization of the well-known CHSH game to $n$ players and $d$ outcomes. W…
▽ More
Here we study multiplayer linear games, a natural generalization of XOR games to multiple outcomes. We generalize a recently proposed efficiently computable bound, in terms of the norm of a game matrix, on the quantum value of 2-player games to linear games with $n$ players. As an example, we bound the quantum value of a generalization of the well-known CHSH game to $n$ players and $d$ outcomes. We also apply the bound to show in a simple manner that any nontrivial functional box, that could lead to trivialization of communication complexity in a multiparty scenario, cannot be realized in quantum mechanics. We then present a systematic method to derive device-independent witnesses of genuine tripartite entanglement.
△ Less
Submitted 16 November, 2015; v1 submitted 30 October, 2015;
originally announced October 2015.
-
Completely Device Independent Quantum Key Distribution
Authors:
E. A. Aguilar,
R. Ramanathan,
J. Kofler,
M. Pawlowski
Abstract:
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum entanglement, one can reduce the necessary assumptions that the parties have to make about their devices, giving rise to device-independent QKD (DIQKD). However, in all existing protocols to date the parties need…
▽ More
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum entanglement, one can reduce the necessary assumptions that the parties have to make about their devices, giving rise to device-independent QKD (DIQKD). However, in all existing protocols to date the parties need to have an initial (at least partially) random seed as a resource. In this work, we show that this requirement can be dropped. Using recent advances in the fields of randomness amplification and randomness expansion, we demonstrate that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries -- an assumption without which any type of cryptography would be pointless to begin with. One party can use her secret message to locally generate a secret sequence of bits, which can then be openly used by herself and the other party in a DIQKD protocol. Hence, our work reduces the requirements needed to perform secure DIQKD and establish safe communication.
△ Less
Submitted 28 July, 2016; v1 submitted 21 July, 2015;
originally announced July 2015.
-
Steering is an essential feature of non-locality in quantum theory
Authors:
Ravishankar Ramanathan,
Dardo Goyeneche,
Sadiq Muhammad,
Piotr Mironowicz,
Marcus Grünfeld,
Mohamed Bourennane,
Paweł Horodecki
Abstract:
A physical theory is called non-local when observers can produce instantaneous effects over distant systems. Non-local theories rely on two fundamental effects: local uncertainty relations and steering of physical states at a distance. In quantum mechanics, the former one dominates the other in a well-known class of non-local games known as XOR games. In particular, optimal quantum strategies for…
▽ More
A physical theory is called non-local when observers can produce instantaneous effects over distant systems. Non-local theories rely on two fundamental effects: local uncertainty relations and steering of physical states at a distance. In quantum mechanics, the former one dominates the other in a well-known class of non-local games known as XOR games. In particular, optimal quantum strategies for XOR games are completely determined by the uncertainty principle alone. This breakthrough result has yielded the fundamental open question whether optimal quantum strategies are always restricted by local uncertainty principles, with entanglement-based steering playing no role. In this work, we provide a negative answer to the question, showing that both steering and uncertainty relations play a fundamental role in determining optimal quantum strategies for non-local games. Our theoretical findings are supported by an experimental implementation with entangled photons.
△ Less
Submitted 12 October, 2018; v1 submitted 16 June, 2015;
originally announced June 2015.
-
Randomness amplification against no-signaling adversaries using two devices
Authors:
Ravishankar Ramanathan,
Fernando G. S. L. Brandão,
Karol Horodecki,
Michał Horodecki,
Paweł Horodecki,
Hanna Wojewódka
Abstract:
Recently, a physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however for reasons of practical relevance, the crucial question remained open whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-si…
▽ More
Recently, a physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however for reasons of practical relevance, the crucial question remained open whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components and in a situation where the violation of a Bell inequality only guarantees that some outcomes of the device for specific inputs exhibit randomness? Here, we solve this question and present a device-independent protocol for randomness amplification of Santha-Vazirani sources using a device consisting of two non-signaling components. We show that the protocol can amplify any such source that is not fully deterministic into a fully random source while tolerating a constant noise rate and prove the composable security of the protocol against general no-signaling adversaries. Our main innovation is the proof that even the partial randomness certified by the two-party Bell test (a single input-output pair ($\textbf{u}^*, \textbf{x}^*$) for which the conditional probability $P(\textbf{x}^* | \textbf{u}^*)$ is bounded away from $1$ for all no-signaling strategies that optimally violate the Bell inequality) can be used for amplification. We introduce the methodology of a partial tomographic procedure on the empirical statistics obtained in the Bell test that ensures that the outputs constitute a linear min-entropy source of randomness. As a technical novelty that may be of independent interest, we prove that the Santha-Vazirani source satisfies an exponential concentration property given by a recently discovered generalized Chernoff bound.
△ Less
Submitted 1 December, 2016; v1 submitted 23 April, 2015;
originally announced April 2015.
-
Generalized XOR games with $d$ outcomes and the task of non-local computation
Authors:
Ravishankar Ramanathan,
Remigiusz Augusiak,
Gláucia Murta
Abstract:
A natural generalization of the binary XOR games to the class of XOR-d games with $d > 2$ outcomes is studied. We propose an algebraic bound to the quantum value of these games and use it to derive several interesting properties of these games. As an example, we re-derive in a simple manner a recently discovered bound on the quantum value of the CHSH-d game for prime $d$. It is shown that no total…
▽ More
A natural generalization of the binary XOR games to the class of XOR-d games with $d > 2$ outcomes is studied. We propose an algebraic bound to the quantum value of these games and use it to derive several interesting properties of these games. As an example, we re-derive in a simple manner a recently discovered bound on the quantum value of the CHSH-d game for prime $d$. It is shown that no total function XOR-d game with uniform inputs can be a pseudo-telepathy game, there exists a quantum strategy to win the game only when there is a classical strategy also. We then study the principle of lack of quantum advantage in the distributed non-local computation of binary functions which is a well-known information-theoretic principle designed to pick out quantum correlations from amongst general no-signaling ones. We prove a large-alphabet generalization of this principle, showing that quantum theory provides no advantage in the task of non-local distributed computation of a restricted class of functions with $d$ outcomes for prime $d$, while general no-signaling boxes do. Finally, we consider the question whether there exist two-party tight Bell inequalities with no quantum advantage, and show that the binary non-local computation game inequalities for the restricted class of functions are not facet defining for any number of inputs.
△ Less
Submitted 9 March, 2016; v1 submitted 10 February, 2015;
originally announced February 2015.
-
No quantum realization of extremal no-signaling boxes
Authors:
Ravishankar Ramanathan,
Jan Tuziemski,
Michał Horodecki,
Paweł Horodecki
Abstract:
Pure states are very important in any theory since they represent states of maximal information about the system within the theory. Here, we show that no non-trivial (not local realistic) extremal states (boxes) of general no-signaling theories can be realized within quantum theory. We then explore three interesting consequences of this fact. Firstly, since the pure states are uncorrelated from th…
▽ More
Pure states are very important in any theory since they represent states of maximal information about the system within the theory. Here, we show that no non-trivial (not local realistic) extremal states (boxes) of general no-signaling theories can be realized within quantum theory. We then explore three interesting consequences of this fact. Firstly, since the pure states are uncorrelated from the environment, the statement forms a no-go result against the most straightforward device-independent protocol for randomness or secure key generation against general no-signaling adversaries. It also leads to the interesting question whether all non-extremal boxes allow for non-local correlations with the adversary. Secondly, in addition to the fact that new information-theoretic principles (designed to pick out the set of quantum correlations from among all non signaling ones) can in consequence be tested on arbitrary non-local vertices to check their validity, it also allows the possibility of excluding from the quantum set any box of no-signaling correlations that can be distilled to a non-local vertex. Finally, it also forms a sufficient condition to identify non-local games with no quantum winning strategy, when one can show that the game has a single unique non-signaling winning strategy. We illustrate each of these consequences with the example of generalized Popescu-Rohrlich boxes.
△ Less
Submitted 25 July, 2016; v1 submitted 3 October, 2014;
originally announced October 2014.
-
Characterising the Performance of XOR Games and the Shannon Capacity of Graphs
Authors:
Ravishankar Ramanathan,
Alastair Kay,
Gláucia Murta,
Paweł Horodecki
Abstract:
In this paper we give a set of necessary and sufficient conditions such that quantum players of a two-party {\sc xor} game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the…
▽ More
In this paper we give a set of necessary and sufficient conditions such that quantum players of a two-party {\sc xor} game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrisation of new families of games which have no quantum advantage, for arbitrary input probability distributions up to certain symmetries. In the future, these might be used in information-theoretic studies on reproducing the set of quantum non-local correlations.
△ Less
Submitted 17 June, 2014; v1 submitted 4 June, 2014;
originally announced June 2014.
-
Strong monogamies of no-signaling violations for bipartite correlation Bell inequalities
Authors:
Ravishankar Ramanathan,
Paweł Horodecki
Abstract:
The phenomenon of monogamy of Bell inequality violations is interesting both from the fundamental perspective as well as in cryptographic applications such as the extraction of randomness and secret bits. In this article, we derive new and stronger monogamy relations for violations of Bell inequalities in general no-signaling theories. These relations are applicable to the class of binary output c…
▽ More
The phenomenon of monogamy of Bell inequality violations is interesting both from the fundamental perspective as well as in cryptographic applications such as the extraction of randomness and secret bits. In this article, we derive new and stronger monogamy relations for violations of Bell inequalities in general no-signaling theories. These relations are applicable to the class of binary output correlation inequalities known as XOR games, and to a restricted set of unique games. In many instances of interest, we show that the derived relation provides a significant strengthening over previously known results. The result involves a shift in paradigm towards the importance in monogamies of the number of inputs of one party which lead to a contradiction from local realistic predictions.
△ Less
Submitted 18 February, 2014;
originally announced February 2014.
-
Are atomic clocks slowing down? Possible connection between the quantum and the cosmos: A feasible experimental test of objective realism
Authors:
R. Ramanathan
Abstract:
An alternative to the current accepted model of expanding universe is presented. The proposal is anchored in the objective realist, stochastic formulation of quantum mechanics wherein the Planck constant plays the role of a diffusion constant which need not be an universal constant for all epochs. This underlying noise is charecterised by a very high initial value of the Planck constant which grad…
▽ More
An alternative to the current accepted model of expanding universe is presented. The proposal is anchored in the objective realist, stochastic formulation of quantum mechanics wherein the Planck constant plays the role of a diffusion constant which need not be an universal constant for all epochs. This underlying noise is charecterised by a very high initial value of the Planck constant which gradually decreased over the epochs gone by, finally reaching its present value .It is this decrease in the strength of the Planck constant that causes a spectral red shift with the passage of time .The compatibility of this proposal with some cosmological data is shown.Feasible spectroscopic measurement of a specific spectral line frequency done over a period of a few years can decisively either validate or invalidate the proposal in a terrestrially bound experiment. This proposal predicts a slowing down of atomic clocks by nearly 2. 10^-18 s with respect to every preceding second. A positive experimental outcome will validate the objective realist basis of quantum physics as advocated by Einstein and many others.
△ Less
Submitted 2 February, 2014;
originally announced February 2014.
-
Robust Device-Independent Randomness Amplification with Few Devices
Authors:
Fernando G. S. L. Brandao,
Ravishankar Ramanathan,
Andrzej Grudka,
Karol Horodecki,
Michal Horodecki,
Pawel Horodecki,
Tomasz Szarek,
Hanna Wojewodka
Abstract:
Randomness amplification is the task of transforming a source of somewhat random bits into a source of fully random bits. Although it is impossible to amplify randomness from a single source by classical means, the situation is different considering non-local correlations allowed by quantum mechanics. Here we give the first device-independent protocol for randomness amplification using a constant…
▽ More
Randomness amplification is the task of transforming a source of somewhat random bits into a source of fully random bits. Although it is impossible to amplify randomness from a single source by classical means, the situation is different considering non-local correlations allowed by quantum mechanics. Here we give the first device-independent protocol for randomness amplification using a constant number of devices. The protocol involves four devices, can amplify any non-deterministic source into a fully random source, tolerates a constant rate of error, and has its correctness based solely on the assumption of no-signaling between the devices. In contrast all previous protocols either required an unbounded number of devices, or could only amplify sources sufficiently close to fully random.
△ Less
Submitted 25 March, 2015; v1 submitted 16 October, 2013;
originally announced October 2013.
-
Robust Device Independent Randomness Amplification
Authors:
Ravishankar Ramanathan,
Fernando G. S. L. Brandao,
Andrzej Grudka,
Karol Horodecki,
Michal Horodecki,
Pawel Horodecki
Abstract:
In randomness amplification a slightly random source is used to produce an improved random source. Perhaps surprisingly, a single source of randomness cannot be amplified at all classically. However, the situation is different if one considers correlations allowed by quantum mechanics as an extra resource. Here we present a protocol that amplifies Santha-Vazirani sources arbitrarily close to deter…
▽ More
In randomness amplification a slightly random source is used to produce an improved random source. Perhaps surprisingly, a single source of randomness cannot be amplified at all classically. However, the situation is different if one considers correlations allowed by quantum mechanics as an extra resource. Here we present a protocol that amplifies Santha-Vazirani sources arbitrarily close to deterministic into fully random sources. The protocol is device independent, depending only on the observed statistics of the devices and on the validity of the no-signaling principle between different devices. It improves previously-known protocols in two respects. First the protocol is tolerant to noise so that even noisy quantum-mechanical systems give rise to good devices for the protocol. Second it is simpler, being based on the violation of a four-party Bell inequality and on the XOR as a hash function. As a technical tool we prove a new de Finetti theorem where the subsystems are selected from a Santha-Vazirani source.
△ Less
Submitted 21 August, 2013;
originally announced August 2013.
-
Free randomness amplification using bipartite chain correlations
Authors:
Andrzej Grudka,
Karol Horodecki,
Michał Horodecki,
Paweł Horodecki,
Marcin Pawłowski,
Ravishankar Ramanathan
Abstract:
A direct analysis of the protocol of randomness amplification using Bell inequality violation is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. The probability distributions of bits generated by a Santha-Vazirani source are shown to be mixtures of permutations of Bernoulli distributions with parameter defined by the sour…
▽ More
A direct analysis of the protocol of randomness amplification using Bell inequality violation is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. The probability distributions of bits generated by a Santha-Vazirani source are shown to be mixtures of permutations of Bernoulli distributions with parameter defined by the source. An intuitive proof is provided for the range of partial randomness from which perfect randomness can be extracted using quantum correlations violating the chain inequalities. Exact values are derived in the asymptotic limit of a large number of measurement settings.
△ Less
Submitted 22 March, 2013;
originally announced March 2013.
-
Necessary and sufficient conditions for state-independent measurement contextual scenarios
Authors:
Ravishankar Ramanathan,
Pawel Horodecki
Abstract:
The problem of identifying measurement scenarios capable of revealing state-independent contextuality in a given Hilbert space dimension is considered. We begin by showing that for any given dimension $d$ and any measurement scenario consisting of projective measurements, (i) the measure of contextuality of a quantum state is entirely determined by its spectrum, so that pure and maximally mixed st…
▽ More
The problem of identifying measurement scenarios capable of revealing state-independent contextuality in a given Hilbert space dimension is considered. We begin by showing that for any given dimension $d$ and any measurement scenario consisting of projective measurements, (i) the measure of contextuality of a quantum state is entirely determined by its spectrum, so that pure and maximally mixed states represent the two extremes of contextual behavior, and that (ii) state-independent contextuality is equivalent to the contextuality of the maximally mixed state up to a global unitary transformation. We then derive a necessary and sufficient condition for a measurement scenario represented by an orthogonality graph to reveal state-independent contextuality. This condition is given in terms of the fractional chromatic number of the graph $χ_f(G)$ and is shown to identify all state-independent contextual measurement scenarios including those that go beyond the original Kochen-Specker paradigm \cite{Yu-Oh}.
△ Less
Submitted 30 January, 2014; v1 submitted 24 December, 2012;
originally announced December 2012.
-
Optimal Asymmetric Quantum Cloning
Authors:
Alastair Kay,
Ravishankar Ramanathan,
Dagomir Kaszlikowski
Abstract:
While the no-cloning theorem, which forbids the perfect copying of quantum states, is well-known as one of the defining features of quantum mechanics, the question of how well the theory allows a state to be cloned is yet to be completely solved. In this paper, rigorous solutions to the problem of M to N asymmetric cloning of qudits are obtained in a number of interesting cases. The central result…
▽ More
While the no-cloning theorem, which forbids the perfect copying of quantum states, is well-known as one of the defining features of quantum mechanics, the question of how well the theory allows a state to be cloned is yet to be completely solved. In this paper, rigorous solutions to the problem of M to N asymmetric cloning of qudits are obtained in a number of interesting cases. The central result is the solution to the 1 to N universal asymmetric qudit cloning problem for which the exact trade-off in the fidelities of the clones for every N and d is derived. Analogous results are proven for qubits when M=N-1. We also consider state-dependent 1 to N qubit cloning, providing a general parametrization in terms of a Heisenberg star Hamiltonian. In all instances, we determine the feasibility of implementing the cloning economically, i.e., without an ancilla, and determine the dimension of the ancilla when an economic implementation is not possible.
△ Less
Submitted 28 August, 2012;
originally announced August 2012.
-
The relation between nonlocality and contextuality for a biphoton
Authors:
Akihito Soeda,
Pawel Kurzynski,
Ravishankar Ramanathan,
Kavan Modi,
Dagomir Kaszlikowski
Abstract:
We investigate the set of qutrit states in terms of symmetric states of two qubits that violate the minimal contextual inequality, namely the Klyachko-Can-Binicoglu-Shumovsky (KCBS) inequality. The physical system that provides a natural framework for this problem is a biphoton which consists of two photons in the same spatio-temporal mode and whose effective polarization behaves as a three-level…
▽ More
We investigate the set of qutrit states in terms of symmetric states of two qubits that violate the minimal contextual inequality, namely the Klyachko-Can-Binicoglu-Shumovsky (KCBS) inequality. The physical system that provides a natural framework for this problem is a biphoton which consists of two photons in the same spatio-temporal mode and whose effective polarization behaves as a three-level quantum system. The relationship between the KCBS contextual inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality is investigated. We find that every biphotonic state that is contextual with respect to KCBS is nonlocal as per the CHSH test when the two photons are apart, but the converse is not true.
△ Less
Submitted 26 February, 2013; v1 submitted 9 July, 2012;
originally announced July 2012.
-
Generalized monogamy of contextual inequalities from the no-disturbance principle
Authors:
Ravishankar Ramanathan,
Akihito Soeda,
Pawel Kurzynski,
Dagomir Kaszlikowski
Abstract:
In this paper we demonstrate that the property of monogamy of Bell violations seen for no-signaling correlations in composite systems can be generalized to the monogamy of contextuality in single systems obeying the Gleason property of no-disturbance. We show how one can construct monogamies for contextual inequalities by using the graph-theoretic technique of vertex decomposition of a graph repre…
▽ More
In this paper we demonstrate that the property of monogamy of Bell violations seen for no-signaling correlations in composite systems can be generalized to the monogamy of contextuality in single systems obeying the Gleason property of no-disturbance. We show how one can construct monogamies for contextual inequalities by using the graph-theoretic technique of vertex decomposition of a graph representing a set of measurements into subgraphs of suitable independence numbers that themselves admit a joint probability distribution. After establishing that all the subgraphs that are chordal graphs admit a joint probability distribution, we formulate a precise graph-theoretic condition that gives rise to the monogamy of contextuality. We also show how such monogamies arise within quantum theory for a single four-dimensional system and interpret violation of these relations in terms of a violation of causality. These monogamies can be tested with current experimental techniques.
△ Less
Submitted 17 September, 2012; v1 submitted 27 January, 2012;
originally announced January 2012.
-
Entropic Test of Quantum Contextuality
Authors:
Pawel Kurzynski,
Ravishankar Ramanathan,
Dagomir Kaszlikowski
Abstract:
We study the contextuality of a three-level quantum system using classical conditional entropy of measurement outcomes. First, we analytically construct the minimal configuration of measurements required to reveal contextuality. Next, an entropic contextual inequality is formulated, analogous to the entropic Bell inequalities derived by Braunstein and Caves in [Phys. Rev. Lett. {\bf 61}, 662 (1988…
▽ More
We study the contextuality of a three-level quantum system using classical conditional entropy of measurement outcomes. First, we analytically construct the minimal configuration of measurements required to reveal contextuality. Next, an entropic contextual inequality is formulated, analogous to the entropic Bell inequalities derived by Braunstein and Caves in [Phys. Rev. Lett. {\bf 61}, 662 (1988)], that must be satisfied by all non-contextual theories. We find optimal measurements for violation of this inequality. The approach is easily extendable to higher dimensional quantum systems and more measurements. Our theoretical findings can be verified in the laboratory with current technology.
△ Less
Submitted 12 July, 2012; v1 submitted 13 January, 2012;
originally announced January 2012.
-
Experimental undecidability of macroscopic quantumness
Authors:
Pawel Kurzynski,
Akihito Soeda,
Ravishankar Ramanathan,
Andrzej Grudka,
Jayne Thompson,
Dagomir Kaszlikowski
Abstract:
Quantum mechanics marks a radical departure from the classical understanding of Nature, fostering an inherent randomness which forbids a deterministic description; yet the most fundamental departure arises from something different. As shown by Bell [1] and Kochen-Specker [2], quantum mechanics portrays a picture of the world in which reality loses its objectivity and is in fact created by observat…
▽ More
Quantum mechanics marks a radical departure from the classical understanding of Nature, fostering an inherent randomness which forbids a deterministic description; yet the most fundamental departure arises from something different. As shown by Bell [1] and Kochen-Specker [2], quantum mechanics portrays a picture of the world in which reality loses its objectivity and is in fact created by observation. Quantum mechanics predicts phenomena which cannot be explained by any theory with objective realism, although our everyday experience supports the hypothesis that macroscopic objects, despite being made of quantum particles, exist independently of the act of observation; in this paper we identify this behavior as classical. Here we show that this seemingly obvious classical behavior of the macroscopic world cannot be experimentally tested and belongs to the realm of ontology similar to the dispute on the interpretations of quantum mechanics [3,4]. For small systems such as a single photon [5] or a pair [6], it has been experimentally proven that a classical description cannot be sustained. Recently, there have also been experiments that claim to have demonstrated quantum behavior of relatively large objects such as interference of fullerenes [7], the violation of Leggett-Garg inequality in Josephson junction [8], and interference between two condensed clouds of atoms [9], which suggest that there is no limit to the size of the system on which the quantum-versus-classical question can be tested. These behaviors, however, are not sufficient to refute classical description in the sense of objective reality. Our findings show that once we reach the regime where an Avogadro number of particles is present, the quantum-versus-classical question cannot be answered experimentally.
△ Less
Submitted 25 January, 2012; v1 submitted 11 November, 2011;
originally announced November 2011.
-
Particle addition and subtraction as a test of bosonic quality
Authors:
Pawel Kurzynski,
Ravishankar Ramanathan,
Akihito Soeda,
Tan Kok Chuan,
Dagomir Kaszlikowski
Abstract:
We propose a test to measure the bosonic quality of particles with respect to physical operations of single-particle addition and subtraction. We apply our test to investigate bosonic properties of composite particles made of an even number of fermions and suggest its experimental implementation. Furthermore, we discuss features of the processes of particle addition and subtraction in terms of opt…
▽ More
We propose a test to measure the bosonic quality of particles with respect to physical operations of single-particle addition and subtraction. We apply our test to investigate bosonic properties of composite particles made of an even number of fermions and suggest its experimental implementation. Furthermore, we discuss features of the processes of particle addition and subtraction in terms of optimal quantum operations.
△ Less
Submitted 15 August, 2011;
originally announced August 2011.
-
Criteria for two distinguishable fermions to behave like a boson
Authors:
Ravishankar Ramanathan,
Pawel Kurzynski,
Tan Kok Chuan,
Marcelo F. Santos,
Dagomir Kaszlikowski
Abstract:
We study the necessary conditions for bosons composed of two distinguishable fermions to exhibit bosonic-like behaviour. We base our analysis on tools of quantum information theory such as entanglement and the majorization criterion for probability distributions. In particular we scrutinize a recent interesting hypothesis by C. K. Law in the Ref. Phys. Rev. A 71, 034306 (2005) that suggests that t…
▽ More
We study the necessary conditions for bosons composed of two distinguishable fermions to exhibit bosonic-like behaviour. We base our analysis on tools of quantum information theory such as entanglement and the majorization criterion for probability distributions. In particular we scrutinize a recent interesting hypothesis by C. K. Law in the Ref. Phys. Rev. A 71, 034306 (2005) that suggests that the amount of entanglement between the constituent fermions is related to the bosonic properties of the composite boson. We show that a large amount of entanglement does not necessarily imply a good boson-like behaviour by constructing an explicit counterexample. Moreover, we identify more precisely the role entanglement may play in this situation.
△ Less
Submitted 7 March, 2011;
originally announced March 2011.
-
Local Realism of Macroscopic Correlations
Authors:
Ravishankar Ramanathan,
Tomasz Paterek,
Alastair Kay,
Pawel Kurzyński,
Dagomir Kaszlikowski
Abstract:
We show that for macroscopic measurements which cannot reveal full information about microscopic states of the system, the monogamy of Bell inequality violations present in quantum mechanics implies that practically all correlations between macroscopic measurements can be described by local realistic models. Our results hold for sharp measurement and arbitrary closed quantum systems.
We show that for macroscopic measurements which cannot reveal full information about microscopic states of the system, the monogamy of Bell inequality violations present in quantum mechanics implies that practically all correlations between macroscopic measurements can be described by local realistic models. Our results hold for sharp measurement and arbitrary closed quantum systems.
△ Less
Submitted 11 October, 2010;
originally announced October 2010.
-
Correlation complementarity yields Bell monogamy relations
Authors:
P. Kurzynski,
T. Paterek,
R. Ramanathan,
W. Laskowski,
D. Kaszlikowski
Abstract:
We present a method to derive Bell monogamy relations by connecting the complementarity principle with quantum non-locality. The resulting monogamy relations are stronger than those obtained from the no-signaling principle alone. In many cases, they yield tight quantum bounds on violation of single and multiple qubit correlation Bell inequalities. In contrast with the two-qubit case, a rich struct…
▽ More
We present a method to derive Bell monogamy relations by connecting the complementarity principle with quantum non-locality. The resulting monogamy relations are stronger than those obtained from the no-signaling principle alone. In many cases, they yield tight quantum bounds on violation of single and multiple qubit correlation Bell inequalities. In contrast with the two-qubit case, a rich structure of possible violation patterns is shown to exist in the multipartite scenario.
△ Less
Submitted 18 May, 2011; v1 submitted 11 October, 2010;
originally announced October 2010.