arxiv: v1 [quant-ph] 30 Nov 2018

Similar documents
arxiv: v2 [quant-ph] 21 Oct 2013

arxiv: v2 [quant-ph] 22 Jun 2016

arxiv: v1 [quant-ph] 25 Jan 2018

Spatial versus Sequential Correlations for Random Access Coding

Bell inequality for qunits with binary measurements

Randomness in nonlocal games between mistrustful players

Device-Independent Quantum Information Processing

arxiv: v2 [quant-ph] 28 Jun 2017

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Device-Independent Quantum Information Processing (DIQIP)

Lecture 6: Quantum error correction and quantum capacity

Towards Solving Bilevel Optimization Problems in Quantum Information Theory

Quantum Information Processing and Diagrams of States

Experimental semi-device-independent certification of entangled measurements

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

Quantum state discrimination with post-measurement information!

More Randomness From Noisy Sources

Introduction to Quantum Information Hermann Kampermann

How to play two-players restricted quantum games with 10 cards

CS120, Quantum Cryptography, Fall 2016

Tutorial: Device-independent random number generation. Roger Colbeck University of York

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

CS/Ph120 Homework 1 Solutions

The Lovász ϑ-function in Quantum Mechanics

arxiv: v2 [quant-ph] 13 Jan 2011

arxiv: v2 [quant-ph] 16 Nov 2018

The CHSH game as a Bell test thought experiment

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Is Entanglement Sufficient to Enable Quantum Speedup?

Probabilistic exact cloning and probabilistic no-signalling. Abstract

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

arxiv: v2 [quant-ph] 2 Apr 2014

QUANTUM ADVICE ENHANCES SOCIAL OPTIMALITY IN THREE-PARTY CONFLICTING INTEREST GAMES

arxiv: v1 [quant-ph] 8 Feb 2016

Quantum-controlled measurement device for quantum-state discrimination

Entanglement and information

arxiv: v7 [quant-ph] 20 Mar 2017

Security of Device-Independent Quantum Key Distribution Protocols

arxiv: v4 [quant-ph] 4 Jan 2019

arxiv: v1 [quant-ph] 23 Jan 2015

arxiv: v2 [quant-ph] 19 Dec 2012

CAT L4: Quantum Non-Locality and Contextuality

Croatian Operational Research Review (CRORR), Vol. 3, 2012

1. Basic rules of quantum mechanics

Relativistic quantum pseudo-telepathy

arxiv: v3 [quant-ph] 20 Jan 2016

Quantum sampling of mixed states

arxiv: v2 [quant-ph] 26 Mar 2012

Einstein-Podolsky-Rosen correlations and Bell correlations in the simplest scenario

arxiv: v1 [quant-ph] 4 Jun 2018

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

Quantum Communication Complexity

arxiv: v1 [quant-ph] 7 Jun 2016

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig

Quantum information and quantum computing

The Single d-level Quantum System as a Resource for Information Processing.

Compression and entanglement, entanglement transformations

Device-independent quantum information. Valerio Scarani Centre for Quantum Technologies National University of Singapore

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS

Lecture 6 Sept. 14, 2015

Entanglement and non-locality of pure quantum states

Instantaneous Nonlocal Measurements

Quantum key distribution for the lazy and careless

Lecture: Quantum Information

Analysing the role of entanglement in the three-qubit Vaidman s game

Beginnings... Computers might as well be made of green cheese. It is no longer safe to assume this! The first axiom I learnt in Computer Science:

arxiv:quant-ph/ May 2002

Computational Algebraic Topology Topic B Lecture III: Quantum Realizability

CS/Ph120 Homework 4 Solutions

MP 472 Quantum Information and Computation

Security Implications of Quantum Technologies

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Lecture 20: Bell inequalities and nonlocality

Lecture 11 September 30, 2015

Quantum Information Transfer and Processing Miloslav Dušek

Quantum dice rolling

Optimal discrimination of quantum measurements. Michal Sedlák. Department of Optics, Palacký University, Olomouc, Czech Republic

Borromean Entanglement Revisited

Estimation of Optimal Singlet Fraction (OSF) and Entanglement Negativity (EN)

Lecture 4: Postulates of quantum mechanics

Entropy Accumulation in Device-independent Protocols

Quantification of Gaussian quantum steering. Gerardo Adesso

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Entanglement Manipulation

arxiv: v4 [quant-ph] 28 Feb 2018

Introduction to Quantum Key Distribution

Introduction to Quantum Computing

Quantum Correlations as Necessary Precondition for Secure Communication

arxiv:quant-ph/ v2 5 May 2003

SUPPLEMENTARY INFORMATION

A Refinement of Quantum Mechanics by Algorithmic Randomness and Its Application to Quantum Cryptography

Super-Quantum, Non-Signaling Correlations Cannot Exist

Quantum Correlations from Black Boxes

Quantum Information Types

Quantum theory without predefined causal structure

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

From the Kochen-Specker theorem to noncontextuality inequalities without assuming determinism

arxiv: v1 [quant-ph] 27 Apr 2015

An exponential separation between quantum and classical one-way communication complexity

Lecture 18: Quantum Information Theory and Holevo s Bound

Transcription:

Experimentally feasible semi-device-independent certification of 4 outcome POVMs arxiv:8.2872v [quant-ph 30 Nov 208 Piotr Mironowicz, 2, and Marcin Pawłowski 2, 3 Department of Algorithms and System Modeling, Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology 2 Institute of Theoretical Physics and Astrophysics, National Quantum Information Centre, Faculty of Mathematics, Physics and Informatics, University of Gdańsk, Wita Stwosza 57, 80-308 Gdańsk, Poland 3 Instytut Fizyki Teoretycznej i Astrofizyki, Uniwersytet Gdański, PL-80-952 Gdańsk, Poland (Dated: December 3, 208) In this paper we construct a semi-device-independent protocol able to certify the presence of the generalized measurements. We show robustness of the protocol and conclude that it allows for experimental realisations using current technology. Keywords: generalized measurement, POVM, device-independent Introduction.- Measurements lay in the heart of all physical sciences. The formalism of quantum mechanics defines them as projections on vectors in some abstract Hilbert space, yet they remain one of the most mysterious notions of the modern physics. Even though the formalism was elaborated many years ago [, the development of quantum information science lead to its significant enhancement, when so-called positive-operator valued measure (POVM) or generalised measurements have been introduced [2 4, originating in the problem of non-orthogonal states discrimination. A recent trend in quantum information, related to security and reliability issues, tries to formulate physical problems, protocols and experiments in so-called deviceindependent (DI) way [5, where one derives all conclusions about some phenomenon basing only on the observed results, not making assumptions regarding internal construction of devices involved. A popular relaxation of this approach is called semi-device-independent (SDI) [6, where some assumptions regarding devices are made. The most common assumption is a constraint on the dimension of quantum systems communicated between parts of the considered setup. From these two topic emerged a problem of SDI certification that some of the measurements performed by devices used in an experiment are POVMs. Surprisingly, the problem revealed to be very demanding. The first experiment certifying presence of generalized measurements [7 was based on a scheme involving entangled quantum states. Later similar approach was used to generate randomness from POVM outcomes [8. Yet, there was not known a method how to certify presence of generalized measurements without entangled states. The result of this paper is an SDI protocol using the prepare and measure scheme that is able to certify presence of a 4-outcome POVM in dimension two. We show that the robustness of the protocol makes it feasible for experimental realisations. Quantum Random Access Codes.- A key tool we use in this paper are so-called Random Access Codes (RACs) [9. In an n d RAC Alice is provided a uniformly distributed string of n dits, x = x x 2 x n. Her task is to encode the string into a single dit message m(x), in such a way that Bob is able to recover any of the n dits with high probability. Bob receives Alice s message m, and a referee provides him a uniformly distributed input y [n, where [n {, 2,..., n}. After this Bob performs classical (possibly probabilistic) computations of some function b(y, m). We say that the protocol succeeded when b(y, m(x)) = x y. The quantum analog of RACs are Quantum Random Access Codes (QRACs) [9. In n d QRAC Alice encodes the n-dit input x into a d-dimensional quantum system ρ x, that is then transmitted to Bob. He afterwards performs one of his n measurements (depending on the input y) to give his guess b for x y. Thus he guesses b with probability given by Tr[ρ x M y b, where the operators M y b are POVMs, i.e. positive and y b M y b = d, and d is the identity operator in dimension d. In this paper we consider degenerated POVMs, where some of the operators are allowed to be null. Note that Alice s only optimal strategy ( is to send a ) state ρ x maximizing the value of Tr [ρ x y [n M y xy. This is obtained if the state is in the subspace of vectors with maximal eigenvalue of the operator y [n M x y y. In both RACs and QRACs we consider the probability that Bob returns outcome b when his input is y, and Alice s input is x. We denote this probability by P (b x, y). The average success probability for RACs and QRACs is thus given by: nd n x [d n y [n P (x y x, y). () Reduction of 3 2 QRAC and its self-testing.- Now, let us focus on a 3 2 QRAC. In [0 it has been shown that this protocol posses a robust self-testing property [, meaning that there exist a unique set of optimal quantum states and measurements that maximizes it (up to some elementary transformations), and that if the experiment is close to the maximal value, then the states

2 and measurement are close to the optimal ones. Let { ρ x } and { M y b } (2) be these optimal states and measurements, respectively. To be more specific, Alice obtains here one of 8 possible inputs, and prepares one of 8 relevant qubits. In the perfect case of success probability ( S 3 = ) 3 + 0.78868 (3) 2 3 Bob performs a measurement in one of 3 MUBs in dimension 2, corresponding in this case to measuring observables given by Pauli operators {σ x, σ y, σ z }. From our observation regarding Alice s optimal encodings we find the unique preparation states maximizing the success probability. One can check [9 that the Bloch sphere representations of states { ρ 000, ρ 0, ρ 0, ρ 0 } and { ρ, ρ 00, ρ 00, ρ 00 } are located on the edges of regular tetrahedra, with relevant edges antipodal to each other. We provide the explicit representation of the former set of states in the Appendix in (0). Now, we apply the method of the so-called reduction of symmetric dimension witnesses introduced by us in [3 to show that the following expression (that is not a QRAC) posses a self-testing property: 2 x {000,0,0,0} y [3 P (x y x, y). (4) Indeed, let us assume that there exist a set of measurements of Bob {M y b } and states prepared by Alice {ρ x } x=000,0,0,0 optimal for (4) and different from { M y b } and { ρ x} x=000,0,0,0. Without loss of generality we may assume that Tr M y b = for all b and y [0. Let us now define ρ 2 ρ 000, ρ 00 2 ρ 0, ρ 00 2 ρ 0 and ρ 00 2 ρ 0. One can easily check that these states together with {M y b } maximizes the expression complementary to (4), i.e. 2 x {,00,00,00} y [3 P (x y x, y). (5) One can verify that the states { ρ x } and measurements { M y b } from (2) used for expressions (4) and (5) give for both cases success probability S 3, and the average of these game expressions is exactly 3 2 QRAC. From its self-testing property, the assumption that states {ρ x } and measurements {M y b } are not equal to these leads to contradiction, showing the self-testing property of both games (4) and (5). We briefly note here that an immediate consequence of the above construction is the possibility of deriving also the robustness of the self-testing of expressions (4) and (5) directly from robustness of the 3 2 QRAC [0. Indeed, consider the maximal distance δ of states and measurements from (2) that allows to reach the value S 3 ɛ by 3 2 QRAC, where to express the distance an arbitrary isotropic metric is used. Let δ 2 be the maximal distance from (2) that allows to reach the value S 3 ɛ in the reduced game (4). From isotropy of the metric we get the same maximal distance δ 2 for the reduced game (5), and we see that the same measurements can be used for both of these reduced games. From this and from the fact that 3 2 QRAC is the average of (4) and (5) we see that δ 2 δ. Robust POVM certification.- Let us now consider a more complicated task, where Alice and Bob are not only maximizing the expression (4) (i.e. the reduced 3 2 QRAC), but also minimizing probability of some other events. Let us introduce an additional 4th input of Bob, related to a 4-outcome measurement (with outcomes labelled, 2, 3, 4). The new expression we consider is: 2 x {000,0,0,0} y [3 where k > 0, and P (x y x, y) kg 4, (6) G 4 P ( 000, 4)+P (2 0, 4)+P (3 0, 4)+P (4 0, 4). (7) One can easily note, that the expression (6) cannot obtain value greater than S 3, and the value would be obtained only when the states { ρ x } and measurements { M y b } are used, and the part G 4 is equal 0. From this it follows that each operator {Mi 4 } has to be orthogonal to relevant state { ρ 000, ρ 0, ρ 0, ρ 0 }. Direct calculation shows that the 4th measurement is a POVM specified by operators given in the Appendix in (). All the above considerations referred to the perfect case when the maximal value S 3 of the expression (6) is observed. In real world experiment this will not be the case due to experimental imperfections. Thus, to provide an experimentally feasible certificate that a measurement is a 4-outcome POVM, we need to establish the robustness of the certification protocol. We note here, that in order to perform a conclusive experiment one does not need to calculate full robustness properties including distances of the states and measurements to the perfect one depending on the certificate value. For the purpose of the experiment it suffices to establish the scope of values of the certificate that guaranties the presence of 4 or 3 outcome POVM. In order to model the experimental imperfections we use the visibility of quantum states. The visibility ν means that whenever the state prepared in the perfect situation is ρ, the state occurring in the experiment is νρ + ν d d. This parameter represents the impact of the proper state in comparison to the white noise. Let N(k) be the value of the certificate (6) when all states

3 are completely noised. We have N(k) = (2 0.5 k 4 0.25). (8) 2 Let g j (k) denote the maximal value of the expression (6) when the 4th measurement has j outcomes, j = 2, 3, 4. We have g 4 (k) = S 3 for all k 0. The critical visibility ν j (k) needed to certify that j, j = 3, 4, outcomes are necessary to reproduce the experimental value are given by the expression: ν j (k) = g j (k) N S 3 N. (9) There exist a couple of methods of optimization of quantum expression with dimension constraints. One of them is the see-saw method [2, that optimizes within interior of the quantum theory, and is able to provide explicit form of states and measurements realizing the resulting value. The result of a maximization provides a lower-bound on the proper quantum value. Other methods optimize from exterior of the quantum theory (i.e. they provide relaxations of the quantum formalism) and include [3 5. These methods provide upper-bounds on results of maximizations. Recall that the assumed dimension constraint is two. critical visibility 0.995 0.99 0.985 0.98 0.975 0.97 4 outcome certification 3 outcome certification 0.965 0 2 4 6 8 0 FIG.. The values of critical visibilities needed to certify that a general measurement has been used in an experiment involving the game (6) for different values of k parameter. The results we obtained using the second level of the MLP relaxation [3 for k = are g 3 = 0.7864 and g 2 = 0.7793, relating to visibilities ν 4 = 0.9938 and ν 3 = 0.9747, respectively. The value g 2 is derived also in the see-saw method giving lower-bounds on the values of dimension constrained quantum scenarios, thus this value is exact. In the see-saw approximation of g 3 we obtained after multiple executions with random seeds the value 0.7856, thus establishing the scope of the possible exact value. Fig. shows critical visibilities obtained using the MLP relaxation for different values of k. The above result k means that whenever in an experiment one obtains the average value grater than g 3 (g 2 ), then a 4(3)-outcome POVM is certified to be used. The visibilities ν 4 and ν 3 seem to be experimentally feasible. For the sake of completeness the details of the probability distribution obtained using see-saw are given in the Appendix in Tabs I and II for k =. Conclusions.- In this paper we have presented a prepare and measure SDI protocol able to certify the presence of 4 outcome generalized measurements in dimension two. The robustness of the protocol allows for using it in real world experiments in laboratories [6. Even though the construction of the protocol was based on reduction of QRACs, the resulting states and measurements are closely related to so-called Elegant Bell Inequality [7 (EBI), which self-testing properties were shown recently [8. Using the methods of [3 it is possible to convert EBI to a prepare and measure protocol and, after the reduction operation, derive the same result as those presented above. The problem how to certify generalized measurements in different dimensions and with arbitrary number of outcomes remains open. The above construction suggests that a possible way to tackle this issue is related to similar QRAC constructions [9. This shows the benefit of using the above method in comparison to a simple conversion from existing entangled protocol using EBI. Acknowledgements.- During the completion of this manuscript, we became aware of an independent work [6 focused on selftesting of qubit POVMs. The paper was supported by National Science Centre (NCN) Grant No. 204/4/E/ST2/00020, First TEAM (Grant No. First TEAM/206-/5) and DS Programs of the Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology. The seesaw optimizations have been performed using OCTAVE [20 with SDPT3 solver [2, 22 and YALMIP toolbox [23. The MLP relaxation values have been calculated using Ncpol2spda package [24. piotr.mironowicz@gmail.com [ P. Dirac, The Principles of Quantum Mechanics, Oxford University Press, United Kingdom (930). [2 C. W. Helstrom, Quantum Detection and Estimation Theory, Academic Press, Inc. ISBN 023400503 (976). [3 I. D. Ivanovic, How to differentiate between nonorthogonal states, Physics Letters A, 23 6 (987). [4 A. Peres, How to differentiate between non-orthogonal states, Physics Letters A, 28,2 (988). [5 D. Mayers, A. Yao, Quantum Cryptography with Imperfect Apparatus, IEEE Symposium on Foundations of Computer Science (998). [6 M. Pawłowski, N. Brunner, Semi-device-independent security of one-way quantum key distribution, Phys. Rev. A 84, 00302(R) (20).

4 [7 E. S. Gómez, S. Gómez, P. Gonzalez, G. Cañas, J. F. Barra, A. Delgado, G. B. Xavier, A. Cabello, M. Kleinmann, T. Vértesi, G. Lima, Device-Independent Certification of a Nonprojective Qubit Measurement, Phys. Rev. Lett. 7, 26040 (206). [8 S. Gómez, A. Mattar, E. S. Gómez, D. Cavalcanti, O. J. Farias, A. Acin, G. Lima, Experimental nonlocalitybased randomness generation with non-projective measurements, Phys. Rev. A 97, 04002 (208). [9 A. Ambainis, D. Leung, L. Mancinska, M. Ozols, Quantum Random Access Codes with Shared Randomness, arxiv:080.2937 (2009). [0 A. Tavakoli, J. Kaniewski, T. Vértesi, D. Rosset, N. Brunner, Self-testing quantum states and measurements in the prepare-and-measure scenario, arxiv:80.08520 (208). [ A. Coladangelo, K. T. Goh, V. Scarani, All Pure Bipartite Entangled States can be Self-Tested, Nature Communications 8, 5485 (207). [2 K. F. Pal, T. Vértesi, Maximal violation of the I3322 inequality using infinite dimensional quantum systems, Phys. Rev. A 82, 0226 (200). [3 P. Mironowicz, H.-W. Li, M. Pawłowski, Properties of dimension witnesses and their semi-definite programming relaxations, Phys. Rev. A 90, 022322 (204). [4 M. Navascués, G. de la Torre, T. Vértesi, Characterization of quantum correlations with local dimension constraints and its device-independent applications, Phys. Rev. X 4, 00 (204). [5 M. Navascués, T. Vértesi, Bounding the set of finite dimensional quantum correlations, Phys. Rev. Lett. 5, 02050 (205). [6 A. Tavakoli, M. Smania, T. Vértesi, N. Brunner, M. Bourennane, Self-testing non-projective measurements (to appear on arxiv on 3-2-208). [7 N. Gisin, Bell inequalities: Many questions, a few answers, in Quantum Reality, Relativistic Causality, and Closing the Epistemic Circle: Essays in Honour of Abner Shimony, The Western Ontario Series in Philosophy of Science, edited by W. C. Myrvold and J. Christian, Vol. 73, p. 25 (2009). [8 O. Andersson, P. Badziąg, I. Bengtsson, I. Dumitru, A. Cabello, Self-testing properties of Gisin s elegant Bell inequality, Phys. Rev. A 96, 0329 (207). [9 P. Mironowicz et al., in preparation. [20 S. H. J. W. Eaton, D. Bateman, R. Wehbring, GNU Octave version 3.8. manual: a high-level interactive language for numerical computations. CreateSpace Independent Publishing Platform (204). [2 K. C. Toh, M. Todd, R. H. Tütüncü, Sdpt3 - a matlab software package for semidefinite programming, Optimization Methods and Software, vol., pp. 545-58 (999). [22 R. H. Tütüncü, K. C. Toh, M. J. Todd, Solving semidefinite-quadratic-linear programs using SDPT3, Mathematical Programming, vol. 95, no. 2, pp. 89-27 (2003). [23 J. Löfberg, Yalmip: A toolbox for modeling and optimization in Matlab, In Proceedings of the CACSD Conference, (Taipei, Taiwan), (2004). [24 P. Wittek. Algorithm 950: Ncpol2sdpa - Sparse Semidefinite Programming Relaxations for Polynomial Optimization Problems of Noncommuting Variables, ACM Transactions on Mathematical Software 4(3), 2, (205). Let α 3 3 6 and β 3 6. The state preparation are given by: ρ 000 = [ α β( + i) β( i) α [ α β( i) ρ 0 = β( + i) α [ α β( + i) ρ 0 = β( i) α [ α β( i) ρ 0 = β( + i) α (0a) (0b) (0c) (0d) The 4 outcome POVM used as the 4th measurement in the proposed protocol is given by M 4 = [ α β( i) 2 β( + i) α M2 4 = [ α β( + i) 2 β( i) α M 4 3 = 2 [ α β( i) β( + i) α M4 4 = [ α β( + i) 2 β( i) α (a) (b) (c) (d)

5 TABLE I. The probabilities obtained using see-saw method for the case when 4th measurement is assumed to have only two outcomes with non-zero probabilities and k =. The bold values are the ones that occur in (6). x P (0 x, ) P ( x, ) P (0 x, 2) P ( x, 2) P (0 x, 3) P ( x, 3) P ( x, 4) P (2 x, 4) P (3 x, 4) P (4 x, 4) 000 0.684 0.36 0.854 0.46 0.854 0.46 0.035 0.965 0 0 0 0.684 0.36 0.46 0.854 0.46 0.854 0.965 0.035 0 0 0 0.95 0.805 0.757 0.243 0.243 0.757 0.500 0.500 0 0 0 0.95 0.805 0.243 0.757 0.757 0.243 0.500 0.500 0 0 TABLE II. The probabilities obtained using see-saw method for the case when 4th measurement is assumed to have three outcomes with non-zero probabilities and k =. The bold values are the ones that occur in (6). x P (0 x, ) P ( x, ) P (0 x, 2) P ( x, 2) P (0 x, 3) P ( x, 3) P ( x, 4) P (2 x, 4) P (3 x, 4) P (4 x, 4) 000 0.765 0.235 0.765 0.235 0.856 0.44 0.008 0.496 0.496 0 0 0.765 0.235 0.44 0.856 0.235 0.765 0.496 0.008 0.496 0 0 0.44 0.856 0.765 0.235 0.235 0.765 0.496 0.496 0.008 0 0 0.235 0.765 0.235 0.765 0.765 0.235 0.333 0.333 0.333 0