Violation of space–time Bell-CHSH inequality beyond the Tsirelson bound and quantum cryptography

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Monogamy of nonlocal quantum correlations

We describe a new technique for obtaining Tsirelson bounds, or upper bounds on the quantum value of a Bell inequality. Since quantum correlations do not allow signaling, we obtain a Tsirelson bound by maximizing over all no-signaling probability distributions. This maximization can be cast as a linear program. In a setting where three parties, A, B, and C, share an entangled quantum state of ar...

متن کامل

Quantum Correlations and Bell Inequality Violation under Decoherence

Quantum Correlations are studied extensively in quantum information domain. Entanglement Measures and Quantum Discord are good examples of these actively studied correlations. Detection of violation in Bell inequalities is also a widely active area in quantum information theory world. In this work, we revisit the problem of analyzing the behavior of quantum correlations and violation of Bell in...

متن کامل

Quantum communication complexity advantage implies violation of a Bell inequality.

We obtain a general connection between a large quantum advantage in communication complexity and Bell nonlocality. We show that given any protocol offering a sufficiently large quantum advantage in communication complexity, there exists a way of obtaining measurement statistics that violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical...

متن کامل

Photon-Pair States and Violation of CHSH Inequality

Entangled states are important for quantum cryptography, being used in several protocols of quantum key distribution. These provide an alternative to single-photon-based protocols. Entangled states are also important in fundamental terms, in the way that the behavior of these states is contradictory with the predicted by local theories. This contradiction is shown by the violation of Bell’s ine...

متن کامل

A practical trojan horse for bell-inequality-based quantum cryptography

Quantum Cryptography, or more accurately, Quantum Key Distribution (QKD) is based on using an unconditionally secure “quantum channel” to share a secret key among two users. A manufacturer of QKD devices could, intentionally or not, use a (semi-)classical channel instead of the quantum channel, which would remove the supposedly unconditional security. One example is the BB84 protocol, where the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Pramana

سال: 2019

ISSN: 0304-4289,0973-7111

DOI: 10.1007/s12043-019-1830-3