Advantage of Hardy's Nonlocal Correlation in Reverse Zero-Error Channel Coding

Page created by Joseph Schneider
 
CONTINUE READING
Advantage of Hardy's Nonlocal Correlation in Reverse Zero-Error Channel Coding
Advantage of Hardy’s Nonlocal Correlation in Reverse Zero-Error Channel Coding

                                                         Mir Alimuddin,1 Ananya Chakraborty,1 Govind Lal Sidhardh,1 Ram Krishna Patra,1
                                                        Samrat Sen,1 Snehasish Roy Chowdhury,2 Sahil Gopalkrishna Naik,1 and Manik Banik1
                                                               1 Department of Physics of Complex Systems, S. N. Bose National Center for Basic Sciences,
                                                                                 Block JD, Sector III, Salt Lake, Kolkata 700106, India.
                                                            2 Physics and Applied Mathematics Unit, Indian Statistical Institute, 203 BT Road, Kolkata, India.

                                                            Hardy’s argument constitutes an elegant proof of quantum nonlocality as established by the seminal
                                                         Bell’s theorem. In this work, we report an exotic application of Hardy’s nonlocal correlations. We
                                                         devise a simple communication task and show that the expected payoff of the task cannot be positive
                                                         whenever only 1-cbit communication is allowed from the sender to the receiver, who otherwise can
                                                         share an unlimited amount of classical correlation. Interestingly, the same classical channel can
arXiv:2303.06848v1 [quant-ph] 13 Mar 2023

                                                         ensure a positive payoff when assisted with correlations exhibiting Hardy’s nonlocality. As it turns
                                                         out, among all the 2-input-2-output no-signaling correlations, only Hardy’s correlation can ensure a
                                                         positive payoff when assisted to 1-cbit channel. This further prompts us to show that in the correlation
                                                         assisted reverse zero-error channel coding scenario, where the aim is to simulate a noisy channel
                                                         exactly by a noiseless one in assistance with correlations, assistance of non-maximally pure entangled
                                                         states – even with vanishingly zero amount of entanglement – could be preferable over the maximal
                                                         one.

                                               Introduction.– The pioneering work of J. S. Bell estab-        nel. This advantage is striking due to the following
                                            lishes one of the most striking departures of quantum             reasons. Firstly, nonlocal correlations are compatible
                                            theory from a classical worldview [1] (see also [2]). Vi-         with the no signalling (NS) principle, and hence they
                                            olation of a Bell-type inequality, as demonstrated in             by themselves cannot be used for information transfer.
                                            several milestone experiments [3–8], endorses that cer-           Second, the advantage reported here is different from
                                            tain correlations obtained from multipartite entangled            the nonlocal advantage demonstrated in the communic-
                                            states are not compatible with a local-realistic description      ation complexity scenario [13]. In fact, we argue that the
                                            [9]. Apart from its foundational implications, Bell non-          scenario considered here is much more elementary than
                                            locality has also been identified as a useful resource for        the communication complexity tasks.
                                            several practical tasks, such as, device-independent cryp-           The advantage we establish gets reflected in the payoff
                                            tography [10–12], reduction of communication complex-             of a guessing game played between two distant players
                                            ity [13], device-independent randomness certification             – a sender and a receiver. The expected collaborative
                                            [14–16], and randomness amplification [17].                       payoff of this game cannot be positive whenever only
                                               Apart from Bell-type inequalities, another technique           1-bit classical communication is allowed from the sender
                                            popularly known as ’nonlocality without inequality’               to the receiver, who otherwise can share an unlimited
                                            proofs is often used to establish the nonlocal beha-              amount of classical correlation between them. Inter-
                                            viour of quantum theory. Unlike the Bell-type inequalit-          estingly, the assistance of Hardy’s nonlocal correlation
                                            ies, where statistics of many events are collected, these         ensures a strictly positive payoff, establishing a non-
                                            proofs focus on a single event whose occurrence shows             trivial utility of Hardy’s correlation in communication
                                            the incompatibility of quantum theory with the notion             tasks. Furthermore, we show that Hardy’s nonlocal
                                            of local-realism. While the first proof of this kind for          correlations are necessary for ensuring a positive pay-
                                            tripartite quantum systems is due to Greenberger-Horne-           off in this game. This motivates us to further show
                                            Zeilinger [18] (see also [19]), for bipartite systems, such       that pure non-maximally entangled states are prefer-
                                            a proof was first proposed by Hardy [20], which is con-           able over the maximally entangled ones for the game in
                                            sidered to be “simpler and more compelling than the               question. This turns out to be the case even when the
                                            arguments that underlie the derivation of Bell-CH in-             former state has arbitrarily less amount of entanglement.
                                            equality" [21]. More recently, Hardy-type nonlocality             This, in turn, proves that in correlation-assisted reverse
                                            proofs have shown to be useful in several practical tasks         zero-error coding scenario [28], where the aim is to sim-
                                            [22–27].                                                          ulate a higher input-output noisy classical channel by a
                                               In this work, we report a novel application of Hardy’s         lower input-output identity channel in the presence of
                                            nonlocal correlation in the simplest communication scen-          NS correlations, non-maximally entangled states can be
                                            ario. In particular, we show that Hardy’s nonlocal correl-        advantageous over the maximally entangled state.
                                            ation shared between two distant parties can empower                 A two party guessing game.– We start by introducing a
                                            the communication utility of a perfect classical chan-            distributed guessing game played between two distant
2

players (say) Alice and Bob. There is a Referee (say)
Charlie who, in each run of the game, provides four
closed boxes, numbered 1 to 4, to Bob, who has to open
one of these boxes. Some of these boxes contain a bomb
that will explode upon opening the box. Among the
boxes that don’t contain the bomb, some may be empty,
some may contain a dollar bill, and others may even
prompt Bob to pay a dollar bill to Charlie. In each
run of the game, Charlie randomly picks one among
four different arrangements of these boxes, as shown
in Fig.1. Charlie then informs his choice to Alice, who
then tries to help Bob in picking a box. However, only
1-bit of classical communication is allowed from Alice
to Bob, which may be further assisted with preshared
NS correlations shared between them. From now on, we
will call this the distributed mine-hunting (DMH) game.      Figure 1. Distributed mine-hunting (DMH) game. Opening a
   General scenario.– The aforesaid game can be formally     box with ‘ + $0 assures dollar bill gain for Bob while opening
studied within a more generic set-up. Alice and Bob          a box with ‘ − $0 demands him to pay dollar bill to Charlie.
are given some collaborative payoff depending on the         A box with a ‘smile’ neither offers nor demands any dollar
classical index z ∈ Z produced by Bob, given that Alice      bill, whereas a box with a ‘bomb’ turns out to be fatal to Bob.
received some classical message m ∈ M sampled from a         Alice knows which of the arrangements {A-1,· · · ,A-4} Charlie
                                                             chooses in a particular run and tries with a limited classical
probability distribution { p(m) | m ∈ M}. Such a game,       channel to help Bob to optimize his expected dollar gain.
in fact, is completely specified by the payoff matrix G ≡
( gmz ), where gmz ∈ R is the reward/payoff given when
Bob produced the index ‘z’ provided Alice received the       by the players can be represented as a |M| × |Z | matrix
message ‘m’. For instance, the DMH game is specified         S ≡ (smz ), where smz denotes the probability of produ-
by the following payoff matrix:                              cing the output z ∈ Z by Bob given that Alice received
                                                             the message m ∈ M. Manifestly, entries of such a mat-
                  M\Z  1  2 3   4
                                                             rix are non-negative with row sum one. In this work,
                   1  −1 0  0 −∞                             we refer to this matrix as a strategy matrix which, up
        G DMH   ≡  2  −∞ 0 −∞ 0                       (1)
                                                             to a transposition, is identical to the notion of ’channel
                   3  +1 0 − ∞ − ∞                           matrix’ used in [30]. Given such a strategy matrix S, the
                   4  −∞ −∞ 0   0                            average payoff can be obtained as
The payoffs quantitatively capture the scenario of DMH
game. A reward of −∞ for the box containing the bomb
                                                                             P (S) =   ∑ p(m) gmz smz .                 (2)
                                                                                       z,m
captures the notion that choosing such a box must be
avoided at all costs [29]. The reward 0 corresponds to the   As it is evident, there will always be a perfect strategy
event where the players survive but do not receive any       for such a game if log2 |M| bits of communication are
reward. Events with reward +1 (−1) correspond to the         allowed from Alice to Bob. Interesting situations arise
scenario where the players receive (pay) some dollar bill    when communication is limited which might further be
from (to) Charlie. The game matrix and the sampling          aided by preshared correlations of different types. In the
distribution of Alice’s inputs are common knowledge to       next section, we analyze different such cases for DMH
the players.                                                 game and present some novel results.
   Alice and Bob are cooperative in nature and aim              Results.– We start with the scenario where only 1
to maximize the payoff. Their collaborative strategy         bit of classical communication is allowed from Alice
depends on the available resources, which can be             to Bob, and they can share an unlimited amount
broadly categorized into two types: (i) correlation shared   of share randomness, i.e., classical correlation. By
between them before the game starts and (ii) commu-          Ωnc +SR (|M|, |Z |) we denote the set of strategy matrices
nication from Alice to Bob which is allowed even after       obtained when n-bits classical communication and un-
the game starts. While correlations can further be clas-     limited amount of shared randomness are available.
sified into classical, quantum, or the more general no       The set Ωnc +SR (|M|, |Z |) forms a polytope with ex-
signalling types, for direct communication, a classical or   treme points Se ’s representing strategy matrices ob-
quantum channel can be used. The strategy employed           tained through deterministic encoding M → {0, 1}n
3

                                                                    marginal outcome probabilities depend only on their
                                                                    own inputs, i.e., p( a| x, y) = p( a| x ) & p(b| x, y) = p(b|y).
                                                                    Classical correlations that  R allow a local-realistic de-
                                                                    scription, p( a, b| x, y) = Λ µ(λ) p( a, b| x, y, λ)dλ, forms
                                                                    a strict subset (a sub polytope) of the NS polytope; here
                                                                    λ ∈ Λ is some classical variable shared between Alice
                                                                    and Bob and µ(λ) is a probability distribution on Λ [9].
                                                                    Quite surprisingly, entangled quantum states can lead
                                                                    to correlations that are not local-realistic and nonlocality
                                                                    of those correlations can be certified through violation
                                                                    of some Bell-type inequalities [1]. Given such an NS
                                                                    correlation (possibly nonlocal) as an assistance to 1-bit
                                                                    classical communication from Alice to Bob, the general
Figure 2. General strategy to play a game G when the 1-cbit         strategy to play a game G is described in Fig.2.
communication channel is assisted with NS correlation. Alice
computes the input x = X (m) to her part of the nonlocal box          We will now proceed to analyze the success prob-
based on the message m ∈ M received from Referee. The               ability of DMH when a correlation exhibiting Hardy’s
output a of the nonlocal box at her end and the message m           nonlocality is provided as assistance to the 1-cbit com-
determines the classical bit c = C ( a, m) sent to Bob. Bob then    munication line. When the input and output space of
inputs y = Y (c) into his end of the NS box and obtains the         Alice and Bob are binary, i.e., A = B = X = Y ≡ {0, 1},
output b. Finally, he generates his guess as z = Z (b, c).
                                                                    Hardy come with an elegant argument according to
                                                                    which any NS correlation {h( a, b| x, y)} satisfying the
at Alice’s end and deterministic decoding {0, 1}n → Z               constraints
at Bob’s end [30] (see also [31]). Entries of such extreme
                                                                         h(00|00) := h0 > 0, h(01|01) := h5 = 0,
                                                                                                                           
strategy matrices can only be 0 or 1, and since only n-                                                                    
cbits are allowed, such a strategy can have at most 2n                     h(10|10) := h10 = 0, h(00|11) := h3 = 0,             (3)
                                                                                                                           
non-zero columns. Our first technical result is to limit                
                                                                          with, h( a, b| x, y) := h a×23 +b×22 + x×21 +y×20
                                                                                                                            
the optimal success probability of the game in Eq.(1) for
classical strategies.                                               must be nonlocal in nature [20]. Our next result proves a
Theorem 1. The average payoff of the DMH game is up-                nontrivial advantage of Hardy correlation while playing
per bounded by zero while following a strategy from the set         the DMH game.
Ω1c +SR (4, 4), i.e., P (S) ≤ 0, ∀ S ∈ Ω1c +SR (4, 4).
                                                                    Theorem 2. A strictly positive average payoff in DMH game
Proof. Since average payoff depends linearly on the                 can be ensured when a 2-input-2-output Hardy’s nonlocal
strategy [see Eq.(5)], the polytope structure of                    correlation is available to assist the 1-cbit communication
Ω1c +SR (4, 4) ensures that maximum payoff will be at-              channel from Alice to Bob.
tained at one of its vertices [32]. Note that the players’
first priority is to avoid the Bomb at any cost, i.e., the
                                                                    Proof. Consider the following strategy by Alice and Bob.
−∞ reward in Eq.(1). As it turns out, among all pos-
                                                                    Alice’s action:
sible vertices, only 5 vertices have a zero probability
                                                                    • Depending on m ∈ M Alice computes her input in
of choosing any of the Bombs. The strategy matrices
                                                                    the NS box. For m ∈ {1, 3} she chooses x = 0, otherwise
corresponding to these strategies are listed in Appendix.
                                                                    she choose x = 1.
A straightforward calculation shows that the average
                                                                    • Based on the tuple (m, a) ∈ M × A she communic-
payoff is zero for all these strategies. This proves the
                                                                    ates to Bob. She sends c = 0 to Bob when (m, a) ∈
claim.
                                                                    {(1, 1), (2, 1), (3, 0), (3, 1)}, else she sends c = 1.
  We now consider the scenario where the commu-                     Bob’s action:
nication line from Alice to Bob is aided with a gen-                • The communicated bit from Alice is used as input in
eric input-output correlation { p( a, b| x, y) | p( a, b| x, y) ≥   Bob’s part of the NS box.
0 & ∑ a,b p( a, b| x, y) = 1}, where p( a, b| x, y) denotes the     • Depending on the tuple (c, b) ∈ C × B he chooses
probability of obtaining outcome a ∈ A at Alice’s end               the box as follows: (0, 0) 7→ 1, (0, 1) 7→ 2, (1, 0) 7→
and b ∈ B at Bob’s end for their respective inputs x ∈ X            3, (1, 1) 7→ 4.
and y ∈ Y . We are interested only in those correlations              The above strategy with 1-bit communication and 2-
that satisfy the NS conditions that each of the parties’            input-2-output Hardy’s correlation {h( ab| xy} leads to
4

the strategy matrix,                                               This theorem has an interesting implication. It shows
                                                                 that there exists a communication task wherein a non-
         M\Z    1        2     3     4                           maximally pure entangled state can be preferable over
          1     h8      h12   h1     0                           the maximally entangled one even when the entangle-
    SH ≡  2     0       h14    0     h7                    (4)   ment of the former is vanishingly zero. More formally
          3  h0 + h8 h4 + h12 0      0                           we can deduce the following corollary.
          4     0        0    h11 h7 + h15
                                                                 Corollary 1. For every non maximally entangled state |ψi ∈
As evident from the payoff matrix (1) and the strategy           C2 ⊗ C2 there exists a strategy matrix Sψ such that Sψ ∈
(4), a Box containing Bomb will never be opened. Fur-            Ω1c +SR+|ψi (4, 4) but Sψ ∈
                                                                                           / Ω1c +SR+|φ+ i (4, 4).
thermore, assuming Charlie’s choice to be completely                                              √
random, we have the average payoff                                  Here |φ+ i := (|00i + |11i)/ 2 and Ω1c +SR+|χi (4, 4)
                                                                 denotes the convex set of strategy matrices simulable
                       1      T          1
          P (S H ) =     Tr[G DMH S H ] = h0 > 0.          (5)   with 1-cbit communication from Alice to Bob when the
                       4                 4                       communication channel is further assisted with pre-
This completes the proof.                                        shared quantum state |χi and unlimited shared random-
                                                                 ness. The Corollary follows when results of Theorems
   It is known that a correlation with Hardy success h0
                                                                 2 & 4 are combined with the fact that all non maximally
yields Clauser-Horne-Shimony-Holt (CHSH) [33] value
                                                                 pure entangled state exhibits Hardy’s nonlocality[37].
2 + 4 h0 [34]. Since the optimal success of Hardy’s
                                              √     correl-
                                                                    Discussions.– For a better understanding of the present
ation in quantum theory is known to be (5 5 − 11)/2
                                                                 work, we briefly analyze a few other quantum advant-
[35], the corresponding √ CHSH value is much less than           ages known in the communication scenario. At first, we
the Cirel’son bound 2 2 [36]. Therefore, a natural ques-
                                                                 recall the seminal quantum superdense coding protocol,
tion is whether other nonlocal quantum correlations can
                                                                 where it was shown that quantum entanglement, pre-
lead to better success in the DMH game. It can be argued
                                                                 shared between a sender and a receiver, can increase
that following the strategy discussed in Theorem 2, one
                                                                 the classical communication capacity of a quantum sys-
can not have a nonzero payoff in the DMH game when
                                                                 tem [39] (see also [40]). Importantly, in quantum super-
the quantum correlation resulting in the Cirel’son bound
                                                                 dense coding protocol, a quantum channel is considered,
is in use. However, given a correlation, one can develop
                                                                 whereas our result shows that quantum entanglement
different strategies to play the DMH game. Therefore
                                                                 can even empower the communication utility of a perfect
the aforesaid observation is not sufficient to make the
                                                                 classical channel.
claim that
         √ the quantum correlation leading to CHSH                  It is also known that the assistance of entanglement
value 2 2 is not good for playing the DMH game. We
                                                                 can increase the zero-error communication capacity of
thus proceed to state our next result.
                                                                 a noisy classical channel [41]. In the zero-error scen-
Theorem 3. Any 2-input-2-output NS correlation providing         ario, the aim is to simulate a perfect classical channel
a strictly positive payoff in DMH game as an assistance to the   with a lower number of inputs & outputs with a noisy
1-cbit channel must exhibit Hardy’s nonlocality.                 channel having a higher number of inputs & outputs.
                                                                 The assistance of nonlocal correlations arising from en-
  Proof of this theorem is given in the Appendix. Al-
                                                                 tangled quantum states turns out to be advantageous in
though it is known that two-qubit maximally entangled
                                                                 such a simulation task. The present advantage can be
state does not exhibit Hardy’s nonlocality [37, 38], still
                                                                 seen in the correlation-assisted reverse zero-error cod-
Theorem 3 is not sufficient to make a claim that such
                                                                 ing scenario, where the aim is to simulate exactly a
a state shared between Alice and Bob can not lead
                                                                 higher input-output noisy classical channel with a lower
to a strategy yielding strictly positive payoff in DMH
                                                                 input-output perfect classical channel in the presence of
game. Increasing the cardinality of the input-output sets
                                                                 pre-shared entanglement between sender and receiver.
X , Y , A, B Alice and Bob can generate a more general
                                                                 While such an advantage of quantum entanglement is
NS correlation and then try to utilize this correlation to
                                                                 already known (see Proposition 21 in [28]), the full pic-
assist the 1-cbit channel to obtain a nonzero payoff in
                                                                 ture of entanglement assistance is not well understood.
DMH game. However, our next result (proof provided
                                                                 Our Theorem 4 proves a nontrivial result in this direction
in the appendix) proves a no-go to this aim.
                                                                 as it shows that in the correlation-assisted reverse zero-
Theorem 4. Two qubit maximally entangled state together          error coding scenario, non-maximally entangled states,
with 1-cbit channel from Alice to Bob does not result in a       with less amount of entanglement, might be preferable
strategy ensuring strictly positive average payoff in DMH        over a state having more entanglement. In particular,
game.                                                            the noisy channel in Eq.(4) corresponding to the Hardy’s
5

correlation (3) can be perfectly simulated by 1-cbit com-     (Grant no: I-HUB/PDF/2021-22/008). MB acknow-
munication assisted with a non-maximally entangled            ledges support through the research grant of INSPIRE
state producing the Hardy correlation (3). However, it        Faculty fellowship from the Department of Science
can not be simulated by 1-cbit communication when             and Technology, Government of India and the start-up
the sender and receiver share a two-qubit maximally           research grant from SERB, Department of Science and
entangled state as assistance. In the resource theory         Technology (Grant no: SRG/2021/000267).
of quantum entanglement [42], where local operations
and classical communication (LOCC) are considered
to be free, a maximally entangled state is more useful
than a non-maximally entangled one, and a determin-                   Appendix A: Detailed proof of Theorem 1
istic LOCC transformation is always possible from the
former to the later [43]. On the other hand, our result
shows that entanglement comparisons among different              As already mentioned, the entries of an extreme
states are not immediate when classical communication         strategy matrix Se of the set Ω1c +SR (4, 4) are either zero
is regarded as a costly resource.                             or one with all row sum one and can not have more than
                                                              two nonzero columns. However, all such extreme points
   A nonlocal advantage is also known in a variant of the
                                                              are no good for playing the game G DMH . For instance,
communication scenario known as the communication
                                                              consider the extreme strategy matrix,
complexity problem [13]. In such a scenario, Bob’s goal
is not to determine Alice’s data M, but to determine                                                      
some information that is a function of M in a way that                                       1   0   0   0
may depend on other data N that resides with Bob while                            e
                                                                                           0    0   1   0
                                                                                 Sns    := 
                                                                                           1
                                                                                                           .                   (6)
N is unknown to Alice. In that sense, our scenario is                                            0   0   0
closer to the standard framework of Shannon [44] (and                                        0   0   1   0
considered by Holevo in quantum set up [45]), where
at Bob’s end, no further data set N is considered. How-       Comparing with Eq.(1), it is evident that if the players
ever, unlike Shannon’s and Holevo’s framework, which          execute a strategy corresponding to this strategy mat-
provides a set-up to analyze utilities of noisy channels      rix, then there is a nonzero probability that the bomb
in the asymptotic limit, we only consider the single-         will be triggered (for m = 2). Having a nonzero non-
shot use of a perfect classical channel in the presence of    survival probability, the players would certainly avoid
preshared correlations (classical as well as quantum).        this strategy. On the other hand, for any of the following
   Conclusion and outlook.– In conclusion, the present        five strategies
work establishes a novel use of quantum entanglement
in a communication scenario. In particular, we show that         
                                                                 
                                                                          
                                                                            1   0   00
                                                                                                        
                                                                                                          0     1   0
                                                                                                                          
                                                                                                                        0 
quantum correlations exhibiting Hardy’s nonlocality can          
                                                                           0   0   01                 0      1   0   0
                                                                                                                            
                                                                                                                            
                                                                    e                   , Se
                                                                                                                          
                                                                   Ss1 :=                           :=                  ,
                                                                 
empower the communication utility of a perfect clas-                                         s2
                                                                                                                           
                                                                            1   0   00                 0      1   0   0 
                                                                 
                                                                                                                         
                                                                                                                           
sical communication channel. Our work also motivates
                                                                                                                           
                                                                            0   0   01                    0     0   1   0 
                                                                 
                                                                                                                           
                                                                                                                           
many questions for future study. For instance, it would
                                                                 
                                                                                                                           
                                                                                                                      
                                                                 
                                                                           0   1 0 0                     0     1   0   0  
be interesting to see whether any nonlocal correlation           
                                                                                                                           
                                                                                                                            
                                                                            0   1 0 0                  0      0   0   1
                                                                                                                           
                                                                    e                   , Se
                                                                          
can be made useful as a communication resource in the              Ss3 := 
                                                                          0                 s4      :=                 ,     (7)
                                                                                1 0 0                  0      1   0   0 
sense discussed here. It will also be interesting to see
                                                                 
                                                                                                                           
                                                                            0   0 0 1                     0     0   0   1 
                                                                 
                                                                                                                           
whether maximally entangled states of higher dimen-
                                                                 
                                                                                                                           
                                                                                                                            
                                                                 
                                                                                                                         
                                                                                                                            
sions provide some advantage in the DMH game. More                                         0 0        1 0
                                                                 
                                                                                                                           
                                                                                                                            
                                                                 
                                                                                                                           
                                                                                                                            
generally, characterizing the set Ωnc +SR+χ (|M|, |Z |) for                                0 1        0 0
                                                                                                                           
                                                                                  e
                                                                                                                          
                                                                                 Ss5 := 
                                                                 
                                                                                                                          
                                                                                                                            
an arbitrary quantum state |χi would be very interest-
                                                                 
                                                                 
                                                                                       0 1          0 0
                                                                                                                            
                                                                                                                            
                                                                                                                            
                                                                 
                                                                                                                           
                                                                                                                            
ing.                                                                                       0 0        1 0
   We thankfully acknowledge discussions with
Ashutosh Rai. GLS acknowledges support from the CSIR          bomb will never be triggered. Furthermore, we have
project 09/0575(15830)/2022-EMR-I. SGN acknowledges                e ) = 0, ∀ K ∈ {1, · · · , 5}. Moreover, these turn
                                                              P (SsK
support from the CSIR project 09/0575(15951)/2022-            out to be the only extremal strategy matrices of Ω1c +SR
EMR-I. MA and MB acknowledge funding from the                 that do not trigger the bomb. Since all the deterministic
National Mission in Interdisciplinary Cyber-Physical          strategies result in either zero or −∞ payoff, therefore
systems from the Department of Science and Technology         the optimal payoff with 1 bit classical communication
through the I-HUB Quantum Technology Foundation               and shared randomness is simply zero.
6

                Appendix B: Proof of Theorem 3                            received. This leads to the strategy matrix with elements

                                                                                       1                  1
Proof. The set of strategy matrices simulable by 1-cbit
                                                                                                                        h                       i
                                                                                      ∑ smzc := ∑ Tr
                                                                                                                                        (m)  (c)
                                                                            smz =                                           |φ+ ihφ+ | Ec ⊗ Nz      ,
communication with the assistance of a given NS correl-                               c =0            c =0
ation P ≡ { p( ab| xy) | a, b, x, y ∈ {0, 1}} and unlimited                            1     h                       i
                                                                                                              ∗(c)
                                                                                      ∑ Tr
                                                                                                  (m)
SR forms a polytope. We denote this set by Ω1c +SR+ P .                         =                Ec       Nz                .                                           (9)
Vertices of this polytope correspond to strategies where                              c =0
the players follow an encoding and decoding scheme                                                                                         (m)                  ∗(c)
characterised by deterministic functions of the form                      The aim is to find POVM elements Ec and Nz such
x = X (m), c = C (m, a), y = Y (c), z = Z (c, b). The lin-                that the resulting strategy yields a positive payoff in
earity of the payoff function again implies that the max-                 DMH game. For simplicity, we drop the notation ‘∗’
                                                                               ∗(c)
imum payoff occurs at one of the vertices of Ω1c +SR+ P .                 in Nz    keeping in mind that if we do indeed find
   Elementary counting shows that there are 24 × 28 ×                     a solution for Eq.(9), we need to complex conjugate
                                                                                              (c)                                                       (c)
2 × 44 such deterministic strategies. Furthermore, ele-
 2
                                                                          the matrices Nz . We also note that if Nz forms a
ments of the strategy matrix is related linearly to the NS                                          ∗(c)
                                                                          measurement so does Nz . Therefore a strictly positive
correlation P = { p( a, b| x, y)},                                        payoff in DMH game demands following conditions to
                                                                          be satisfied:
  smz =         ∑            δx,X (m) × δc,C(m,a) × δy,Y (c)                            h         i         h         i
           x,a,c,b,y∈{0,1}                                                                (1) (0)             (1) (1)
                                                                                      Tr E0 N4      = 0 = Tr E1 N4 ,      (10a)
                                      × δz,Z(c,b) × p( a, b| x, y). (8)                 h
                                                                                          (2) (0)
                                                                                                  i         h
                                                                                                              (2) (1)
                                                                                                                      i
                                                                                      Tr E0 N1      = 0 = Tr E1 N1 ,      (10b)
For a non-negative payoff, the game matrix enforces                                     h
                                                                                          (2) (0)
                                                                                                  i         h
                                                                                                              (2) (1)
                                                                                                                      i
some of the entries of S ≡ (smz ) to be zero. Since Eq.(8)                            Tr E0 N3      = 0 = Tr E1 N3 ,       (10c)
is linear, one can solve these equality constraints to see                              h
                                                                                          (3) (0)
                                                                                                  i         h
                                                                                                              (3) (1)
                                                                                                                      i
                                                                                      Tr E0 N3      = 0 = Tr E1 N3 ,      (10d)
what restrictions are imposed on the NS correlation
P( a, b| x, y). By brute-forcing through all the determin-
                                                                                        h         i         h         i
                                                                                          (3) (0)             (3) (1)
                                                                                      Tr E0 N4      = 0 = Tr E1 N4 ,      (10e)
istic strategies and by symbolic programming, we were                                   h         i         h         i
                                                                                          (4) (0)             (4) (1)
able to verify that for each vertex of Ω1c +SR+ P , the pos-                          Tr E0 N1      = 0 = Tr E1 N1 ,       (10f)
itivity of average payoff imposes the conditions in Eq.(3)                              h
                                                                                          (4) (0)
                                                                                                  i         h
                                                                                                              (4) (1)
                                                                                                                      i
(or its local reversible relabelling) to the NS correla-                              Tr E0 N2      = 0 = Tr E1 N2 ,      (10g)
tion { p( a, b| x, y)}. This proves the claim that among                                1     h                     i            1     h                i
                                                                                       ∑ Tr                                     ∑ Tr
                                                                                                    (3)       (c)                           (1)   (c)
all 2-input-2-output correlations, only Hardy’s nonlocal                                          Ec N1                 >                  Ec N1            .          (11)
correlations can provide a positive payoff in the DMH                                 c =0                                      c =0
game.
                                                                          The inequality (11) can can further be written as
                                                                               h                  i     h                  i
                                                                                 (3)    (0)    (1)          (1)    (0)    (1)
                Appendix C: Proof of Theorem 4                              Tr E0      N1 − N1        > Tr E0     N1 − N1        .
                                                                                                                                                                       (12)
Proof. Let Alice and Bob share the two-qubit maximally
entangled state |φ+ i = √1 (|00i + |11i). Note that the                   Note that, if a solution of POVMs exist satisfying
                           2                                              (10) and (12), then there also exists a solution with
existence of a strategy involving SR that yields an ad-                      (m) (m)
vantage in winning the game necessarily implies the ex-                   { E0 , E1 } being projective measurements ∀ m ∈
istence of a strategy without involving any SR. We now                    {1, · · · , 4}. This can be argued easily by expanding
                                                                                                      (m)            (m)
prove that such a strategy does not exist. Without loss of                all the operators { E0 , E1 } in the spectral form. For
generality, we can assume that Alice does a 2 outcome                     example in inequality (12) on the LHS, we can choose
measurement depending on the classical message m she                                                                                                        (3)
                                                                          the projector formed by the eigenvector of E0 giving
                                       (m) (m)       (m)  (m)
receives, i.e., she performs        { E0 , E1
                                     |            = I}
                                                    E0 + E1               the maximum value of the trace. Similarly on the RHS,
for m ∈ {1 · · · 4}. Alice then communicates c ∈ {0, 1}                   we can choose the projector formed by the eigenvector
                     (m)                                                      (1)
if the outcome Ec clicks. Based on the communic-                          of E0 giving the lowest value of trace. Moreover, no-
ated bit c, Bob performs a 4 outcome measurement,                         tice than for Eqs.(10) all the projectors corresponding
and based on the measurement outcome, he chooses a                                                                              (m)    (m)
                                                                          to different eigenvalues of { E0 , E1 } must satisfy the
                                           (c)
box. Bob’s measurement is denoted by { Nz }4z=1 with                      Eqs.(10) individually. Thus we start by assuming all
       (c)                                                                                        (m)         (m)
∑4z=1 Nz      = I when the communication c ∈ {0, 1} is                    measurements{ E0 , E1 } are projective. In particular,
7

let
                     (3)                        (3)
                    E0     = |ψihψ|,           E1        = |ψ⊥ ihψ⊥ |,
                                                                                                  [1] J. S. Bell; On the Einstein Podolsky Rosen paradox, Phys-
                     (4)                        (4)               ⊥         ⊥                         ics Physique Fizika 1, 195 (1964); On the Problem of Hid-
                    E0     = |φihφ|,           E1        = |φ ihφ |.
                                                                                                      den Variables in Quantum Mechanics, Rev. Mod. Phys.
Thus looking into LHS of Eqs.(10d) & (10g) we have                                                    38, 447 (1966).
                                                                                                  [2] N. D. Mermin; Hidden variables and the two theorems of
              (0)                                     (0)                                             John Bell, Rev. Mod. Phys. 65, 803 (1993).
            N1       = p1 |φ⊥ ihφ⊥ |,               N2      = p2 |φ⊥ ihφ⊥ |,                      [3] J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt;
              (0)                                     (0)                                             Proposed Experiment to Test Local Hidden-Variable The-
         N3         = p3 |ψ⊥ ihψ⊥ |,            N4          = p4 |ψ⊥ ihψ⊥ |,
                                                                                                      ories, Phys. Rev. Lett. 23, 880 (1969).
                                                            (0)                 (0)
                                                                                                  [4] S. J. Freedman and J. F. Clauser; Experimental Test of
with 0 ≤ p1 , · · · , p4 ≤ 1. Since { N1 , · · · , N4 } form a                                        Local Hidden-Variable Theories, Phys. Rev. Lett. 28, 938
measurement, we therefore have                                                                        (1972)
                                                                                                  [5] A. Aspect, P. Grangier, and G. Roger; Experimental Tests
        ( p1 + p2 ) |φ⊥ ihφ⊥ | + ( p3 + p4 ) |ψ⊥ ihψ⊥ | = I,                                          of Realistic Local Theories via Bell’s Theorem, Phys. Rev.
                                                                                                      Lett. 47, 460 (1981).
which will be satisfied if and only if                                                            [6] A. Aspect, P. Grangier, and G. Roger; Experimental Real-
                                                                                                      ization of Einstein-Podolsky-Rosen-Bohm Gedankenex-
                                                                                                      periment: A New Violation of Bell’s Inequalities, Phys.
            p1 + p2 = p3 + p4 = 1, & |φi = |ψ⊥ i .
                                                                                                      Rev. Lett. 49, 91 (1982).
                                                                                                  [7] M. Żukowski, A. Zeilinger, M. A. Horne, and A. K. Ekert;
A similar argument can be made for the other measure-                                                 “Event-ready-detectors” Bell experiment via entanglement
ment of Bob and we get the following                                                                  swapping, Phys. Rev. Lett. 71, 4287 (1993).
                                                                                                  [8] G. Weihs, T. Jennewein, C. Simon, H. Weinfurter, and
        (0)                                     (1)
       N1     = p1 |ψihψ|,                     N1      = q1 |ψ⊥ ihψ⊥ |,                (13a)          A. Zeilinger; Violation of Bell’s Inequality under Strict
        (0)                                    (1)
                                                                                                      Einstein Locality Conditions, Phys. Rev. Lett. 81, 5039
       N2     = p2 |ψihψ|,                    N2       = q2 |ψ⊥ ihψ⊥ |,                (13b)          (1998).
        (0)                                    (1)                                                [9] N. Brunner, D. Cavalcanti, S. Pironio, V. Scarani, and S.
       N3     = p3 |ψ⊥ ihψ⊥ |,                N3      = q3 |ψihψ|,                     (13c)          Wehner; Bell nonlocality, Rev. Mod. Phys. 86, 419 (2014).
        (0)                ⊥        ⊥          (1)                                               [10] A. K. Ekert; Quantum cryptography based on Bell’s the-
       N4     = p4 |ψ ihψ |,                  N4      = q4 |ψihψ|,                    (13d)
                                                                                                      orem, Phys. Rev. Lett. 67, 661 (1991).
                                                                                                 [11] J. Barrett, L. Hardy, and A. Kent; No Signaling and
where 0 ≤ q1 , · · · , q4 ≤ 1 and q1 + q2 = q3 + q4 = 1.
                    (1)                               (1)
                                                                                                      Quantum Key Distribution, Phys. Rev. Lett. 95, 010503
Now let E0 = |χihχ| and E0 = |χ⊥ ihχ⊥ |. From                                                         (2005).
LHS of Eq.(10a) and LHS of Eq.(13d) we must have                                                 [12] U. Vazirani and T. Vidick; Fully Device-Independent
p4 |ψ⊥ ihψ⊥ | = s1 |χ⊥ ihχ⊥ |, with 0 ≤ s1 ≤ 1. One pos-                                              Quantum Key Distribution, Phys. Rev. Lett. 113, 140501
sible solution could be p4 = s1 > 0 and |ψi = |χi, which                                              (2014).
                           (1)          (3)           (1)             (3)                        [13] H. Buhrman, R. Cleve, S. Massar, and R. de Wolf; Nonloc-
would imply E0 = E0 and E1 = E1 . This further                                                        ality and communication complexity, Rev. Mod. Phys. 82,
implies Alice uses same strategy for m = 1 and m = 3                                                  665 (2010).
and this will never yield a positive payoff. Thus we must                                        [14] S. Pironio et al. Random numbers certified by Bell’s the-
have                                                                                                  orem, Nature 464, 1021 (2010).
                                                                                                 [15] E. G. Cavalcanti and H. M. Wiseman; Bell Nonlocality,
                                        (0)                       (0)
      p4 = s1 = 0 =⇒ N4                       = 0 =⇒ N3                 = |ψ⊥ ihψ⊥ |.                 Signal Locality and Unpredictability (or What Bohr Could
                                                                                                      Have Told Einstein at Solvay Had He Known About Bell
                                                                            (1)                       Experiments), Found Phys 42, 1329 (2012).
Similarly, we can argue that we must have N3                                      = |ψihψ|.      [16] A. Chaturvedi and M. Banik; Measurement-device-
                                                     (2)                               (2)
Now from Eq.(10c) we have                           E0      ∝ |ψihψ| and E1                  ∝        independent randomness from local entangled states, EPL
                                  (2)                              (2)                                112, 30003 (2015).
|ψ⊥ ihψ⊥ |          =⇒           E0     = |ψihψ| and              E1        =     |ψ⊥ ihψ⊥ |.    [17] R. Colbeck and R. Renner; Free randomness can be ampli-
                                                                                       (0)
Now from Eq.(10b) and Eq.(13a) we must have N1                                               =        fied, Nature Phys 8, 450 (2012).
 (1)                                                                                             [18] D. M. Greenberger, M. A. Horne, and A. Zeilinger, Going
N1    = 0 which leads to violation of the inequality in
                                                                                                      Beyond Bell’s Theorem, In: Kafatos, M. (eds) Bell’s the-
Eq.(11). Thus a consistent solution cannot be found                                                   orem, quantum theory and conceptions of the universe,
satisfying the conditions (10) & (11). This completes                                                 Fundamental Theories of Physics, vol 37 (1989).
the proof that the two qubit maximally entangled state                                           [19] D. M. Greenberger, M. A. Horne, A. Shimony, and A.
cannot yield a strictly positive payoff in DMH game                                                   Zeilinger; Bell’s theorem without inequalities, Am. J. Phys.
when 1-cbit communication is allowed from Alice to                                                    58, 1131 (1990).
Bob.
8

[20] L. Hardy; Quantum mechanics, local realistic theories,          [32] For the         set Ωnc +SR (|M|, |Z |), number of ver-
     and Lorentz-invariant realistic theories, Phys. Rev. Lett.           tices N         can  be calculated
                                                                                                                    using the formula
     68, 2981 (1992).                                                                     2n       |Z |       |M|
                                                                            N = ∑k=1 k!                                  provided in [31].
[21] N. D. Mermin; Quantum mysteries refined, Am. J. Phys.                                          k            k
     62, 880 (1994).
                                                                                                                                
                                                                                        |Z |                 |Z |!             |M|
[22] S. Das, M. Banik, A. Rai, MD R.Gazi, and S.                            Here                  :=     k!(|Z |−k )!
                                                                                                                        and            :=
                                                                                         k                                       k
     Kunkri; Hardy’s nonlocality argument as a witness for
                                                                                                
                                                                                                 k
     postquantum correlations, Phys. Rev. A 87, 012112 (2013).              ∑kj=0 k!1 (−1)k− j        j|M| .
                                                                                                 j
[23] A. Mukherjee, A. Roy, S. S. Bhattacharya, S. Das, Md. R.        [33]   J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt;
     Gazi, and M. Banik; Hardy’s test as a device-independent               Proposed Experiment to Test Local Hidden-Variable The-
     dimension witness, Phys. Rev. A 92, 022302 (2015).                     ories, Phys. Rev. Lett. 23, 880 (1969).
[24] H-W Li, M. Pawłowski, R. Rahaman, G-C Guo, and Z-               [34]   J. L. Cereceda; Quantum mechanical probabilities and gen-
     F Han; Device- and semi–device-independent random                      eral probabilistic constraints for Einstein-Podolsky-Rosen-
     numbers based on noninequality paradox, Phys. Rev. A                   Bohm experiments, Found. Phys. Lett. 13, 427 (2000).
     92, 022327 (2015).                                              [35]   R. Rabelo, L. Y. Zhi, and V. Scarani; Device-Independent
[25] R. Ramanathan, M. Horodecki, H. Anwer, S. Pironio, K.                  Bounds for Hardy’s Experiment, Phys. Rev. Lett. 109,
     Horodecki, M. Grünfeld, S. Muhammad, M. Bourennane,                    180401 (2012).
     and P. Horodecki; Practical No-Signalling proof Random-         [36]   B. S. Cirel’son; Quantum generalizations of Bell’s inequal-
     ness Amplification using Hardy paradoxes and its experi-               ity, Lett. Math. Phys. 4, 93 (1980).
     mental implementation, arXiv.1810.11648.                        [37]   S. Goldstein; Nonlocality without inequalities for almost
[26] A. Rai, M. Pivoluska, M. Plesch, S. Sasmal, M. Banik,                  all entangled states for two particles, Phys. Rev. Lett. 72,
     and S. Ghosh; Device-independent bounds from Cabello’s                 1951 (1994).
     nonlocality argument, Phys. Rev. A 103, 062219 (2021).          [38]   T.F. Jordan, Testing Einstein-Podolsky-Rosen assumptions
[27] A. Rai, M. Pivoluska, S. Sasmal, M. Banik, S. Ghosh, and               without inequalities with two photons or particles with
     M. Plesch; Self-testing quantum states via nonmaximal                  spin 1/2, Phys. Rev. A 50, 62 (1994).
     violation in Hardy’s test of nonlocality, Phys. Rev. A 105,     [39]   Charles H. Bennett and Stephen J. Wiesner; Communic-
     052227 (2022).                                                         ation via one- and two-particle operators on Einstein-
[28] T. S. Cubitt, D. Leung, W. Matthews, and A. Winter; Zero-              Podolsky-Rosen states, Phys. Rev. Lett. 69, 2881 (1992).
     error channel capacity and simulation assisted by non-          [40]   C. H. Bennett, P. W. Shor, J. A. Smolin, and A. V. Thap-
     local correlations, IEEE Trans. Info. Theory 57, 5509 (2011).          liyal; Entanglement-Assisted Classical Capacity of Noisy
[29] Although uses of finite payoffs are common in game                     Quantum Channels, Phys. Rev. Lett. 83, 3081 (1999).
     theory, the framework is quite flexible to incorporate          [41]   T. S. Cubitt, D. Leung, W. Matthews, and A. Winter; Im-
     wide range of situations including those with ±∞ pay-                  proving Zero-Error Classical Communication with Entan-
     offs. Such extreme payoffs generally appear in financial               glement, Phys. Rev. Lett. 104, 230503 (2010).
     trading games, gambling games, and decision-making              [42]   M. B. Plenio and S. Virmani; An introduction to entangle-
     games. A classic example is the “Stag Hunt" game. If the               ment measures, Quant. Inf. Comput. 7, 1 (2007).
     hunters are part of a community that relies on hunting for      [43]   M. A. Nielsen; Conditions for a Class of Entanglement
     survival then the failure to catch a stag leads to starvation          Transformations, Phys. Rev. Lett. 83, 436 (1999).
     and the payoff for each hunter could be considered −∞.          [44]   C. E. Shannon; A mathematical theory of communication,
[30] P. E. Frenkel and M. Weiner; Classical Information Storage             Bell System Technical Journal 27, 379 (1948).
     in an n-Level Quantum System, Commun. Math. Phys.               [45]   A. S. Holevo; Bounds for the Quantity of Information
     340, 563 (2015).                                                       Transmitted by a Quantum Communication Channel,
[31] M. Dall’Arno, S. Brandsen, A. Tosini, F. Buscemi, and V.               Problems Inform. Transmission 9, 177 (1973).
     Vedral; No-Hypersignaling Principle, Phys. Rev. Lett. 119,
     020401 (2017).
You can also read