Synopsis: Eve Fools Alice and Bob

Experiments with classical light sources show that tests of Bell’s inequalities can be manipulated to yield counterfeit quantum answers.

In the 1960s, physicists agonizing over the apparent paradoxes of quantum mechanics posed a question: Could quantum strangeness be explained by a deeper theory with correlations augmented by local hidden variables? In the midst of the debate, John Bell published a set of bounds on the possible correlations of entangled systems. If the correlations obeyed Bell’s inequalities, then they were classical; violations indicated quantum behavior. Since then, it has been tempting to assume that Bell’s inequalities are the gold standard for distinguishing quantum character from classical counterfeits. But what if there are loopholes in the fine print? And what about the security of quantum cryptographic techniques that depend on Bell tests of quantum correlations?

Writing in Physical Review Letters, Ilja Gerhardt, from the National University of Singapore, and colleagues report experiments showing that an eavesdropper, Eve, can use such loopholes to make classical correlations appear quantum to Alice and Bob, two parties in a supposedly private communication. The result reveals that there are indeed loopholes that must be closed before signing off on the results of a Bell test or before Alice and Bob could completely trust their quantum cryptographic system.

The authors’ experiments used a standard setup for testing Bell inequalities by means of single-photon detectors, crucial tools in quantum information systems. However, their light source was entirely classical, consisting of strong, carefully tailored pulses of light that overwhelm and manipulate the detection process to yield apparently single-photon responses of the desired character. The results show that Bell’s inequalities are a good test of quantum behavior only if all the loopholes in their measurement are closed. It may be essential, the authors conclude, to verify that events are really causally separated and to ensure that the single-photon detectors rarely fail to detect a photon. – David Voss


Announcements

More Announcements »

Subject Areas

Quantum Information

Previous Synopsis

Nanophysics

Meniscus Lithography

Read More »

Next Synopsis

Related Articles

Synopsis: All-Around Single-Photon Source
Quantum Information

Synopsis: All-Around Single-Photon Source

A quantum dot embedded in a micropillar is an efficient source of pure and indistinguishable single photons. Read More »

Focus: Burglar Alarm Based on Quantum Mechanics
Quantum Information

Focus: Burglar Alarm Based on Quantum Mechanics

Researchers demonstrated a scheme that relies on quantum mechanics to prevent unauthorized access to restricted objects, such as nuclear materials. Read More »

Viewpoint: Closing the Door on Einstein and Bohr’s Quantum Debate
Optics

Viewpoint: Closing the Door on Einstein and Bohr’s Quantum Debate

By closing two loopholes at once, three experimental tests of Bell’s inequalities remove the last doubts that we should renounce local realism. They also open the door to new quantum information technologies. Read More »

More Articles