scholarly journals Characterising and bounding the set of quantum behaviours in contextuality scenarios

Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 484
Author(s):  
Anubhav Chaturvedi ◽  
Máté Farkas ◽  
Victoria J Wright

The predictions of quantum theory resist generalised noncontextual explanations. In addition to the foundational relevance of this fact, the particular extent to which quantum theory violates noncontextuality limits available quantum advantage in communication and information processing. In the first part of this work, we formally define contextuality scenarios via prepare-and-measure experiments, along with the polytope of general contextual behaviours containing the set of quantum contextual behaviours. This framework allows us to recover several properties of set of quantum behaviours in these scenarios, including contextuality scenarios and associated noncontextuality inequalities that require for their violation the individual quantum preparation and measurement procedures to be mixed states and unsharp measurements. With the framework in place, we formulate novel semidefinite programming relaxations for bounding these sets of quantum contextual behaviours. Most significantly, to circumvent the inadequacy of pure states and projective measurements in contextuality scenarios, we present a novel unitary operator based semidefinite relaxation technique. We demonstrate the efficacy of these relaxations by obtaining tight upper bounds on the quantum violation of several noncontextuality inequalities and identifying novel maximally contextual quantum strategies. To further illustrate the versatility of these relaxations, we demonstrate monogamy of preparation contextuality in a tripartite setting, and present a secure semi-device independent quantum key distribution scheme powered by quantum advantage in parity oblivious random access codes.

2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Zheng-Hao Liu ◽  
Jie Zhou ◽  
Hui-Xian Meng ◽  
Mu Yang ◽  
Qiang Li ◽  
...  

AbstractThe Greenberger–Horne–Zeilinger (GHZ) paradox is an exquisite no-go theorem that shows the sharp contradiction between classical theory and quantum mechanics by ruling out any local realistic description of quantum theory. The investigation of GHZ-type paradoxes has been carried out in a variety of systems and led to fruitful discoveries. However, its range of applicability still remains unknown and a unified construction is yet to be discovered. In this work, we present a unified construction of GHZ-type paradoxes for graph states, and show that the existence of GHZ-type paradox is not limited to graph states. The results have important applications in quantum state verification for graph states, entanglement detection, and construction of GHZ-type steering paradox for mixed states. We perform a photonic experiment to test the GHZ-type paradoxes via measuring the success probability of their corresponding perfect Hardy-type paradoxes, and demonstrate the proposed applications. Our work deepens the comprehension of quantum paradoxes in quantum foundations, and may have applications in a broad spectrum of quantum information tasks.


2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Peter Brown ◽  
Hamza Fawzi ◽  
Omar Fawzi

AbstractThe rates of quantum cryptographic protocols are usually expressed in terms of a conditional entropy minimized over a certain set of quantum states. In particular, in the device-independent setting, the minimization is over all the quantum states jointly held by the adversary and the parties that are consistent with the statistics that are seen by the parties. Here, we introduce a method to approximate such entropic quantities. Applied to the setting of device-independent randomness generation and quantum key distribution, we obtain improvements on protocol rates in various settings. In particular, we find new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution without additional preprocessing. Furthermore, we show that our construction can be readily combined with the entropy accumulation theorem in order to establish full finite-key security proofs for these protocols.


2009 ◽  
Vol 282 (14) ◽  
pp. 3037-3039 ◽  
Author(s):  
Huani Zhang ◽  
Jindong Wang ◽  
Xiaobao Liu ◽  
Zhengjun Wei ◽  
Songhao Liu

2009 ◽  
Vol 9 (1&2) ◽  
pp. 62-80
Author(s):  
H. Gomez-Sousa ◽  
M. Curty

In this paper, we investigate limitations imposed by sequential attacks on the performance of a differential-phase-shift (DPS) quantum key distribution (QKD) protocol with weak coherent pulses. Specifically, we analyze a sequential attack based on optimal unambiguous discrimination of the relative phases between consecutive signal states emitted by the source. We show that this attack can provide tighter upper bounds for the security of a DPS QKD scheme than those derived from sequential attacks where the eavesdropper aims to identify the state of each signal emitted by the source unambiguously.


2018 ◽  
Vol 15 (12) ◽  
pp. 1850207 ◽  
Author(s):  
Satyajit Guin

We define the notion of tensor product of supersymmetric [Formula: see text] spectral data in the context of supersymmetric quantum theory and noncommutative geometry. We explain in which sense our definition is canonical and also establish its compatibility with the tensor product of [Formula: see text] spectral data defined earlier by Connes. As an application, we show that the unitary connections on the individual [Formula: see text] spectral data give rise to a unitary connection on the product [Formula: see text] spectral data.


Sign in / Sign up

Export Citation Format

Share Document