Cargando…
Bright-light detector control emulates the local bounds of Bell-type inequalities
It is well-known that no local model—in theory—can simulate the outcome statistics of a Bell-type experiment as long as the detection efficiency is higher than a threshold value. For the Clauser–Horne–Shimony–Holt (CHSH) Bell inequality this theoretical threshold value is [Formula: see text] . On th...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7413270/ https://www.ncbi.nlm.nih.gov/pubmed/32764651 http://dx.doi.org/10.1038/s41598-020-70045-7 |
Sumario: | It is well-known that no local model—in theory—can simulate the outcome statistics of a Bell-type experiment as long as the detection efficiency is higher than a threshold value. For the Clauser–Horne–Shimony–Holt (CHSH) Bell inequality this theoretical threshold value is [Formula: see text] . On the other hand, Phys. Rev. Lett. 107, 170404 (2011) outlined an explicit practical model that can fake the CHSH inequality for a detection efficiency of up to 0.5. In this work, we close this gap. More specifically, we propose a method to emulate a Bell inequality at the threshold detection efficiency using existing optical detector control techniques. For a Clauser–Horne–Shimony–Holt inequality, it emulates the CHSH violation predicted by quantum mechanics up to [Formula: see text] . For the Garg–Mermin inequality—re-calibrated by incorporating non-detection events—our method emulates its exact local bound at any efficiency above the threshold. This confirms that attacks on secure quantum communication protocols based on Bell violation is a real threat if the detection efficiency loophole is not closed. |
---|