pith. sign in

arxiv: 2605.21293 · v1 · pith:VZG5RBALnew · submitted 2026-05-20 · 🪐 quant-ph

Quantum Nonlocality and Device-Independent Randomness are Robust to Noisy Signaling Channels

Pith reviewed 2026-05-21 04:27 UTC · model grok-4.3

classification 🪐 quant-ph
keywords Bell inequalitiesquantum nonlocalitydevice-independent randomnessnoisy signalinglocal polytopeCHSH inequalityrandomness certification
0
0 comments X

The pith

Bell inequalities can still certify quantum nonlocality and device-independent randomness even when one party receives a noisy copy of the other's input through a signaling channel.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper investigates whether quantum nonlocality remains detectable when the strict no-signaling condition of Bell tests is relaxed to allow noisy transmission of inputs between the two parties. It models the imperfection as a binary channel that forwards a noisy version of one input before measurements occur. By fully mapping the local polytope in this relaxed setting, the authors derive new Bell inequalities that quantum correlations can violate even when the channel noise is low. These inequalities outperform the standard CHSH inequality in extracting certified randomness under additional depolarizing noise on the quantum state. The same approach extends to the case where both parties exchange noisy input copies.

Core claim

If a binary channel sends a noisy copy of one party's input to the other before any measurements take place, Bell inequalities exist that certify non-signaling quantum correlations. This holds even when a near perfect copy of the input is sent. The local polytope in this scenario is completely characterized by its vertices and facets, allowing identification of such inequalities. These inequalities are more robust to depolarizing noise than the CHSH inequality when certifying device-independent randomness. Similar conclusions hold when both parties receive noisy copies of each other's inputs.

What carries the argument

The local polytope under noisy input signaling via a binary channel, fully characterized by its vertices and facets to derive Bell inequalities that bound classical behaviors while remaining violated by quantum correlations.

If this is right

  • Quantum nonlocality can be certified from observed data even when devices allow limited input leakage through noisy channels.
  • Device-independent randomness extraction remains feasible and yields higher rates with the new inequalities than with CHSH under depolarizing noise.
  • The full characterization of the local polytope enables systematic search for optimal inequalities in this signaling model.
  • Similar robustness conclusions apply when both parties receive noisy copies of each other's inputs.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • These inequalities could support device-independent protocols in compact physical setups where perfect isolation of inputs is impractical.
  • Optimizing the inequalities for particular channel noise strengths may further improve certified randomness yields in noisy environments.
  • The polytope enumeration technique opens a route to analyze noisy signaling in multipartite or higher-dimensional Bell scenarios.

Load-bearing premise

The imperfect signaling can be accurately modeled as a binary channel transmitting a noisy copy of one input to the other party prior to any measurements.

What would settle it

Compute the maximum value of one of the new Bell inequalities achievable by quantum mechanics under a chosen noisy channel parameter and verify whether it exceeds the local bound obtained from the polytope facets; violation by quantum but not by the enumerated local vertices would support the claim.

Figures

Figures reproduced from arXiv: 2605.21293 by Kuntal Sengupta, Lewis Wooltorton.

Figure 1
Figure 1. Figure 1: FIG. 1. An illustration of the minimal Bell scenario in the [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: FIG. 2. Comparison between different Bell expression when [PITH_FULL_IMAGE:figures/full_fig_p012_2.png] view at source ↗
Figure 4
Figure 4. Figure 4: FIG. 4. Value of the parameter [PITH_FULL_IMAGE:figures/full_fig_p034_4.png] view at source ↗
read the original abstract

Given a pair of isolated devices that accept random binary inputs and return binary outputs, a user can deduce from the observed data alone if the underlying mechanism can be explained classically. Bell's theorem further states that a classical explanation can be ruled out if the devices perform certain measurements on an entangled quantum state, underpinning the security of cryptographic protocols that are device-independent (DI). For certain protocols, such as those performed in a tight space, it might be difficult to perfectly enforce the non-signaling assumption required in Bell's theorem. This prompts the question: is quantum nonlocality robust to such imperfections? We show that if a binary channel sends a noisy copy of one party's input to the other before any measurements take place, the answer is yes. We completely characterize the vertices and facets of the local polytope in this scenario, and identify Bell inequalities that certify non-signaling quantum correlations. This is possible even when a near perfect copy of the input is sent. We go on to show that the identified inequalities are more robust to depolarizing noise than the Clauser-Horne-Shimony-Holt inequality when certifying DI randomness in this scenario. In addition, we characterize the local polytope when both parties receive a noisy copy of each other's input and make similar conclusions, leaving many new potential Bell inequalities to be explored.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 3 minor

Summary. The manuscript studies the robustness of quantum nonlocality and device-independent randomness extraction to imperfect isolation in Bell scenarios. It models a one-way noisy binary channel that transmits a copy of Alice's input to Bob prior to measurement, fully characterizes the vertices and facets of the resulting local polytope, and identifies Bell inequalities that remain violated by non-signaling quantum correlations even for near-perfect channel fidelity. The authors further compare the noise robustness of these inequalities against CHSH for DI randomness certification and extend the polytope analysis to the bidirectional noisy-signaling case.

Significance. If the claimed complete polytope characterization is accurate, the result is significant for practical device-independent protocols, as it demonstrates that nonlocality and randomness certification can persist under realistic signaling imperfections that are difficult to eliminate in compact setups. The explicit facet inequalities and their superior performance under depolarizing noise relative to CHSH provide concrete, usable tools for improving security margins in DI randomness generation. The bidirectional extension opens additional avenues for inequality discovery.

major comments (2)
  1. [§4] §4 (Characterization of the one-way local polytope): The central claim of a complete vertex enumeration for the local polytope under the probabilistic noisy channel rests on exhaustive listing of channel-compatible deterministic strategies, yet the manuscript provides no explicit count of total strategies considered, no verification algorithm, and no supplementary data confirming that the reported vertices form the full convex hull. This enumeration is load-bearing for the subsequent facet extraction and for the assertion that the identified inequalities certify non-signaling quantum correlations.
  2. [Table 2] Table 2 (Facet inequalities for near-perfect channel): The listed inequalities are stated to remain violated by quantum correlations at high channel fidelity, but no explicit calculation or reference to the quantum violation value is supplied for the specific channel parameter regime claimed to be 'near perfect,' undermining the robustness statement without additional verification steps.
minor comments (3)
  1. [Eq. (7)] The notation for the noisy channel transition probabilities in Eq. (7) is introduced without a clear diagram or example computation showing how a deterministic local strategy maps to the four possible output tables.
  2. [Figure 3] Figure 3 caption does not specify the exact depolarizing noise parameter range used for the robustness comparison, making it hard to reproduce the plotted advantage over CHSH.
  3. [Introduction] A reference to the standard Bell polytope methods (e.g., from prior works on signaling polytopes) is missing in the introduction, which would help situate the new enumeration technique.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the careful reading and constructive comments on our manuscript. We address each major comment below and will revise the manuscript to provide the requested details on the polytope enumeration and explicit quantum violation values.

read point-by-point responses
  1. Referee: [§4] §4 (Characterization of the one-way local polytope): The central claim of a complete vertex enumeration for the local polytope under the probabilistic noisy channel rests on exhaustive listing of channel-compatible deterministic strategies, yet the manuscript provides no explicit count of total strategies considered, no verification algorithm, and no supplementary data confirming that the reported vertices form the full convex hull. This enumeration is load-bearing for the subsequent facet extraction and for the assertion that the identified inequalities certify non-signaling quantum correlations.

    Authors: We agree that additional transparency on the enumeration strengthens the claim. The local polytope vertices were obtained by exhaustive enumeration of all 16 deterministic local strategies (4 response functions for Alice and 4 for Bob, given binary inputs/outputs). For each strategy we computed the induced behavior under the probabilistic one-way channel and extracted the extreme points of their convex hull. In the revised manuscript we will state the total count explicitly, describe the enumeration procedure, and include the full list of vertices (or a supplementary table) to allow independent verification that they span the reported convex hull. revision: yes

  2. Referee: [Table 2] Table 2 (Facet inequalities for near-perfect channel): The listed inequalities are stated to remain violated by quantum correlations at high channel fidelity, but no explicit calculation or reference to the quantum violation value is supplied for the specific channel parameter regime claimed to be 'near perfect,' undermining the robustness statement without additional verification steps.

    Authors: We acknowledge that explicit numerical values would make the robustness claim easier to verify. In the revised version we will add the quantum violation amounts (obtained via semidefinite programming or Tsirelson-bound optimization) for each inequality in Table 2 at the high-fidelity regimes discussed (e.g., channel fidelity 0.99). These calculations confirm that the new inequalities remain violated while CHSH does not, and we will include the relevant SDP formulations or references. revision: yes

Circularity Check

0 steps flagged

No significant circularity in polytope characterization or inequality identification

full rationale

The paper's derivation proceeds by defining a noisy binary signaling channel model, enumerating deterministic local strategies compatible with that channel to obtain the vertices of the resulting local polytope, extracting its facets as Bell inequalities, and then verifying that certain quantum correlations violate those inequalities. This is a standard, non-reductive application of convex geometry to an explicitly stated scenario; the enumeration and facet extraction supply independent content rather than renaming or fitting inputs. No self-definitional loops, fitted parameters presented as predictions, or load-bearing self-citations appear in the provided text. The claimed robustness result therefore rests on the explicit model and computation rather than tautological equivalence to its inputs.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

Central claim rests on standard convex polytope theory and the modeling choice of a binary noisy channel; no free parameters, new entities, or ad-hoc axioms are introduced in the abstract.

axioms (1)
  • standard math Local behaviors form a convex polytope whose vertices and facets can be enumerated under modified signaling constraints.
    Invoked when the authors state they completely characterize the vertices and facets of the local polytope.

pith-pipeline@v0.9.0 · 5766 in / 1109 out tokens · 28357 ms · 2026-05-21T04:27:05.675156+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

76 extracted references · 76 canonical work pages · 3 internal anchors

  1. [1]

    Now, if a probabil- ity distribution is non-signaling, then the sum of the first two probabilities in every row and column is the same as the sum of the last two probabilities

    This reduces the dimension by 4. Now, if a probabil- ity distribution is non-signaling, then the sum of the first two probabilities in every row and column is the same as the sum of the last two probabilities. This further reduces the dimension by 4. Therefore, a signaling prob- ability distribution must have true dimension between 9 and 12. In particular...

  2. [2]

    For all non-signaling local behaviorsP NS L , Tp(PNS L )⩽2(|2p−1|+ 1−p)/p

  3. [3]

    For all one-way signaling local behaviorsP S L ∈ S(p,p),(1/2,1/2),T p(PS L)⩽2 max n p, −p+ 2 (1−p)2 p o + 2(1−p)

  4. [4]

    For all non-signaling quantum behaviorsP NS Q , Tp(PNS Q )⩽2 √ 2 q p 3p−1

  5. [5]

    See Section F for proof

    Up to local isometries, there is a unique non- signaling quantum strategy that achievesT p(PNS Q ) = 2 √ 2 q p 3p−1, given by ρ=|ψ θ⟩ ⟨ψθ|,|ψ θ⟩= cos(θ)|00⟩+ sin(θ)|11⟩, A0 =σ X , A 1 =σ Z, B0 = cos(ϕ)σ Z + sin(ϕ)σ X , B1 =−cos(ϕ)σ Z + sin(ϕ)σ X , (13) where θ= 1 2arctan f1/g1 −π/2, ϕ= arctan f2/g2 , f1 = p p(−2 + 5p) 1−3p , g 1 = 1−2p −1 + 3p, f2 =− r −2...

  6. [6]

    For all two-way signaling local behaviorsP S L ∈ S(p,1),(r,1),W p,r(PS L)⩽1

  7. [7]

    closed lab assumption

    There exists a non-signaling quantum behaviorP NS Q such thatW p,r(PNS Q )>1. See Section F for proof. Note that when evaluated on non-signaling behaviors andp=r= 0,W p,r(PNS) reduces to the CHSH inequal- ity up to constants and relabeling: W0,0(PNS) = 1 2+1 4 ⟨A0(−B0+B1)⟩+ 1 4 ⟨A1(B0+B1)⟩⩽1. In the same spirit as Eq. (12), we can view Eq. (15) as another...

  8. [8]

    Quantum Secure Networks Partnership

    Furthermore, the optimal choiceT qopt certifies a near maximum amount of randomness for almost all values of pthat are less than 1. VI. DISCUSSION Our results show that nonlocal quantum correlations are robust to noisy input signaling in the minimal Bell FIG. 3. Comparison between different Bell expression when certifying DI randomness in the presence of ...

  9. [9]

    Sengupta,Towards an Understanding of Quantum and Post-Quantum Correlations in Three Causal Set- tings, Ph.D

    K. Sengupta,Towards an Understanding of Quantum and Post-Quantum Correlations in Three Causal Set- tings, Ph.D. thesis, University of York (2025), available from White Rose eTheses Online

  10. [10]

    J. S. Bell, On the Einstein Podolsky Rosen paradox, Physics Physique Fizika1, 195 (1964)

  11. [11]

    Brunner, D

    N. Brunner, D. Cavalcanti, S. Pironio, V. Scarani, and S. Wehner, Bell nonlocality, Reviews of Modern Physics 86, 419–478 (2014)

  12. [12]

    Einstein, B

    A. Einstein, B. Podolsky, and N. Rosen, Can quantum- mechanical description of physical reality be considered complete?, Physical Review47, 777 (1935)

  13. [13]

    Quantum And Relativistic Protocols For Secure Multi-Party Computation

    R. Colbeck,Quantum and Relativistic Protocols For Se- cure Multi-Party Computation, Ph.D. thesis, University of Cambridge (2007), also available as arXiv:0911.3814

  14. [14]

    Colbeck and A

    R. Colbeck and A. Kent, Private randomness expansion with untrusted devices, Journal of Physics A44, 095305 (2011)

  15. [15]

    Pironio, A

    S. Pironio, A. Acin, S. Massar, A. Boyer de la Giroday, D. N. Matsukevich, P. Maunz, S. Olmschenk, D. Hayes, L. Luo, T. A. Manning, and C. Monroe, Random num- bers certified by Bell’s theorem, Nature464, 1021 (2010)

  16. [16]

    C. A. Miller and Y. Shi, Robust protocols for securely expanding randomness and distributing keys using un- trusted quantum devices, inProceedings of the 46th An- nual ACM Symposium on Theory of Computing, STOC ’14 (ACM, New York, NY, USA, 2014) pp. 417–426

  17. [17]

    C. A. Miller and Y. Shi, Universal security for random- ness expansion from the spot-checking protocol, SIAM Journal of Computing46, 1304 (2017)

  18. [19]

    A. K. Ekert, Quantum cryptography based on Bell’s the- orem, Physical Review Letters67, 661 (1991)

  19. [20]

    A. Acin, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, Device-independent security of quantum cryptography against collective attacks, Physical Review Letters98, 230501 (2007)

  20. [21]

    Pironio, A

    S. Pironio, A. Acin, N. Brunner, N. Gisin, S. Massar, and V. Scarani, Device-independent quantum key distri- bution secure against collective attacks, New Journal of Physics11, 045021 (2009)

  21. [22]

    Vazirani and T

    U. Vazirani and T. Vidick, Fully device-independent quantum key distribution, Physical Review Letters113, 140501 (2014)

  22. [23]

    Arnon-Friedman, F

    R. Arnon-Friedman, F. Dupuis, O. Fawzi, R. Renner, and T. Vidick, Practical device-independent quantum cryp- tography via entropy accumulation, Nature communica- tions9, 459 (2018)

  23. [24]

    Foreman, S

    C. Foreman, S. Wright, A. Edgington, M. Berta, and F. J. Curchod, Practical randomness amplification and privatisation with implementations on quantum comput- ers, Quantum7, 969 (2023). 14

  24. [25]

    Fyrillas, B

    A. Fyrillas, B. Bourdoncle, A. Ma¨ ınos, P.-E. Eme- riau, K. Start, N. Margaria, M. Morassi, A. Lemaˆ ıtre, I. Sagnes, P. Stepanov, T. H. Au, S. Boissier, N. So- maschi, N. Maring, N. Belabas, and S. Mansfield, Certi- fied randomness in tight space, PRX Quantum5, 020348 (2024)

  25. [26]

    Silman, S

    J. Silman, S. Pironio, and S. Massar, Device-independent randomness generation in the presence of weak cross-talk, Phys. Rev. Lett.110, 100504 (2013)

  26. [27]

    Ansmann, H

    M. Ansmann, H. Wang, R. C. Bialczak, M. Hofheinz, E. Lucero, M. Neeley, A. D. O’Connell, D. Sank, M. Wei- des, J. Wenner, A. N. Cleland, and J. M. Martinis, Vi- olation of Bell’s inequality in Josephson phase qubits, Nature461, 504 (2009)

  27. [28]

    T. Maudlin, Bell’s inequality, information transmission, and prism models, PSA: Proceedings of the Biennial Meeting of the Philosophy of Science Association1992, 404 (1992), full publication date: 1992

  28. [29]

    Brassard, R

    G. Brassard, R. Cleve, and A. Tapp, Cost of exactly sim- ulating quantum entanglement with classical communi- cation, Phys. Rev. Lett.83, 1874 (1999)

  29. [30]

    Steiner, Towards quantifying non-local information transfer: finite-bit non-locality, Physics Letters A270, 239–244 (2000)

    M. Steiner, Towards quantifying non-local information transfer: finite-bit non-locality, Physics Letters A270, 239–244 (2000)

  30. [31]

    Paw lowski, J

    M. Paw lowski, J. Kofler, T. Paterek, M. Seevinck, and ˇCaslav Brukner, Non-local setting and outcome infor- mation for violation of Bell’s inequality, New Journal of Physics12, 083051 (2010)

  31. [32]

    Ghadimi, Parameter dependence and Bell nonlocality, Phys

    M. Ghadimi, Parameter dependence and Bell nonlocality, Phys. Rev. A104, 032205 (2021)

  32. [33]

    B. F. Toner and D. Bacon, Communication cost of sim- ulating Bell correlations, Phys. Rev. Lett.91, 187904 (2003)

  33. [34]

    Regev and B

    O. Regev and B. Toner, Simulating quantum correlations with finite communication, SIAM Journal on Computing 39, 1562 (2010)

  34. [35]

    V´ ertesi and E

    T. V´ ertesi and E. Bene, Lower bound on the communi- cation cost of simulating bipartite quantum correlations, Phys. Rev. A80, 062316 (2009)

  35. [36]

    Can outcome communication explain Bell nonlocality?

    C. Vieira, C. de Gois, P. Lauand, L. E. A. Porto, S. De- signolle, and M. T. Quintino, Can outcome communica- tion explain Bell nonlocality? (2025), arXiv:2510.12886 [quant-ph]

  36. [37]

    Barrett and N

    J. Barrett and N. Gisin, How much measurement inde- pendence is needed to demonstrate nonlocality?, Phys. Rev. Lett.106, 100406 (2011)

  37. [38]

    M. J. W. Hall, Local deterministic model of singlet state correlations based on relaxing measurement indepen- dence, Phys. Rev. Lett.105, 250404 (2010)

  38. [39]

    M. J. W. Hall, Relaxed Bell inequalities and Kochen- Specker theorems, Phys. Rev. A84, 022102 (2011)

  39. [40]

    P¨ utz and N

    G. P¨ utz and N. Gisin, Measurement dependent locality, New Journal of Physics18, 055006 (2016)

  40. [41]

    Aktas, S

    D. Aktas, S. Tanzilli, A. Martin, G. P¨ utz, R. Thew, and N. Gisin, Demonstration of quantum nonlocality in the presence of measurement dependence, Phys. Rev. Lett. 114, 220404 (2015)

  41. [42]

    ˇSupi´ c, J.-D

    I. ˇSupi´ c, J.-D. Bancal, and N. Brunner, Quantum nonlo- cality in the presence of strong measurement dependence, Phys. Rev. A108, 042207 (2023)

  42. [43]

    Vieira, R

    C. Vieira, R. Ramanathan, and A. Cabello, Test of the physical significance of Bell non-locality, Nature Commu- nications16, 4390 (2025)

  43. [44]

    Ramanathan and Y

    R. Ramanathan and Y. Liu, Quantum nonlocality and device-independent randomness robust to relaxations of Bell assumptions (2025), arXiv:2512.18513 [quant-ph]

  44. [45]

    Colbeck and R

    R. Colbeck and R. Renner, Free randomness can be am- plified, Nature Physics8, 450 (2012)

  45. [46]

    Gallego, L

    R. Gallego, L. Masanes, G. De La Torre, C. Dhara, L. Aolita, and A. Ac´ ın, Full randomness from arbitrar- ily deterministic events, Nature Communications4, 2654 (2013)

  46. [47]

    Kulikov, S

    A. Kulikov, S. Storz, J. D. Sch¨ ar, M. Sandfuchs, R. Wolf, F. Berterotti` ere, C. Hellings, R. Renner, and A. Wallraff, Device-independent randomness amplifica- tion (2024), arXiv:2412.17931 [quant-ph]

  47. [48]

    E. Y. Z. Tan, Robustness of implemented device- independent protocols against constrained leakage (2023), arXiv:2302.13928 [quant-ph]

  48. [49]

    Arqand, T

    A. Arqand, T. Metger, and E. Y. Z. Tan, Mutual informa- tion chain rules for security proofs robust against device imperfections (2024), arXiv:2407.20396 [quant-ph]

  49. [50]

    Wooltorton, P

    L. Wooltorton, P. Brown, and R. Colbeck, Tight analytic bound on the trade-off between device-independent ran- domness and nonlocality, Phys. Rev. Lett.129, 150403 (2022)

  50. [51]

    Barizien, P

    V. Barizien, P. Sekatski, and J.-D. Bancal, Custom Bell inequalities from formal sums of squares, Quantum8, 1333 (2024)

  51. [52]

    Brown, H

    P. Brown, H. Fawzi, and O. Fawzi, Device-independent lower bounds on the conditional von Neumann entropy, Quantum8, 1445 (2024)

  52. [53]

    J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt, Proposed experiment to test local hidden-variable theo- ries, Physical Review Letters23, 880 (1969)

  53. [54]

    Baptista, R

    P. Baptista, R. Chen, J. Kaniewski, D. R. Lolck, L. Manˇ cinska, T. G. Nielsen, and S. Schmidt, A math- ematical foundation for self-testing: Lifting common as- sumptions, Annales Henri Poincar´ e (2025)

  54. [55]

    Mayers and A

    D. Mayers and A. Yao, Quantum cryptography with imperfect apparatus, inProceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS- 98)(IEEE Computer Society, Los Alamitos, CA, USA,

  55. [56]

    McKague, T

    M. McKague, T. H. Yang, and V. Scarani, Robust self- testing of the singlet, Journal of Physics A: Mathematical and Theoretical45, 455304 (2012)

  56. [57]

    T. H. Yang and M. Navascu´ es, Robust self-testing of un- known quantum systems into any entangled two-qubit states, Physical Review A87, 050102 (2013)

  57. [58]

    ˇSupi´ c and J

    I. ˇSupi´ c and J. Bowles, Self-testing of quantum systems: a review, Quantum4, 337 (2020)

  58. [59]

    L¨ orwald and G

    S. L¨ orwald and G. Reinelt, Panda: a software for polyhe- dral transformations, EURO Journal on Computational Optimization3, 297 (2015)

  59. [60]

    Jordan, Essai sur la g´ eom´ etrie ` a n dimensions, Bulletin de la S

    C. Jordan, Essai sur la g´ eom´ etrie ` a n dimensions, Bulletin de la S. M. F.3, 103 (1875)

  60. [61]

    Barizien and J.-D

    V. Barizien and J.-D. Bancal, Quantum statistics in the minimal Bell scenario, Nature Physics21, 577 (2025)

  61. [62]

    Paulsen,Completely Bounded Maps and Operator Al- gebras, Cambridge Studies in Advanced Mathematics (Cambridge University Press, 2003)

    V. Paulsen,Completely Bounded Maps and Operator Al- gebras, Cambridge Studies in Advanced Mathematics (Cambridge University Press, 2003)

  62. [63]

    Bhavsar, S

    R. Bhavsar, S. Ragy, and R. Colbeck, Improved device- independent randomness expansion rates from tight bounds on the two sided randomness using CHSH tests (2021), arXiv:2103.07504 [quant-ph]. 15

  63. [64]

    Pirandola, U

    S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Sham- sul Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, Advances in quantum cryp- tography, Advances in Optics and Photonics12, 1012 (2020)

  64. [65]

    Dupuis, O

    F. Dupuis, O. Fawzi, and R. Renner, Entropy accumu- lation, Communications in Mathematical Physics379, 867–913 (2020)

  65. [66]

    Metger, O

    T. Metger, O. Fawzi, D. Sutter, and R. Renner, Gen- eralised entropy accumulation, in2022 IEEE 63rd An- nual Symposium on Foundations of Computer Science (FOCS)(IEEE, 2022) p. 844–850

  66. [67]

    Device-independent quantum cryptography with input leakage

    V. Zapatero and M. Curty, Device-independent quantum cryptography with input leakage (2026), arXiv:2604.20573 [quant-ph]. Appendix A: V ertices of the local polytope with general signaling models We consider here the most general setting with binary asymmetric channels between Alice and Bob. There two channels in total, the first from Alice to Bob and the...

  67. [68]

    F acets ofS (p,p),(1/2,1/2) F1 =   1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0   ,F 2 =   1− 1−p 2p−1 0 0 1− 1−p 2p−1 0 0 0− p−1 2p−1 0 0 0− p−1 2p−1 0 0   , F3 =   1− −3p3+4p2−3p+1 4p3−4p2+3p−1 0− p3 4p3−4p2+3p−1 − −5p3+5p2−3p+1 4p3−4p2+3p−1 − −4p3+3p2−2p+1 4p3−4p2+3p−1 (p−1)2p 4p3−4p2+3p−1 0 0− (p−1)3 4p3−4p2+3p−1 0− p3−p2 4p3−4p2+3p−1 0− p3−p...

  68. [69]

    F acets ofS (p,p),(p,p) F′ 1 =   1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0   , F′ 2 =   p 2p−1 p 2p−1 p−1 2p−1 p−1 2p−1 0 0 0 0 0 0 0 0 0 0 0 0   , F′ 3 =   1− −3p3+2p2−2p+1 4p3−4p2+3p−1 0 (p−1)p2 4p3−4p2+3p−1 − −3p3+2p2−2p+1 4p3−4p2+3p−1 − −2p3+2p2−2p+1 4p3−4p2+3p−1 − (p−1)3 4p3−4p2+3p−1 0 0− (p−1)3 4p3−4p2+3p−1 0− −p3+2p2−p 4p3−4p2+3p−1 0− (p−...

  69. [70]

    On the other hand,vrefers to a facet for which there is numerical evidence that a non-signaling two-qubit strategy violates the corresponding facet inequality

    F acets ofS (p,1),(r,1) In the subscript,srefers to a facet for which numerical evidence suggests no quantum violation is possible using two-qubit strategies. On the other hand,vrefers to a facet for which there is numerical evidence that a non-signaling two-qubit strategy violates the corresponding facet inequality.   1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ...

  70. [71]

    Therefore, for simplicity here we taker=p

    Examples of interesting facets ofS (p,1)∗,(r=p,1)∗ Note that for anyp, r∈[0,1),S (p,1)∗,(r,1)∗ ⊆S (p=p′,1)∗,(r=p′,1)∗, wherep ′ := max{p, r}. Therefore, for simplicity here we taker=p. We numerically found 5 interesting facets of this polytope, i.e., ones that indicate a quantum violation following a numerical search. We managed to derive the following tw...

  71. [72]

    For all non-signaling local behaviorsP NS L ,T p(PNS L )⩽2(|2p−1|+ 1−p)/p

  72. [73]

    For all one-way signaling local behaviorsP S L ∈S (p,p),(1/2,1/2),T p(PS L)⩽2 max n p, −p+ 2 (1−p)2 p o + 2(1−p)

  73. [74]

    For all non-signaling quantum behaviorsP NS Q ,T p(PNS Q )⩽2 √ 2 q p 3p−1

  74. [75]

    (F3) whenp∈(2/5,1/2)∪(1/2,1)andθ=ϕ=−π/4whenp= 1/2

    Up to local isometries, there is a unique non-signaling quantum strategy that achievesT p(PNS Q ) = 2 √ 2 q p 3p−1, given by ρ=|ψ θ⟩ ⟨ψθ|,|ψ θ⟩= cos(θ)|00⟩+ sin(θ)|11⟩, A0 =σ X , A 1 =σ Z, B0 = cos(ϕ)σ Z + sin(ϕ)σ X , B1 =−cos(ϕ)σ Z + sin(ϕ)σ X , (F2) where θ= 1 2arctan f1/g1 −π/2, ϕ= arctan f2/g2 , f1 = p p(−2 + 5p) 1−3p , g 1 = 1−2p −1 + 3p, f2 =− r −2 ...

  75. [76]

    For all two-way signaling local behaviorsP S L ∈S (p,1),(r,1),W p,r(PS L)⩽1

  76. [77]

    There exists a non-signaling quantum behaviorP NS Q such thatW p,r(PS Q)>1. Proof.Part 1: As done in the proof of Proposition 1, we can parameterise a LHV model using 8±1 valued variables αx,y = (−1)ax,y andβ x,y = (−1)bx,y forx, y∈ {0,1}, wherea x,y andb x,y are the binary response functions. We then define ⟨Ax,0⟩=rα x,0 + (1−r)α x,1 ⟨Ax,1⟩=α x,1 ⟨B0,y⟩=...