Beyond Gisin’s Theorem and its Applications: Violation of Local Realism by Two-Party Einstein-Podolsky-Rosen Steering

Beyond Gisin’s Theorem and its Applications: Violation of Local Realism by Two-Party Einstein-Podolsky-Rosen Steering

Jing-Ling Chen111Correspondence to J.L.C. (chenjl@nankai.edu.cn). Theoretical Physics Division, Chern Institute of Mathematics, Nankai University, Tianjin 300071, People’s Republic of China Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543    Hong-Yi Su Theoretical Physics Division, Chern Institute of Mathematics, Nankai University, Tianjin 300071, People’s Republic of China    Zhen-Peng Xu Theoretical Physics Division, Chern Institute of Mathematics, Nankai University, Tianjin 300071, People’s Republic of China    Yu-Chun Wu Key Laboratory of Quantum Information, University of Science and Technology of China, 230026 Hefei, People’s Republic of China Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, 230026 Hefei, Anhui, China    Chunfeng Wu Pillar of Engineering Product Development, Singapore University of Technology and Design, 8 Somapah Road, Singapore 487372    Xiang-Jun Ye Theoretical Physics Division, Chern Institute of Mathematics, Nankai University, Tianjin 300071, People’s Republic of China    Marek Żukowski Institute of Theoretical Physics and Astrophysics, University of Gdańsk, PL-80-952 Gdańsk, Poland Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, 230026 Hefei, China    L. C. Kwek222Correspondence to L.C.K. (cqtklc@nus.edu.sg). Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 National Institute of Education,1 Nanyang Walk, Singapore 637616 Institute of Advanced Studies, Nanyang Technological University, 60 Nanyang View, Singapore 639673
July 14, 2019
pacs:
03.65.Ud, 03.67.Mn, 42.50.Xa

We demonstrate here that for a given mixed multi-qubit state if there are at least two observers for whom mutual Einstein-Podolsky-Rosen steering is possible, i.e. each observer is able to steer the other qubits into two different pure states by spontaneous collapses due to von Neumann type measurements on his/her qubit, then nonexistence of local realistic models is fully equivalent to quantum entanglement (this is not so without this condition). This result leads to an enhanced version of Gisin’s theorem (originally: all pure entangled states violate local realism). Local realism is violated by all mixed states with the above steering property. The new class of states allows one e.g. to perform three party secret sharing with just pairs of entangled qubits, instead of three qubit entanglements (which are currently available with low fidelity). This significantly increases the feasibility of having high performance versions of such protocols. Finally, we discuss some possible applications.

Quantum mechanical correlations do not admit local realistic models. This pivotal result concerns the foundations of quantum mechanics (QM) and has many applications in quantum information theory. The states exhibiting quantum correlations can be grouped using the following hierarchy  WJD07 (): those that are entangled, those that allow for Einstein-Podolsky-Rosen (EPR) “steering”, and those that violate local realism (LR) Bell ().

According to Edwin Schrödinger  Schrodinger35 (), quantum entanglement is “the characteristic trait of quantum mechanics” distinguishing it from any classical theory. This feature of quantum states is a highly useful resource in many fascinating applications of quantum information, such as teleportation telep1 (); telep2 (), dense coding, communication protocols, and computation Nielsen (); PAN (). Moreover, states that violate local realism have gained ubiquitous applications in different quantum information tasks, such as quantum key distribution crypt (), communication complexity Brukner (), quantum information processing and random number generation Random10 ().

In Schrödinger’s reply to the EPR paper EPR (), he made a fine distinction between entangled states and states shared between two parties that are amenable for steering, i.e. in which the action of one party can affect the reduced state of the other party through the an appropriate choice of measurements. Also, in contrast to quantum entanglement which has received widespread interest due to its usefulness as a resource for tasks in quantum information processing, there have been relatively fewer developments in the notion of “steerable” states. In 2007, Wiseman et al. WJD07 () revisited the issue and reformulate the idea of “steerable” state from a quantum information perspective. Since then, several interesting studies on EPR steering have appeared both in theory  SU (); QKD () and in experiments  NP2010 (); NC (); PRX (); NJP (); AS12 (). Recently, some of us have demonstrated an all-versus-nothing proof of EPR steering AVN ().

Quantum steering in a bipartite scenario essentially describes the ability of one party, say Alice, to prepare the other party’s (Bob’s) systems in different ensembles of quantum states by measuring her own particle (under more than two different settings). Naturally, Alice has no control over the actual result of her actions, but she is able to control over the set of projected states on Bob’s side with her measurement for a given setting. If Bob does not trust Alice, Alice’s manipulation of her system appears as a black box described by some local hidden variable (LHV) theory. This could imply a local hidden state (LHS) description of her actions: that is that she just simply sends some states to Bob according to some probability distribution. Quantum steering means that such a description is impossible and that Alice must use quantum measurements on her system to prepare states on Bob’s side.

As pointed by Wiseman et al. WJD07 (), there is a hierarchical structure. For a given state, quantum steering is strictly implied by the violation of local realism. Simply put, steering excludes the possibility of local “hidden” state models of correlations, in which a quantum mechanical model is applied to only one of the systems, while the other one is described using a local hidden variable model. LHS model allows for a full LHV model for both (all) systems. Of course separable (mixed) states can be thought of as probabilistic distributions of hidden states for each party, and thus states with steering are a proper subset of entangled states, endowed with an additional potentially useful property.

The close connection between quantum entanglement and violation of local realism Werner () can be traced back to Gisin’s work, Ref. Gisin (), in which he presented a theorem stating that any pure entangled state of two qubits violates a Bell-like inequality. The result was generalized in Refs. Popescu-Rohrlich (); GISIN-PERES (). Gisin’s theorem for three qubits was shown numerically by Chen et al. Chen () and analytically by Choudhary et al. Choudhary (). In 2012, Yu et al. Yu () provided a complete proof of Gisin’s theorem for all entangled pure states. Within the hierarchical picture of the states exhibiting quantum correlations, Gisin’s theorem says that violation of local realism and quantum entanglement are equivalent for all pure states.

Gisin’s theorem applies only to pure states. The aim of this paper is to develop an “enhanced” version of Gisin’s theorem that can apply also to some class of mixed states. We shall show that some form of EPR steering allows the Gisin’s theorem to be applicable to a wider range of entangled states than just pure ones. As pure entangled states always allow steering, we have a direct broadening of the realm of validity of Gisin’s theorem. Our result also provides a rigorous criterion for marking the borders between quantum entanglement, EPR steering and violation of local realism. This is a nontrivial problem since it is not easy to reduce a superset to a subset by imposing extra constraints.

Our result serves as a contribution to recent studies of general nonlocal theories which satisfy the non-signaling principle PR (); nonlocal () (or its extensions Fritz ()), asking the question under what conditions an entangled state does not violate local realism ent-non (). Other links are with studies of the role of quantum contextuality in violation of local realism like e.g. Ref.  adan (). In Methods, we prove two theorems regarding the EPR steerability. We also note that the original Gisin’s theorem is a special case of Theorem 1. We note that our criterion for steerability of quantum states is useful in some applications. We then describe how our criterion for steerability of quantum states could be applied to the Third Man cryptographic protocol and we show how Theorem 2 can serve as a valuable resource in a quantum certificate authorization protocol.

Results

Enhanced Gisin’s theorem. Gisin’s original work only applies to two qubits in a pure state. In the spirit of this, let us also start with the two-qubit case, for which we have the following theorem:

Theorem 1

For a two-qubit entangled state, , shared between Alice and Bob, if any party can steer the other party into two different pure states by performing some orthogonal projective measurements on her/his qubit, then the state violates local realism.

Proof. Take the spectral decomposition of two-qubit density matrix: , the positive add up to one. For , if Alice performs the orthogonal projective measurements on on her qubit given by along the -direction and is able in this way to steer Bob’s qubit into two different states and , then the state must be in the form

(1)

with real satisfying . However, in the formula we have only two mutually orthogonal vectors , . This means that we can have only the two independent with the same steering property. Hence, the rank of is at most 2:

(2)

If also Bob with measurements on his qubit can steer Alice’s qubit into two different pure states, this additionally constrains the form of the two pure states to

(3a)
(3b)

For a derivation see Methods.

A mixture of the such states, with , always violates the Clauser-Horne-Shimony-Holt (CHSH) inequality. In quantum mechanics the correlation function is computed using , where , and is the Pauli matrix vector, whereas is the -th measuring direction of Alice. We shall use the spherical coordinates, so that ; similarly for Bob. The local realistic CHSH constraint is that . By putting , we get , where is the degree of entanglement, and . Except at or , is always nonvanishing, and the CHSH inequality is violated.  

Note that, the original Gisin’s theorem is a special case of Theorem 1. For example, take . The state , for or is a two-qubit pure state in its Schmidt decomposition.

For the general case of qubits, we have the following theorem:

Theorem 2

For an -qubit entangled state shared by observers , if there exists at least two observers, each with the ability to steer the remaining qubits into two different pure states by performing some orthogonal projective measurements on their qubits, then the state violates local realism.

Without any loss of generality, we assume that the first two observers have the ability to steer the remaining qubits. As such, the state is either (a) an arbitrary -qubit entangled pure state or (b) a rank-2 density matrix as in (2) with

(4a)
(4b)

where are pure states for , and the relative phase can always be taken as zero.

The violation of local realism for Case (a) has been shown analytically in Choudhary (); Yu () with the use a generalized Hardy (see e.g. inequality Cereceda1 (); Cereceda2 (); Cereceda3 ()). To prove Case (b), it is convenient to consider first , before moving to . (See Methods for the rigorous proof.)

Application 1: The Third Man cryptography. We have extended the class of states for which Gisin’s Theorem holds. But are these new states endowed with properties that can be put to use in quantum information tasks, do they form a kind of new resource? Below we shall show that in specific cases they can reduce the number of entangled particles needed to perform a task. In our example for three partners this is The Third Man cryptography ZUK1 (); ZUK2 () or equivalently secret sharing BUZEK (). The example is extendible to more partners.

Imagine that Charlie is sending the states of Theorem 1 to Alice and Bob. He randomly chooses whether to send or , with probabilities and , which are different but quite similar. To simplify the example, assume that both pure states are maximally entangled, that is . Alice and Bob are asked to perform randomly chosen measurements using local bases and , and also in some auxiliary bases in the planes, usually needed in the Ekert91 protocol crypt (). But the trouble is that while one of the pure states gives perfectly correlated results when both measured in direction, and anti-correlated results for measurements in directions , the other one gives perfect anti-correlations for measurements and perfect correlations for ’s (it is irrelevant for the argument for which of the states this is so). Thus only if Charlie sends them information about which state he sent in the given run, they can unscramble the key, out of their measurements in the identical local bases. Thus Charlie holds a key to their key. Without additional information provided by him Alice and Bob cannot form a usable key. This is the Third Man cryptography.

Of course, if Charlie sends information on the states to just Alice, she can transform her string of data into one which is a copy of the string of Bob, and she can also build a working key (this is a secret sharing version of the same protocol). Of course, all this is done under the standard Ekert91 protocol, Alice and Bob exchange information on measurements bases without revealing the results, etc. Note, that for high, say , with classical error correction methods Alice and Bob could be able to extract a key, but it will be short, with respect to the numbers of runs (copies of the state sent by Charlie). Only with the help of Charlie it can be of maximal possible length (half of the numbers of runs, if the protocol runs perfectly).

Previous versions of such protocol, see ZUK1 (); ZUK2 () or BUZEK (), required three qubit entangled GHZ states. The reader may quickly judge how difficult the step is from two-particle entanglement distribution to three-particle entanglement distribution by consulting the review PAN (). Also the fidelity of photonic three-particle entangled states is currently still typically below 90%, while in the two-particle case it can be now well over 99%. Low fidelity leads to errors in the key distribution. Thus the scheme with steerable states has a clear advantage over the the original one with GHZ states.

There is one more advantage. By making measurements in the directions, which are always perfectly correlated, Alice and Bob can check whether the mixed state received by them from Charlie (, that is the state before he reveals in which runs were or ) is indeed entangled (as it violates the CHSH inequality). Thus they can have an independent quality check of Charlie’s distribution methods. This is impossible under GHZ stated based protocols.

Note that the protocol settings for Alice and Bob are and . With settings in and Alice and Bob cannot violate the CHSH inequality with for which and are close. Using the Horodecki criterion for violations of the CHSH inequality HOR-CRIT (), , given here in the form derived in ZB (), one can easily establish that the threshold difference is . The correlations in these directions are very weak, thus they are indeed unable to extract a key with such measurements, and the Ekert91 protocol. Without Charlie’s help they are helpless. Of course, the presented scheme can be modified in many ways.

Application 2: The quantum certificate authorization protocol. The state we discussed in Theorem 2 can serve as a valuable resource in quantum cryptography scarani (). A good example is an application to quantum certificate authorization involving three parties, say, Alice, Bob and Charlie, against a lurking eavesdropper, Eve. Suppose Alice needs to send some private information to Bob through internet, and yet she is not sure if the receiving party is Bob. So Alice goes to the certificate authority, Charlie, who is trusted by Alice and capable of certifying Bob’s identity. With Charlie’s help, Alice is then able to share secret keys with Bob at a distance.

There are two goals to be achieved here. Specifically, Alice’s private information (i) should be received by the true Bob (and not someone else who claims to be Bob) and (ii) should not be intercepted by Eve. This task can be classically realized through digital signatures and public-private keys. Given , we see that we are able to present a quantum analogue of this protocol (see also qca1 (); qca2 ()). As shown in Fig. 1, upon Alice’s request for identification of Bob, Charlie produces an ensemble of three-qubit states ’s and distributes the first qubit to Alice, the second qubit to Bob, and keeps the third qubit. Alice and Bob measure their qubits randomly along one of two directions: or (i.e., projections to or ); similarly Charlie also measures his qubit randomly by a projection to or . Such a joint measurement can be repeated for, say, times, where is large enough. If the state shared by Alice and Bob is reliable, they should get the same results (cf. Eqs. (4) in the main text) for any measurement along .

In order to detect a possible Eve, Charlie randomly picks runs from as a subset and requests Alice and Bob to broadcast through a public channel their directions and results for these runs. With their data at hand Charlie starts to do analysis in three steps: (i) keep joint measuring results for which Alice and Bob measured along the same direction, i.e., and , and discard those for and ; (ii) keep joint measuring results for which Charlie measured along () when Alice and Bob obtained both “0” (“1”) along ; (iii) verify (a) whether Alice (Bob) can steer Bob (Alice) and Charlie into two pure states when measuring along , and (b) whether .

Here (a) can be verified by examining whether Charlie’s probability of obtaining () is always unity when Alice and Bob obtained both “0” (“1”) along . For (b), the three-qubit state is entangled iff . To realize the quantum certificate authorization protocol, Charlie can produce with nonorthogonal and . The coincidence probability that Alice and Bob get the same result can be obtained as when Alice and Bob measure along . To check whether is entangled is equivalent to check whether the coincidence probability is not equal to . In other words, result (a) ensures that both Alice and Bob can steer the remaining parties into two pure states; and if (a) is true, result (b) certifies that the state is entangled. Hence, if both (a) and (b) are fulfilled, then according to Theorem 2 the state violates local realism, and the protocol is secure. Note that the secret keys are obtained from the unbroadcast part of results when Alice and Bob measure along .

Discussion

Our result sheds new light on the relation between entanglement of mixed states, and LHV models for correlations. It pinpoints a precisely defined class of states, which is strictly larger than all pure entangled states, and which has the property that just by the fact that a state belongs to the class, one knows that it violates local realism. The property is as follows: for an -qubit state, there exist a pair of observers such that each of them singlehandedly can steer the remaining qubits of the other observers into two different pure states. Our results are for qubit systems. A generalization to more complicated ones is still an open question, and under investigation. Mixed states covered by the enhanced Gisin theorem, due to their specific properties, may allow new quantum protocols which allow to reduce the complication of entangled states involved in them (as in our example, we need, e.g., two-particle entangled states to have secret sharing between three parties). Other protocols, such as quantum certificate authorization, are also possible.

Methods

Proof of Eq. (3). Without loss of generality, if Alice measures her qubit in the -direction and if she steers Bob’s qubit into two different pure states, then for the states (2) we have

However, if Bob measures his qubit along some specific direction, also Alice should be getting one of two steered states. We can denote Bob’s projectors by The respective qubit basis states can be put as

(5)

with real-valued, . If the state of a qubit is pure, then the determinant of its density matrix is zero. If Bob measures his qubit of , given by (2), with the above projectors, the determinants of the steered states of Alice’s qubit are

(6)
(7)

We must find conditions for both of them to vanish. For the only interesting case of both greater than zero, we have to consider two situations. (i) Suppose , then it is enough to have . (ii) Suppose , then one has the conditions and . The only solution is (i.e., ) and . This directly leads to (3). For the general qubits, one has a straight ahead extension of this reasoning leading to Eq. (4).

Proof of Theorem 2 for . Take three observers Alice, Bob and Charlie. Assume that Alice and Bob have the ability to steer the remaining two qubits. Due to local unitary, one can always work with , , and , , , .

(i) Let us first consider the case where . The three-qubit Hardy inequality is given by

(8)

where denotes the probability . Let the settings be , the quantum prediction then becomes

(9)

By taking

(10)

we finally have

(ii) If , we employ the following Bell inequality:

(11)

where are the qubit correlation functions defined in analogy to the two qubit ones (see above). The index indicates that measurement performed on the corresponding qubit do not enter the function, and thus we have a two-qubit correlation function. By taking settings as , , , and , all correlation functions vanish except the following ones: , , and . The quantum prediction becomes

Clearly, we have when .  

Proof of Theorem 2 for Cases . For , the states can be entangled. The proof can be split into two cases: (i) separable , and (ii) at least one of them being entangled. To demonstrate violations of local realism, we employ an -qubit Hardy inequality, together with some Bell inequalities devised by us particularly for the present paper.

The -qubit Hardy inequality reads

(12)

Here is any permutation of indices between parties, and the summation is taken over all such permutations that are possible. We see that we have the following cases:

(i) One, or both, of is entangled. If is entangled, one can use the following Bell inequality

(13)

to detect violation of local realism. Here is the -qubit Hardy inequality for . The validity of this inequality to test the violation of local realism of relies on the fact that when and measure their qubits respectively along the -direction, these measurements are equivalent to a test for the violation of local realism of using . Also, if is entangled, the violation of local realism is detected in similar manner.

(ii) None of the states is entangled. Up to LU, one can work with and , where .

If the number of coefficients that are equal to zero is (without loss of generality we have assumed that the first coefficients are zero), then we use the following Bell inequality

(14)

to test the violation of local realism. Let the settings be

then quantum mechanics demands

Similar to Eq. (7) in the case in the main text and taking an appropriate value of , we always have .

If all (i.e., ), for an even , the violation of local realism of the state is dictated by

(15)

where correlation functions , with , and indicating settings for the -th party. For , the inequality (15) reduces to the CHSH inequality.

The classical bound is obtained as follows. The summation term in (15) is the binomial expansion of , which could take only three distinct values . The value of is closely related to . Indeed, when , then so that ; when , then so that ; when , then since is no larger than 1. Hence, holds for any local theories.

In quantum mechanics, the correlation function is computed by , with . We explicitly have

Taking the settings as , , , and , we get the quantum bound as

Clearly, we have when .

For odd , violation of local realism of the state is identified by

where indicates that no measurement is performed on the -th qubit. Quantum mechanically, we explicitly have

and, . By taking settings as , , and , all correlation functions vanish except the following ones: , , and . Hence, the quantum prediction of in (LABEL:BI-N2) is

Clearly, we have when , proving Theorem 2.  

References

  • (1) Wiseman, H. M., Jones, S. J. & Doherty, A. C. Steering, entanglement, nonlocality, and the Einstein-Podolsky-Rosen paradox. Phys. Rev. Lett. 98, 140402 (2007).
  • (2) Bell, J. S. On the einstein podolsky rosen paradox. Physics (NY) 1, 195-200 (1964).
  • (3) Schrödinger, E. Discussion of probability relations between separated systems. Proc. Cambridge Philos. Soc. 31, 555-563 (1935).
  • (4) Bennett, C. H. & Wiesner, S. J. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 69, 2881 (1992).
  • (5) Bennett, C. H. et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895 (1993).
  • (6) Nielsen, M. A. & Chuang, I. L. Quantum Computation and Quantum Information (Cambridge University Press, Cambridge, 2000) pp. 20.
  • (7) Pan, J.-W. et al. Multiphoton entanglement and interferometry. Rev. Mod. Phys. 84, 777 (2012).
  • (8) Ekert, A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991).
  • (9) Brukner, Č., Żukowski, M., Pan, J.-W. & Zeilinger, A. Bell’s Inequalities and Quantum Communication Complexity. Phys. Rev. Lett. 92, 127901 (2004).
  • (10) Pironio, S. et al. Random numbers certified by Bell’s theorem. Nature (London) 464, 1021-1024 (2010).
  • (11) Einstein, A., Podolsky, B. & Rosen, N. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? Phys. Rev. 47, 777 (1935).
  • (12) Oppenheim, J. & Wehner, S. The Uncertainty Principle Determines the Nonlocality of Quantum Mechanics. Science 330, 1072 (2010).
  • (13) Branciard, C., Cavalcanti, E. G., Walborn, S. P., Scarani, V. & Wiseman, H. M. One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering. Phys. Rev. A 85, 010301(R) (2012).
  • (14) Saunders, D. J., Jones, S. J., Wiseman, H. M. & Pryde, G. J. Experimental EPR-steering using Bell-local states. Nature Phys. 6, 845-849 (2010).
  • (15) Smith, D. H. et al. Conclusive quantum steering with superconducting transition edge sensors. Nature Commun. 3, 625 (2012).
  • (16) Bennet, A. J. et al. Arbitrarily Loss-Tolerant Einstein-Podolsky-Rosen Steering Allowing a Demonstration over 1 km of Optical Fiber with No Detection Loophole. Phys. Rev. X 2, 031003 (2012).
  • (17) Wittmann, B.et al. Loophole-free quantum steering. New J. Phys. 14, 053030 (2012).
  • (18) Händchen, V. et al. Observation of one-way Einstein-Podolsky-Rosen steering. Nature Photonics 6, 596 (2012).
  • (19) Chen, J. L. et al. All-Versus-Nothing Proof of Einstein-Podolsky-Rosen Steering. Sci. Rep. 3, 2143 (2013).
  • (20) Werner, R. F. Quantum states with Einstein-Podolsky-Rosen correlations admitting a hidden-variable model. Phys. Rev. A 40, 4277 (1989).
  • (21) Gisin, N. All-Versus-Nothing Proof of Einstein-Podolsky-Rosen Steering. Phys. Lett. A 154, 201 (1991).
  • (22) Popescu, S. & Rohrlich, D. Generic quantum nonlocality. Phys. Lett. A 166, 293-297 (1992).
  • (23) Gisin, N. & Peres, A. Maximal violation of Bell’s inequality for arbitrarily large spin. Phys. Lett. A 162, 15 (1992).
  • (24) Chen, J. L., Wu, C. F., Kwek, L. C. & Oh, C. H. Gisin’s Theorem for Three Qubits. Phys. Rev. Lett. 93, 140407 (2004).
  • (25) Choudhary, S. K., Ghosh, S., Kar, G. & Rahaman, R. Analytical proof of Gisin’s theorem for three qubits. Phys. Rev. A 81, 042107 (2010).
  • (26) Yu, S., Chen, Q., Zhang, C., Lai, C. H. & Oh, C. H. All Entangled Pure States Violate a Single Bell’s Inequality. Phys. Rev. Lett. 109, 120402 (2012).
  • (27) Popescu, S. & Rohrlich, D. Nonlocality as an axiom. Found. Phys. 24, 379 (1994).
  • (28) Masanes, Ll., Acín, A. & Gisin, N. General properties of nonsignaling theories. Phys. Rev. A 73, 012112 (2006).
  • (29) Fritz, T. et al. Local orthogonality as a multipartite principle for quantum correlations. Nature Commun. 4, 2263 (2013).
  • (30) Acín, A., Gisin, N. & Toner, B. Grothendieck’s constant and local models for noisy entangled quantum states. Phys. Rev. A 73, 062105 (2006).
  • (31) Cabello, A. Proposal for Revealing Quantum Nonlocality via Local Contextuality. Phys. Rev. Lett. 104, 220401 (2010).
  • (32) Wu, X.-H. & Xie, R.-H. Proposal for Revealing Quantum Nonlocality via Local Contextuality. Phys. Lett. A 211, 129 (1996).
  • (33) Ghosh, S., Kar, G. & Sarkar, D. Hardy’s nonlocality for entangled states of three spin-1/2 particles. Phys. Lett. A 243, 249 (1998).
  • (34) Cereceda, J. L. Hardy’s nonlocality for generalized n-particle GHZ states. Phys. Lett. A 327, 433 (2004).
  • (35) Żukowski, M., Zeilinger, A., Horne, M. A. & Weinfurter, H. Quest for GHZ states. Acta Phys. Pol. A 93, 187 (1998).
  • (36) Chen, Y.-A. et al. Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography. Phys. Rev. Lett. 95, 200502 (2005).
  • (37) Hillery, M., Buzek, V. & Berthiaume, A. Quantum secret sharing. Phys. Rev. A 59, 1829 (1999).
  • (38) Horodecki, R., Horodecki, P. & Horodecki, M. Violating Bell inequality by mixed spin-1/2 states: necessary and sufficient condition. Phys. Lett. A 200, 340 (1995).
  • (39) Żukowski, M. & Brukner, Č. Bell’s Theorem for General N-Qubit States. Phys. Rev. Lett. 88, 210401 (2002).
  • (40) Scarani, V. et al. The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009).
  • (41) Akshata Shenoy, H., Srikanth, R. & Srinivas, T. Counterfactual quantum certificate authorization. Phys. Rev. A. 89, 052307 (2014).
  • (42) Srinatha, N., Omkar, S., Srikanth, R., Banerjee, S. & Pathak, A. The quantum cryptographic switch. Quantum Inf. Process 13, 59 (2014).

Acknowledgements

This work is supported by the National Basic Research Program (973 Program) of China (Grant Nos. 2012CB921900, 2011CBA00200, and 2011CB921200) and and the NSF of China (Grant Nos. 11175089, 11475089, 11275182, and 60921091). J.L.C. and L.C.K. are partly supported by the National Research Foundation and the Ministry of Education, Singapore. MZ is supported by an FNP TEAM project and an MNiSW project Ideas-Plus (Wydajnosc kwantowo-mechanicznych zasobow).

Author Contributions

J.L.C. initiated the idea. J.L.C., H.Y.S., Z.P. X, Y.C.W and C.W. established the proof of the theorems. J.L.C., H.Y.S., C.W., M.Z., and L.C.K. wrote the main manuscript text. X.J.Y. prepared figure. All authors reviewed the manuscript.

Additional Information

Competing financial interests: The authors declare no competing financial interests.

Reprints and permission information is available at www.nature.com/reprints.


Figure 1: (Color online) The illustration of quantum certificate authorization protocol. Upon Alice’s request for identification of Bob, Charlie produces a three-qubit state and then distributes the first qubit (represented as a ball labeled by “a”, similarly for the others) to Alice , the second qubit “b” to Bob, and keeps the third qubit “c”. To ensure the security, Charlie randomly measures his qubit along or , Alice and Bob randomly measure their qubits along or . Such a measurement can be repeated for large enough times. Finally Charlie performs a random inspection to see whether Alice and Bob are able to share secret keys at the quantum level that defy Eve’s eavesdrop.
Comments 0
Request Comment
You are adding the first comment!
How to quickly get a good reply:
  • Give credit where it’s due by listing out the positive aspects of a paper before getting into which changes should be made.
  • Be specific in your critique, and provide supporting evidence with appropriate references to substantiate general statements.
  • Your comment should inspire ideas to flow and help the author improves the paper.

The better we are at sharing our knowledge with each other, the faster we move forward.
""
The feedback must be of minimum 40 characters and the title a minimum of 5 characters
   
Add comment
Cancel
Loading ...
232581
This is a comment super asjknd jkasnjk adsnkj
Upvote
Downvote
""
The feedback must be of minumum 40 characters
The feedback must be of minumum 40 characters
Submit
Cancel

You are asking your first question!
How to quickly get a good answer:
  • Keep your question short and to the point
  • Check for grammar or spelling errors.
  • Phrase it like a question
Test
Test description