Quantum Nonlocality and Device-Independent Randomness are Robust to Noisy Signaling Channels
Pith reviewed 2026-05-21 04:27 UTC · model grok-4.3
The pith
Bell inequalities can still certify quantum nonlocality and device-independent randomness even when one party receives a noisy copy of the other's input through a signaling channel.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
If a binary channel sends a noisy copy of one party's input to the other before any measurements take place, Bell inequalities exist that certify non-signaling quantum correlations. This holds even when a near perfect copy of the input is sent. The local polytope in this scenario is completely characterized by its vertices and facets, allowing identification of such inequalities. These inequalities are more robust to depolarizing noise than the CHSH inequality when certifying device-independent randomness. Similar conclusions hold when both parties receive noisy copies of each other's inputs.
What carries the argument
The local polytope under noisy input signaling via a binary channel, fully characterized by its vertices and facets to derive Bell inequalities that bound classical behaviors while remaining violated by quantum correlations.
If this is right
- Quantum nonlocality can be certified from observed data even when devices allow limited input leakage through noisy channels.
- Device-independent randomness extraction remains feasible and yields higher rates with the new inequalities than with CHSH under depolarizing noise.
- The full characterization of the local polytope enables systematic search for optimal inequalities in this signaling model.
- Similar robustness conclusions apply when both parties receive noisy copies of each other's inputs.
Where Pith is reading between the lines
- These inequalities could support device-independent protocols in compact physical setups where perfect isolation of inputs is impractical.
- Optimizing the inequalities for particular channel noise strengths may further improve certified randomness yields in noisy environments.
- The polytope enumeration technique opens a route to analyze noisy signaling in multipartite or higher-dimensional Bell scenarios.
Load-bearing premise
The imperfect signaling can be accurately modeled as a binary channel transmitting a noisy copy of one input to the other party prior to any measurements.
What would settle it
Compute the maximum value of one of the new Bell inequalities achievable by quantum mechanics under a chosen noisy channel parameter and verify whether it exceeds the local bound obtained from the polytope facets; violation by quantum but not by the enumerated local vertices would support the claim.
Figures
read the original abstract
Given a pair of isolated devices that accept random binary inputs and return binary outputs, a user can deduce from the observed data alone if the underlying mechanism can be explained classically. Bell's theorem further states that a classical explanation can be ruled out if the devices perform certain measurements on an entangled quantum state, underpinning the security of cryptographic protocols that are device-independent (DI). For certain protocols, such as those performed in a tight space, it might be difficult to perfectly enforce the non-signaling assumption required in Bell's theorem. This prompts the question: is quantum nonlocality robust to such imperfections? We show that if a binary channel sends a noisy copy of one party's input to the other before any measurements take place, the answer is yes. We completely characterize the vertices and facets of the local polytope in this scenario, and identify Bell inequalities that certify non-signaling quantum correlations. This is possible even when a near perfect copy of the input is sent. We go on to show that the identified inequalities are more robust to depolarizing noise than the Clauser-Horne-Shimony-Holt inequality when certifying DI randomness in this scenario. In addition, we characterize the local polytope when both parties receive a noisy copy of each other's input and make similar conclusions, leaving many new potential Bell inequalities to be explored.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript studies the robustness of quantum nonlocality and device-independent randomness extraction to imperfect isolation in Bell scenarios. It models a one-way noisy binary channel that transmits a copy of Alice's input to Bob prior to measurement, fully characterizes the vertices and facets of the resulting local polytope, and identifies Bell inequalities that remain violated by non-signaling quantum correlations even for near-perfect channel fidelity. The authors further compare the noise robustness of these inequalities against CHSH for DI randomness certification and extend the polytope analysis to the bidirectional noisy-signaling case.
Significance. If the claimed complete polytope characterization is accurate, the result is significant for practical device-independent protocols, as it demonstrates that nonlocality and randomness certification can persist under realistic signaling imperfections that are difficult to eliminate in compact setups. The explicit facet inequalities and their superior performance under depolarizing noise relative to CHSH provide concrete, usable tools for improving security margins in DI randomness generation. The bidirectional extension opens additional avenues for inequality discovery.
major comments (2)
- [§4] §4 (Characterization of the one-way local polytope): The central claim of a complete vertex enumeration for the local polytope under the probabilistic noisy channel rests on exhaustive listing of channel-compatible deterministic strategies, yet the manuscript provides no explicit count of total strategies considered, no verification algorithm, and no supplementary data confirming that the reported vertices form the full convex hull. This enumeration is load-bearing for the subsequent facet extraction and for the assertion that the identified inequalities certify non-signaling quantum correlations.
- [Table 2] Table 2 (Facet inequalities for near-perfect channel): The listed inequalities are stated to remain violated by quantum correlations at high channel fidelity, but no explicit calculation or reference to the quantum violation value is supplied for the specific channel parameter regime claimed to be 'near perfect,' undermining the robustness statement without additional verification steps.
minor comments (3)
- [Eq. (7)] The notation for the noisy channel transition probabilities in Eq. (7) is introduced without a clear diagram or example computation showing how a deterministic local strategy maps to the four possible output tables.
- [Figure 3] Figure 3 caption does not specify the exact depolarizing noise parameter range used for the robustness comparison, making it hard to reproduce the plotted advantage over CHSH.
- [Introduction] A reference to the standard Bell polytope methods (e.g., from prior works on signaling polytopes) is missing in the introduction, which would help situate the new enumeration technique.
Simulated Author's Rebuttal
We thank the referee for the careful reading and constructive comments on our manuscript. We address each major comment below and will revise the manuscript to provide the requested details on the polytope enumeration and explicit quantum violation values.
read point-by-point responses
-
Referee: [§4] §4 (Characterization of the one-way local polytope): The central claim of a complete vertex enumeration for the local polytope under the probabilistic noisy channel rests on exhaustive listing of channel-compatible deterministic strategies, yet the manuscript provides no explicit count of total strategies considered, no verification algorithm, and no supplementary data confirming that the reported vertices form the full convex hull. This enumeration is load-bearing for the subsequent facet extraction and for the assertion that the identified inequalities certify non-signaling quantum correlations.
Authors: We agree that additional transparency on the enumeration strengthens the claim. The local polytope vertices were obtained by exhaustive enumeration of all 16 deterministic local strategies (4 response functions for Alice and 4 for Bob, given binary inputs/outputs). For each strategy we computed the induced behavior under the probabilistic one-way channel and extracted the extreme points of their convex hull. In the revised manuscript we will state the total count explicitly, describe the enumeration procedure, and include the full list of vertices (or a supplementary table) to allow independent verification that they span the reported convex hull. revision: yes
-
Referee: [Table 2] Table 2 (Facet inequalities for near-perfect channel): The listed inequalities are stated to remain violated by quantum correlations at high channel fidelity, but no explicit calculation or reference to the quantum violation value is supplied for the specific channel parameter regime claimed to be 'near perfect,' undermining the robustness statement without additional verification steps.
Authors: We acknowledge that explicit numerical values would make the robustness claim easier to verify. In the revised version we will add the quantum violation amounts (obtained via semidefinite programming or Tsirelson-bound optimization) for each inequality in Table 2 at the high-fidelity regimes discussed (e.g., channel fidelity 0.99). These calculations confirm that the new inequalities remain violated while CHSH does not, and we will include the relevant SDP formulations or references. revision: yes
Circularity Check
No significant circularity in polytope characterization or inequality identification
full rationale
The paper's derivation proceeds by defining a noisy binary signaling channel model, enumerating deterministic local strategies compatible with that channel to obtain the vertices of the resulting local polytope, extracting its facets as Bell inequalities, and then verifying that certain quantum correlations violate those inequalities. This is a standard, non-reductive application of convex geometry to an explicitly stated scenario; the enumeration and facet extraction supply independent content rather than renaming or fitting inputs. No self-definitional loops, fitted parameters presented as predictions, or load-bearing self-citations appear in the provided text. The claimed robustness result therefore rests on the explicit model and computation rather than tautological equivalence to its inputs.
Axiom & Free-Parameter Ledger
axioms (1)
- standard math Local behaviors form a convex polytope whose vertices and facets can be enumerated under modified signaling constraints.
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We completely characterize the vertices and facets of the local polytope in this scenario... S(p,p),(1/2,1/2) ... facet inequalities that certify non-signaling quantum correlations
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
the identified inequalities are more robust to depolarizing noise than the Clauser-Horne-Shimony-Holt inequality when certifying DI randomness
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
This reduces the dimension by 4. Now, if a probabil- ity distribution is non-signaling, then the sum of the first two probabilities in every row and column is the same as the sum of the last two probabilities. This further reduces the dimension by 4. Therefore, a signaling prob- ability distribution must have true dimension between 9 and 12. In particular...
-
[2]
For all non-signaling local behaviorsP NS L , Tp(PNS L )⩽2(|2p−1|+ 1−p)/p
-
[3]
For all one-way signaling local behaviorsP S L ∈ S(p,p),(1/2,1/2),T p(PS L)⩽2 max n p, −p+ 2 (1−p)2 p o + 2(1−p)
-
[4]
For all non-signaling quantum behaviorsP NS Q , Tp(PNS Q )⩽2 √ 2 q p 3p−1
-
[5]
Up to local isometries, there is a unique non- signaling quantum strategy that achievesT p(PNS Q ) = 2 √ 2 q p 3p−1, given by ρ=|ψ θ⟩ ⟨ψθ|,|ψ θ⟩= cos(θ)|00⟩+ sin(θ)|11⟩, A0 =σ X , A 1 =σ Z, B0 = cos(ϕ)σ Z + sin(ϕ)σ X , B1 =−cos(ϕ)σ Z + sin(ϕ)σ X , (13) where θ= 1 2arctan f1/g1 −π/2, ϕ= arctan f2/g2 , f1 = p p(−2 + 5p) 1−3p , g 1 = 1−2p −1 + 3p, f2 =− r −2...
-
[6]
For all two-way signaling local behaviorsP S L ∈ S(p,1),(r,1),W p,r(PS L)⩽1
-
[7]
There exists a non-signaling quantum behaviorP NS Q such thatW p,r(PNS Q )>1. See Section F for proof. Note that when evaluated on non-signaling behaviors andp=r= 0,W p,r(PNS) reduces to the CHSH inequal- ity up to constants and relabeling: W0,0(PNS) = 1 2+1 4 ⟨A0(−B0+B1)⟩+ 1 4 ⟨A1(B0+B1)⟩⩽1. In the same spirit as Eq. (12), we can view Eq. (15) as another...
-
[8]
Quantum Secure Networks Partnership
Furthermore, the optimal choiceT qopt certifies a near maximum amount of randomness for almost all values of pthat are less than 1. VI. DISCUSSION Our results show that nonlocal quantum correlations are robust to noisy input signaling in the minimal Bell FIG. 3. Comparison between different Bell expression when certifying DI randomness in the presence of ...
work page 2030
-
[9]
K. Sengupta,Towards an Understanding of Quantum and Post-Quantum Correlations in Three Causal Set- tings, Ph.D. thesis, University of York (2025), available from White Rose eTheses Online
work page 2025
-
[10]
J. S. Bell, On the Einstein Podolsky Rosen paradox, Physics Physique Fizika1, 195 (1964)
work page 1964
-
[11]
N. Brunner, D. Cavalcanti, S. Pironio, V. Scarani, and S. Wehner, Bell nonlocality, Reviews of Modern Physics 86, 419–478 (2014)
work page 2014
-
[12]
A. Einstein, B. Podolsky, and N. Rosen, Can quantum- mechanical description of physical reality be considered complete?, Physical Review47, 777 (1935)
work page 1935
-
[13]
Quantum And Relativistic Protocols For Secure Multi-Party Computation
R. Colbeck,Quantum and Relativistic Protocols For Se- cure Multi-Party Computation, Ph.D. thesis, University of Cambridge (2007), also available as arXiv:0911.3814
work page internal anchor Pith review Pith/arXiv arXiv 2007
-
[14]
R. Colbeck and A. Kent, Private randomness expansion with untrusted devices, Journal of Physics A44, 095305 (2011)
work page 2011
-
[15]
S. Pironio, A. Acin, S. Massar, A. Boyer de la Giroday, D. N. Matsukevich, P. Maunz, S. Olmschenk, D. Hayes, L. Luo, T. A. Manning, and C. Monroe, Random num- bers certified by Bell’s theorem, Nature464, 1021 (2010)
work page 2010
-
[16]
C. A. Miller and Y. Shi, Robust protocols for securely expanding randomness and distributing keys using un- trusted quantum devices, inProceedings of the 46th An- nual ACM Symposium on Theory of Computing, STOC ’14 (ACM, New York, NY, USA, 2014) pp. 417–426
work page 2014
-
[17]
C. A. Miller and Y. Shi, Universal security for random- ness expansion from the spot-checking protocol, SIAM Journal of Computing46, 1304 (2017)
work page 2017
-
[19]
A. K. Ekert, Quantum cryptography based on Bell’s the- orem, Physical Review Letters67, 661 (1991)
work page 1991
-
[20]
A. Acin, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, Device-independent security of quantum cryptography against collective attacks, Physical Review Letters98, 230501 (2007)
work page 2007
-
[21]
S. Pironio, A. Acin, N. Brunner, N. Gisin, S. Massar, and V. Scarani, Device-independent quantum key distri- bution secure against collective attacks, New Journal of Physics11, 045021 (2009)
work page 2009
-
[22]
U. Vazirani and T. Vidick, Fully device-independent quantum key distribution, Physical Review Letters113, 140501 (2014)
work page 2014
-
[23]
R. Arnon-Friedman, F. Dupuis, O. Fawzi, R. Renner, and T. Vidick, Practical device-independent quantum cryp- tography via entropy accumulation, Nature communica- tions9, 459 (2018)
work page 2018
-
[24]
C. Foreman, S. Wright, A. Edgington, M. Berta, and F. J. Curchod, Practical randomness amplification and privatisation with implementations on quantum comput- ers, Quantum7, 969 (2023). 14
work page 2023
-
[25]
A. Fyrillas, B. Bourdoncle, A. Ma¨ ınos, P.-E. Eme- riau, K. Start, N. Margaria, M. Morassi, A. Lemaˆ ıtre, I. Sagnes, P. Stepanov, T. H. Au, S. Boissier, N. So- maschi, N. Maring, N. Belabas, and S. Mansfield, Certi- fied randomness in tight space, PRX Quantum5, 020348 (2024)
work page 2024
- [26]
-
[27]
M. Ansmann, H. Wang, R. C. Bialczak, M. Hofheinz, E. Lucero, M. Neeley, A. D. O’Connell, D. Sank, M. Wei- des, J. Wenner, A. N. Cleland, and J. M. Martinis, Vi- olation of Bell’s inequality in Josephson phase qubits, Nature461, 504 (2009)
work page 2009
-
[28]
T. Maudlin, Bell’s inequality, information transmission, and prism models, PSA: Proceedings of the Biennial Meeting of the Philosophy of Science Association1992, 404 (1992), full publication date: 1992
work page 1992
-
[29]
G. Brassard, R. Cleve, and A. Tapp, Cost of exactly sim- ulating quantum entanglement with classical communi- cation, Phys. Rev. Lett.83, 1874 (1999)
work page 1999
-
[30]
M. Steiner, Towards quantifying non-local information transfer: finite-bit non-locality, Physics Letters A270, 239–244 (2000)
work page 2000
-
[31]
M. Paw lowski, J. Kofler, T. Paterek, M. Seevinck, and ˇCaslav Brukner, Non-local setting and outcome infor- mation for violation of Bell’s inequality, New Journal of Physics12, 083051 (2010)
work page 2010
-
[32]
Ghadimi, Parameter dependence and Bell nonlocality, Phys
M. Ghadimi, Parameter dependence and Bell nonlocality, Phys. Rev. A104, 032205 (2021)
work page 2021
-
[33]
B. F. Toner and D. Bacon, Communication cost of sim- ulating Bell correlations, Phys. Rev. Lett.91, 187904 (2003)
work page 2003
-
[34]
O. Regev and B. Toner, Simulating quantum correlations with finite communication, SIAM Journal on Computing 39, 1562 (2010)
work page 2010
-
[35]
T. V´ ertesi and E. Bene, Lower bound on the communi- cation cost of simulating bipartite quantum correlations, Phys. Rev. A80, 062316 (2009)
work page 2009
-
[36]
Can outcome communication explain Bell nonlocality?
C. Vieira, C. de Gois, P. Lauand, L. E. A. Porto, S. De- signolle, and M. T. Quintino, Can outcome communica- tion explain Bell nonlocality? (2025), arXiv:2510.12886 [quant-ph]
work page internal anchor Pith review Pith/arXiv arXiv 2025
-
[37]
J. Barrett and N. Gisin, How much measurement inde- pendence is needed to demonstrate nonlocality?, Phys. Rev. Lett.106, 100406 (2011)
work page 2011
-
[38]
M. J. W. Hall, Local deterministic model of singlet state correlations based on relaxing measurement indepen- dence, Phys. Rev. Lett.105, 250404 (2010)
work page 2010
-
[39]
M. J. W. Hall, Relaxed Bell inequalities and Kochen- Specker theorems, Phys. Rev. A84, 022102 (2011)
work page 2011
-
[40]
G. P¨ utz and N. Gisin, Measurement dependent locality, New Journal of Physics18, 055006 (2016)
work page 2016
- [41]
-
[42]
I. ˇSupi´ c, J.-D. Bancal, and N. Brunner, Quantum nonlo- cality in the presence of strong measurement dependence, Phys. Rev. A108, 042207 (2023)
work page 2023
- [43]
-
[44]
R. Ramanathan and Y. Liu, Quantum nonlocality and device-independent randomness robust to relaxations of Bell assumptions (2025), arXiv:2512.18513 [quant-ph]
-
[45]
R. Colbeck and R. Renner, Free randomness can be am- plified, Nature Physics8, 450 (2012)
work page 2012
-
[46]
R. Gallego, L. Masanes, G. De La Torre, C. Dhara, L. Aolita, and A. Ac´ ın, Full randomness from arbitrar- ily deterministic events, Nature Communications4, 2654 (2013)
work page 2013
-
[47]
A. Kulikov, S. Storz, J. D. Sch¨ ar, M. Sandfuchs, R. Wolf, F. Berterotti` ere, C. Hellings, R. Renner, and A. Wallraff, Device-independent randomness amplifica- tion (2024), arXiv:2412.17931 [quant-ph]
- [48]
- [49]
-
[50]
L. Wooltorton, P. Brown, and R. Colbeck, Tight analytic bound on the trade-off between device-independent ran- domness and nonlocality, Phys. Rev. Lett.129, 150403 (2022)
work page 2022
-
[51]
V. Barizien, P. Sekatski, and J.-D. Bancal, Custom Bell inequalities from formal sums of squares, Quantum8, 1333 (2024)
work page 2024
- [52]
-
[53]
J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt, Proposed experiment to test local hidden-variable theo- ries, Physical Review Letters23, 880 (1969)
work page 1969
-
[54]
P. Baptista, R. Chen, J. Kaniewski, D. R. Lolck, L. Manˇ cinska, T. G. Nielsen, and S. Schmidt, A math- ematical foundation for self-testing: Lifting common as- sumptions, Annales Henri Poincar´ e (2025)
work page 2025
-
[55]
D. Mayers and A. Yao, Quantum cryptography with imperfect apparatus, inProceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS- 98)(IEEE Computer Society, Los Alamitos, CA, USA,
-
[56]
M. McKague, T. H. Yang, and V. Scarani, Robust self- testing of the singlet, Journal of Physics A: Mathematical and Theoretical45, 455304 (2012)
work page 2012
-
[57]
T. H. Yang and M. Navascu´ es, Robust self-testing of un- known quantum systems into any entangled two-qubit states, Physical Review A87, 050102 (2013)
work page 2013
-
[58]
I. ˇSupi´ c and J. Bowles, Self-testing of quantum systems: a review, Quantum4, 337 (2020)
work page 2020
-
[59]
S. L¨ orwald and G. Reinelt, Panda: a software for polyhe- dral transformations, EURO Journal on Computational Optimization3, 297 (2015)
work page 2015
-
[60]
Jordan, Essai sur la g´ eom´ etrie ` a n dimensions, Bulletin de la S
C. Jordan, Essai sur la g´ eom´ etrie ` a n dimensions, Bulletin de la S. M. F.3, 103 (1875)
-
[61]
V. Barizien and J.-D. Bancal, Quantum statistics in the minimal Bell scenario, Nature Physics21, 577 (2025)
work page 2025
-
[62]
V. Paulsen,Completely Bounded Maps and Operator Al- gebras, Cambridge Studies in Advanced Mathematics (Cambridge University Press, 2003)
work page 2003
-
[63]
R. Bhavsar, S. Ragy, and R. Colbeck, Improved device- independent randomness expansion rates from tight bounds on the two sided randomness using CHSH tests (2021), arXiv:2103.07504 [quant-ph]. 15
-
[64]
S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Sham- sul Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, Advances in quantum cryp- tography, Advances in Optics and Photonics12, 1012 (2020)
work page 2020
- [65]
- [66]
-
[67]
Device-independent quantum cryptography with input leakage
V. Zapatero and M. Curty, Device-independent quantum cryptography with input leakage (2026), arXiv:2604.20573 [quant-ph]. Appendix A: V ertices of the local polytope with general signaling models We consider here the most general setting with binary asymmetric channels between Alice and Bob. There two channels in total, the first from Alice to Bob and the...
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[68]
F acets ofS (p,p),(1/2,1/2) F1 = 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ,F 2 = 1− 1−p 2p−1 0 0 1− 1−p 2p−1 0 0 0− p−1 2p−1 0 0 0− p−1 2p−1 0 0 , F3 = 1− −3p3+4p2−3p+1 4p3−4p2+3p−1 0− p3 4p3−4p2+3p−1 − −5p3+5p2−3p+1 4p3−4p2+3p−1 − −4p3+3p2−2p+1 4p3−4p2+3p−1 (p−1)2p 4p3−4p2+3p−1 0 0− (p−1)3 4p3−4p2+3p−1 0− p3−p2 4p3−4p2+3p−1 0− p3−p...
-
[69]
F acets ofS (p,p),(p,p) F′ 1 = 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 , F′ 2 = p 2p−1 p 2p−1 p−1 2p−1 p−1 2p−1 0 0 0 0 0 0 0 0 0 0 0 0 , F′ 3 = 1− −3p3+2p2−2p+1 4p3−4p2+3p−1 0 (p−1)p2 4p3−4p2+3p−1 − −3p3+2p2−2p+1 4p3−4p2+3p−1 − −2p3+2p2−2p+1 4p3−4p2+3p−1 − (p−1)3 4p3−4p2+3p−1 0 0− (p−1)3 4p3−4p2+3p−1 0− −p3+2p2−p 4p3−4p2+3p−1 0− (p−...
-
[70]
F acets ofS (p,1),(r,1) In the subscript,srefers to a facet for which numerical evidence suggests no quantum violation is possible using two-qubit strategies. On the other hand,vrefers to a facet for which there is numerical evidence that a non-signaling two-qubit strategy violates the corresponding facet inequality. 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ...
-
[71]
Therefore, for simplicity here we taker=p
Examples of interesting facets ofS (p,1)∗,(r=p,1)∗ Note that for anyp, r∈[0,1),S (p,1)∗,(r,1)∗ ⊆S (p=p′,1)∗,(r=p′,1)∗, wherep ′ := max{p, r}. Therefore, for simplicity here we taker=p. We numerically found 5 interesting facets of this polytope, i.e., ones that indicate a quantum violation following a numerical search. We managed to derive the following tw...
-
[72]
For all non-signaling local behaviorsP NS L ,T p(PNS L )⩽2(|2p−1|+ 1−p)/p
-
[73]
For all one-way signaling local behaviorsP S L ∈S (p,p),(1/2,1/2),T p(PS L)⩽2 max n p, −p+ 2 (1−p)2 p o + 2(1−p)
-
[74]
For all non-signaling quantum behaviorsP NS Q ,T p(PNS Q )⩽2 √ 2 q p 3p−1
-
[75]
(F3) whenp∈(2/5,1/2)∪(1/2,1)andθ=ϕ=−π/4whenp= 1/2
Up to local isometries, there is a unique non-signaling quantum strategy that achievesT p(PNS Q ) = 2 √ 2 q p 3p−1, given by ρ=|ψ θ⟩ ⟨ψθ|,|ψ θ⟩= cos(θ)|00⟩+ sin(θ)|11⟩, A0 =σ X , A 1 =σ Z, B0 = cos(ϕ)σ Z + sin(ϕ)σ X , B1 =−cos(ϕ)σ Z + sin(ϕ)σ X , (F2) where θ= 1 2arctan f1/g1 −π/2, ϕ= arctan f2/g2 , f1 = p p(−2 + 5p) 1−3p , g 1 = 1−2p −1 + 3p, f2 =− r −2 ...
-
[76]
For all two-way signaling local behaviorsP S L ∈S (p,1),(r,1),W p,r(PS L)⩽1
-
[77]
There exists a non-signaling quantum behaviorP NS Q such thatW p,r(PS Q)>1. Proof.Part 1: As done in the proof of Proposition 1, we can parameterise a LHV model using 8±1 valued variables αx,y = (−1)ax,y andβ x,y = (−1)bx,y forx, y∈ {0,1}, wherea x,y andb x,y are the binary response functions. We then define ⟨Ax,0⟩=rα x,0 + (1−r)α x,1 ⟨Ax,1⟩=α x,1 ⟨B0,y⟩=...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.