1 / 28

Feynman Festival, Olomouc, June 2009

Quantum correlations and device-independent quantum information protocols. Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani. Feynman Festival, Olomouc, June 2009. Scenario. Distant parties performing m different measurements of r outcomes.

cailin-barr
Download Presentation

Feynman Festival, Olomouc, June 2009

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Quantum correlations and device-independent quantum information protocols Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Feynman Festival, Olomouc, June 2009

  2. Scenario Distant parties performing m different measurements of r outcomes. x=1,…,m y=1,…,m a=1,…,r b=1,…,r Bob Alice Vector of m2r2 positive components satisfying m2 normalization conditions

  3. Physical Correlations Physical principles translate into limits on correlations 1) Classical correlations: correlations established by classical means. These are the standard “EPR” correlations. Independently of fundamental issues, these are the correlations achievable by classical resources. Bell inequalities define the limits on these correlations. For a finite number of measurements and results, these correlations define a polytope, a convex set with a finite number of extreme points.

  4. Physical Correlations 2) Quantum correlations: correlations established by quantum means. The set of quantum correlations is again convex, but not a polytope, even if the number of measurements and results is finite. 3) No-signalling correlations: correlations compatible with the no-signalling principle, i.e. the impossibility of instantaneous communication. The set of no-signalling correlations defines again a polytope.

  5. Physical Correlations Bell Popescu-Rohrlich BLMPPR Example: 2 inputs of 2 outputs CHSH inequality Trivial facets

  6. Motivation Is p(a,b|x,y) a quantum probability? Example: Are these correlations quantum? No constraint on the dimension → pure states and projective measurements

  7. Motivation • What are the allowed correlations within our current description of Nature? • How can we detect the non-quantumness of some observed correlations? Quantum analogues of Bell inequalities. • What are the limits on correlations associated to the quantum formalism? • To which extent Quantum Mechanics is useful for information tasks? Previous work by Tsirelson and Wehner

  8. Device-Independent Quantum Information protocols Goal: to construct information protocols where the parties can see their devices as quantum black-boxes → no assumption on the devices. x=1,…,m y=1,…,m a=1,…,r b=1,…,r Bob Alice

  9. Outline of the talk • Introduction • Hierarchy of necessary conditions for quantum correlations • Definition of the hierarchy • Discussion of convergence • Device-Independent Quantum Information protocols • Quantum Key Distribution • Randomness Generation • Conclusions / Open questions

  10. Hierarchy of necessary conditions Given a probability distribution p(a,b|x,y), we have defined a hierarchy consisting of a series of tests based on semi-definite programming techniques allowing the detection of supra-quantum correlations. YES YES YES YES NO NO NO Is the hierarchy complete?

  11. Convergence of the hierarchy 1) If some correlations satisfy all the hierarchy, then: with ? 2) Rank loops: If  ns.t.the distribution is quantum.

  12. Device-Independent QKD Standard QKD protocols based their security on: • Quantum Mechanics: any eavesdropper, however powerful, must obey the laws of quantum physics. • No information leakage: no unwanted classical information must leak out of Alice's and Bob's laboratories. • Trusted Randomness:Alice and Bob have access to local random number generators. • Knowledge of the devices: Alice and Bob require some control (model) of the devices. Is there a protocol for secure QKD based on without requiring any assumption on the devices?

  13. Security against collective attacks • Device-Independent protocol based on the CHSH Bell inequality. • Collective attacks: Eve prepares always the same state and measurements (identical and independent realizations). • Bound on Eve’s information as a function of the observed error and Bell inequality violation. The obtained critical QBER is of approx 7.1%

  14. Can the presence of randomness be guaranteed by any physical mechanism?

  15. Randomness tests • Good randomness is usually verified by a series of statistical tests. • There exist chaotic systems, of deterministic nature, that pass all existing randomness tests. Uchida et al., Nat. Phot. 2, 728 (2008) • Do these tests really certify the presence of randomness?

  16. Known solutions • Classical Random Number Generators (CRNG): all of them are of deterministic Nature. • Quantum Random Number Generators (QRNG): all the existing solution require some knowledge of the devices. The provider has to be trusted. • In any case, all the solutions guarantee the randomness using standard statistical randomness tests. The standard solution crucially depends on the details of the device used for the random number generation.

  17. Private Randomess • Many applications require private randomness. • Untrusted scenario: can one be sure that nobody has a deterministic model for the observed randomness? ... Classical Memory …

  18. Random Numbers from Bell’s Theorem • Randomness can be certified in the quantum world by means of non-local correlations, i.e. the violation of a Bell inequality. • The obtained randomness is private. • It represents a novel application of Quantum Information Theory, solving a task whose classical realization is, at least, unclear. • Our findings can be used to design Device-Independent Quantum Randomness Expanders.

  19. Random Numbers from Bell’s Theorem We want to explore the relation between non-locality, measured by the violationβof a Bell inequality, and local randomness, quantified by . Clearly, if β=0 →r=1. x=1,2 y=1,2 a=+1,-1 b=+1,-1 NOTE: In all what follows, loopholes are not analyzed. They are important when considering the practical implementation of these ideas.

  20. Results All the region above the curve is impossible within Quantum Mechanics.

  21. Statement of the problem We have developed an asymptotically convergent series of sets approximating the quantum set.

  22. Other Bell inequalities x=1,2 y=1,2 The same computation can be done for other inequalities, such as the CGLMP Bell inequality. a=1,…,r b=1,…,r One gets a perfectly random trit. The only known way of obtaining this point is by measuring a non-maximally entangled state. The more non-local → the more random

  23. Randomness Witnesses The CHSH inequality at the maximal quantum violation defines a tangent to the quantum boundary. We consider other hyper-planes tangent to the quantum set. classical quantum The maximal quantum violation of any of these inequalities always guarantees perfect randomness. Arbitrarily small amounts of quantum non-locality give perfect randomness.

  24. Device-Independent Quantum Randomness Expanders A device violating a Bell’s inequality can be used to generate random numbers. However, randomness is needed for the Bell test → Randomness Expander! Kent & Kollbeck In these devices, the two outcomes contain randomnessand are useful. In the limit of very large αone gets two random bits. Quantum Theory is as random as possible. This is not the case for general no-signaling theories, where the number of random bits is at most one.

  25. Quantum correlations • Hierarchy of necessary condition for detecting the quantum origin of correlations. • Each condition can be mapped into an SDP problem. • Is this hierarchy complete for tensor product measurements? • How does this picture change if we fix the dimension of the quantum system? • Are all finite correlations achievable measuring finite-dimensional quantum systems?

  26. Random Numbers from Bell’s Theorem • Randomness can be certified in the quantum world by means of non-local correlations, i.e. the violation of a Bell inequality. • The obtained randomness is private. • It represents a novel application of Quantum Information Theory, solving a task whose classical realization is, at least, unclear. • Our findings can be used to design Device-Independent Quantum Randomness Expanders.

  27. Take-home question (C or Q)RNG DIQRNE Specifications: it passes all statistical randomness tests. Specifications: It won’t pass all the existing randomness tests! Which device is more random?

  28. Thanks for your attention! Post-doc and PhD positions available in the group, see www.icfo.es

More Related