Entanglement certification by measuring nonlocality
- URL: http://arxiv.org/abs/2507.18066v1
- Date: Thu, 24 Jul 2025 03:40:25 GMT
- Title: Entanglement certification by measuring nonlocality
- Authors: Xuan Du Trinh, Zhengyu Wu, Junlin Bai, Huan-Hsin Tseng, Nengkun Yu, Aruna Balasubramanian,
- Abstract summary: This paper presents a practical approach to entanglement verification based on Clauser-Horne-Shimony-Holt inequality violation.<n>We develop statistical methods that optimize resource usage while maintaining verification reliability.
- Score: 13.128419799503641
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Reliable entanglement manipulation is key to quantum networks. This paper presents a practical approach to entanglement verification based on Clauser-Horne-Shimony-Holt (CHSH) inequality violation. We establish mathematical bounds relating the CHSH measure to entanglement fidelity and develop statistical methods that optimize resource usage while maintaining verification reliability. Our main contributions include tight bounds on entanglement fidelity using the CHSH measure, a statistical framework for estimating sample complexity, and practical verification protocols with quantifiable confidence. Using NetSquid simulations, we comprehensively evaluated our protocols under various network conditions, demonstrating the key trade-offs between verification accuracy, resource efficiency, and operational parameters. Our results provide concrete guidance for implementing efficient entanglement verification in resource-constrained quantum networks, balancing security requirements with practical limitations.
Related papers
- Verification Cost Asymmetry in Cognitive Warfare: A Complexity-Theoretic Framework [0.0]
We introduce the Verification Cost Asymmetry coefficient, formalizing it as the ratio of expected verification work between populations under identical claim distributions.<n>We construct dissemination protocols that reduce verification for trusted audiences to constant human effort while imposing superlinear costs on adversarial populations lacking cryptographic infrastructure.<n>The results establish complexity-theoretic foundations for engineering democratic advantage in cognitive warfare, with immediate applications to content authentication, platform governance, and information operations doctrine.
arXiv Detail & Related papers (2025-07-28T18:23:44Z) - Evaluation of Distimation's Real-world Performance on a Superconducting Quantum Computer [0.3958317527488534]
Distimation is a novel distillation-based protocol designed for efficient Bell-diagonal state estimation.<n>Our results establish Distimation as a viable method for scalable, real-time entanglement monitoring in practical quantum networks.
arXiv Detail & Related papers (2025-04-25T07:50:17Z) - Rectifying Conformity Scores for Better Conditional Coverage [75.73184036344908]
We present a new method for generating confidence sets within the split conformal prediction framework.<n>Our method performs a trainable transformation of any given conformity score to improve conditional coverage while ensuring exact marginal coverage.
arXiv Detail & Related papers (2025-02-22T19:54:14Z) - Risk-Averse Certification of Bayesian Neural Networks [70.44969603471903]
We propose a Risk-Averse Certification framework for Bayesian neural networks called RAC-BNN.<n>Our method leverages sampling and optimisation to compute a sound approximation of the output set of a BNN.<n>We validate RAC-BNN on a range of regression and classification benchmarks and compare its performance with a state-of-the-art method.
arXiv Detail & Related papers (2024-11-29T14:22:51Z) - Deterministic entanglement swapping of W states [0.3277163122167434]
We propose a deterministic entanglement swapping protocol for generating a shared three-qubit W state between two remote parties.
We present a detailed quantum circuit design, implemented using the Qiskit simulator, that outlines the preparation of W states and the execution of joint measurements.
We demonstrate the effectiveness of our proposed protocol, offering a practical solution for high-fidelity W state generation in real-world quantum communication scenarios.
arXiv Detail & Related papers (2024-07-04T03:27:12Z) - Conformal Prediction for Federated Uncertainty Quantification Under
Label Shift [57.54977668978613]
Federated Learning (FL) is a machine learning framework where many clients collaboratively train models.
We develop a new conformal prediction method based on quantile regression and take into account privacy constraints.
arXiv Detail & Related papers (2023-06-08T11:54:58Z) - Value Functions are Control Barrier Functions: Verification of Safe
Policies using Control Theory [46.85103495283037]
We propose a new approach to apply verification methods from control theory to learned value functions.
We formalize original theorems that establish links between value functions and control barrier functions.
Our work marks a significant step towards a formal framework for the general, scalable, and verifiable design of RL-based control systems.
arXiv Detail & Related papers (2023-06-06T21:41:31Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Experimentally Certified Transmission of a Quantum Message through an
Untrusted and Lossy Quantum Channel via Bell's Theorem [1.0470286407954037]
In adversarial scenarios, a certification method can be vulnerable to attacks if too much trust is placed on the underlying system.
Here, we propose a protocol in a device independent framework, which allows for the certification of practical quantum transmission links.
In view of the use of the certified transmitted states for follow-up applications, our protocol moves beyond certification of the channel to allow us to estimate the quality of the transmitted quantum message itself.
arXiv Detail & Related papers (2023-04-19T12:22:49Z) - Quantization-aware Interval Bound Propagation for Training Certifiably
Robust Quantized Neural Networks [58.195261590442406]
We study the problem of training and certifying adversarially robust quantized neural networks (QNNs)
Recent work has shown that floating-point neural networks that have been verified to be robust can become vulnerable to adversarial attacks after quantization.
We present quantization-aware interval bound propagation (QA-IBP), a novel method for training robust QNNs.
arXiv Detail & Related papers (2022-11-29T13:32:38Z) - GenDICE: Generalized Offline Estimation of Stationary Values [108.17309783125398]
We show that effective estimation can still be achieved in important applications.
Our approach is based on estimating a ratio that corrects for the discrepancy between the stationary and empirical distributions.
The resulting algorithm, GenDICE, is straightforward and effective.
arXiv Detail & Related papers (2020-02-21T00:27:52Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.