| Literature DB >> 32764651 |
Shihan Sajeed1,2,3,4, Nigar Sultana5,6, Charles Ci Wen Lim7,8, Vadim Makarov9,10,11.
Abstract
It is well-known that no local model-in theory-can simulate the outcome statistics of a Bell-type experiment as long as the detection efficiency is higher than a threshold value. For the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality this theoretical threshold value is [Formula: see text]. On the other hand, Phys. Rev. Lett. 107, 170404 (2011) outlined an explicit practical model that can fake the CHSH inequality for a detection efficiency of up to 0.5. In this work, we close this gap. More specifically, we propose a method to emulate a Bell inequality at the threshold detection efficiency using existing optical detector control techniques. For a Clauser-Horne-Shimony-Holt inequality, it emulates the CHSH violation predicted by quantum mechanics up to [Formula: see text]. For the Garg-Mermin inequality-re-calibrated by incorporating non-detection events-our method emulates its exact local bound at any efficiency above the threshold. This confirms that attacks on secure quantum communication protocols based on Bell violation is a real threat if the detection efficiency loophole is not closed.Entities:
Year: 2020 PMID: 32764651 PMCID: PMC7413270 DOI: 10.1038/s41598-020-70045-7
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1Setup for a CHSH test. The measurement angles shown are arbitrary. Here, for each party, the set of possible outcomes is given by , where “” (“−”) are assigned when only the lower (upper) detector clicks and the other detector is silent. “?” is assigned when none of the detectors registers a detection.
Figure 2Local bounds for recalibrated inequality [Eq. (3)], improved faking model [Eq. (6)], and perfect faking model. The quantum mechanical bound is also shown. The improved faking model achieves this bound at and the perfect model at . The perfect model can fully emulate Eq. (3) for efficiency range .
Probability of each polarization combination generated by the source in the existing faking model[30]. They are normalized to maintain .
| Towards Alice | Towards Bob | |||
|---|---|---|---|---|
Possible outcomes and the corresponding probabilities for different measurement settings in the perfect model. Outcome represents i at Alice and j at Bob. It can be verified that the conditional probability distributions are no-signalling[50].
| Polarization emitted from source | Measurement outcome | Joint probability at measurement setting | |||
|---|---|---|---|---|---|
| 0 | 0 | ||||
| 0 | 0 | ||||
| 0 | 0 | 0 | |||
| 0 | 0 | 0 | |||
| 0 | 0 | ||||
| 0 | 0 | ||||
| 0 | 0 | 0 | 0 | ||
| 0 | 0 | ||||
| 0 | 0 | 0 | 0 | ||
| 0 | 0 | 0 | 0 | ||
Strategy to practically simulate deterministic (random) outcome with efficiency a (b). Here, , , and ‘x’ represents no detection.
| Probability | Intensity | Polarization | Outcome when basis | Required value of | |
|---|---|---|---|---|---|
| Matches | Mismatches | ||||
| x | |||||
| Vacuum | x | x | |||
Figure 3Control characteristics of a detector in commercial quantum key distribution system Clavis2[45, 54], responding to a short trigger pulse atop continuous-wave blinding power of (a) and (b) . Wavelength of light was .