Transcript in PPT

Quantum correlations and device-independent
quantum information protocols
Antonio Acín
N. Brunner, N. Gisin, Ll. Masanes, S. Massar,
M. Navascués, S. Pironio, V. Scarani
Feynman Festival, Olomouc, June 2009
Scenario
Distant parties performing m different measurements of r outcomes.
x=1,…,m
Alice
a=1,…,r
y=1,…,m
p(a, b x, y)
b=1,…,r
Bob
Vector of m2 r2 positive components satisfying m2 normalization conditions
pa, b x, y    p1,11,1, p1,21,1,, pr, r 1,1,, pr, r m, m
 pa, b x, y   1
r
a ,b 1
x, y
Physical Correlations
Physical principles translate into limits on correlations
1) Classical correlations: correlations established by classical means.
p(a, b x, y)   p  pa x,  qb y,  
These are the standard “EPR” correlations. Independently of
fundamental issues, these are the correlations achievable by classical
resources. Bell inequalities define the limits on these correlations.
For a finite number of measurements and results, these correlations
define a polytope, a convex set with a finite number of extreme points.
Physical Correlations
2) Quantum correlations: correlations established by quantum means.

pa, b x, y   tr  AB M ax  M by

x
M
 a 1
a
M ax' M ax   aa' M ax
The set of quantum correlations is again convex, but not a polytope,
even if the number of measurements and results is finite.
3) No-signalling correlations: correlations compatible with the nosignalling principle, i.e. the impossibility of instantaneous communication.
 p(a, b x, y)  pa x 
b
The set of no-signalling correlations defines again a polytope.
Physical Correlations
Bell
C  Q  NS
NL machine
Example: 2 inputs of
2 outputs
a, b, x, y  0,1
CHSH inequality
Trivial facets
Popescu-Rohrlich
BLMPPR
QM
Local
points
N  4
Q  2 2
L  2
Motivation
Is p(a,b|x,y) a quantum probability?

pa, b x, y   tr  AB M  M
x
a
y
b

x
M
 a 1
a
M ax M ax'   a 'a M ax
Example:

1
pa, b 0,0  pa, b 0,1  pa, b 1,0  2  3 ,2  3 ,2  3 ,2  3
8
pa, b 1,1  0.245,0.255,0.255,0.245

Are these correlations
quantum?
No constraint on the dimension → pure states and projective measurements
Motivation
• What are the allowed correlations within
our current description of Nature?
• How can we detect the non-quantumness
of some observed correlations? Quantum
analogues of Bell inequalities.
• What are the limits on correlations
associated to the quantum formalism?
• To which extent Quantum Mechanics is
useful for information tasks?
Previous work by Tsirelson and Wehner
Device-Independent Quantum
Information protocols
Goal: to construct information protocols where
the parties can see their devices as quantum
black-boxes → no assumption on the devices.
x=1,…,m
Alice
a=1,…,r
y=1,…,m
p(a, b x, y)
b=1,…,r
Bob
Outline of the talk
• Introduction
• Hierarchy of necessary conditions for quantum correlations
• Definition of the hierarchy
• Discussion of convergence
• Device-Independent Quantum Information protocols
• Quantum Key Distribution
• Randomness Generation
• Conclusions / Open questions
Hierarchy of necessary conditions
Given a probability distribution p(a,b|x,y), we have
defined a hierarchy consisting of a series of tests
based on semi-definite programming techniques
allowing the detection of supra-quantum correlations.
1  0
NO
YES
2  0
YES

YES
  0
NO
Is the hierarchy complete?
NO
YES
Convergence of the hierarchy
1) If some correlations satisfy all the hierarchy, then:

pa, b x, y   tr  M M
x
a
y
b

with
?

M
x
a

, M by  0
x
M
 a 1
a
pa, b x, y   tr  AB M ax  M by

2) Rank loops:
If  n s.t. rank
 n   rank  n1 
the distribution is quantum.
Device-Independent QKD
Standard QKD protocols based their security on:
1. Quantum Mechanics: any eavesdropper, however
powerful, must obey the laws of quantum physics.
2. No information leakage: no unwanted classical
information must leak out of Alice's and Bob's
laboratories.
3. Trusted Randomness: Alice and Bob have access to
local random number generators.
4. Knowledge of the devices: Alice and Bob require
some control (model) of the devices.
Is there a protocol for secure QKD based on p(a, b x, y)
without requiring any assumption on the devices?
Security against collective attacks
• Device-Independent protocol based on the CHSH Bell inequality.
• Collective attacks: Eve prepares always the same state and
measurements (identical and independent realizations).
• Bound on Eve’s information as a function of the observed error
and Bell inequality violation.
The obtained
critical QBER is
of approx 7.1%
Can the presence of
randomness be guaranteed by
any physical mechanism?
Randomness tests
• Good randomness is usually verified by a
series of statistical tests.
• There exist chaotic systems, of
deterministic nature, that pass all existing
randomness tests. Uchida et al., Nat. Phot. 2, 728 (2008)
• Do these tests really certify the presence
of randomness?
Known solutions
• Classical Random Number Generators (CRNG): all of
them are of deterministic Nature.
• Quantum Random Number Generators (QRNG): all the
existing solution require some knowledge of the devices.
The provider has to be trusted.
T
50%
R
The standard solution crucially
depends on the details of the
device used for the random
number generation.
50%
• In any case, all the solutions guarantee the randomness
using standard statistical randomness tests.
Private Randomess
• Many applications require private randomness.
• Untrusted scenario: can one be sure that
nobody has a deterministic model for the
observed randomness?
T
50%
R
50%
r1
r2
.
.
.
rn
Classical
Memory
rr1n2
…
Random Numbers from Bell’s Theorem
• Randomness can be certified in the quantum
world by means of non-local correlations, i.e. the
violation of a Bell inequality.
• The obtained randomness is private.
• It represents a novel application of Quantum
Information Theory, solving a task whose
classical realization is, at least, unclear.
• Our findings can be used to design DeviceIndependent Quantum Randomness Expanders.
Random Numbers from Bell’s Theorem
We want to explore the relation between non-locality, measured
by the violation β of a Bell inequality, and local randomness,
quantified by r  max a, x p a x . Clearly, if β =0 → r=1.
 
x=1,2
a=+1,-1
y=1,2
p(a, b x, y)
b=+1,-1
NOTE: In all what follows, loopholes are not analyzed. They are
important when considering the practical implementation of these ideas.
Results
All the region
above the curve
is impossible
within Quantum
Mechanics.
Statement of the problem
r  max p a x 
p a, b x, y  Q
xy
c
 ab p a, b x, y   
We have developed an asymptotically convergent
series of sets approximating the quantum set.
rn  max p a x 
p a, b x, y   n
xy
c
 ab p a, b x, y   
Other Bell inequalities
x=1,2
a=1,…,r
y=1,2
p(a, b x, y)
The same computation
can be done for other
inequalities, such as the
CGLMP Bell inequality.
b=1,…,r
One gets a perfectly random
trit. The only known way of
obtaining this point is by
measuring a non-maximally
entangled state.
The more non-local →
the more random
Randomness Witnesses
CHSH  2 2
QM
I
LP
The CHSH inequality at the maximal
quantum violation defines a tangent
to the quantum boundary.
We consider other hyper-planes
tangent to the quantum set.
I   A1 B1  B2   A2 B1  B2 
I  2
classical
I  2  2  1
quantum
The maximal quantum violation of any of these inequalities always guarantees
perfect randomness.
Arbitrarily small amounts of quantum non-locality give perfect randomness.
Device-Independent Quantum
Randomness Expanders
A device violating a Bell’s inequality can be used to generate random
numbers. However, randomness is needed for the Bell test →
Randomness Expander! Kent & Kollbeck
In these devices, the two outcomes contain randomness and are useful.
In the limit of very large α
one gets two random bits.
Quantum Theory is as
random as possible.
This is not the case for
general no-signaling
theories, where the
number of random bits is
at most one.
Quantum correlations
• Hierarchy of necessary condition for detecting the
quantum origin of correlations.
• Each condition can be mapped into an SDP
problem.
• Is this hierarchy complete for tensor product
measurements?
• How does this picture change if we fix the
dimension of the quantum system?
• Are all finite correlations achievable measuring
finite-dimensional quantum systems?
Random Numbers from Bell’s Theorem
• Randomness can be certified in the quantum
world by means of non-local correlations, i.e. the
violation of a Bell inequality.
• The obtained randomness is private.
• It represents a novel application of Quantum
Information Theory, solving a task whose
classical realization is, at least, unclear.
• Our findings can be used to design DeviceIndependent Quantum Randomness Expanders.
Take-home question
(C or Q)RNG
Specifications: it passes all
statistical randomness tests.
DIQRNE
Specifications:
It won’t pass
all the existing
randomness
tests!
Which device is more random?
Post-doc and PhD positions available in the group, see www.icfo.es