Entanglement in action
Download the slides for this lesson.
Introduction
In this lesson we will take a look at three fundamentally important examples. The first two are the teleportation and superdense coding protocols, which are principally concerned with the transmission of information from a sender to a receiver. The third example is an abstract game, called the CHSH game, which illustrates a phenomenon in quantum information that is sometimes referred to as nonlocality. (The CHSH game is not always described as a game. It is often described instead as an experiment — specifically, it is an example of a Bell test — and is referred to as the CHSH inequality.)
Teleportation, superdense coding, and the CHSH game are not merely examples meant to illustrate how quantum information works (although they do serve well in this regard). Rather, they are stones in the foundation of quantum information. Entanglement plays a key role in all three examples, so this lesson provides the first opportunity in this series to see entanglement in action, and to begin to explore what it is that makes entanglement such an interesting and important concept.
Before proceeding to the examples themselves, a few preliminary comments connected with all three examples are in order.
Alice and Bob
Alice and Bob are names traditionally given to hypothetical entities or agents in systems, protocols, games, and other interactions that involve the exchange of information. While these are names typically given to humans, it should be understood that they represent abstractions and not necessarily actual human beings — so Alice and Bob might be expected to perform complex computations, for instance.
These names were first used in this way in the 1970s in the context of cryptography, but the convention has become common more broadly since then. The idea is simply that these are common names (at least in some parts of the world) that start with the letters A and B. It is also quite convenient to refer to Alice with the pronoun "her" and Bob with the pronoun "him" for the sake of brevity.
By default, we imagine that Alice and Bob are in different locations. They may have different goals and behaviors depending on the context in which they arise. For example, in communication, meaning the transmission of information, we might decide to use the name Alice to refer to the sender and Bob to refer to the receiver of whatever information is transmitted. In general, it may be that Alice and Bob cooperate, which is typical of a wide range of settings — but in other settings they may be in competition, or they may have different goals that may or may not be consistent or harmonious. These things must be made clear in the situation at hand.
We can also introduce additional characters, such as Charlie and Diane, as needed. Other names that represent different personas, such as Eve for an eavesdropper or Mallory for someone behaving maliciously, are also sometimes used.
Alice and Bob appear in all three of the examples to be discussed in this lesson, and we will encounter them from time to time in subsequent lessons.
Entanglement as a resource
Recall this example of an entangled quantum state of two qubits from Lesson 2:
It is one of the four Bell states, and is often viewed as the archetypal example of an entangled quantum state.
We also encountered this example of a probabilistic state of two bits:
It is, in some sense, analogous to the entangled quantum state It represents a probabilistic state in which two bits are correlated, but it is not entangled. Entanglement is a uniquely quantum phenomenon, essentially by definition: in simplified terms, entanglement refers to any non-classical quantum correlation.
Unfortunately, defining entanglement as non-classical quantum correlation is somewhat unsatisfying at an intuitive level, because it's a definition of entanglement is in terms of what it is not. It may be for this reason that it's actually rather challenging to explain precisely what entanglement is, and what makes it special, in intuitive terms.
Typical explanations of entanglement often fail to distinguish the two states and in a meaningful way. For example, it is sometimes said that if one of two entangled qubits is measured, then the state of the other qubit is somehow instantaneously affected; or that the state of the two qubits together cannot be described separately; or that the two qubits somehow maintain a memory of each other. These statements are not false — but why are they not also true for the (unentangled) probabilistic state ? The two bits represented by this state are intimately connected: each one has a perfect memory of the other in a literal sense. But it is nevertheless not entangled.
One way to explain what makes entanglement special, and what makes the quantum state very different from the probabilistic state is to explain what can be done with entanglement, or what we can see happening because of entanglement, that goes beyond the decisions we make about how to represent our knowledge of states using vectors. All three of the examples to be discussed in this lesson have this nature, in that they illustrate things that can be done with the state that cannot be done with any classically correlated state, including the state
Indeed, it is typical in the study of quantum information and computation that entanglement is viewed as a resource through which different tasks can be accomplished. When this is done, the state is viewed as representing one unit of entanglement, which we refer to as an e-bit. (The "e" stands for "entangled" or "entanglement." While it is true that the state is a state of two qubits, the quantity of entanglement that it represents is one e-bit.)
Incidentally, we can also view the probabilistic state as a resource, which is one bit of shared randomness. It can be very useful in cryptography, for instance, to share a random bit with somebody (presuming that nobody else knows what the bit is), so that it can be used as a private key (or part of a private key) for the sake of encryption. But in this lesson the focus is on entanglement and a few things we can do with it.
As a point of clarification regarding terminology, when we say that Alice and Bob share an e-bit, what we mean is that Alice has a qubit named Bob has a qubit named and together the pair is in the quantum state Different names could, of course, be chosen for the qubits, but throughout this lesson we will stick with these names in the interest of clarity.
Teleportation
Quantum teleportation, or just teleportation for short, is a protocol where a sender (Alice) transmits a qubit to a receiver (Bob) by making use of a shared entangled quantum state (one e-bit, to be specific) along with two bits of classical communication. The name teleportation is meant to be suggestive of the concept in science fiction where matter is transported from one location to another by a futuristic process, but it must be understood that matter is not teleported in quantum teleportation — what is actually teleported is quantum information.
The set-up for teleportation is as follows.
We assume that Alice and Bob share an e-bit: Alice holds a qubit Bob holds a qubit and together the pair is in the state It could be, for instance, that Alice and Bob were in the same location in the past, they prepared the qubits and in the state and then each went their own way with their qubit in hand. Or, it could be that a different process, such as one involving a third party or a complex distributed process, was used to establish this shared e-bit. These details are not part of the teleportation protocol itself.
Alice then comes into possession of a third qubit that she wishes to transmit to Bob. The state of the qubit is considered to be unknown to Alice and Bob, and no assumptions are made about it. For example, the qubit might be entangled with one or more other systems that neither Alice nor Bob can access. To say that Alice wishes to transmit the qubit to Bob means that Alice would like Bob to be holding a qubit that is in the same state that was in at the start of the protocol, having whatever correlations that had with other systems, as if Alice had physically handed to Bob.
We can, of course, imagine that Alice physically sends the qubit to Bob, and presuming that reaches Bob without being altered or disturbed in transit, Alice and Bob's task will be accomplished. In the context of teleportation, however, it is our assumption that it is not possible for Alice to physically send to Bob. She may, however, send classical information to Bob.
These are reasonable assumptions in a variety of settings. For example, if Alice does not know Bob's exact location, or the distance between them is large, physically sending a qubit using the technology of today, or the foreseeable future, would be challenging to say the least. However, as we know from everyday experiences, classical information transmission under these circumstances is quite straightforward.
At this point, one might ask whether it is possible for Alice and Bob to accomplish their task without even needing to make use of a shared e-bit. In other words, is there any way to transmit a qubit using classical communication alone? The answer is no, it is not possible to transmit quantum information using classical communication alone. This is not too difficult to prove using basic quantum information theory covered in the third unit of this series — but for now, an intuitive way to rule out the possibility of transmitting qubits using classical communication alone is to think about the no-cloning theorem.
Imagine that there was a way to send quantum information using classical communication alone. Classical information can easily be copied and broadcast, which means that any classical transmission from Alice to Bob might also potentially be received by a second receiver (Charlie, let us say). But if Charlie receives the same classical communication that Bob received, then would he not also be able to obtain a copy of the qubit This would suggest that was cloned, which we already know is impossible from the no-cloning theorem. So, we conclude that there is no way to send quantum information using classical communication alone.
When the assumption that Alice and Bob share an e-bit is in place, however, it is possible for Alice and Bob to accomplish their task. This is precisely what the quantum teleportation protocol does.
Protocol
Here is a quantum circuit diagram that describes the teleportation protocol:
The diagram is slightly stylized in that it depicts the separation between Alice and Bob, with two diagonal wires representing classical bits that are sent from Alice to Bob, but otherwise it is an ordinary quantum circuit diagram.
In words, the teleportation protocol is as follows:
Alice performs a controlled-NOT operation on the pair with being the control and being the target, and then performs a Hadamard operation on
Alice then measures both and with respect to a standard basis measurement in both cases, and transmits the classical outcomes to Bob. Let us refer to the outcome of the measurement of as and the outcome of the measurement of as
Bob receives and from Alice, and depending on the values of these bits he performs these operations:
- If then Bob performs a bit flip (or gate) on his qubit
- If then Bob performs a phase flip (or gate) on his qubit
That is, conditioned on being or Bob performs one of the operations or on the qubit
This is the complete description of the teleportation protocol. The analysis that appears below reveals that when it is run, the qubit will be in whatever state was in prior to the protocol being executed, including whatever correlations it had with any other systems — which is to say that the protocol has effectively implemented a perfect qubit communication channel, where the state of has been "teleported" into
Before proceeding to the analysis, notice that this protocol does not succeed in cloning the state of which we already know is impossible by the no-cloning theorem. Rather, when the protocol is finished, the state of the qubit will have changed from its original value to as a result of the measurement performed on it. Also notice that the e-bit has effectively been "burned" in the process: the state of has changed to and is no longer entangled with (or any other system). This is the cost of teleportation.
Analysis
To analyze the teleportation protocol, we'll examine the behavior of the circuit described above, one step at a time, beginning with the situation in which is initially in the state This is not the most general situation, as it does not capture the possibility that is entangled with other systems, but starting with this simpler case will add clarity to the analysis. The more general case is addressed below, following the analysis of the simpler case.
Specifically, we will consider the states of the qubits at the times suggested by this figure:
Under the assumption that the qubit begins the protocol in the state the state of the three qubits together at the start of the protocol is therefore
The first gate that is performed is the controlled-NOT gate, which transforms the state into
Then the Hadamard gate is applied, which transforms the state into
Using the multilinearity of the tensor product, we may alternatively write this state as follows:
At first glance, it might look like something magical has happened, because the leftmost qubit now seems to depend on the numbers and even though there has not yet been any communication from Alice to Bob. This is, in fact, an illusion: scalars float freely through tensor products, so and are neither more nor less associated with the leftmost qubit than they are with the other qubits. All we have done is to use algebra to express the state in a way that facilitates an analysis of the measurements.
Now let us consider the four possible outcomes of Alice's standard basis measurements, together with the actions that Bob performs as a result.
Possible outcomes
The outcome of Alice's measurement is with probability
in which case the state of becomes
Bob does nothing in this case, and so this is the final state of these three qubits.
The outcome of Alice's measurement is with probability
in which case the state of becomes
In this case Bob applies a gate to leaving in the state
The outcome of Alice's measurement is with probability
in which case the state of becomes
In this case, Bob applies an gate to the qubit leaving in the state
The outcome of Alice's measurement is with probability
in which case the state of becomes
In this case, Bob performs the operation on the qubit leaving in the state
We now see, in all four cases, that Bob's qubit is left in the state at the end of the protocol, which is the initial state of the qubit This is what we wanted to show: the teleportation protocol has worked correctly in the case at hand.
We also see that the qubits and are left in one of the four states or each with probability depending upon the measurement outcomes that Alice obtained. Thus, as was already suggested above, at the end of the protocol Alice no longer has the state which is expected by the no-cloning theorem.
Also notice that Alice's measurements yield absolutely no information about the state That is, the probability for each of the four possible measurement outcomes is irrespective of and This is also essential for teleportation to work correctly: extracting information from an unknown quantum state necessarily disturbs it in general, but here Bob obtains the state without it being disturbed.
Now let us consider the more general situation in which the qubit is initially entangled with another system, which we will name A similar analysis to the one above reveals that the teleportation protocol functions correctly in this more general case: at the end of the protocol, the qubit held by Bob is entangled with in the same way that was at the start of the protocol, as if Alice had simply handed to Bob.
To prove this, let us suppose that the state of the pair is initially given by a quantum state vector of the form
where and are unit vectors and and are complex numbers satisfying Any quantum state vector of the pair can be expressed in this way.
The following figure depicts the same circuit as before, with the addition of the system (represented by a collection of qubits on the top of the diagram that nothing happens to).
To analyze what happens when the teleportation protocol is run, it is helpful to permute the systems, along the same lines that was described in Lesson 2. Specifically, we will consider the state of the systems in the order rather than The names of the various systems will be included as subscripts in the expressions that follow for the sake of clarity.
At the start of the protocol, the state of these systems is as follows:
First the controlled-NOT gate is applied, which transforms this state to
Then the Hadamard gate is applied. After expanding and simplifying the resulting state, along similar lines to the analysis of the simpler case above, we obtain this expression of the resulting state:
Proceeding exactly as before, where we consider the four different possible outcomes of Alice's measurements along with the corresponding actions performed by Bob, we find that at the end of the protocol, the state of is always
Informally speaking, the analysis does not change in a significant way as compared with the simpler case above; and essentially just "come along for the ride." So, teleportation succeeds in creating a perfect quantum communication channel, effectively transmitting the contents of the qubit into and preserving all correlations with any other systems.
As it turns out, this is actually not surprising given the analysis of the simpler case above. As that analysis revealed, we have a physical process that acts like the identity operation on a qubit in an arbitrary quantum state, and there is only one way that can happen: the operation implemented by the protocol must be the identity operation. That is, once we know that teleportation works correctly for a single qubit in isolation, we can conclude that the protocol effectively implements a perfect, noiseless quantum channel, and so it must work correctly even if the input qubit is entangled with another system. A proper explanation of this conclusion requires the general formulation of quantum information, to be covered in Unit 3 of the series, but the point is that by linearity there really wasn't a need to go through the more general analysis.
Further discussion
Here are a few brief, concluding remarks on teleportation.
First, it should be understood that teleportation is not an application of quantum information, it's a protocol for performing quantum communication. It is only useful insofar as quantum communication is useful.
Second, it is reasonable to speculate that teleportation could one day become a standard way to communicate quantum information, perhaps through a process known as entanglement distillation. This is a process that converts a larger number of noisy (or imperfect) e-bits into a smaller number of high-quality e-bits, that could then be used for noiseless or near-noiseless teleportation. The idea is that the process of entanglement distillation is not as delicate as direct quantum communication. We could accept losses, for instance, and if the process doesn't work out, then we can just try again. In contrast, the actual qubits we hope to communicate might be much more precious.
Finally, the idea behind teleportation and the way that it works is quite fundamental in quantum information and computation. It is a cornerstone of quantum information theory, and variations on the idea also often arise. As just one example, quantum gates can be implemented using teleportation, but where different initial states and measurements are chosen so that the outcome is to apply a chosen operation rather than to communicate.
Qiskit implementation
No output produced
Here is a quantum circuit implementation of the teleportation protocol.
Output:
The circuit makes use of a few features of Qiskit that we've not yet seen in previous lessons, including the
The circuit first initializes to be in a state (which is not part of the protocol itself), followed by Alice's operations, then her measurements, and finally Bob's operations.
To test that the protocol works correctly, we'll apply a randomly generated single-qubit gate to the initialized state of to obtain a random quantum state vector to be teleported. By applying the inverse (i.e., conjugate transpose) of that gate to after the protocol is run, we can verify that the state was teleported by measuring to see that it has returned to the state.
First we'll randomly choose a unitary qubit gate.
Output:
array([[-9.99999078e-01+0.j , 8.19563447e-04-0.00108289j],
[ 1.24668618e-03+0.00053861j, 8.70230844e-01-0.4926423j ]])
Now we'll create a new testing circuit that first applies our random gate to then runs the teleportation circuit, and finally applies the inverse of our random gate to the qubit and measures. The outcome should be with certainty.
Output:
Finally let's run the Aer simulator on this circuit and plot a histogram of the outputs. We'll see the statistics for all three classical bits: the bottom/leftmost bit should always be indicating that the qubit was successfully teleported into while the other two bits should be roughly uniform.
Output:
We can also filter the statistics to focus just on the test result qubit if we wish, like this:
Output:
Superdense coding
Superdense coding is a protocol that, in some sense, achieves a complementary aim to teleportation. Rather than allowing for the transmission of one qubit using two classical bits of communication (at the cost of one e-bit of entanglement), it allows for the transmission of two classical bits using one qubit of quantum communication (again, at the cost of one e-bit of entanglement).
In greater detail, we have a sender (Alice) and a receiver (Bob) that share one e-bit of entanglement. According to the conventions in place for the lesson, this means that Alice holds a qubit Bob holds a qubit and together the pair is in the state Alice wishes to transmit two classical bits to Bob, which we'll denoted by and and she will accomplish this by sending him one qubit.
It is reasonable to view this feat as being less interesting than the one that teleportation accomplishes. Sending qubits is likely to be so much more difficult than sending classical bits for the foreseeable future that trading one qubit of quantum communication for two bits of classical communication, at the cost of an e-bit no less, hardly seems worth it. However, this does not imply that superdense coding is not interesting, for it most certainly is.
Fitting the theme of the lesson, one reason why superdense coding is interesting is that it demonstrates a concrete and (in the context of information theory) rather striking use of entanglement. A famous theorem in quantum information theory, known as Holevo's theorem, implies that without the use of a shared entangled state, it is impossible to communicate more than one bit of classical information by sending a single qubit. (Holevo's theorem is more general than this. It's precise statement is technical and requires explanation, but this is one consequence of it.) So, through superdense coding, shared entanglement effectively allows for the doubling of the classical information-carrying capacity of sending qubits.
Protocol
The following quantum circuit diagram describes the superdense coding protocol:
In words, here is what Alice does:
If Alice performs a gate on her qubit (and if she does not).
If Alice performs an gate on her qubit (and if she does not).
Alice then sends her qubit to Bob.
What Bob does when he receives the qubit is to first perform a controlled-NOT gate, with being the control and being the target, and then he applies a Hadamard gate to He then measures to obtain and to obtain with standard basis measurements in both cases.
Analysis
The idea behind this protocol is pretty simple: Alice effectively chooses which Bell state she would like to be sharing with Bob, she sends Bob her qubit, and Bob measures to determine which Bell state Alice chose.
That is, they initially share and depending upon the bits and Alice either leaves this state alone or shifts it to one of the other Bell states by applying or to her qubit
Bob's actions have the following effects on the four Bell states:
This can be checked directly, by computing the results of Bob's operations on these states one at a time.
So, when he performs his measurements, he is able to determine which Bell state Alice chose. To verify that the protocol works correctly is a matter of checking each case:
If then the state of when Bob receives is He transforms this state into and obtains
If then the state of when Bob receives is He transforms this state into and obtains
If then the state of when Bob receives is He transforms this state into and obtains
If then the state of when Bob receives is He transforms this state into and obtains (The negative-one phase factor has no effect here.)
Qiskit implementation
No output produced
Here is a simple implementation of superdense coding where we specify the circuit itself depending on the bits to be transmitted. First let's specify the bits to be transmitted. (Try changing the bits to see that it works correctly.)
No output produced
Now we'll build the circuit accordingly. Here we'll just allow Qiskit to use the default names for the qubits: for the top qubit and for the bottom one.
Output:
Not much is new here, except the
Running the Aer simulator produces the expected output.
Output:
Measured 10 with frequency 1.0
Just for fun, we can use an additional qubit as a random bit generator to randomly choose and then run the superdense coding protocol to see that these bits are transmitted correctly.
Output:
Running the Aer simulator shows the results: Alice and Bob's classical bits always agree.
Output:
The CHSH game
The last example to be discussed in this lesson is not a protocol, but a game known as the CHSH game.
When we speak of a game in this context, we're not talking about something that's meant to be played for fun or sport, but rather a mathematical abstraction in the sense of game theory. Mathematical abstractions of games are studied in economics and computer science, for instance, and have great utility.
The letters CHSH refer to the authors — John Clauser, Michael Horne, Abner Shimony, and Richard Holt — of a 1969 paper where the example was first described. They did not describe the example as a game, but rather as an experiment. It's description as a game, however, is both natural and intuitive.
The CHSH game falls within a class of games known as nonlocal games. Nonlocal games are fascinating and have deep connections to physics, computer science, and mathematics — holding mysteries that still remain unsolved. We'll begin the section by explaining what nonlocal games are, and then we'll focus in on the CHSH game and what makes it interesting.
Nonlocal games
A nonlocal game is a cooperative game where two players, Alice and Bob, work together to achieve a particular outcome. The game is run by a referee, who behaves according to strict guidelines that are known to Alice and Bob.
Alice and Bob can prepare for the game however they choose, but once the game starts they are forbidden from communicating. We might imagine the game taking place in a secure facility of some sort — as if the referee is playing the role of a detective and Alice and Bob are suspects being interrogated in different rooms. But another way of thinking about the set-up is that Alice and Bob are separated by a vast distance, and communication is prohibited because the speed of light doesn't allow for it within the running time of the game. That is to say, if Alice tries to send a message to Bob, the game will be over by the time he receives it, and vice versa.
The way a nonlocal game works is that the referee first asks each of Alice and Bob a question. We'll use the letter to refer to Alice's question and to refer to Bob's question. Here we're thinking of and as being classical states, and in the CHSH game and are bits.
The referee uses randomness to select these questions. To be precise, there is some probability associated with each possible pair of questions, and the referee has vowed to choose the questions, at the time of the game, in this way. Everyone, including Alice and Bob, knows these probabilities — but nobody knows specifically which pair will be chosen until the game begins.
After Alice and Bob receive their questions, they must then provide answers: Alice's answer is and Bob's answer is Again, these are classical states in general, and bits in the CHSH game.
At this point the referee makes a decision: Alice and Bob either win or lose depending on whether or not the pair of answers is deemed correct for the pair of questions according to some fixed set of rules. Different rules mean different games, and the rules for the CHSH game specifically are described in the section following this one. As was already suggested, the rules are known to everyone.
The following diagram provides a graphic representation of the interactions.
It is the uncertainty about which questions will be asked, and specifically the fact that each player doesn't know the other player's question, that makes nonlocal games challenging for Alice and Bob — just like colluding suspects in different rooms trying to keep their story straight.
A precise description of the referee defines an instance of a nonlocal game. This includes a specification of the probabilities for each question pair along with the rules that determine whether a pair of answers wins or loses for each possible question pair
We'll take a look at the CHSH game momentarily, but it's also interesting to consider other nonlocal games. Some nonlocal games are fascinating and mysterious to this day, and some aren't so interesting. While the set-up is simple, there's complexity at work — and for some nonlocal games it can be impossibly difficult to compute best or near-best strategies for Alice and Bob. This is part of the fascinating nature of the non-local games model.
CHSH game description
Here is the precise description of the CHSH game, where (as above) is Alice's question, is Bob's question, is Alice's answer, and is Bob's answer:
The questions and answers are all bits:
The referee chooses the questions uniformly at random. That is, each of the four possibilities, and is selected with probability
The answers win for the questions if and lose otherwise. The following table expresses this rule by listing the winning and losing conditions on the answers for each pair of questions
Limitation of classical strategies
Now let's consider strategies for Alice and Bob in the CHSH game, beginning with classical strategies.
Deterministic strategies
We'll start with deterministic strategies, where Alice's answer is a function of the question that she receives, and likewise Bob's answer is a function of the question he receives. So, for instance, we may write to represent Alice's answer when her question is and to represent Alice's answer when her question is
No deterministic strategy can possibly win the CHSH game every time. One way to reason this is simply to go one-by-one through all of the possible deterministic strategies and check that every one of them loses for at least one of the four possible question pairs. Alice and Bob can each choose from four possible functions from one bit to one bit — which we encountered in Lesson 1 — and so there are different deterministic strategies in total to check.
We can also reason this fact analytically. If Alice and Bob's strategy wins when then it must be that if their strategy wins for we conclude that and similarly, if the strategy wins for then So, if their strategy wins for all three possibilities, then we have
This implies that the strategy loses in the final case for here winning requires that
Thus, there can be no deterministic strategy that wins every time. It's easy to find strategies that win in three of the four cases (such as and so we see that the maximum probability for Alice and Bob to win using a deterministic strategy is
Probabilistic strategies
As we just concluded, Alice and Bob cannot do better than winning the CHSH game 75% of the time using a deterministic strategy. But what about a probabilistic strategy? Could it help Alice and Bob to use randomness — including the possibility of shared randomness, where their random choices are correlated?
It turns out that probabilistic strategies don't help at all to increase the probability that Alice and Bob win. This is because every probabilistic strategy can alternatively be viewed as a random selection of a deterministic strategy, just like (as was mentioned in the first lesson) probabilistic operations can be viewed as random selections of deterministic operations. The average is never larger than the maximum, and so it follows that probabilistic strategies don't offer any advantage in terms of their overall winning probability.
Thus, winning with probability is the best that Alice and Bob can do using any classical strategy, whether deterministic or probabilistic.
CHSH game strategy
A natural question to ask at this point is whether Alice and Bob can do any better using a quantum strategy. In particular, if they share an entangled quantum state as the following figure suggests, which they could have prepared prior to playing the game, can they increase their winning probability?
The answer is yes, and this is the main point of the example and why it's so interesting. So let's see exactly how Alice and Bob can do better in this game using entanglement.
Required vectors and matrices
The first thing we need to do is to define a qubit state vector for each real number (which we'll think of as an angle measured in radians) as follows.
Here are some simple examples:
We also have the following examples, which arise in the analysis below:
Looking at the general form, we see that the inner product between any two of these vectors has this formula:
In detail, we only have real number entries in these vectors, so there are no complex conjugates to worry about: the inner product is the product of the cosines plus the product of the sines. We can then use one of the so-called angle addition formulas to simplify. This formula reveals the geometric interpretation of the inner product between real unit vectors, as the cosine of the angle between them.
Now, if we compute the inner product of the tensor product of any two of these vectors with the state, we obtain a similar expression, except that it has a in the denominator:
We're interested in this particular inner product for reasons that will become clear shortly, but for now we're simply observing this as a formula.
Next, we'll define a unitary matrix for each angle as follows.
Intuitively speaking, as an operation this matrix maps to and to To check that this is a unitary matrix, a key observation is that the vectors and are orthogonal for every angle :
Thus, we find that
We may alternatively write this matrix explicitly as
This is an example of a rotation matrix, and specifically it rotates two-dimensional vectors with real number entries by an angle of about the origin. If we follow a standard convention for naming and parameterizing rotations of various forms, we have where
Strategy description
Now we can describe the quantum strategy.
- Alice and Bob start the game sharing an e-bit: Alice holds a qubit Bob holds a qubit and together the two qubits are in the state.
Alice's actions are as follows:
- If her question is she applies to her qubit
- If her question is she applies to her qubit
The operation Alice performs on may alternatively be described like this:
After she applies this operation, she measures with a standard basis measurement and sets her answer to be the measurement outcome.
Bob's actions are as follows.
- If his question is he applies to his qubit
- If his question is he applies to his qubit
Like we did for Alice, we can express Bob's operation on like this:
After he applies this operation, he measures with a standard basis measurement and sets his answer to be the measurement outcome.
Here is a quantum circuit diagram that describes this strategy:
In this diagram we see two ordinary controlled gates, one for on the top and one for on the bottom. We also have two gates that look like controlled gates, one for on the top and one for on the bottom, except that the circle representing the control is not filled in. This denotes a different type of controlled gate where the gate is performed if the control is set to (rather than like an ordinary controlled gate). So, effectively, Bob performs on his qubit if and if and Alice performs on her qubit if and if which is consistent with the description of the protocol in words above.
It remains to figure out how well this strategy for Alice and Bob works. We'll do this by going through the four possible question pairs individually.
Case-by-case analysis
Case 1:
In this case Alice performs on her qubit and Bob performs on his, so the state of the two qubits after they perform their operations is
The probabilities for the four possible answer pairs are therefore as follows.
We can then obtain the probabilities that and by summing appropriately:
For the question pair Alice and Bob win if and therefore they win in this case with probability
Case 2:
In this case Alice performs on her qubit and Bob performs on his, so the state of the two qubits after they perform their operations is
The probabilities for the four possible answer pairs are therefore as follows.
Again, we can obtain the probabilities that and by summing:
For the question pair Alice and Bob win if and therefore they win in this case with probability
Case 3:
In this case Alice performs on her qubit and Bob performs on his, so the state of the two qubits after they perform their operations is
The probabilities for the four possible answer pairs are therefore as follows.
We find, once again, that probabilities that and are as follows:
For the question pair Alice and Bob win if so they win in this case with probability
Case 4:
The last case is a little bit different, as we might expect because the winning condition is different in this case. When and are both Alice and Bob win when and are different. In this case Alice performs on her qubit and Bob performs on his, so the state of the two qubits after they perform their operations is
The probabilities for the four possible answer pairs are therefore as follows.
The probabilities have effectively swapped places from in the three other cases. We obtain the probabilities that and by summing:
For the question pair Alice and Bob win if and therefore they win in this case with probability
They win in every case with the same probability:
Therefore, that's the probability that they win overall. That's significantly better than any classical strategy can do for this game; classical strategies have winning probability bounded by And that makes this a very interesting example.
This happens to be the optimal winning probability for quantum strategies, we can't do any better than this no matter what entangled state or measurements we choose. This fact is known as Tsirelson's inequality, named for Boris Tsirelson who first proved it — and who first described the CHSH experiment as a game.
Geometric picture
It is possible to think about the strategy described above geometrically, which may be helpful for understanding the relationships among the various angles chosen for Alice and Bob's operations.
What Alice effectively does is to choose an angle depending on her question and then to apply to her qubit and measure. Similarly, Bob chooses an angle depending on and then he applies to his qubit and measures. We've chosen and like this:
For the moment, though, let's take and to be arbitrary. By choosing Alice effectively defines an orthonormal basis of vectors that looks like this:
Bob does likewise, except that his angle is :
The colors of the vectors correspond to Alice and Bob's answers: blue for and red for
Now, if we combine together () and () we get the formula
this works for all real numbers and
If we follow the same sort of analysis that we went through above, but with and being variables, we find this:
We then conclude these two formulas:
We can connect these equations to the figures above by imagining that we superimpose the bases chosen by Alice and Bob.
Exploring the strategy
When Alice and Bob choose and and by superimposing their bases we obtain this figure:
The angle between the red vectors is which is the same as the angle between the two blue vectors. The probability that Alice and Bob's outcomes agree is the cosine-squared of this angle,
while the probability they disagree is the sine-squared of this angle,
When Alice and Bob choose and and by superimposing their bases we obtain this figure:
The angle between the red vectors is again as is the angle between the blue vectors. The probability that Alice and Bob's outcomes agree is again the cosine-squared of this angle,
while the probability they disagree is the sine-squared of this angle,
When Alice and Bob choose and and by superimposing their bases we obtain this figure:
The bases have changed but the angles haven't — once again the angle between vectors of the same color is The probability that Alice and Bob's outcomes agree is
and the probability they disagree is
When Alice and Bob choose and When we superimpose their bases, we see that something different has happened:
By the way the angles were chosen, this time the angle between vectors having the same color is rather than The probability that Alice and Bob's outcomes agree is still the cosine-squared of this angle, but this time the value is
The probability the outcomes disagree is the sine-squared of this angle, which in this case is this:
Remarks
The basic idea of an experiment like the CHSH game, where entanglement leads to statistical results that are inconsistent with any classical description, is due to John Bell, the namesake of the Bell states. For this reason, people often refer to experiments of this sort as Bell tests. Sometimes people also refer to Bell's theorem, which can be formulated in different ways — but the essence of it is that quantum mechanics is not compatible with so-called local hidden variable theories. The CHSH game is a very nice and clean example of a Bell test, and can be viewed as a proof, or demonstration, of Bell's theorem.
The CHSH game offers us one way to experimentally test that the theory of quantum information is an accurate theory. Experiments can be performed that implement the CHSH game, and test the sorts of strategies based on entanglement described above. This provides us with a high degree of confidence that entanglement is real — and unlike the sometimes vague or poetic ways that we come up with to explain entanglement, the CHSH game gives us a concrete and testable way to observe entanglement. The 2022 Nobel Prize in Physics acknowledges the importance of this line of work: the prize was awarded to Alain Aspect, John Clauser (the C in CHSH) and Anton Zeilinger, for observing entanglement through Bell tests on entangled photons.
Qiskit implementation
No output produced
We can implement the CHSH game together with the quantum strategy defined above in Qiskit as follows.
First, here's the definition of the game itself, which allows an arbitrary strategy to be plugged in as an argument.
No output produced
Now we'll create a function that outputs a circuit depending on the questions for Alice and Bob. We'll let the qubits have their default names for simplicity, and we'll use the built-in gate for Alice and Bob's actions.
No output produced
Here are the four possible circuits, depending on which questions are asked.
Output:
(x,y) = (0,0)
(x,y) = (0,1)
(x,y) = (1,0)
(x,y) = (1,1)
Now we'll create a job using the Aer simulator that runs the circuit a single time for a given input pair
No output produced
Finally, we'll play the game 1,000 times and compute the fraction of them that the strategy wins.
Output:
Fraction of games won: 0.863
We can also define a classical strategy and see how well it works. Feel free to change the code to try out different strategies!
No output produced
Again let's play the game 1,000 times to see how well it works.
Output:
Fraction of games won: 0.75
Although there's randomness involved, the statistics are very unlikely to deviate too much after 1,000 runs. The quantum strategy wins about 85% of the time while a classical strategy can't win more than about 75% of the time.
Post-Course Survey
Congratulations on completing the "Basics of Quantum Information" course by IBM! Please take a moment to help us improve our course by filling out the following quick survey. Your feedback will be used to enhance our content offering and user experience. Thank you!"
Was this page helpful?