Learn More
We show that the state-independent violation of inequalities for noncontextual hidden variable theories introduced in [Phys. Rev. Lett. 101, 210401 (2008)] is universal, i.e., occurs for any quantum mechanical system in which noncontextuality is meaningful. We describe a method to obtain state-independent violations for any system of dimension d> or =3.(More)
Contextuality and nonlocality are two fundamental properties of nature. Hardy's proof is considered the simplest proof of nonlocality and can also be seen as a particular violation of the simplest Bell inequality. A fundamental question is: Which is the simplest proof of contextuality? We show that there is a Hardy-like proof of contextuality that can also(More)
We investigate measurements of bipartite ensembles restricted to local operations and classical communication and find a universal Holevo-like upper bound on the locally accessible information. We analyze our bound and exhibit a class of states which saturate it. Finally, we link the bound to the problem of quantification of the nonlocality of the(More)
Klyachko and coworkers consider an orthogonality graph in the form of a pentagram, and in this way derive a Kochen-Specker inequality for spin 1 systems. In some low-dimensional situations Hilbert spaces are naturally organised, by a magical choice of basis, into SO(N) orbits. Combining these ideas some very elegant results emerge. We give a careful(More)
We construct a simple algorithm to generate any CHSH type Bell inequality involving a party with two local binary measurements from two CHSH type inequalities without this party. The algorithm readily generalizes to situations, where the additional observer uses three measurement settings. There, each inequality involving the additional party is constructed(More)
We report on an experimental test of classical and quantum dimension. We have used a dimension witness that can distinguish between quantum and classical systems of dimensions two, three, and four and performed the experiment for all five cases. The witness we have chosen is a base of semi-device-independent cryptographic and randomness expansion protocols.(More)
  • 1