ORIGINAL RESEARCH article

Front. Phys., 06 November 2024

Sec. Quantum Engineering and Technology

Volume 12 - 2024 | https://doi.org/10.3389/fphy.2024.1434095

Device-independent certification of desirable properties with a confidence interval

  • 1. Department of Physics and Center for Quantum Frontiers of Research and Technology (QFort), National Cheng Kung University, Tainan, Taiwan

  • 2. Institute of Information Science, Academia Sinica, Taipei, Taiwan

  • 3. Physics Division, National Center for Theoretical Sciences, Taipei, Taiwan

  • 4. Department of Physics, National Chung Hsing University, Taichung, Taiwan

Article metrics

View details

3

Citations

1,3k

Views

485

Downloads

Abstract

In the development of quantum technologies, a reliable means for characterizing quantum devices, be it a measurement device, a state-preparation device, or a transformation device, is crucial. However, the conventional approach based on, for example, quantum state tomography or process tomography relies on assumptions that are often not necessarily justifiable in a realistic experimental setting. Although the device-independent (DI) approach to this problem bypasses the shortcomings above by making only minimal, justifiable assumptions, most of the theoretical proposals to date only work in the idealized setting where independent and identically distributed (i.i.d.) trials are assumed. Here, we provide a versatile solution for rigorous device-independent certification that does not rely on the i.i.d. assumption. Specifically, we describe how the prediction-based ratio (PBR) protocol and martingale-based protocol developed for hypothesis testing can be applied in the present context to achieve a device-independent certification of desirable properties with confidence interval (CI). To illustrate the versatility of these methods, we demonstrate how we can use them to certify—with finite data—the underlying negativity, Hilbert space dimension, entanglement depth, and fidelity to some target pure state. In particular, we provide examples showing how the amount of certifiable negativity and fidelity scales with the number of trials and how many experimental trials one needs to certify a qutrit state space or the presence of genuine tripartite entanglement. Overall, we have found that the PBR protocol and the martingale-based protocol often offer similar performance, even though the latter does have to presuppose any witness (Bell-like inequality). In contrast, our findings also show that the performance of the martingale-based protocol may be severely affected by one’s choice of Bell-like inequality. Intriguingly, a Bell function useful for self-testing does not necessarily give the optimal confidence-gain rate for certifying the fidelity to the corresponding target state.

1 Introduction

The proper analysis of quantum experiments is an indispensable part in the development of quantum technologies. However, it is not trivial to reliably characterize a quantum setup, which may include, e.g., measurement and state-preparation devices. Moreover, imperfections in the experimental setup can easily result in a mismatch [13] between the characterization tools developed for an idealized situation and an actual experimental situation. However, we can circumvent this problem by the so-called “device-independent approach” [4, 5]. In quantum information, the term “device-independent” (DI) was first coined [6] in the task of quantum key distribution [79], even though the idea was already perceived independently but implicitly in [10, 11].

In a nutshell, the DI approach is a framework for analyzing physical systems without relying on any assumption about the degrees of freedom measured. Its basis is Bell nonlocality [5, 12], which shows that no local-hidden-variable (LHV) theory can reproduce all quantum predictions, even though no further assumption is made about the details of such a theory. For example, it is known that the violation of Bell inequalities [12] obtained by locally measuring a shared state implies [13] shared entanglement [14], which is a powerful resource in many quantum information processing tasks. More generally, many other desirable properties of the underlying state [1523], measurements [2228], and channel [21, 29, 30] may be derived directly from the observation of a Bell inequality-violating correlation between measurement outcomes. Recently, the DI approach has also been incorporated into the security analysis of quantum secure direct communication; see, for example, [31] and references therein.

However, due to statistical fluctuations, even when the experimental trials are independent and identically distributed (i.i.d.), relative frequencies of the measurement outcomes obtained from a Bell experiment do not faithfully represent the underlying distribution. In particular, such raw distributions estimated from the experimental results typically [3234] lead to a violation of the nonsignaling conditions [35, 36], which is a prerequisite for the analysis shown in [1630]. In other words, statistical fluctuations render many theoretical tools developed for such a purpose inapplicable. To address this issue, some ad hoc methods [3234] have been proposed to regularize the relative frequencies obtained to ensure that the resulting distribution satisfy the nonsignaling conditions. In [37], a more in-depth discussion was provided, and two better-motivated regularization methods were proposed.

Although these more recent attempts do provide a point estimator that fits within the framework of the usual DI analysis, they are still problematic in two aspects. First, they do not provide any confidence region associated with the estimate. However, any real experiment necessarily involves only a finite number of experimental trials. Therefore a useful analysis should provide not only an estimate but also an indication of the reliability of such an estimate. In many of the Bell experiments reported [3841], this is achieved by reporting the standard deviations of Bell violations. However, for finite, especially relatively small numbers of trials, the central limit theorem is not warranted, so the usual interpretation of standard deviations may become dubious. Second, these usual approaches and those that provide a DI point estimator [3234, 37] implicitly assume that the experimental trials are i.i.d. and hence free of the memory effect [42, 43] (see more discussions in [5, 4446]). Again, in a realistic experimental setting, the i.i.d. assumption may be difficult to justify.

For the tasks of DI randomness expansion [47, 48] and DI quantum key distribution [49, 50], specific tools [5159] have been developed to overcome the abovementioned problems. Here, we are interested in providing a general solution to other device-independent certification tasks1 that 1) can provide a confidence region and two) does not a priori require the i.i.d. assumption. Our approach is inspired by the prediction-based ratio (PBR) protocol developed in [60] and the martingale-based method proposed by Gill [43, 61] for performing a hypothesis testing against the assumption of Bell locality. Following [62], we further adapt these earlier methods and illustrate how they can be used for the device-independent certification of various properties of interest, including the underlying amount of entanglement and its fidelity with respect to some target quantum state.

To this end, we structure the rest of this paper as follows. In Section 2.1, we explain the basic concepts relevant to the understanding of DI certification in the ideal setting. After that, we introduce in Section 2.2 our adapted statistical tools for performing a rigorous device-independent certification. Results obtained from these tools are then presented in Section 3.1. Finally, we provide some concluding remarks and future directions in Section 4.

2 Materials and methods

2.1 Preliminaries

2.1.1 Correlations and Bell inequalities

The starting point of the DI approach is a Bell test. To this end, a bipartite Bell scenario was considered, where two observers, Alice and Bob, can choose, respectively, their measurements labeled by and register outcomes .2 In the i.i.d. setting, one can estimate the underlying correlation between measurement outcomes, i.e., , from the registered empirical frequencies. Interestingly, as Bell first showed in [12], highly nontrivial conclusions can be drawn by inspecting alone.

For example, correlations that can be produced in an LHV theory have to satisfy a Bell inequality:where the Bell coefficients, , and is the so-called local (upper) bound. Here, we use to signify that the inequality holds under the assumption that is compatible with the LHV theory. Explicitly, the nature of such a theory demands that is factorizable in the form [5, 12]:where for all , , and are local response functions.

In an actual Bell test, the measurement settings ought to be chosen randomly according to some predetermined distributions . To manifest this fact, one may write Equation 1 using the unconditional joint distribution such that . In turn, we can then write a Bell inequality as a bound on the expectation value of a Bell function, defined in terms of and , i.e.,where is the quadruple of random variables for the measurement outcomes and settings . As an example, the famous Clauser–Horne–Shimony–Holt (CHSH) Bell inequality [63] may be specified viaor equivalently, in terms of the correlator , aswhere .

In contrast, quantum theory allows correlations that cannot be cast in the form of Equation 2. In fact, in a bipartite Bell test, general quantum correlations read aswhere and are, respectively, the local positive-operator-valued measure (POVM) describing Alice and Bob’s local measurements. For the benefits of subsequent discussions, it is also worth noting that both LHV and quantum correlations satisfy the nonsignaling conditions [35, 36]:

For the CHSH Bell function, cf. Equation 4, quantum theory dictates the upper bound aswhich can be seen as a Bell-like inequality. Other Bell and Bell-like inequalities relevant to this work will be presented in the corresponding sections below.

2.1.2 Examples of properties to be certified

2.1.2.1 Negativity and dimension

As mentioned above, with local measurements on a quantum system, a Bell inequality-violating correlation necessarily originates [13] from an entangled state . Interestingly, the entanglement of the underlying can also be lower bounded [17, 18, 20, 23] directly from the observed correlation . In this work, we focus on negativity [64], but it is worth noting that DI entanglement quantification can also be achieved, e.g., for the linear entropy of entanglement [18], generalized robustness of entanglement [23], and one-shot distillable entanglement [20].

For a bipartite density operator , let be its partial transposition [65] with respect to subsystem . Then, the negativity for a bipartite density operator is defined as [64] , i.e., the sum of the absolute value of all negative eigenvalues of . Using a variational characterization of negativity provided in [64], it was shown in [17] that is lower bounded by the optimum value of the following semidefinite program (SDP):where is the moment matrix that can be obtained by applying a particular local map on (see [17] for details), is the output Hilbert space of the local map on , and represents the trace of the underlying operator . It is worth noting that for every integer , the constraints of Equation 9c provide a superset characterization of the quantum set of correlations, analogous to those considered in [6668]. Indeed, all entries from appear somewhere in the moment matrix ; see [17].

As an explicit example, note that an observed violation of the CHSH Bell inequality of Equation 5 gives the following nontrivial negativity lower bound of the underlying state :

In addition, it is worth noting that if acts on with , then the maximal possible negativity is upper bounded by . Consequently, the observation of a large enough negativity also provides a nontrivial lower bound on the local Hilbert space dimension of the underlying system. More precisely, if the lower bound on obtained from Equations 9a, 9b and 9c exceeds , one immediately deduces that must act on a local Hilbert space of dimension , thereby giving a dimension witness [15].

From Equations 5, 8 and 10, nonetheless, we see that a violation of the CHSH Bell inequality can never witness a local Hilbert space dimension . Instead, witnessing a local Hilbert space beyond qubits can be achieved by observing a reasonably strong violation of the three-outcome Collins–Gisin–Linden–Massar–Popescu (CGLMP) Bell inequality [69] (see also [70]), defined bywhere if and vanishes otherwise. Denoting the corresponding expectation value by , the results from [17, 71, 72] suggest a negativity lower bound that increases linearly with from whenever .

2.1.2.2 Entanglement depth

In a many-body system, entanglement can occur in various forms or structures [73]. In particular, an -partite quantum state that is not fully separable is not necessarily genuinely -partite entangled either. To witness the latter, one could rely on the demonstration of so-called genuine multipartite nonlocality [74]. However, as remarked in [16], it is possible to witness genuine multipartite entanglement without relying on this strong form of multipartite nonlocality. In fact, using the SDP introduced in [17], one can even systematically construct DI witnesses of this kind, starting from a given multipartite Bell function, say . Later, it was further shown in [19] (see also [75]) that the extent to which a multipartite Bell inequality is violated can be used to witness (lower-bound) the underlying entanglement depth [76, 77], i.e., the extent to which a many-body entanglement is needed to prepare the given multipartite state.

For illustration, consider the expectation value of the Mermin Bell function [78] with :where is the tripartite correlator, the restricted sum is over all combinations of such that , for the same combinations of , and the Bell coefficients is

Then, it is known [19] that the following Bell-like inequalities hold, respectively, for fully separable states, 2-producible [76] tripartite quantum states (i.e., quantum states that can be generated using only two-body entanglement), and general tripartite quantum states:

2.1.2.3 State fidelity

The strongest form of device certification one can hope for within a DI paradigm is called self-testing [79], which was first proposed in [10]. The key observation behind this feat is that the quantum strategy compatible with certain extremal quantum correlations is essentially unique. Hence, with the observation of in a Bell test, we can conclude unambiguously that some degree of freedom (DOF) of the measured system must match a specific target state . Often, one can also self-test the underlying measurements alongside the state (see, however, [80, 81] for some examples of exceptions).

For instance, it is long known [8285] that the maximal CHSH Bell-inequality violation of can only be obtained (up to local isometry) by measuring the following observables on a shared maximally entangled state (MES):

where the respective POVM elements (with ) are

Moreover, to obtain the maximal CHSH Bell-inequality violation for a partially entangled two-qubit state,it suffices [72] to consider of Equation 15b but generalize to [86]:thereby giving

Interestingly, the resulting correlation also self-tests [86, 87] the corresponding quantum strategy of Equation 17a, b and maximally violate the family of tilted CHSH Bell inequalities for :giving . Note that in Equation 19, thanks to the nonsignaling [35, 36] property of , the expression for is, in fact, independent of whether or 1.

In practice, however, due to various imperfections, one can, at best, attain a correlation close to the ideal correlation . In other words, in a realistic experimental setting, one can only hope to lower bound the similarity of the measured state with respect to the target state via a fidelity measure. To this end, a powerful numerical technique known as the SWAP method has been introduced in [88] (see also [86]) for exactly this purpose. More precisely, for any observed quantum correlation , the method allows one to lower bound the fidelity:with the help of an SDP outer approximation of the quantum set (e.g., due to [17, 66, 67]). Here, is the “swapped” state:which is extracted from the underlying quantum state via some local extraction map , which is a function of the actual POVM elements. Consequently, is a function of the entries of the moment matrix , as discussed below Equations 9a, b and c. For the details of the method, we refer the readers to [86].

2.1.3 Some general remarks

At this point, it is worth noting that for all the three properties discussed above—negativity (and hence dimension), entanglement depth, and reference-state fidelity—their DI certification can be achieved via the characterization of some convex set in the space of correlation vectors . More precisely, for negativity, by turning the objective function of Equations 9a into the constraint [17]we obtain an SDP that characterizes the set of correlations attainable by quantum states having a negativity upper-bound by . Then, Equation 10 can be understood as a separating hyperplane relevant for witnessing a negativity larger than .

On the other hand, if we drop the constraint of Equation 9b, but imposes additional positive-partial-transposition constraints, then we obtain an SDP characterization of the set having a bounded amount of entanglement depth [19] (see constraints of Equations 44b, c and d below). In this case, the first two inequalities of Equation 14 serve as the corresponding witness for entanglement depth. Finally, by demanding together with Equation 9c, we obtain an SDP characterization of the set associated with a swapped state [86] with a -fidelity upper bounded by . In fact, SDP characterization can also be obtained for a number of other properties, including genuine negativity [17], steering robustness [22], entanglement robustness [23], and (measurement) incompatibility robustness [22, 28].

2.2 Methodologies for hypothesis testing

Having understood how DI certification can be achieved from a given correlation , we now proceed to discuss the more realistic setting involving only a finite number of experimental trials. For concreteness, the following presentation assumes an analysis based on the data collected from trials in a Bell test. Below, we explain our approaches to the problem based on hypothesis testing. Our first step is to formulate a null hypothesis based on the desired property to be certified. For example, to certify that the underlying state has a negativity larger than , we formulate the (converse) null hypothesis:

Null Hypothesis 1: In every experimental trial, the underlying state has a negativity less than or equal to.Since such a hypothesis involves a set of (rather than a single) compatible distribution , it is called a composite hypothesis [89].Then, we apply appropriate methods for this kind of hypothesis testing on the collected data to determine an upper bound on the -value associated with the hypothesis . Since a -value quantifies the plausibility of observing the given data when holds, a small value of , say less than 5%, provides a strong indication that is falsified. It then follows that the desired feature corresponding to the negation of is certified with a confidence of at least .Of course, one may also be interested to understand how quickly statistical evidence (against a hypothesis ) can be gathered when we increase the number of trials. To this end, we also consider the so-called (asymptotic) confidence-gain rate [60], defined bywhere is the -value (upper bound) deduced from some protocol (abbreviated as “prot”). From the definition, it is evident that asymptotically and in the i.i.d. setting, a fewer number of trials are required to achieve the same level of statistical confidence if the corresponding is higher. Next, let us elaborate the two hypothesis-testing protocols considered in this work.

2.2.1 Martingale-based protocol

We shall start with the martingale-based protocol, pioneered by Gill in [43, 61], for testing against LHV theories, and further developed in [60, 90]. The protocol relies on the observation of the (super)martingale structure in some random variables of interest. To employ the martingale-based protocol, one has to fix a Bell function in advance. Ideally, should be chosen such that the Bell-like inequalitymay be violated by some quantum correlation (cf. Equation 6) to be prepared in an experiment.

Let be the value realized for the random variables of the measurement outcomes and settings at the -th experimental trial and , the corresponding value of Bell function for that trial. Moreover, let . Then, from the observed average value of over trials, i.e., , the following -value upper bound is known [90] to hold whenever :where, for simplicity, we have suppressed the dependency of on (and on ), whereas the minimum and maximum values of over all possible values of areIt is worth noting that the martingale-based -value upper bound of Equation 25 improves over the upper bound given in [48, 60, 61]. In Figure 1, we provide a pseudocode to explain the steps involved in applying the martingale-based protocol for DI certification.

FIGURE 1

Let be the expectation value of when we replace by some capable of violating the Bell-like inequality in Equation 24. Then, in the i.i.d. setting, where the experimental data follow the distributions given by , the corresponding asymptotic confidence-gain rate can be deduced from Equation 23 and Equation 25 as

2.2.2 The prediction-based ratio (PBR) protocol

The other hypothesis-testing protocol that we consider in this work is based on the so-called PBR protocol proposed in [60] (see also [90]). In contrast with a martingale-based protocol, the PBR protocol does not need to presuppose any Bell-like inequality for determining a -value bound. Instead, for the data collected in trials, one may start by using the first trials from to estimate the relative frequencywhere and counts among these trials the total number of times the specific combination of measurement settings and outcomes occurs.

The key idea of the PBR protocol is to use this relative frequency to obtain an optimized Bell-like inequality3 and apply that to from . To this end, we minimize the Kullback–Leibler (KL) divergence [91] from a regularized relative frequency (explained below) to the set of correlations compatible with :

An important point to note now is that if the composite null hypothesis is associated with a convex set that admits an SDP characterization (as discussed in Section 2.1.3) like the kind proposed in [17, 22, 66, 67, 68]; then, Equation 29 is a conic program (see [37]) and thus efficiently solvable using a solver like [93].

The unique [37] minimizer can then be used to define the non-negative prediction-based ratio (PBR),which gives the optimized Bell-like inequality . Next, we compute the test statistic aswhere the product is only carried out over the remaining trials. Using arguments completely analogous to those given in [60] for , it can then be shown that the following upper bound on the -value holds:

Several remarks are now in order. First, if none of the entries in vanishes, one could also use directly in the optimization problem of Equation 29. However, for a small , a vanishing entry in is almost bound to happen, we thus follow [60] and mix with the uniform distribution to obtain

Next, notice that typically cannot be cast in the form of Equation 6. Consequently, we observe empirically that obtained by solving Equation 29 with in place of gives evidently suboptimal performance (see, e.g., Supplementary Figures S1, S4 and S6). As such, we shall first regularize [37] to some outer approximation of the quantum set by solving Equation 29 with replaced by . In our work, is the level- outer approximation of the quantum set introduced in [17]. However, one may also consider other approximations [22, 66]. Since all these outer approximations admit SDP characterization, this regularization process is a conic program (see [37]). The resulting minimizer, which we call the regularized relative frequency, is then fed into Equation 29 to obtain the desired PBR.

Another important feature of the PBR protocol is that the optimized inequality characterized by can be updated as more data are incorporated into the analysis. In principle, one can update as frequently as one desires. However, this is neither necessary nor efficient. As such, we work with blocks of trials. The first block of data is used exclusively for producing the first regularized relative frequency, the first PBR , and by applying to the second block of , we obtain the first test statistic:where for all (if Ntot is divisible by Nblk). In the next iteration, we determine the PBR by solving Equation 29 using from the first two blocks and apply this updated PBR to the third block of to get, for ,where . These steps may then be repeated iteratively until all the data have been consumed in one way or another in the computation of for . For a schematic illustration of this procedure, see Figure 2. Importantly, once the test statistic for each iteration is determined, we can obtain the corresponding -value bound using Equation 32. For the readers’ convenience, we also provide in Figure 3 a pseudocode to explain the steps involved in applying the PBR protocol for DI certification.

FIGURE 2

FIGURE 3

Finally, note that for an ideal Bell test giving the correlation and a composite hypothesis associated with , the PBR protocol has the asymptotic confidence-gain ratewhich may be obtained by solving Equation 29 with replaced by . The proof is again completely analogous to that given for in [60] and is thus omitted.

3 Results

3.1 Device-independent certification with a confidence interval

We are now ready to present our simulations results involving a finite number of trials. Throughout this section, the results presented for finite trials consist of an average over 30 complete Bell tests, each involving trials, with the trials partitioned into blocks of size . Moreover, we always consider a uniform distribution for (possibly a restricted set of) measurement settings. In each Bell test, we then simulate the raw data using the function from the Lightspeed MATLAB toolbox [93]. For the certification with finite data, we set a confidence level of . We also present some related confidence-gain rates in the respective subsections.

3.1.1 Negativity and dimension certification

3.1.1.1 Negativity certification

Our first example consists of a Bell test based on the quantum strategy presented in Equations 15a, b, c, which leads to a CHSH Bell value of . Using Equation 10, we know that the resulting quantum correlation gives a tight negativity lower bound of for a Bell state. From the numerically simulated data, we then perform composite hypothesis testing for Null Hypothesis 1 with .

Specifically, for the martingale-based protocol, we use Equation 25 with the CHSH Bell expression of Equation 4. In this case, for the chosen , while it follows from Equations 4, 10 and 24 thatOn the other hand, for the PBR protocol, the optimizing distribution for the -iteration can be obtained by solving (cf. Equation 29)where seeks for the argument minimizing the expression in Equation 38a, is the regularized frequency obtained for the same iteration, and each also appears as an optimization variable in the moment matrix . Then, the PBR used in the computation of can be evaluated by replacing and in Equation 30, respectively, by and .

Figure 4 shows the average amount of certifiable negativity from these two methods as a function of the number of trials employed. From the figure, it is clear that for certifying the underlying negativity using the data arising from , the performance of the two protocols is similar. In fact, even though the martingale-based protocol appears to have a slight advantage over the PBR protocol for this certification task for small ’s, our computations of the asymptotic gain-rates and show that they, in fact, agree (for all these values of that we have considered), up to a numerical precision of . In addition, in both cases, we see that with approximately and trials, we can already certify, respectively, more than 80% and 90% of the underlying negativity with a confidence . In Supplementary Section 1.1, we provide some additional plots showing how the -value bound changes with for several values of .

FIGURE 4

These results clearly suggest that the CHSH Bell function of Equation 4 is optimal for certifying the underlying negativity of using the martingale-based protocol. Indeed, a separate computation of Equation 29 and Equation 30 using in place of show that, within a precision of , the optimized Bell-like inequality for is equivalent to Equation 10. How would things change if we perform DI negativity certification using the data generated from the partially entangled state , Equation 17a? To this end, consider the quantum strategy of Equations 17a, b, whose resulting correlation gives the maximal Bell CHSH violation for , as well as the maximal violation of the tilted CHSH Bell inequality of Equation 19. Then, instead of repeating the same analysis, we show in Figure 5 the confidence-gain rates due to both protocols for certifying several given fractions of the underlying negativity. From the plots shown, it is evident that asymptotically, the martingale-based protocol employing the CHSH Bell function is far from optimal for certifying the underlying negativity of . Indeed, the PBR protocol could identify some other Bell-like inequality that gives a much better confidence-gain rate, especially for the correlations arising from that is weakly entangled (small ). To a large extent, this can be understood by noting that the negativity lower bound of Equation 10 due to its CHSH Bell violation is generally far from tight for these states; see Supplementary Figure S3.

FIGURE 5

3.1.1.2 Dimension certification via negativity certification

As mentioned in Section 2.1.2.1, the correlation is insufficient to demonstrate any nontrivial dimension bound. Let us consider, instead, a correlation derived by locally measuring the partially entangled two-qutrit state:with the local measurementswhere , , and is the set of computational basis states. It is known [67, 71] that this strategy gives the maximal CGLMP Bell-inequality violation of . Moreover, the negativity of can be easily evaluated to yield .

Next, we use the data numerically simulated from to perform hypothesis testing for Null Hypothesis 1 but now with . For the PBR protocol, the computation proceeds in exactly the same way as described above (see the paragraph containing Equation 38). However, for the martingale-based protocol, since we do not have an explicit expression like that shown in Equation 37 for the CGLMP Bell expression, we compute an upper bound on for each given value of according towhere the CGLMP Bell coefficients are defined in Equation 11. Meanwhile, since and , we again have for .

Figure 6 shows that with approximately trials, we can already certify a negativity lower bound of 0.9. On the other hand, if we want to certify that we need at least a two-qutrit state to produce the observed data (arising from ), it suffices to certify that the underlying negativity is strictly larger than 0.50, which happens already with approximately 1,500 trials. Could other two-qutrit states provide a more favorable correlation in this regard? To gain insight into the problem, we consider the following one-parameter family of two-qutrit statesand numerically maximize their CGLMP Bell-inequality violation using the heuristic algorithm given in [94]. We denote the corresponding correlation by , compute the corresponding asymptotic confidence-gain rate for both protocols, and plot the results in Figure 7.

FIGURE 6

FIGURE 7

Interestingly, even though Figure 6 suggests that the CGLMP Bell function is very effective in providing a good -value bound against Null Hypothesis 1, Figure 7 clearly shows that, asymptotically, it is not optimal. The results shown in Figure 7 further suggest that among the family of two-qutrit states given in Equation 41, the qutrit signature of , cf. Equation 39a, could even be the most prominent, when it comes to its DI certification using these hypothesis-testing techniques.

3.1.2 Entanglement depth certification

Next, we consider the tripartite correlation that results from locally measuring the -eigenvalue observableson the Greenberger–Horne–Zeilinger (GHZ) state [95, 96]:

It is easy to verify that leads to a violation of the Mermin Bell inequality, as shown in Equations 12 and 14, giving the algebraic maximum of . For our simulations, we assume a uniform distribution over all measurement settings that satisfy . Then, we test the data against the following composite hypotheses:

Null Hypothesis 2: In every experimental trial, the underlying state is separable (having an entanglement depth of 1).

Null Hypothesis 3: In every experimental trial, the underlying state is 2-producible, i.e., having an entanglement depth of 2 or less.For the martingale-based method, we use Equation 25 with the Mermin Bell expression of Equation 12 and the bounds given in Equation 14, i.e., for Null Hypothesis 2 and for Null Hypothesis 3. Since , we again have . Note that separable states can only generate Bell-local correlations [5], cf. Equation 2. Thus, for the PBR protocol with Null Hypothesis 2, the optimizing distribution for the -iteration can be obtained by solving (cf. Equation 29)where is the -th (local deterministic) extreme points of the set of tripartite Bell-local distributions.On the other hand, notice that 2-producibility [76] is equivalent to biseparability [14] in the tripartite scenario. Hence, for Null Hypothesis 3, we obtain the corresponding optimizing distribution by solvingwhere with are meant to represent, respectively, the constituent of that is separable with respect to , , and bipartitions. In evaluating Equations 44a, b, c, d, we use level of the hierarchy introduced in [17]. For both hypotheses, we then evaluatefor the computation of the test statistic .For and Null Hypothesis 2, the confidence-gain rate is already known (see Table I of [89]) to be approximately 0.415037; our computation reproduces this and further shows that for Null Hypothesis 3, the confidence-gain rate is approximately 0.228446. Moreover, to six decimal places, and agree for both hypotheses. What about finite data? Based on the average results from 30 simulations, we find that the -value bounds or, more precisely, can be very well-fitted into the following straight lines:for the separable hypothesis in Null Hypothesis 2, andfor the 2-producible hypothesis in Null Hypothesis 3. In all these fits, the coefficient of determination is 1 even if we keep up to 7 significant digits. Consequently, based on this interpolation, even if we only run the Bell test using the strategy of Equation 42a, b for 100 trials, there is already sufficient data to certify genuine tripartite-entanglement with a confidence of at least .

3.1.3 Fidelity certification

Our last examples concern the DI certification of a lower bound on the fidelity of the swapped state with respect to the target state of Equation 17a. To this end, we use the same set of data generated for the analysis in Section 3.1.1.1 and consider the following null hypothesis:

Null Hypothesis 4: In every experimental trial, the swapped state extractable from the underlying state has a -fidelity upper bounded by , i.e.,Then, for any given and , to apply the PBR protocol, we solve the optimizing distribution for the -iteration (cf. Equation 29) bywhere the left-hand side of the last inequality in Equation 51b consists of some specific linear combination of entries of ; see [86] for details. Then, as with negativity certification, we can evaluate the PBR used in the computation of by replacing and , respectively, by and in Equation 30. As for the martingale-based protocol, we first solveto determine for Null Hypothesis 4 and then apply Equation 25 to determine the corresponding -value upper bound.Let us start with the self-testing of a Bell state, corresponding to in Equation 17a. In this case, we use the CHSH Bell function specified in Equation 4 and consider . For both protocols, by systematically evaluating the -value bounds from the data for each of these ’s, we determine a lower bound on with the desired confidence of at least 99%. The results obtained from both hypothesis-testing protocols are shown in Figure 8.Interestingly, our results show that the martingale-based protocol with the CHSH Bell function of Equation 4 again performs very well for the self-testing of a Bell state with finite statistics, even though our computation of the corresponding asymptotic confidence-gain rate for clearly shows that it is suboptimal even for the Bell state; see Figure 9. What about other partially entangled states? To answer this question, we evaluate the confidence-gain rate derived from both protocols for , with . Note that a fidelity of is always achievable even if Alice and Bob do not share any entanglement; they merely have to prepare using local operations and classical communication before the Bell test. This time around, for the martingale-based protocol, we switch to the Bell function of the tilted CHSH Bell inequality of Equation 19, which is known to facilitate the self-testing of all entangled . The corresponding results are shown in Figure 9.

FIGURE 8

FIGURE 9

3.1.4 Properties certification via Bell-value certification

The advantage of a fidelity certification based on the SWAP method [86, 88] is that the technique is applicable to a general Bell scenario. However, in the simplest CHSH Bell scenario, it is known that a much tighter lower bound on the Bell-state fidelity can be obtained by considering a more general extraction map. Specifically, Kaniewski showed in [97] thatwhere , are local extraction maps acting, respectively, on Alice’s and Bob’s subsystem, while is the threshold CHSH value, for which the fidelity bound becomes trivial.

To take the advantage of Equation 53, we can first perform hypothesis testing based on the following null hypothesis.

Null Hypothesis 5: In every experimental trial, the underlying state and measurements yield a CHSH value less than or equal to .Specifically, using the same set of data generated for the analysis in Sections 3.1.1.1 and 3.1.3, we perform composite hypothesis testing for Null Hypothesis 5 with , where .In particular, for the martingale-based protocol, we can simply use Equation 25 with and . Could one also employ the PBR protocol, which does not usually presuppose any Bell-like inequality, for the current hypothesis testing? This is indeed possible. To this end, one may solve the optimizing distribution for the -iteration (cf. Equation 29) of the PBR protocol bywith or without imposing the SDP constraints of Equation 9c. The results obtained from these tests are shown in Figure 10.Using each lower bound on certified from the data, Equation 53 immediately translates to a lower bound on the Bell-state fidelity with the desired confidence. For a direct comparison with the efficacy of the SWAP-based approach adopted in Section 3.1.3, we plot in Figure 11 the Bell-state fidelity certifiable using the two approaches. As expected, the tighter Bell-state fidelity lower bound provided by Equation 53 also facilitates a considerably tighter lower bound when one has access to only a finite amount of data.It is also worth noting that in computing these PBR bounds, the computation may be further simplified by regularizing the relative frequency using only the nonsignaling constraint of Equation 7, instead of the quantum approximation using Equation 9c. For the lower bounds on presented in Figure 10, this further simplification was found to give, unsurprisingly, a worse lower bound but with a deviation bounded by . Of course, the lower bounds on can also be used to bound other desired properties. For example, Figure 4 can equivalently be obtained by combining Equation 10 with the results shown in Figure 10.

FIGURE 10

FIGURE 11

4 Discussion

Tomography and witnesses are two commonly employed toolkits for certifying the desirable properties of quantum devices [98]. In recent years, the device-independent paradigm has offered an appealing alternative to these conventional means as it involves only a minimal set of assumptions. Nonetheless, many DI certification schemes, e.g., [1619, 2127, 29, 30], implicitly assumes that the underlying quantum correlation (or the actual Bell-inequality violation due to ) is known. In practice, this is unrealistic for two reasons: 1) we always have access to only a finite amount of experimental data, and 2) actual experimental trials are typically not independent and identically distributed (i.i.d.).

To this end, very specialized tools have been developed for the task of randomness generation, quantum key distributions, and the self-testing [86, 99, 100] of quantum states. Among them, the possibility of using hypothesis testing (based on the PBR protocol [60]) for self-testing with finite data was first discussed in [86] (see also [99] for a different approach). Meanwhile, it is long known [43, 61, 90] that hypothesis testing in a Bell test can also be carried out using a martingale-based protocol. Here, we demonstrate the viability and versatility of such hypothesis-testing-based approaches for the general problem of DI certification.

Central to our finding is the observation that many desirable quantum properties that one wishes to certify can be characterized by (the complement of) some convex set in the space of correlation vectors . In other words, if a given lies outside , a Bell-like inequality can be provided to witness this fact. This separating hyperplane then provides the basis for our martingale-based protocol for DI certification. On the other hand, if itself admits a semidefinite programming characterization like the kind proposed in [17, 22, 6668], then the problem of minimizing the statistical distance to can be cast as a conic program, which can readily be solved using existing solvers, such as [92]. In turn, the PBR protocol provides an optimized Bell-like inequality that facilitates the corresponding hypothesis testing.

In this paper, we explain in detail how the two aforementioned hypothesis-testing protocols can be adapted for the DI certification of desirable properties. Specifically, we illustrate how we can use them to perform the DI certification of the underlying negativity [64], local Hilbert space dimension [15], entanglement depth [76]; [77], and fidelity to some target two-qubit entangled pure state . In each of these examples, we further demonstrate how the certifiable property (with a confidence of 99%) varies with the number of experimental trials involved; see Figures 4, 6, 8. Even though we have focused on certifying desirable properties of quantum states, as explained above, the protocols can also be applied to certify desirable properties of the measurement devices, such as their measurement incompatibility [22, 23, 26, 28] or their similarity to some target measurements [86] or instruments [27], etc. Note, however, that the usefulness of our protocols relies on the possibility of certifying the desired property from a Bell inequality-violating correlation. To this end, we remind that determining the complete list of quantum properties certifiable in a device-independent manner remains, to our knowledge, an open problem.

In the i.i.d. setting, the PBR protocol is known to be asymptotically optimal (in terms of its confidence-gain rate). However, we see from Figures 4, 6, 8 that for a relatively small number of trials and with the right choice of the Bell function, the martingale-based protocol performs equally well, if not better. A similar observation was also noted in [101] where the authors therein compare the PBR method with the Chernoff–Hoeffding bound in determining the success probability of Bernoulli trials. In our case, this is not surprising as the PBR method does not presuppose a Bell-like inequality but rather sacrifices some of the data to determine one. Indeed, if we equip the PBR protocol with the optimized Bell-like inequality right from the beginning, its performance is, as expected, no worse than the martingale-based protocol; see Supplementary Figures S1, S2, S4-S7 for some explicit examples.

Meanwhile, we also see from Figures 5, 7, 9 that for several cases that we have investigated, one’s intuitive choice of the Bell function for the martingale-based method can lead to a relatively poor confidence-gain rate and hence impairs its efficiency to produce a good -value bound; see Supplementary Figures S5 and S7. For example, even though the titled CHSH Bell inequality of Equation 19 is known to self-test all entangled two-qubit pure states , this choice of the Bell function in the martingale-based method leads to a worse performance (for bounding the target-state fidelity) compared with using the CHSH Bell function, which, in turn, gives a suboptimal performance compared with that derived from the PBR protocol; see Figure 9. At this point, it is worth reiterating that both protocols do not require the assumption that the experimental trials are i.i.d., even though we have only given, for simplicity, examples with i.i.d. trials.

Several research directions naturally follow from the present work. First, there are the scalability questions: 1) how do the number of measurement bases and 2) the number of samples scale with the complexity (say, dimension) of the measured system? The former is again closely related to the general viability of the device-independent certification approach, where our understanding is far from complete. As for the latter, we remark that it is indeed one of the goals of the present work to shed light on the sample complexity of our hypothesis-testing-based approaches. In some cases, such as the certification from the GHZ correlation, we see that hundreds of trials suffice, but in some others, several tens of thousands may be required to give a satisfactory level of certification. Still, some general understanding of how the sample size scales with the properties to be certified and the confidence level will be surely welcome.

Second, for experimental trials expected to deviate significantly from being i.i.d., one should choose a much smaller block size than the size adopted in our analysis using the PBR protocol. Intuitively, we should choose so that the trials do not differ significantly within each block of data. In fact, for testing against LHV theories, some guidelines have been provided in [60] on how we should choose . A similar analysis for other DI certifications is clearly desirable. Next, even though our hypothesis-testing-based approaches enable rigorous DI certification with a confidence interval, by virtue of the techniques involved, one can only make a relatively weak certification; out of the many experimental trials, we can be sure that at least one consists of a setup that exhibits the desired property (say, with 99% confidence). This is evidently far from satisfactory. A preferable certification scheme should allow one to comment on the general or average behavior of all the measured samples, as has been achieved in [100, 102] for self-testing.

Given that self-testing with a high fidelity is technically challenging, it is still of interest to devise a general recipe for certifying the average behavior of other more specific properties (such as entanglement and steerability), which may already be sufficient for the specific information processing task at hand. However, note that the rejection of a null hypothesis on the average behavior (e.g., average negativity ) necessarily entails the rejection of the corresponding null hypothesis for all trials (e.g., in every trial). Thus, we may expect a tradeoff when switching from the current kind of hypothesis testing to that for an average behavior.

In addition, it is worth noting that if the i.i.d. assumption is somehow granted, then our protocols also certify the quality of the setup for every single runs, including those that have not been measured. In this case, once a sufficiently small -value bound is obtained, one can stop measuring the rest of the systems and use them, instead, for the information processing tasks of interest. Of course, since the i.i.d. assumption is generally not warranted, a protocol that achieves certification for some fraction of the copies while leaving the rest useful for subsequent tasks will be desirable. This has been considered for one-shot distillable entanglement in [20] and the self-testing fidelity in [102]. Again, a general treatment will be more than welcome (see, e.g., [103]).

Statements

Data availability statement

The raw data supporting the conclusions of this article are available in the Supplementary Material.

Author contributions

W-GC: data curation, investigation, software, writing–original draft, and writing–review and editing. K-CC: data curation, investigation, software, and writing–original draft. K-SC: data curation, investigation, software, validation, and writing–review and editing. S-LC: investigation, validation, writing–review and editing, formal analysis, and software. Y-CL: conceptualization, formal analysis, funding acquisition, investigation, methodology, project administration, software, supervision, validation, writing–review and editing, and visualization.

Funding

The author(s) declare that financial support was received for the research and/or publication of this article. This work is supported by the National Science and Technology Council, Taiwan (Grants Nos 107-2112-M-006-005-MY2, 109-2112-M-006-010-MY3, 112-2628-M-006-007-MY4, 111-2119-M-001-004, 112-2119-M-001-006, and 111-2112-M-005-007-MY4), the Higher Education Sprout Project, Ministry of Education to the Headquarters of University Advancement at the National Cheng Kung University (NCKU), the National Center for Theoretical Sciences, the 2024 Academia Sinica Investigator Award (AS-IA-110-M02), and the Foxconn Research Institute, Taipei, Taiwan.

Acknowledgments

The authors are grateful to Jean-Daniel Bancal, Gelo Tabia, and Yanbao Zhang for many enlightening discussions and to an anonymous referee for helpful suggestions.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Supplementary material

The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fphy.2024.1434095/full#supplementary-material

Footnotes

1.^Note that the same task is called device-independent verification in [102].

2.^If a third party is involved in the Bell test, as in the case of 2.1.2.2, and 3.1.2, we denote by and , respectively, its label for the measurement setting and outcome. All other notations generalize accordingly.

3.^Here, the inequality is optimized in the sense that it provides the largest possible asymptotic confidence-gain rate, cf. Equation 23.

References

  • 1.

    RossetDFerretti-SchöbitzRBancalJDGisinNLiangYC. Imperfect measurement settings: implications for quantum state tomography and entanglement witnesses. Phys Rev A (2012) 86:062325. 10.1103/PhysRevA.86.062325

  • 2.

    MoroderTKleinmannMSchindlerPMonzTGühneOBlattR. Certifying systematic errors in quantum experiments. Phys Rev Lett (2013) 110:180401. 10.1103/PhysRevLett.110.180401

  • 3.

    van EnkSJBlume-KohoutR. When quantum tomography goes wrong: drift of quantum sources and other errors. New J. Phys (2013) 15:025024. 10.1088/1367-2630/15/2/025024

  • 4.

    ScaraniV. The device-independent outlook on quantum physics. Acta Phys Slovaca (2012) 62:347. 10.2478/v10155-012-0003-4

  • 5.

    BrunnerNCavalcantiDPironioSScaraniVWehnerS. Bell nonlocality. Rev Mod Phys (2014) 86:41978. 10.1103/RevModPhys.86.419

  • 6.

    AcínAGisinNMasanesL. From Bell’s theorem to secure quantum key distribution. Phys Rev Lett (2006) 97:120405. 10.1103/PhysRevLett.97.120405

  • 7.

    BennettCHBrassardG. Quantum cryptography: public key distribution and coin tossing. Theor Comput Sci (2014) 560:711. 10.1016/j.tcs.2014.05.025

  • 8.

    EkertAK. Quantum cryptography based on Bell’s theorem. Phys Rev. Lett (1991) 67:6613. 10.1103/PhysRevLett.67.661

  • 9.

    GisinNRibordyGTittelWZbindenH. Quantum cryptography. Rev Mod Phys (2002) 74:14595. 10.1103/RevModPhys.74.145

  • 10.

    MayersDYaoA. Quantum cryptography with imperfect apparatus. In: Proceedings 39th annual symposium on foundations of computer science (cat. No.98CB36280) (1998). p. 5039. 10.1109/SFCS.1998.743501

  • 11.

    MayersDYaoA. Self testing quantum apparatus. Quan Info Comput (2004) 4:27386. 10.26421/qic4.4-3

  • 12.

    BellJS. On the Einstein Podolksy Rosen paradox. Physics (1964) 1:195200. 10.1103/PhysicsPhysiqueFizika.1.195

  • 13.

    WernerRF. Quantum states with Einstein-Podolsky-Rosen correlations admitting a hidden-variable model. Phys Rev A (1989) 40:427781. 10.1103/PhysRevA.40.4277

  • 14.

    HorodeckiRHorodeckiPHorodeckiMHorodeckiK. Quantum entanglement. Rev Mod Phys (2009) 81:865942. 10.1103/RevModPhys.81.865

  • 15.

    BrunnerNPironioSAcinAGisinNMéthotAAScaraniV. Testing the dimension of Hilbert spaces. Phys Rev Lett (2008) 100:210503. 10.1103/PhysRevLett.100.210503

  • 16.

    BancalJDGisinNLiangYCPironioS. Device-independent witnesses of genuine multipartite entanglement. Phys Rev Lett (2011) 106:250404. 10.1103/PhysRevLett.106.250404

  • 17.

    MoroderTBancalJDLiangYCHofmannMGühneO. Device-independent entanglement quantification and related applications. Phys Rev Lett (2013) 111:030501. 10.1103/PhysRevLett.111.030501

  • 18.

    TóthGMoroderTGühneO. Evaluating convex roof entanglement measures. Phys Rev Lett (2015) 114:160501. 10.1103/PhysRevLett.114.160501

  • 19.

    LiangYCRossetDBancalJDPützGBarneaTJGisinN. Family of Bell-like inequalities as device-independent witnesses for entanglement depth. Phys Rev Lett (2015) 114:190401. 10.1103/PhysRevLett.114.190401

  • 20.

    Arnon-FriedmanRBancalJD. Device-independent certification of one-shot distillable entanglement. New J Phys (2019) 21:033010. 10.1088/1367-2630/aafef6

  • 21.

    ChenSLKuHYZhouWTuraJChenYN. Robust self-testing of steerable quantum assemblages and its applications on device-independent quantum certification. Quantum (2021) 5:552. 10.22331/q-2021-09-28-552

  • 22.

    ChenSLBudroniCLiangYCChenYN. Natural framework for device-independent quantification of quantum steerability, measurement incompatibility, and self-testing. Phys Rev Lett (2016) 116:240401. 10.1103/PhysRevLett.116.240401

  • 23.

    ChenSLBudroniCLiangYCChenYN. Exploring the framework of assemblage moment matrices and its applications in device-independent characterizations. Phys Rev A (2018) 98:042127. 10.1103/PhysRevA.98.042127

  • 24.

    BancalJDSangouardNSekatskiP. Noise-resistant device-independent certification of Bell state measurements. Phys Rev Lett (2018) 121:250506. 10.1103/PhysRevLett.121.250506

  • 25.

    RenouMOKaniewskiJBrunnerN. Self-testing entangled measurements in quantum networks. Phys Rev Lett (2018) 121:250507. 10.1103/PhysRevLett.121.250507

  • 26.

    QuintinoMTBudroniCWoodheadECabelloACavalcantiD. Device-independent tests of structures of measurement incompatibility. Phys Rev Lett (2019) 123:180401. 10.1103/PhysRevLett.123.180401

  • 27.

    WagnerSBancalJDSangouardNSekatskiP. Device-independent characterization of quantum instruments. Quantum (2020) 4:243. 10.22331/q-2020-03-19-243

  • 28.

    ChenSLMiklinNBudroniCChenYN. Device-independent quantification of measurement incompatibility. Phys Rev Res (2021) 3:023143. 10.1103/PhysRevResearch.3.023143

  • 29.

    SekatskiPBancalJDWagnerSSangouardN. Certifying the building blocks of quantum computers from Bell’s theorem. Phys Rev Lett (2018) 121:180505. 10.1103/PhysRevLett.121.180505

  • 30.

    SekatskiPBancalJDIoannouMAfzeliusMBrunnerN. Toward the device-independent certification of a quantum memory. Phys Rev Lett (2023) 131:170802. 10.1103/PhysRevLett.131.170802

  • 31.

    ZhouLShengYBLongGL. Device-independent quantum secure direct communication against collective attacks. Sci Bull (2020) 65:1220. 10.1016/j.scib.2019.10.025

  • 32.

    BernhardCBessireBMontinaAPfaffhauserMStefanovAWolfS. Non-locality of experimental qutrit pairs. J Phys A: Math Theo (2014) 47:424013. 10.1088/1751-8113/47/42/424013

  • 33.

    BancalJDSheridanLScaraniV. More randomness from the same data. New J. Phys (2014) 16:033011. 10.1088/1367-2630/16/3/033011

  • 34.

    SchwarzSBessireBStefanovALiangYC. Bipartite Bell inequalities with three ternary-outcome measurements—from theory to experiments. New J. Phys (2016) 18:035001. 10.1088/1367-2630/18/3/035001

  • 35.

    PopescuSRohrlichD. Quantum nonlocality as an axiom. Found Phys (1994) 24:37985. 10.1007/BF02058098

  • 36.

    BarrettJLindenNMassarSPironioSPopescuSRobertsD. Nonlocal correlations as an information-theoretic resource. Phys Rev A (2005) 71:022101. 10.1103/PhysRevA.71.022101

  • 37.

    LinPSRossetDZhangYBancalJDLiangYC. Device-independent point estimation from finite data and its application to device-independent property estimation. Phys Rev A (2018) 97:032309. 10.1103/PhysRevA.97.032309

  • 38.

    AspectADalibardJRogerG. Experimental test of Bell’s inequalities using time-varying analyzers. Phys Rev Lett (1982) 49:18047. 10.1103/PhysRevLett.49.1804

  • 39.

    TittelWBrendelJZbindenHGisinN. Violation of Bell inequalities by photons more than 10 km apart. Phys Rev Lett (1998) 81:35636. 10.1103/PhysRevLett.81.3563

  • 40.

    WeihsGJenneweinTSimonCWeinfurterHZeilingerA. Violation of Bell’s inequality under strict einstein locality conditions. Phys Rev Lett (1998) 81:503943. 10.1103/PhysRevLett.81.5039

  • 41.

    RoweMKielpinskiDMeyerVSackettCAItanoWMMonroeCet alExperimental violation of a Bell’s inequality with efficient detection. Nature (2001) 409:7914. 10.1038/35057215

  • 42.

    BarrettJCollinsDHardyLKentAPopescuS. Quantum nonlocality, Bell inequalities, and the memory loophole. Phys Rev A (2002) 66:042111. 10.1103/PhysRevA.66.042111

  • 43.

    GillRDAccardi contra Bell (cum mundi): the impossible coupling, 42. Beachwood, OH: Lecture Notes-Monograph Series (2003). 13354.

  • 44.

    HensenBBernienHDreauAEReisererAKalbNBlokMSet alLoophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature (2015) 526:6826. 10.1038/nature15759

  • 45.

    ShalmLKMeyer-ScottEChristensenBGBierhorstPWayneMAStevensMJet alStrong loophole-free test of local realism. Phys Rev Lett (2015) 115:250402. 10.1103/PhysRevLett.115.250402

  • 46.

    GiustinaMVersteeghMAMWengerowskySHandsteinerJHochrainerAPhelanKet alSignificant-loophole-free test of Bell’s theorem with entangled photons. Phys Rev Lett (2015) 115:250401. 10.1103/PhysRevLett.115.250401

  • 47.

    ColbeckR. Quantum and relativistic protocols for secure multi-party computation. Cambridge, United Kingdom: University of Cambridge (2006). Ph.D. thesis.

  • 48.

    PironioSAcínAMassarSde la GirodayABMatsukevichDNMaunzPet alRandom numbers certified by Bell’s theorem. Nature (2010) 464:10214. 10.1038/nature09008

  • 49.

    AcínABrunnerNGisinNMassarSPironioSScaraniV. Device-independent security of quantum cryptography against collective attacks. Phys Rev Lett (2007) 98:230501. 10.1103/PhysRevLett.98.230501

  • 50.

    PironioSAcínABrunnerNGisinNMassarSScaraniV. Device-independent quantum key distribution secure against collective attacks. New J. Phys (2009) 11:045021. 10.1088/1367-2630/11/4/045021

  • 51.

    PironioSMassarS. Security of practical private randomness generation. Phys Rev A (2013) 87:012336. 10.1103/PhysRevA.87.012336

  • 52.

    Nieto-SillerasOBampsCSilmanJPironioS. Device-independent randomness generation from several Bell estimators. New J. Phys (2018) 20:023049. 10.1088/1367-2630/aaaa06

  • 53.

    BierhorstPKnillEGlancySZhangYMinkAJordanSet alExperimentally generated randomness certified by the impossibility of superluminal signals. Nature (2018) 556:2236. 10.1038/s41586-018-0019-0

  • 54.

    BourdoncleBLinPSRossetDAcínALiangYC. Regularising data for practical randomness generation. Quan Sci Technol (2019) 4:025007. 10.1088/2058-9565/ab01e8

  • 55.

    ZhangYFuHKnillE. Efficient randomness certification by quantum probability estimation. Phys Rev Res (2020) 2:013016. 10.1103/PhysRevResearch.2.013016

  • 56.

    KnillEZhangYBierhorstP. Generation of quantum randomness by probability estimation with classical side information. Phys Rev Res (2020) 2:033465. 10.1103/physrevresearch.2.033465

  • 57.

    MetgerTFawziOSutterDRennerR. Generalised entropy accumulation. In: 2022 IEEE 63rd annual symposium on foundations of computer science (FOCS) (2022). p. 84450. 10.1109/FOCS54457.2022.00085

  • 58.

    Arnon-FriedmanRRennerRVidickT. Simple and tight device-independent security proofs. SIAM J Comput (2019) 48:181225. 10.1137/18m1174726

  • 59.

    DupuisFFawziORennerR. Entropy accumulation. Commun Math Phys (2020) 379:867913. 10.1007/s00220-020-03839-5

  • 60.

    ZhangYGlancySKnillE. Asymptotically optimal data analysis for rejecting local realism. Phys Rev A (2011) 84:062118. 10.1103/PhysRevA.84.062118

  • 61.

    GillRDTime, finite statistics, and Bell’s fifth position, 5. Växjö, Sweden: Math. Modelling in Phys. Engi., and Cog. Sc. (2003). p. 179206. Proc. Foundations of Probability and Physics-2 (Växjö: Växjö University Press).

  • 62.

    LiangYCZhangY. Bounding the plausibility of physical theories in a device-independent setting via hypothesis testing. Entropy (2019) 21:185. 10.3390/e21020185

  • 63.

    ClauserJFHorneMAShimonyAHoltRA. Proposed experiment to test local hidden-variable theories. Phys Rev Lett (1969) 23:8804. 10.1103/PhysRevLett.23.880

  • 64.

    VidalGWernerRF. Computable measure of entanglement. Phys Rev A (2002) 65:032314. 10.1103/PhysRevA.65.032314

  • 65.

    PeresA. Separability criterion for density matrices. Phys Rev Lett (1996) 77:14135. 10.1103/PhysRevLett.77.1413

  • 66.

    NavascuésMPironioSAcínA. Bounding the set of quantum correlations. Phys Rev Lett (2007) 98:010401. 10.1103/PhysRevLett.98.010401

  • 67.

    NavascuésMPironioSAcínA. A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations. New J. Phys (2008) 10:073013. 10.1088/1367-2630/10/7/073013

  • 68.

    DohertyACLiangYCTonerBWehnerS. The quantum moment problem and bounds on entangled multi-prover games. 23rd Annu IEEE Conf. Comput Comp 2008, Ccc’08 (2008) 199210. 10.1109/CCC.2008.26

  • 69.

    CollinsDGisinNLindenNMassarSPopescuS. Bell inequalities for arbitrarily high-dimensional systems. Phys. Rev. Lett. (2002) 88:040404. 10.1103/PhysRevLett.88.040404

  • 70.

    KaszlikowskiDKwekLCChenJLŻukowskiMOhCH. Clauser-Horne inequality for three-state systems. Phys Rev A (2002) 65:032118. 10.1103/PhysRevA.65.032118

  • 71.

    AcínADurtTGisinNLatorreJI. Quantum nonlocality in two three-level systems. Phys Rev A (2002) 65:052325. 10.1103/PhysRevA.65.052325

  • 72.

    LiangYC. Correlations, Bell inequality violation and quantum entanglement. Bribsane, Australia: University of Queensland (2008). Ph.D. thesis.

  • 73.

    LuHZhaoQLiZDYinXFYuanXHungJCet alEntanglement structure: entanglement partitioning in multipartite systems and its experimental detection using optimizable witnesses. Phys Rev X (2018) 8:021072. 10.1103/PhysRevX.8.021072

  • 74.

    BancalJDBarrettJGisinNPironioS. Definitions of multipartite nonlocality. Phys Rev A (2013) 88:014102. 10.1103/PhysRevA.88.014102

  • 75.

    CurchodFJGisinNLiangYC. Quantifying multipartite nonlocality via the size of the resource. Phys Rev A (2015) 91:012121. 10.1103/PhysRevA.91.012121

  • 76.

    GühneOTóthGBriegelHJ. Multipartite entanglement in spin chains. New J. Phys (2005) 7:229. 10.1088/1367-2630/7/1/229

  • 77.

    SørensenASMølmerK. Entanglement and extreme spin squeezing. Phys Rev Lett (2001) 86:44314. 10.1103/PhysRevLett.86.4431

  • 78.

    MerminND. Extreme quantum entanglement in a superposition of macroscopically distinct states. Phys Rev Lett (1990) 65:183840. 10.1103/PhysRevLett.65.1838

  • 79.

    ŠupićIBowlesJ. Self-testing of quantum systems: a review. Quantum (2020) 4:337. 10.22331/q-2020-09-30-337

  • 80.

    JebarathinamCHungJCChenSLLiangYC. Maximal violation of a broad class of Bell inequalities and its implication on self-testing. Phys Rev Res (2019) 1:033073. 10.1103/PhysRevResearch.1.033073

  • 81.

    KaniewskiJ. Weak form of self-testing. Phys Rev Res (2020) 2:033420. 10.1103/PhysRevResearch.2.033420

  • 82.

    SummersSJWernerR. Maximal violation of Bell’s inequalities is generic in quantum field theory. Commun Math Phys (1987) 110:24759. 10.1007/BF01207366

  • 83.

    PopescuSRohrlichD. Which states violate Bell’s inequality maximally?Phys Lett A (1992) 169:4114. 10.1016/0375-9601(92)90819-8

  • 84.

    BraunsteinSLMannARevzenM. Maximal violation of Bell inequalities for mixed states. Phys Rev Lett (1992) 68:325961. 10.1103/PhysRevLett.68.3259

  • 85.

    TsirelsonBS. Some results and problems on quantum Bell-type inequalities. Hadronic J. Suppl (1993) 8:32945.

  • 86.

    BancalJDNavascuésMScaraniVVértesiTYangTH. Physical characterization of quantum devices from nonlocal correlations. Phys Rev A (2015) 91:022115. 10.1103/PhysRevA.91.022115

  • 87.

    YangTHNavascuésM. Robust self-testing of unknown quantum systems into any entangled two-qubit states. Phys Rev A (2013) 87:050102. 10.1103/PhysRevA.87.050102

  • 88.

    YangTHVértesiTBancalJDScaraniVNavascuésM. Robust and versatile black-box certification of quantum devices. Phys Rev Lett (2014) 113:040401. 10.1103/PhysRevLett.113.040401

  • 89.

    van DamWGillRGrunwaldP. The statistical strength of nonlocality proofs. IEEE Trans Inf Theor (2005) 51:281235. 10.1109/TIT.2005.851738

  • 90.

    ZhangYGlancySKnillE. Efficient quantification of experimental evidence against local realism. Phys Rev A (2013) 88:052119. 10.1103/PhysRevA.88.052119

  • 91.

    KullbackSLeiblerRA. On information and sufficiency. Ann Math Stat (1951) 22:7986. 10.1214/aoms/1177729694

  • 93.

    MinkaT. The lightspeed Matlab toolbox (2017). Available from: https://github.com/tminka/lightspeed (Accessed October 15 2024).

  • 94.

    LiangYCDohertyAC. Bounds on quantum correlations in Bell-inequality experiments. Phys Rev A (2007) 75:042103. 10.1103/PhysRevA.75.042103

  • 95.

    GreenbergerDMHorneMAZeilingerA. Bell’s theorem, quantum theory and conceptions of the universe. Dordrecht: Kluwer: Going Beyond Bell’s Theorem (1989). p. 6972.

  • 96.

    MerminND. Quantum mysteries revisited. Am J. Phys (1990) 58:7314. 10.1119/1.16503

  • 97.

    KaniewskiJ. Analytic and nearly optimal self-testing bounds for the Clauser-Horne-Shimony-Holt and Mermin inequalities. Phys Rev Lett (2016) 117:070402. 10.1103/PhysRevLett.117.070402

  • 98.

    EisertJHangleiterDWalkNRothIMarkhamDParekhRet alQuantum certification and benchmarking. Nat Rev Phys (2020) 2:38290. 10.1038/s42254-020-0186-4

  • 99.

    TanTRWanYEricksonSBierhorstPKienzlerDGlancySet alChained Bell inequality experiment with high-efficiency measurements. Phys Rev Lett (2017) 118:130403. 10.1103/PhysRevLett.118.130403

  • 100.

    BancalJDRedekerKSekatskiPRosenfeldWSangouardN. Self-testing with finite statistics enabling the certification of a quantum network link. Quantum (2021) 5:401. 10.22331/q-2021-03-02-401

  • 101.

    WillsPKnillECoakleyKZhangY. Performance of test supermartingale confidence intervals for the success probability of Bernoulli trials. J. Res Natl Inst Stan (2020) 125:125003. 10.6028/jres.125.003

  • 102.

    GočaninAŠupićIDakićB. Sample-efficient device-independent quantum state verification and certification. PRX Quan (2022) 3:010317. 10.1103/PRXQuantum.3.010317

  • 103.

    ZhangYSeshadriAKnillE. Confidence-interval construction with non-i.i.d. spot-checking trials and its application in quantum information. Optica Quantum 2.0 Conference and Exhibition. Denver, Colorado: Optica Publishing Group (2023). Technical Digest Series, QTu3A.20. 10.1364/QUANTUM.2023.QTu3A.20

  • 104.

    MosekAS. Mosek conic optimization. MOSEK Model Cookbook (2019).

  • 105.

    LinPSVértesiTLiangYC. Naturally restricted subsets of nonsignaling correlations: typicality and convergence. Quantum (2022) 6:765. 10.22331/q-2022-07-14-765

Summary

Keywords

device-independent, hypothesis testing, self-testing, quantum information, quantum entanglement, quantum properties, Bell test

Citation

Chang W-G, Chen K-C, Chen K-S, Chen S-L and Liang Y-C (2024) Device-independent certification of desirable properties with a confidence interval. Front. Phys. 12:1434095. doi: 10.3389/fphy.2024.1434095

Received

17 May 2024

Accepted

25 September 2024

Published

06 November 2024

Volume

12 - 2024

Edited by

Xiao Yuan, Peking University, China

Reviewed by

He Lu, Shandong University, China

Pei Zeng, The University of Chicago, United States

Updates

Copyright

*Correspondence: Yeong-Cherng Liang,

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Figures

Cite article

Copy to clipboard


Export citation file


Share article

Article metrics