Maximally nonlocal Clauser-Horne-Shimony-Holt scenarios

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Characterization of maximally entangled two-qubit states via the Bell-Clauser-Horne-Shimony-Holt inequality

Maximally entangled states should maximally violate the Bell inequality. In this paper, it is proved that all two-qubit states that maximally violate the Bell-Clauser-Horne-Shimony-Holt inequality are exactly Bell states and the states obtained from them by local unitary transformations. The proof is obtained by using the certain algebraic properties that Pauli’s matrices satisfy. The argument ...

متن کامل

Tsirelson bounds for generalized Clauser-Horne-Shimony-Holt inequalities

Quantum theory imposes a strict limit on the strength of non-local correlations. It only allows for a violation of the CHSH inequality up to the value 2 √ 2, known as Tsirelson’s bound. In this paper, we consider generalized CHSH inequalities based on many measurement settings with two possible measurement outcomes each. We demonstrate how to prove Tsirelson bounds for any such generalized CHSH...

متن کامل

General correlation functions of the Clauser-Horne-Shimony-Holt inequality for arbitrarily high-dimensional systems.

We generalize the correlation functions of the Clauser-Horne-Shimony-Holt (CHSH) inequality to arbitrarily high-dimensional systems. Based on this generalization, we construct the general CHSH inequality for bipartite quantum systems of arbitrarily high dimensionality, which takes the same simple form as CHSH inequality for two dimensions. This inequality is optimal in the same sense as the CHS...

متن کامل

Secrecy in Prepare-and-Measure Clauser-Horne-Shimony-Holt Tests with a Qubit Bound.

The security of device-independent (DI) quantum key distribution (QKD) protocols relies on the violation of Bell inequalities. As such, their security can be established based on minimal assumptions about the devices, but their implementation necessarily requires the distribution of entangled states. In a setting with fully trusted devices, any entanglement-based protocol is essentially equival...

متن کامل

Decoy state measurement-device-independent quantum key distribution based on the Clauser-Horne-Shimony-Holt inequality

Chun-Mei Zhang, Mo Li, Hong-Wei Li, Zhen-Qiang Yin, Dong Wang, Jing-Zheng Huang, Yun-Guang Han, Man-Li Xu, Wei Chen, Shuang Wang, Patcharapong Treeviriyanupab, Guang-Can Guo, Zheng-Fu Han 1 Key Laboratory of Quantum Information, CAS, and Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei 230026, China State Key Laboratory ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Scientific Reports

سال: 2018

ISSN: 2045-2322

DOI: 10.1038/s41598-018-24970-3