Extending loophole-free nonlocal correlations to arbitrarily large distances (2211.14231v2)
Abstract: One of the most striking features of quantum theory is that it allows distant observers to share correlations that resist local hidden variable (classical) explanations, a phenomenon referred to as Bell nonlocality. Besides their foundational relevance, the nonlocal correlations enable distant observers to accomplish classically inconceivable information processing and cryptographic feats such as unconditionally secure device-independent key distribution schemes. However, the distances over which nonlocal correlations can be realized in state-of-the-art Bell experiments remain severely limited owing to the high threshold efficiencies of the detectors and the fragility of the nonlocal correlations to experimental noise. Instead of looking for quantum strategies with marginally lower threshold requirements, we exploit the properties of loophole-free nonlocal correlations, which are experimentally attainable today, albeit at short distances, to extend them over arbitrarily large distances. Specifically, we consider Bell experiments wherein the spatially separated parties randomly choose the location of their measurement devices in addition to their measurement settings. We demonstrate that when devices close to the source are perfect and witness extremal loophole-free nonlocal correlations, such correlations can be extended to devices placed arbitrarily far from the source, with almost-zero detection efficiency and visibility. To accommodate imperfections close to the source, we demonstrate a specific analytical tradeoff: the higher the loophole-free nonlocality close to the source, the lower the threshold requirements away from the source. We utilize this analytical tradeoff paired with optimal quantum strategies to estimate the critical requirements of a measurement device placed away from the source and formulate a versatile numerical method applicable to generic network scenarios.
- J. S. Bell, On the Einstein Podolsky Rosen paradox, Physics Physique Fizika 1, 195 (1964).
- A. K. Ekert, Quantum cryptography based on Bell’s theorem, Phys. Rev. Lett. 67, 661 (1991).
- D. Mayers and A. Yao, Quantum cryptography with imperfect apparatus, in Proceedings 39th Annual Symposium on Foundations of Computer Science (IEEE, Los Alamitos, CA, 1998) p. 503.
- J. Barrett, L. Hardy, and A. Kent, No signaling and quantum key distribution, Phys. Rev. Lett. 95, 010503 (2005).
- U. Vazirani and T. Vidick, Fully device-independent quantum key distribution, Phys. Rev. Lett. 113, 140501 (2014).
- R. Colbeck, Quantum and relativistic protocols for secure multi-party computation, Ph.D. thesis, University of Cambridge (2009).
- P. M. Pearle, Hidden-variable example based upon data rejection, Phys. Rev. D 2, 1418 (1970).
- A. Garg and N. D. Mermin, Detector inefficiencies in the Einstein-Podolsky-Rosen experiment, Phys. Rev. D 35, 3831 (1987).
- Optical fiber loss and attenuation, https://www.fiberoptics4sale.com/blogs/archive-posts/95048006-optical-fiber-loss-and-attenuation, accessed: 2022-11-25.
- P. H. Eberhard, Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment, Phys. Rev. A 47, R747 (1993).
- T. Vértesi, S. Pironio, and N. Brunner, Closing the detection loophole in Bell experiments using qudits, Phys. Rev. Lett. 104, 060401 (2010).
- J.-Å. Larsson and J. Semitecolos, Strict detector-efficiency bounds for n-site clauser-horne inequalities, Phys. Rev. A 63, 022117 (2001).
- A. Cabello, D. Rodríguez, and I. Villanueva, Necessary and sufficient detection efficiency for the mermin inequalities, Phys. Rev. Lett. 101, 120402 (2008).
- K. F. Pál, T. Vértesi, and N. Brunner, Closing the detection loophole in multipartite bell tests using greenberger-horne-zeilinger states, Phys. Rev. A 86, 062111 (2012).
- A. Cabello and J.-Å. Larsson, Minimum detection efficiency for a loophole-free atom-photon Bell experiment, Phys. Rev. Lett. 98, 220402 (2007).
- G. Garbarino, Minimum detection efficiencies for a loophole-free observable-asymmetric Bell-type test, Phys. Rev. A 81, 032106 (2010).
- O. Nieto-Silleras, S. Pironio, and J. Silman, Using complete measurement statistics for optimal device-independent randomness evaluation, New Journal of Physics 16, 013035 (2014).
- J.-D. Bancal, L. Sheridan, and V. Scarani, More randomness from the same data, New Journal of Physics 16, 033011 (2014).
- M. Czechlewski and M. Pawłowski, Influence of the choice of postprocessing method on bell inequalities, Phys. Rev. A 97, 062123 (2018).
- I. Šupić and J. Bowles, Self-testing of quantum systems: a review, Quantum 4, 337 (2020).
- A. Acín, S. Massar, and S. Pironio, Randomness versus nonlocality and entanglement, Phys. Rev. Lett. 108, 100402 (2012).
- M. Navascués, S. Pironio, and A. Acín, A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations, New Journal of Physics 10, 073013 (2008).
- P. Brown, H. Fawzi, and O. Fawzi, Computing conditional entropies for quantum correlations, Nature Communications 12, 575 (2021).
- E. P. Lobo, J. Pauwels, and S. Pironio, Certifying long-range quantum correlations through routed bell tests (2023), arXiv:2310.07484 [quant-ph] .
- P. Wittek, Algorithm 950: Ncpol2sdpa—sparse semidefinite programming relaxations for polynomial optimization problems of noncommuting variables, ACM Transactions on Mathematical Software (TOMS) 41, 1 (2015).
- J. Löfberg, Yalmip : A toolbox for modeling and optimization in matlab, in Proceedings of the CACSD Conference (Taipei, Taiwan, 2004).
- M. ApS, The MOSEK optimization toolbox for MATLAB manual. Version 9.0. (2019).
- S. Massar and S. Pironio, Violation of local realism versus detection efficiency, Phys. Rev. A 68, 062109 (2003).