Literature DB >> 33265243

Tsirelson's Bound Prohibits Communication through a Disconnected Channel.

Avishy Carmi1,2, Daniel Moskovich1,2.   

Abstract

Why does nature only allow nonlocal correlations up to Tsirelson's bound and not beyond? We construct a channel whose input is statistically independent of its output, but through which communication is nevertheless possible if and only if Tsirelson's bound is violated. This provides a statistical justification for Tsirelson's bound on nonlocal correlations in a bipartite setting.

Entities:  

Keywords:  Bell inequality; Fisher information; Tsirelson’s bound; information causality; no-signaling; nonlocality

Year:  2018        PMID: 33265243      PMCID: PMC7512667          DOI: 10.3390/e20030151

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.524


1. Introduction

Some of the predictions made by quantum mechanics appear to be at odds with common sense. Yet quantum mechanics remains the most precisely tested and successful quantitative theory of nature. It is therefore believed that even if quantum mechanics is someday replaced, any successor will have to inherit at least some of its “preposterous” but highly predictive principles. Perhaps the most counter-intuitive quantum mechanical feature is nonlocality [1]: the correlations exhibited by remote parties may exceed those allowed by any local realistic model. The mystery of nonlocality is not only why nature is as nonlocal as it is, but why nature is not more nonlocal than it is. There are alternative Non-Signaling theories which permit nonlocality beyond the quantum limit [2,3]; why doesn’t nature choose one of these theories over quantum mechanics? In Section 1.1 we review several previously proposed explanations. This paper presents another explanation, from statistics. In this paper we construct a protocol (a repeated oblivious transfer) which sends messages through a disconnected channel. We show that Alice can communicate nontrivial information to Bob via this protocol if and only if the maximal quantum mechanical violation of the Bell–CHSH inequality [1,4], Tsirelson’s bound [5], is exceeded. We thus provide a statistical explanation of this bound that is independent of the mathematical formalism of quantum mechanics. We briefly recall the setting for the Bell–CHSH experiment. Section 2 provides a more detailed account. A famous application of nonlocality is to construct an 1-2 oblivious transfer protocol between two distant agents (A)lice and (B)ob. Alice and Bob each hold a box. Alice’s box might, for example, contain one half of a singlet state of spin– particles, with Bob’s box containing the other half [1,4]. In addition, Alice possesses a pair of bits and , each of which is a zero or a one. Using boolean algebra and her boxes (the protocol will be described later), Alice encodes her pair of bits into a single bit which she sends across a classical channel to Bob. Bob wants to know the value either of or of , but Alice doesn’t know which of these Bob wants to know. Bob uses the received bit , his box, and some boolean algebra to construct an estimate for his desired bit . See Figure 2 later on.
Figure 2

Distributed oblivious transfer (van Dam) protocol [17]. Its basic building block is on the left, where Alice inserts into her box, receives a, and sends to Bob. Bob decides that he wants to know the value of , and he feeds j into his box, which outputs b. Bob’s estimate of is then . When there are multiple boxes, Alice concatenates (the process is called wiring). For example, with seven boxes, Alice begins with a collection of bits , and she inputs into box i, where , receiving correspondingly. The bits fed into the next level of boxes become with . The final output is sent to Bob. Bob encodes the address of the bit he wants as the binary number —for example, if he wants , then he sets , , and because 10 is 2 in binary. This binary encoding describes a path in his binary tree from a root to a branch, where 0 means ‘go left’ and 1 means ‘go right’. Bob inserts into the lowermost box to obtain . Setting , he then inserts into box k to obtain . Finally, setting , Bob inserts into box l to obtain . His final estimate for is .

What is the probability that Bob correctly estimates the bit he wishes to know? He has two possible sources of knowledge—the bit he received from Alice, and some mysterious “nonlocal” correlation between his box and Alice’s. The strength of such a nonlocal coordination between two systems is captured by a parameter called the Bell–CHSH correlator. Bob’s probability of guessing the value of Alice’s bit correctly is . The Bell–CHSH inequality states that in a world governed by classical (non-quantum) mechanics [1,4]. Nonlocality is the state of affairs in which the Bell–CHSH inequality is violated. To the best of our knowledge, real world physics is nonlocal. Over the years, the violation of the Bell–CHSH inequality has been measured in increasingly accurate and loophole-free experiments, culminating in celebrated loophole-free verifications [6,7,8]. Thus, we know that can exceed . How large can be? Tsirelson’s bound tells us that cannot exceed in a world described by quantum mechanics [5]. This quantum bound on nonlocality: has been tested experimentally, with the current state of the art being an experiment which has achieved a value of c which is only distant from Tsirelson’s bound [9]. Such experimental evidence supports the contention that Tsirelson’s bound indeed holds true in the real world. Tsirelson’s result as presented in the original paper is a specifically quantum mechanical fact, following from the Hilbert-space mathematical formalism for quantum mechanics, for which there has been no good conceptual physical explanation. How fundamental is Tsirelson’s bound? Must this inequality also hold for any future theory which might someday supercede quantum mechanics [10]? We are led to the following question: Can we identify a plausible physical principle, independent of quantum mechanics (or independent of functional analysis), which is necessary and sufficient to guarantee that

1.1. Existing Principles

For the last two decades, people have searched for physical principles that bound nonlocality. It was initially expected that the physical principle of relativistic causality (no-signaling) itself restricts the strength of nonlocality [11,12,13]. But then it was discovered that no-signaling theories may exist for which . This led to the device-independent formalism of No-Signaling (NS)–boxes [2,14] (see also [3]). In particular, maximum violation of the Bell–CHSH inequality is achieved by Popescu–Rohrlich (PR)–boxes which are consistent with relativistic causality. So relativistic causality doesn’t limit nonlocality after all; Why then does nature not permit (1) to be violated (as far as we know)? Several suggestions have been made. Superquantum correlations lead to violations of the Heisenberg uncertainty principle [15,16], which is another seemingly purely quantum result. PR–boxes would allow distributed computation to be performed with only one bit of communication [17], which looks unlikely but doesn’t violate any known physical law. Similarly, in stronger-than-quantum nonlocal theories some computations exceed reasonable performance limits [18]. The principle of Information Causality [19] shows that no sensible measure of mutual information exists between pairs of systems in superquantum nonlocal theories. Our approach is most directly comparable with Information Causality, with a conceptual difference being that we use variance of an efficient estimator, therefore Fisher information, whereas information causality uses mutual information (Shannon information). The relationship between our approach and theirs is the topic of Section 6. Finally, it was shown that superquantum nonlocality does not permit local (non-nonlocal) physics to emerge in the limit of infinitely many microscopic systems [20,21].

1.2. Tsirelson’s Bound from a Statistical No-Signaling Condition

Here we show that Tsirelson’s bound follows from the following principle applied to a certain limiting Bell–CHSH setting: Statistical No-Signaling: It is impossible to communicate a nontrivial message through a channel whose output is independent of its input. Our strategy is to construct a channel whose input is a Bernoulli random variable X of mean and whose output is another Bernoulli random variable Y (Section 3.2). The construction of our channel is not new— it is a reinterpretation of the well-known van Dam protocol [17]. Through the channel, Alice sends samples from X, and at the other end Bob receives a set of values . We imagine as encoding a message, perhaps in the digits of its binary expansion. Bob’s task is to estimate . The following theorem states that he can do so if and only if Tsirelson’s bound fails. The channel from X to Y we construct is described by the conditional probability In the The unbiased estimator: for θ has variance: The estimator efficient, i.e., it has the minimal variance of any estimator of θ constructed from Bob’s set of samples The theorem is visually summarized by Figure 1.
Figure 1

The Statistical No-Signaling condition. The van Dam protocol defines an underlying channel which becomes disconnected in the limit. The upper illustration shows this channel and the Fisher information (one over the variance) of the maximum likelihood estimators for at its input and at its output. When the number of nonlocal resources increases unboundedly, the two ends of the channel become disconnected as illustrated by a vanishing bottleneck in the lower illustration. Statistical No-Signaling dictates that in this case no information can pass through. This occurs if and only if . The case of leads to a physically unreasonable limit where Bob can fully read off the value of Alice’s through a disconnected channel.

The theorem shows that failure of Tsirelson’s bound leads to failure of the following consequence of Statistical No-Signaling—Consequence of Statistical No-Signaling—In the above notation, if X and Y are independent, then no estimator constructed from has both mean and variance 0. Section 5 shows that a violation of Uffink’s inequality [22], a generalization of Tsirelson’s bound, also leads to the failure of the same consequence of Statistical No-Signaling. Uffink’s inequality is also known to be recovered by Information Causality [23]. Theorem 1.1 is formulated as an asymptotic construction, but in practice a finite number of samples suffices because for any experimental setup there exists a nonzero minimal possible environmental noise level . By Theorem 1.1, is physically indistinguishable from when the absolute value of is less than . Since , we need trials. As an example, for a photon pair where is greater than or equal to the reduced Planck constant ℏ, we find that suffices to make physically indistinguishable from when . Thus, if we can still distinguish from for , we know that Tsirelson’s bound has been violated, and if not then it holds.

1.3. Organization of This Paper

Section 2 recalls the bipartite Bell experiment and exhibits the Bell–CHSH correlator c as the correlator of a certain noisy symmetric channel. Section 3 presents the van Dam protocol as an extension of the Bell–CHSH setup, and explain how it defines a noisy symmetric channel with correlator . Section 4 computes the means and variance of an estimator for , and proves that is an efficient estimator. Section 5 extends Theorem 1.1 to recover Uffink’s inequality [22,23] for anisotropic correlators from Statistical No-Signaling. Finally, Section 6 discusses the relationship of Statistical No-Signaling with Information Causality.

2. The Bipartite Bell Experiment as a Noisy Symmetric Channel

In this section we recall the definition of the Bell–CHSH correlator c and we formulate the Bell–CHSH inequality, establishing notation. We then exhibit c as the correlator of a symmetric binary channel.

2.1. The Bell–CHSH Inequality

Let us recall the classical bipartite Bell experiment [1]. Alice and Bob each hold one half of an EPR pair (a pair of particles with certain properties summarized below) such as a singlet state of spin– particles. They each possess two different measuring instruments. Alice measures her particle using one of the instruments, and Bob measures his particles using one of his. We write i for the index of the instrument used by Alice, and a for its reading. Similarly, we let j and b denote the index of an instrument chosen by Bob and its reading correspondingly. In the language of probability, a and b are –valued Bernoulli random variables. The choices of measuring instrument, i and j, may be either parameters or –valued Bernoulli random variables. Repeating the experiment for many different EPR pairs, Alice and Bob may compute the two-point correlator of their readings a and b for any given pair of indices i and j, where is the statistical expectation operator. We now define the Bell–CHSH correlator c by the formula: In a theory in which both Alice and Bob’s choices, and the readings of their measuring devices, are local, the Bell–CHSH inequality [4] holds: Operationally speaking, locality means that Alice’s readings may only be affected by her own choices (and perhaps by other variables hidden locally at her site), and similarly for Bob’s readings. Quantum mechanically, however, Alice and Bob may violate (3). Correlators violating (3) are said to be nonlocal.

2.2. The Bell–CHSH Correlator c as a Channel Correlator

Non-signaling (NS)–boxes provide an abstraction and an extension of the Bell–CHSH experiment [2,14]. This time, Alice and Bob each owns a box. Such a box may be thought of as a complete laboratory containing two measuring devices. Either participants inserts their choice of measuring device into their box. The box output is the respective reading of the chosen measuring device. Alice and Bob share a pair of NS–boxes whose –valued inputs are i and j and whose –valued outputs are Bernoulli random variables a and b. We will show that the Bell–CHSH correlator (2) represents the correlator of a symmetric binary channel whose input is the Bernoulli random variable and whose output is the Bernoulli random variable . Let . Define the channel correlators as follows: With respect to a particular choice of measuring devices i and j and for , (4) becomes: Assume the underlying channel is symmetric and therefore that is fixed for all . By (5) the Bell–CHSH correlator (2) may be written as: which is our promised interpretation of the Bell–CHSH correlator as a correlator of a noisy symmetric binary channel.

3. The Van Dam Protocol as a Noisy Symmetric Channel

In this section we recall the construction of the van-Dam protocol [17,19]. We then reinterpret this protocol as underlying a noisy symmetric binary channel, as a special case of the construction of Section 2. We compute its correlator, and establish the effect of noise on its classical component.

3.1. The Van Dam Protocol

The van Dam protocol realizes an oblivious transfer protocol by means of a classical channel and a collection of NS-boxes. Each of Alice’s boxes has a corresponding box on Bob’s side, and different pairs of boxes are statistically independent. Suppose that Alice has in her possession the bits where , . Bob wishes to know the value of one of her bits. He may do so by specifying the address of the bit whose value he wishes to know via its binary address . For example, if then Bob may specify which of the bits to he wants by specifying a binary address, 00, 01, 10, or 11. Alice bits and Bob addresses are encoded into the inputs of NS-boxes following a particular protocol which is described next. Alice uses outputs of boxes and choices of measuring device to determine choices of measuring device for other boxes. Such a procedure is called wiring. The wiring of boxes on Alice side admits a recursive description which we now give. Let denote the output of Alice’s lth box on the kth level for the input i. We follow the convention that box outputs for the van Dam protocol are 0/1–valued (rather than –valued) random variables. Let also: Suppose that Alice wishes to encode bits with her boxes. To do so, she first picks two boxes and computes: This forms the first level in her construction. The second level then follows: In this example there are only two levels and so is the bit which Alice transmits to Bob through the classical channel. In case where there will be n levels and thus is the bit Bob will receive from Alice. Unbeknownst to Alice, Bob now decides which bit he would like to know the value of. He takes its binary address , and inserts into all of his boxes whose counterparts are on the k level on Alice’s side. He then uses the values that he obtains, together with the bit he received from Alice, to construct the decoding function: The values (which boxes Bob uses) are determined by the binary address via the recursive formula for starting from . The van Dam protocol we have described above is summarized in Figure 2. The probability that Bob will decode the correct value of the bit he desires is governed by the NS–box correlator c. In general, decoding any bit out of possible bits involves using n pairs of NS boxes. Noting that an even number of errors, , will cancel out in such a construction, we obtain the following expression [19]: For example, for :

3.2. Van Dam Protocol as a Symmetric Channel

This section describes the modification of the van Dam protocol that we use. Alice has in her possession an information source that is a -valued Bernoulli random variable X whose mean is . Alice takes m iid samples, , from X and converts them into -valued bits, by mapping 0 to and 1 to 1. Alice and Bob repeat the van Dam protocol m times, once for each of Alice’s samples. Each time, Bob uses the protocol to estimate Alice’s bit, first , then , and so on until . As in (12), the van Dam protocol has a memoryless property: From this it follows that if Alice’s inputs are iid then Bob’s outputs are also iid. Therefore the set of determines a Bernoulli random variable Y. In this way, the van Dam protocol may be viewed as a symmetric binary channel whose input is X and whose output is Y. By (11) the channel correlator is: We generalize slightly, for the purpose of treating the case in the next section. Suppose that Alice’s bits are contaminated with noise and therefore might be flipped once injected into her boxes. Let be the probability that the bit is flipped where . In this case the corresponding channel correlator (14) is , which follows from (4) and: where underlies the channel defined by the ordinary van Dam protocol, and is the probability of having been flipped.

3.3. The Van Dam Channel Disconnects in the Limit

If or then it follows that: Therefore, in the limit: But also: Combining (17) with (18) gives: Thus X and Y are statistically independent in the limit, proving the first part of Theorem 1.1.

4. Bob’s Estimator

4.1. Bob’s Estimator

In Section 3 we used the van Dam protocol to construct a symmetric channel whose input is a –valued Bernoulli random variable X and whose output is another –valued Bernoulli random variable Y. The channel correlator is . Alice sends m iid random samples through the channel. Denote the set of respective outputs . Assume a prior distribution for X given by: with parameter . Bob attempts to estimate using the estimator: We will show that Bob’s estimator is unbiased, . Note that and From (22) and (23) together, deduce: and therefore, . As for variance, by (24): Therefore: We have proved the second part of Theorem 1.1.

4.2. Bob’s Estimator is Efficient

We prove efficiency of by calculating the Fisher information about contained in Bob’s set of samples . The Cramer–Rao Theorem tells us that one over this Fisher information is a lower bound for the variance of an estimator for constructed from . By showing that saturates this bound, we will have proven that it is efficient. In the derivation that follows, we assume that by replacing c by if necessary. We compute the Fisher information. The likelihood of given the set is given by the expression: where the indicator random variable of a random event A is given as: According to (27) the log-likelihood is given by the expression: The Fisher information about contained in the set is defined as: Note that: Using this, (30) reads: Indeed the Fisher information about in as given by Equation (32) equals one over the variance of as given by Equation (26). Thus, by the Cramer–Rao Theorem, is an efficient estimator for . Parenthetically, note that the minimum of is obtained for in which case and . We have proved the final part of Theorem 1.1.

5. Uffink’s Inequality from Statistical No-Signalling

The basic protocol in Section 3 assumes all box correlators are identical in absolute value. When this assumption is relaxed, Statistical No-Signaling leads to Uffink’s inequality, which is a necessary condition for quantum mechanical Bell-CHSH correlators [22,23]. Our approach is based on evaluating the total Fisher information gained by Bob in trials of the experiment. Suppose that the mean of Alice’s bits, , is for even i, and otherwise. Consider now a pair of NS-boxes with correlators, . The channel underlying the van Dam protocol in this case is described by where is Bob’s guess of Alice’s bit . It now follows that For simplicity, assume that . It can now be verified that for a n-level construction in the van Dam protocol where . According to (32) the Fisher information about contained in is Assuming , Bob’s total amount of information about in trials is for large n. As before, the underlying channel asymptotically disconnects for in the limit. Statistical No-Signaling dictates that in this case the variance of Bob’s estimator , which holds if and only if Uffink’s inequality holds [22],

6. Relation to Information Causality

Of previous non-quantum justifications of Tsirelson’s bound, Information Causality (IC) is perhaps the closest to Statistical No-Signalling [19]. IC is also stated as a limit on communication: Information gain that Bob can reach about a previously unknown to him data set of Alice, by using all his local resources and m classical bits communicated by Alice, is at most m bits. IC is formally a restriction on the classical channel capacity. Detecting violation of this principle therefore requires the utilization of nonlocal resources, which the authors achieve through the application of IC to the van Dam protocol, that is the same communication protocol used in this paper. The Information Causality quantity I is defined as the Shannon mutual information of Alice’s input and Bob’s output given the value of the single bit transmitted in the van Dam protocol. IC holds if and is violated if . At the end of the supplementary section of [19], the following expression for the IC quantity is obtained: where as in (4). In the symmetric setting, , and for , Equations (39) and (32) combine to yield: In particular, in the limit, if then implying that . Thus, violation of Statistical No-Signaling implies violation of IC. Conversely, as (39) is an inequality, it is unknown whether Tsirelson’s bound being satisfied implies (IC for the van Dam protocol), although, by our main theorem, it does imply (Statistical No-Signaling for the van Dam protocol).

7. Conclusions

We have formulated a Statistical No-Signaling principle which dictates that no information can pass through a disconnected channel. A violation of Tsirelson’s bound, i.e. a value of greater that , allows us to violate Statistical No-Signalling by constructing a disconnected channel through which Bob can construct an unbiased estimator with variance 0 for Alice’s parameter . Conversely, when Tsirelson’s bound holds, then, through this channel, so does Statistical No-Signalling. Our construction thus provides a purely statistical justification for Tsirelson’s bound, independent of quantum mechanics.
  10 in total

1.  Quadratic bell inequalities as tests for multipartite entanglement.

Authors:  Jos Uffink
Journal:  Phys Rev Lett       Date:  2002-05-23       Impact factor: 9.161

2.  Measurements incompatible in quantum theory cannot be measured jointly in any other no-signaling theory.

Authors:  Michael M Wolf; David Perez-Garcia; Carlos Fernandez
Journal:  Phys Rev Lett       Date:  2009-12-02       Impact factor: 9.161

3.  The uncertainty principle determines the nonlocality of quantum mechanics.

Authors:  Jonathan Oppenheim; Stephanie Wehner
Journal:  Science       Date:  2010-11-19       Impact factor: 47.728

4.  Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres.

Authors:  B Hensen; H Bernien; A E Dréau; A Reiserer; N Kalb; M S Blok; J Ruitenberg; R F L Vermeulen; R N Schouten; C Abellán; W Amaya; V Pruneri; M W Mitchell; M Markham; D J Twitchen; D Elkouss; S Wehner; T H Taminiau; R Hanson
Journal:  Nature       Date:  2015-10-21       Impact factor: 49.962

5.  Approaching Tsirelson's Bound in a Photon Pair Experiment.

Authors:  Hou Shun Poh; Siddarth K Joshi; Alessandro Cerè; Adán Cabello; Christian Kurtsiefer
Journal:  Phys Rev Lett       Date:  2015-10-30       Impact factor: 9.161

6.  Strong Loophole-Free Test of Local Realism.

Authors:  Lynden K Shalm; Evan Meyer-Scott; Bradley G Christensen; Peter Bierhorst; Michael A Wayne; Martin J Stevens; Thomas Gerrits; Scott Glancy; Deny R Hamel; Michael S Allman; Kevin J Coakley; Shellee D Dyer; Carson Hodge; Adriana E Lita; Varun B Verma; Camilla Lambrocco; Edward Tortorici; Alan L Migdall; Yanbao Zhang; Daniel R Kumor; William H Farr; Francesco Marsili; Matthew D Shaw; Jeffrey A Stern; Carlos Abellán; Waldimar Amaya; Valerio Pruneri; Thomas Jennewein; Morgan W Mitchell; Paul G Kwiat; Joshua C Bienfang; Richard P Mirin; Emanuel Knill; Sae Woo Nam
Journal:  Phys Rev Lett       Date:  2015-12-16       Impact factor: 9.161

7.  Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons.

Authors:  Marissa Giustina; Marijn A M Versteegh; Sören Wengerowsky; Johannes Handsteiner; Armin Hochrainer; Kevin Phelan; Fabian Steinlechner; Johannes Kofler; Jan-Åke Larsson; Carlos Abellán; Waldimar Amaya; Valerio Pruneri; Morgan W Mitchell; Jörn Beyer; Thomas Gerrits; Adriana E Lita; Lynden K Shalm; Sae Woo Nam; Thomas Scheidl; Rupert Ursin; Bernhard Wittmann; Anton Zeilinger
Journal:  Phys Rev Lett       Date:  2015-12-16       Impact factor: 9.161

8.  Do deeper principles underlie quantum uncertainty and nonlocality?

Authors:  Charles Seife
Journal:  Science       Date:  2005-07-01       Impact factor: 47.728

9.  Quantum nonlocality and beyond: limits from nonlocal computation.

Authors:  Noah Linden; Sandu Popescu; Anthony J Short; Andreas Winter
Journal:  Phys Rev Lett       Date:  2007-10-30       Impact factor: 9.161

10.  Information causality as a physical principle.

Authors:  Marcin Pawłowski; Tomasz Paterek; Dagomir Kaszlikowski; Valerio Scarani; Andreas Winter; Marek Zukowski
Journal:  Nature       Date:  2009-10-22       Impact factor: 49.962

  10 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.