1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava.

Slides:



Advertisements
Similar presentations
Pretty-Good Tomography Scott Aaronson MIT. Theres a problem… To do tomography on an entangled state of n qubits, we need exp(n) measurements Does this.
Advertisements

QCRYPT 2011, Zurich, September 2011 Lluis Masanes 1, Stefano Pironio 2 and Antonio Acín 1,3 1 ICFO-Institut de Ciencies Fotoniques, Barcelona 2 Université.
Tony Short University of Cambridge (with Sabri Al-Safi – PRA 84, (2011))
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Experiments thought to prove non – locality may be artifacts Karl Otto Greulich. Fritz Lipmann Institute Beutenbergstr. 11 D Jena Entanglement, the.
Fixing the lower limit of uncertainty in the presence of quantum memory Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators:
P LAYING ( QUANTUM ) GAMES WITH OPERATOR SPACES David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
1 quantum teleportation David Riethmiller 28 May 2007.
Short course on quantum computing Andris Ambainis University of Latvia.
Bell inequality & entanglement
GHZ correlations are just a bit nonlocal Carlton M. Caves University of New Mexico caves Seminar date Please join the APS Topical.
Bell’s inequalities and their uses Mark Williamson The Quantum Theory of Information and Computation
Quantum Computing MAS 725 Hartmut Klauck NTU
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Coloring and related problems K. Svozil (ITP-TUW May 22nd, 2001)
Chapter 22 The EPR paper and Bell's theorem by Steve Kurtz.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Mechanics from Classical Statistics. what is an atom ? quantum mechanics : isolated object quantum mechanics : isolated object quantum field theory.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Study and characterisation of polarisation entanglement JABIR M V Photonic sciences laboratory, PRL.
Is Communication Complexity Physical? Samuel Marcovitch Benni Reznik Tel-Aviv University arxiv
In 1887,when Photoelectric Effect was first introduced by Heinrich Hertz, the experiment was not able to be explained using classical principles.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
School of something FACULTY OF OTHER School of Physics and Astronomy FACULTY OF MATHEMATICAL AND PHYSICAL SCIENCES Nonlocality of a single particle Jacob.
University of Gdańsk, Poland
Requirements for a loophole-free Bell test using imperfect setting generators Johannes Kofler Max Planck Institute of Quantum Optics (MPQ) Garching/Munich,
Security of practical quantum cryptography with heralded single photon sources Mikołaj Lasota 1, Rafał Demkowicz-Dobrzański 2, Konrad Banaszek 2 1 Nicolaus.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
Steering witnesses and criteria for the (non-)existence of local hidden state (LHS) models Eric Cavalcanti, Steve Jones, Howard Wiseman Centre for Quantum.
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
Experimental generation and characterisation of private states Paweł Horodecki Wydział Fizyki Technicznej i Matematyki Stosowanej, Politechnika Gdańska.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
1 quantum mysteries again! quantum mysteries again! classical vs. quantum correlations ‘ quantum mechanics is weird” N. Bohr Bell’s inequality? QM VIOLATES.
Black-box Tomography Valerio Scarani Centre for Quantum Technologies & Dept of Physics National University of Singapore.
A condition for macroscopic realism beyond the Leggett-Garg inequalities APS March Meeting Boston, USA, March 1 st 2012 Johannes Kofler 1 and Časlav Brukner.
Bell tests with Photons Henry Clausen. Outline:  Bell‘s theorem  Photon Bell Test by Aspect  Loopholes  Photon Bell Test by Weihs  Outlook Photon.
Violation of local realism with freedom of choice Faculty of Physics, University of Vienna, Austria Institute for Quantum Optics and Quantum Information.
Efficiency of Multi-Qubit W states in Information Processing Atul Kumar IPQI-2014 IIT Jodhpur
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
The question Can we generate provable random numbers? …. ?
Indefinite causal order in quantum mechanics Faculty of Physics, University of Vienna & Institute for Quantum Optics and Quantum Information, Vienna Mateus.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Nonlocality test of continuous variable state 17, Jan,2003 QIPI meeting Wonmin Son Queen’s University, Belfast.
The EPR Paradox, Bell’s inequalities, and its significance By: Miles H. Taylor.
Fine-grained Uncertainty Relations and Quantum Steering Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators: T. Pramanik.
Quantum Cryptography Antonio Acín
Bell’s Inequality.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Non-Locality Swapping and emergence of quantum correlations Nicolas Brunner Paul Skrzypczyk, Sandu Popescu University of Bristol.
Quantum Non-locality: From Bell to Information Causality Alex Thompson Physics 486 March 7, 2016.
CORRELATION-REGULATION ANALYSIS Томский политехнический университет.
Spooky action at distance also for neutral kaons? by Beatrix C. Hiesmayr University of Vienna Projects: FWF-P21947 FWF-P23627 FWF-P26783 Fundamental Problems.
Secret keys and random numbers from quantum non locality Serge Massar.
Cryptography and Non-Locality Valerio Scarani Centre for Quantum Technologies National University of Singapore Ph.D. and post-doc positions available Barrett.
No Fine theorem for macroscopic realism
M. Stobińska1, F. Töppel2, P. Sekatski3,
Quantum Information Promises new insights Anthony J
Simulating entanglement without communication
Atom Chip Group, Ben Gurion University, Beersheba, Israel
Sequential sharing of nonlocal correlations
Experimental test of nonlocal causality
Presentation transcript:

1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava Vienna, February 3rd 2006 archiv:quant-ph/ , accepted for Phys. Rev. A

2 Contents 1.Bell’s Theorem 2.Local Realism and the Freedom of Choice 3.The CHSH and the Mermin Inequality 4.Quantum Cryptography

3 Bell‘s Theorem Locality:The result of a measurement performed on system A is unaffected by operations on a space-like separated system B Realism:Measurement results are determined by “hidden variables” which exist prior to and independent of observation Bell’ Theorem [Bell (1964)] : Local realism is in conflict with quantum mechanics Famous experiments:Freedman and Clauser (1972) Clauser and Horne (1974) Aspect (1981, 1982) Tittel et al. (1997) Weihs et al. (1998)

4 Loopholes in Bell Tests 1. Fair Sampling:the detected pairs are statistically significant (fair) representatives of all the emitted pairs experimental problem: detection efficiency 2. Locality:no causal mechanism whatsoever can bring information from one side to the other experimental problem: space-like separation 3. Freedom:the experimenter is free to choose the measurement settings

5 Agenda -assume local realism -for consistency with experiments: give up freedom -characterize (quantify) the “insane” consequences of such a program -show consequences in quantum cryptography

6 Freedom of Choice -2 separated partners, A and B, space-like separated experiments -A:settings: k = 1,2B:settings: l = 1,2 outcomes: X = +1,–1outcomes: Y = +1,–1 -measured probability for correlation:P(X=Y|kl) -local realism assumes a quadruple q = {X 1,X 2,Y 1,Y 2 } produced by the source for each run (pair), existing independently of whether any or which measurements are performed X  {X 1,X 2 }, Y  {Y 1,Y 2 } -mathematical probability for correlation:P(X k =Y l )

7 Freedom of Choice -measured probability for correlation:P(X=Y|kl) -mathematical probability for correlation:P(X k =Y l ) Freedom: [Gill et al. (2003)] The setting choice (k,l) is statistically independent of the quadruple q = {X 1,X 2,Y 1,Y 2 } in many thought repetitions of the experiment the probability of every possible value of q remains the same for any choice of the settings

8 Lack of Freedom Imagine:freedom is an illusion both choice of settings and results are consequences of a common local realistic mechanism experimenter’s choice is determined in advance or, e.g., the parity of the number of cars passing the laboratory within the next n seconds, where n is given by the cube of the fourth decimal of the actual temperature in degrees Fahrenheit, is correlated with the local realistic source which emits the particles Measure of the lack of freedom:

9 The CHSH Inequality The mathematical probabilities satisfy a set-theoretical constraint: CHSH inequality [Clauser et al. (1969)] : In terms of measured probabilities, with where adapted bound

10 CHSH Inequality with No Freedom Example: Local realistic mechanism with no freedom: -source “knows” (in advance) the measurement settings of A and B -whenever A and B both (will) measure their second setting (k = 2, l = 2), the source sends perfectly anti-correlated pairs: P(X=Y|22) = 0 -in the other three cases it sends perfectly correlated pairs P(X=Y|11) = P(X=Y|12) = P(X=Y|21) = 1 -then the logical bound of 3 can be reached: still satisfied as

11 CHSH Inequality with total Freedom Example: Local realistic mechanism with total freedom -complete freedom -the two inequalities become identical

12 Abandonment of Freedom -consider experiment with maximally entangled state -for perfect setting angles the measured CHSH expression can become -therefore, to keep a local realistic view which is in agreement with the experimental results, we have to have -hence the freedom has to be restricted (abandoned) at least by the amount -if we assume then

13 Generalization to N parties -N space-like separated parties -settings:k j  {1,2} outcomes:X (j)  {1,–1} -Local realism assumes existence of {X 1 (1),X 2 (1),…,X 1 (N),X 2 (N) } -mathematical probability for correlation -measured probability for correlation -lack of freedom

14 Mermin Inequality The mathematical probabilities satisfy a set-theoretical constraint, equivalent to the Mermin inequality [Mermin (1990), Żukowski et al. (2002)] : In terms of the measured probabilities: with adapted bound

15 Abandonment of Freedom -take maximally entangled N-party GHZ state -gap between non-adapted bound and experimental result increases exponentially with the number of partners -to explain experimental result local realistically, the freedom of each party has to be abandoned by the (exponentially fast saturating) amount

16 Intermediate Summary Local realistic picture with restricted experimenter’s freedom -local realistic bound increases -why is the (experimental) bound in the CHSH inequality and not, e.g., the logical bound 3? -we had to introduce purely theoretical and experimentally not accessible entities, i.e., the mathematical probabilities P(X k =Y l ) -Occam’s razor? Popper’s falsifiability principle?

17 Quantum Cryptography Motivation -the violation of Bell’s inequality is necessary and sufficient for efficient extraction of a secret key [Gisin et al. (2002)] -if an eavesdropper Eve has (partial) knowledge about the settings of Alice and Bob (e.g., bad random-number generator), she can simulate a violation of Bell’s inequality and successfully eavesdrop [Hwang (2005)] -Connection: lack of freedom in a local realistic picture is equivalent to the fact that an eavesdropper has partial setting knowledge in a quantum experiment

18 The BBM–CHSH Protocol (  1,  1 ), (  2,  2 )key establishing measurement (  1,  3 ), (  2,  3 ), (  1  4 ), (  2,  4 )CHSH measurement orthogonal combinationsignore CHSH: ?

19 Eve’s Setting Knowledge -source sends a (maximally entangled) singlet pair in each run -Eve has partial setting knowledge -model: before each run Eve gets the probabilities for all 8 settings to be chosen q ij is the probability for (  i,  j ) with i = 1,2; j = 1,2,3,4 -for simplicity: one setting always has high probability:Q ≥ 1/8 the others have equal low probability: (1–Q)/7 -Q = 1: E: total knowledge,A and B: no freedom Q = 1/8:E: no knowledge,A and B: total freedom -Lack of freedom:

20 Eve’s Attack Algorithm -if q ij = Q, Eve attacks with the product state maximizes:P(X=–Y|13)  1 P(X=–Y|23)  1 P(X=–Y|24)  1 know the key for 11 and 22 -exception: q 14 = Q minimizes P(X=–Y|14)  0 -Eve always sends product states: local realism with restricted freedom or

21 CHSH Violation -CHSH can be violated for Q > but what about the secret key?

22 Bit Error Rate and Mutual Informations -bit error rate -mutual informations -best mutual information for a given D under the condition of no setting knowledge -secret key agreement iff(never fulfilled)

23 -Secret key extraction is never possible: -Critical error rate D 0 = 14.6 % at Q = Q 0 = Q > Q 0 protocol insecure:I AB ≤ I BE and D < D 0 and CHSH violated -Q ≤ Q0-Q ≤ Q0 protocol secure:I AB < I BE but D ≥ D 0 Alice and Bob will not use their key because they find D ≥ D 0 D > D 0 D < D 0

24 Consequences -the one-to-one correspondence between secret key extraction and violation of a Bell’s inequality is lost -depending on the amount of setting knowledge (Q) which is leaking out of the laboratories of A and B, they have to calculate (via an optimization procedure over all possible attacks) a new bound for CHSH -a violation of this adapted bound corresponds again to the possibility of secret key extraction (as this is equivalent to a violation of the “original” CHSH expression)

25 Conclusions -Bell’s theorem a local realistic description of the world can only be maintained if the experimenter’s freedom is partly abandoned -we quantified the degree of the lack of freedom for the CHSH and the Mermin inequality -quantum cryptography: the lack of freedom in a local realistic world is equivalent to a situation in which the eavesdropper has setting knowledge -if a certain knowledge threshold is beaten, the eavesdropper can find out the key without being revealed (neither by the error rate nor by the CHSH inequality) -the one-to-one correspondence between secret key extraction and violation of the CHSH inequality can only be restored by adapting the bound of the inequality