Experimenter's freedom in Bell's theorem and quantum cryptography (7 pages)

Bell's theorem states that no local realistic explanation of quantum mechanical predictions is possible, in which the experimenter has a freedom to choose between different measurement settings. Within a local realistic picture the violation of Bell's inequalities can only be understood if this freedom is denied. We determine the minimal degree to which the experimenter's freedom has to be abandoned, if one wants to keep such a picture and be in agreement with the experiment. Furthermore, the freedom in choosing experimental arrangements may be considered as a resource, since its lacking can be used by an eavesdropper to harm the security of quantum communication. We analyze the security of quantum key distribution as a function of the (partial) knowledge the eavesdropper has about the future choices of measurement settings which are made by the authorized parties (e.g., on the basis of some quasi-random generator). We show that the equivalence between the violation of Bell's inequality and the efficient extraction of a secure key -which exists for the case of complete freedom (no setting knowledge) - is lost unless one adapts the bound of the inequality according to this lack of freedom.

[1]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[2]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[3]  N Gisin,et al.  Quantum communication between N partners and Bell's inequalities. , 2001, Physical review letters.

[4]  M. Żukowski,et al.  Bell's theorem for general N-qubit states. , 2001, Physical review letters.

[5]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[6]  W.-Y. Hwang Bell's inequality, random sequence, and quantum key distribution (3 pages) , 2005 .

[7]  Alain Aspect,et al.  Speakable and Unspeakable in Quantum Mechanics: Free variables and local causality , 2004 .

[8]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[9]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[10]  Kiel T. Williams,et al.  Extreme quantum entanglement in a superposition of macroscopically distinct states. , 1990, Physical review letters.

[11]  J. Bell On the Einstein-Podolsky-Rosen paradox , 1964 .

[12]  A. Zeilinger,et al.  Comment on “Exclusion of time in the theorem of Bell” by K. Hess and W. Philipp , 2002 .

[13]  R D Gill,et al.  No time loophole in Bell's theorem: The Hess–Philipp model is nonlocal , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[14]  Nicolas Gisin,et al.  BELL'S INEQUALITIES DETECT EFFICIENT ENTANGLEMENT , 2003 .