Violation of space–time Bell-CHSH inequality beyond the Tsirelson bound and quantum cryptography
نویسندگان
چکیده
منابع مشابه
Monogamy of nonlocal quantum correlations
We describe a new technique for obtaining Tsirelson bounds, or upper bounds on the quantum value of a Bell inequality. Since quantum correlations do not allow signaling, we obtain a Tsirelson bound by maximizing over all no-signaling probability distributions. This maximization can be cast as a linear program. In a setting where three parties, A, B, and C, share an entangled quantum state of ar...
متن کاملQuantum Correlations and Bell Inequality Violation under Decoherence
Quantum Correlations are studied extensively in quantum information domain. Entanglement Measures and Quantum Discord are good examples of these actively studied correlations. Detection of violation in Bell inequalities is also a widely active area in quantum information theory world. In this work, we revisit the problem of analyzing the behavior of quantum correlations and violation of Bell in...
متن کاملQuantum communication complexity advantage implies violation of a Bell inequality.
We obtain a general connection between a large quantum advantage in communication complexity and Bell nonlocality. We show that given any protocol offering a sufficiently large quantum advantage in communication complexity, there exists a way of obtaining measurement statistics that violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical...
متن کاملPhoton-Pair States and Violation of CHSH Inequality
Entangled states are important for quantum cryptography, being used in several protocols of quantum key distribution. These provide an alternative to single-photon-based protocols. Entangled states are also important in fundamental terms, in the way that the behavior of these states is contradictory with the predicted by local theories. This contradiction is shown by the violation of Bell’s ine...
متن کاملA practical trojan horse for bell-inequality-based quantum cryptography
Quantum Cryptography, or more accurately, Quantum Key Distribution (QKD) is based on using an unconditionally secure “quantum channel” to share a secret key among two users. A manufacturer of QKD devices could, intentionally or not, use a (semi-)classical channel instead of the quantum channel, which would remove the supposedly unconditional security. One example is the BB84 protocol, where the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Pramana
سال: 2019
ISSN: 0304-4289,0973-7111
DOI: 10.1007/s12043-019-1830-3