### pptx - Max-Planck

```Max Planck Institute of Quantum Optics (MPQ)
Garching / Munich, Germany
Closing loopholes in Bell tests of local realism
Johannes Kofler
Workshop “Quantum Physics and the Nature of Reality”
22 November 2013
Overview
•
•
•
Assumptions in Bell’s theorem

Realism

Locality

Freedom of choice
Closing loopholes

Locality

Freedom of choice

Fair sampling

Coincidence time
Conclusion and outlook
Acknowledgements
Sae Woo Nam
Marissa Giustina Bernhard Wittmann
Rupert Ursin
Sven Ramelow
Anton Zeilinger
History
Quantum mechanics and hidden variables
1927
Kopenhagen interpretation
(Bohr, Heisenberg, etc.)
1932
Von Neumann’s (wrong) proof of nonpossibility of hidden variables
1935
1952
De Broglie-Bohm (nonlocal) hidden
variable theory
1964
Bell’s theorem on local hidden variables
1972
First successful Bell test
(Freedman & Clauser)
Bohr and Einstein, 1925
Local realism
Classical world view:
• Realism:
Physical properties are (probabilistically) defined prior to and
independent of measurement
• Locality:
No physical influence can propagate faster than the speed of light
External world
Passive observers
Bell’s assumptions
Assumptions
Bell’s
1
Realism: Hidden variables determine global prob. distrib.: p(Aa1b1, Aa1b2, Aa2b1,…|λ)
2
Locality: (OI)Outcome independence:
(SI) Setting independence:
 factorizability:
p(A|a,b,B,λ) = p(A|a,b,λ)
p(A|a,b,λ) = p(A|a,λ)
& vice versa for B
& vice versa for B
p(A,B|a,b,λ) = p(A|a,λ) p(B|b,λ)
3
Freedom of choice:
1
(a,b|λ) = (a,b)  (λ|a,b) = (λ)
J. F. Clauser and A. Shimony, Rep. Prog. Phys. 41, 1881 (1978)
2 J. S. Bell, Physics 1, 195 (1964)
3
J. S. Bell, Speakable and Unspeakable in
Quantum Mechanics, p. 243 (2004)
Bell’s
Bell’s Assumptions
theorem
Realism + Locality + Freedom of choice + X  Bell’s inequality
Bell’s original derivation1 only implicitly assumed freedom of choice:
explicitly: A(a,b,B,λ) B(a,b,A,λ)
locality
freedom of choice
implicitly: (λ|a,b) A(a,λ) B(b,λ) – (λ|a,c) A(a,λ) B(c,λ)
Remarks:
1
2
original Bell paper1:
X = “Perfect anti-correlation”
CHSH2:
X = “Fair sampling”
J. S. Bell, Physics 1, 195 (1964)
J. F. Clauser, M. A. Horne, A. Shimony, R. A. Holt, PRL 23, 880 (1969)
Loopholes
Loopholes:
Why important?
maintain local realism
despite exp. Bell violation
– quantum foundations
– security of entanglement-based quantum cryptography
Three main loopholes:
• Locality loophole
hidden communication between the parties
closed for photons (19821,19982)
• Freedom-of-choice loophole
settings are correlated with hidden variables
closed for photons (20103)
• Fair-sampling (detection) loophole
measured subensemble is not representative
closed for atoms (20014), superconducting qubits
(20095) and for photons (20136)
1
A. Aspect et al., PRL 49, 1804 (1982)
2 G. Weihs et al., PRL 81, 5039 (1998)
3 T. Scheidl et al., PNAS 107, 10908 (2010)
4
E
M. A. Rowe et al., Nature 409, 791 (2001)
M. Ansmann et al., Nature 461, 504 (2009)
6 M. Giustina et al., Nature 497, 227 (2013)
5
Locality & freedom of choice
Tenerife
b,B
La Palma
E,A
a
E
La Palma
Locality:
Tenerife
A is space-like sep. from b and B
B is space-like sep. from a and A
Freedom of choice:
p(A,B|a,b,) = p(A|a,) p(B|b,)
a and b are random
a and b are space-like sep. from E
p(a,b|) = p(a,b)
T. Scheidl, R. Ursin, J. K., T. Herbst, L. Ratschbacher, X. Ma, S. Ramelow, T. Jennewein, A. Zeilinger,
PNAS 107, 10908 (2010)
Fair-sampling loophole
Fair sampling:
Local detection efficiency depends only on hidden variable:
A = A(), B = B()  observed outcomes faithfully
reproduce the statistics of all emitted particles
Unfair sampling:
Local detection efficiency is setting-dependent
A = A(a,), B = B(b,)  fair-sampling (detection) loophole1
• Local realistic models2,3
4
9
:
4
9
:
1
9
:
 
 
A ( a ,  )  sign( a   )
 
 
 A (a ,  )  | a   |
 
 A (a ,  )  1
 
 A (a ,  )  0
 
B (b ,  )
 
 B (b ,  )
 
 B (b ,  )
 
 B (b ,  )
 
 sign(  b   )
1
 
 | b  |
 
E (a , b ) 


S
d
2
2
A B
 
A B  a b
 0
Reproduces the quantum predictions of the singlet state with detection efficiency 2/3
• Detection efficiency is not optional in security-related tasks (device-independent
quantum cryptography): faked Bell violations4
1
P. M. Pearle, PRD 2, 1418 (1970)
2 F. Selleri and A. Zeilinger, Found. Phys. 18, 1141 (1988)
3 N. Gisin and B. Gisin, Phys. Lett. A 260, 323 (1999)
4 I.
Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, V. Scarani,
V. Makarov, C. Kurtsiefer, PRL 107, 170404 (2011)
CHSH vs. CH/Eberhard inequality
CHSH inequality1
 two detectors per side
 correlation functions
E ( a1 , b1 )  E ( a1 , b 2 )  E ( a 2 , b1 )  E ( a1 , b1 )  2
 fair-sampling assumption used in derivation
 requires indep. verific. of tot > 82.8 %2
 maximally entangled states optimal
CH3 (Eberhard3) inequality
 only one detector per side
 probabilities (counts)
P ( a 1 , b1 )  P ( a 1 , b 2 )  P ( a 2 , b1 )
 no fair-sampling assumption in the derivation
 P ( a 2 , b 2 )  P ( a 1 )  P ( b1 )  0
 no requirement to measure tot
 impossible to violate unless tot > 66.7 %
 non-max. entangled states optimal
1
J. F. Clauser, M. A. Horne, A. Shimony, R. A. Holt, PRL 23, 880 (1969)
2 A. Garg and N. D. Mermin, PRD 35, 3831 (1987)
3
4
J. F. Clauser and M. A. Horne, PRD 10, 526 (1974)
P. H. Eberhard, PRA 47, 747 (1993)
Transition-edge sensors
Working principle
 Superconductor (200 nm thick tungsten film
at 100 mK) at transition edge
 Steep dependence of resistivity on
temperature
 Measurable temperature change by single
absorbed photon
Characteristics
 High efficiency > 95 %2
 Low noise < 10 Hz2
 Photon-number resolving
1
2
Picture from: Topics in Applied Physics 99, 63-150 (2005)
A. E. Lita, A. J. Miller, S. W. Nam, Opt. Express 16, 3032 (2008)
Superconducting
transition-edge sensors1
Setup
• Sagnac-type entangled
pair source
• Non-max. entangled
states

r

 HV
1
1 r
 r VH

2
• Fiber-coupling efficiency
> 90%
• Filters: backgroundphoton elimination > 99%
M. Giustina, A. Mech, S. Ramelow, B. Wittmann, J. K., J. Beyer, A. Lita, B. Calkins, T. Gerrits, S. W. Nam, R. Ursin,
A. Zeilinger, Nature 497, 227 (2013)
Experimental results
 P ( a1 , b1 )  P ( a1 , b 2 )  P ( a 2 , b1 )  P ( a 2 , b 2 )  P ( a1 )  P ( b1 )
CH :
Eberhard
:
 0
J   C ( a 1 , b1 )  C ( a 1 , b 2 )  C ( a 2 , b 1 )  C ( a 2 , b 2 )  S A ( a 1 )  S B ( b 1 )  0
• Violation of Eberhard’s inequality1
• 300 seconds per setting combination
• Collection efficiency tot  75%
• No background correction etc.
Photon: only system for which all
main loopholes are now closed
(not yet simultaneously)
Exp. data1
Model2
Deviation
1
C(a1,b1)
C(a1,b2)
C(a2,b1)
C(a2,b2)
SA(a1)
SB(b1)
J
1 069 306
1 068 886
–0,04 %
1 152 595
1 152 743
0,01 %
1 191 146
1 192 489
0,11 %
69 749
68 694
–1,51 %
1 522 865
1 538 766
1,04 %
1 693 718
1 686 467
–0,43 %
–126 715
M. Giustina, A. Mech, S. Ramelow, B. Wittmann, J. K., J. Beyer, A. Lita, B. Calkins, T. Gerrits, S. W. Nam, R. Ursin,
A. Zeilinger, Nature 497, 227 (2013)
2 J. K., S. Ramelow, M. Giustina, A. Zeilinger, arXiv:1307.6475 [quant-ph] (2013)
The coincidence-time loophole
Fair coincidences:
Local detection time depends only on hidden variable:
TA = TA(), TB = TB()  identified pairs faithfully
reproduce the statistics of all detected pairs
Unfair coincidences:
Detection time is setting-dependent
TA = TA(a,), TB = TB(b,)  coincidence-time loophole1
Local realistic model:
Standard “moving windows” technique:
coincidence if |TA(a,) –TB(b,)|  ½
a2b2 coincidences are missed,
CH/Eberhard violated
 C ( a 1 , b1 )  C ( a 1 , b 2 )  C ( a 2 , b1 )
 C ( a 2 , b 2 )  S A ( a 1 )  S B ( b1 )  0
1
J.-Å. Larsson and R. Gill, EPL 67, 707 (2004)
Closing the coincidence-time loophole
a) Moving windows
coincidence-time loophole open
b) Predefined fixed local time slots
coincidence-time loophole closed
c) Triple window for a2b2 coinc.
coincidence-time loophole closed
J.-Å. Larsson, M. Giustina, J. K., B. Wittmann, R. Ursin, S. Ramelow, arXiv:1309.0712 (2013)
Application to experimental data
Eberhard
inequ.
J   C ( a 1 , b1 )  C ( a 1 , b 2 )  C ( a 2 , b1 )  C ( a 2 , b 2 )  S A ( a 1 )  S B ( b1 )  0
Triple-window method
coinc.-time loophole closed
Fixed time slots
coinc.-time loophole closed
Moving windows
coinc.-time loophole open
 simultaneous closure of fair-sampling (detection) and coincidence-time loophole
J.-Å. Larsson, M. Giustina, J. K., B. Wittmann, R. Ursin, and S. Ramelow, arXiv:1309.0712 (2013)
Conclusion and outlook
Loophole:
How to close:
Locality
space-like separate A & b,B and B & a,A
a,b random
Freedom of
choice
space-like separate E & a,b
a,b random
Fair sampling
(detection)
use CHSH and also show  > 82.8%
or use CH/Eberhard
 C ( a 1 , b1 )  C ( a 1 , b 2 )  C ( a 2 , b1 )
 C ( a 2 , b 2 )  S A ( a 1 )  S B ( b1 )  0
Coincidencetime
use fixed time slots
or window-sum method
• Photons: each of the loopholes has been closed,
albeit in separate experiments
• Loophole-free experiment still missing but in reach
Loopholes hard/impossible to close
Futher loopholes:
Superdeterminism:
Common cause for E and a,b
Wait-at-the-source:
E is further in the past; pairs
wait before they start travelling
Wait-at-the setting:
a,b futher in the past; photons
used for the setting choice wait
before they start traveling
Wait-at-the-detector: A,B are farther in the future,
photons wait before detection,
“collapse locality loophole”
Actions into the past
…
E
```