Battery-Explicit Thermodynamic Witnesses of Bell Post-Quantumness
Pith reviewed 2026-05-22 09:42 UTC · model grok-4.3
The pith
A thermodynamic battery stores one excitation precisely when a Bell-game condition holds, making mean charge equal to success probability times battery gap.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The authors introduce a battery-explicit thermodynamic witness for post-quantum Bell correlations. In each round a single supplied excitation is routed into an explicit two-level battery precisely when the Bell-game condition is satisfied, via an energy-preserving controlled SWAP whose logical controls are taken degenerate. The mean battery charge is therefore exactly the game success probability multiplied by the battery gap. Optimizing over local, quantum or nonsignalling behaviours turns the corresponding game values into local, quantum or nonsignalling thermodynamic ceilings. For CHSH, Tsirelson's bound becomes a strict quantum ceiling while a PR-box reaches the single-excitation cap.
What carries the argument
energy-preserving controlled SWAP on degenerate registers that routes a supplied excitation to the battery exactly when the Bell-game condition holds
Load-bearing premise
The witness assumes a trusted energy-preserving battery module together with calibrated Hamiltonians and correct classical wiring.
What would settle it
An experiment in which a quantum strategy for the CHSH game produces a mean battery charge strictly higher than the value set by Tsirelson's bound would falsify the claimed quantum ceiling.
Figures
read the original abstract
We introduce a battery-explicit thermodynamic witness of post-quantum Bell correlations. In each round, a single supplied excitation is routed into an explicit two-level battery if and only if a Bell-game condition is satisfied. The routing operation is implemented by an energy-preserving controlled SWAP, with all logical control registers taken to be degenerate. Thus the correlation resource does not create energy; it only determines the probability that the supplied excitation reaches the battery. The construction is first formulated for finite two-player XOR games. For any such game, the mean battery charge is exactly the game success probability multiplied by the battery gap. Optimizing over local, quantum, or nonsignalling behaviours therefore turns the corresponding game values into local, quantum, or nonsignalling thermodynamic ceilings. For the CHSH game, Tsirelson's bound becomes a strict quantum ceiling on the mean battery charge, while a PR-box behaviour reaches the single-excitation cap. The witness is trusted-module rather than device-independent: it assumes calibrated Hamiltonians, correct classical wiring, and a trusted energy-preserving battery module. We also discuss a reversible-controller implementation, finite-statistics certification from work data, robustness to imperfect battery readout, and cyclic bookkeeping showing that no positive net work is obtained once fuel restoration and memory erasure are included.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces a battery-explicit thermodynamic witness of post-quantum Bell correlations for finite two-player XOR games. A single supplied excitation is routed into an explicit two-level battery via an energy-preserving controlled SWAP (with degenerate logical controls) precisely when the game-winning condition holds. Consequently the mean battery charge equals the game success probability multiplied by the battery gap, converting local, quantum, and nonsignaling game values into corresponding thermodynamic ceilings. For the CHSH game this yields Tsirelson's bound as a strict quantum ceiling on mean battery charge while PR-box behaviors saturate the single-excitation cap. The witness is explicitly trusted-module (calibrated Hamiltonians, correct classical wiring, trusted battery), with additional discussion of reversible-controller implementations, finite-statistics certification from work data, robustness to imperfect readout, and cyclic bookkeeping confirming zero net work once fuel restoration and erasure are included.
Significance. If the construction is accepted, the work supplies a concrete, explicit thermodynamic embodiment of Bell-game values that directly links correlation strength to stored energy in a calibrated battery module. The explicit two-level battery, energy-preserving routing, and cyclic bookkeeping (showing no positive net work) are clear strengths that make the mapping falsifiable in principle and potentially useful for thermodynamic interpretations of nonlocality. The trusted-module framing is appropriately acknowledged, limiting device-independent claims but enabling a clean thermodynamic reading of known game bounds.
minor comments (2)
- The abstract and introduction would benefit from a single sentence clarifying that the equality between mean battery charge and success probability × gap follows directly from the definition of the routing operation rather than from an independent thermodynamic principle.
- Notation for the battery gap and the controlled-SWAP Hamiltonian should be introduced with an explicit equation in the main text (rather than only in the abstract) to aid readers unfamiliar with the construction.
Simulated Author's Rebuttal
We thank the referee for the positive and detailed summary of our manuscript, for highlighting its strengths, and for recommending acceptance. We appreciate the recognition of the explicit battery construction, the mapping to game values, and the trusted-module framing.
Circularity Check
No significant circularity: explicit construction maps game value to battery expectation by design
full rationale
The paper presents a trusted-module construction in which an energy-preserving controlled SWAP routes a supplied excitation to the battery precisely when the XOR-game winning condition holds. The abstract states directly that 'the mean battery charge is exactly the game success probability multiplied by the battery gap,' which follows immediately from the routing rule rather than from any independent derivation or fit. Optimizing over local/quantum/nonsignaling behaviors then simply re-labels the known game bounds as thermodynamic ceilings; no step claims to derive those bounds from thermodynamics or to predict them from first principles. The manuscript explicitly labels the witness as trusted-module and supplies cyclic bookkeeping, confirming the mapping is the intended content rather than a hidden tautology. No self-citation, ansatz smuggling, or uniqueness theorem is load-bearing for the central claim.
Axiom & Free-Parameter Ledger
free parameters (1)
- battery gap
axioms (2)
- domain assumption Energy-preserving controlled SWAP implements the routing
- domain assumption Logical control registers are degenerate
invented entities (1)
-
explicit two-level battery module
no independent evidence
Forward citations
Cited by 1 Pith paper
-
Thermodynamic value of CHSH-induced side-information channels in a Szilard engine
CHSH correlations induce a binary-symmetric side-information channel whose mutual information sets the reversible work extractable in a Szilard engine, with quantum and nonsignalling resources outperforming classical ones.
Reference graph
Works this paper leans on
-
[1]
Define also the error bit E:=G⊕X
Independence induced by the one-time pad Recall that the referee samples an independent uniform bitR, and defines X=f(U, V)⊕R, G=A⊕B⊕R. Define also the error bit E:=G⊕X. Then E=A⊕B⊕f(U, V). ThusEdepends on (U, V, A, B), but not onR. Lemma 3(Independence ofXandE).The target bit Xis independent of the error bitE. Proof.Letx, e∈ {0,1}. By the law of total pr...
-
[2]
The computational basis vectors ofF⊗Whave energies E00 = 0, E 10 = ∆, E 01 = ∆, E 11 = 2∆
Energy preservation of the equal-gap SWAP The fuel and battery Hamiltonians are HF = ∆|1⟩⟨1| F , H W = ∆|1⟩⟨1| W . The computational basis vectors ofF⊗Whave energies E00 = 0, E 10 = ∆, E 01 = ∆, E 11 = 2∆. The SWAP unitary satisfies SWAPF W |00⟩=|00⟩, SWAPF W |10⟩=|01⟩, SWAPF W |01⟩=|10⟩, and SWAPF W |11⟩=|11⟩. It leaves the zero- and two-excitation secto...
-
[3]
Unitarity of the equality-controlled battery operation The equality-controlled battery unitary is Ubat = X x,g∈{0,1} |x⟩⟨x|X ⊗ |g⟩⟨g| G ⊗V xg, where Vxg = ( SWAPF W , x=g, IF W , x̸=g. Let Πxg :=|x⟩⟨x| X ⊗ |g⟩⟨g| G . The projectors Π xg are mutually orthogonal and resolve the identity: ΠxgΠx′g′ =δ x,x′δg,g ′Πxg, X x,g Πxg =I XG . EachV xg is unitary. Ther...
-
[4]
Hence Htot =H X +H G +H F +H W =H F +H W
Energy preservation of the equality-controlled operation The logical registers are degenerate: HX =H G = 0. Hence Htot =H X +H G +H F +H W =H F +H W . For each branch,V xg is either the identity or SWAP F W. Both commute withH F +H W . Therefore every block Πxg ⊗V xg commutes withH tot, and so does their sum: [Ubat, Htot] = 0. Appendix B: General binary-p...
-
[5]
Classical value For the chained gameG N, the 2Ntested constraints are αj ⊕β j = 0, j= 0, . . . , N−1, αj+1 ⊕β j = 0, j= 0, . . . , N−2, and α0 ⊕β N−1 = 1. Hereα j andβ j are deterministic local outputs. A deterministic strategy cannot satisfy all constraints. Indeed, from αj ⊕β j = 0 we get αj =β j for allj. From αj+1 ⊕β j = 0 forj= 0, . . . , N−2, we get...
-
[6]
Then the winning condition is satisfied with probability one
Nonsignalling value For every allowed input pair (u, v), define P(a, b|u, v) = ( 1 2 , a⊕b=f(u, v), 0, a⊕b̸=f(u, v). Then the winning condition is satisfied with probability one. Alice’s marginal is uniform: X b P(a, b|u, v) = 1 2 for botha= 0,1, independently ofv. Bob’s marginal is also uniform: X a P(a, b|u, v) = 1 2 for bothb= 0,1, independently ofu. H...
-
[7]
ForN= 2, this gives ωQ(G2) = cos2 π 8 , which is the usual CHSH quantum winning probability
Quantum value The quantum value is the standard chained Tsirelson value: ωQ(GN) = cos2 π 4N . ForN= 2, this gives ωQ(G2) = cos2 π 8 , which is the usual CHSH quantum winning probability. Appendix D: Convex-content bounds from battery data The battery value can also be used to lower-bound the fraction of a behaviour that must lie outside a chosen resource ...
-
[8]
A lower bound on nonsignalling nonlocal content is ob- tained by taking C=L,D=NS
CHSH nonlocal and post-quantum content For CHSH, ωL = 3 4 , ω Q = cos2 π 8 , ω NS = 1. A lower bound on nonsignalling nonlocal content is ob- tained by taking C=L,D=NS. Then qNL ≥ E[Wbat]/∆− 3 4 1− 3 4 = 4 E[Wbat] ∆ −3. Using E[Wbat] ∆ = 1 2 + S 8 , this becomes qNL ≥ S−2 2 . For post-quantum content, take C=Q,D=NS. Then qpostQ ≥ E[Wbat]/∆−cos 2(π/8) 1−co...
-
[9]
Here Beta −1(q;a, b) is theq-quantile of the beta distri- bution with parametersa, b
Clopper–Pearson interval A two-sided Clopper–Pearson interval [24] with error probabilityαis [pL, pU], where, for 0< k < n, pL = Beta−1 α 2 ;k, n−k+ 1 , and pU = Beta−1 1− α 2 ;k+ 1, n−k . Here Beta −1(q;a, b) is theq-quantile of the beta distri- bution with parametersa, b. The endpoint conventions are pL = 0 ifk= 0, and pU = 1 ifk=n. A one-sided lower co...
-
[10]
Let z= Φ −1 1− α 2 , where Φ is the standard normal cumulative distribution function
Wilson interval The Wilson interval [25] is often shorter while main- taining good coverage. Let z= Φ −1 1− α 2 , where Φ is the standard normal cumulative distribution function. The Wilson interval is ˆp+z2 2n −z q ˆp(1−ˆp) n + z2 4n2 1 + z2 n , ˆp+z2 2n +z q ˆp(1−ˆp) n + z2 4n2 1 + z2 n
-
[11]
Mapping to CHSH Any confidence interval p∈[p L, pU] gives a battery interval E[Wbat]∈[∆p L,∆p U]. For CHSH, S= 8 p− 1 2 . Thus S∈ 8 pL − 1 2 ,8 pU − 1 2 . A finite-data post-quantumness certificate is obtained whenever pL >cos 2 π 8 , or equivalently 8 pL − 1 2 >2 √ 2. Appendix G: Memory reset variants The Landauer term in the main text refers to a com- p...
-
[12]
The memory entropy is H(Z) =h 2(p)
Compressed success memory If the only persistent memory is Z=1{win}, then P[Z= 1] =p,P[Z= 0] = 1−p, where p=p G succ(P). The memory entropy is H(Z) =h 2(p). Blind erasure costs at least Qreset ≥k BTln 2h 2(p)
-
[13]
SinceZis a deterministic function ofT, H(T)≥H(Z) =h 2(p)
Full transcript memory If the implementation stores the full transcript T= (U, V, R, A, B), then the erasure cost is governed byH(T), not merely byh 2(p). SinceZis a deterministic function ofT, H(T)≥H(Z) =h 2(p). Thus erasing the full transcript is at least as costly as erasing the compressed success/failure bit
-
[14]
Side-information-assisted reset If the erasing agent has side informationYcorrelated with the memory, then the relevant classical entropy can be reduced to a conditional entropyH(Z|Y). The present work deliberately uses blind reset of the persistent local memory, so such side-information-assisted reductions are not used
-
[15]
Reversible uncomputation In the reversible-controller implementation, the success bit is computed, used, and uncomputed. No persistentZ remains. Therefore no Landauer erasure cost is assigned to the success bit in that implementation. Appendix H: Detailed fuel-battery balance The initial fuel-battery state is |1⟩F |0⟩W . The initial fuel energy is Ein F =...
-
[16]
J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt, Physical Review Letters23, 880 (1969)
work page 1969
-
[17]
B. S. Tsirelson, Letters in Mathematical Physics4, 93 (1980)
work page 1980
- [18]
-
[19]
J. Barrett, N. Linden, S. Massar, S. Pironio, S. Popescu, and D. Roberts, Physical Review A71, 022101 (2005)
work page 2005
-
[20]
Consequences and Limits of Nonlocal Strategies
R. Cleve, P. Høyer, B. Toner, and J. Watrous, inPro- ceedings of the 19th IEEE Annual Conference on Com- putational Complexity(IEEE Computer Society, 2004) pp. 236–249, arXiv:quant-ph/0404076
work page internal anchor Pith review Pith/arXiv arXiv 2004
-
[21]
S. L. Braunstein and C. M. Caves, Annals of Physics202, 22 (1990)
work page 1990
-
[22]
Tsirelson bounds for generalized Clauser-Horne-Shimony-Holt inequalities
S. Wehner, Physical Review A73, 022110 (2006), arXiv:quant-ph/0510076
work page internal anchor Pith review Pith/arXiv arXiv 2006
- [23]
-
[24]
F. G. S. L. Brand˜ ao, M. Horodecki, N. Ng, J. Oppenheim, and S. Wehner, Proceedings of the National Academy of Sciences112, 3275 (2015)
work page 2015
-
[25]
M. Lostaglio, D. Jennings, and T. Rudolph, Nature Com- munications6, 6383 (2015)
work page 2015
- [26]
-
[27]
Landauer, IBM Journal of Research and Development 5, 183 (1961)
R. Landauer, IBM Journal of Research and Development 5, 183 (1961)
work page 1961
-
[28]
C. H. Bennett, International Journal of Theoretical Physics21, 905 (1982)
work page 1982
- [29]
- [30]
-
[31]
J. M. R. Parrondo, J. M. Horowitz, and T. Sagawa, Na- ture Physics11, 131 (2015)
work page 2015
- [32]
- [33]
-
[34]
S. Rout, A. B. Ravichandran, P. Horodecki, and A. Chaturvedi, Quantum work beyond classical (com- muting) limits (2026), arXiv:2605.04021 [quant-ph]
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[35]
Hoeffding, Journal of the American Statistical Asso- ciation58, 13 (1963)
W. Hoeffding, Journal of the American Statistical Asso- ciation58, 13 (1963)
work page 1963
-
[36]
Azuma, Tohoku Mathematical Journal19, 357 (1967)
K. Azuma, Tohoku Mathematical Journal19, 357 (1967)
work page 1967
-
[37]
Thermodynamic value of CHSH-induced side-information channels in a Szilard engine
P. ´Cwikli´ nski, Thermodynamic value of chsh-induced side-information channels in a szilard engine (2026), arXiv:2605.12044 [quant-ph]
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[38]
B. Toner and F. Verstraete, Monogamy of bell cor- relations and tsirelson’s bound (2006), arXiv:quant- ph/0611001 [quant-ph]
-
[39]
C. J. Clopper and E. S. Pearson, Biometrika26, 404 (1934)
work page 1934
-
[40]
E. B. Wilson, Journal of the American Statistical Asso- ciation22, 209 (1927)
work page 1927
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.