Classical command of quantum systems via rigidity of CHSH games

作者: Umesh Vazirani , Ben W. Reichardt , Falk Unger

DOI:

关键词:

摘要: Can a classical system command general adversarial quantum to realize arbitrary dynamics? If so, then we could the dream of device-independent cryptography: using untrusted devices establish shared random key, with security based on correctness mechanics. It would also allow for testing whether claimed computer is truly quantum. Here report technique by which can certify joint, entangled state bipartite system, as well application specific operators each subsystem. This accomplished showing strong converse Tsirelson's optimality result Clauser-Horne-Shimony-Holt (CHSH) game: only way win many games if close tensor product EPR states, and measurements are optimal CHSH successive qubits. leads directly scheme key distribution. Control over be leveraged create more elaborate protocols reliably realizing circuits.

参考文章(49)
S. Barz, E. Kashefi, A. Broadbent, J. F. Fitzsimons, A. Zeilinger, P. Walther, Demonstration of Blind Quantum Computing Science. ,vol. 335, pp. 303- 308 ,(2012) , 10.1126/SCIENCE.1214707
Lars Lydersen, Carlos Wiechers, Christoffer Wittmann, Dominique Elser, Johannes Skaar, Vadim Makarov, Hacking commercial quantum cryptography systems by tailored bright illumination Nature Photonics. ,vol. 4, pp. 686- 689 ,(2010) , 10.1038/NPHOTON.2010.214
Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, Valerio Scarani, Device-independent security of quantum cryptography against collective attacks. Physical Review Letters. ,vol. 98, pp. 230501- ,(2007) , 10.1103/PHYSREVLETT.98.230501
Sandu Popescu, Daniel Rohrlich, Which states violate Bell's inequality maximally? Physics Letters A. ,vol. 169, pp. 411- 414 ,(1992) , 10.1016/0375-9601(92)90819-8
C.-E. Bardyn, T. C. H. Liew, S. Massar, M. McKague, V. Scarani, Device-independent state estimation based on Bell’s inequalities Physical Review A. ,vol. 80, pp. 062327- ,(2009) , 10.1103/PHYSREVA.80.062327
John F. Clauser, Michael A. Horne, Abner Shimony, Richard A. Holt, Proposed Experiment to Test Local Hidden Variable Theories. Physical Review Letters. ,vol. 23, pp. 880- 884 ,(1969) , 10.1103/PHYSREVLETT.23.880
E. Knill, Quantum computing with realistically noisy devices Nature. ,vol. 434, pp. 39- 44 ,(2005) , 10.1038/NATURE03350
Artur K. Ekert, Quantum cryptography based on Bell’s theorem Physical Review Letters. ,vol. 67, pp. 661- 663 ,(1991) , 10.1103/PHYSREVLETT.67.661
Samuel L. Braunstein, A. Mann, M. Revzen, Maximal violation of Bell inequalities for mixed states Physical Review Letters. ,vol. 68, pp. 3259- 3261 ,(1992) , 10.1103/PHYSREVLETT.68.3259
Peter W. Shor, John Preskill, Simple proof of security of the BB84 quantum key distribution protocol Physical Review Letters. ,vol. 85, pp. 441- 444 ,(2000) , 10.1103/PHYSREVLETT.85.441