Quantum Nonlocality with Arbitrary Limited Detection Efficiency.

  title={Quantum Nonlocality with Arbitrary Limited Detection Efficiency.},
  author={Gilles P{\"u}tz and Anthony Martin and Nicolas Gisin and Djeylan Aktas and Bruno Fedrici and S{\'e}bastien Tanzilli},
  journal={Physical review letters},
  volume={116 1},
The demonstration and use of nonlocality, as defined by Bell's theorem, rely strongly on dealing with nondetection events due to losses and detectors'inefficiencies. Otherwise, the so-called detection loophole could be exploited. The only way to avoid this is to have detection efficiencies that are above a certain threshold. We introduce the intermediate assumption of limited detection efficiency, that is, in each run of the experiment, the overall detection efficiency is lower bounded by η(min… Expand

Figures and Topics from this paper

Measurement dependence, limited detection and more: problems and applications of quantum nonlocality
The work in this thesis focuses on the subject of quantum nonlocality. The fact that the principle of locality is violated in nature is among the most counter-intuitive revelations of the pastExpand
Measurement dependent locality
The demonstration and use of Bell-nonlocality, a concept that is fundamentally striking and is at the core of applications in device independent quantum information processing, relies heavily on theExpand
Protecting nonlocality of multipartite states by feed-forward control
This paper uses a feed-forward control scheme to protect the nonlocality of the Bell and GHZ states against dissipation and finds that this protection scheme is very effective, and also finds that entanglement is relatively easier to be protected than nonLocality. Expand
The critical detection efficiency for closing the detection loophole of some modified Bell inequalities
If the detection efficiency of experiment exceeds the critical one derived here, the detection loophole of Bell inequalities is eliminated, and local hidden variable models are constructed to reproduce these violations. Expand
Measurement-dependent locality beyond independent and identically distributed runs
When conducting a Bell test, it is normal to assume that the preparation of the quantum state is independent of the measurements performed on it. Remarkably, the violation of local realism byExpand
Device-independent point estimation from finite data and its application to device-independent property estimation
The device-independent approach to physics is one where conclusions are drawn directly from the observed correlations between measurement outcomes. In quantum information, this approach allows one toExpand
Towards quantum applications based on photonic entanglement
A novel fully wave-guided, high performance photonic entanglement source is presented, able to generate hyper-entangled states in the observables of polarization and energy-time by means of a nonlinear Sagnac loop, promising scalable and potential real device applications with limited resources and simplified detection schemes. Expand
Many-Body Localization : construction of the emergent local conserved operators via block real-space renormalization
A Fully Many-Body Localized (FMBL) quantum disordered system is characterized by the emergence of an extensive number of local conserved operators that prevents the relaxation towards thermalExpand
Quantum photonics at telecom wavelengths based on lithium niobate waveguides
Integrated optical components on lithium niobate play a major role in standard high-speed communication systems. Over the last two decades, after the birth and positioning of quantum informationExpand


Demonstration of Quantum Nonlocality in the Presence of Measurement Dependence.
It is shown that the measurement independence assumption can be widely relaxed while still demonstrating quantum nonlocality, excluding a much larger range of measurement dependent local models than would be possible with an adapted Clauser-Horne-Shimony-Holt (CHSH) inequality. Expand
Experimental amplification of an entangled photon: what if the detection loophole is ignored?
The experimental verification of quantum features, such as entanglement, at large scales is extremely challenging because of environment-induced decoherence. Indeed, measurement techniques forExpand
Arbitrarily small amount of measurement independence is sufficient to manifest quantum nonlocality.
It is proved that even in the simplest Bell test-one involving 2 parties each performing 2 binary-outcome measurements-an arbitrarily small amount of measurement independence is sufficient to manifest quantum nonlocality. Expand
Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres
The data imply statistically significant rejection of the local-realist null hypothesis and could be used for testing less-conventional theories, and for implementing device-independent quantum-secure communication and randomness certification. Expand
Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons.
A Bell test is reported that closes the most significant of loopholes that provide loopholes for a local realist explanation of quantum mechanics, using a well-optimized source of entangled photons, rapid setting generation, and highly efficient superconducting detectors. Expand
Random numbers certified by Bell’s theorem
It is shown that the non-local correlations of entangled quantum particles can be used to certify the presence of genuine randomness, and it is thereby possible to design a cryptographically secure random number generator that does not require any assumption about the internal working of the device. Expand
Tailored two-photon correlation and fair-sampling: a cautionary tale
We demonstrate an experimental test of the Clauser-Horne- Shimony-Holt (CHSH) Bell inequality which seemingly exhibits correlations beyond the limits imposed by quantum mechanics. Inspired by theExpand
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD followsExpand
Detection loophole in Bell experiments: How postselection modifies the requirements to observe nonlocality
A common problem in Bell-type experiments is the well-known detection loophole: if the detection efficiencies are not perfect and if one simply postselects the conclusive events, one might observe aExpand
Quantum And Relativistic Protocols For Secure Multi-Party Computation
A new protocol for non-relativistic strong coin tossing is introduced, which matches the security of the best protocol known to date while using a conceptually different approach to achieve the task. Expand