Search results for: BELL INEQUALITY - Bridge of Knowledge

Search

Search results for: BELL INEQUALITY

Search results for: BELL INEQUALITY

  • Quantum communication complexity advantage implies violation of a Bell inequality

    Publication

    - PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA - Year 2016

    We obtain a general connection between a quantum advantage in communication complexity and non-locality. We show that given any protocol offering a (sufficiently large) quantum advantage in communication complexity, there exists a way of obtaining measurement statistics which violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical communication complexity can grow arbitrarily...

    Full text to download in external service

  • Trade-offs in multiparty Bell-inequality violations in qubit networks

    Publication

    - PHYSICAL REVIEW A - Year 2018

    Two overlapping bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms of monogamies that allow for violations...

    Full text available to download

  • Bound on Bell inequalities by fraction of determinism and reverse triangle inequality

    Publication
    • P. Joshi
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • R. Horodecki
    • B. Li
    • S. Szarek
    • T. Szarek

    - PHYSICAL REVIEW A - Year 2015

    It is an established fact that entanglement is a resource. Sharing an entangled state leads to nonlocal correlations and to violations of Bell inequalities. Such nonlocal correlations illustrate the advantage of quantum resources over classical resources. In this paper, we quantitatively study Bell inequalities with 2 × n inputs. As found in Gisin et al. [Int. J. Quantum. Inform. 05, 525 (2007)], quantum mechanical correlations...

    Full text available to download

  • Intrinsic asymmetry with respect to adversary: a new feature of Bell inequalities

    Publication

    - Journal of Physics A-Mathematical and Theoretical - Year 2014

    It is known that the local bound of a Bell inequality is sensitive to the knowledge of the external observer about the settings statistics. Here we ask how that sensitivity depends on the structure of that knowledge. It turns out that in some cases it may happen that the local bound is much more sensitive to the adversaryʼs knowledge about the settings of one party than the other. Remarkably, there are Bell inequalities which are...

    Full text to download in external service

  • Strong Monogamies of No-Signaling Violations for Bipartite Correlation Bell Inequalities

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2014

    The phenomenon of monogamy of Bell inequality violations is interesting both from the fundamental perspective as well as in cryptographic applications such as the extraction of randomness and secret bits. In this article, we derive new and stronger monogamy relations for violations of Bell inequalities in general no-signaling theories. These relations are applicable to the class of binary output correlation inequalities known as...

    Full text to download in external service

  • Robust amplification of Santha-Vazirani sources with three devices

    Publication

    - PHYSICAL REVIEW A - Year 2015

    We demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness....

    Full text available to download

  • Entangled rendezvous: a possible application of Bell non-locality for mobile agents on networks

    Publication

    Rendezvous is an old problem of assuring that two or more parties, initially separated, not knowing the position of each other, and not allowed to communicate, are striving to meet without pre-agreement on the meeting point. This problem has been extensively studied in classical computer science and has vivid importance to modern and future applications. Quantum non-locality, like Bell inequality violation, has shown that in many...

    Full text available to download

  • Quantum Steering Inequality with Tolerance for Measurement-Setting Errors: Experimentally Feasible Signature of Unbounded Violation

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2017

    uantum steering is a relatively simple test for proving that the values of quantum-mechanical measurement outcomes come into being only in the act of measurement. By exploiting quantum correlations, Alice can influence — steer — Bob ’ s physical system in a way that is impossible in classical mechanics, as shown by the violation of steering inequalities. Demonstrating this and similar quantum effects for systems of increasing size,...

    Full text to download in external service

  • Free randomness amplification using bipartite chain correlations

    Publication
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • M. Pawłowski
    • R. Ramanathan

    - PHYSICAL REVIEW A - Year 2014

    A direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...

    Full text available to download

  • Randomness Amplification under Minimal Fundamental Assumptions on the Devices

    Publication
    • R. Ramanathan
    • F. Brandão
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • H. Wojewódka

    - PHYSICAL REVIEW LETTERS - Year 2016

    Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...

    Full text available to download

  • Elemental and tight monogamy relations in nonsignaling theories

    Publication

    - PHYSICAL REVIEW A - Year 2014

    Physical principles constrain the way nonlocal correlations can be distributed among distant parties. These constraints are usually expressed by monogamy relations that bound the amount of Bell inequality violation observed among a set of parties by the violation observed by a different set of parties. We prove here that much stronger monogamy relations are possible for nonsignaling correlations by showing how nonlocal correlations...

    Full text available to download

  • Entanglement and Nonlocality are Inequivalent for Any Number of Parties

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2015

    Understanding the relation between nonlocality and entanglement is one of the fundamental problems in quantum physics. In the bipartite case, it is known that these two phenomena are inequivalent, as there exist entangled states of two parties that do not violate any Bell inequality. However, except for a single example of an entangled three-qubit state that has a local model, almost nothing is known about such a relation in multipartite...

    Full text to download in external service

  • Realistic noise-tolerant randomness amplification using finite number of devices

    Publication
    • F. Brandão
    • R. Ramanathan
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • T. Szarek
    • H. Wojewódka

    - Nature Communications - Year 2016

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...

    Full text to download in external service

  • Complementarity between entanglement-assisted and quantum distributed random access code

    Publication

    - PHYSICAL REVIEW A - Year 2017

    Collaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classical limitations. The two quantum variants of RACs, namely, quantum random access code (QRAC) and the entanglement-assisted random access code (EARAC), have demonstrated equal prowess for a number of tasks. However, there do exist specific...

    Full text available to download

  • A Loophole of All ‘Loophole-Free’ Bell-Type Theorems

    Publication

    Bell’s theorem cannot be proved if complementary measurements have to be represented by random variables which cannot be added or multiplied. One such case occurs if their domains are not identical. The case more directly related to the Einstein–Rosen–Podolsky argument occurs if there exists an ‘element of reality’ but nevertheless addition of complementary results is impossible because they are represented by elements from different...

    Full text available to download

  • Device-independent quantum key distribution based on measurement inputs

    Publication

    - PHYSICAL REVIEW A - Year 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Full text available to download

  • Marek Czachor prof. dr hab.

  • Relationship between semi- and fully-device-independent protocols

    Publication
    • H. Li
    • P. A. Mironowicz
    • M. Pawłowski
    • Z. Yin
    • Y. Wu
    • S. Wang
    • W. Chen
    • H. Hu
    • G. Guo
    • Z. Han

    - PHYSICAL REVIEW A - Year 2013

    We study the relation between semi and fully device independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter and vice versa. This relation provides us with interesting results for both scenarios. First, we find new random number generation protocols with higher bit rates for both the semi and fully device independent...

    Full text available to download