Next Article in Journal
Retinex-Based Fast Algorithm for Low-Light Image Enhancement
Previous Article in Journal
A Nonlinear Maximum Correntropy Information Filter for High-Dimensional Neural Decoding
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantum Advantages of Communication Complexity from Bell Nonlocality

1
CAS Key Laboratory of Quantum Information, School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China
2
CAS Center For Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
3
School of the Gifted Young, University of Science and Technology of China, Hefei 230026, China
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(6), 744; https://doi.org/10.3390/e23060744
Submission received: 17 April 2021 / Revised: 1 June 2021 / Accepted: 9 June 2021 / Published: 13 June 2021

Abstract

:
Communication games are crucial tools for investigating the limitations of physical theories. The communication complexity (CC) problem is a typical example, for which several distributed parties attempt to jointly calculate a given function with limited classical communications. In this work, we present a method to construct CC problems from Bell tests in a graph-theoretic way. Starting from an experimental compatibility graph and the corresponding Bell test function, a target function that encodes the information of each edge can be constructed; then, using this target function, we can construct a CC function, and by pre-sharing entangled states, its success probability exceeds that of the arbitrary classical strategy. The non-signaling protocol based on the Popescu–Rohrlich box is also discussed, and the success probability in this case reaches one.

1. Introduction

Bell nonlocality [1,2,3,4] is one of the most distinctive features that distinguish quantum mechanics from classical mechanics. It is an experimentally verified phenomenon and now serves as a crucial resource for many quantum information tasks, such as quantum computation [5], quantum key distribution (QKD) [6], quantum random number generation [7], and the communication complexity (CC) problem [8]. Among these tasks, CC problems for which distributed parties jointly calculate a function with limited communications are of great importance for investigating the limitations of different physical theories [4,8]. For instance, the set of calculable functions and the success probabilities for calculating a given function may be different for local hidden variable (LHV) theory [2], quantum theory, and non-signaling theory.
CC problems, originally introduced by Yao [9], concern the following question: what is the minimal amount of communication necessary for two or more parties to jointly calculate a given multivariate function f ( x 1 , , x n ) where the k-th party only knows his own input x k but no information about the inputs of other parties initially? It has been shown from different perspectives that entanglement and Bell nonlocality are closely related to the quantum advantage of the CC problem; see Refs. [8,10,11,12,13,14,15]. Violation of Bell inequalities often leads to quantum advantages of CC problems [8,10,11,12,13] and it is also argued that the quantum advantage of CC problem implies violation of Bell inequalities [14,15]. However, many of the results above are existence proof. In practice, to utilize Bell nonlocality to obtain quantum advantages of a real CC problem, one needs to consider how to explicitly translate the Bell test into a CC problem. In this work, we systematically explore the translation of a Bell test into CC problem via the graph-theoretic method.
We are mainly interested in the CC problems for which only limited classical communications are allowed and the goal for each party is to calculate the function with as high success probability as possible. By introducing the concept of the experimental compatibility graph and its corresponding Bell test function, we explore the relationship between the Bell nonlocality and quantum advantage of CC problems. We show that, from an arbitrary experimental compatibility graph G e , we can construct a corresponding CC problem F G e for which the quantum protocol exhibits a success probability that exceeds the that of all classical protocols. We also investigate the possibility of using a non-signaling box to solve CC problems, and we show that it has an advantage over all quantum protocols.
The paper is organized as follows: in Section 2, we introduce several graph-theoretic concepts related to Bell nonlocality, including the experimental compatibility graph, compatibility graph, and Bell test functions; in Section 3, we provide the basics of CC problems and define the quantum advantages of the protocol; in Section 4, we present a class of functions based on an arbitrary given experimental graph G e for which quantum protocols exhibit advantages; finally, in the last section, we make some concluding remarks.

2. Bell Inequalities from Compatibility Graphs

Let us now introduce a general framework for n-party Bell inequalities based on a set of n-point correlation functions E ( x i 1 , x i 2 , , x i n ) = x i 1 x i 2 x i n . Many pertinent classes of Bell inequalities are of this correlator form; see, e.g., Refs. [4,16]. To start with, let us first introduce a useful mathematical tool, compatibility graphs. For a set of measurements M = { M 1 , , M n } , we can assign a corresponding graph G M called the measurement compatibility graph [17], whose vertices are labeled by measurements, and there is an edge between two vertices if the corresponding measurements are compatible; i.e., they can be measured simultaneously. We denote the vertex set of the graph G as V ( G ) and the edge set as E ( G ) , and an edge is a pair i j : = ( M i , M j ) V ( G ) × V ( G ) . Similarly, we can introduce the experimental compatibility graph and hypergraph  G M e [17], in which the vertices are labeled with the measurements involved in the experiment, and an edge represents two or more jointly measured measurements in the experiment. For two-party case, each edge consists of two measurements, and G M e is a subgraph of G M , while for the n-party ( n > 2 ) case, each edge consists of n vertices; thus, G M e is a hypergraph. See Figure 1b,c for an illustration of the compatibility graph and two-party experimental compatibility graph.
In a typical n-party Bell scenario, the experimenters share an n-partite system. According to an experimental compatibility graph G e , they can choose a set of measurements x i 1 , x i 2 , , x i n for joint measurements, where x i k is the measurement chosen by the k-th party. After many runs of experiments, they obtain a set of n-point correlation functions { E ( x i 1 , x i 2 , , x i n ) | i 1 i 2 i n E ( G e ) } . To determine whether the obtained measurement statistics are local, viz., obey the LHV theory or not, a function must be calculated,
B G e = i 1 i 2 i n E ( G e ) γ i 1 i 2 i n E ( x i 1 , x i 2 , , x i n ) + i 1 i 2 i n 1 E ( G e ) γ i 1 i 2 i n 1 E ( x i 1 , x i 2 , , x i n 1 ) + + x i V ( G ) γ x i E ( x i ) ,
which we refer to as the Bell test function. In this work, we mainly focus on the homogenous case; that is, for the n-party Bell test, the Bell test function only contains n-point correlation functions. It is also convenient for our purpose to assume that γ i 1 i 2 i n = ± 1 . In this case, different colors of edges of G e represent different coefficients; if γ i 1 i 2 i n = + 1 , the edge is drawn as a black solid line and deemed a positive edge, and if γ i 1 i 2 i n = 1 , the edge is drawn as a red dashed line and deemed a negative edge, as depicted in Figure 1.
Note that for an n-party Bell experiment, G e is usually an n-partite graph, as the measurements of each party are usually chosen as incompatible measurements. In an LHV world, the value of the test function lies in the range R L H V = [ B C 1 , B C 2 ] ; e.g., for the Clauser–Horne–Shimony–Holt (CHSH) type of Bell test function B C H S H , the range is R L H V = [ 2 , 2 ] [16]. However, for quantum theory, the value may lie outside the LHV range R L H V ; this is called the quantum violation of Bell inequality, which means that quantum theory is not consistent with the LHV assumption. Similar to LHV theory, there also exists a quantum range R Q = [ B Q 1 , B Q 2 ] of the value of the Bell test function; e.g., for CHSH type of Bell test function, it is R Q = [ 2 2 , 2 2 ] , and this kind of quantum bound is known as Tsirelson bound. Is it possible for a Bell test function to violate the quantum range? The answer is yes; there are many different kinds of approaches to understand quantum theory from outside; e.g., in non-signaling theory [18], the Bell test function may reach its functional minimal and maximal values. To summarize, we have the following Bell inequalities for a given experiment compatibility graph:
B G e L H V R L H V Q R Q N S R N S .
Note that for a given experimental compatibility graph, the Bell test function is, in general, not unique.
Another crucial issue regards the kind of experimental compatibility graph that can be used to test Bell nonlocality. A necessary condition for this is the following [17,19]: the compatibility graph corresponding to G e is non-chordal. Chordal graphs are those that do not have any induced cycle with a size of more than three. From Vorob’yev theorem [20,21], if the compatibility graph G corresponding to G e is chordal, then there always exists a global joint probability distribution that can reproduce all marginal probability distributions that we obtained from the experiment. A result of Fine [22] further suggests that the existence of this kind of global joint probability distribution is equivalent to the existence of an LHV model for all involved measurements. Thus, for the chordal graph, the measurement statistics are always reproducible by the LHV model. In a recent work [23], it was claimed that the above condition is also a sufficient condition.
Here, we present two examples for convenience of our later discussions. We recommend readers to read Refs. [17,19,23,24,25] for more examples.

2.1. Example 1

The first example is 2 m -cycle Bell inequality. The experimental compatibility graph is a 2 m -cycle, for which A 1 , A 3 , , A 2 m 1 are observables chosen by Alice and B 2 , B 4 , , B 2 m are observables chosen by Bob; the i-th vertex connects with the ( i + 1 ) -th vertex. The Bell test function is thus
B G cycle e = i = 1 , 3 , , 2 m 1 γ i E ( A i , B i + 1 ) + i = 2 , 4 , , 2 m γ i E ( A i + 1 , B i )
note that, here, γ i = ± 1 , and the number of γ i = 1 must be odd to ensure that it can test Bell nonlocality. As proved in [26,27], Bell inequality is
| B G cycle e | L H V 2 m 2 Q 2 m cos π 2 m N S 2 m .
When m = 2 , the experimental compatibility graph is a 4-cycle graph, as depicted in Figure 1a; the corresponding Bell inequality is the CHSH inequality.
It is worth mentioning that, although we can construct a Bell test from the arbitrary non-chordal graph, the LHV bound (which corresponds to independent number calculation of a graph) and non-signaling boundary can easily be obtained, but the maximum quantum violation (which corresponds to the Lovász number calculation of a graph [24,28]) is usually very difficult to calculate. The example corresponding to non-cycle experimental compatibility graph can also be constructed.

2.2. Example 2

The experimental compatibility graph of this Bell test is shown in Figure 1d. We denote the graph as G 2 | 3 e , and the subscripts here is used to indicate that Alice chooses two observables and Bob chooses three observables to measure. The corresponding Bell test function is
B G 2 | 3 e = E ( A 1 , B 1 ) + E ( A 2 , B 1 ) + E ( A 2 , B 2 ) + E ( A 1 , B 2 ) + E ( A 1 , B 3 ) E ( A 2 , B 3 ) .
The LHV bound is 4, and the non-signaling bound is 6, but the exact quantum bound remains unknown.

3. Communication Complexity Problems

Now, let us recall the formal definition of communication complexity; for further information, we refer the reader to Refs. [29,30,31]. For simplicity, consider the two-party case, for which Alice and Bob try to calculate a bivariate function f : B n × B n B collaboratively, where B denotes the binary set { 0 , 1 } or { ± 1 } . An r-round communication complexity protocol P for computing function f ( x , y ) is a distributed algorithm consisting of a set of r functions f 1 , , f r : m 0 B m m 0 B m . Alice first individually calculates function f 1 ( x ) = v 1 and sends the result to Bob; after Bob receives the result, he calculates function f 2 ( y , v 1 ) = v 2 and sends the result to Alice, etc. Each act of communication is called a round. We suggest that the protocol P is valid for calculating f ( x , y ) if the last message sent (i.e., v r = f r ( x , v 1 , , v r 1 ) by Alice or v r = f r ( y , v 1 , , v r 1 ) by Bob) equals f ( x , y ) for all possible input values of x , y . The communication complexity of the protocol P is then defined as the C P ( f ) = | v 1 | + + | v r | , where | v i | denotes the number of bits of the message v i . The protocol defined above is deterministic. For the bounded-error case, Alice and Bob can toss coins individually or jointly to choose the input at each round, and the protocol P has to calculate f with a success probability greater than or equal to a fixed value 1 δ , where δ is usually chosen as 1 / 3 , viz, P s u c c 2 / 3 . We assume that if Bob guesses the value f ( x , y ) as z = 0 , 1 during the final round, the successful probability will be
p s u c c ( P ) = x , y p ( x , y ) p ( z = f ( x , y ) | x , y ) .
The bounded-error communication complexity is denoted as C P b e ( f ) , which is the number of communicated bits in the protocol such that p s u c c 1 δ for some δ < 1 / 2 .
The bounded-error communication complexity problem concerns the problem of obtaining the lower bound of the amount of communication needed for all parties to obtain the value of a given function f with successful probability P s u c c 1 δ . We can naturally ask the inverse question: what is the highest successful probability for calculating the function f if the amount of communication C ( f ) is restricted to be upper bounded C ( f ) C b d ? Note that unlike in the regular communication complexity problem where the bound of successful probability 1 δ does not matter so much, in this kind of CC problem, the communication bound is of considerable importance. Since there exists a trivial protocol for calculating the arbitrary function f, for which Alice communicates her entire input to Bob, p s u c c can always reach 1 if the allowed communication is greater than or equal to min { | x | + 1 , | y | + 1 } .
There are two types of quantum communication complexity protocols: (i) the preparation measurement protocol and (ii) the entanglement-assisted protocol, which is similar to the categorification of quantum key distribution protocol. In this work, we mainly discuss the entanglement-assisted protocol.
The performance of a usual CC protocol P is characterized by the amount of communication, i.e., classical or quantum bits C ( P , f | p succ ) required to achieve the success probability p succ . The quantum advantage of the CC problem is that there exists a quantum protocol P Q such that for any classical protocol P C , we have C ( P C , f | p succ ) > C ( P Q , f | p succ ) .
The performance of the CC protocol P for calculating function f can also be characterized by the maximal achievable success probability p succ ( P , f | C b d ) given a bounded amount of communication C b d . Here, the communication could be classical bits or qubits; we suggest that there is a quantum advantage for the ICC problem for calculating f if there is a quantum protocol P Q such that p succ ( P Q , f | C b d ) > p succ ( P C , f | C b d ) for all classical protocol P C .
There is a simple and well-known example of the CC problem in Ref. [32], for which Alice and Bob receive bit strings ( x , a ) B 2 and ( y , b ) B 2 , respectively, and they tend to calculate a function f given by the following language:
L Bell = { ( x , a ; y , b ) B 2 × B 2 | a b = x y } .
All input strings distribute uniformly, and the two parties are allowed to exchange only two classical bits. Their goal is to calculate L Bell with as high successful probability as possible. In Ref. [10], Brukner et al. present the optimal classical protocol and prove that by using entangled quantum states that violate CHSH inequality, the quantum solution of the problem has a higher success probability than that of the optimal classical protocol, thus exhibiting the quantum advantage. This protocol works in the entanglement-assisted sense.

4. From Bell Inequality Violation to the Quantum Advantage for ICC Problems

We now discuss how to translate a Bell test into an ICC problem using a compatibility graph. To start with, let us consider the two-party case. For a given experimental compatibility graph G e , which is a bipartite graph, the vertices are labeled with x A = v 1 , , v n by Alice and x B = u 1 , , u m by Bob. There are some edges corresponding to γ i j = 1 (called positive edges, drawn as black solid edge in Figure 1) and some others corresponding to γ i j = 1 (called negative edges, drawn as red dashed edge in Figure 1). We introduce a function that we refer to as the target function
t ( x A , x B ) = 0 , for v i u j positive edge , 1 , for v i u j negative edge .
Consider the following two-party scenario: Alice and Bob receive ( x A , y A ) and ( x B , y B ) , respectively, where y A , y B = ± 1 and x A = 1 , , n , x B = 1 , , m , and the condition x A x B E ( G e ) (i.e. it is an edge of the experimental compatibility graph G e ) are promised. The function they calculate is
F G e ( x A , y A ; x B , y B ) = y A y B ( 1 ) t ( x A , x B ) .
Note that this is a partial function; for some inputs, the function is not defined—see Table 1 for an example. In this way, we can construct a CC function from an arbitrary given experimental compatibility graph.
For the n-party case, the corresponding experimental graph is an n-partite hypergraph; the vertices of k-th party are labeled with x k = u 1 k , , u m k k ; the edge u i 1 1 u i n n consists of n vertices, one from each party. Similar to the two-party case, we can define the target function
t ( x 1 , , x n ) = 0 , for u i 1 1 u i n n positive edge , 1 , for u i 1 1 u i n n negative edge .
The function to be calculated is
F G e ( x 1 , y A ; ; x n , y n ) = y 1 y n ( 1 ) t ( x 1 , , x n ) .
The CC problem to be solved is as follows: the n parties try to calculate the function (11), and the k-th party receives the bit string ( x k , y k ) with x k = u 1 k , , u m k k . The probability distribution for the input strings is
p ( x 1 , y 1 ; ; x n , y n ) = 1 2 n × 1 | E ( G e ) | .
Each party is allowed to broadcast one classical bit of information, and n parties broadcast the information simultaneously such that their broadcast bits are independent.

4.1. Optimal Classical Protocol

Let us now introduce an optimal classical protocol P C for the above CC problem. To make things clearer, we take the two-party case as an example. The main step is to calculate the target function part ( 1 ) t ( x A , x B ) . To do this, Alice and Bob firstly relabel their vertices as x A and x B such that the values x A + x B are different for different edges. This can be achieved since G e is a finite graph. For example, for Bob’s fixed vertex u 1 , the range of u 1 + v i is [ N 1 , N 1 ] ; we can then set u 2 > N 1 , and then all u 2 + v i > N 1 . The intersection of ranges of u 1 + v i and u 2 + v i is empty. By repeating the procedure m times, we achieve our goal. In fact, we can do more to relabel the vertices such that the values corresponding to negative edges are odd numbers and the values corresponding to positive edges are even numbers. This is because v i + u j are now different for different edges. If the value is not as what we require, we can add a very large number to make the parity correct. In this way, we see that
( 1 ) t ( x A , x B ) = ( 1 ) x A + x B .
Before starting the calculation for a given experimental compatibility graph G e , Alice and Bob firstly come together to discuss and fix the procedure in order to conduct the relabeling process. In fact, the easiest way is to relabel the vertices before calculation as x A and x B .
With the above preparation, we now present our classical protocol. Alice and Bob, when receiving inputs ( x A , y A ) and ( x B , y B ) , choose to locally calculate two functions a ( x A , λ A ) and b ( x B , λ B ) such that a ( x A , λ A ) = ( 1 ) x A and a ( x A , λ A ) = ( 1 ) x B . Note that, here, λ A , λ B characterize their local classical resources, and they may be classically correlated. Then, Alice and Bob broadcast the results e A = y A a ( x A , λ A ) and e B = y B b ( x B , λ B ) , respectively. After receiving the result, they both output it with the answer function
Ans P C ( x A , y A ; x B , y B ) = e A e B .
The success probability of the protocol is
p succ ( P C | C b d = 2 ) = 1 | E ( G e ) | ( i j positive p ( a b = 1 | v i u j ) + i j negative p ( a b = 1 | v i u j ) ) .
The protocol can achieve a success probability of ( B C + | E ( G e ) | ) / 2 | E ( G e ) | , where B C is the classical bound for Bell inequality. For the 2 m -cycle case, it is p succ ( P C | C b d = 2 ) = ( 2 m 1 ) / 2 m , and especially for the well-known CHSH case m = 2 , p succ ( P C | C b d = 2 ) = 3 / 4 .
For the n-party case, the protocol works similarly. The main difference is that the experimental compatibility graph is now an n-partite hypergraph. By relabeling the vertices, we have
( 1 ) t ( x 1 , , x n ) = ( 1 ) x 1 + + x n .
After receiving the input bit strings, each party chooses to locally calculate a function e k = y i a ( x k , λ k ) with a k ( x k , λ k ) = ( 1 ) x k . Finally they broadcast e k simultaneously and output the value
Ans P C ( x 1 , y 1 ; ; x n , y n ) = e 1 e n .
The success probability is similar to Equation (15). The protocol can achieve a success probability of ( B C + | E ( G e ) | ) / 2 | E ( G e ) | , where B C is the classical bound for Bell inequality. In this protocol, each party indeed only broadcasts one classical bit of information.
Before we discuss the quantum advantage of the entanglement-assisted protocol, we need to prove that this is in fact the optimal classical protocol.
Proof of the optimality of the protocol.—We now show that the above protocol is optimal; i.e., there is no classical protocol reaching a higher success probability. For the two-party case, what we need to show is that when Alice and Bob initially share classical randomness, there is no C b d = 2 protocol for which Alice and Bob can calculate the function F G e with success probability greater than ( B C + | E ( G e ) | ) / 2 | E ( G e ) | . Firstly, we observe that an n-bit Boolean function f ( x 1 , , x n ) with values ± 1 can be decomposed as
f ( x 1 , , x n ) = i 1 , , i n = 0 , 1 T i 1 , , i n x 1 i 1 x m i n .
Since f ( x 1 , , x n ) = ± 1 , we have | T i 1 , , i n | 1 . In fact, the expansion coefficients are given by
T i 1 , , i n = 1 2 n x 1 , , x n = ± 1 f ( x 1 , , x n ) x 1 i 1 x n i n .
Now, consider the function F G e ( x A , y A ; x B , y B ) ; for convenience, we introduce the new variables x ˜ A = ( 1 ) x A and x ˜ B = ( 1 ) x B . Using the expansion of Equation (18), the broadcast bits become
e i = e i ( x ˜ i , y i ) = ( T 00 + T 10 x ˜ i ) + ( T 01 + T 11 x ˜ i ) y i = c i ( x ˜ i ) + d i ( x ˜ i ) y i ,
where | c i ( x ˜ i ) | + | d i ( x ˜ i ) | = 1 and | c i ( x ˜ i ) | , | d i ( x ˜ i ) | = 0 , 1 , with i = A , B . The inner product of Alice’s answer function with function F G e can be defined as
Ans A , F G e = x A , y A , x B , y B μ ( x A , x B ) 4 Ans A ( x A , y A , e B ) F G e ( x A , y A ; x B , y B ) .
Here, μ ( x A , x B ) / 4 is the probability distribution over the inputs. We see that when Ans A ( x A , y A , e B ) = F G e ( x A , y A ; x B , y B ) , they contribute + 1 to the above summation; otherwise, they contribute 1 . Note the fact that 1 = x A , y A , x B , y B μ ( x A , x B ) 4 ; the success probability for Alice to output the correct answer can thus be written as p succ = 1 2 ( 1 + Ans A , F G e ) . Inserting the expression of F G e and the expansion Ans A ( x A , y A , e B ) = Ans A ( x ˜ A , y A , e B ) = j x ˜ j y j e T j x ˜ j y j e x ˜ A j x ˜ y A j y e B j e into it, we obtain
p succ = x A , x B ( 1 ) t ( x A , x B ) ( T 011 + T 111 x ˜ A ) d B ( x ˜ B ) | E ( G e ) | .
From the definition of the expansion coefficients, we have | T 011 + T 111 x ˜ A |     1 . Using Bell inequality, for arbitrary functions f ( x A ) , g ( x B ) with | f ( x A ) | , | g ( x B ) | 1 , we have
x A , x B γ x A x B f ( x A ) g ( x B ) = x A , x B ( 1 ) t ( x A , x B ) f ( x A ) g ( x B ) B C + | E ( G ) | 2 .
Thus, the success probability must satisfy p succ C B C + | E ( G e ) | 2 | E ( G e ) | . Since the protocol we gave before reaches the bound, it is the optimal classical protocol. Similarly for Bob, we can define Ans B , F G e . From symmetry of the problem expression, the same result holds for Bob. For the n-party case, the proof is completely the same.
The proof here is similar in character to that in Ref. [10]. Another way to prove optimality is to use the traditional communication complexity theoretic approach, for which we first prove a lower bound of the deterministic protocol. Then, using a famous theorem [29]—which states that the communication complexity R ϵ ( f ) of the randomized protocol for computing the function f with error ϵ has a relationship with the communication complexity D ϵ ( f | μ ) of the deterministic protocol for computing the function f with error ϵ , for which inputs are distributed with μ as R ϵ ( f ) = max μ D ϵ ( f | μ ) —the lower bound of the deterministic protocol can be proved by assuming a protocol tree with a depth of 2 (for the two-party case) and discussing the partitions of the inputs by different nodes of the protocol tree.

4.2. Entanglement-Assisted Protocol

The quantum protocol works as follows: We take the two-party case as an example. Alice and Bob pre-share an entangled quantum state | ψ A B , upon which Alice and Bob can choose ± 1 -valued observables A 1 , , A m and B 1 , , B n and obtain a violated value of Bell inequality corresponding to the experimental compatibility graph G e . Now, if Alice and Bob receive input values x A = v i and x B = u j , they can measure the corresponding observables A i and B j and output a A = a i and b B = b j . Then, Alice and Bob broadcast the classical bits e A = y A a A and e B = y B b B , respectively. After receiving the communicated bits, Alice and Bob both give their answers as Ans A = Ans B = e A e B . The success probability is still Equation (15). We see that it can exceed the bound of classical protocol, thus exhibiting the quantum advantage.
For further clarification, let us first take G 2 m c y c l e e as an example (see Example 1). Suppose that Alice and Bob pre-share the singlet state | ψ = 1 2 ( | 01 | 10 ) . The observables for Alice are A i = m i · σ , where
m i = ( cos ( 2 i 1 ) π 2 m , 0 , sin ( 2 i 1 ) π 2 m ) , i = 1 , , m ,
and for Bob, they are B j = n j · σ , where
n j = ( cos j π m , 0 , sin j π m ) , j = 1 , , m .
With these measurements, Alice and Bob can achieve a success probability p succ = cos π / 2 m + 1 2 , which corresponds to the Tsirelson bound of the 2 m -cycle Bell inequality. We note that the success probability is a monotone increasing function, and when m , it tends to 1.
Another example is G 2 | 3 e , as illustrated in Example 2. Alice and Bob still pre-share the singlet state, and Alice chooses to measure A 1 = σ x and A 2 = σ z , while Bob chooses to measure B j = n j · σ with
n 1 = ( cos π 4 , 0 , cos π 4 ) , n 1 = ( cos 3 π 4 , 0 , cos 3 π 4 ) , n 3 = ( cos ( π 4 + θ ) , 0 , cos ( 3 π 4 + θ ) ) , θ 1 .
The optimal classical protocol can achieve a success probability of 5 / 6 . Here, the quantum protocol can almost reach the success probability of ( 3 2 + 6 ) / 12 for sufficiently small θ , which is greater than the success probability for the optimal classical protocol; thus, it exhibits a quantum advantage. Note that the above problem is closely related to the problem of simulation of nonlocal correlation via classical communication [33]. Our result here matches well with previous results that suggested that by two bits of classical communication, Bell nonlocal measurement statistics can be simulated.

4.3. Popescu–Rohrlich Box Protocol

Let us now consider a non-signaling world, which is beyond quantum mechanics. Suppose that Alice and Bob pre-share a black box such that for the positive edge i j of the experimental compatibility graph G e , the probability distribution of outputs for measurements A i , B j is
p ( a i , b j | A i , B j ) = 1 / 2 , a i b j = 1 , 0 , a i b j = 1 .
Additionally, for negative edges, the distribution is
p ( a i , b j | A i , B j ) = 0 , a i b j = 1 , 1 / 2 , a i b j = 1 .
This kind of black box is known as a Popescu–Rohrlich box [18] or a perfect nonlocal box. It can be easily confirmed whether the box satisfies the non-signaling principle.
With the help of the Popescu–Rohrlich box, we can reach a success probability of p succ = 1 . The protocol works in a similar manner to that of the entanglement-assisted protocol. After receiving the inputs x A = v i and x B = u j , Alice and Bob choose to measure A i and B j jointly and output a i and b j with a probability of p ( a i , b j | A i , B j ) . After many runs of the experiment, Alice and Bob check their success probability. It is obvious from Equation (15) that for the Popescu–Rohrlich box, the success probability is p succ = 1 . This matches well with the result in Refs. [34,35], which states that using a perfect nonlocal box can make CCP trivial for arbitrary Boolean function.

5. Conclusions and Discussions

Identifying the bound of classical theory and quantum theory is of great importance for understanding the nature of our universe. In this work, we attempt to gain a better understanding of the problem from a communication complexity theoretic perspective. By restricting the classical communications, two parties can calculate a given function with different success probabilities; this shows that the strength of quantum correlations is much stronger than that of the classical one. These results shed new light on the bound between classical and quantum worlds. From a practical point of view, our result provides a method to construct a CC function from an arbitrary given experimental compatibility graph or hypergraph. When the graph is a bipartite graph, it gives a two-party CC function, and when the graph is multipartite, it gives a multi-party CC function. Our construction may have potential applications in practical CC problems where quantum advantages from Bell nonlocality need to be extracted.

Author Contributions

Conceptualization, G.-C.G.; formal analysis, Z.-A.J.; investigation, L.W.; methodology, Y.-C.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Z.-A.J. acknowledges Zhenghan Wang and would like to thank the math department of UCSB for their hospitality during his visit to carry out some parts of this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Einstein, A.; Podolsky, B.; Rosen, N. Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 1935, 47, 777. [Google Scholar] [CrossRef] [Green Version]
  2. Bell, J.S. On the Einstein Podolsky Rosen paradox. Physics 1964, 1, 195–200. [Google Scholar] [CrossRef] [Green Version]
  3. Horodecki, R.; Horodecki, P.; Horodecki, M.; Horodecki, K. Quantum entanglement. Rev. Mod. Phys. 2009, 81, 865–942. [Google Scholar] [CrossRef] [Green Version]
  4. Brunner, N.; Cavalcanti, D.; Pironio, S.; Scarani, V.; Wehner, S. Bell nonlocality. Rev. Mod. Phys. 2014, 86, 419–478. [Google Scholar] [CrossRef] [Green Version]
  5. Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  6. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [Green Version]
  7. Herrero-Collantes, M.; Garcia-Escartin, J.C. Quantum random number generators. Rev. Mod. Phys. 2017, 89, 015004. [Google Scholar] [CrossRef] [Green Version]
  8. Buhrman, H.; Cleve, R.; Massar, S.; de Wolf, R. Nonlocality and communication complexity. Rev. Mod. Phys. 2010, 82, 665–698. [Google Scholar] [CrossRef] [Green Version]
  9. Yao, A.C.C. Some Complexity Questions Related to Distributive Computing (Preliminary Report). In Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing; Association for Computing Machinery: New York, NY, USA, 1979; pp. 209–213. [Google Scholar] [CrossRef]
  10. Brukner, C.; Żukowski, M.; Pan, J.W.; Zeilinger, A. Bell’s Inequalities and Quantum Communication Complexity. Phys. Rev. Lett. 2004, 92, 127901. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  11. Degorre, J.; Kaplan, M.; Laplante, S.; Roland, J. The communication complexity of non-signaling distributions. In International Symposium on Mathematical Foundations of Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; pp. 270–281. [Google Scholar]
  12. Junge, M.; Palazuelos, C.; Villanueva, I. Classical versus quantum communication in XOR games. Quantum Inf. Process. 2018, 17, 117. [Google Scholar] [CrossRef]
  13. Tavakoli, A.; Żukowski, M.; Brukner, Č. Does violation of a Bell inequality always imply quantum advantage in a communication complexity problem? Quantum 2020, 4, 316. [Google Scholar] [CrossRef]
  14. Buhrman, H.; Czekaj, Ł; Grudka, A.; Horodecki, M.; Horodecki, P.; Markiewicz, M.; Speelman, F.; Strelchuk, S. Quantum communication complexity advantage implies violation of a Bell inequality. Proc. Natl. Acad. Sci. USA 2016, 113, 3191–3196. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Laplante, S.; Laurière, M.; Nolin, A.; Roland, J.; Senno, G. Robust Bell inequalities from communication complexity. Quantum 2018, 2, 72. [Google Scholar] [CrossRef] [Green Version]
  16. Clauser, J.F.; Horne, M.A.; Shimony, A.; Holt, R.A. Proposed Experiment to Test Local Hidden-Variable Theories. Phys. Rev. Lett. 1969, 23, 880–884. [Google Scholar] [CrossRef] [Green Version]
  17. Jia, Z.A.; Wu, Y.C.; Guo, G.C. Monogamy relation in no-disturbance theories. Phys. Rev. A 2016, 94, 012111. [Google Scholar] [CrossRef] [Green Version]
  18. Popescu, S.; Rohrlich, D. Quantum nonlocality as an axiom. Found. Phys. 1994, 24, 379–385. [Google Scholar] [CrossRef]
  19. Ramanathan, R.; Soeda, A.; Kurzyński, P.; Kaszlikowski, D. Generalized Monogamy of Contextual Inequalities from the No-Disturbance Principle. Phys. Rev. Lett. 2012, 109, 050404. [Google Scholar] [CrossRef] [Green Version]
  20. Vorob’ev, N. Markov measures and Markov extensions. Probab. Theory Appl. 1963, 8, 420–429. [Google Scholar] [CrossRef]
  21. Vorob’ev, N.N. Coalitional games. Probab. Theory Appl. 1967, 12, 289–306. [Google Scholar]
  22. Fine, A. Hidden Variables, Joint Probability, and the Bell Inequalities. Phys. Rev. Lett. 1982, 48, 291–295. [Google Scholar] [CrossRef]
  23. Xu, Z.P.; Cabello, A. Necessary and sufficient condition for contextuality from incompatibility. Phys. Rev. A 2019, 99, 020103. [Google Scholar] [CrossRef] [Green Version]
  24. Jia, Z.A.; Cai, G.D.; Wu, Y.C.; Guo, G.C.; Cabello, A. The Exclusivity Principle Determines the Correlation Monogamy. arXiv 2017, arXiv:1707.03250. [Google Scholar]
  25. Jia, Z.A.; Zhai, R.; Yu, B.C.; Wu, Y.C.; Guo, G.C. Entropic no-disturbance as a physical principle. Phys. Rev. A 2018, 97, 052128. [Google Scholar] [CrossRef] [Green Version]
  26. Braunstein, S.L.; Caves, C.M. Information-theoretic Bell inequalities. Phys. Rev. Lett. 1988, 61, 662. [Google Scholar] [CrossRef]
  27. Wehner, S. Tsirelson bounds for generalized Clauser-Horne-Shimony-Holt inequalities. Phys. Rev. A 2006, 73, 022110. [Google Scholar] [CrossRef] [Green Version]
  28. Cabello, A.; Severini, S.; Winter, A. Graph-Theoretic Approach to Quantum Correlations. Phys. Rev. Lett. 2014, 112, 040401. [Google Scholar] [CrossRef] [Green Version]
  29. Kushilevitz, E.; Nisan, N. Communication Complexity; Cambridge University Press: Cambridge, UK, 1996. [Google Scholar] [CrossRef]
  30. Arora, S.; Barak, B. Computational Complexity: A Modern Approach; Cambridge University Press: Cambridge, UK, 2009. [Google Scholar]
  31. Hromkovič, J. Communication Complexity and Parallel Computing; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  32. Buhrman, H.; Cleve, R.; Van Dam, W. Quantum entanglement and communication complexity. SIAM J. Comput. 2001, 30, 1829–1841. [Google Scholar] [CrossRef] [Green Version]
  33. Toner, B.F.; Bacon, D. Communication cost of simulating bell correlations. Phys. Rev. Lett. 2003, 91, 187904. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  34. Van Dam, W. Implausible consequences of superstrong nonlocality. arXiv 2005, arXiv:quant-ph/0501159. [Google Scholar] [CrossRef]
  35. Brassard, G.; Buhrman, H.; Linden, N.; Méthot, A.; Tapp, A.; Unger, F. Limit on nonlocality in any world in which communication complexity is not trivial. Phys. Rev. Lett. 2006, 96, 250401. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Depiction of the experimental compatibility graph and measurement compatibility graph. (a) Experimental compatibility graph G 4 c y c l e e of CHSH inequality, which is a 4-cycle graph; (b) experimental compatibility graph G 6 c y c l e e of 6-cycle Bell inequality; (c) measurement compatibility graph G 6 corresponding to G 6 c y c l e e ; (d) non-cycle experimental compatibility graph G 2 | 3 e .
Figure 1. Depiction of the experimental compatibility graph and measurement compatibility graph. (a) Experimental compatibility graph G 4 c y c l e e of CHSH inequality, which is a 4-cycle graph; (b) experimental compatibility graph G 6 c y c l e e of 6-cycle Bell inequality; (c) measurement compatibility graph G 6 corresponding to G 6 c y c l e e ; (d) non-cycle experimental compatibility graph G 2 | 3 e .
Entropy 23 00744 g001
Table 1. Value of F G 6 c y c l e e ; columns are indexed by ( x A , y A ) and rows are indexed by ( x B , y B ) .
Table 1. Value of F G 6 c y c l e e ; columns are indexed by ( x A , y A ) and rows are indexed by ( x B , y B ) .
(1, +1)(1, −1)(2, +1)(2, −1)(3, +1)(3, −1)
(1, +1)1−11−1
(1, −1)−11−11
(2, +1)1−11−1
(2, −1)−11−11
(3, +1)1−1−11
(3, −1)−111−1
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jia, Z.-A.; Wei, L.; Wu, Y.-C.; Guo, G.-C. Quantum Advantages of Communication Complexity from Bell Nonlocality. Entropy 2021, 23, 744. https://doi.org/10.3390/e23060744

AMA Style

Jia Z-A, Wei L, Wu Y-C, Guo G-C. Quantum Advantages of Communication Complexity from Bell Nonlocality. Entropy. 2021; 23(6):744. https://doi.org/10.3390/e23060744

Chicago/Turabian Style

Jia, Zhih-Ahn, Lu Wei, Yu-Chun Wu, and Guang-Can Guo. 2021. "Quantum Advantages of Communication Complexity from Bell Nonlocality" Entropy 23, no. 6: 744. https://doi.org/10.3390/e23060744

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop