One-time Pad Encryption Model for Non-local Correlations
Abstract
We present a cryptographic-inspired framework for modeling Bell nonlocal correlations. Drawing inspiration from the renowned De Broglie-Bohm theory, we conceptualize nonlocal boxes as realistic systems featuring instantaneous signaling at the hidden variable level. By introducing randomness into the distribution of the hidden variable the superluminal signaling model is made compatible with the operational no-signalling condition. As our design mimics the famous symmetric key encryption system called One-time Pad (OTP), we call this the OTP model for nonlocal boxes. We illustrate the efficacy of this model through various esoteric examples related to the non-classical nature of nonlocal boxes. In particular, the breakdown of communication complexity using nonlocal boxes can be better understood in this framework. Additionally, we delve into the Van Dam protocol, revealing its connection to homomorphic encryption studied in cryptography. Exploring potential avenues for encapsulating quantum-realizable nonlocal correlations within our framework, we highlight that the Information Causality principle imposes additional constraints at the hidden variable level. Present work thus orchestrates the results in classical cryptography to improve our understanding of nonlocal correlations and welcomes further research to this connection.
I Introduction
Violation of Bell inequality drastically revolutionizes our world-view [1] (see also [2, 3, 4]). An input-output correlation with spatially separated input settings cannot have a local hidden variable model whenever it violates a Bell inequality, provided the input settings are independent of the hidden variable. This nonlocal behavior creates an apparent tension with the well-regarded no-signaling (NS) principle [5]. However, by introducing randomness into the hidden variable model, a peaceful coexistence between these two concepts becomes possible. A celebrated example is De Broglie-Bohm theory [6, 7, 8], which accommodates both nonlocality and NS by adhering randomness in the distribution of nonlocal variable [9].
While Bell’s theorem offers a fundamentally new outlook of the physical world, a better appreciation of the Bell inequality emerged when it was realized that the non-local quantum correlations inherent in entangled particles could be utilized as cryptographic keys [10]. Subsequently, this intuition underwent a more detailed analysis leading to a comprehensive establishment on a solid foundation [11, 12, 13, 14]. A number of experiments involving entangled quantum systems establish our world to be non-local [15, 16, 17, 18, 19, 20, 21, 22, 23, 24] (see also [25] for the list of other important Bell tests). Later, it is realized that nonlocality is not a feature specific to quantum theory only. Popescu & Rohrlich come up with a hypothetical NS correlation [26], now familiar as PR box, which turns out to be more non-local than quantum theory [27]. Such a post-quantum non-local correlation has preposterous consequences. For instance, the existence of the PR box in a world leads to the collapse of communication complexity, as any non-local binary function could be evaluated with a constant amount of communication when assisted with such correlations [28, 29, 30]. In addition, such correlations have also been shown to violate the principle of Information Causality (IC), a generalization of NS principle [31] (see also [32, 33, 34]).
Naturally, the following questions arise: Is it possible to provide an intuitive ‘explanation’ that elucidates the striking features of non-local correlations [35]? How does communication complexity become trivial with PR correlation, which is otherwise a NS resource? Why do some non-local correlations violate IC while others are perfectly compatible with it? Interestingly, in this letter, we show that cryptography once again plays a benevolent role in addressing these questions. Inspired by basic ideas in cryptography, we develop a model that provides simple explanations for the aforesaid striking features of non-local correlations. From a foundational standpoint, our model shares similar features with the De Broglie-Bohm theory, as we model non-local boxes as ‘realistic’ systems with instantaneous signaling at the hidden variable level. The superluminal signaling mechanism is designed in such a way that it does not result in signaling at the operational level. Since the design is closely linked to the famous symmetric key encryption model called One-time Pad (OTP) [36], we refer to this as the OTP-model for non-local correlations. Before delving into the utility of this model, in the following, we will first formally introduce it and analyze some of its generic aspects.
II Preliminaries and set-up
II.1 Bipartite no-signaling correlations
Bipartite no-signalling correlations are joint probability distributions of the form that satisfy the no-signalling (NS) conditions:
(1a) | ||||
(1b) |
Here, , , and are sample spaces of finite size and & are marginal distributions. These correlations are ‘Bipartite’ as they invoked two parties (say Alice and Bob) that are spatially separated, and the correlation in this context correspond to the joint probability distribution of outcomes and of experiments and performed by Alice and Bob, respectively. The no-signalling condition imposes the requirement that in such scenarios, Alice’s experimental settings should not influence Bob’s measurement statistics and vice-verse.
The classic example of such correlations are the joint probability distribution that violates the Bell’s inequality in the standard Bell scenario where local measurements are done by space-like separated parties on a common entangled state. In [26], it was shown that the set of no-signalling correlations is strictly larger than the set of quantum correlations and in particular that there are no-signalling correlations that are more non-local than quantum correlations. A notable example that will be used later on is the PR box, which is a bipartite no-signalling correlations defined as,
(2) |
It can be easily verified that this correlation satisfies the NS condition and moreover it achieves the algebraic maximum value of Clauser-Horne-Shimony-Holt (CHSH) expression [15]. An important question to ask at this point is whether such correlations can be physical and if not why? An interesting approach in this direction is to look for principles that are physically or information theoretically motivated that we expect to hold. Towards this end, it turns out that the PR box violates an information theoretic principle called the principle of Information Causality (IC) [31] which will be explained in Section IV.3. The structure of the set of bipartite no-signalling (NS) correlations is also well known. In particular, the NS conditions being linear constraints on the probability imply that the set of NS correlations form a polytope called NS-polytope. The vertices of the set include deterministic local correlations and correlations that are non-local. For example, in the case of -input, -output correlations (where ), all the non-local vertices are equivalent to the PR-box up-to local relabellings.
II.2 De Broglie-Bohm theory
Bohm’s 1952 pilot-wave model for quantum mechanics [7, 8], which has roots to de Broglie’s 1927 work [6], is a hidden variable model of quantum mechanics where each particle is associated with an ontic position and it evolves ‘classically’ under a quantum potential which is related to the amplitude square of the wavefunction. As is famous, this model however allows for instantaneous signalling at the hidden variable level which is washed out by the inherent randomness in the theory (which is also related to the amplitude square of the wavefunction). The curious interplay between this instantaneous signalling and randomness was shown in [9], which proved that if the quantum potential deviates from the amplitude square of the wavefunction, the instantaneous signalling becomes operationally evident. However, the interplay between instantaneous signalling and noise can be more complicated than just one washing out the other as is suggested by the quantum advantages in information processing tasks. However, since the pilate-wave model is originally defined for continuous degrees of freedom, it obscures how signalling and randomness plays together. Moreover, since it is a model for quantum theory, there maybe further obfuscation associated with other features of quantum theory. In this paper, we present a hidden-variable model which is qualitatively similar to the pilate-wave theory but attempts to get around the problems aforementioned. More precisely, we present a model for a class of finite input-output non-local correlations which features the aforementioned interplay between instantaneous signalling and inherent randomness, but is nevertheless less obscured by the fact that it is finite dimensional and has less structure than a model for quantum theory. It goes without saying that this model is less powerful than quantum theory in information processing tasks, but we show that it is precisely the lack of structure than enables us to see the non-trivial ways in which noise and instantaneous signalling inter-plays for non-local advantages in information processing tasks.
II.3 OTP-box
The idea of cryptography has been instrumental in the development of the current information era [37]. OTP is a symmetric encryption scheme where the sender and the receiver share the same key. The key here is a bit string which is long as of the message to be encrypted and is uniformly randomly sampled and, crucially, only used once. The encryption step is simply to ‘XOR’ the message with the key, i.e., . The encrypted message is then sent over to the receiver, who will decrypt the message again by ‘XOR’-ing with the same key, i.e., . As analyzed by Shannon, the security of this protocol is ensured when the key is sampled uniformly randomly from the set of strings , where is the bit-length of the message [38].

Importantly, as long as the receiver does not have the key, the OTP system is equivalent to a non-signaling scenario in the sense that the receiver gets no information about the message the sender intends to send. This is precisely the observation that prompted our model. In other words, nature can, in principle, perform ‘secure’ instantaneous signaling as long as no one has access to the key a priori. We note that this is analogous to oblivious embeddings used in Ref.[39]. To mathematically capture the connection between NS correlations and OTP-based crypto-system, we start with formally defining an OTP-box.
Definition 1.
An OTP-box, shared between two parties (say Alice and Bob), is a black box defined by the tuple , where are sets denoting Alice’s and Bob’s inputs and outputs, respectively; , , are functions that define how the inputs are mapped to the outputs; is the hidden variable that is inaccessible to the agents using the black box and is distributed according to a probability distribution . Moreover, the input-output correlation that the agents observe outside the box is given by, , where is the Kronecker delta.
A quick inspection reveals the inspiration for the definition. In the language of OTP encryption, one may think of as the key in the encryption protocol. The OTP box does the following: depending on the input , Alice receives the output . Since Alice knows , she effectively has access to the key. Bob’s output can be understood as the function , but encrypted according to as (see Fig.1). Within the black box, the information of Alice’s input is instantaneously communicated to Bob’s end, albeit inaccessible to Bob outside the box. As we will show now, such crypto-systems satisfy NS property for a particular key distribution.
Lemma 1.
The input-output correlation obtained from an OTP-box satisfies NS if and only if the distribution of the hidden variable within the black box (the key) is uniform, i.e., .
Proof.
The correlation realized by the OTP box is given by,
(3) |
The form of the output response at the hidden variable level ensures Bob to Alice NS condition of the observed input-output correlation for any distribution of the hidden variable. To see the NS condition in the other direction, let us consider the Bob’s marginal distribution :
(4) |
Thus we have,
(5) |
Here we use the parameterization , with . denotes the complement of the bit . Therefore, if explicitly depends on , to ensure NS, we must have . This implies that , and hence proves the Lemma. Note that the result directly follows from Shannon’s proof of the unbreakability of OTP encryption scheme [38]. ∎
III OTP model for nonlocal correlations
From now on-wards, we will only consider those OTP-boxes that result in NS correlations. An OTP-box for a NS correlation (violating Bell inequality) can be thought of as a discrete version of the deterministic De Broglie-Bohm model; and interestingly, Lemma 1 here is analogous to the Signal-locality theorem as in the case of original De Broglie-Bohm theory [9]. The interplay of signaling and randomness in simulating quantum statistics is also noteworthy at this point [40, 41, 42, 39].
For an explicit example we consider arguably the most famous -input & -output PR correlation, , where . An OTP model that reproduces this correlation is given by and , and accordingly, Alice’s and Bob’s outputs from the OTP-box are and respectively. According to Lemma 1, being sampled with uniform probability from the set ensures NS outside the OTP-box. As pointed out by the author in [43], there is a fundamental difference between PR box and its underlying deterministic OTP-box. In a PR box, the temporal order of the inputs is irrelevant, and the correlations arise as a global feature of the statistics. In contrast, the temporal order of the inputs is relevant in OTP-box to determine its output values, which thus requires the assumption of a preferred foliation in space-time.
OTP model for all the nonlocal vertices of -input & -output NS polytope follows immediately as these vertices are nothing but local relabelling of the aforesaid PR correlation [44]. In fact, one can consider more generic NS correlations with -input on Alice’s side and -input on Bob’s side, with each input having binary outputs. A nonlocal vertex of the -input & -output NS polytope will be called a full-output vertex if, in the marginal distributions, all possible outputs occur with nonzero probability for all the inputs. Notably, if for one of Alice’s inputs, an -input NS box only gives one output, one can simulate the box with a -input full-output NS box that simply ignores the redundant input. Our next result asserts the OTP model for all the full-output nonlocal vertices of -input & -output NS polytope.
Theorem 1.
All the full-output nonlocal vertices of -input & -output NS correlations allow an OTP model.
Proof.
We start by noting that a complete characterization of nonlocal vertices of -input & -output correlations was provided in Ref.[45]. For our purposes, only two main observations suffice: (i) all the entries of a full-output vertex are either ‘’ or ‘’; (ii) for a full-output vertex, Alice’s and Bob’s outputs are either strictly correlated or strictly anti-correlated. Let us consider a function that indicates whether the outputs will be correlated (‘’) or anti-correlated (‘’), i.e., . From Ref.[46, 45], it follows that such a function is unique given a full-output vertex. The correlation corresponding to such a vertex then reads as:
(6) | ||||
(7) |
This is, however, the output correlation of an OTP box with , , and ; and thus proves the claim. ∎
At this point naturally the question arises whether the above theorem can be generalized for higher input-output nonlocal boxes. To this aim we can start with extending the definition for OTP-box appropriately.
Definition 2.
A generalised OTP box of type-k (k-GOTP), shared between two parties (say Alice and Bob), is a black box defined by the tuple , where (with ) are sets denoting Alice’s and Bob’s inputs and outputs, respectively; , , are functions that define how the inputs are mapped to the outputs; (with ) is the hidden variable that is inaccessible to the agents using the black box and is distributed according to a probability distribution . Moreover, the input-output correlation that the agents observe outside the box is given by, , where is the Kronecker delta.
Similar interpretation as discussed after Definition 1 also holds here. For our purposes, it is sufficient to notice that if is a binary function that has a nontrivial dependence on x, then no-signalling condition of a k-GOTP box is equivalent to . With this, a result analogues to Theorem 1 can be stated for the 2,2-input & m,n-output scenario as well.
Theorem 2.
The nonlocal vertices of -input & -output NS correlations allow a k-GOTP model.
Proof.
The complete characterization of nonlocal vertices with 2 inputs (i.e., ) and r,s-outputs (without any l.o.g. assume ) is given in Ref.[44]. In particular, note that for a given value of and , there are several inequivalent boxes labelled by as:
(8) |
Clearly each of these boxes can be modelled as a k-GOTP box with and . Thus we have,
(9) |
This completes the proof. ∎
At this point, we recall that quantum correlations lie within the NS polytope. Therefore, to include quantum realizable and physically interesting NS correlations within OTP model framework, we proceed to introduce a generalized notion of the OTP-box.
Definition 3.
A noisy OTP-box (N-OTP-box) is defined by the tuple , where are sets denoting Alice’s and Bob’s input and output sets respectively; , are functions that define how the inputs are mapped to the outputs; are hidden variables that are inaccessible to the agents using the black box and is distributed according to . Moreover, the input-output correlation observed by the agents outside the N-OTP-box is given by, .
A generalization of Lemma 1 ensures the input-output correlation obtained from an N-OTP-box to be NS whenever . Note that N-OTP-boxes reduce to the corresponding OTP-boxes when , i.e., the variables and are perfectly correlated. In the absence of perfect correlation between and , an N-OTP-box can be interpreted as follows: output at Bob’s end is but encrypted by the key , i.e. . However, unlike the perfect case, the output at Alice’s end () is not exactly the key to Bob’s encrypted output but correlated to it. Consequently, Bob cannot perfectly decrypt the value of . As shown in the following result this noisy box leads to the construction of the OTP model for non-extremal NS correlations.
Theorem 3.
All isotropic -input & -output NS correlations allow an N-OTP model.
Proof.
The isotropic correlations are of the form, , where . The fact that both PR and anti-PR correlations have OTP models implies:
where, . The last expression is in the N-OTP form, and hence the claim is proved. ∎
IV OTP Model: Implications
As the basic tenets of the OTP model framework are developed and the model is generalized to some extent, we now move on to showcase the benefits of this model in explaining and understanding some of the striking features of non-local correlations.
IV.1 Collapse of communication complexity
Nonlocal correlations can significantly reduce the communication complexity of distributed computing [30]. Given an -bit string to Alice and an -bit string to Bob, any arbitrary binary function can be computed by Bob with just -bit of communication from Alice to Bob provided they have access to nonlocal correlations. However, the completion of a task demanding m-bit communication using only a 1-bit channel, aided by nonlocal correlations that are otherwise NS, lacks a straightforward, intuitive explanation.
The OTP model framework offers an innate explanation for this puzzle. Let as a resource Alice and Bob are given an OTP-box where and in Def.1 is precisely the function they are interested in computing. From Lemma 1, this simply means that they are given the appropriate NS correlation. Alice and Bob input and in their respective parts of the box. According to the symmetric encryption scheme of the OTP-box, Bob’s output is the encrypted version of the function , i.e., , whereas Alice output is the key . This solves the puzzle as to how Alice and Bob can compute a function that requires communication of -bit with just -bit of communication and a NS box. The information of reaches Bob’s end through superluminal signaling at the hidden variable level. The output of the box is, however, encrypted and hence useless to Bob. But Alice has the key. She now sends the key () through a -bit communication channel, which allows Bob to decrypt the value of the function , irrespective of the length of the string . In summary, we can say that the key is used by the agents to unlock the power of superluminal signaling at the hidden variable (ontic) level.
IV.2 Van Dam protocol
Win van Dam has shown that PR correlation can trivialize communication complexity [28]. This is quite surprising when compared with quantum correlations. Quantum entanglement is known to reduce the amount of classical information that Alice and Bob need to exchange to evaluate certain distributed functions [47], whereas for other functions entanglement provides no advantage. An example of latter is the Inner Product function , which is defined as [48]. At this point we recall a cryptographic concept called homomorphic encryption [49]. Homomorphic encryption allows performing computations on encrypted data without decrypting it and hence without compromising the security of the data. Our next result provides a new outlook of Van Dam protocol from a homomorphic encryption point of view.
Proposition 1.
The Van Dam protocol for distributed computing of arbitrary binary functions with trivial communication complexity can be understood as an application of the homomorphic nature of OTP encryption with respect to XOR operation.
Proof.
The simplest example of homomorphic encryption is the OTP encryption, which is homomorphic with respect to modular addition, i.e., it is additively homomorphic. For instance, consider the ”(encrypted data, key)” pairs and . XOR-ing operation on the encrypted data and the key yields: . Thus, post-computation, the new key () decrypts the new encrypted data (). In other words, it is possible to perform modular addition of the data without decrypting it first.
Coming to think of it, this is precisely what happens in Van Dam’s protocol. In the distributed computing scenario Van Dam considered, Alice is given some string and Bob is given another string . Their task is to compute some arbitrary binary function that is apriori known to the players. Let us now express Van Dam’s protocol in the OTP-box model. For every possible , Alice inputs into a PR box, and thus requiring a total of PR boxes. Bob, on the other hand, inputs ‘1’ into the PR box, where is the decimal representation of the binary string ‘’ (or example, if , then Bob inputs ‘1’ into th box). Bob inputs ‘’ into all the remaining PR boxes. Modeled as an OTP box, the outputs at Bob’s end are the encrypted information . Here, is Bob’s input into the PR box. Now, note that . Thus, if Bob can decrypt the output of each PR box, Bob can compute . But this requires Alice to send each to Bob. Fortunately, the additive-homomorphism of OTP encryption comes to the rescue! Bob knows that OTP encryption is homomorphic with respect to XOR-ing operation. He thus blindly XORs all the encrypted bits to obtain the bit . Meanwhile, Alice computes the new key and sends this bit to Bob. The homomorphism then allows Bob to decrypt the value of the function . ∎
Casting Van Dam’s protocol as homomorphic encryption thus provides a better understating of distributed computations with nonlocal correlations. Accordingly, the puzzling feature of the breakdown of communication complexity with PR box can be better appreciated in the OTP framework.
IV.3 The principle of Information Causality
While nonlocality in PR correlation is quite strong, making communication complexity trivial, nonlocality in quantum theory is docile enough to ensure ‘nontrivial communication complexity’ [29]. Lately, a novel principle called Information Causality (IC) was proposed, which can capture this limited nonlocality of quantum theory and can identify post-quantum nonlocal correlations. IC limits Bob’s information gain about a previously unknown to him dataset of Alice to be at most bits when Alice communicates classical bits to Bob, and he is allowed to use local resources that might be correlated with Alice [31]. A necessary condition of IC can be obtained by considering random access code (RAC) task [50, 51, 52], where Alice receives a random string , and Bob randomly aims to guess bit of Alice’s string. In the presence of an NS correlation, if Alice communicates -cbits to Bob, then according to IC the efficiency of the aforesaid task is upper bounded by , where . Here, denotes Shannon’s mutual information between the bit of Alice, and Bob’s guess . Interestingly, IC reproduces the Cirel’son bound [27], i.e., any nonlocal correlation yielding CHSH [15] value more than violates IC.
A natural question is: how is this limited nonlocal feature of quantum correlation captured in our OTP model framework? Nonlocality, in our model, is achieved by a careful interplay between ontic-level signaling and randomness. Consequently, limited nonlocality can be accounted for in two ways: (i) either messing around with the randomness, which boils down to noisy encryption, or (ii) reducing the amount of ontic-level signaling. We will examine both these approaches in reproducing quantum correlations, particularly focusing on the class of isotropic correlations.
(i) Quantum correlations as noisy encryption: As shown in Theorem 3, isotropic correlations in -input & -output scenario allow an N-OTP model. As motivated in the definition of the N-OTP box, the limited non-locality found in nature can be explained through noisy encryption. More precisely, we can interpret it as follows: there is a well-defined value of the encryption key within the box, but nature is ‘peculiar’ in such a way that it does not provide perfect access to the key to the agent outside the box (in this case Alice). The key accessed by Alice is not identical to the key within the box; rather, they are correlated. A simple calculation ensures that the necessary condition of IC is satisfied when the mutual information between the true key and the obtained key is upper bounded by bit. Although this could be a way of obtaining quantum-realizable nonlocal correlation, the approach might look rather arbitrary and ad hoc.
(ii) Quantum correlations through limited ontic-level signalling: A more natural approach to explain limited nonlocality would be to limit the extent of instantaneous signaling at the ontic level. After all, the idea of instantaneous signaling itself sounds far too radical. Let us try to come to terms with it by making it less powerful. For this, we may model the instantaneous communication within the box as a classical binary bit-flip channel, with flipping probability . The remainder of the OTP-box remains the same. In this case, the input-output correlation obtained by the agents outside the box reads as: . We can now use the standard RAC protocol to verify that OTP boxes of this kind always violate the IC principle, except when , corresponding to no communication at all. In other words, perfect encryption, with noisy ontic-level signaling, violates IC. By perfect encryption, we mean that Alice has perfect access to the key that is used to encrypt the function at Bob’s end. A more explanatory analysis is provided in Appendix.
V Discussions
In summary, we have constructed a hidden variable model for nonlocal correlations. From a foundational point of view, our model is analogous to the De Broglie-Bohm model that allows instantaneous signaling at the hidden variable/ontic level. Interestingly, the model displays an elegant interplay between ontic-level signaling and randomness, i.e., distribution of the ontic variable. Randomness essentially solves the tension between ontic-level signaling and the operational NS principle by ‘toning down’ the power of ontic-level signaling at the operational level. From a cryptographic point of view, our model can also be seen as a symmetric key encryption system called One Time Pads. This, in turn, helps us to explain the breakdown of communication complexity with PR correlation and provides a better understanding of Van Dam’s protocol in terms of homomorphic encryption. As it turns out, the ontic variables in our model play the role of the encryption key, and the randomness in its distribution is designed in such a way that one can, nevertheless, unlock some power of the ontic-level signaling, leading to an advantage in nonlocal computation. In addition to its foundational implication, this shows an instance of the utility of the connection we presented between encryption and nonlocal boxes. We further believe that the results in classical cryptography can be used to greatly improve our understanding of nonlocal correlations and also in designing new protocols that can exploit this nonlocality. We also discussed possible ways of obtaining the limited nonlocal behavior of quantum correlations within this cryptographic ontic model framework. As it turns out, by making the ontic-level signaling noisy, one cannot recover quantum correlations. This suggests that within the OTP framework, noisy encryption is necessary for quantum realisability. That is, the randomness at Alice’s and Bob’s end cannot be highly correlated. This is an added constraint imposed on the randomness by IC, in addition to the ‘uniform marginals’ constraint imposed by NS.
Apart from trivializing communication complexity, post-quantum nonlocal correlations are also known to exhibit some other exotic features. For instance, in the zero-error communication scenario where the aim is to transmit messages through this channel with no probability of confusion [53, 54, 55], there exist NS correlations that can yield positive zero-error capacity even for channels with no unassisted capacity [56]. An OTP model explanation might provide a better understanding of this phenomenon. Another esoteric problem where we expect this model to provide insights into is nonlocality distillation [57, 58, 59, 60]. We believe that the existing literature on cryptography over noisy channels can provide insights into nonlocality distillation when one thinks of nonlocal quantum correlations as OTP-boxes with noisy encryption. Finally, we note that this connection between nonlocality and cryptography is not only limited to OTP encryption, and therefore, qualitatively different encryption schemes may also add to our understanding of nonlocality.
Acknowledgements.
We are thankful to Nicolas Gisin, S Aravinda, and Jebarathinam Chellasamy for their suggestions on the earlier version of the manuscript. We gratefully acknowledge fruitful discussions with Mir Alimuddin, Ananya Chakraborty, Snehasish Roy Chowdhury, Guruprasad Kar, Amit Mukherjee, Sahil Gopalkrishna Naik, Ram Krishna Patra, and Samrat Sen. MB acknowledges funding from the National Mission in Interdisciplinary Cyber-Physical systems from the Department of Science and Technology through the I-HUB Quantum Technology Foundation (Grant No. I-HUB/PDF/2021-22/008).Appendix A IC and N-OTP model
(i) Quantum Correlations from noisy encryption: Isotropic correlations, expressed as an N-OTP box, has the form:
(10) |
where has uniform marginals, and consequently we have
(11) |
with . Consider the case where Alice and Bob are playing the RAC game, where Bob wishes to perfectly guess one of the two bits of the string given to Alice, with the assistance of 1 c-bit of communication. Moreover, let us use the correlation of Eq.(10) as an assistance to the 1 -bit communication line from Alice to Bob. Following the standard RAC protocol, Alice inputs into her end of the box. The output at Alice’s end is and she communicates
(12) |
over to Bob. Bob inputs into his end of the box if he want’s to know the bit of Alice’s string. Bob receives the output
(13) |
from the box and accordingly guesses
(14) |
It is clear that whenever and are perfectly correlated, Bob can perfectly guess either of the bits in Alice’s string, which implies a violation of the IC principle. Let us study the joint distribution of Bob’s output () and Alice’s first bit , when Bob wants to predict the first bit (corresponding to ). This joint distribution is given by,
(15) |
Here, we used the fact that when , then as discussed earlier. The independence of , and with each other allows us to write . Also note the implicit summation over used in removing the variable from the joint distribution in the third step. The Shannon entropy now takes the form:
(16) |
where, . It is immediate that . Therefore, the mutual information is given as:
Same is the case when , and therefore, the sum of the conditional entropies (), which is the subject if IC principle, takes the form . Now, IC is violated if . Thus, IC is violated if , corresponding to high correlation between and . Moreover, one can immediately show that . Thus, in terms of mutual information between the two variables, IC will be violated if .
(ii) Quantum correlations from noisy ontic-signalling: Here, the output correlations is given by
Unlike earlier, the keys here are perfectly correlated, but the hidden variable communication is noisy. Following the same protocol as before, one can see that Bob’s output is given as . Thus, it is immediate that whenever , the output is fully correlated with . That is . Now, when , the answer equals with probability and it will be wrong with probability . That is, . Thus, we have always violating IC principle, unless .
References
- [1] J. S. Bell; On the Einstein Podolsky Rosen paradox, Physics Physique Fizika 1, 195 (1964).
- [2] J. S. Bell; On the Problem of Hidden Variables in Quantum Mechanics, Rev. Mod. Phys. 38, 447 (1966).
- [3] N. D. Mermin; Hidden variables and the two theorems of John Bell, Rev. Mod. Phys. 65, 803 (1993).
- [4] N. Brunner, D. Cavalcanti, S. Pironio, V. Scarani, and S. Wehner; Bell nonlocality, Rev. Mod. Phys. 86, 419 (2014).
- [5] T. Maudlin; Quantum Non-Locality and Relativity: Metaphysical Intimations of Modern Physics; B. Blackwell (1994).
- [6] L. de Broglie; La nouvelle dynamique des quanta, In Electrons et´ Photons: Rapports et Discussions du Cinqui‘eme Conseil de Physique. Paris: Gauthier-Villars, pp. 105–132 (1928) [English translation: G. Bacciagaluppi & A. Valentini; arXiv:quant-ph/0609184]
- [7] D. Bohm; A Suggested Interpretation of the Quantum Theory in Terms of “Hidden” Variables. I , Phys. Rev. 85, 166 (1952)..
- [8] D. Bohm; A Suggested Interpretation of the Quantum Theory in Terms of “Hidden” Variables. II, Phys. Rev. 85, 180 (1952).
- [9] A. Valentini; Signal-locality, uncertainty, and the subquantum H-theorem. I & II, Phys. Lett. A 156, 5 (1991) & Phys. Lett. A 158, 1 (1991).
- [10] A. K. Ekert; Quantum cryptography based on Bell’s theorem, Phys. Rev. Lett. 67, 661 (1991).
- [11] J. Barrett, L. Hardy, and A. Kent; No Signaling and Quantum Key Distribution, Phys. Rev. Lett. 95, 010503 (2005).
- [12] A. Acín, N. Gisin, and L. Masanes; From Bell’s Theorem to Secure Quantum Key Distribution, Phys. Rev. Lett. 97, 120405 (2006).
- [13] A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani; Device-Independent Security of Quantum Cryptography against Collective Attacks, Phys. Rev. Lett. 98, 230501 (2007).
- [14] U. Vazirani and T. Vidick; Fully Device-Independent Quantum Key Distribution, Phys. Rev. Lett. 113, 140501 (2014).
- [15] J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt; Proposed Experiment to Test Local Hidden-Variable Theories Phys. Rev. Lett. 23, 880 (1969).
- [16] S. J. Freedman and J. F. Clauser; Experimental Test of Local Hidden-Variable Theories, Phys. Rev. Lett. 28, 938 (1972).
- [17] A. Aspect; Proposed experiment to test the nonseparability of quantum mechanics, Phys. Rev. D 14, 1944 (1976).
- [18] A. Aspect, P. Grangier, and G. Roger; Experimental Tests of Realistic Local Theories via Bell’s Theorem, Phys. Rev. Lett. 47, 460 (1981).
- [19] A. Aspect, P. Grangier, and G. Roger; Experimental Realization of Einstein-Podolsky-Rosen-Bohm Gedankenexperiment: A New Violation of Bell’s Inequalities, Phys. Rev. Lett. 49, 91 (1982).
- [20] A. Aspect, J. Dalibard, and G. Roger; Experimental Test of Bell’s Inequalities Using Time-Varying Analyzers, Phys. Rev. Lett. 49, 1804 (1982).
- [21] M. Żukowski, A. Zeilinger, M. A. Horne, and A. K. Ekert; “Event-ready-detectors” Bell experiment via entanglement swapping, Phys. Rev. Lett. 71, 4287 (1993).
- [22] J-W Pan, D. Bouwmeester, H. Weinfurter, and A. Zeilinger; Experimental Entanglement Swapping: Entangling Photons That Never Interacted, Phys. Rev. Lett. 80, 3891 (1998).
- [23] G. Weihs, T. Jennewein, C. Simon, H. Weinfurter, and A. Zeilinger; Violation of Bell’s Inequality under Strict Einstein Locality Conditions, Phys. Rev. Lett. 81, 5039 (1998).
- [24] D. Bouwmeester, J-W Pan, M. Daniell, H. Weinfurter, and A. Zeilinger; Observation of Three-Photon Greenberger-Horne-Zeilinger Entanglement, Phys. Rev. Lett. 82, 1345 (1999).
- [25] Bell test; WIKIPEDIA The Free Encyclopedia.
- [26] S. Popescu and D. Rohrlich; Quantum nonlocality as an axiom, Found. Phys. 24, 379 (1994).
- [27] B.S. Cirel’son; Quantum generalizations of Bell’s inequality, Lett. Math. Phys. 4, 93 (1980).
- [28] W. van Dam; Implausible consequences of superstrong nonlocality, Nat. Comput. 12, 9 (2013) [see also arXiv:quant-ph/0501159].
- [29] G. Brassard, H. Buhrman, N. Linden, A. A. Méthot, A. Tapp, and F. Unger; Limit on Nonlocality in Any World in Which Communication Complexity Is Not Trivial, Phys. Rev. Lett. 96, 250401 (2005).
- [30] H. Buhrman, R. Cleve, S. Massar, and R. de Wolf; Nonlocality and communication complexity, Rev. Mod. Phys. 82, 665 (2010).
- [31] M. Pawłowski, T. Paterek, D. Kaszlikowski, V. Scarani, A. Winter, and M. Żukowski; Information causality as a physical principle, Nature 461, 1101 (2009).
- [32] N. Miklin and M. Pawłowski; Information Causality without Concatenation, Phys. Rev. Lett. 126, 220403 (2021).
- [33] S. G. Naik, E. P. Lobo, S. Sen, R. K. Patra, M. Alimuddin, T. Guha, S. S. Bhattacharya, and M. Banik; Composition of Multipartite Quantum Systems: Perspective from Timelike Paradigm, Phys. Rev. Lett. 128, 140401 (2022).
- [34] R. K. Patra, S. G. Naik, E. P. Lobo, S. Sen, G. L. Sidhardh, M. Alimuddin, and M. Banik; Principle of Information Causality Rationalizes Quantum Composition, Phys. Rev. Lett. 130, 110202 (2023).
- [35] At the moment we recall that ‘explanation’ of a phenomenon is an attempt to fit it into a larger pattern by invoking general principles/ideas. The presence of the general principle (or law), and deductive arguments leading to the phenomenon, makes the phenomenon more ’natural’ and reasonable (please see, , Stanford Encyclopedia of Philosophy).
- [36] S. M. Bellovin; Frank Miller: Inventor of the One-Time Pad, Cryptologia 35, 203 (2011).
- [37] D. Kahn; The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet, Scribner, New York (1996).
- [38] C. E. Shannon; Communication Theory of Secrecy Systems, Bell Sys. Tech. Journal 28, 656 (1949).
- [39] S. Aravinda, and R. Srikanth; Extending quantum mechanics entails extending special relativity, J. Phys. A: Math. Theor. 49, 205302 (2016).
- [40] G. Kar, MD. R. Gazi, M. Banik, S. Das, A. Rai, and S. Kunkri; A complementary relation between classical bits and randomness in local part in simulating singlet state, J. Phys. A: Math. Theor. 44, 152002 (2011).
- [41] M. J.W. Hall; Relaxed Bell inequalities and Kochen-Specker theorems, Phys. Rev. A 84, 022102 (2011).
- [42] S. Aravinda and R. Srikanth; The Essence of Nonclassicality: Non-Vanishing Signal Deficit, Int. J. Theor. Phys. 54, 4591 (2015).
- [43] J. Bub; Quantum Correlations and the Measurement Problem, Int. J. Theor. Phys. 53, 3346 (2014).
- [44] J. Barrett, N. Linden, S. Massar, S. Pironio, S. Popescu, and D. Roberts; Nonlocal correlations as an information-theoretic resource, Phys. Rev. A 71, 022101 (2005).
- [45] N. S. Jones, and L. Masanes; Interconversion of nonlocal correlations, Phys. Rev. A 72, 052312 (2005).
- [46] J. Barrett and S. Pironio; Popescu-Rohrlich Correlations as a Unit of Nonlocality, Phys. Rev. Lett. 95, 140401 (2005).
- [47] R. Cleve and H. Buhrman; Substituting quantum entanglement for communication, Phys. Rev. A 56, 1201 (1997).
- [48] R. Cleve, W. van Dam, M. Nielsen, and A. Tapp; Quantum Entanglement and the Communication Complexity of the Inner Product Function, In: Williams, C.P. (eds) Quantum Computing and Quantum Communications. Lec. Notes in Comp. Sc. 1509, 61 (1998).
- [49] C. Fontaine and F. A. Galand; A Survey of Homomorphic Encryption for Nonspecialists, EURASIP J. on Info. Security 2007, 013801 (2007).
- [50] S. Wiesner; Conjugate coding, SIGACT News 15, 78 (1983).
- [51] A. Ambainis, A. Nayak, A. Ta-Shma, and U. Vazirani; Dense Quantum Coding and a Lower Bound for 1-way Quantum Automata, arXiv:quant-ph/9804043 (1999).
- [52] A. Ambainis, A. Nayak, A. Ta-Shma, and U. Vazirani; Quantum dense coding and quantum finite automata, J. ACM 49, 496 (2002)
- [53] C. E. Shannon; The zero error capacity of a noisy channel, IRE Trans. Inform. Theory 2, 8 (1956).
- [54] T. S. Cubitt, D. Leung, W. Matthews, and A. Winter; Improving Zero-Error Classical Communication with Entanglement, Phys. Rev. Lett. 104, 230503 (2010).
- [55] M. Alimuddin, A. Chakraborty, G. L. Sidhardh, R. K. Patra, S. Sen, S. Roy Chowdhury, S. G. Naik, and M. Banik; Advantage of Hardy’s Nonlocal Correlation in Reverse Zero-Error Channel Coding, Phys. Rev. A 108, 052430 (2023).
- [56] T. S. Cubitt, D. Leung, W. Matthews, and A. Winter; Zero-error channel capacity and simulation assisted by non-local correlations, IEEE Trans. Info. Theory 57, 5509 (2011).
- [57] M. Forster, S. Winkler, and S. Wolf; Distilling Nonlocality, Phys. Rev. Lett. 102, 120401 (2009).
- [58] G. Eftaxias, M. Weilenmann, and R. Colbeck; Advantages of Multicopy Nonlocality Distillation and Its Application to Minimizing Communication Complexity, Phys. Rev. Lett. 130, 100201 (2023).
- [59] S. G. Naik, G. L. Sidhardh, S. Sen, A. Roy, A. Rai, and M. Banik; Distilling Nonlocality in Quantum Correlations, Phys. Rev. Lett. 130, 220201 (2023).
- [60] S. B. Ghosh, S. R. Chowdhury, G. Kar, A. Roy, T. Guha, and M. Banik; Quantum Nonlocality: Multicopy Resource Interconvertibility and Their Asymptotic Inequivalence, Phys. Rev. Lett. 132, 250205 (2024).