-
Finite-size security analysis for quantum protocols: A Python framework using the Entropy Accumulation Theorem with graphical interface
Authors:
Piotr Mironowicz,
Mohamed Bourennane
Abstract:
We present a comprehensive software framework for the finite-size security analysis of quantum random number generation (QRNG) and quantum key distribution (QKD) protocols, based on the Entropy Accumulation Theorem (EAT). Our framework includes both a Python API and an intuitive graphical user interface (GUI), designed to support protocol designers and experimentalists in certifying randomness and…
▽ More
We present a comprehensive software framework for the finite-size security analysis of quantum random number generation (QRNG) and quantum key distribution (QKD) protocols, based on the Entropy Accumulation Theorem (EAT). Our framework includes both a Python API and an intuitive graphical user interface (GUI), designed to support protocol designers and experimentalists in certifying randomness and key rates under realistic, finite-resource conditions. At its core, the framework automates the construction of min-tradeoff functions via semi-definite programming and integrates them into a full entropy analysis pipeline. Users can specify device configurations, Bell-type inequalities or probability constraints, and select entropy measures such as min-entropy or von Neumann entropy. The package further provides tools for setting test parameters, computing secure randomness rates, and exploring tradeoffs between statistical confidence, protocol duration, and randomness output. We demonstrate the framework showing how users can move from theoretical constraints to practical security bounds with minimal overhead. This work contributes a reproducible, modular, and extensible platform for certifying quantum protocols under finite-size effects, significantly lowering the skill barrier to rigorous quantum cryptographic analysis.
△ Less
Submitted 23 June, 2025;
originally announced June 2025.
-
Device-independent Shannon entropy certification
Authors:
Robert Okuła,
Piotr Mironowicz
Abstract:
Quantum technologies promise information processing and communication technology advancements, including random number generation (RNG). Using Bell inequalities, a user of a quantum RNG hardware can certify that the values provided by an untrusted device are truly random. This problem has been extensively studied for von Neumann and min-entropy as a measure of randomness. However, in this paper, w…
▽ More
Quantum technologies promise information processing and communication technology advancements, including random number generation (RNG). Using Bell inequalities, a user of a quantum RNG hardware can certify that the values provided by an untrusted device are truly random. This problem has been extensively studied for von Neumann and min-entropy as a measure of randomness. However, in this paper, we analyze the feasibility of such verification for Shannon entropy. We investigate how the usability of various Bell inequalities differs depending on the presence of noise. Moreover, we present the benefit of certification for Shannon compared to min-entropy.
△ Less
Submitted 8 May, 2025;
originally announced May 2025.
-
Optimization of experimental quantum randomness expansion
Authors:
Amelie Piveteau,
Alban Seguinard,
Piotr Mironowicz,
Mohamed Bourennane
Abstract:
Quantum technologies provide many applications for information processing tasks that are impossible to realize within classical physics. These capabilities include such fundamental resources as generating secure, i.e. private and unpredictable random values. Yet, the problem of quantifying the amount of generated randomness is still not fully solved. This work presents a comprehensive analysis of…
▽ More
Quantum technologies provide many applications for information processing tasks that are impossible to realize within classical physics. These capabilities include such fundamental resources as generating secure, i.e. private and unpredictable random values. Yet, the problem of quantifying the amount of generated randomness is still not fully solved. This work presents a comprehensive analysis of the design and performance optimization of a Quantum Random Number Generator (QRNG) based on Bell inequality violations. We investigate key protocol parameters, including the smoothing parameter ($ε_{\text{s}}$), test round probability ($γ$), and switching delays, and their effects on the generation rate and quality of randomness. We identify optimal ranges for $γ$ and $p_Ω$ (the protocol's non-aborting probability) to balance the trade-off between randomness consumption and net randomness generation. Additionally, we explore the impact of switching delays on the system's performance, providing strategies to mitigate these effects. Our results indicate substantial developments in QRNG implementations and offer higher randomness expansion rates. The work provides practical guidelines for the efficient and secure design of QRNG systems and other cryptographic protocols.
△ Less
Submitted 7 November, 2024;
originally announced November 2024.
-
Generalized measurements on qubits in quantum randomness certification and expansion
Authors:
Piotr Mironowicz,
Marcus Grünfeld,
Mohamed Bourennane
Abstract:
Quantum mechanics has greatly impacted our understanding of the microscopic nature. One of the key concepts of this theory is generalized measurements, which have proven useful in various quantum information processing tasks. However, despite their significance, they have not yet been shown empirically to provide an advantage in quantum randomness certification and expansion protocols. This invest…
▽ More
Quantum mechanics has greatly impacted our understanding of the microscopic nature. One of the key concepts of this theory is generalized measurements, which have proven useful in various quantum information processing tasks. However, despite their significance, they have not yet been shown empirically to provide an advantage in quantum randomness certification and expansion protocols. This investigation explores scenarios where generalized measurements can yield more than one bit of certified randomness with a single qubit system measurement on untrusted devices and against a quantum adversary. We compare the robustness of several protocols to exhibit the advantage of exploiting generalized measurements. In our analysis of experimental data, we were able to obtain $1.21$ bits of min-entropy from a measurement taken on one qubit of an entangled state. We also obtained $1.07$ bits of min-entropy from an experiment with quantum state preparation and generalized measurement on a single qubit. We also provide finite data analysis for a protocol using generalized measurements and the Entropy Accumulation Theorem. Our exploration demonstrates the potential of generalized measurements to improve the certification of quantum sources of randomness and enhance the security of quantum cryptographic protocols and other areas of quantum information.
△ Less
Submitted 14 October, 2024;
originally announced October 2024.
-
Bounding conditional entropy of bipartite states with Bell operators
Authors:
Jan Horodecki,
Piotr Mironowicz
Abstract:
Quantum information theory explores numerous properties that surpass classical paradigms, offering novel applications and benefits. Among these properties, negative conditional von Neumann entropy (CVNE) is particularly significant in entangled quantum systems, serving as an indicator of potential advantages in various information-theoretic tasks, despite its indirect observability. In this paper,…
▽ More
Quantum information theory explores numerous properties that surpass classical paradigms, offering novel applications and benefits. Among these properties, negative conditional von Neumann entropy (CVNE) is particularly significant in entangled quantum systems, serving as an indicator of potential advantages in various information-theoretic tasks, despite its indirect observability. In this paper, we investigate the relationship between CVNE and the violation of Bell inequalities. Our goal is to establish upper bounds on CVNE through semi-definite programming applied to entangled qubits and qutrits, utilizing selected Bell operators.
Our findings reveal that a semi-device-independent certification of negative CVNE is achievable and could be practically beneficial. We further explore two types of robustness: robustness against detection efficiency loopholes, measured by relative violation, and robustness against white noise and imperfections in state preparation, measured by critical visibility. Additionally, we analyze parametrized families of Bell inequalities to identify optimal parameters for different robustness criteria.
This study demonstrates that different Bell inequalities exhibit varying degrees of robustness depending on the desired properties, such as the type of noise resistance or the target level of negative CVNE. By bridging the gap between Bell inequalities and CVNE, our research enhances understanding of the quantum properties of entangled systems and offers insights for practical quantum information processing tasks.
△ Less
Submitted 8 October, 2024; v1 submitted 2 October, 2024;
originally announced October 2024.
-
Quantum-assisted Rendezvous on Graphs: Explicit Algorithms and Quantum Computer Simulations
Authors:
J. Tucker,
P. Strange,
P. Mironowicz,
J. Quintanilla
Abstract:
We study quantum advantage in one-step rendezvous games on simple graphs analytically, numerically, and using noisy intermediate-scale quantum (NISQ) processors. Our protocols realise the recently discovered [arXiv:2207.14404] optimal bounds for small cycle graphs and cubic graphs. In the case of cycle graphs, we generalise the protocols to arbitrary graph size. The NISQ processor experiments real…
▽ More
We study quantum advantage in one-step rendezvous games on simple graphs analytically, numerically, and using noisy intermediate-scale quantum (NISQ) processors. Our protocols realise the recently discovered [arXiv:2207.14404] optimal bounds for small cycle graphs and cubic graphs. In the case of cycle graphs, we generalise the protocols to arbitrary graph size. The NISQ processor experiments realise the expected quantum advantage with high accuracy for rendezvous on the complete graph K3. In contrast, for the graph 2K4, formed by two disconnected 4-vertex complete graphs, the performance of the NISQ hardware is sub-classical, consistent with the deeper circuit and known qubit decoherence and gate error rates.
△ Less
Submitted 24 July, 2024; v1 submitted 23 May, 2024;
originally announced May 2024.
-
Applications of Quantum Machine Learning for Quantitative Finance
Authors:
Piotr Mironowicz,
Akshata Shenoy H.,
Antonio Mandarino,
A. Ege Yilmaz,
Thomas Ankenbrand
Abstract:
Machine learning and quantum machine learning (QML) have gained significant importance, as they offer powerful tools for tackling complex computational problems across various domains. This work gives an extensive overview of QML uses in quantitative finance, an important discipline in the financial industry. We examine the connection between quantum computing and machine learning in financial app…
▽ More
Machine learning and quantum machine learning (QML) have gained significant importance, as they offer powerful tools for tackling complex computational problems across various domains. This work gives an extensive overview of QML uses in quantitative finance, an important discipline in the financial industry. We examine the connection between quantum computing and machine learning in financial applications, spanning a range of use cases including fraud detection, underwriting, Value at Risk, stock market prediction, portfolio optimization, and option pricing by overviewing the corpus of literature concerning various financial subdomains.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
How decoherence affects the security of BB84 quantum key distribution protocol
Authors:
Robert Okuła,
Piotr Mironowicz
Abstract:
We present how the mechanisms of quantum Darwinism allow for the leakage of information in the standard BB84 quantum key distribution protocol, a paradigmatic prepare and measure quantum cryptography scenario.
We work within the decoherence theory framework and employ the model of measurements provided by quantum Darwinism. We investigate how much of the information about the results crucial for…
▽ More
We present how the mechanisms of quantum Darwinism allow for the leakage of information in the standard BB84 quantum key distribution protocol, a paradigmatic prepare and measure quantum cryptography scenario.
We work within the decoherence theory framework and employ the model of measurements provided by quantum Darwinism. We investigate how much of the information about the results crucial for the cryptographic key to be kept secret is leaked during the quantum measurement process and subsequently how much of that information might be later obtained by an eavesdropper using a type of a so-called Van Eck side-channel wiretapping.
We also show how the security can be affected by different ways of organizing the surrounding environment into layers, e.g. rooms or other divisions affecting the spread of quantum information in the environment and its interaction, paving a venue to potential enhancements, and insight into proper engineering of shieldings for cryptographical devices.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Quantum Strategies for Rendezvous and Domination Tasks on Graphs with Mobile Agents
Authors:
Giuseppe Viola,
Piotr Mironowicz
Abstract:
This paper explores the application of quantum non-locality, a renowned and unique phenomenon acknowledged as a valuable resource. Focusing on a novel application, we demonstrate its quantum advantage for mobile agents engaged in specific distributed tasks without communication. The research addresses the significant challenge of rendezvous on graphs and introduces a new distributed task for mobil…
▽ More
This paper explores the application of quantum non-locality, a renowned and unique phenomenon acknowledged as a valuable resource. Focusing on a novel application, we demonstrate its quantum advantage for mobile agents engaged in specific distributed tasks without communication. The research addresses the significant challenge of rendezvous on graphs and introduces a new distributed task for mobile agents grounded in the graph domination problem. Through an investigation across various graph scenarios, we showcase the quantum advantage. Additionally, we scrutinize deterministic strategies, highlighting their comparatively lower efficiency compared to quantum strategies. The paper concludes with a numerical analysis, providing further insights into our findings.
△ Less
Submitted 22 March, 2024; v1 submitted 20 November, 2023;
originally announced November 2023.
-
Semi-definite programming and quantum information
Authors:
Piotr Mironowicz
Abstract:
This paper presents a comprehensive exploration of semi-definite programming (SDP) techniques within the context of quantum information. It examines the mathematical foundations of convex optimization, duality, and SDP formulations, providing a solid theoretical framework for addressing optimization challenges in quantum systems. By leveraging these tools, researchers and practitioners can charact…
▽ More
This paper presents a comprehensive exploration of semi-definite programming (SDP) techniques within the context of quantum information. It examines the mathematical foundations of convex optimization, duality, and SDP formulations, providing a solid theoretical framework for addressing optimization challenges in quantum systems. By leveraging these tools, researchers and practitioners can characterize classical and quantum correlations, optimize quantum states, and design efficient quantum algorithms and protocols. The paper also discusses implementational aspects, such as solvers for SDP and modeling tools, enabling the effective employment of optimization techniques in quantum information processing. The insights and methodologies presented in this paper have proven instrumental in advancing the field of quantum information, facilitating the development of novel communication protocols, self-testing methods, and a deeper understanding of quantum entanglement. Overall, this study offers a resource for researchers interested in the intersection of optimization and quantum information, opening up new avenues for exploration and breakthroughs in this rapidly evolving field.
△ Less
Submitted 28 June, 2023;
originally announced June 2023.
-
Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario
Authors:
Alban Jean-Marie Seguinard,
Amélie Piveteau,
Piotr Mironowicz,
Mohamed Bourennane
Abstract:
One of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independ…
▽ More
One of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independent randomness generation, providing private unpredictable numbers even when they are obtained using devices derived by an untrusted vendor. Thus, determining the quantity of certifiable randomness that can be produced using a specific set of non-local correlations is of significant interest. In this paper, we present an experimental realization of recent Bell-type operators designed to provide private random numbers that are secure against adversaries with quantum resources. We use semi-definite programming to provide lower bounds on the generated randomness in terms of both min-entropy and von Neumann entropy in a device-independent scenario. We compare experimental setups providing Bell violations close to the Tsirelson's bound with lower rates of events, with setups having slightly worse levels of violation but higher event rates. Our results demonstrate the first experiment that certifies close to two bits of randomness from binary measurements of two parties.
△ Less
Submitted 13 March, 2023;
originally announced March 2023.
-
Entangled Rendezvous: A Possible Application of Bell Non-Locality For Mobile Agents on Networks
Authors:
Piotr Mironowicz
Abstract:
Rendezvous is an old problem of assuring that two or more parties, initially separated, not knowing the position of each other, and not allowed to communicate, meet without pre-agreement on the meeting point. This problem has been extensively studied in classical computer science and has vivid importance to modern applications like coordinating a fleet of drones in an enemy's territory. Quantum no…
▽ More
Rendezvous is an old problem of assuring that two or more parties, initially separated, not knowing the position of each other, and not allowed to communicate, meet without pre-agreement on the meeting point. This problem has been extensively studied in classical computer science and has vivid importance to modern applications like coordinating a fleet of drones in an enemy's territory. Quantum non-locality, like Bell inequality violation, has shown that in many cases quantum entanglement allows for improved coordination of two separated parties compared to classical sources. The non-signaling correlations in many cases even strengthened such phenomena. In this work, we analyze, how Bell non-locality can be used by asymmetric location-aware agents trying to rendezvous on a finite network with a limited number of steps. We provide the optimal solution to this problem for both agents using quantum resources, and agents with only ``classical'' computing power. Our results show that for cubic graphs and cycles it is possible to gain an advantage by allowing the agents to use assistance of entangled quantum states.
△ Less
Submitted 28 July, 2022;
originally announced July 2022.
-
Quantum security and theory of decoherence
Authors:
Piotr Mironowicz
Abstract:
We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism e…
▽ More
We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process by interaction with the external environment. We illustrate the idea with a paradigmatic example of a quantum random number generator compromised by an analog of the Van Eck phreaking. In particular, we derive a trade-off relation between eavesdropper's guessing probability $P_{guess}$ and the collective decoherence factor $Γ$ of the simple form $P_{guess} + Γ\geq 1$.
△ Less
Submitted 25 May, 2022;
originally announced May 2022.
-
Non-perfect propagation of information to noisy environment with self-evolution
Authors:
Piotr Mironowicz,
Paweł Horodecki,
Ryszard Horodecki
Abstract:
We study the non-perfect propagation of information to evolving low-dimensional environment that includes self-evolution as well as noisy initial states and analyze interrelations between the degree of objectivization and environment parameters. In particular, we consider an analytical model of three interacting qubits and derive its objectivity parameters. The numerical analysis shows that the qu…
▽ More
We study the non-perfect propagation of information to evolving low-dimensional environment that includes self-evolution as well as noisy initial states and analyze interrelations between the degree of objectivization and environment parameters. In particular, we consider an analytical model of three interacting qubits and derive its objectivity parameters. The numerical analysis shows that the quality of the spectrum broadcast structure formed during the interaction may exhibit non-monotonicity both in the speed of self-dynamics of the environment as well as its mixedness. The former effect is particularly strong, showing that -- considering part of the environment as a measurement apparatus -- an increase of the external magnetic field acting on the environment may turn the very vague measurement into close to ideal. The above effects suggest that quantum objectivity may appear after increasing the dynamics of the environment, although not with respect to the pointer basis, but some other one which we call generalized pointer or indicator basis. Furthermore, it seems also that when the objectivity is poor it may be improved, at least by some amount, by increasing thermal noise. We provide further evidence of that by analyzing the upper bounds on distance to the set of states representing perfect objectivity in the case of a higher number of qubits.
△ Less
Submitted 24 May, 2022; v1 submitted 27 January, 2022;
originally announced January 2022.
-
Hybrid no-signaling-quantum correlations
Authors:
Michał Banacki,
Piotr Mironowicz,
Ravishankar Ramanathan,
Paweł Horodecki
Abstract:
Fundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local corre…
▽ More
Fundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term $\textbf{HNSQ}$ in the multi-party Bell scenario where some subsystems are locally quantum while the remaining subsystems are only constrained by the no-signaling principle. Specifically, the set $\textbf{HNSQ}$ is a super-quantum set of correlations derived from no-signaling assemblages by performing quantum measurements on the trusted subsystems. As a tool for optimization over the set $\textbf{HNSQ}$, we introduce an outer hierarchy of semi-definite programming approximations to the set following an approach put forward by Doherty-Parillo-Spedalieri. We then show that in contrast to the set $\textbf{NS}$ of no-signaling correlations, there exist extreme points of $\textbf{HNSQ}$ in the tripartite Bell scenario that admit quantum realization. We perform an extensive numerical analysis of the maximal violation of the facet Bell inequalities in the three-party binary input-output scenario and study the corresponding self-testing properties. In contrast to the usual no-signaling correlations, the new set allows for simple security proofs of (one-sided)-device-independent applications against super-quantum adversaries.
△ Less
Submitted 16 May, 2022; v1 submitted 14 July, 2021;
originally announced July 2021.
-
Blurred quantum Darwinism across quantum reference frames
Authors:
Thao P. Le,
Piotr Mironowicz,
Paweł Horodecki
Abstract:
Quantum Darwinism describes objectivity of quantum systems via their correlations with their environment--information that hypothetical observers can recover by measuring the environments. However, observations are done with respect to a frame of reference. Here, we take the formalism of [Giacomini, Castro-Ruiz, & Brukner. Nat Commun 10, 494 (2019)], and consider the repercussions on objectivity w…
▽ More
Quantum Darwinism describes objectivity of quantum systems via their correlations with their environment--information that hypothetical observers can recover by measuring the environments. However, observations are done with respect to a frame of reference. Here, we take the formalism of [Giacomini, Castro-Ruiz, & Brukner. Nat Commun 10, 494 (2019)], and consider the repercussions on objectivity when changing quantum reference frames. We find that objectivity depends on non-degenerative relative separations, conditional state localisation, and environment macro-fractions. There is different objective information in different reference frames due to the interchangeability of entanglement and coherence, and of statistical mixing and classical correlations. As such, objectivity is subjective across quantum reference frames.
△ Less
Submitted 1 January, 2021; v1 submitted 11 June, 2020;
originally announced June 2020.
-
Experimentally feasible semi-device-independent certification of $4$ outcome POVMs
Authors:
Piotr Mironowicz,
Marcin Pawłowski
Abstract:
In this paper we construct a semi-device-independent protocol able to certify the presence of the generalized measurements. We show robustness of the protocol and conclude that it allows for experimental realisations using current technology.
In this paper we construct a semi-device-independent protocol able to certify the presence of the generalized measurements. We show robustness of the protocol and conclude that it allows for experimental realisations using current technology.
△ Less
Submitted 30 November, 2018;
originally announced November 2018.
-
Experimental certification of an informationally complete quantum measurement in a device-independent protocol
Authors:
Massimiliano Smania,
Piotr Mironowicz,
Mohamed Nawareg,
Marcin Pawłowski,
Adán Cabello,
Mohamed Bourennane
Abstract:
Minimal informationally complete positive operator-valued measures (MIC-POVMs) are special kinds of measurement in quantum theory in which the statistics of their $d^2$-outcomes are enough to reconstruct any $d$-dimensional quantum state. For this reason, MIC-POVMs are referred to as standard measurements for quantum information. Here, we report an experiment with entangled photon pairs that certi…
▽ More
Minimal informationally complete positive operator-valued measures (MIC-POVMs) are special kinds of measurement in quantum theory in which the statistics of their $d^2$-outcomes are enough to reconstruct any $d$-dimensional quantum state. For this reason, MIC-POVMs are referred to as standard measurements for quantum information. Here, we report an experiment with entangled photon pairs that certifies, for what we believe is the first time, a MIC-POVM for qubits following a device-independent protocol (i.e., modeling the state preparation and the measurement devices as black boxes, and using only the statistics of the inputs and outputs). Our certification is achieved under the assumption of freedom of choice, no communication, and fair sampling.
△ Less
Submitted 12 February, 2020; v1 submitted 30 November, 2018;
originally announced November 2018.
-
Applications of semi-definite optimization in quantum information protocols
Authors:
Piotr Mironowicz
Abstract:
This work is concerned with the issue of applications of the semi-definite programming (SDP) in the field of quantum information science. Our results of the analysis of certain quantum information protocols using this optimization technique are presented, and an implementation of a relevant numerical tool is introduced. The key method used is NPA discovered by Navascues et al. [Phys. Rev. Lett. 98…
▽ More
This work is concerned with the issue of applications of the semi-definite programming (SDP) in the field of quantum information science. Our results of the analysis of certain quantum information protocols using this optimization technique are presented, and an implementation of a relevant numerical tool is introduced. The key method used is NPA discovered by Navascues et al. [Phys. Rev. Lett. 98, 010401 (2007)].
In chapter 1 a brief overview of mathematical methods used in this work is presented. In chapter 2 an introduction to quantum information science is given. Chapter 3 concerns the device-independent (DI) and semi-device-independent (SDI) approaches in quantum cryptography. In chapter 4 our results regarding quantum information protocols which we developed using SDP are described. The results include a new type of quantum key distribution protocol based on Hardy's paradox; several protocols for quantum random number expansion; a method of formulation of SDP relaxations of SDI protocols; and a DI Santha-Vazirani source of randomness amplification protocol. In chapter 5 an introduction to interior point methods is given. In chapter 6 the implementation of our numerical tool dedicated to problems occurring in chapter 4 are discussed and compared with other solutions.
△ Less
Submitted 11 October, 2018;
originally announced October 2018.
-
System information propagation for spin structures
Authors:
Piotr Mironowicz,
Paweł Należyty,
Paweł Horodecki,
Jarosław K. Korbicz
Abstract:
We study in details decoherence process of a spin register, coupled to a spin environment. We use recently developed methods of information transfer study in open quantum systems to analyze information flow between the register and its environment. We show that there are regimes when not only the register decoheres effectively to a classical bit string, but this bit string is redundantly encoded i…
▽ More
We study in details decoherence process of a spin register, coupled to a spin environment. We use recently developed methods of information transfer study in open quantum systems to analyze information flow between the register and its environment. We show that there are regimes when not only the register decoheres effectively to a classical bit string, but this bit string is redundantly encoded in the environment, making it available to multiple observations. This process is more subtle than in a case of a single qubit due to possible presence of protected subspaces: Decoherence free subspaces and, so called, orthogonalization free subspaces. We show that this leads to a rich structure of coherence loss/protection in the asymptotic state of the register and a part of its environment. We formulate a series of examples illustrating these structures.
△ Less
Submitted 7 November, 2017; v1 submitted 25 October, 2017;
originally announced October 2017.
-
Connections Between Mutually Unbiased Bases and Quantum Random Access Codes
Authors:
Edgar A. Aguilar,
Jakub J. Borkała,
Piotr Mironowicz,
Marcin Pawłowski
Abstract:
We present a new quantum communication complexity protocol, the promise--Quantum Random Access Code, which allows us to introduce a new measure of unbiasedness for bases of Hilbert spaces. The proposed measure possesses a clear operational meaning and can be used to investigate whether a specific number of mutually unbiased bases exist in a given dimension by employing Semi--Definite Programming t…
▽ More
We present a new quantum communication complexity protocol, the promise--Quantum Random Access Code, which allows us to introduce a new measure of unbiasedness for bases of Hilbert spaces. The proposed measure possesses a clear operational meaning and can be used to investigate whether a specific number of mutually unbiased bases exist in a given dimension by employing Semi--Definite Programming techniques.
△ Less
Submitted 28 March, 2018; v1 submitted 14 September, 2017;
originally announced September 2017.
-
Trade-offs in multi-party Bell inequality violations in qubit networks
Authors:
Ravishankar Ramanathan,
Piotr Mironowicz
Abstract:
Two overlapping bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms…
▽ More
Two overlapping bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms of monogamies that allow for violations of a few inequalities at once. Here we systematically study monogamy relations between correlation Bell inequalities both within quantum theory and under the sole assumption of no signalling. We first investigate the trade-offs in Bell violations arising from the uncertainty relation for complementary binary observables, and exhibit several network configurations in which a tight trade-off arises in this fashion. We then derive a tight trade-off relation which cannot be obtained from the uncertainty relation showing that it does not capture monogamy entirely. The results are extended to Bell inequalities involving different number of parties and find applications in device-independent secret sharing and device-independent randomness extraction. Although two multipartite Bell inequalities may be violated simultaneously, we show that genuine multi-party non-locality, as evidenced by a generalised Svetlichny inequality, does exhibit monogamy property. Finally, using the relations derived we reveal the existence of flat regions in the set of quantum correlations.
△ Less
Submitted 12 April, 2017;
originally announced April 2017.
-
Complementarity between entanglement-assisted and quantum distributed random access code
Authors:
Alley Hameedi,
Debashis Saha,
Piotr Mironowicz,
Marcin Pawlowski,
Mohamed Bourennane
Abstract:
Collaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classical limitations. The two quantum variants of RACs, namely, quantum random access code (QRAC) and the entanglement-assisted random access code (EARAC), have demonstrated equal prowess for a number of tasks.…
▽ More
Collaborative communication tasks such as random access codes (RACs) employing quantum resources have manifested great potential in enhancing information processing capabilities beyond the classical limitations. The two quantum variants of RACs, namely, quantum random access code (QRAC) and the entanglement-assisted random access code (EARAC), have demonstrated equal prowess for a number of tasks. However, there do exist specific cases where one outperforms the other. In this article, we study a family of $3 \rightarrow 1$ distributed RACs \cite{network} and present its general construction of both the QRAC and the EARAC. We demonstrate that, depending on the function of inputs that is sought, if QRAC achieves the maximal success probability then EARAC fails to do so and vice versa.Moreover, a tripartite Bell-type inequality associated with the EARAC variants reveals the genuine multipartite nonlocality exhibited by our protocol. We conclude with an experimental realization of the $3 \rightarrow 1$ distributed QRAC that achieves higher success probabilities than the maximum possible with EARACs for a number of tasks.
△ Less
Submitted 30 May, 2017; v1 submitted 30 January, 2017;
originally announced January 2017.
-
Monitoring of the process of system information broadcasting in time
Authors:
Piotr Mironowicz,
Jarosław Korbicz,
Paweł Horodecki
Abstract:
One of the fundamental problems of modern physics is how the classical world, the 2nd Law of Thermodynamics and the whole irreversibility emerges from the quantum reality with reversible evolution. This relates to the problem of measurement transforming quantum, non-copyable data, towards intersubjective, copyable classical knowledge. We use the quantum state discrimination to show in a central sy…
▽ More
One of the fundamental problems of modern physics is how the classical world, the 2nd Law of Thermodynamics and the whole irreversibility emerges from the quantum reality with reversible evolution. This relates to the problem of measurement transforming quantum, non-copyable data, towards intersubjective, copyable classical knowledge. We use the quantum state discrimination to show in a central system model how it's evolution leads to the broadcasting of the classical information. We analyze the process of orthogonalization and decoherence, their time scales and dependence on the environment.
△ Less
Submitted 8 July, 2016;
originally announced July 2016.
-
An unconditional experimental test of Nonclassicality
Authors:
A. Hameedi,
B. Marques,
P. Mironowicz,
D. Saha,
M. Pawlowski,
M. Bourennane
Abstract:
We theoretically introduce and experimentally demonstrate the realization of a nonclassicality test that allows for arbitrarily low detection efficiency without invoking any extra assumptions as independence of the devices. Our test and its implementation is set in a prepare-and-measure scenario with an upper limit on the communication capacity of the channel through which the systems are communic…
▽ More
We theoretically introduce and experimentally demonstrate the realization of a nonclassicality test that allows for arbitrarily low detection efficiency without invoking any extra assumptions as independence of the devices. Our test and its implementation is set in a prepare-and-measure scenario with an upper limit on the communication capacity of the channel through which the systems are communicated. The essence for our novel test is the use of two preparation and two measurement devices, which are randomly paired in each round. Our work opens up the possibility of experimental realizations of device independent protocols with current off-the-shelf technology.
△ Less
Submitted 23 June, 2020; v1 submitted 19 November, 2015;
originally announced November 2015.
-
Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing
Authors:
Piotr Mironowicz,
Armin Tavakoli,
Alley Hameedi,
Breno Marques,
Marcin Pawlowski,
Mohamed Bourennane
Abstract:
Quantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness cer…
▽ More
Quantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements of the postprocessing of experimental data. In particular, we consider semi-device independent randomness certification from an experiment using a four dimensional quantum system to violate the classical bound of a random access code. Using state-of-the-art techniques, a smaller quantum violation requires more computational power to demonstrate randomness, which at some point becomes impossible with today's computers although the randomness is (probably) still there. We show that by dedicating more input settings of the experiment to randomness certification, then by more computational postprocessing of the experimental data which corresponds to a quantum violation, one may increase the amount of certified randomness. Furthermore, we introduce a method that significantly lowers the computational complexity of randomness certification. Our results show how more randomness can be generated without altering the hardware and indicate a path for future semi-device independent protocols to follow.
△ Less
Submitted 22 June, 2016; v1 submitted 18 November, 2015;
originally announced November 2015.
-
Steering is an essential feature of non-locality in quantum theory
Authors:
Ravishankar Ramanathan,
Dardo Goyeneche,
Sadiq Muhammad,
Piotr Mironowicz,
Marcus Grünfeld,
Mohamed Bourennane,
Paweł Horodecki
Abstract:
A physical theory is called non-local when observers can produce instantaneous effects over distant systems. Non-local theories rely on two fundamental effects: local uncertainty relations and steering of physical states at a distance. In quantum mechanics, the former one dominates the other in a well-known class of non-local games known as XOR games. In particular, optimal quantum strategies for…
▽ More
A physical theory is called non-local when observers can produce instantaneous effects over distant systems. Non-local theories rely on two fundamental effects: local uncertainty relations and steering of physical states at a distance. In quantum mechanics, the former one dominates the other in a well-known class of non-local games known as XOR games. In particular, optimal quantum strategies for XOR games are completely determined by the uncertainty principle alone. This breakthrough result has yielded the fundamental open question whether optimal quantum strategies are always restricted by local uncertainty principles, with entanglement-based steering playing no role. In this work, we provide a negative answer to the question, showing that both steering and uncertainty relations play a fundamental role in determining optimal quantum strategies for non-local games. Our theoretical findings are supported by an experimental implementation with entangled photons.
△ Less
Submitted 12 October, 2018; v1 submitted 16 June, 2015;
originally announced June 2015.
-
Quantum randomness protected against detection loophole attacks
Authors:
Piotr Mironowicz,
Gustavo Cañas,
Jaime Cariñe,
Esteban S. Gómez,
Johanna F. Barra,
Adán Cabello,
Guilherme B. Xavier,
Gustavo Lima,
Marcin Pawłowski
Abstract:
Device and semi-device independent quantum randomness generators (DI- and SDI-QRNGs) are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting SDI-QRNGs in prepare-and-measure scenarios against detection inefficiency attacks. The key…
▽ More
Device and semi-device independent quantum randomness generators (DI- and SDI-QRNGs) are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting SDI-QRNGs in prepare-and-measure scenarios against detection inefficiency attacks. The key idea is the introduction of a blocking device that adds failures in the communication between the preparation and measurement devices. We prove that, for any detection efficiency, there is a blocking rate that provides protection against these attacks. We experimentally demonstrate the generation of private randomness using weak coherent states and standard avalanche photo-detectors.
△ Less
Submitted 23 November, 2020; v1 submitted 13 October, 2014;
originally announced October 2014.
-
Properties of dimension witnesses and their semi-definite programming relaxations
Authors:
Piotr Mironowicz,
Hong-Wei Li,
Marcin Pawłowski
Abstract:
In this paper we develop a method for investigating semi-device-independent randomness expansion protocols that was introduced in [Li et al., Phys. Rev. A $\mathbf{87}$, 020302(R) (2013)]. This method allows to lower-bound, with semi-definite programming, the randomness obtained from random number generators based on dimension witnesses. We also investigate the robustness of some randomness expand…
▽ More
In this paper we develop a method for investigating semi-device-independent randomness expansion protocols that was introduced in [Li et al., Phys. Rev. A $\mathbf{87}$, 020302(R) (2013)]. This method allows to lower-bound, with semi-definite programming, the randomness obtained from random number generators based on dimension witnesses. We also investigate the robustness of some randomness expanders using this method. We show the role of an assumption about the trace of the measurement operators and a way to avoid it. The method is also generalized to systems of arbitrary dimension, and for a more general form of dimension witnesses, than it the previous paper. Finally, we introduce a procedure of dimension witness reduction, which can be used to obtain from an existing witness a new one with higher amount of certifiable randomness. The presented methods finds an application for experiments [Ahrens et al., Phys. Rev. Lett. $\mathbf{112}$, 140401 (2014)].
△ Less
Submitted 15 May, 2014;
originally announced May 2014.
-
Device-independent quantum key distribution based on measurement inputs
Authors:
Ramij Rahaman,
Matthew G. Parker,
Piotr Mironowicz,
Marcin Pawłowski
Abstract:
We provide an analysis of a new family of device independent quantum key distribution (QKD) protocols with several novel features: (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings; (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of…
▽ More
We provide an analysis of a new family of device independent quantum key distribution (QKD) protocols with several novel features: (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings; (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key. The main advantage of these protocols is a smaller vulnerability to imperfect random number generators made possible by feature (a). We prove the security and the robustness of such protocols. We show that using our method it is possible to construct a QKD protocol which retains its security even if the source of randomness used by communicating parties is strongly biased. As a proof of principle, an explicit example of a protocol based on the Hardy's paradox is presented. Moreover, in the noiseless case, the protocol is secure in a natural way against any type of memory attack, and thus allows to reuse the device in subsequent rounds. We also analyse the robustness of the protocol using semi-definite programming methods. Finally, we present a post-processing method, and observe a paradoxical property that rejecting some random part of the private data can increase the key rate of the protocol.
△ Less
Submitted 17 May, 2015; v1 submitted 29 August, 2013;
originally announced August 2013.
-
Robustness of quantum randomness expansion protocols in the presence of noise
Authors:
Piotr Mironowicz,
Marcin Pawłowski
Abstract:
In this paper we investigate properties of several randomness generation protocols in the device independent framework. Using Bell-type inequalities it is possible to certify that the numbers generated by an untrusted device are indeed random. We present a selection of certificates which guarantee two bits of randomness for each run of the experiment in the noiseless case and require the parties t…
▽ More
In this paper we investigate properties of several randomness generation protocols in the device independent framework. Using Bell-type inequalities it is possible to certify that the numbers generated by an untrusted device are indeed random. We present a selection of certificates which guarantee two bits of randomness for each run of the experiment in the noiseless case and require the parties to share a maximally entangled state. To compare them we study their efficiency in the presence of white noise. We find that for different amounts of noise different operators are optimal for certifying most randomness. Therefore the vendor of the device should use different protocols depending on the amount of noise expected to occur. Another of our results that we find particularly interesting is that using a single Bell operator as a figure of merit is rarely optimal.
△ Less
Submitted 1 May, 2013;
originally announced May 2013.
-
Robust amplification of Santha-Vazirani sources with three devices
Authors:
Piotr Mironowicz,
Rodrigo Gallego,
Marcin Pawlowski
Abstract:
We demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of…
▽ More
We demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness. It has a very important property that for any quality the required violation is strictly lower than possible to obtain using quantum resources. Among other things, it means that the protocol takes a finite amount of time to amplify arbitrarily weak randomness.
△ Less
Submitted 27 April, 2015; v1 submitted 31 January, 2013;
originally announced January 2013.
-
Relation between semi- and fully-device-independent protocols
Authors:
Hong-Wei Li,
Piotr Mironowicz,
Marcin Pawlowski,
Zhen-Qiang Yin,
Yu-Chun Wu,
Shuang Wang,
Wei Chen,
Hong-Gang Hu,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
We study the relation between semi and fully device independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter and vice versa. This relation provides us with interesting results for both scenarios. First, we find new random number generation protocols with higher bit rates for both the…
▽ More
We study the relation between semi and fully device independent protocols. As a tool, we use the correspondence between Bell inequalities and dimension witnesses. We present a method for converting the former into the latter and vice versa. This relation provides us with interesting results for both scenarios. First, we find new random number generation protocols with higher bit rates for both the semi and fully device independent cases. As a byproduct, we obtain whole new classes of Bell inequalities and dimension witnesses. Then, we show how optimization methods used in studies on Bell inequalities can be adopted for dimension witnesses.
△ Less
Submitted 24 February, 2013; v1 submitted 1 October, 2012;
originally announced October 2012.