Black-box Tomography Valerio Scarani Centre for Quantum Technologies & Dept of Physics National University of Singapore.

Slides:



Advertisements
Similar presentations
Pretty-Good Tomography Scott Aaronson MIT. Theres a problem… To do tomography on an entangled state of n qubits, we need exp(n) measurements Does this.
Advertisements

Robust device independent randomness amplification with few devices F.G.S.L Brandao 1, R. Ramanathan 2 A. Grudka 3, K. 4, M. 5,P. 6 Horodeccy 1 Department.
QCRYPT 2011, Zurich, September 2011 Lluis Masanes 1, Stefano Pironio 2 and Antonio Acín 1,3 1 ICFO-Institut de Ciencies Fotoniques, Barcelona 2 Université.
QAP SP5 Theory Serge Massar Publications for Year 1 – 115+ submitted/published (more than half of QAP output) – 11+ in PRL FOCS STOCS – 1 Review in Progress.
Fixing the lower limit of uncertainty in the presence of quantum memory Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators:
P LAYING ( QUANTUM ) GAMES WITH OPERATOR SPACES David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011.
Ilja Gerhardt QUANTUM OPTICS CQT GROUP Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Entanglement-based Free.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 / RAC 2211 Lecture.
Short course on quantum computing Andris Ambainis University of Latvia.
Bell inequality & entanglement
Bell’s inequalities and their uses Mark Williamson The Quantum Theory of Information and Computation
Quantum Computing MAS 725 Hartmut Klauck NTU
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
NMR Quantum Information Processing and Entanglement R.Laflamme, et al. presented by D. Motter.
Efficient Quantum State Tomography using the MERA in 1D critical system Presenter : Jong Yeon Lee (Undergraduate, Caltech)
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
T he Separability Problem and its Variants in Quantum Entanglement Theory Nathaniel Johnston Institute for Quantum Computing University of Waterloo.
Study and characterisation of polarisation entanglement JABIR M V Photonic sciences laboratory, PRL.
School of something FACULTY OF OTHER School of Physics and Astronomy FACULTY OF MATHEMATICAL AND PHYSICAL SCIENCES Introduction to entanglement Jacob Dunningham.
Is Communication Complexity Physical? Samuel Marcovitch Benni Reznik Tel-Aviv University arxiv
Spanish Cryptography Days, November 2011, Murcia, Spain Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Device-Independent.
Witnesses for quantum information resources Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata, India Collaborators: S. Adhikari,
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 16 (2011)
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
University of Gdańsk, Poland
Test for entanglement: realignment criterion, entanglement witness and positive maps Kai Chen † CQIQC, Toronto, July 2004 † Kai Chen is now a postdoctoral.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
Steering witnesses and criteria for the (non-)existence of local hidden state (LHS) models Eric Cavalcanti, Steve Jones, Howard Wiseman Centre for Quantum.
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
A comparison between Bell's local realism and Leggett-Garg's macrorealism Group Workshop Friedrichshafen, Germany, Sept 13 th 2012 Johannes Kofler.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
H ij Entangle- ment flow multipartite systems [1] Numerically computed times assuming saturated rate equations, along with the lower bound (solid line)
Quantum randomness and the device-independent claim Valerio Scarani Acknowledgment: Singapore MoE Academic Research Fund Tier 3 MOE2012- T “Random.
Minimal multipartite entanglement detecion Dr Marcin Wieśniak, Instytut Fizyki Teoretycznej i Astrofizyki, Uniwersytet Gdański Marcin Wieśniak, Koji Maruyama,
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
What are the minimal assumptions needed for infinite randomness expansion? Henry Yuen (MIT) Stellenbosch, South Africa 27 October 2015.
Nonlocality test of continuous variable state 17, Jan,2003 QIPI meeting Wonmin Son Queen’s University, Belfast.
Multipartite Entanglement and its Role in Quantum Algorithms Special Seminar: Ph.D. Lecture by Yishai Shimoni.
Fine-grained Uncertainty Relations and Quantum Steering Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators: T. Pramanik.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Antonio Acín
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Can small quantum systems learn? NATHAN WIEBE & CHRISTOPHER GRANADE, DEC
Non-Locality Swapping and emergence of quantum correlations Nicolas Brunner Paul Skrzypczyk, Sandu Popescu University of Bristol.
Quantum Non-locality: From Bell to Information Causality Alex Thompson Physics 486 March 7, 2016.
Fine-grained uncertainty and security of key generation Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators: T. Pramanik.
Entanglement Detection Gühne & Tóth, Physics Reports 474 (2009). Superradiance: … Theory of Collective Spontaneous Emission Gross & Haroche, Physics Reports.
QUANTUM OPTICS LAB IAP, UNIVERSITÄT BERN Qudit Implementations with Energy-Time Entangled Photons 1 Bänz Bessire Quantum Optics Lab – The Stefanov Group.
Secret keys and random numbers from quantum non locality Serge Massar.
Non-locality and quantum games Dmitry Kravchenko University of Latvia Theory days at Jõulumäe, 2008.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptography and Non-Locality Valerio Scarani Centre for Quantum Technologies National University of Singapore Ph.D. and post-doc positions available Barrett.
The device-independent outlook on quantum physics Definitions Part 1: History Part 2: self-testing Valerio Scarani.
Quantum nonlocality based on finite-speed causal influences
Understanding Quantum Correlations
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 16 (2009) Richard.
M. Stobińska1, F. Töppel2, P. Sekatski3,
Simulating entanglement without communication
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
CV Cryptography Using a Bidirectional Quantum Channel
Time and Quantum from Correlations
Sequential sharing of nonlocal correlations
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 16 (2009) Richard.
Determining the capacity of any quantum computer to perform a useful computation Joel Wallman Quantum Resource Estimation June 22, 2019.
Presentation transcript:

Black-box Tomography Valerio Scarani Centre for Quantum Technologies & Dept of Physics National University of Singapore

THE POWER OF BELL On the usefulness of Bell’s inequalities

Bell’s inequalities: the old story Measurement on spatially separated entangled particles  correlations Can these correlations be due to “local variables” (pre-established agreement)? Violation of Bell’s inequalities: the answer is NO! OK lah!! We have understood that quantum physics is not “crypto-deterministic”, that local hidden variables are really not there… We are even teaching it to our students! Can’t we move on to something else???

A bit of history Entanglement Theory Bell ineqs Around the year 2000, all serious physicists were not concerned about Bell’s inequalities. All? No! A small village…

Bell’s inequalities: the new story Bell’s inequalities = entanglement witnesses independent of the details of the system! If violation of Bell and no-signaling, then there is entanglement inside… … and the amount of the violation can be used to quantify it! Counterexample: Entanglement witness for two qubits, i.e. if X=  x etc But not for e.g. two 8-dimensional systems: just define Quantify what?

Tasks Device-independent security of QKD –Acín, Brunner, Gisin, Massar, Pironio, Scarani, PRL 2007 –Related topic: KD based only on no-signaling (Barrett-Hardy- Kent, Acin-Gisin-Masanes etc) Intrinsic randomness –Acín, Massar, Pironio, in preparation Black-box tomography of a source –New approach to “device-testing” (Mayers-Yao, Magniez et al) –Liew, McKague, Massar, Bardyn, Scarani, in preparation Dimension witnesses –Brunner, Pironio, Acín, Gisin, Methot, Scarani, PRL2008 –Related works: Vertési-Pál, Wehner-Christandl-Doherty, Briët- Buhrman-Toner

BLACK-BOX TOMOGRAPHY Work in collaboration with: Timothy Liew, Charles-E. Bardyn (CQT) Matthew McKague (Waterloo) Serge Massar (Brussels)

The scenario The User wants to build a quantum computer. The Vendor advertises good-quality quantum devices. Before buying the devices needed to run Shor’s algorithm, U wants to make sure that V’s products are worth buying. But of course, V does not reveal the design  U must check everything with devices sold by V. Meaning of “V adversarial”: = “V wants to make little effort in the workshop and still sell his products”  “V wants to learn the result of the algorithm” (as in QKD).

Usual vs Black-box tomography ?? Usual: the experimentalists know what they have done: the dimension of the Hilbert space (hmmm…), how to implement the observables, etc. Black-box: the Vendor knows, but the User does not know anything of the physical system under study. Here: estimate the quality of a bipartite source with the CHSH inequality. (first step towards Bell-based device-testing, cf. Mayers-Yao).

Reminder: CHSH inequality dichotomic observables Two parties Two measurements per party Two outcomes per measurement Maximal violation in quantum physics: S=2  2 (Clauser, Horne, Shimony, Holt 1969)

Warm-up: assume two qubits The figure of merit: Trace distance: bound on the prob of distinguishing Solution: Tight bound, reached by Proof: use spectral decomposition of CHSH operator.  : the ideal state U: check only S=CHSH  up to LU S: the amount of violation of the CHSH inequality

How to get rid of the dimension? Theorem: two dichotomic observables A, A’ can be simultaneously block-diagonalized with blocks of size 1x1 or 2x2.               “”“”“”“”

Multiple scenarios       “”“”“”“” We have derived       “  ” But after all, black-box  it’s also possible to have i.e. an additional LHV that informs each box on the block selected in the other box (note: User has not yet decided btw A,A’ and B,B’). Compare this second scenario with the first: For a given , S can be larger  D(S) may be larger. But the set of reference states is also larger  D(S) may be smaller.  No obvious relation between the two scenarios!

Partial result       “  ” F S 2222 2 1/41/21 2 qubits Fidelity: tight Trace distance: not tight

Summary of results on D(S) S D(S) 2222 1/  2  3/2 2 qubits tight Arbitrary d, pure states, achievable. Arbitrary d, any state, scenario (  ), not tight Note: general bound provably worse than 2-qubit calculation!

Conclusions Bell inequality violated  Entanglement No need to know “what’s inside”. QKD, randomness, device-testing… This talk: tomography of a source –Bound on trace distance from CHSH –Various meaningful definitions No-signaling to be enforced, detection loophole to be closed