pith. sign in

arxiv: 2605.16151 · v1 · pith:GZLP3MY4new · submitted 2026-05-15 · 🪐 quant-ph

Generalized measurement incompatibility

Pith reviewed 2026-05-20 18:04 UTC · model grok-4.3

classification 🪐 quant-ph
keywords measurement incompatibilitypartial joint measurabilitydevice-independent protocolsuntrusted measurement devicessemidefinite programmingdetection efficiencyquantum cryptography
0
0 comments X

The pith

An adversary with classical side information can perfectly guess all outcomes of quantum measurements if and only if the measurements are partially jointly measurable.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

This paper generalizes partial joint-measurability so that only chosen subsets of outcomes from each measurement need to be jointly determined by classical variables. It gives two equivalent mathematical definitions of the property and shows both can be checked by solving one semidefinite program. The main result is an if-and-only-if theorem: when a measurement device is untrusted, an adversary limited to classical side information can guess every outcome perfectly precisely when the measurements satisfy this partial joint measurability. The equivalence immediately supplies analytical bounds on how low detector efficiency can fall before generic measurements become partially jointly measurable, which in turn bounds the security of device-independent and semi-device-independent quantum protocols.

Core claim

In the untrusted-device scenario an adversary Eve who holds only classical side information can perfectly guess every outcome of a set of measurements if and only if the measurements are partially jointly measurable, that is, if and only if there exist classical random variables that jointly reproduce the specified subsets of outcomes of every measurement.

What carries the argument

Partial joint-measurability: the property that only a designated subset of outcomes of each measurement can be reproduced by classical post-processing of a single joint measurement.

If this is right

  • Analytical thresholds exist below which the detection efficiency of generic measurements renders them partially jointly measurable.
  • These thresholds directly limit how much detection inefficiency device-independent quantum cryptographic protocols can tolerate while remaining secure.
  • The same thresholds apply to semi-device-independent protocols.
  • Security proofs must treat postselection explicitly to avoid incorrect claims of security.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The equivalence may allow tighter security analyses in quantum key distribution by replacing full incompatibility requirements with partial ones when detectors are inefficient.
  • The framework could be used to quantify how much incompatibility is actually needed for other quantum tasks such as state discrimination under loss.
  • An extension to adversaries with quantum side information would be a natural next question left open by the classical-side-information setting.

Load-bearing premise

The adversary has access only to classical side information and possesses no quantum side information about the measurement device.

What would settle it

An explicit set of measurements together with a classical guessing strategy for Eve that succeeds with probability one, yet for which the semidefinite program certifying partial joint-measurability returns a negative answer, would falsify the claimed equivalence.

Figures

Figures reproduced from arXiv: 2605.16151 by Edwin Peter Lobo, Maria Balanz\'o-Juand\'o, Stefano Pironio.

Figure 1
Figure 1. Figure 1: FIG. 1: Left: The overall simulation of the measurements [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: Hence θ is close to zero when all measurements are close to a common axis, and it is large when no single axis is well aligned with all of them. In the special case of two measurements, θ = arccos|⃗r1 · ⃗r2| ∈ [0, π/2] (22) is the angle between the two measurement axes and ⃗m is the bisector of the two axes. For θ = π/2, i.e., mutually anticommuting measurements, this yields the bound η ≤ 2 − √ 2 ≈ 0.586. … view at source ↗
Figure 3
Figure 3. Figure 3: FIG. 3: Illustration of the angle [PITH_FULL_IMAGE:figures/full_fig_p009_3.png] view at source ↗
Figure 4
Figure 4. Figure 4: FIG. 4: The maximum detection efficiency [PITH_FULL_IMAGE:figures/full_fig_p010_4.png] view at source ↗
read the original abstract

Quantum measurements can be incompatible, i.e., they can fail to be jointly measurable. Recently, a weaker notion of joint-measurability, called partial joint-measurability, was proposed by Masini et al. in [Quantum 8, 1574 (2024)]. In this work, we further generalize this notion to the setting where only a subset of the outcomes of each measurement is required to be jointly determined by classical variables. We provide two mathematical formulations of partial joint-measurability and show that, like full joint-measurability, it can be decided by solving a single semidefinite program. We prove that in the case of an untrusted measurement device, an adversary Eve, limited to classical side information, can perfectly guess the outcomes of the measurement device if and only if the set of measurements is partially jointly measurable. We derive analytical thresholds on the detection efficiency below which generic measurements become partially jointly measurable. Such bounds directly yield limits on the robustness of device-independent and semi-device-independent quantum cryptographic protocols against detection inefficiency. In particular, our results highlight the importance of a careful treatment of postselection in security analyses.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

1 major / 3 minor

Summary. The manuscript generalizes partial joint-measurability of quantum measurements to the case where only specified subsets of outcomes from each measurement must be jointly determined by a classical variable. It supplies two equivalent mathematical characterizations (one SDP-based), proves that both are decidable via a single semidefinite program, establishes an if-and-only-if equivalence between this generalized partial joint-measurability and the ability of an adversary limited to classical side information to perfectly guess the relevant outcome subsets on an untrusted device, and derives analytical detection-efficiency thresholds below which generic measurements become partially jointly measurable, with direct implications for the robustness of device-independent and semi-device-independent cryptographic protocols.

Significance. If the central equivalence and SDP formulations hold, the work supplies a practical, computable criterion for a weakened form of incompatibility that is directly tied to guessing attacks with classical side information. The analytical efficiency bounds and the explicit link to post-selection in security proofs constitute a concrete advance for the analysis of DI/SDI protocols under realistic detection losses.

major comments (1)
  1. §4, Theorem 1: the proof of the guessing equivalence relies on the existence of a classical random variable that jointly reproduces the specified outcome subsets; it would be useful to see an explicit construction of the joint POVM from the SDP solution (or vice versa) to confirm that the reduction is tight and does not introduce additional assumptions on the dimension of the classical variable.
minor comments (3)
  1. Abstract and §1: the citation to Masini et al. (Quantum 8, 1574, 2024) should include the arXiv identifier or DOI for completeness.
  2. Figure 1 caption: the labeling of the outcome subsets in the diagram is slightly ambiguous; adding an explicit legend or equation reference would improve clarity.
  3. §5.2: the derivation of the analytical detection-efficiency threshold assumes a specific form for the measurements; a brief remark on how the bound generalizes to arbitrary POVMs would be helpful.

Simulated Author's Rebuttal

1 responses · 0 unresolved

We thank the referee for their careful reading of the manuscript, positive summary, and recommendation for minor revision. We address the single major comment below.

read point-by-point responses
  1. Referee: §4, Theorem 1: the proof of the guessing equivalence relies on the existence of a classical random variable that jointly reproduces the specified outcome subsets; it would be useful to see an explicit construction of the joint POVM from the SDP solution (or vice versa) to confirm that the reduction is tight and does not introduce additional assumptions on the dimension of the classical variable.

    Authors: We thank the referee for this helpful suggestion to strengthen the exposition. The proof of Theorem 1 establishes the equivalence by showing that a joint POVM for the relevant outcome subsets exists if and only if there exists a classical random variable whose marginals reproduce the specified outcome probabilities. The SDP in the manuscript is formulated directly over the joint POVM elements (with the appropriate marginal constraints for the subsets), so any feasible SDP solution yields an explicit joint POVM. From this joint POVM one constructs the classical random variable by labeling its outcomes with the tuples of the relevant measurement outcomes and setting the probabilities via the Born rule with respect to the input state. Conversely, given a classical random variable that reproduces the subsets, the joint POVM is recovered by grouping the classical outcomes according to the specified subsets and defining the corresponding POVM elements as the sum of the projectors for each group. The alphabet size of the classical variable is at most the product of the cardinalities of the relevant outcome subsets, which is finite and introduces no additional dimensional assumptions beyond those already present in the finite-outcome setting. We will add a dedicated paragraph with this explicit bidirectional construction immediately following the statement of Theorem 1 in the revised manuscript. revision: yes

Circularity Check

0 steps flagged

No significant circularity in derivation chain

full rationale

The paper introduces a generalization of partial joint-measurability to subsets of outcomes and supplies two independent mathematical characterizations (one SDP-based). It then proves their equivalence and derives the guessing equivalence for an adversary with only classical side information directly from the existence of a joint classical variable that reproduces the specified outcome subsets. The central if-and-only-if result follows from this construction without reducing to a fitted parameter, self-citation chain, or redefinition of the target quantity. The cited prior work (Masini et al.) is external and concerns only the original notion; the present argument is self-contained against the stated classical-side-information model and contains no load-bearing self-reference or ansatz smuggling.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

Review performed on abstract only; no explicit free parameters, invented entities, or ad-hoc axioms are stated. The work rests on standard quantum mechanics and the computational tractability of semidefinite programs for joint-measurability problems.

axioms (1)
  • domain assumption Quantum measurements are described by positive operator-valued measures on a Hilbert space
    Standard framework invoked for all joint-measurability questions in quantum information.

pith-pipeline@v0.9.0 · 5726 in / 1330 out tokens · 62846 ms · 2026-05-20T18:04:36.525962+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

27 extracted references · 27 canonical work pages · 12 internal anchors

  1. [1]

    in QKD protocols this is enough to know all the generated key

    Unlike the ran- dom guessing strategy in Ref. [18] (which corresponds to ν= 0,η= 1/k), this weak measurement allows Eve to increase her probability of correctly guessing the conclu- sive outcome and hence increasesη. In the limitν= 1, η= 1, Eve performs the sharp measurementB 1, as in the strategy of Ref. [14]. However, the instrumentIintroduces a disturb...

  2. [2]

    J. S. Bell, On the Einstein Podolsky Rosen paradox, Physics Physique Fizika1, 195 (1964)

  3. [3]

    Bell nonlocality

    N. Brunner, D. Cavalcanti, S. Pironio, V. Scarani, and S. Wehner, Bell nonlocality, Rev. Mod. Phys.86, 419 (2014), arXiv:1303.2849 [quant-ph]

  4. [4]

    R. Uola, T. Moroder, and O. Gühne, Joint measurability of generalized measurements implies classicality, Phys. Rev. Lett.113, 160403 (2014), arXiv:1407.2224 [quant- ph]

  5. [5]

    M. T. Quintino, T. Vértesi, and N. Brunner, Joint measurability, Einstein-Podolsky-Rosen steering, and Bell nonlocality, Phys. Rev. Lett.113, 160402 (2014), arXiv:1406.6976 [quant-ph]

  6. [6]

    J. S. Bell, On the problem of hidden variables in quantum mechanics, Rev. Mod. Phys.38, 447 (1966)

  7. [7]

    Kochen and E

    S. Kochen and E. P. Specker, The problem of hidden variables in quantum mechanics, Journal of Mathematics and Mechanics17, 59 (1967)

  8. [8]

    N. D. Mermin, Hidden variables and the two theo- rems of John Bell, Rev. Mod. Phys.65, 803 (1993), arXiv:1802.10119 [quant-ph]

  9. [9]

    A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, Device-independent security of quantum cryptography against collective attacks, Phys. Rev. Lett. 98, 230501 (2007), arXiv:quant-ph/0702152

  10. [10]

    I. W. Primaatmaja, K. T. Goh, E. Y.-Z. Tan, J. T.-F. Khoo, S. Ghorai, and C. C.-W. Lim, Security of device- independent quantum key distribution protocols: a re- view, Quantum7, 932 (2023), arXiv:2206.04960 [quant- ph]

  11. [11]

    Semi-device-independent security of one-way quantum key distribution

    M. Pawłowski and N. Brunner, Semi-device-independent security of one-way quantum key distribution, Phys. Rev. A84, 010302 (2011), arXiv:1103.4105 [quant-ph]

  12. [12]

    Secrecy in prepare-and-measure CHSH tests with a qubit bound

    E. Woodhead and S. Pironio, Secrecy in prepare- and-measure Clauser-Horne-Shimony-Holt tests with a qubit bound, Phys. Rev. Lett.115, 150501 (2015), arXiv:1507.02889 [quant-ph]

  13. [13]

    Masini, M

    M. Masini, M. Ioannou, N. Brunner, S. Pironio, and P. Sekatski, Joint-measurability and quantum communi- cation with untrusted devices, Quantum8, 1574 (2024), arXiv:2403.14785 [quant-ph]

  14. [14]

    One-sided Device-Independent Quantum Key Distribution: Security, feasibility, and the connection with steering

    C. Branciard, E. G. Cavalcanti, S. P. Walborn, V. Scarani, and H. M. Wiseman, One-sided device- independent quantum key distribution: Security, feasi- 13 bility, and the connection with steering, Phys. Rev. A 85, 010301 (2012), arXiv:1109.1435 [quant-ph]

  15. [15]

    A. Acín, D. Cavalcanti, E. Passaro, S. Pironio, and P. Skrzypczyk, Necessary detection efficiencies for secure quantum key distribution and bound randomness, Phys. Rev. A93, 012319 (2016), arXiv:1505.00053 [quant-ph]

  16. [16]

    Loss-tolerant EPR steering for arbitrary dimensional states: joint measurability and unbounded violations under losses

    P. Skrzypczyk and D. Cavalcanti, Loss-tolerant Einstein- Podolsky-Rosen steering for arbitrary-dimensional states: joint measurability and unbounded viola- tions under losses, Phys. Rev. A92, 022354 (2015), arXiv:1502.04926 [quant-ph]

  17. [17]

    L. P. Thinh, G. d. l. Torre, J.-D. Bancal, S. Pironio, and V. Scarani, Randomness in post-selected events, New J. Phys.18, 035007 (2016), arXiv:1506.03953 [quant-ph]

  18. [18]

    Xu, Y.-Z

    F. Xu, Y.-Z. Zhang, Q. Zhang, and J.-W. Pan, Device- independent quantum key distribution with random postselection, Phys. Rev. Lett.128, 110506 (2022), arXiv:2110.02701 [quant-ph]

  19. [19]

    Chaturvedi, G

    A. Chaturvedi, G. Viola, and M. Pawłowski, Extend- ing loophole-free nonlocal correlations to arbitrarily large distances, npj Quantum Information10, 7 (2024), arXiv:2211.14231 [quant-ph]

  20. [20]

    The Uncertainty Relation for Smooth Entropies

    M. Tomamichel and R. Renner, Uncertainty relation for smooth entropies, Phys. Rev. Lett.106, 110506 (2011), arXiv:1009.2015 [quant-ph]

  21. [21]

    Masini and S

    M. Masini and S. Sarkar, One-sided DI-QKD secure against coherent attacks over long distances (2024), arXiv:2403.11850 [quant-ph]

  22. [22]

    Le Roy-Deloison, E

    T. Le Roy-Deloison, E. P. Lobo, J. Pauwels, and S. Piro- nio, Device-independent quantum key distribution based on routed Bell tests, PRX Quantum6, 020311 (2025), arXiv:2404.01202 [quant-ph]

  23. [23]

    Sekatski, J

    P. Sekatski, J. Pauwels, E. P. Lobo, S. Pironio, and N. Brunner, Certification of quantum correlations and DIQKD at arbitrary distances through routed Bell tests (2025), arXiv:2502.12241 [quant-ph]

  24. [24]

    Łukanowski, M

    K. Łukanowski, M. Balanzó-Juandó, M. Farkas, A. Acín, and J. Kołodyński, Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks, Quantum7, 1199 (2023), arXiv:2206.06245 [quant-ph]

  25. [25]

    R. Uola, T. Kraft, J. Shang, X.-D. Yu, and O. Gühne, Quantifying quantum resources with conic programming, Phys. Rev. Lett.122, 130404 (2019), arXiv:1812.09216 [quant-ph]

  26. [26]

    Buscemi, E

    F. Buscemi, E. Chitambar, and W. Zhou, Complete re- source theory of quantum incompatibility as quantum programmability, Phys. Rev. Lett.124, 120401 (2020), arXiv:1908.11274 [quant-ph]

  27. [27]

    Csiszár and J

    I. Csiszár and J. Korner, Broadcast channels with con- fidential messages, IEEE Trans. Inf. Theory24, 339 (1978). Appendix A: Equivalence between the two formulations of partial joint-measurability Here, we show that the formulation of partial joint-measurability in terms of effective POVMsEc,b|y is equivalent to Def. 1. Given the instrumentIand the measu...