Clauser–Horne–Shimony–Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query

In device-independent (DI) paradigm, the trustful assumptions over the devices are removed and CHSH test is performed to check the functionality of the devices toward certifying the security of the protocol. The existing DI protocols consider infinite number of samples from theoretical point of view, though this is not practically implementable. For finite sample analysis of the existing DI protocols, we may also consider strategies for checking device independence other than the CHSH test. In this direction, here we present a comparative analysis between CHSH and three-party Pseudo-telepathy game for the quantum private query protocol in DI paradigm that appeared in Maitra et al. (Phys Rev A 95:042344, 2017) very recently.

[1]  Ping Zhou,et al.  Probabilistic multiparty-controlled teleportation of an arbitrary m-qubit state with a pure entangled quantum channel against collective noise , 2012 .

[2]  Andrew Chi-Chih Yao,et al.  Self testing quantum apparatus , 2004, Quantum Inf. Comput..

[3]  G. Long,et al.  Parallel Quantum Computing in a Single Ensemble Quantum Computer , 2003, quant-ph/0307055.

[4]  G. Paul,et al.  Device Independent Quantum Private Query , 2017, 1701.01087.

[5]  Fu-Guo Deng,et al.  Universal quantum gates for hybrid systems assisted by quantum dots inside double-sided optical microcavities , 2013, 1302.0046.

[6]  Laura Mancinska,et al.  Maximally Entangled State in Pseudo-Telepathy Games , 2015, Computing with New Resources.

[7]  B. S. Cirel'son Quantum generalizations of Bell's inequality , 1980 .

[8]  G. Brassard,et al.  Quantum Pseudo-Telepathy , 2004, quant-ph/0407221.

[9]  Ping Zhou,et al.  Joint remote control of an arbitrary single-qubit state by using a multiparticle entangled state as the quantum channel , 2018, Quantum Inf. Process..

[10]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[11]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[12]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[13]  Gilles Brassard,et al.  Multi-party Pseudo-Telepathy , 2003, WADS.

[14]  Peng Xu,et al.  Flexible protocol for quantum private query based on B92 protocol , 2014, Quantum Inf. Process..

[15]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[16]  Charles H. Bennett,et al.  Purification of noisy entanglement and faithful teleportation via noisy channels. , 1995, Physical review letters.

[17]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[18]  Ping Zhou,et al.  Joint remote preparation of arbitrary two- and three-photon state with linear-optical elements , 2016, Quantum Inf. Process..

[19]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[20]  Stefano Pironio,et al.  Device-independent bit commitment based on the CHSH inequality , 2015, 1511.06283.

[21]  N. Gisin,et al.  Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. , 2010, Physical review letters.

[22]  Fu-Guo Deng,et al.  Practical hyperentanglement concentration for two-photon four-qubit systems with linear optics , 2013, 1306.0050.

[23]  Ping Zhou,et al.  Multiparty-controlled teleportation of an arbitrary GHZ-class state by using a d-dimensional (N+2)-particle nonmaximally entangled state as the quantum channel , 2011 .

[24]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[25]  Guilu Long,et al.  Experimental realization of nonadiabatic holonomic quantum computation. , 2013, Physical review letters.