Next Article in Journal
Affine Cipher Encryption Technique Using Residue Number System
Previous Article in Journal
Privacy-Enhancing Technologies in Collaborative Healthcare Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bell–Clauser–Horne–Shimony–Holt Behavior Under Quantum Loss and Decoherence

1
HUN-REN Wigner Research Centre or Physics, 1121 Budapest, Hungary
2
Faculty of Informatics, Eötvös Loránd University, 1117 Budapest, Hungary
3
Institute of Mathematics and Informatics, University of Pécs, 7624 Pécs, Hungary
4
Institute of Physics, University of Pécs, 7624 Pécs, Hungary
*
Author to whom correspondence should be addressed.
Cryptography 2025, 9(2), 25; https://doi.org/10.3390/cryptography9020025
Submission received: 14 March 2025 / Revised: 15 April 2025 / Accepted: 19 April 2025 / Published: 23 April 2025

Abstract

:
We present a detailed analysis of the effect of quantum loss and decoherence in the Bell-CHSH scenario. Adopting a device-independent approach, we study the change in the bipartite conditional probability distribution, i.e., the behavior of the realized nonlocal box pair when the elements of the entangled qubit pair subjected to independent noisy quantum channels modeled by completely positive maps. As the verification of Bell inequalities is crucial in device-independent quantum cryptography, our considerations are instructive from the perspective of quantum realizations of nonlocal box pairs. We find that the impact of quantum channels cannot be described by an equivalent classical noise channel.

1. Introduction

The violation of Bell inequalities is one of the most intriguing features of quantum mechanics [1]. Besides its fundamental and philosophical relevance, it has practical importance too, especially in quantum cryptography. The celebrated Ekert91 protocol [2], which is the first and one of the most important quantum key distribution protocols based on quantum entanglement, is based on the verification of the violation of the Clauser–Horne–Shimony–Holt (CHSH) Bell inequality [3].
As the violation of a Bell inequality can be verified solely by the statistics of the measurement choices and outputs—that is, the behavior of the “nonlocal boxes”, i.e., the bipartite conditional probability distribution of the measurements in a Bell-type scenario—the Ekert91 protocol is also device-independent in that it self-certifies the presence of the required entangled resource. Indeed, device-independent quantum cryptography [4,5,6] is mainly based on self-certification based on the verification of Bell-type inequalities [7]. Without any assumptions on the particular quantum states and measurements used for the realization of the protocol, the security is based on the presence of nonlocal correlations in the behavior of nonlocal boxes. The presence of the required nonlocality is verified by testing Bell inequality violations in the behavior of the boxes in the course of the protocol.
The behavior of the boxes in Bell-type setups falls into three categories [1,8,9]. Local behaviors do not violate Bell’s inequalities; these can be reproduced using pre-shared randomness. In the linear space of the conditional probabilities, these form the local polytope, whose nontrivial facets correspond to Bell’s inequalities. Quantum behaviors are those that can be realized using a quantum setup, with an entangled resource and measurements. These form a broader closed convex set. Finally, no-signaling behaviors are even more general; their defining property is that they cannot be used for communication between the parties. They also form a polytope which contains the set of quantum behaviors. The nontrivial facets of the polytope are defined by the no-signaling conditions.
Whenever an entanglement-based or device-independent quantum cryptography protocol is realized, it will be subject to imperfections, such as noise, loss, and detector imperfections. Detection loopholes have always been the main issues that arise with practical Bell-inequality-violation testing. Meanwhile, detector inefficiencies can hide nonlocal correlations, turning the behavior into a local one [8,10]. Loss and decoherence, on the other hand, can decrease the entanglement of the entangled resource, which is required for quantum nonlocality.
As also summarized in the review by Brunner et al. [1], the tolerance of nonlocal correlations to the addition of various types of noise can be considered an operational measure of nonlocal correlation. This aspect has been extensively studied for different noise types, including white noise [11,12], local noise [13,14], and detection inefficiencies [15,16].
The quantum bit error rate (QBER), which is a key feature of quantum cryptographic protocols, depends on Bell inequality violation. The effect of the atmosphere, detector imperfections, and other relevant factors is extensively studied in the literature on optical satellite quantum cryptography [17,18,19], based on particular physical models [20].
From a theoretical point of view, the effect of losses and noise is modeled most generally by quantum channels, i.e., completely positive trace preserving (CPTP) maps. The effect of a local quantum channel on bipartite entanglement has been studied in detail before. Entanglement breaking channels are those CPTP maps which eliminate entanglement when applied to one part of an entangled pair; they have been characterized in a mathematically elegant fashion [21,22]. In the present work, we approach the question from the Bell inequalities’ point of view: we study the effect of the CPTP maps on nonlocal behaviors. The use of CPTP maps is not uncommon in the literature of device-independent quantum cryptography (see, e.g., [23]).
The particular effect of CPTP maps on nonclassical correlations, which is the subject of the present contribution, is less broadly discussed in the literature. Rastegin [24] considers information–theoretic Bell inequalities in a dephasing environment, whereas Ma et al. [25] study the behavior of qubit Bell inequality violations under qubit amplitude damping. These contributions focus on the Bell inequality violations, and not the detailed structural properties of the correlations. D. Park et al. [26] studied the Ekert protocol by calculating concurrence as the measure of the entanglement and Bell inequality violation. For the purpose of the investigation of the Ekert91 protocol, it is sufficient to consider Bell inequality violations. Their considerations could be repeated for the different channels and maps discussed here, when it comes to the analysis of that particular protocol. In the present contribution, however, we consider the structural changes in nonlocal behavior in more detail.
The scope of the present study is limited to the case of the CHSH scenario, involving a pair of quantum bits; a two-input–two-output nonlocal behavior; while this bears practical relevance for the Ekert91 protocol, our motivation is to gain a fundamental understanding of the effect of quantum channels to nonlocal behaviors. One is tempted to assume that all imperfections can be studied by adding local classical noise to the measurement outputs, as is the case when modeling detector inefficiencies. Our main observation will be that this is not always the case: quantum noise destroys nonlocal correlations differently from detector imperfections. Methodologically, our analysis adopts a picture based on the theory of classical discrete memoryless channels, providing an alternative view of nonlocal behaviors.
This paper is organized as follows: In Section 2, we introduce the concepts and methods used in the rest of this work and give more details on certain aspects that are already known from the literature. Section 3 summarizes the features and descriptions of the considered qubit channels. Section 4 contains the results of calculation of the nonlocal behaviors, assuming different imperfections and the analysis of the Bell-CHSH violation. Section 5 contains our main results: we analyze the extent to which the effect of the quantum channels is (in)equivalent to local classical noise. Finally, in Section 6, conclusions are drawn, and possible ways of continuing this research are outlined.

2. Background, Notation

In this Section, we summarize the notation and the concepts used throughout the rest of the paper.

2.1. Discrete Memoryless Channels

A discrete memoryless channel without feedback, which will be referred to as a “channel” in what follows, is specified by the triple ( X , A , p ( a | x ) ) , where X is a finite set of input symbols, x X , A is a finite set of output symbols, a A , and P ( a | x ) is the conditional probability that the channel outputs, a, when the input is x. The channel is often considered to connect two parties; somewhat unusually, we shall call the sender Xenia, and the receiver Alice, in the present case.
Having an input probability distribution, p x in , on Xenia’s side, the output probability distribution p a out at Alice’s side is calculated as follows:
p a out = x p x in P ( a | x ) .
In information theory, it is common to define the channel transfer matrix
T x , a = P ( a | x ) .
Considering the input and output probability distributions as row vectors, p in and p out , respectively, we have
p out = p in T .
For a matrix T to represent a channel, it should be a stochastic matrix: its elements have to be between 0 and 1, and the sum of each row should be 1.
Assume now that Alice sends her received symbols through another channel, T , to Ronnie. (Thus, T represents a channel ( A , R , P ( r | a ) ) in the sense of (2).) It is straightforward to see that the matrix of the so-arising channel between Xenia and Ronnie will be T T . When composing channels, the subsequent channel’s matrix multiplies the preceding one from the right.

2.2. Bipartite Channels

In addition to the sender, Xenia, and the receiver, Alice, consider now another sender, Yvette, and another receiver, Bob. When all these parties are considered, the most general channel between the Xenia–Yvette pair and the Alice–Bob pair is a channel, ( X × Y , A × B , P ( a b | x y ) ) , where the ordered pairs in the Cartesian product are denoted as strings, e.g., ( x , y ) = x y . The elements of the respective channel transfer matrix will be T x y , a b ; thus, they will be in the direct (tensor) product space of the spaces of the possible (Xenia to Alice) and (Yvette to Bob) matrices.
Indeed, if the channel T ( X A ) between Xenia and Alice is completely independent of the channel T ( Y B ) between Yvette and Bob, for the joint channel, we have
T x y , a b ( X Y A B ) = T x , a ( X A ) T y , b ( Y B )
because of the independence of the conditional probabilities; thus,
T ( X Y A B ) = T ( X A ) T ( Y B ) .
The channels can, however, be dependent. In this case, the channel matrix, T x y , a b ( X Y A B ) , is not in the product form of Equation (4), but it is a generic stochastic matrix, which obeys the constraints
a , b , x , y 0 T x y , a b ( X Y A B ) 1 a , b x , y T x y , a b ( X Y A B ) = 1 .

2.3. Two-Party Bell Experiments as Channels

The bipartite joint probabilities, P ( a b | x y ) , are crucial objects for the study of quantum nonlocality and no-signaling theories. Consider a bipartite Bell-type experiment. Using the previous metaphor of actors, Xenia and Alice are now at the same location, whereas Yvette and Bob are together at another, separated place. So, the parties will be referred to as Alice and Bob. Alice and Bob share a pair of quantum systems in an entangled state.
Alice (and Xenia) can choose from a set of quantum measurements, X. Upon carrying out the selected measurement, x, they obtain a result a A . Similarly, Bob (and Yvette) choose a measurement, y Y , and obtain a result, b B . Given the set of measurements and the entangled state, according to the rules of quantum mechanics, the conditional probability distribution, P ( a b | x y ) , can be calculated, which is commonly termed as “behavior” in the present context. A behavior can exhibit so-called nonclassical correlations between Alice and Bob. The peculiarity of such correlations lies in the fact that Alice + Xenia are separated from Bob + Yvette, so their channels do not interact. Yet, there can be correlations that cannot be explained, even assuming the pre-shared randomness (i.e., the keys) between the two locations. The Bell inequalities are inequalities that can be expressed in terms of P ( a b | x y ) and their violation indicates this unexplainability.
This scenario can be extended to study general behaviors, P ( a b | x y ) . The no-signaling ones, that is, those that do not facilitate communication between Alice+Xenia and Bob+Yvette, are of special interest. Formally, the no-signaling constraints in our notation can be written as
b T x y , a b ( X Y A B ) = b T x y , a b ( X Y A B )   for   all   x , a , y , y
a T x y , a b ( X Y A B ) = a T x y , a b ( X Y A B )   for   all   y , b , x , x .
These constraints imply that the local marginal probabilities of Alice can be defined unambiguously as
T x , a ( X A ) : = T x y , a ( X Y A B ) = b T x y , a b ( X Y A B ) ,
as these values are independent of Bob’s measurement setting, y (and the other way around). These form a polytope in the vector space of the behaviors, T ( X Y A B ) .
Note that, from the classical channel’s point of view, in the Bell scenario, there are two sender–receiver pairs Xenia–Alice and Yvette–Bob. The members of each of these pairs are, however, located at the same place. So, the correlations are not between the “sender” and the “receiver” in the channel sense, but between the two parts of the channel. Yet, in some cases, it is useful to view them from the channel’s perspective, writing the behavior P ( a b | x y ) in the form of a channel matrix, T ( X Y A B ) .
As an example, consider the celebrated Clauser–Horne–Shimony–Holt (CHSH) experiment, which will be the subject of the present study. Alice and Bob share a pair of quantum bits in a maximally entangled state; let it be the Bell state:
| Φ ( + ) = 1 2 | 00 + | 11 ,
where we have fixed a product basis, | i , j , ( i , j ) { 0 , 1 } 2 , on the space of the two qubits; the first index is for Alice’s side.
Alice’s measurement bases are:
| a = 0 x = 0 = | 0 , | a = 1 x = 0 = | 1 , | a = 0 x = 1 = 1 2 | 0 + | 1 , | a = 1 x = 1 = 1 2 | 0 | 1 ,
whereas Bob’s ones are:
| b = 0 y = 0 = cos ϑ | 0 + sin ϑ | 1 , | b = 1 y = 0 = sin ϑ | 0 + cos ϑ | 1 , | b = 0 y = 1 = cos ϑ | 0 sin ϑ | 1 , | b = 1 y = 1 = sin ϑ | 0 + cos ϑ | 1 ,
where ϑ = π / 8 . To calculate the conditional probabilities P ( a b | x y ) = T x y , a b ( X Y A B ) , it is convenient to introduce the density operator of the entangled resource,
ϱ ( | Φ ( + ) ) = | Φ ( + ) Φ ( + ) | ,
and then, we have
T x y , a b ( X Y A B ) = a | x b | y ϱ ( | Φ ( + ) ) | a x | b y .
Carrying out the calculations, this leads to the following matrix:
T ( X Y A B ) = α β β α α β β α α β β α β α α β ,
where α = 2 + 2 8 and β = 2 2 8 .
Concerning nonlocality, the famous Clauser–Horne–Shimony–Holt inequality will read
T 00 , 00 ( X Y A B ) + T 00 , 11 ( X Y A B ) T 00 , 01 ( X Y A B ) T 00 , 10 ( X Y A B ) + T 01 , 00 ( X Y A B ) + T 01 , 11 ( X Y A B ) T 01 , 01 ( X Y A B ) T 01 , 10 ( X Y A B ) + T 10 , 00 ( X Y A B ) + T 10 , 11 ( X Y A B ) T 10 , 01 ( X Y A B ) T 10 , 10 ( X Y A B ) T 11 , 00 ( X Y A B ) T 11 , 11 ( X Y A B ) + T 11 , 01 ( X Y A B ) + T 11 , 10 ( X Y A B ) 2 .
For our choice of the basis, the left-hand side will be approx. 4 cos 2 ( π / 8 ) = 2 + 2 3.41 , which violates the inequality. This is the highest violation which is possible with a quantum setup.

2.4. Detector Imperfections

One of the most frequently studied issues with Bell-type experiments is that of detector imperfections. An imperfect detector on Alice’s side can be modeled as follows: suppose Alice has the accurate result of the measurement, but she could only communicate with Ronnie through a noisy channel, T ( A R ) . Similarly, on Bob’s side, the access to the measurement results of Bob is only available for Sam through T ( B S ) . As the detectors are at different locations, they are independent; thus, we have
T ( X Y R S ) = T ( X Y A B ) T ( A B R S ) = T ( X Y R S ) T ( A R ) T ( B S ) ,
and the signatures of nonlocality, such as the no-signaling conditions in Equation (7) or the violations of the Bell inequalities, are to be evaluated on the so-arising behavior, P ( r s | x z ) .
The observable behavior, P ( r s | x z ) , will depend on the parameters of T ( A B R S ) , such as detector efficiencies. Ref. [8] presents calculations that show which the critical values are, for which the no-signaling polytope of the given setup is shrunk by T ( A B R S ) to the local polytope—the set of behaviors not violating any Bell-type inequalities. This implies that no device-independent cryptographic protocol can be implemented with detectors worse than the threshold. This is, however, a rough picture which yields too strict a threshold. A more accurate approach is to consider the convex set of quantum correlations. The latter can be characterized by a hierarchy of semidefinite programs and it is contained inside the no-signaling polytope. The authors of [10] consider the effect of detector imperfections on this convex set.
In the present paper, our intention is to consider the effect of noisy quantum channels acting on quantum systems in a quantum Bell experiment in an analogous fashion. On the one hand, we calculate threshold values of quantum channel parameters for the violation of Bell-CHSH inequalities. More importantly, we analyze whether the presence of quantum loss and noise can be treated in a similar fashion as detector inefficiencies are treated using Equation (17).

3. Qubit Quantum Channels

Assume now that the two quantum bits do not arrive with Alice and Bob in the maximally entangled state, ϱ ( | Φ ( + ) ) , but they undergo some unwanted change on their way. For instance, optical qubits are subjected to loss or decoherence when traveling through an optical fiber. In quantum mechanics, such loss is modeled by completely positive trace preserving (CPTP) maps, i.e., quantum channels. After a brief summary of the description of the CPTP maps we will be using, we turn our attention to our main point: their effect on the behavior of the CHSH experiment.
We use the Choi–Jamiołkowski representation of CPTP maps of quantum channels to describe (quantum) loss and imperfections. A detailed introduction can be found, e.g., in [27]. Here, we just recapitulate the way of calculating the output density matrix from the input. Let H in and H out be the complex, finite-dimensional Hilbert spaces of the input and the output of the quantum channel; these are two dimensional in the case of qubits. Let us fix a basis in both spaces. A CPTP map E can be described by its Choi matrix: a Hermitian positive semidefinite matrix, X E , representing a map H in H out H in H out on the product of the two fixed bases. Then, the output of the quantum channel when its input is ϱ is calculated as
E ( ϱ ) = Tr in ϱ I X E .
Any positive semidefinite Hermitian matrix with the property
Tr out X E = I in
represents a completely positive map; thus, our analysis could be carried out for generic channels using a parametrization of these. This would, however, require to use a large number of parameters; hence, we will consider two particular types of qubit channels (as our investigation will be restricted to pairs of quantum bits). Each have a parameter p [ 0 , 1 ] ; for p = 0 , they coincide with the identity channel, whereas for p = 1 , they change state the most. The considered channel types are presented here.

3.1. Phase-Damping Channel

This is also called a dephasing channel, and acts as follows:
E ϱ 0 , 0 ϱ 0 , 1 ϱ 1 , 0 ϱ 1 , 1 = ϱ 0 , 0 ( 1 p ) ϱ 0 , 1 ( 1 p ) ϱ 1 , 0 ϱ 1 , 1 .
This channel depletes the coherences (off-diagonal elements) of the density matrix in the given basis for p = 1 , keeping the diagonals only. Hence, it is a unital channel: it keeps the completely mixed state ( 1 / 2 ) I invariant. The Choi matrix of the phase-damping channel reads
X PD = 1 0 0 1 p 0 0 0 0 0 0 0 0 1 p 0 0 1 .

3.2. Amplitude-Damping Channel

This acts as
E ϱ 0 , 0 ϱ 0 , 1 ϱ 1 , 0 ϱ 1 , 1 = ϱ 0 , 0 + p ϱ 1 , 1 1 p ϱ 0 , 1 1 p ϱ 1 , 0 ( 1 p ) ϱ 1 , 1 .
It is often used to model exponential decay. It is not unital, as it modifies the diagonal of the matrix too. The Choi representation of the amplitude-damping channel reads
X AD = 1 0 0 1 p 0 0 0 0 0 0 p 0 1 p 0 0 1 p .

4. CHSH Experiment with Quantum Imperfections

Here, we come to the main part of our investigation. Consider the aforementioned CHSH setup in which Alice and Bob choose between two measurements each, and they perform these measurements on a pair of quantum bits. Instead of having a perfect entangled resource, we assume that each of the qubits goes through a quantum channel, which can model, e.g., the noisy transmission of the quantum bit from the source of entangled quantum bits to the parties.
We assume the channel acting on Alice’s qubit and the channel acting on Bob’s qubit to be independent. That is, we neglect potential correlated imperfections at the locus of the generation of the qubit pair. It is plausible to assume that the loss and imperfections during the travel of each qubit to the given party, or its storage at the parties, can be described with a pair of independent channels.
Independent channel pairs can be described with the direct product of their Choi matrices, as described in [27] in more detail. Thus, the scenario we consider is the following. We assume that the source generates the entangled state Φ ( + ) of Equation (10). Then, the qubits are passed to Alice and Bob, going through the independent quantum channels E Alice and E Bob . Then, Alice and Bob carry out the measurements like in the original CHSH scenario. The respective behavior is calculated as in the ideal case using Equation (14), but instead of ϱ ( | Φ ( + ) ) , we use the density matrix
ϱ ent = E Alice E Bob ϱ ( | Φ ( + ) ) ,
where the action of E Alice E Bob is calculated using Equation (18), using the product of the respective qubit Choi matrices.
Let us now perform the calculations for the selected particular channel combinations. For the rest of the paper, for the sake of notational convenience, we introduce the following notations:
x = ( 1 p 1 ) ( 1 p 2 ) ,
c = cos ( π / 8 ) = 2 + 2 / 2 ,
s = sin ( π / 8 ) = 2 2 / 2 ,
c s = 2 / 4 ,
thus, c 2 s 2 = 2 c s . In the case of x, the parameters p 1 and p 2 stand for the parameter of the channel on Alice’s and Bob’s sides, respectively, regardless of whether the channel is amplitude- or phase-damping. As we will be in the need of them later, we will specify the right eigenvalues of the channel matrices T ( X Y R S ) , too. It is important to note that all the T ( X Y R S ) matrices describe a no-signaling behavior: they obey the no-signaling conditions in Equation (7) with the respective inputs and outputs.

4.1. A Pair of Phase-Damping Channels

Let us consider a pair of independent phase-damping channels with parameters p 1 and p 2 , respectively, acting on Alice’s and Bob’s sides of the entangled pair. To obtain the density matrix of the entangled resource
ϱ ( | Φ ( + ) ) = 1 2 1 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1
after the action of the channel pair, we evaluate Equation (24), with the use of the Choi matrix in Equation (21), resulting in
ϱ ent ,   PD , PD = 1 2 1 0 0 ( 1 p 1 ) ( 1 p 2 ) 0 0 0 0 0 0 0 0 ( 1 p 1 ) ( 1 p 2 ) 0 0 1 .
Using this density matrix like in Equation (14), we obtain the respective nonideal behavior, which reads
T ( X Y R S ) , PD ,   PD = 1 2 c 2 s 2 s 2 c 2 c 2 s 2 s 2 c 2 1 / 2 + c s x 2 1 / 2 c s x 2 1 / 2 c s x 2 1 / 2 + c s x 2 1 / 2 c s x 2 1 / 2 + c s x 2 1 / 2 + c s x 2 1 / 2 c s x 2 .
Its eigenvalues and their multiplicities are:
2 ( p 2 + p 1 ( p 2 1 ) + 1 ) 4 , 1 , 0 , 1 , 1 , 2 .
The left-hand side of the CHSH inequality in Equation (16) is plotted in the left part of Figure 1.

4.2. A Pair of Amplitude-Damping Channels

Next, let us discuss the case of a pair of amplitude dampings with parameters p 1 and p 2 on each side, respectively. We use the same consideration as in the previous Section, now with the Choi matrix of Equation (23). This results in the following nonideal entangled resource:
ϱ ent ,   AD , AD = 1 2 1 + p 1 p 2 0 0 ( 1 p 1 ) ( 1 p 2 ) 0 p 1 ( 1 p 2 ) 0 0 0 0 ( 1 p 1 ) p 2 0 ( 1 p 1 ) ( 1 p 2 ) 0 0 ( 1 p 1 ) ( 1 p 2 ) .
The respective behavior will be
T ( X Y R S ) , AD , AD = 1 2 c 2 + 2 c s p 1 p 2 + s 2 p 1 s 2 2 c s p 1 p 2 + c 2 p 1 c 2 c 2 p 1 2 c s x 2 s 2 s 2 p 1 + 2 c s x 2 c 2 + 2 c s p 1 p 2 + s 2 p 1 s 2 2 c s p 1 p 2 + c 2 p 1 c 2 c 2 p 1 2 c s x 2 s 2 s 2 p 1 + 2 c s x 2 1 / 2 + c s ( p 2 + x ) 1 / 2 c s ( p 2 + x ) 1 / 2 + c s ( p 2 x ) 1 / 2 c s ( p 2 x ) 1 / 2 + c s ( p 2 x ) 1 / 2 c s ( p 2 x ) 1 / 2 + c s ( p 2 + x ) 1 / 2 c s ( p 2 + x ) .
The eigenvalues and their multiplicities are
p 1 2 , 2 ( 1 p 1 ) ( 1 p 2 ) 4 , 1 , 0 , 1 , 1 , 1 , 1 .
The left-hand side of the CHSH inequality in Equation (16) is plotted in the right part of Figure 1.

4.3. Different Channels on Each Side

Now, consider the case in which, on Alice’s side, the qubit is affected by an amplitude-damping channel, while on Bob’s side, the qubit is affected by a phase-damping channel, or vice versa. Note that, because of the basis dependence of amplitude damping, the two cases are not equivalent.
Let p 1 and p 2 be the parameters of the channels on Alice’s and Bob’s side, respectively, regardless of whether it is the phase- or amplitude-damping channel. The nonideal entangled resources will be
ϱ ent ,   AD , PD = 1 2 1 0 0 1 p 2 ( 1 p 1 ) ( 1 p 2 ) 0 p 1 0 0 0 0 0 0 1 p 2 ( 1 p 1 ) ( 1 p 2 ) 0 0 1 p 1 ,
and
ϱ ent ,   PD , AD = 1 2 1 0 0 1 p 1 ( 1 p 1 ) ( 1 p 2 ) 0 0 0 0 0 0 p 2 0 1 p 1 ( 1 p 1 ) ( 1 p 2 ) 0 0 1 p 2
resulting in the following behaviors:
T ( X Y R S ) , AD ,   PD = 1 2 c 2 + s 2 p 1 s 2 + c 2 p 1 s 2 s 2 p 1 c 2 c 2 p 1 c 2 + s 2 p 1 s 2 + c 2 p 1 s 2 s 2 p 1 c 2 c 2 p 1 1 / 2 + c s 1 p 2 x 1 / 2 c s 1 p 2 x 1 / 2 c s 1 p 2 x 1 / 2 + c s 1 p 2 x 1 / 2 c s 1 p 2 x 1 / 2 + c s 1 p 2 x 1 / 2 + c s 1 p 2 x 1 / 2 c s 1 p 2 x ,
and
T ( X Y R S ) , PD ,   AD = 1 2 S 11 S 12 S 13 S 14 S 21 S 22 S 23 S 24 S 31 S 32 S 33 S 34 S 41 S 42 S 43 S 44
where
S 11 = c 2 S 21 = c 2
S 12 = s 2 S 22 = s 2
S 13 = s 2 + 2 c s p 2 S 23 = s 2 + 2 c s p 2
S 14 = c 2 2 c s p 2 S 24 = c 2 2 c s p 2
S 31 = 1 / 2 + c s ( p 2 + 1 p 1 x ) S 41 = 1 / 2 + c s ( p 2 1 p 1 x )
S 32 = 1 / 2 c s ( p 2 + 1 p 1 x ) S 42 = 1 / 2 c s ( p 2 1 p 1 x )
S 33 = 1 / 2 + c s ( p 2 1 p 1 x ) S 43 = 1 / 2 + c s ( p 2 + 1 p 1 x )
S 34 = 1 / 2 c s ( p 2 1 p 1 x ) S 44 = 1 / 2 c s ( p 2 + 1 p 1 x ) .
The eigenvalues and their multiplicities of T ( X Y R S ) , AD ,   PD are:
1 p 1 ( p 2 1 ) 2 2 , p 1 2 , 1 , 0 , ( 1 , 1 , 1 , 1 ) ,
while those of T ( X Y R S ) , PD ,   AD read:
( p 1 1 ) 1 p 2 2 2 , 1 , 0 , ( 1 , 1 , 2 ) .
The left-hand side of the CHSH inequality in Equation (16) for these cases is plotted in Figure 2.

5. Decomposability of Behaviors

The question naturally arises whether the impact of the quantum channels, as modeled by the CPTP maps, can be replaced on the behavior’s level by the composition of the ideal behavior with an effective noise channel. In other words, we ask whether the behavior T ( X Y R S ) obtained in the CHSH experiment—performing the original ideal measurement after the entangled state—was subjected to the effect of a pair of quantum noise channels, and whether it can be written as a composition of the ideal T ( X Y A B ) given in Equation (15) and an effective classical noise channel T ( A B R S ) as follows:
T ( X Y R S ) = T ( X Y A B ) T ( A B R S ) .
This seems plausible, and because of the CPTP maps are independent, one may even expect T ( A B R S ) to be in a product form, as in the case of modeling detector inefficiencies in Equation (17). Somewhat surprisingly, at least in case of the studied CPTP map pairs, it is not the case.
Mathematically, we are searching for T ( A B R S ) , obeying Equation (50), while the other two matrices are fixed. In addition, T ( A B R S ) has to be a stochastic matrix as it represents a channel. Let us postpone, for the time being, the check of the stochasticity and investigate other necessary conditions for any T ( A B R S ) obeying Equation (50) to exist. The problem of finding T ( A B R S ) is a matrix inversion. However, T ( X Y A B ) is singular, and so is T ( X Y R S ) , at least for the studied CPTP map pairs. Hence, a necessary condition for the desired T ( A B R S ) to exist is that the left null space of the “ideal” channel, T ( X Y A B ) , is contained in the left null space of the “observed” channel, T ( X Y R S ) .
The eigenvalues of T ( X Y A B ) are 1 , β α , 0 , 0 and the corresponding right eigenvectors read:
1 1 1 1 , α α α 2 α + β , 1 0 0 1 , 0 1 1 0 ,
where the parameters α = c 2 / 2 and β = s 2 / 2 are the same as in Equation (15). The left null space is orthogonal to those right eigenvectors that correspond to nonzero eigenvalues. Hence, this is a rank-2 matrix.
Let us now briefly consider the marginals defined in Equation (9); these are the behaviors T ( X R ) and T ( Y S ) , observable on each individual side. Note that these could be obtained by applying the quantum channel on the given side to the respective part of the entangled resource, and then the measurement results can be calculated locally. In the case of the Bell-CHSH situation, the entangled resource is a Bell state; thus, the subsystems are in a completely mixed state. As these local behaviors depend on the channel on the given side, they can be calculated for the two channel types, regardless of the channel on the other side. The phase-damping channel is unital, i.e., it does not alter the completely mixed state. Thus, it does not affect the local behavior; it remains
T PD ,   A = T PD ,   B = 1 2 1 1 1 1 .
In the case of amplitude damping with parameter p, we obtain
T AD ,   A = 1 2 1 + p 1 p 1 1 , T AD ,   B = 1 2 1 + 2 c s p 1 2 c s p 1 + 2 c s p 1 2 c s p
on Alice’s and Bob’s sides, respectively. (Recall that the measurement bases differ on the two sides.) It is interesting to note that, on Bob’s side, we can decompose the local behavior T AD ,   B into the product of the ideal local behavior and a noise channel:
1 2 1 1 1 1 1 2 1 + 2 c s p 1 2 c s p 1 + 2 c s p 1 2 c s p = 1 2 1 + 2 c s p 1 2 c s p 1 + 2 c s p 1 2 c s p .
This is, however, not possible on Alice’s side; this is because, while the ideal behavior is rank-1, the noisy behavior is a full-rank matrix.
Returning now to the question of joint behaviors, consider first the case when the local marginals are such that the output distribution is independent from the condition, i.e., the input. This is the case for the ideal behavior in which case Alice and Bob both observe a uniform distribution of their outputs locally, regardless of the input. In such case, there is only a single free parameter for the output distribution; therefore, the corresponding row must stay inside a two-dimensional subspace. Hence, all rows of the channel matrix must come from the same two dimensions and thus the rank of the matrix must be 2 (or 1). Apart from the ideal case, this holds whenever there is no amplitude-damping channel on Alice’s side. If there is one, it results in a rank-3 T ( X Y R S ) (in the nontrivial cases). Therefore, it cannot be decomposed into the product of the ideal (rank-2) behavior and any classical (even correlated) noise channel.
Let us now investigate the remaining cases when there is no amplitude damping on Alice’s side. Here, the rank stays, at most, at 2, so this does not exclude the decomposition. For the decomposition to exist, the left null spaces of the matrices T ( X Y A B ) and T ( X Y R S ) have to coincide (this is necessary but not sufficient condition though). The left null spaces are determined by the two right eigenvectors with nonzero eigenvalue. One of the right eigenvectors coincides for T ( X Y A B ) and T ( X Y R S ) as they are stochastic matrices. Thus, for the null spaces to coincide, either T ( X Y R S ) could have rank 1, which describes complete information erasure channels. This does not hold in our examples apart from some trivial extreme cases. For the nontrivial, rank-2 case, comparing its eigenvectors with the ones in Equation (51) of the ideal matrix, the second eigenvector of T ( X Y R S ) with nonzero eigenvalue must have the form
v = ξ ξ ξ η ,
where the ratio of ξ and η is irrelevant; so, we have a single free parameter. In the behavior matrix, every row corresponds to a specific choice of ξ and η . This has to be compared with the eigenvectors of the channel matrices of Equations (31), (34), (38), and (39). We have verified numerically that, for the case of the pair of phase-damping channels, no right eigenvector v of the form in Equation (55) exists.
For the case of phase damping on Alice’s side and amplitude damping on Bob’s, the verification of the existence of the eigenvector in the form of Equation (55) is a more complicated question. To find T ( A B R S ) , PD ,   AD , first, we conduct a numerical investigation: we plot the difference between the second and third coordinates of the respective eigenvector—this should be zero for the vector to obey the desired form in Equation (55); the result is displayed in Figure 3.
Based on this numerical evaluation, our conjecture is that, to have a nontrivial solution, ( 1 p 1 ) 2 = 1 p 2 should hold for the channel parameters. Furthermore, indeed, if this condition is satisfied, the observable behavior takes the form
T ( X Y R S ) , PD ,   AD = 1 2 c 2 s 2 s 2 + 2 c s p 2 c 2 2 c s p 2 c 2 s 2 s 2 + 2 c s p 2 c 2 2 c s p 2 c 2 s 2 s 2 + 2 c s p 2 c 2 2 c s p 2 s 2 + 2 c s p 2 c 2 2 c s p 2 c 2 s 2 .
As the first three rows are apparently equal, we assume a particular form of the pseudo inverse:
1 2 c 2 s 2 s 2 c 2 c 2 s 2 s 2 c 2 c 2 s 2 s 2 c 2 c 2 s 2 s 2 c 2 α 1 α 2 α 3 α 4 β 1 β 2 β 2 β 4 0 0 0 0 0 0 0 0 = 1 2 c 2 s 2 s 2 + 2 c s p 2 c 2 2 c s p 2 c 2 s 2 s 2 + 2 c s p 2 c 2 2 c s p 2 c 2 s 2 s 2 + 2 c s p 2 c 2 2 c s p 2 s 2 + 2 c s p 2 c 2 2 c s p 2 c 2 s 2 .
Using standard linear algebra, this equation can be solved; thus, the pseudo inverse reads:
α 1 α 2 α 3 α 4 β 1 β 2 β 2 β 4 0 0 0 0 0 0 0 0 = 1 s 2 p 2 s 2 p 2 c 2 p 2 1 c 2 p 2 c 2 p 2 1 c 2 p 2 1 s 2 p 2 s 2 p 2 0 0 0 0 0 0 0 0 .
This is not a stochastic matrix yet. However, as in T ( X Y A B ) , the first column is identical to the last and the second is identical to the third; there is a freedom in interchanging and rearranging the elements within the first and last rows, as well as within the second and third rows. Since c 2 p 2 1 and s 2 p 2 1 , each component of the matrix will be non-negative. We can obtain the desired pseudo inverse matrix, e.g.,:
T ( A B R S ) , PD ,   AD = 1 s 2 p 2 s 2 p 2 0 0 c 2 p 2 1 c 2 p 2 0 0 0 0 1 s 2 p 2 s 2 p 2 0 0 c 2 p 2 1 c 2 p 2 .
Thus, in the PD-AD case, the behavior is decomposable under nontrivial conditions, and the decomposition is not trivial.
In summary, albeit it cannot be excluded in general, in the specified cases, the nonideal behavior cannot be obtained as a decomposition of the form of Equation (50). The impact of quantum channels cannot be taken into account with an equivalent effective classical noise channel.

6. Conclusions and Outlook

We have studied the nonlocal behavior of the CHSH-Bell experiment under the presence of quantum noise affecting the elements of the entangled resource separately. To gain insight into how such imperfections influence the system, we adopted a picture of classical memoryless channels. Our main contribution is this picture of the imperfect Bell experiment, and the study of the decomposability of the so-arising classical channel.
Although we examined only a few basic examples, these demonstrate that the manner in which quantum nonlocality is disrupted by quantum channels differs from how detector imperfections affect such scenarios. Specifically, the modified nonlocal behavior is not equivalent to the behavior obtainable by sending ideal measurement results through a classical channel that models local noise. In the case of unital channels, the change in the local behavior can at least be viewed as a composition of ideal behavior and classical noise; however, this approach proves to be impossible for amplitude damping. This implies that, when studying the effects of imperfections—such as, e.g., on a device-independent quantum key distribution scheme—considering only the impact of local classical noise (e.g., detector inefficiencies) does not provide a complete picture. Quantum imperfections can cause changes that are not equivalent to detector imperfections; this has to be taken into account when analyzing entanglement-based protocols.
Even though our contribution is mainly theoretical and aims to build deeper understanding of the nonlocal behavior in a Bell-CHSH experiment based on the picture of a classical channel between the input pair and the output pair, the introduced technique can be useful in experimental or theoretical scenarios involving two-qubit Bell experiments. One could gain detailed insights into changes in behavior due to the imperfections by carrying out the consideration described here, for the case of the actual CPTP maps describing a practical scenario. This can be determined, e.g., via quantum channel tomography [28], which can be addressed with machine learning approaches too [29]. In this way, the change in the behavior can be analyzed, and the decomposability to the ideal behavior and classical noise channel can be addressed. The additional effect of detector efficiencies can also be considered.
Our consideration can be generalized to arbitrary pairs of qubit channels. For instance, the example in Ref. [25] considers a pair of identical amplitude-damping channels acting on a singlet state; this could be another example to study as the amplitude-damping process modifies the singlet state in a way different from the entangled resource considered by us. Further, by considering the Choi representation of the most general channels, we can see that, through the linear space of semidefinite matrices—with a trace condition and the property of positive semidefiniteness—a fully general description can be obtained. Relaxing the condition of positive semidefiniteness would introduce nonphysical channels, but the calculation remains feasible. The large number of parameters, however, would make the study less transparent. It would therefore be interesting to identify more useful general conditions on decomposability, and this could potentially applicable to many-input–many-output or multiparty scenarios.

Author Contributions

Conceptualization, M.K.; methodology, M.K., A.B., and O.H.; software, O.H.; validation, O.H., A.B., and P.A.; formal analysis, O.H. and A.B.; investigation, O.H.; writing—original draft preparation, M.K. and A.B.; writing—review and editing, M.K. and P.A.; visualization, O.H.; supervision, M.K. and P.A.; funding acquisition, P.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Research, Development, and Innovation Office of Hungary under the “Frontline” Research Excellence Program, (Grant. No. KKP 133827), Project no. TKP2021-NVA-04, and the Quantum Information National Laboratory of Hungary (Grant No. 2022-2.1.1-NL-2022-00004). This project has received funding from the European Union under grant agreement No. (QCIHungary project).

Data Availability Statement

This is an analytical study, no data were generated.

Acknowledgments

The authors thank Andrew B. Frigyik for the final grammar revision of the manuscript and their useful comments.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Brunner, N.; Cavalcanti, D.; Pironio, S.; Scarani, V.; Wehner, S. Bell nonlocality. Rev. Mod. Phys. 2014, 86, 419–478. [Google Scholar] [CrossRef]
  2. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed]
  3. Clauser, J.F.; Horne, M.A.; Shimony, A.; Holt, R.A. Proposed Experiment to Test Local Hidden-Variable Theories. Phys. Rev. Lett. 1969, 23, 880–884. [Google Scholar] [CrossRef]
  4. Mayers, D.; Yao, A. Quantum cryptography with imperfect apparatus. In Proceedings of the 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280), Palo Alto, CA, USA, 8–11 November 1998; pp. 503–509. [Google Scholar] [CrossRef]
  5. Vazirani, U.; Vidick, T. Fully Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 2014, 113, 140501. [Google Scholar] [CrossRef]
  6. Grasselli, F. Device-Independent Quantum Cryptography. In Quantum Cryptography: From Key Distribution to Conference Key Agreement; Springer International Publishing: Cham, Switzerland, 2021; pp. 105–148. [Google Scholar] [CrossRef]
  7. Acín, A.; Gisin, N.; Masanes, L. From Bell’s Theorem to Secure Quantum Key Distribution. Phys. Rev. Lett. 2006, 97, 120405. [Google Scholar] [CrossRef]
  8. Wilms, J.; Disser, Y.; Alber, G.; Percival, I.C. Local realism, detection efficiencies, and probability polytopes. Phys. Rev. A 2008, 78, 032116. [Google Scholar] [CrossRef]
  9. Koniorczyk, M.; Bodor, A. No-Signaling in Quantum Mechanics. J. Russ. Laser Res. 2018, 39, 376–381. [Google Scholar] [CrossRef]
  10. Sauer, A.; Alber, G. Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming. Cryptography 2020, 4, 2. [Google Scholar] [CrossRef]
  11. Kaszlikowski, D.; Gnaciński, P.; Żukowski, M.; Miklaszewski, W.; Zeilinger, A. Violations of Local Realism by Two Entangled N-Dimensional Systems Are Stronger than for Two Qubits. Phys. Rev. Lett. 2000, 85, 4418–4421. [Google Scholar] [CrossRef]
  12. Acín, A.; Durt, T.; Gisin, N.; Latorre, J.I. Quantum nonlocality in two three-level systems. Phys. Rev. A 2002, 65, 052325. [Google Scholar] [CrossRef]
  13. Pérez-García, D.; Wolf, M.M.; Palazuelos, C.; Villanueva, I.; Junge, M. Unbounded Violation of Tripartite Bell Inequalities. Commun. Math. Phys. 2008, 279, 455–486. [Google Scholar] [CrossRef]
  14. Junge, M.; Palazuelos, C.; Pérez-García, D.; Villanueva, I.; Wolf, M.M. Operator Space Theory: A Natural Framework for Bell Inequalities. Phys. Rev. Lett. 2010, 104, 170405. [Google Scholar] [CrossRef] [PubMed]
  15. Massar, S. Nonlocality, closing the detection loophole, and communication complexity. Phys. Rev. A 2002, 65, 032121. [Google Scholar] [CrossRef]
  16. Massar, S.; Pironio, S.; Roland, J.; Gisin, B. Bell inequalities resistant to detector inefficiency. Phys. Rev. A 2002, 66, 052112. [Google Scholar] [CrossRef]
  17. Pirandola, S. Satellite quantum communications: Fundamental bounds and practical security. Phys. Rev. Res. 2021, 3, 23130. [Google Scholar] [CrossRef]
  18. Khanna, A.; Majumder, S.; Jain, A.; Singh, D.K. Quantum BER estimation modelling and analysis for satellite-based quantum key distribution scenarios. IET Quantum Commun. 2023, 5, 157–163. [Google Scholar] [CrossRef]
  19. Sisodia, M.; Omshankar; Venkataraman, V.; Ghosh, J. FSO-QKD protocols under free-space losses and device imperfections: A comparative study. Quantum Inf. Process. 2024, 23, 185. [Google Scholar] [CrossRef]
  20. Semenov, A.A.; Vogel, W. Entanglement transfer through the turbulent atmosphere. Phys. Rev. A 2010, 81, 23835. [Google Scholar] [CrossRef]
  21. Horodecki, M.; Shor, P.W.; Ruskai, M.B. Entanglement Breaking Channels. Rev. Math. Phys. 2003, 15, 629–641. [Google Scholar] [CrossRef]
  22. Ruskai, M.B. Qubit Entanglement Breaking Channels. Rev. Math. Phys. 2003, 15, 643–662. [Google Scholar] [CrossRef]
  23. Arnon-Friedman, R.; Dupuis, F.; Fawzi, O.; Renner, R.; Vidick, T. Practical device-independent quantum cryptography via entropy accumulation. Nat. Commun. 2018, 9, 459. [Google Scholar] [CrossRef] [PubMed]
  24. Rastegin, A.E. On generalized entropies and information-theoretic Bell inequalities under decoherence. Ann. Phys. 2015, 355, 241–257. [Google Scholar] [CrossRef]
  25. Ma, W.; Xu, S.; Shi, J.; Ye, L. Quantum correlation versus Bell inequality violation under the amplitude damping channel. Phys. Lett. A 2015, 379, 2802–2807. [Google Scholar] [CrossRef]
  26. Park, D.; Son, J.W.; Cha, S.K.; Seo, E.D. Effect of Decoherence in Ekert-Protocol. arXiv 2009, arXiv:0906.0233. [Google Scholar]
  27. Homa, G.; Ortega, A.; Koniorczyk, M. Choi representation of completely positive maps in brief. Z. Naturforschung A 2024, 79, 1123–1133. [Google Scholar] [CrossRef]
  28. D’Ariano, G.M.; Lo Presti, P. Quantum Tomography for Measuring Experimentally the Matrix Elements of an Arbitrary Quantum Operation. Phys. Rev. Lett. 2001, 86, 4195–4198. [Google Scholar] [CrossRef]
  29. Torlai, G.; Wood, C.J.; Acharya, A.; Carleo, G.; Carrasquilla, J.; Aolita, L. Quantum process tomography with unsupervised learning and tensor networks. Nat. Commun. 2023, 14, 2858. [Google Scholar] [CrossRef]
Figure 1. The left-hand side of CHSH inequality as a function of quantum channel parameters. (Left): two phase-damping channels. (Right): two amplitude-damping channels. The dashed line represents the local bound.
Figure 1. The left-hand side of CHSH inequality as a function of quantum channel parameters. (Left): two phase-damping channels. (Right): two amplitude-damping channels. The dashed line represents the local bound.
Cryptography 09 00025 g001
Figure 2. The left-hand side of CHSH inequality as a function of quantum channel parameters. (Left): phase damping at Alice, amplitude damping at Bob. (Right): amplitude damping at Alice, phase damping at Bob.
Figure 2. The left-hand side of CHSH inequality as a function of quantum channel parameters. (Left): phase damping at Alice, amplitude damping at Bob. (Right): amplitude damping at Alice, phase damping at Bob.
Cryptography 09 00025 g002
Figure 3. Numerical evaluation of the difference of the second and third coordinates of the relevant eigenvector in the PD-AD case. The plotted quantity should be zero for the channel to be decomposable. The nontrivial solutions appear on the parabola ( 1 p 1 ) 2 = 1 p 2 , plotted with dashed lines; this conjecture has been confirmed by the analytical consideration.
Figure 3. Numerical evaluation of the difference of the second and third coordinates of the relevant eigenvector in the PD-AD case. The plotted quantity should be zero for the channel to be decomposable. The nontrivial solutions appear on the parabola ( 1 p 1 ) 2 = 1 p 2 , plotted with dashed lines; this conjecture has been confirmed by the analytical consideration.
Cryptography 09 00025 g003
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hanyecz, O.; Bodor, A.; Adam, P.; Koniorczyk, M. Bell–Clauser–Horne–Shimony–Holt Behavior Under Quantum Loss and Decoherence. Cryptography 2025, 9, 25. https://doi.org/10.3390/cryptography9020025

AMA Style

Hanyecz O, Bodor A, Adam P, Koniorczyk M. Bell–Clauser–Horne–Shimony–Holt Behavior Under Quantum Loss and Decoherence. Cryptography. 2025; 9(2):25. https://doi.org/10.3390/cryptography9020025

Chicago/Turabian Style

Hanyecz, Ottó, András Bodor, Peter Adam, and Mátyás Koniorczyk. 2025. "Bell–Clauser–Horne–Shimony–Holt Behavior Under Quantum Loss and Decoherence" Cryptography 9, no. 2: 25. https://doi.org/10.3390/cryptography9020025

APA Style

Hanyecz, O., Bodor, A., Adam, P., & Koniorczyk, M. (2025). Bell–Clauser–Horne–Shimony–Holt Behavior Under Quantum Loss and Decoherence. Cryptography, 9(2), 25. https://doi.org/10.3390/cryptography9020025

Article Metrics

Back to TopTop