2013
DOI: 10.1038/nature12035
|View full text |Cite
|
Sign up to set email alerts
|

Classical command of quantum systems

Abstract: Quantum computation and cryptography both involve scenarios in which a user interacts with an imperfectly modelled or 'untrusted' system. It is therefore of fundamental and practical interest to devise tests that reveal whether the system is behaving as instructed. In 1969, Clauser, Horne, Shimony and Holt proposed an experimental test that can be passed by a quantum-mechanical system but not by a system restricted to classical physics. Here we extend this test to enable the characterization of a large quantum… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
460
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 353 publications
(472 citation statements)
references
References 55 publications
0
460
0
Order By: Relevance
“…It guarantees that, for instance, pairs of photons can be treated as individual objects with individual properties and without any hidden correlations to other pairs. These, and many other results, addressed a number of subtleties and, finally, twenty years after its inception, the original entanglement-based key distribution protocol 7 has been shown to offer security even if the devices are not fully trusted and are exposed to noise 15,16,17,18,19,20 . This is assuming that quantum theory is all that there is, and that Eve is bound by the laws of quantum physics.…”
Section: Practicalitiesmentioning
confidence: 97%
See 1 more Smart Citation
“…It guarantees that, for instance, pairs of photons can be treated as individual objects with individual properties and without any hidden correlations to other pairs. These, and many other results, addressed a number of subtleties and, finally, twenty years after its inception, the original entanglement-based key distribution protocol 7 has been shown to offer security even if the devices are not fully trusted and are exposed to noise 15,16,17,18,19,20 . This is assuming that quantum theory is all that there is, and that Eve is bound by the laws of quantum physics.…”
Section: Practicalitiesmentioning
confidence: 97%
“…Barring this, once the devices pass a certain statistical test they can be purchased without any knowledge of their internal working. This is a truly remarkable feat, also referred to as 'deviceindependent' cryptography 14,15,16,17,18,19,20 . Needless to say, proving security under such weak assumptions, with all the mathematical subtleties, is considerably more challenging than in the case of trusted devices, but the rapid progress in the past few years has been very encouraging, making device-independent cryptography one of the most active areas of quantum information science.…”
mentioning
confidence: 99%
“…Recently, Reichardt et al [146] proved a subtle robustness result for playing many instances of CHSH. Roughly, their result says: if a quantum protocol wins a fraction of nearly cos(π/8) 2 of a sequence of k given instances of the CHSH game, then most blocks of m = k Ω(1) instances have the property that they start "essentially" (again, up to local operations and small differences like in Theorem 16) from m EPR-pairs and run m independent instances of the standard protocol P * .…”
Section: Self-testing Protocolsmentioning
confidence: 99%
“…It is well known that the probability over uniform inputs that they jointly win this game when they a priori share classical resources is 0.75, while if they share and appropriately measure a pair of maximally entangled qubits, they can jointly win the game with probability cos 2 π/8 > 0.75. The classical value 0.75 corresponds to the upper bound of a Bell inequality and the CHSH game provides an example of a Bell inequality violation, since there exist quantum strategies that violate this bound.Looking at Bell inequalities through the lens of games has been very useful in practice, including in cryptography [3,4] and quantum information [5], where, for example, quantum mechanics offers stronger than classical security guarantees in quantum key distribution or verification protocols. Recently, Brunner and Linden made the connection between Bell test scenarios and games with incomplete information more explicit and provided examples of such games where quantum mechanics offers an advantage [6].…”
mentioning
confidence: 99%