Search results for: BELL INEQUALITIES - Bridge of Knowledge

Search

Search results for: BELL INEQUALITIES

Search results for: BELL INEQUALITIES

  • Intrinsic asymmetry with respect to adversary: a new feature of Bell inequalities

    Publication

    - Journal of Physics A-Mathematical and Theoretical - Year 2014

    It is known that the local bound of a Bell inequality is sensitive to the knowledge of the external observer about the settings statistics. Here we ask how that sensitivity depends on the structure of that knowledge. It turns out that in some cases it may happen that the local bound is much more sensitive to the adversaryʼs knowledge about the settings of one party than the other. Remarkably, there are Bell inequalities which are...

    Full text to download in external service

  • Bound on Bell inequalities by fraction of determinism and reverse triangle inequality

    Publication
    • P. Joshi
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • R. Horodecki
    • B. Li
    • S. Szarek
    • T. Szarek

    - PHYSICAL REVIEW A - Year 2015

    It is an established fact that entanglement is a resource. Sharing an entangled state leads to nonlocal correlations and to violations of Bell inequalities. Such nonlocal correlations illustrate the advantage of quantum resources over classical resources. In this paper, we quantitatively study Bell inequalities with 2 × n inputs. As found in Gisin et al. [Int. J. Quantum. Inform. 05, 525 (2007)], quantum mechanical correlations...

    Full text available to download

  • Strong Monogamies of No-Signaling Violations for Bipartite Correlation Bell Inequalities

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    The phenomenon of monogamy of Bell inequality violations is interesting both from the fundamental perspective as well as in cryptographic applications such as the extraction of randomness and secret bits. In this article, we derive new and stronger monogamy relations for violations of Bell inequalities in general no-signaling theories. These relations are applicable to the class of binary output correlation inequalities known as...

    Full text to download in external service

  • Linear game non-contextuality and Bell inequalities—a graph-theoretic approach

    Publication

    - NEW JOURNAL OF PHYSICS - Year 2016

    We study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...

    Full text available to download

  • Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security

    Publication

    W pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...

    Full text available to download

  • Bell-Type Inequalities from the Perspective of Non-Newtonian Calculus

    Publication

    A class of quantum probabilities is reformulated in terms of non-Newtonian calculus and projective arithmetic. The model generalizes spin-1/2 singlet state probabilities discussed in Czachor (Acta Physica Polonica:139 70–83, 2021) to arbitrary spins s. For s → ∞ the formalism reduces to ordinary arithmetic and calculus. Accordingly, the limit “non-Newtonian to Newtonian” becomes analogous to the classical limit of a quantum theory

    Full text available to download

  • Trade-offs in multiparty Bell-inequality violations in qubit networks

    Publication

    - PHYSICAL REVIEW A - Year 2018

    Two overlapping bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms of monogamies that allow for violations...

    Full text available to download

  • Relationship between semi- and fully-device-independent protocols

    Publication
    • H. Li
    • P. A. Mironowicz
    • M. Pawłowski
    • Z. Yin
    • Y. Wu
    • S. Wang
    • W. Chen
    • H. Hu
    • G. Guo
    • Z. Han

    - PHYSICAL REVIEW A - Year 2013

    We study the relation between semi and fully device independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter and vice versa. This relation provides us with interesting results for both scenarios. First, we find new random number generation protocols with higher bit rates for both the semi and fully device independent...

    Full text available to download

  • Local hidden–variable models for entangled quantum states

    Publication

    While entanglement and violation of Bell inequalities were initially thought to be equivalent quantum phenomena, we now have different examples of entangled states whose correlations can be described by local hidden-variable models and, therefore, do not violate any of the Bell inequalities. We provide an up-to-date overview of the existing literature regarding local hidden-variable models for entangled quantum states, in both...

    Full text to download in external service

  • Contra Bellum: Bell's Theorem as a Confusion of Languages

    Publication

    Bell's theorem is a conflict of mathematical predictions formulated within an infinite hierarchy of mathematical models. Inequalities formulated at level k ∈ Z are violated by probabilities at level k+1. We are inclined to think that k=0 corresponds to the classical world, while k=1 — to the quantum one. However, as the k=0 inequalities are violated by k=1 probabilities, the same relation holds between k=1 inequalities violated...

    Full text available to download

  • Robustness of quantum-randomness expansion protocols in the presence of noise

    Publication

    - PHYSICAL REVIEW A - Year 2013

    In this paper we investigate properties of several randomness generation protocols in the device independent framework. Using Bell-type inequalities it is possible to certify that the numbers generated by an untrusted device are indeed random. We present a selection of certificates which guarantee two bits of randomness for each run of the experiment in the noiseless case and require the parties to share a maximally entangled state....

    Full text available to download

  • Imitating Quantum Probabilities: Beyond Bell’s Theorem and Tsirelson Bounds

    Publication

    Local hidden-variable model of singlet-state correlations discussed in M. Czachor, Acta Phys. Polon. A 139, 70, is shown to be a particular case of an infinite hierarchy of local hidden-variable models based on an infinite hierarchy of calculi. Violation of Bell-type inequalities can be interpreted as a `confusion of languages' problem, a result of mixing different but neighboring levels of the hierarchy. Mixing of non-neighboring...

    Full text available to download

  • Elemental and tight monogamy relations in nonsignaling theories

    Publication

    - PHYSICAL REVIEW A - Year 2014

    Physical principles constrain the way nonlocal correlations can be distributed among distant parties. These constraints are usually expressed by monogamy relations that bound the amount of Bell inequality violation observed among a set of parties by the violation observed by a different set of parties. We prove here that much stronger monogamy relations are possible for nonsignaling correlations by showing how nonlocal correlations...

    Full text available to download

  • Hybrid no-signaling-quantum correlations

    Publication

    - NEW JOURNAL OF PHYSICS - Year 2022

    Fundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...

    Full text available to download

  • Arithmetic Loophole in Bell's Theorem: Overlooked Threat to Entangled-State Quantum Cryptography

    Publication

    Bell’s theorem is supposed to exclude all local hidden-variable models of quantum correlations. However,an explicit counterexample shows that a new class of local realistic models, based on generalized arith-metic and calculus, can exactly reconstruct rotationally symmetric quantum probabilities typical oftwo-electron singlet states. Observable probabilities are consistent with the usual arithmetic employedby macroscopic observers...

    Full text available to download

  • Quantum entanglement

    Publication

    - REVIEWS OF MODERN PHYSICS - Year 2009

    All our former experience with application of quantum theory seems to say that what is predicted by quantum formalism must occur in the laboratory. But the essence of quantum formalism-entanglement, recognized by Einstein, Podolsky, Rosen, and Schrödinger-waited over 70 years to enter laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between...

    Full text to download in external service

  • From unextendible product bases to genuinely entangled subspaces

    Publication

    - PHYSICAL REVIEW A - Year 2018

    Unextendible product bases (UPBs) are interesting mathematical objects arising in composite Hilbert spaces that have found various applications in quantum information theory, for instance in a construction of bound entangled states or Bell inequalities without quantum violation. They are closely related to another important notion, completely entangled subspaces (CESs), which are those that do not contain any fully separable pure...

    Full text available to download

  • Quantum Steering Inequality with Tolerance for Measurement-Setting Errors: Experimentally Feasible Signature of Unbounded Violation

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2017

    uantum steering is a relatively simple test for proving that the values of quantum-mechanical measurement outcomes come into being only in the act of measurement. By exploiting quantum correlations, Alice can influence — steer — Bob ’ s physical system in a way that is impossible in classical mechanics, as shown by the violation of steering inequalities. Demonstrating this and similar quantum effects for systems of increasing size,...

    Full text to download in external service

  • Quantum metrology: Heisenberg limit with bound entanglement

    Publication

    - PHYSICAL REVIEW A - Year 2015

    Quantum entanglement may provide a huge boost in the precision of parameter estimation. However, quantum metrology seems to be extremely sensitive to noise in the probe state. There is an important still open question: What type of entanglement is useful as a resource in quantum metrology? Here we raise this question in relation to entanglement distillation. We provide a counterintuitive example of a family of bound entangled states...

    Full text available to download

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Full text to download in external service

  • On symmetric extendibility of quantum states and its applications

    Publication

    - Year 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Full text available to download

  • Marek Czachor prof. dr hab.

  • Realistic noise-tolerant randomness amplification using finite number of devices

    Publication
    • F. Brandão
    • R. Ramanathan
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • T. Szarek
    • H. Wojewódka

    - Nature Communications - Year 2016

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...

    Full text available to download

  • Randomness Amplification under Minimal Fundamental Assumptions on the Devices

    Publication
    • R. Ramanathan
    • F. Brandão
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • H. Wojewódka

    - PHYSICAL REVIEW LETTERS - Year 2016

    Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...

    Full text available to download

  • Constructive entanglement test from triangle inequality

    Publication

    - Journal of Physics A-Mathematical and Theoretical - Year 2014

    We derive a simple lower bound on the geometric measure of entanglement for mixed quantum states in the case of a general multipartite system. The main ingredient of the presented derivation is the triangle inequality applied to the root infidelity distance in the space of density matrices. The obtained bound leads to entanglement criteria with a straightforward interpretation. The proposed criteria provide an experimentally accessible,...

    Full text to download in external service

  • Characterizing the Performance of <span class="sc">xor</span> Games and the Shannon Capacity of Graphs

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    In this Letter we give a set of necessary and sufficient conditions such that quantum players of a two-party xor game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrization of new families of games...

    Full text to download in external service

  • Experimental test of nonclassicality with arbitrarily low detection efficiency

    Publication

    - PHYSICAL REVIEW A - Year 2020

    We theoretically introduce and experimentally demonstrate the realization of a nonclassicality test that allows for arbitrarily low detection efficiency without invoking an extra assumption of independence of the devices. Our test and its implementation is set in a prepare-and-measure scenario with an upper limit on the classical communication capacity of the channel through which the systems are communicated. The essence for our...

    Full text available to download