Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava.

Similar presentations


Presentation on theme: "1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava."— Presentation transcript:

1 1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava Vienna, February 3rd 2006 archiv:quant-ph/0510167, accepted for Phys. Rev. A

2 2 Contents 1.Bell’s Theorem 2.Local Realism and the Freedom of Choice 3.The CHSH and the Mermin Inequality 4.Quantum Cryptography

3 3 Bell‘s Theorem Locality:The result of a measurement performed on system A is unaffected by operations on a space-like separated system B Realism:Measurement results are determined by “hidden variables” which exist prior to and independent of observation Bell’ Theorem [Bell (1964)] : Local realism is in conflict with quantum mechanics Famous experiments:Freedman and Clauser (1972) Clauser and Horne (1974) Aspect (1981, 1982) Tittel et al. (1997) Weihs et al. (1998)

4 4 Loopholes in Bell Tests 1. Fair Sampling:the detected pairs are statistically significant (fair) representatives of all the emitted pairs experimental problem: detection efficiency 2. Locality:no causal mechanism whatsoever can bring information from one side to the other experimental problem: space-like separation 3. Freedom:the experimenter is free to choose the measurement settings

5 5 Agenda -assume local realism -for consistency with experiments: give up freedom -characterize (quantify) the “insane” consequences of such a program -show consequences in quantum cryptography

6 6 Freedom of Choice -2 separated partners, A and B, space-like separated experiments -A:settings: k = 1,2B:settings: l = 1,2 outcomes: X = +1,–1outcomes: Y = +1,–1 -measured probability for correlation:P(X=Y|kl) -local realism assumes a quadruple q = {X 1,X 2,Y 1,Y 2 } produced by the source for each run (pair), existing independently of whether any or which measurements are performed X  {X 1,X 2 }, Y  {Y 1,Y 2 } -mathematical probability for correlation:P(X k =Y l )

7 7 Freedom of Choice -measured probability for correlation:P(X=Y|kl) -mathematical probability for correlation:P(X k =Y l ) Freedom: [Gill et al. (2003)] The setting choice (k,l) is statistically independent of the quadruple q = {X 1,X 2,Y 1,Y 2 } in many thought repetitions of the experiment the probability of every possible value of q remains the same for any choice of the settings

8 8 Lack of Freedom Imagine:freedom is an illusion both choice of settings and results are consequences of a common local realistic mechanism experimenter’s choice is determined in advance or, e.g., the parity of the number of cars passing the laboratory within the next n seconds, where n is given by the cube of the fourth decimal of the actual temperature in degrees Fahrenheit, is correlated with the local realistic source which emits the particles Measure of the lack of freedom:

9 9 The CHSH Inequality The mathematical probabilities satisfy a set-theoretical constraint: CHSH inequality [Clauser et al. (1969)] : In terms of measured probabilities, with where adapted bound

10 10 CHSH Inequality with No Freedom Example: Local realistic mechanism with no freedom: -source “knows” (in advance) the measurement settings of A and B -whenever A and B both (will) measure their second setting (k = 2, l = 2), the source sends perfectly anti-correlated pairs: P(X=Y|22) = 0 -in the other three cases it sends perfectly correlated pairs P(X=Y|11) = P(X=Y|12) = P(X=Y|21) = 1 -then the logical bound of 3 can be reached: still satisfied as

11 11 CHSH Inequality with total Freedom Example: Local realistic mechanism with total freedom -complete freedom -the two inequalities become identical

12 12 Abandonment of Freedom -consider experiment with maximally entangled state -for perfect setting angles the measured CHSH expression can become -therefore, to keep a local realistic view which is in agreement with the experimental results, we have to have -hence the freedom has to be restricted (abandoned) at least by the amount -if we assume then

13 13 Generalization to N parties -N space-like separated parties -settings:k j  {1,2} outcomes:X (j)  {1,–1} -Local realism assumes existence of {X 1 (1),X 2 (1),…,X 1 (N),X 2 (N) } -mathematical probability for correlation -measured probability for correlation -lack of freedom

14 14 Mermin Inequality The mathematical probabilities satisfy a set-theoretical constraint, equivalent to the Mermin inequality [Mermin (1990), Żukowski et al. (2002)] : In terms of the measured probabilities: with adapted bound

15 15 Abandonment of Freedom -take maximally entangled N-party GHZ state -gap between non-adapted bound and experimental result increases exponentially with the number of partners -to explain experimental result local realistically, the freedom of each party has to be abandoned by the (exponentially fast saturating) amount

16 16 Intermediate Summary Local realistic picture with restricted experimenter’s freedom -local realistic bound increases -why is the (experimental) bound in the CHSH inequality 2.414 and not, e.g., the logical bound 3? -we had to introduce purely theoretical and experimentally not accessible entities, i.e., the mathematical probabilities P(X k =Y l ) -Occam’s razor? Popper’s falsifiability principle?

17 17 Quantum Cryptography Motivation -the violation of Bell’s inequality is necessary and sufficient for efficient extraction of a secret key [Gisin et al. (2002)] -if an eavesdropper Eve has (partial) knowledge about the settings of Alice and Bob (e.g., bad random-number generator), she can simulate a violation of Bell’s inequality and successfully eavesdrop [Hwang (2005)] -Connection: lack of freedom in a local realistic picture is equivalent to the fact that an eavesdropper has partial setting knowledge in a quantum experiment

18 18 The BBM–CHSH Protocol (  1,  1 ), (  2,  2 )key establishing measurement (  1,  3 ), (  2,  3 ), (  1  4 ), (  2,  4 )CHSH measurement orthogonal combinationsignore CHSH: ?

19 19 Eve’s Setting Knowledge -source sends a (maximally entangled) singlet pair in each run -Eve has partial setting knowledge -model: before each run Eve gets the probabilities for all 8 settings to be chosen q ij is the probability for (  i,  j ) with i = 1,2; j = 1,2,3,4 -for simplicity: one setting always has high probability:Q ≥ 1/8 the others have equal low probability: (1–Q)/7 -Q = 1: E: total knowledge,A and B: no freedom Q = 1/8:E: no knowledge,A and B: total freedom -Lack of freedom:

20 20 Eve’s Attack Algorithm -if q ij = Q, Eve attacks with the product state maximizes:P(X=–Y|13)  1 P(X=–Y|23)  1 P(X=–Y|24)  1 know the key for 11 and 22 -exception: q 14 = Q minimizes P(X=–Y|14)  0 -Eve always sends product states: local realism with restricted freedom or

21 21 CHSH Violation -CHSH can be violated for Q > 0.44 -but what about the secret key?

22 22 Bit Error Rate and Mutual Informations -bit error rate -mutual informations -best mutual information for a given D under the condition of no setting knowledge -secret key agreement iff(never fulfilled)

23 23 -Secret key extraction is never possible: -Critical error rate D 0 = 14.6 % at Q = Q 0 = 0.63 -Q > Q 0 protocol insecure:I AB ≤ I BE and D < D 0 and CHSH violated -Q ≤ Q0-Q ≤ Q0 protocol secure:I AB < I BE but D ≥ D 0 Alice and Bob will not use their key because they find D ≥ D 0 D > D 0 D < D 0

24 24 Consequences -the one-to-one correspondence between secret key extraction and violation of a Bell’s inequality is lost -depending on the amount of setting knowledge (Q) which is leaking out of the laboratories of A and B, they have to calculate (via an optimization procedure over all possible attacks) a new bound for CHSH -a violation of this adapted bound corresponds again to the possibility of secret key extraction (as this is equivalent to a violation of the “original” CHSH expression)

25 25 Conclusions -Bell’s theorem a local realistic description of the world can only be maintained if the experimenter’s freedom is partly abandoned -we quantified the degree of the lack of freedom for the CHSH and the Mermin inequality -quantum cryptography: the lack of freedom in a local realistic world is equivalent to a situation in which the eavesdropper has setting knowledge -if a certain knowledge threshold is beaten, the eavesdropper can find out the key without being revealed (neither by the error rate nor by the CHSH inequality) -the one-to-one correspondence between secret key extraction and violation of the CHSH inequality can only be restored by adapting the bound of the inequality


Download ppt "1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava."

Similar presentations


Ads by Google