Entanglement in action | IBM Quantum Learning (2024)

Download the slides for this lesson.

Introduction

In this lesson we will take a look at three fundamentally important examples. The first two are the teleportation and superdense coding protocols, which are principally concerned with the transmission of information from a sender to a receiver. The third example is an abstract game, called the CHSH game, which illustrates a phenomenon in quantum information that is sometimes referred to as nonlocality. (The CHSH game is not always described as a game. It is often described instead as an experiment — specifically, it is an example of a Bell test — and is referred to as the CHSH inequality.)

Teleportation, superdense coding, and the CHSH game are not merely examples meant to illustrate how quantum information works (although they do serve well in this regard). Rather, they are stones in the foundation of quantum information. Entanglement plays a key role in all three examples, so this lesson provides the first opportunity in this series to see entanglement in action, and to begin to explore what it is that makes entanglement such an interesting and important concept.

Before proceeding to the examples themselves, a few preliminary comments connected with all three examples are in order.

Alice and Bob

Alice and Bob are names traditionally given to hypothetical entities or agents in systems, protocols, games, and other interactions that involve the exchange of information. While these are names typically given to humans, it should be understood that they represent abstractions and not necessarily actual human beings — so Alice and Bob might be expected to perform complex computations, for instance.

These names were first used in this way in the 1970s in the context of cryptography, but the convention has become common more broadly since then. The idea is simply that these are common names (at least in some parts of the world) that start with the letters A and B. It is also quite convenient to refer to Alice with the pronoun "her" and Bob with the pronoun "him" for the sake of brevity.

By default, we imagine that Alice and Bob are in different locations. They may have different goals and behaviors depending on the context in which they arise. For example, in communication, meaning the transmission of information, we might decide to use the name Alice to refer to the sender and Bob to refer to the receiver of whatever information is transmitted. In general, it may be that Alice and Bob cooperate, which is typical of a wide range of settings — but in other settings they may be in competition, or they may have different goals that may or may not be consistent or harmonious. These things must be made clear in the situation at hand.

We can also introduce additional characters, such as Charlie and Diane, as needed. Other names that represent different personas, such as Eve for an eavesdropper or Mallory for someone behaving maliciously, are also sometimes used.

Alice and Bob appear in all three of the examples to be discussed in this lesson, and we will encounter them from time to time in subsequent lessons.

Entanglement as a resource

Recall this example of an entangled quantum state of two qubits from Lesson 2:

ϕ+=1200+1211.(1)\vert \phi^+ \rangle = \frac{1}{\sqrt{2}} \vert 00\rangle + \frac{1}{\sqrt{2}} \vert 11\rangle. \tag{1}ϕ+=21∣00+21∣11.(1)

It is one of the four Bell states, and is often viewed as the archetypal example of an entangled quantum state.

We also encountered this example of a probabilistic state of two bits:

1200+1211.(2)\frac{1}{2} \vert 00 \rangle + \frac{1}{2} \vert 11 \rangle. \tag{2}21∣00+21∣11.(2)

It is, in some sense, analogous to the entangled quantum state (1).(1).(1). It represents a probabilistic state in which two bits are correlated, but it is not entangled. Entanglement is a uniquely quantum phenomenon, essentially by definition: in simplified terms, entanglement refers to any non-classical quantum correlation.

Unfortunately, defining entanglement as non-classical quantum correlation is somewhat unsatisfying at an intuitive level, because it's a definition of entanglement is in terms of what it is not. It may be for this reason that it's actually rather challenging to explain precisely what entanglement is, and what makes it special, in intuitive terms.

Typical explanations of entanglement often fail to distinguish the two states (1)(1)(1) and (2)(2)(2) in a meaningful way. For example, it is sometimes said that if one of two entangled qubits is measured, then the state of the other qubit is somehow instantaneously affected; or that the state of the two qubits together cannot be described separately; or that the two qubits somehow maintain a memory of each other. These statements are not false — but why are they not also true for the (unentangled) probabilistic state (2)(2)(2)? The two bits represented by this state are intimately connected: each one has a perfect memory of the other in a literal sense. But it is nevertheless not entangled.

One way to explain what makes entanglement special, and what makes the quantum state (1)(1)(1) very different from the probabilistic state (2),(2),(2), is to explain what can be done with entanglement, or what we can see happening because of entanglement, that goes beyond the decisions we make about how to represent our knowledge of states using vectors. All three of the examples to be discussed in this lesson have this nature, in that they illustrate things that can be done with the state (1)(1)(1) that cannot be done with any classically correlated state, including the state (2).(2).(2).

Indeed, it is typical in the study of quantum information and computation that entanglement is viewed as a resource through which different tasks can be accomplished. When this is done, the state (1)(1)(1) is viewed as representing one unit of entanglement, which we refer to as an e-bit. (The "e" stands for "entangled" or "entanglement." While it is true that the state (1)(1)(1) is a state of two qubits, the quantity of entanglement that it represents is one e-bit.)

Incidentally, we can also view the probabilistic state (2)(2)(2) as a resource, which is one bit of shared randomness. It can be very useful in cryptography, for instance, to share a random bit with somebody (presuming that nobody else knows what the bit is), so that it can be used as a private key (or part of a private key) for the sake of encryption. But in this lesson the focus is on entanglement and a few things we can do with it.

As a point of clarification regarding terminology, when we say that Alice and Bob share an e-bit, what we mean is that Alice has a qubit named A,\mathsf{A},A, Bob has a qubit named B,\mathsf{B},B, and together the pair (A,B)(\mathsf{A},\mathsf{B})(A,B) is in the quantum state (1).(1).(1). Different names could, of course, be chosen for the qubits, but throughout this lesson we will stick with these names in the interest of clarity.

Teleportation

Quantum teleportation, or just teleportation for short, is a protocol where a sender (Alice) transmits a qubit to a receiver (Bob) by making use of a shared entangled quantum state (one e-bit, to be specific) along with two bits of classical communication. The name teleportation is meant to be suggestive of the concept in science fiction where matter is transported from one location to another by a futuristic process, but it must be understood that matter is not teleported in quantum teleportation — what is actually teleported is quantum information.

The set-up for teleportation is as follows.

We assume that Alice and Bob share an e-bit: Alice holds a qubit A,\mathsf{A},A, Bob holds a qubit B,\mathsf{B},B, and together the pair (A,B)(\mathsf{A},\mathsf{B})(A,B) is in the state ϕ+.\vert\phi^+\rangle.ϕ+. It could be, for instance, that Alice and Bob were in the same location in the past, they prepared the qubits A\mathsf{A}A and B\mathsf{B}B in the state ϕ+,\vert \phi^+ \rangle,ϕ+, and then each went their own way with their qubit in hand. Or, it could be that a different process, such as one involving a third party or a complex distributed process, was used to establish this shared e-bit. These details are not part of the teleportation protocol itself.

Alice then comes into possession of a third qubit Q\mathsf{Q}Q that she wishes to transmit to Bob. The state of the qubit Q\mathsf{Q}Q is considered to be unknown to Alice and Bob, and no assumptions are made about it. For example, the qubit Q\mathsf{Q}Q might be entangled with one or more other systems that neither Alice nor Bob can access. To say that Alice wishes to transmit the qubit Q\mathsf{Q}Q to Bob means that Alice would like Bob to be holding a qubit that is in the same state that Q\mathsf{Q}Q was in at the start of the protocol, having whatever correlations that Q\mathsf{Q}Q had with other systems, as if Alice had physically handed Q\mathsf{Q}Q to Bob.

We can, of course, imagine that Alice physically sends the qubit Q\mathsf{Q}Q to Bob, and presuming that Q\mathsf{Q}Q reaches Bob without being altered or disturbed in transit, Alice and Bob's task will be accomplished. In the context of teleportation, however, it is our assumption that it is not possible for Alice to physically send Q\mathsf{Q}Q to Bob. She may, however, send classical information to Bob.

These are reasonable assumptions in a variety of settings. For example, if Alice does not know Bob's exact location, or the distance between them is large, physically sending a qubit using the technology of today, or the foreseeable future, would be challenging to say the least. However, as we know from everyday experiences, classical information transmission under these circ*mstances is quite straightforward.

At this point, one might ask whether it is possible for Alice and Bob to accomplish their task without even needing to make use of a shared e-bit. In other words, is there any way to transmit a qubit using classical communication alone? The answer is no, it is not possible to transmit quantum information using classical communication alone. This is not too difficult to prove using basic quantum information theory covered in the third unit of this series — but for now, an intuitive way to rule out the possibility of transmitting qubits using classical communication alone is to think about the no-cloning theorem.

Imagine that there was a way to send quantum information using classical communication alone. Classical information can easily be copied and broadcast, which means that any classical transmission from Alice to Bob might also potentially be received by a second receiver (Charlie, let us say). But if Charlie receives the same classical communication that Bob received, then would he not also be able to obtain a copy of the qubit Q?\mathsf{Q}?Q? This would suggest that Q\mathsf{Q}Q was cloned, which we already know is impossible from the no-cloning theorem. So, we conclude that there is no way to send quantum information using classical communication alone.

When the assumption that Alice and Bob share an e-bit is in place, however, it is possible for Alice and Bob to accomplish their task. This is precisely what the quantum teleportation protocol does.

Protocol

Here is a quantum circuit diagram that describes the teleportation protocol:

Entanglement in action | IBM Quantum Learning (1)

The diagram is slightly stylized in that it depicts the separation between Alice and Bob, with two diagonal wires representing classical bits that are sent from Alice to Bob, but otherwise it is an ordinary quantum circuit diagram.

In words, the teleportation protocol is as follows:

  1. Alice performs a controlled-NOT operation on the pair (A,Q),(\mathsf{A},\mathsf{Q}),(A,Q), with Q\mathsf{Q}Q being the control and A\mathsf{A}A being the target, and then performs a Hadamard operation on Q.\mathsf{Q}.Q.

  2. Alice then measures both A\mathsf{A}A and Q,\mathsf{Q},Q, with respect to a standard basis measurement in both cases, and transmits the classical outcomes to Bob. Let us refer to the outcome of the measurement of A\mathsf{A}A as aaa and the outcome of the measurement of Q\mathsf{Q}Q as b.b.b.

  3. Bob receives aaa and bbb from Alice, and depending on the values of these bits he performs these operations:

    • If a=1,a = 1,a=1, then Bob performs a bit flip (or XXX gate) on his qubit B.\mathsf{B}.B.
    • If b=1,b = 1,b=1, then Bob performs a phase flip (or ZZZ gate) on his qubit B.\mathsf{B}.B.

    That is, conditioned on ababab being 00,00,00, 01,01,01, 10,10,10, or 11,11,11, Bob performs one of the operations I,\mathbb{I},I, Z,Z,Z, X,X,X, or ZXZXZX on the qubit B.\mathsf{B}.B.

This is the complete description of the teleportation protocol. The analysis that appears below reveals that when it is run, the qubit B\mathsf{B}B will be in whatever state Q\mathsf{Q}Q was in prior to the protocol being executed, including whatever correlations it had with any other systems — which is to say that the protocol has effectively implemented a perfect qubit communication channel, where the state of Q\mathsf{Q}Q has been "teleported" into B.\mathsf{B}.B.

Before proceeding to the analysis, notice that this protocol does not succeed in cloning the state of Q,\mathsf{Q},Q, which we already know is impossible by the no-cloning theorem. Rather, when the protocol is finished, the state of the qubit Q\mathsf{Q}Q will have changed from its original value to b\vert b\rangleb as a result of the measurement performed on it. Also notice that the e-bit has effectively been "burned" in the process: the state of A\mathsf{A}A has changed to a\vert a\ranglea and is no longer entangled with B\mathsf{B}B (or any other system). This is the cost of teleportation.

Analysis

To analyze the teleportation protocol, we'll examine the behavior of the circuit described above, one step at a time, beginning with the situation in which Q\mathsf{Q}Q is initially in the state α0+β1.\alpha\vert 0\rangle + \beta\vert 1\rangle.α∣0+β∣1. This is not the most general situation, as it does not capture the possibility that Q\mathsf{Q}Q is entangled with other systems, but starting with this simpler case will add clarity to the analysis. The more general case is addressed below, following the analysis of the simpler case.

Specifically, we will consider the states of the qubits (B,A,Q)(\mathsf{B},\mathsf{A},\mathsf{Q})(B,A,Q) at the times suggested by this figure:

Entanglement in action | IBM Quantum Learning (2)

Under the assumption that the qubit Q\mathsf{Q}Q begins the protocol in the state α0+β1,\alpha\vert 0\rangle + \beta\vert 1\rangle,α∣0+β∣1, the state of the three qubits (B,A,Q)(\mathsf{B},\mathsf{A},\mathsf{Q})(B,A,Q) together at the start of the protocol is therefore

π0=ϕ+(α0+β1)=α000+α110+β001+β1112.\vert \pi_0 \rangle = \vert \phi^+\rangle \otimes \bigl(\alpha\vert 0\rangle + \beta\vert 1\rangle \bigr) = \frac{\alpha \vert 000 \rangle + \alpha \vert 110\rangle + \beta \vert 001\rangle + \beta \vert 111\rangle}{\sqrt{2}}.π0=ϕ+(α∣0+β∣1)=2α∣000+α∣110+β∣001+β∣111.

The first gate that is performed is the controlled-NOT gate, which transforms the state π0\vert\pi_0\rangleπ0 into

π1=α000+α110+β011+β1012.\vert \pi_1 \rangle = \frac{\alpha \vert 000 \rangle + \alpha \vert 110\rangle + \beta \vert 011\rangle + \beta \vert 101\rangle}{\sqrt{2}}.π1=2α∣000+α∣110+β∣011+β∣101.

Then the Hadamard gate is applied, which transforms the state π1\vert\pi_1\rangleπ1 into

π2=α00++α11++β01+β102=α000+α001+α110+α111+β010β011+β100β1012.\begin{aligned} \vert\pi_2\rangle & = \frac{\alpha \vert 00\rangle \vert + \rangle + \alpha \vert 11\rangle\vert +\rangle + \beta \vert 01\rangle\vert -\rangle + \beta \vert 10\rangle\vert -\rangle}{\sqrt{2}}\\[2mm] & = \frac{\alpha \vert 000 \rangle + \alpha \vert 001 \rangle + \alpha \vert 110 \rangle + \alpha \vert 111 \rangle + \beta \vert 010 \rangle - \beta \vert 011 \rangle + \beta \vert 100 \rangle - \beta \vert 101 \rangle}{2}. \end{aligned}π2=2α∣00++α∣11++β∣01+β∣10=2α∣000+α∣001+α∣110+α∣111+β∣010β∣011+β∣100β∣101.

Using the multilinearity of the tensor product, we may alternatively write this state as follows:

π2=12(α0+β1)00+12(α0β1)01+12(α1+β0)10+12(α1β0)11.\begin{aligned} \vert\pi_2\rangle = \quad & \frac{1}{2} \bigl(\alpha\vert 0 \rangle + \beta \vert 1\rangle \bigr)\vert 00\rangle \\[1mm] + & \frac{1}{2} \bigl(\alpha\vert 0 \rangle - \beta \vert 1\rangle \bigr)\vert 01\rangle \\[1mm] + & \frac{1}{2} \bigl(\alpha\vert 1 \rangle + \beta \vert 0\rangle \bigr)\vert 10\rangle \\[1mm] + & \frac{1}{2} \bigl(\alpha\vert 1 \rangle - \beta \vert 0\rangle \bigr)\vert 11\rangle. \end{aligned}π2=+++21(α∣0+β∣1)∣0021(α∣0β∣1)∣0121(α∣1+β∣0)∣1021(α∣1β∣0)∣11.

At first glance, it might look like something magical has happened, because the leftmost qubit B\mathsf{B}B now seems to depend on the numbers α\alphaα and β,\beta,β, even though there has not yet been any communication from Alice to Bob. This is, in fact, an illusion: scalars float freely through tensor products, so α\alphaα and β\betaβ are neither more nor less associated with the leftmost qubit than they are with the other qubits. All we have done is to use algebra to express the state in a way that facilitates an analysis of the measurements.

Now let us consider the four possible outcomes of Alice's standard basis measurements, together with the actions that Bob performs as a result.

Possible outcomes

  • The outcome of Alice's measurement is ab=00ab = 00ab=00 with probability

    12(α0+β1)2=α2+β24=14,\Biggl\| \frac{1}{2}\bigl(\alpha \vert 0\rangle + \beta\vert 1\rangle\bigr) \Biggr\|^2 = \frac{\vert\alpha\vert^2 + \vert\beta\vert^2}{4} = \frac{1}{4},21(α∣0+β∣1)2=4α2+β2=41,

    in which case the state of (B,A,Q)(\mathsf{B},\mathsf{A},\mathsf{Q})(B,A,Q) becomes

    (α0+β1)00.\bigl( \alpha \vert 0 \rangle + \beta \vert 1 \rangle \bigr) \vert 00 \rangle.(α∣0+β∣1)∣00.

    Bob does nothing in this case, and so this is the final state of these three qubits.

  • The outcome of Alice's measurement is ab=01ab = 01ab=01 with probability

    12(α0β1)2=α2+β24=14,\Biggl\| \frac{1}{2}\bigl(\alpha \vert 0\rangle - \beta\vert 1\rangle\bigr) \Biggr\|^2 = \frac{\vert\alpha\vert^2 + \vert{-\beta}\vert^2}{4} = \frac{1}{4},21(α∣0β∣1)2=4α2+β2=41,

    in which case the state of (B,A,Q)(\mathsf{B},\mathsf{A},\mathsf{Q})(B,A,Q) becomes

    (α0β1)01.\bigl( \alpha \vert 0 \rangle - \beta \vert 1 \rangle \bigr) \vert 01 \rangle.(α∣0β∣1)∣01.

    In this case Bob applies a ZZZ gate to B,\mathsf{B},B, leaving (B,A,Q)(\mathsf{B},\mathsf{A},\mathsf{Q})(B,A,Q) in the state

    (α0+β1)01.\bigl( \alpha \vert 0 \rangle + \beta \vert 1 \rangle \bigr) \vert 01 \rangle.(α∣0+β∣1)∣01.
  • The outcome of Alice's measurement is ab=10ab = 10ab=10 with probability

    12(α1+β0)2=α2+β24=14,\Biggl\| \frac{1}{2}\bigl(\alpha \vert 1\rangle + \beta\vert 0\rangle\bigr) \Biggr\|^2 = \frac{\vert\alpha\vert^2 + \vert\beta\vert^2}{4} = \frac{1}{4},21(α∣1+β∣0)2=4α2+β2=41,

    in which case the state of (B,A,Q)(\mathsf{B},\mathsf{A},\mathsf{Q})(B,A,Q) becomes

    (α1+β0)10.\bigl( \alpha \vert 1 \rangle + \beta \vert 0 \rangle \bigr) \vert 10 \rangle.(α∣1+β∣0)∣10.

    In this case, Bob applies an XXX gate to the qubit B,\mathsf{B},B, leaving (B,A,Q)(\mathsf{B},\mathsf{A},\mathsf{Q})(B,A,Q) in the state

    (α0+β1)10.\bigl( \alpha \vert 0 \rangle + \beta \vert 1 \rangle \bigr) \vert 10 \rangle.(α∣0+β∣1)∣10.
  • The outcome of Alice's measurement is ab=11ab = 11ab=11 with probability

    12(α1β0)2=α2+β24=14,\Biggl\| \frac{1}{2}\bigl(\alpha \vert 1\rangle - \beta\vert 0\rangle\bigr) \Biggr\|^2 = \frac{\vert\alpha\vert^2 + \vert{-\beta}\vert^2}{4} = \frac{1}{4},21(α∣1β∣0)2=4α2+β2=41,

    in which case the state of (B,A,Q)(\mathsf{B},\mathsf{A},\mathsf{Q})(B,A,Q) becomes

    (α1β0)11.\bigl( \alpha \vert 1 \rangle - \beta \vert 0 \rangle \bigr) \vert 11 \rangle.(α∣1β∣0)∣11.

    In this case, Bob performs the operation ZXZXZX on the qubit B,\mathsf{B},B, leaving (B,A,Q)(\mathsf{B},\mathsf{A},\mathsf{Q})(B,A,Q) in the state

    (α0+β1)11.\bigl( \alpha \vert 0 \rangle + \beta \vert 1 \rangle \bigr) \vert 11 \rangle.(α∣0+β∣1)∣11.

We now see, in all four cases, that Bob's qubit B\mathsf{B}B is left in the state α0+β1\alpha\vert 0\rangle + \beta\vert 1\rangleα∣0+β∣1 at the end of the protocol, which is the initial state of the qubit Q.\mathsf{Q}.Q. This is what we wanted to show: the teleportation protocol has worked correctly in the case at hand.

We also see that the qubits A\mathsf{A}A and Q\mathsf{Q}Q are left in one of the four states 00,\vert 00\rangle,∣00, 01,\vert 01\rangle,∣01, 10,\vert 10\rangle,∣10, or 11,\vert 11\rangle,∣11, each with probability 1/4,1/4,1/4, depending upon the measurement outcomes that Alice obtained. Thus, as was already suggested above, at the end of the protocol Alice no longer has the state α0+β1,\alpha \vert 0\rangle + \beta \vert 1\rangle,α∣0+β∣1, which is expected by the no-cloning theorem.

Also notice that Alice's measurements yield absolutely no information about the state α0+β1.\alpha \vert 0\rangle + \beta \vert 1\rangle.α∣0+β∣1. That is, the probability for each of the four possible measurement outcomes is 1/4,1/4,1/4, irrespective of α\alphaα and β.\beta.β. This is also essential for teleportation to work correctly: extracting information from an unknown quantum state necessarily disturbs it in general, but here Bob obtains the state without it being disturbed.

Now let us consider the more general situation in which the qubit Q\mathsf{Q}Q is initially entangled with another system, which we will name R.\mathsf{R}.R. A similar analysis to the one above reveals that the teleportation protocol functions correctly in this more general case: at the end of the protocol, the qubit B\mathsf{B}B held by Bob is entangled with R\mathsf{R}R in the same way that Q\mathsf{Q}Q was at the start of the protocol, as if Alice had simply handed Q\mathsf{Q}Q to Bob.

To prove this, let us suppose that the state of the pair (Q,R)(\mathsf{Q},\mathsf{R})(Q,R) is initially given by a quantum state vector of the form

α0Qγ0R+β1Qγ1R,\alpha \vert 0 \rangle_{\mathsf{Q}} \vert \gamma_0\rangle_{\mathsf{R}} + \beta \vert 1 \rangle_{\mathsf{Q}} \vert \gamma_1\rangle_{\mathsf{R}},α∣0Qγ0R+β∣1Qγ1R,

where γ0\vert\gamma_0\rangleγ0 and γ1\vert\gamma_1\rangleγ1 are unit vectors and α\alphaα and β\betaβ are complex numbers satisfying α2+β2=1.\vert \alpha \vert^2 + \vert\beta\vert^2 = 1.α2+β2=1. Any quantum state vector of the pair (Q,R)(\mathsf{Q},\mathsf{R})(Q,R) can be expressed in this way.

The following figure depicts the same circuit as before, with the addition of the system R\mathsf{R}R (represented by a collection of qubits on the top of the diagram that nothing happens to).

Entanglement in action | IBM Quantum Learning (3)

To analyze what happens when the teleportation protocol is run, it is helpful to permute the systems, along the same lines that was described in Lesson 2. Specifically, we will consider the state of the systems in the order (B,R,A,Q)(\mathsf{B},\mathsf{R},\mathsf{A},\mathsf{Q})(B,R,A,Q) rather than (B,A,Q,R).(\mathsf{B},\mathsf{A},\mathsf{Q},\mathsf{R}).(B,A,Q,R). The names of the various systems will be included as subscripts in the expressions that follow for the sake of clarity.

At the start of the protocol, the state of these systems is as follows:

π0=ϕ+BA(α0Qγ0R+β1Qγ1R)=α0Bγ0R00AQ+α1Bγ0R10AQ+β0Bγ1R01AQ+β1Bγ1R11AQ2.\begin{aligned} \vert \pi_0\rangle & = \vert \phi^+\rangle_{\mathsf{BA}} \otimes \bigl( \alpha \vert 0\rangle_{\mathsf{Q}} \vert\gamma_0\rangle_{\mathsf{R}} + \beta \vert 1\rangle_{\mathsf{Q}}\vert\gamma_1\rangle_{\mathsf{R}}\bigr)\\[1mm] & = \frac{ \alpha \vert 0\rangle_{\mathsf{B}} \vert \gamma_0 \rangle_{\mathsf{R}} \vert 00 \rangle_{\mathsf{AQ}} + \alpha \vert 1\rangle_{\mathsf{B}} \vert \gamma_0 \rangle_{\mathsf{R}} \vert 10 \rangle_{\mathsf{AQ}} + \beta \vert 0\rangle_{\mathsf{B}} \vert \gamma_1 \rangle_{\mathsf{R}} \vert 01 \rangle_{\mathsf{AQ}} + \beta \vert 1\rangle_{\mathsf{B}} \vert \gamma_1 \rangle_{\mathsf{R}} \vert 11 \rangle_{\mathsf{AQ}}}{\sqrt{2}}. \end{aligned}π0=ϕ+BA(α∣0Qγ0R+β∣1Qγ1R)=2α∣0Bγ0R∣00AQ+α∣1Bγ0R∣10AQ+β∣0Bγ1R∣01AQ+β∣1Bγ1R∣11AQ.

First the controlled-NOT gate is applied, which transforms this state to

π1=α0Bγ0R00AQ+α1Bγ0R10AQ+β0Bγ1R11AQ+β1Bγ1R01AQ2.\vert\pi_1\rangle = \frac{ \alpha \vert 0\rangle_{\mathsf{B}} \vert\gamma_0 \rangle_{\mathsf{R}} \vert 00\rangle_{\mathsf{AQ}} + \alpha \vert 1\rangle_{\mathsf{B}} \vert\gamma_0 \rangle_{\mathsf{R}} \vert 10\rangle_{\mathsf{AQ}} + \beta \vert 0\rangle_{\mathsf{B}} \vert\gamma_1 \rangle_{\mathsf{R}} \vert 11\rangle_{\mathsf{AQ}} + \beta \vert 1\rangle_{\mathsf{B}} \vert\gamma_1 \rangle_{\mathsf{R}} \vert 01\rangle_{\mathsf{AQ}}}{\sqrt{2}}.π1=2α∣0Bγ0R∣00AQ+α∣1Bγ0R∣10AQ+β∣0Bγ1R∣11AQ+β∣1Bγ1R∣01AQ.

Then the Hadamard gate is applied. After expanding and simplifying the resulting state, along similar lines to the analysis of the simpler case above, we obtain this expression of the resulting state:

π2=12(α0Bγ0R+β1Bγ1R)00AQ+12(α0Bγ0Rβ1Bγ1R)01AQ+12(α1Bγ0R+β0Bγ1R)10AQ+12(α1Bγ0Rβ0Bγ1R)11AQ.\begin{aligned} \vert \pi_2 \rangle = \quad & \frac{1}{2} \bigl( \alpha \vert 0\rangle_{\mathsf{B}} \vert\gamma_0\rangle_{\mathsf{R}} + \beta \vert 1\rangle_{\mathsf{B}} \vert\gamma_1\rangle_{\mathsf{R}} \bigr) \vert 00\rangle_{\mathsf{AQ}}\\[2mm] + & \frac{1}{2} \bigl( \alpha \vert 0\rangle_{\mathsf{B}} \vert\gamma_0\rangle_{\mathsf{R}} - \beta \vert 1\rangle_{\mathsf{B}} \vert\gamma_1\rangle_{\mathsf{R}} \bigr) \vert 01\rangle_{\mathsf{AQ}}\\[2mm] + & \frac{1}{2} \bigl( \alpha \vert 1\rangle_{\mathsf{B}} \vert\gamma_0\rangle_{\mathsf{R}} + \beta \vert 0\rangle_{\mathsf{B}} \vert\gamma_1\rangle_{\mathsf{R}} \bigr) \vert 10\rangle_{\mathsf{AQ}}\\[2mm] + & \frac{1}{2} \bigl( \alpha \vert 1\rangle_{\mathsf{B}} \vert\gamma_0\rangle_{\mathsf{R}} - \beta \vert 0\rangle_{\mathsf{B}} \vert\gamma_1\rangle_{\mathsf{R}} \bigr) \vert 11\rangle_{\mathsf{AQ}}. \end{aligned}π2=+++21(α∣0Bγ0R+β∣1Bγ1R)∣00AQ21(α∣0Bγ0Rβ∣1Bγ1R)∣01AQ21(α∣1Bγ0R+β∣0Bγ1R)∣10AQ21(α∣1Bγ0Rβ∣0Bγ1R)∣11AQ.

Proceeding exactly as before, where we consider the four different possible outcomes of Alice's measurements along with the corresponding actions performed by Bob, we find that at the end of the protocol, the state of (B,R)(\mathsf{B},\mathsf{R})(B,R) is always

α0γ0+β1γ1.\alpha \vert 0 \rangle \vert \gamma_0\rangle + \beta \vert 1 \rangle \vert \gamma_1\rangle.α∣0γ0+β∣1γ1.

Informally speaking, the analysis does not change in a significant way as compared with the simpler case above; γ0\vert\gamma_0\rangleγ0 and γ1\vert\gamma_1\rangleγ1 essentially just "come along for the ride." So, teleportation succeeds in creating a perfect quantum communication channel, effectively transmitting the contents of the qubit Q\mathsf{Q}Q into B\mathsf{B}B and preserving all correlations with any other systems.

As it turns out, this is actually not surprising given the analysis of the simpler case above. As that analysis revealed, we have a physical process that acts like the identity operation on a qubit in an arbitrary quantum state, and there is only one way that can happen: the operation implemented by the protocol must be the identity operation. That is, once we know that teleportation works correctly for a single qubit in isolation, we can conclude that the protocol effectively implements a perfect, noiseless quantum channel, and so it must work correctly even if the input qubit is entangled with another system. A proper explanation of this conclusion requires the general formulation of quantum information, to be covered in Unit 3 of the series, but the point is that by linearity there really wasn't a need to go through the more general analysis.

Further discussion

Here are a few brief, concluding remarks on teleportation.

First, it should be understood that teleportation is not an application of quantum information, it's a protocol for performing quantum communication. It is only useful insofar as quantum communication is useful.

Second, it is reasonable to speculate that teleportation could one day become a standard way to communicate quantum information, perhaps through a process known as entanglement distillation. This is a process that converts a larger number of noisy (or imperfect) e-bits into a smaller number of high-quality e-bits, that could then be used for noiseless or near-noiseless teleportation. The idea is that the process of entanglement distillation is not as delicate as direct quantum communication. We could accept losses, for instance, and if the process doesn't work out, then we can just try again. In contrast, the actual qubits we hope to communicate might be much more precious.

Finally, the idea behind teleportation and the way that it works is quite fundamental in quantum information and computation. It is a cornerstone of quantum information theory, and variations on the idea also often arise. As just one example, quantum gates can be implemented using teleportation, but where different initial states and measurements are chosen so that the outcome is to apply a chosen operation rather than to communicate.

Qiskit implementation

Run

The ability to run code cells is currently disabled.

Copy to clipboard

No output produced

Here is a quantum circuit implementation of the teleportation protocol.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

Entanglement in action | IBM Quantum Learning (4)

The circuit makes use of a few features of Qiskit that we've not yet seen in previous lessons, including the barrier and if_test functions. The barrier function creates a visual separation making the circuit diagram more readable, and it also prevents Qiskit from performing various simplifications and optimizations across barriers during compilation when circuits are run on real hardware. The if_test function applies an operation conditionally depending on a classical bit or register.

The circuit first initializes (A,B)(\mathsf{A},\mathsf{B})(A,B) to be in a ϕ+\vert \phi^+\rangleϕ+ state (which is not part of the protocol itself), followed by Alice's operations, then her measurements, and finally Bob's operations.

To test that the protocol works correctly, we'll apply a randomly generated single-qubit gate to the initialized 0\vert 0\rangle∣0 state of Q\mathsf{Q}Q to obtain a random quantum state vector to be teleported. By applying the inverse (i.e., conjugate transpose) of that gate to B\mathsf{B}B after the protocol is run, we can verify that the state was teleported by measuring to see that it has returned to the 0\vert 0\rangle∣0 state.

First we'll randomly choose a unitary qubit gate.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

array([[-9.99999078e-01+0.j , 8.19563447e-04-0.00108289j], [ 1.24668618e-03+0.00053861j, 8.70230844e-01-0.4926423j ]])

Now we'll create a new testing circuit that first applies our random gate to Q,\mathsf{Q},Q, then runs the teleportation circuit, and finally applies the inverse of our random gate to the qubit B\mathsf{B}B and measures. The outcome should be 000 with certainty.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

Entanglement in action | IBM Quantum Learning (5)

Finally let's run the Aer simulator on this circuit and plot a histogram of the outputs. We'll see the statistics for all three classical bits: the bottom/leftmost bit should always be 0,0,0, indicating that the qubit Q\mathsf{Q}Q was successfully teleported into B,\mathsf{B},B, while the other two bits should be roughly uniform.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

Entanglement in action | IBM Quantum Learning (6)

We can also filter the statistics to focus just on the test result qubit if we wish, like this:

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

Entanglement in action | IBM Quantum Learning (7)

Superdense coding

Superdense coding is a protocol that, in some sense, achieves a complementary aim to teleportation. Rather than allowing for the transmission of one qubit using two classical bits of communication (at the cost of one e-bit of entanglement), it allows for the transmission of two classical bits using one qubit of quantum communication (again, at the cost of one e-bit of entanglement).

In greater detail, we have a sender (Alice) and a receiver (Bob) that share one e-bit of entanglement. According to the conventions in place for the lesson, this means that Alice holds a qubit A,\mathsf{A},A, Bob holds a qubit B,\mathsf{B},B, and together the pair (A,B)(\mathsf{A},\mathsf{B})(A,B) is in the state ϕ+.\vert\phi^+\rangle.ϕ+. Alice wishes to transmit two classical bits to Bob, which we'll denoted by ccc and d,d,d, and she will accomplish this by sending him one qubit.

It is reasonable to view this feat as being less interesting than the one that teleportation accomplishes. Sending qubits is likely to be so much more difficult than sending classical bits for the foreseeable future that trading one qubit of quantum communication for two bits of classical communication, at the cost of an e-bit no less, hardly seems worth it. However, this does not imply that superdense coding is not interesting, for it most certainly is.

Fitting the theme of the lesson, one reason why superdense coding is interesting is that it demonstrates a concrete and (in the context of information theory) rather striking use of entanglement. A famous theorem in quantum information theory, known as Holevo's theorem, implies that without the use of a shared entangled state, it is impossible to communicate more than one bit of classical information by sending a single qubit. (Holevo's theorem is more general than this. It's precise statement is technical and requires explanation, but this is one consequence of it.) So, through superdense coding, shared entanglement effectively allows for the doubling of the classical information-carrying capacity of sending qubits.

Protocol

The following quantum circuit diagram describes the superdense coding protocol:

Entanglement in action | IBM Quantum Learning (8)

In words, here is what Alice does:

  1. If d=1,d=1,d=1, Alice performs a ZZZ gate on her qubit A\mathsf{A}A (and if d=0d=0d=0 she does not).

  2. If c=1,c=1,c=1, Alice performs an XXX gate on her qubit A\mathsf{A}A (and if c=0c=0c=0 she does not).

Alice then sends her qubit A\mathsf{A}A to Bob.

What Bob does when he receives the qubit A\mathsf{A}A is to first perform a controlled-NOT gate, with A\mathsf{A}A being the control and B\mathsf{B}B being the target, and then he applies a Hadamard gate to A.\mathsf{A}.A. He then measures B\mathsf{B}B to obtain ccc and A\mathsf{A}A to obtain d,d,d, with standard basis measurements in both cases.

Analysis

The idea behind this protocol is pretty simple: Alice effectively chooses which Bell state she would like to be sharing with Bob, she sends Bob her qubit, and Bob measures to determine which Bell state Alice chose.

That is, they initially share ϕ+,\vert\phi^+\rangle,ϕ+, and depending upon the bits ccc and d,d,d, Alice either leaves this state alone or shifts it to one of the other Bell states by applying I,\mathbb{I},I, X,X,X, Z,Z,Z, or XZXZXZ to her qubit A.\mathsf{A}.A.

(II)ϕ+=ϕ+(IZ)ϕ+=ϕ(IX)ϕ+=ψ+(IXZ)ϕ+=ψ\begin{aligned} (\mathbb{I} \otimes \mathbb{I}) \vert \phi^+ \rangle & = \vert \phi^+\rangle \\ (\mathbb{I} \otimes Z) \vert \phi^+ \rangle & = \vert \phi^-\rangle \\ (\mathbb{I} \otimes X) \vert \phi^+ \rangle & = \vert \psi^+\rangle \\ (\mathbb{I} \otimes XZ) \vert \phi^+ \rangle & = \vert \psi^-\rangle \end{aligned}(II)ϕ+(IZ)ϕ+(IX)ϕ+(IXZ)ϕ+=ϕ+=ϕ=ψ+=ψ

Bob's actions have the following effects on the four Bell states:

ϕ+00ϕ01ψ+10ψ11\begin{aligned} \vert \phi^+\rangle & \mapsto \vert 00\rangle\\ \vert \phi^-\rangle & \mapsto \vert 01\rangle\\ \vert \psi^+\rangle & \mapsto \vert 10\rangle\\ \vert \psi^-\rangle & \mapsto -\vert 11\rangle\\ \end{aligned}ϕ+ϕψ+ψ∣00∣01∣10∣11

This can be checked directly, by computing the results of Bob's operations on these states one at a time.

So, when he performs his measurements, he is able to determine which Bell state Alice chose. To verify that the protocol works correctly is a matter of checking each case:

  • If cd=00,cd = 00,cd=00, then the state of (B,A)(\mathsf{B},\mathsf{A})(B,A) when Bob receives A\mathsf{A}A is ϕ+.\vert \phi^+\rangle.ϕ+. He transforms this state into 00\vert 00\rangle∣00 and obtains cd=00.cd = 00.cd=00.

  • If cd=01,cd = 01,cd=01, then the state of (B,A)(\mathsf{B},\mathsf{A})(B,A) when Bob receives A\mathsf{A}A is ϕ.\vert \phi^-\rangle.ϕ. He transforms this state into 01\vert 01\rangle∣01 and obtains cd=01.cd = 01.cd=01.

  • If cd=10,cd = 10,cd=10, then the state of (B,A)(\mathsf{B},\mathsf{A})(B,A) when Bob receives A\mathsf{A}A is ψ+.\vert \psi^+\rangle.ψ+. He transforms this state into 10\vert 10\rangle∣10 and obtains cd=10.cd = 10.cd=10.

  • If cd=11,cd = 11,cd=11, then the state of (B,A)(\mathsf{B},\mathsf{A})(B,A) when Bob receives A\mathsf{A}A is ψ.\vert \psi^-\rangle.ψ. He transforms this state into 11-\vert 11\rangle∣11 and obtains cd=11.cd = 11.cd=11. (The negative-one phase factor has no effect here.)

Qiskit implementation

Run

The ability to run code cells is currently disabled.

Copy to clipboard

No output produced

Here is a simple implementation of superdense coding where we specify the circuit itself depending on the bits to be transmitted. First let's specify the bits to be transmitted. (Try changing the bits to see that it works correctly.)

Run

The ability to run code cells is currently disabled.

Copy to clipboard

No output produced

Now we'll build the circuit accordingly. Here we'll just allow Qiskit to use the default names for the qubits: q0\mathsf{q}_0q0 for the top qubit and q1\mathsf{q}_1q1 for the bottom one.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

Entanglement in action | IBM Quantum Learning (9)

Not much is new here, except the measure_all function, which measures all of the qubits and puts the results into a single classical register (therefore having two bits in this case).

Running the Aer simulator produces the expected output.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

Measured 10 with frequency 1.0

Entanglement in action | IBM Quantum Learning (10)

Just for fun, we can use an additional qubit as a random bit generator to randomly choose ccc and d,d,d, then run the superdense coding protocol to see that these bits are transmitted correctly.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Running the Aer simulator shows the results: Alice and Bob's classical bits always agree.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

Entanglement in action | IBM Quantum Learning (12)

The CHSH game

The last example to be discussed in this lesson is not a protocol, but a game known as the CHSH game.

When we speak of a game in this context, we're not talking about something that's meant to be played for fun or sport, but rather a mathematical abstraction in the sense of game theory. Mathematical abstractions of games are studied in economics and computer science, for instance, and have great utility.

The letters CHSH refer to the authors — John Clauser, Michael Horne, Abner Shimony, and Richard Holt — of a 1969 paper where the example was first described. They did not describe the example as a game, but rather as an experiment. It's description as a game, however, is both natural and intuitive.

The CHSH game falls within a class of games known as nonlocal games. Nonlocal games are fascinating and have deep connections to physics, computer science, and mathematics — holding mysteries that still remain unsolved. We'll begin the section by explaining what nonlocal games are, and then we'll focus in on the CHSH game and what makes it interesting.

Nonlocal games

A nonlocal game is a cooperative game where two players, Alice and Bob, work together to achieve a particular outcome. The game is run by a referee, who behaves according to strict guidelines that are known to Alice and Bob.

Alice and Bob can prepare for the game however they choose, but once the game starts they are forbidden from communicating. We might imagine the game taking place in a secure facility of some sort — as if the referee is playing the role of a detective and Alice and Bob are suspects being interrogated in different rooms. But another way of thinking about the set-up is that Alice and Bob are separated by a vast distance, and communication is prohibited because the speed of light doesn't allow for it within the running time of the game. That is to say, if Alice tries to send a message to Bob, the game will be over by the time he receives it, and vice versa.

The way a nonlocal game works is that the referee first asks each of Alice and Bob a question. We'll use the letter xxx to refer to Alice's question and yyy to refer to Bob's question. Here we're thinking of xxx and yyy as being classical states, and in the CHSH game xxx and yyy are bits.

The referee uses randomness to select these questions. To be precise, there is some probability p(x,y)p(x,y)p(x,y) associated with each possible pair (x,y)(x,y)(x,y) of questions, and the referee has vowed to choose the questions, at the time of the game, in this way. Everyone, including Alice and Bob, knows these probabilities — but nobody knows specifically which pair (x,y)(x,y)(x,y) will be chosen until the game begins.

After Alice and Bob receive their questions, they must then provide answers: Alice's answer is aaa and Bob's answer is b.b.b. Again, these are classical states in general, and bits in the CHSH game.

At this point the referee makes a decision: Alice and Bob either win or lose depending on whether or not the pair of answers (a,b)(a,b)(a,b) is deemed correct for the pair of questions (x,y)(x,y)(x,y) according to some fixed set of rules. Different rules mean different games, and the rules for the CHSH game specifically are described in the section following this one. As was already suggested, the rules are known to everyone.

The following diagram provides a graphic representation of the interactions.

Entanglement in action | IBM Quantum Learning (13)

It is the uncertainty about which questions will be asked, and specifically the fact that each player doesn't know the other player's question, that makes nonlocal games challenging for Alice and Bob — just like colluding suspects in different rooms trying to keep their story straight.

A precise description of the referee defines an instance of a nonlocal game. This includes a specification of the probabilities p(x,y)p(x,y)p(x,y) for each question pair along with the rules that determine whether a pair of answers (a,b)(a,b)(a,b) wins or loses for each possible question pair (x,y).(x,y).(x,y).

We'll take a look at the CHSH game momentarily, but it's also interesting to consider other nonlocal games. Some nonlocal games are fascinating and mysterious to this day, and some aren't so interesting. While the set-up is simple, there's complexity at work — and for some nonlocal games it can be impossibly difficult to compute best or near-best strategies for Alice and Bob. This is part of the fascinating nature of the non-local games model.

CHSH game description

Here is the precise description of the CHSH game, where (as above) xxx is Alice's question, yyy is Bob's question, aaa is Alice's answer, and bbb is Bob's answer:

  1. The questions and answers are all bits: x,y,a,b{0,1}.x,y,a,b\in\{0,1\}.x,y,a,b{0,1}.

  2. The referee chooses the questions (x,y)(x,y)(x,y) uniformly at random. That is, each of the four possibilities, (0,0),(0,0),(0,0), (0,1),(0,1),(0,1), (1,0),(1,0),(1,0), and (1,1),(1,1),(1,1), is selected with probability 1/4.1/4.1/4.

  3. The answers (a,b)(a,b)(a,b) win for the questions (x,y)(x,y)(x,y) if ab=xya\oplus b = x\wedge yab=xy and lose otherwise. The following table expresses this rule by listing the winning and losing conditions on the answers (a,b)(a,b)(a,b) for each pair of questions (x,y).(x,y).(x,y).

(x,y)winlose(0,0)a=bab(0,1)a=bab(1,0)a=bab(1,1)aba=b\begin{array}{ccc} (x,y) & \text{win} & \text{lose} \\[1mm]\hline \rule{0mm}{4mm}(0,0) & a = b & a \not= b \\[1mm] (0,1) & a = b & a \not= b \\[1mm] (1,0) & a = b & a \not= b \\[1mm] (1,1) & a \not= b & a = b \end{array}(x,y)(0,0)(0,1)(1,0)(1,1)wina=ba=ba=ba=blosea=ba=ba=ba=b

Limitation of classical strategies

Now let's consider strategies for Alice and Bob in the CHSH game, beginning with classical strategies.

Deterministic strategies

We'll start with deterministic strategies, where Alice's answer aaa is a function of the question xxx that she receives, and likewise Bob's answer bbb is a function of the question yyy he receives. So, for instance, we may write a(0)a(0)a(0) to represent Alice's answer when her question is 0,0,0, and a(1)a(1)a(1) to represent Alice's answer when her question is 1.1.1.

No deterministic strategy can possibly win the CHSH game every time. One way to reason this is simply to go one-by-one through all of the possible deterministic strategies and check that every one of them loses for at least one of the four possible question pairs. Alice and Bob can each choose from four possible functions from one bit to one bit — which we encountered in Lesson 1 — and so there are 161616 different deterministic strategies in total to check.

We can also reason this fact analytically. If Alice and Bob's strategy wins when (x,y)=(0,0),(x,y) = (0,0),(x,y)=(0,0), then it must be that a(0)=b(0);a(0) = b(0);a(0)=b(0); if their strategy wins for (x,y)=(0,1),(x,y) = (0,1),(x,y)=(0,1), we conclude that a(0)=b(1);a(0) = b(1);a(0)=b(1); and similarly, if the strategy wins for (x,y)=(1,0)(x,y)=(1,0)(x,y)=(1,0) then a(1)=b(0).a(1) = b(0).a(1)=b(0). So, if their strategy wins for all three possibilities, then we have

b(1)=a(0)=b(0)=a(1).b(1) = a(0) = b(0) = a(1).b(1)=a(0)=b(0)=a(1).

This implies that the strategy loses in the final case (x,y)=(1,1),(x,y) = (1,1),(x,y)=(1,1), for here winning requires that a(1)b(1).a(1) \not= b(1).a(1)=b(1).

Thus, there can be no deterministic strategy that wins every time. It's easy to find strategies that win in three of the four cases (such as a(0)=a(1)=b(0)=b(1)=0),a(0)=a(1)=b(0)=b(1)=0),a(0)=a(1)=b(0)=b(1)=0), and so we see that the maximum probability for Alice and Bob to win using a deterministic strategy is 3/4.3/4.3/4.

Probabilistic strategies

As we just concluded, Alice and Bob cannot do better than winning the CHSH game 75% of the time using a deterministic strategy. But what about a probabilistic strategy? Could it help Alice and Bob to use randomness — including the possibility of shared randomness, where their random choices are correlated?

It turns out that probabilistic strategies don't help at all to increase the probability that Alice and Bob win. This is because every probabilistic strategy can alternatively be viewed as a random selection of a deterministic strategy, just like (as was mentioned in the first lesson) probabilistic operations can be viewed as random selections of deterministic operations. The average is never larger than the maximum, and so it follows that probabilistic strategies don't offer any advantage in terms of their overall winning probability.

Thus, winning with probability 3/43/43/4 is the best that Alice and Bob can do using any classical strategy, whether deterministic or probabilistic.

CHSH game strategy

A natural question to ask at this point is whether Alice and Bob can do any better using a quantum strategy. In particular, if they share an entangled quantum state as the following figure suggests, which they could have prepared prior to playing the game, can they increase their winning probability?

Entanglement in action | IBM Quantum Learning (14)

The answer is yes, and this is the main point of the example and why it's so interesting. So let's see exactly how Alice and Bob can do better in this game using entanglement.

Required vectors and matrices

The first thing we need to do is to define a qubit state vector ψθ,\vert \psi_{\theta}\rangle,ψθ, for each real number θ\thetaθ (which we'll think of as an angle measured in radians) as follows.

ψθ=cos(θ)0+sin(θ)1\vert\psi_{\theta}\rangle = \cos(\theta)\vert 0\rangle + \sin(\theta) \vert 1\rangleψθ=cos(θ)∣0+sin(θ)∣1

Here are some simple examples:

ψ0=0ψπ/2=1ψπ/4=+ψπ/4=\begin{aligned} \vert\psi_{0}\rangle & = \vert 0\rangle \\ \vert\psi_{\pi/2}\rangle & = \vert 1\rangle \\ \vert\psi_{\pi/4}\rangle & = \vert + \rangle \\ \vert\psi_{-\pi/4}\rangle & = \vert - \rangle \end{aligned}ψ0ψπ/2ψπ/4ψπ/4=∣0=∣1=+=

We also have the following examples, which arise in the analysis below:

ψπ/8=2+2202221ψπ/8=2+220+2221ψ3π/8=2220+2+221ψ5π/8=2220+2+221\begin{aligned} \vert\psi_{-\pi/8}\rangle & = \frac{\sqrt{2 + \sqrt{2}}}{2}\vert 0\rangle -\frac{\sqrt{2 - \sqrt{2}}}{2}\vert 1\rangle \\[1mm] \vert\psi_{\pi/8}\rangle & = \frac{\sqrt{2 + \sqrt{2}}}{2}\vert 0\rangle + \frac{\sqrt{2 - \sqrt{2}}}{2}\vert 1\rangle \\[1mm] \vert\psi_{3\pi/8}\rangle & = \frac{\sqrt{2 - \sqrt{2}}}{2}\vert 0\rangle + \frac{\sqrt{2 + \sqrt{2}}}{2}\vert 1\rangle \\[1mm] \vert\psi_{5\pi/8}\rangle & = -\frac{\sqrt{2 - \sqrt{2}}}{2}\vert 0\rangle + \frac{\sqrt{2 + \sqrt{2}}}{2}\vert 1\rangle \end{aligned}ψπ/8ψπ/8ψ3π/8ψ5π/8=22+2∣0222∣1=22+2∣0+222∣1=222∣0+22+2∣1=222∣0+22+2∣1

Looking at the general form, we see that the inner product between any two of these vectors has this formula:

ψαψβ=cos(α)cos(β)+sin(α)sin(β)=cos(αβ).(3)\langle \psi_{\alpha} \vert \psi_{\beta} \rangle = \cos(\alpha)\cos(\beta) + \sin(\alpha)\sin(\beta) = \cos(\alpha-\beta). \tag{3}ψαψβ=cos(α)cos(β)+sin(α)sin(β)=cos(αβ).(3)

In detail, we only have real number entries in these vectors, so there are no complex conjugates to worry about: the inner product is the product of the cosines plus the product of the sines. We can then use one of the so-called angle addition formulas to simplify. This formula reveals the geometric interpretation of the inner product between real unit vectors, as the cosine of the angle between them.

Now, if we compute the inner product of the tensor product of any two of these vectors with the ϕ+\vert \phi^+\rangleϕ+ state, we obtain a similar expression, except that it has a 2\sqrt{2}2 in the denominator:

ψαψβϕ+=cos(α)cos(β)+sin(α)sin(β)2=cos(αβ)2.(4)\langle \psi_{\alpha} \otimes \psi_{\beta} \vert \phi^+ \rangle = \frac{\cos(\alpha)\cos(\beta) + \sin(\alpha)\sin(\beta)}{\sqrt{2}} = \frac{\cos(\alpha-\beta)}{\sqrt{2}}. \tag{4}ψαψβϕ+=2cos(α)cos(β)+sin(α)sin(β)=2cos(αβ).(4)

We're interested in this particular inner product for reasons that will become clear shortly, but for now we're simply observing this as a formula.

Next, we'll define a unitary matrix UθU_{\theta}Uθ for each angle θ\thetaθ as follows.

Uθ=0ψθ+1ψθ+π/2U_{\theta} = \vert 0 \rangle \langle \psi_{\theta} \vert + \vert 1\rangle\langle \psi_{\theta+\pi/2} \vertUθ=∣0ψθ+∣1ψθ+π/2

Intuitively speaking, as an operation this matrix maps ψθ\vert\psi_{\theta}\rangleψθ to 0\vert 0\rangle∣0 and ψθ+π/2\vert \psi_{\theta + \pi/2}\rangleψθ+π/2 to 1.\vert 1\rangle.∣1. To check that this is a unitary matrix, a key observation is that the vectors ψθ\vert\psi_{\theta}\rangleψθ and ψθ+π/2\vert\psi_{\theta + \pi/2}\rangleψθ+π/2 are orthogonal for every angle θ\thetaθ:

ψθψθ+π/2=cos(π/2)=0.\langle \psi_{\theta} \vert \psi_{\theta + \pi/2} \rangle = \cos(\pi/2) = 0.ψθψθ+π/2=cos(π/2)=0.

Thus, we find that

UθUθ=(0ψθ+1ψθ+π/2)(ψθ0+ψθ+π/21)=0ψθψθ0+0ψθψθ+π/21+1ψθ+π/2ψθ0+1ψθ+π/2ψθ+π/21=00+11=I.\begin{aligned} U_{\theta} U_{\theta}^{\dagger} & = \bigl(\vert 0 \rangle \langle \psi_{\theta} \vert + \vert 1\rangle\langle \psi_{\theta+\pi/2} \vert\bigr) \bigl(\vert \psi_{\theta} \rangle \langle 0 \vert + \vert \psi_{\theta+\pi/2}\rangle\langle 1 \vert\bigr) \\[1mm] & = \vert 0 \rangle \langle \psi_{\theta} \vert \psi_{\theta} \rangle \langle 0 \vert + \vert 0 \rangle \langle \psi_{\theta} \vert \psi_{\theta+\pi/2} \rangle \langle 1 \vert + \vert 1 \rangle \langle \psi_{\theta+\pi/2} \vert \psi_{\theta} \rangle \langle 0 \vert + \vert 1 \rangle \langle \psi_{\theta+\pi/2} \vert \psi_{\theta+\pi/2} \rangle \langle 1 \vert \\[1mm] & = \vert 0 \rangle \langle 0 \vert + \vert 1 \rangle \langle 1 \vert\\[1mm] & = \mathbb{I}. \end{aligned}UθUθ=(∣0ψθ+∣1ψθ+π/2)(ψθ0∣+ψθ+π/21∣)=∣0ψθψθ0∣+∣0ψθψθ+π/21∣+∣1ψθ+π/2ψθ0∣+∣1ψθ+π/2ψθ+π/21∣=∣00∣+∣11∣=I.

We may alternatively write this matrix explicitly as

Uθ=(cos(θ)sin(θ)cos(θ+π/2)sin(θ+π/2))=(cos(θ)sin(θ)sin(θ)cos(θ)).U_{\theta} = \begin{pmatrix} \cos(\theta) & \sin(\theta)\\[1mm] \cos(\theta+ \pi/2) & \sin(\theta + \pi/2) \end{pmatrix} = \begin{pmatrix} \cos(\theta) & \sin(\theta)\\[1mm] -\sin(\theta) & \cos(\theta) \end{pmatrix}.Uθ=(cos(θ)cos(θ+π/2)sin(θ)sin(θ+π/2))=(cos(θ)sin(θ)sin(θ)cos(θ)).

This is an example of a rotation matrix, and specifically it rotates two-dimensional vectors with real number entries by an angle of θ-\thetaθ about the origin. If we follow a standard convention for naming and parameterizing rotations of various forms, we have Uθ=Ry(2θ)U_{\theta} = R_y(-2\theta)Uθ=Ry(2θ) where

Ry(θ)=(cos(θ/2)sin(θ/2)sin(θ/2)cos(θ/2)).R_y(\theta) = \begin{pmatrix} \cos(\theta/2) & -\sin(\theta/2)\\[1mm] \sin(\theta/2) & \cos(\theta/2) \end{pmatrix}.Ry(θ)=(cos(θ/2)sin(θ/2)sin(θ/2)cos(θ/2)).

Strategy description

Now we can describe the quantum strategy.

  • Alice and Bob start the game sharing an e-bit: Alice holds a qubit A,\mathsf{A},A, Bob holds a qubit B,\mathsf{B},B, and together the two qubits (X,Y)(\mathsf{X},\mathsf{Y})(X,Y) are in the ψ+\vert\psi^+\rangleψ+ state.
  • Alice's actions are as follows:

    • If her question is x=0,x=0,x=0, she applies U0U_{0}U0 to her qubit A.\mathsf{A}.A.
    • If her question is x=1,x=1,x=1, she applies Uπ/4U_{\pi/4}Uπ/4 to her qubit A.\mathsf{A}.A.

    The operation Alice performs on A\mathsf{A}A may alternatively be described like this:

    {U0ifx=0Uπ/4ifx=1\begin{cases} U_0 & \text{if $x = 0$}\\ U_{\pi/4} & \text{if $x = 1$} \end{cases}{U0Uπ/4ifx=0ifx=1

    After she applies this operation, she measures A\mathsf{A}A with a standard basis measurement and sets her answer aaa to be the measurement outcome.

  • Bob's actions are as follows.

    • If his question is y=0,y=0,y=0, he applies Uπ/8U_{\pi/8}Uπ/8 to his qubit B.\mathsf{B}.B.
    • If his question is y=1,y=1,y=1, he applies Uπ/8U_{-\pi/8}Uπ/8 to his qubit B.\mathsf{B}.B.

    Like we did for Alice, we can express Bob's operation on B\mathsf{B}B like this:

    {Uπ/8ify=0Uπ/8ify=1\begin{cases} U_{\pi/8} & \text{if $y = 0$}\\ U_{-\pi/8} & \text{if $y = 1$} \end{cases}{Uπ/8Uπ/8ify=0ify=1

    After he applies this operation, he measures B\mathsf{B}B with a standard basis measurement and sets his answer bbb to be the measurement outcome.

Here is a quantum circuit diagram that describes this strategy:

Entanglement in action | IBM Quantum Learning (15)

In this diagram we see two ordinary controlled gates, one for Uπ/8U_{-\pi/8}Uπ/8 on the top and one for Uπ/4U_{\pi/4}Uπ/4 on the bottom. We also have two gates that look like controlled gates, one for Uπ/8U_{\pi/8}Uπ/8 on the top and one for U0U_{0}U0 on the bottom, except that the circle representing the control is not filled in. This denotes a different type of controlled gate where the gate is performed if the control is set to 000 (rather than 111 like an ordinary controlled gate). So, effectively, Bob performs Uπ/8U_{\pi/8}Uπ/8 on his qubit if y=0y=0y=0 and Uπ/8U_{-\pi/8}Uπ/8 if y=1;y=1;y=1; and Alice performs U0U_0U0 on her qubit if x=0x=0x=0 and Uπ/4U_{\pi/4}Uπ/4 if x=1,x=1,x=1, which is consistent with the description of the protocol in words above.

It remains to figure out how well this strategy for Alice and Bob works. We'll do this by going through the four possible question pairs individually.

Case-by-case analysis

  • Case 1: (x,y)=(0,0).(x,y) = (0,0).(x,y)=(0,0).

    In this case Alice performs U0U_{0}U0 on her qubit and Bob performs Uπ/8U_{\pi/8}Uπ/8 on his, so the state of the two qubits (A,B)(\mathsf{A},\mathsf{B})(A,B) after they perform their operations is

    (U0Uπ/8)ϕ+=00ψ0ψπ/8ϕ++01ψ0ψ5π/8ϕ++10ψπ/2ψπ/8ϕ++11ψπ/2ψ5π/8ϕ+=cos(π8)00+cos(5π8)01+cos(3π8)10+cos(π8)112.\begin{aligned} \bigl(U_0 \otimes U_{\pi/8}\bigr) \vert \phi^+\rangle & = \vert 00 \rangle \langle \psi_0 \otimes \psi_{\pi/8}\vert \phi^+\rangle + \vert 01 \rangle \langle \psi_0 \otimes\psi_{5\pi/8}\vert \phi^+\rangle \\ & \qquad + \vert 10 \rangle \langle \psi_{\pi/2} \otimes \psi_{\pi/8}\vert \phi^+\rangle + \vert 11 \rangle \langle \psi_{\pi/2} \otimes \psi_{5\pi/8}\vert \phi^+\rangle\\[2mm] & = \frac{ \cos\bigl(-\frac{\pi}{8}\bigr) \vert 00\rangle + \cos\bigl(-\frac{5\pi}{8}\bigr) \vert 01\rangle + \cos\bigl(\frac{3\pi}{8}\bigr) \vert 10\rangle + \cos\bigl(-\frac{\pi}{8}\bigr) \vert 11\rangle}{\sqrt{2}}. \end{aligned}(U0Uπ/8)ϕ+=∣00ψ0ψπ/8ϕ++∣01ψ0ψ5π/8ϕ++∣10ψπ/2ψπ/8ϕ++∣11ψπ/2ψ5π/8ϕ+=2cos(8π)∣00+cos(85π)∣01+cos(83π)∣10+cos(8π)∣11.

    The probabilities for the four possible answer pairs (a,b)(a,b)(a,b) are therefore as follows.

    Pr((a,b)=(0,0))=12cos2(π8)=2+28Pr((a,b)=(0,1))=12cos2(5π8)=228Pr((a,b)=(1,0))=12cos2(3π8)=228Pr((a,b)=(1,1))=12cos2(π8)=2+28\begin{aligned} \operatorname{Pr}\bigl((a,b)=(0,0)\bigr) & = \frac{1}{2}\cos^2\Bigl(-\frac{\pi}{8}\Bigr) = \frac{2+\sqrt{2}}{8} \\[2mm] \operatorname{Pr}\bigl((a,b)=(0,1)\bigr) & = \frac{1}{2}\cos^2\Bigl(-\frac{5\pi}{8}\Bigr) = \frac{2-\sqrt{2}}{8}\\[2mm] \operatorname{Pr}\bigl((a,b)=(1,0)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{3\pi}{8}\Bigr) = \frac{2-\sqrt{2}}{8}\\[2mm] \operatorname{Pr}\bigl((a,b)=(1,1)\bigr) & = \frac{1}{2}\cos^2\Bigl(-\frac{\pi}{8}\Bigr) = \frac{2+\sqrt{2}}{8} \end{aligned}Pr((a,b)=(0,0))Pr((a,b)=(0,1))Pr((a,b)=(1,0))Pr((a,b)=(1,1))=21cos2(8π)=82+2=21cos2(85π)=822=21cos2(83π)=822=21cos2(8π)=82+2

    We can then obtain the probabilities that a=ba=ba=b and aba\not=ba=b by summing appropriately:

    Pr(a=b)=2+24Pr(ab)=224\begin{aligned} \operatorname{Pr}(a = b) & = \frac{2 + \sqrt{2}}{4}\\[2mm] \operatorname{Pr}(a \not= b) & = \frac{2 - \sqrt{2}}{4} \end{aligned}Pr(a=b)Pr(a=b)=42+2=422

    For the question pair (0,0),(0,0),(0,0), Alice and Bob win if a=b,a=b,a=b, and therefore they win in this case with probability

    2+24.\frac{2 + \sqrt{2}}{4}.42+2.
  • Case 2: (x,y)=(0,1).(x,y) = (0,1).(x,y)=(0,1).

    In this case Alice performs U0U_{0}U0 on her qubit and Bob performs Uπ/8U_{-\pi/8}Uπ/8 on his, so the state of the two qubits (A,B)(\mathsf{A},\mathsf{B})(A,B) after they perform their operations is

    (U0Uπ/8)ϕ+=00ψ0ψπ/8ϕ++01ψ0ψ3π/8ϕ++10ψπ/2ψπ/8ϕ++11ψπ/2ψ3π/8ϕ+=cos(π8)00+cos(3π8)01+cos(5π8)10+cos(π8)112.\begin{aligned} \bigl(U_0 \otimes U_{-\pi/8}\bigr) \vert \phi^+\rangle & = \vert 00 \rangle \langle \psi_0 \otimes \psi_{-\pi/8}\vert \phi^+\rangle + \vert 01 \rangle \langle \psi_0 \otimes\psi_{3\pi/8}\vert \phi^+\rangle \\ & \qquad + \vert 10 \rangle \langle \psi_{\pi/2} \otimes \psi_{-\pi/8}\vert \phi^+\rangle + \vert 11 \rangle \langle \psi_{\pi/2} \otimes \psi_{3\pi/8}\vert \phi^+\rangle\\[2mm] & = \frac{ \cos\bigl(\frac{\pi}{8}\bigr) \vert 00\rangle + \cos\bigl(-\frac{3\pi}{8}\bigr) \vert 01\rangle + \cos\bigl(\frac{5\pi}{8}\bigr) \vert 10\rangle + \cos\bigl(\frac{\pi}{8}\bigr) \vert 11\rangle}{\sqrt{2}}. \end{aligned}(U0Uπ/8)ϕ+=∣00ψ0ψπ/8ϕ++∣01ψ0ψ3π/8ϕ++∣10ψπ/2ψπ/8ϕ++∣11ψπ/2ψ3π/8ϕ+=2cos(8π)∣00+cos(83π)∣01+cos(85π)∣10+cos(8π)∣11.

    The probabilities for the four possible answer pairs (a,b)(a,b)(a,b) are therefore as follows.

    Pr((a,b)=(0,0))=12cos2(π8)=2+28Pr((a,b)=(0,1))=12cos2(3π8)=228Pr((a,b)=(1,0))=12cos2(5π8)=228Pr((a,b)=(1,1))=12cos2(π8)=2+28\begin{aligned} \operatorname{Pr}\bigl((a,b)=(0,0)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2+\sqrt{2}}{8} \\[2mm] \operatorname{Pr}\bigl((a,b)=(0,1)\bigr) & = \frac{1}{2}\cos^2\Bigl(-\frac{3\pi}{8}\Bigr) = \frac{2-\sqrt{2}}{8}\\[2mm] \operatorname{Pr}\bigl((a,b)=(1,0)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{5\pi}{8}\Bigr) = \frac{2-\sqrt{2}}{8}\\[2mm] \operatorname{Pr}\bigl((a,b)=(1,1)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2+\sqrt{2}}{8} \end{aligned}Pr((a,b)=(0,0))Pr((a,b)=(0,1))Pr((a,b)=(1,0))Pr((a,b)=(1,1))=21cos2(8π)=82+2=21cos2(83π)=822=21cos2(85π)=822=21cos2(8π)=82+2

    Again, we can obtain the probabilities that a=ba=ba=b and aba\not=ba=b by summing:

    Pr(a=b)=2+24Pr(ab)=224\begin{aligned} \operatorname{Pr}(a = b) & = \frac{2 + \sqrt{2}}{4}\\[2mm] \operatorname{Pr}(a \not= b) & = \frac{2 - \sqrt{2}}{4} \end{aligned}Pr(a=b)Pr(a=b)=42+2=422

    For the question pair (0,1),(0,1),(0,1), Alice and Bob win if a=b,a=b,a=b, and therefore they win in this case with probability

    2+24.\frac{2 + \sqrt{2}}{4}.42+2.
  • Case 3: (x,y)=(1,0).(x,y) = (1,0).(x,y)=(1,0).

    In this case Alice performs Uπ/4U_{\pi/4}Uπ/4 on her qubit and Bob performs Uπ/8U_{\pi/8}Uπ/8 on his, so the state of the two qubits (A,B)(\mathsf{A},\mathsf{B})(A,B) after they perform their operations is

    (Uπ/4Uπ/8)ϕ+=00ψπ/4ψπ/8ϕ++01ψπ/4ψ5π/8ϕ++10ψ3π/4ψπ/8ϕ++11ψ3π/4ψ5π/8ϕ+=cos(π8)00+cos(3π8)01+cos(5π8)10+cos(π8)112.\begin{aligned} \bigl(U_{\pi/4} \otimes U_{\pi/8}\bigr) \vert \phi^+\rangle & = \vert 00 \rangle \langle \psi_{\pi/4} \otimes \psi_{\pi/8}\vert \phi^+\rangle + \vert 01 \rangle \langle \psi_{\pi/4} \otimes\psi_{5\pi/8}\vert \phi^+\rangle \\ & \qquad + \vert 10 \rangle \langle \psi_{3\pi/4} \otimes \psi_{\pi/8}\vert \phi^+\rangle + \vert 11 \rangle \langle \psi_{3\pi/4} \otimes \psi_{5\pi/8}\vert \phi^+\rangle\\[2mm] & = \frac{ \cos\bigl(\frac{\pi}{8}\bigr) \vert 00\rangle + \cos\bigl(-\frac{3\pi}{8}\bigr) \vert 01\rangle + \cos\bigl(\frac{5\pi}{8}\bigr) \vert 10\rangle + \cos\bigl(\frac{\pi}{8}\bigr) \vert 11\rangle}{\sqrt{2}}. \end{aligned}(Uπ/4Uπ/8)ϕ+=∣00ψπ/4ψπ/8ϕ++∣01ψπ/4ψ5π/8ϕ++∣10ψ3π/4ψπ/8ϕ++∣11ψ3π/4ψ5π/8ϕ+=2cos(8π)∣00+cos(83π)∣01+cos(85π)∣10+cos(8π)∣11.

    The probabilities for the four possible answer pairs (a,b)(a,b)(a,b) are therefore as follows.

    Pr((a,b)=(0,0))=12cos2(π8)=2+28Pr((a,b)=(0,1))=12cos2(3π8)=228Pr((a,b)=(1,0))=12cos2(5π8)=228Pr((a,b)=(1,1))=12cos2(π8)=2+28\begin{aligned} \operatorname{Pr}\bigl((a,b)=(0,0)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2+\sqrt{2}}{8} \\[2mm] \operatorname{Pr}\bigl((a,b)=(0,1)\bigr) & = \frac{1}{2}\cos^2\Bigl(-\frac{3\pi}{8}\Bigr) = \frac{2-\sqrt{2}}{8}\\[2mm] \operatorname{Pr}\bigl((a,b)=(1,0)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{5\pi}{8}\Bigr) = \frac{2-\sqrt{2}}{8}\\[2mm] \operatorname{Pr}\bigl((a,b)=(1,1)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2+\sqrt{2}}{8} \end{aligned}Pr((a,b)=(0,0))Pr((a,b)=(0,1))Pr((a,b)=(1,0))Pr((a,b)=(1,1))=21cos2(8π)=82+2=21cos2(83π)=822=21cos2(85π)=822=21cos2(8π)=82+2

    We find, once again, that probabilities that a=ba=ba=b and aba\not=ba=b are as follows:

    Pr(a=b)=2+24Pr(ab)=224\begin{aligned} \operatorname{Pr}(a = b) & = \frac{2 + \sqrt{2}}{4}\\[2mm] \operatorname{Pr}(a \not= b) & = \frac{2 - \sqrt{2}}{4} \end{aligned}Pr(a=b)Pr(a=b)=42+2=422

    For the question pair (1,0),(1,0),(1,0), Alice and Bob win if a=b,a=b,a=b, so they win in this case with probability

    2+24.\frac{2 + \sqrt{2}}{4}.42+2.
  • Case 4: (x,y)=(1,1).(x,y) = (1,1).(x,y)=(1,1).

    The last case is a little bit different, as we might expect because the winning condition is different in this case. When xxx and yyy are both 1,1,1, Alice and Bob win when aaa and bbb are different. In this case Alice performs Uπ/4U_{\pi/4}Uπ/4 on her qubit and Bob performs Uπ/8U_{-\pi/8}Uπ/8 on his, so the state of the two qubits (A,B)(\mathsf{A},\mathsf{B})(A,B) after they perform their operations is

    (Uπ/4Uπ/8)ϕ+=00ψπ/4ψπ/8ϕ++01ψπ/4ψ3π/8ϕ++10ψ3π/4ψπ/8ϕ++11ψ3π/4ψ3π/8ϕ+=cos(3π8)00+cos(π8)01+cos(7π8)10+cos(3π8)112.\begin{aligned} \bigl(U_{\pi/4} \otimes U_{-\pi/8}\bigr) \vert \phi^+\rangle & = \vert 00 \rangle \langle \psi_{\pi/4} \otimes \psi_{-\pi/8}\vert \phi^+\rangle + \vert 01 \rangle \langle \psi_{\pi/4} \otimes\psi_{3\pi/8}\vert \phi^+\rangle \\ & \qquad + \vert 10 \rangle \langle \psi_{3\pi/4} \otimes \psi_{-\pi/8}\vert \phi^+\rangle + \vert 11 \rangle \langle \psi_{3\pi/4} \otimes \psi_{3\pi/8}\vert \phi^+\rangle\\[2mm] & = \frac{ \cos\bigl(\frac{3\pi}{8}\bigr) \vert 00\rangle + \cos\bigl(-\frac{\pi}{8}\bigr) \vert 01\rangle + \cos\bigl(\frac{7\pi}{8}\bigr) \vert 10\rangle + \cos\bigl(\frac{3\pi}{8}\bigr) \vert 11\rangle}{\sqrt{2}}. \end{aligned}(Uπ/4Uπ/8)ϕ+=∣00ψπ/4ψπ/8ϕ++∣01ψπ/4ψ3π/8ϕ++∣10ψ3π/4ψπ/8ϕ++∣11ψ3π/4ψ3π/8ϕ+=2cos(83π)∣00+cos(8π)∣01+cos(87π)∣10+cos(83π)∣11.

    The probabilities for the four possible answer pairs (a,b)(a,b)(a,b) are therefore as follows.

    Pr((a,b)=(0,0))=12cos2(3π8)=228Pr((a,b)=(0,1))=12cos2(π8)=2+28Pr((a,b)=(1,0))=12cos2(7π8)=2+28Pr((a,b)=(1,1))=12cos2(3π8)=228\begin{aligned} \operatorname{Pr}\bigl((a,b)=(0,0)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{3\pi}{8}\Bigr) = \frac{2-\sqrt{2}}{8} \\[2mm] \operatorname{Pr}\bigl((a,b)=(0,1)\bigr) & = \frac{1}{2}\cos^2\Bigl(-\frac{\pi}{8}\Bigr) = \frac{2+\sqrt{2}}{8}\\[2mm] \operatorname{Pr}\bigl((a,b)=(1,0)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{7\pi}{8}\Bigr) = \frac{2+\sqrt{2}}{8}\\[2mm] \operatorname{Pr}\bigl((a,b)=(1,1)\bigr) & = \frac{1}{2}\cos^2\Bigl(\frac{3\pi}{8}\Bigr) = \frac{2-\sqrt{2}}{8} \end{aligned}Pr((a,b)=(0,0))Pr((a,b)=(0,1))Pr((a,b)=(1,0))Pr((a,b)=(1,1))=21cos2(83π)=822=21cos2(8π)=82+2=21cos2(87π)=82+2=21cos2(83π)=822

    The probabilities have effectively swapped places from in the three other cases. We obtain the probabilities that a=ba=ba=b and aba\not=ba=b by summing:

    Pr(a=b)=224Pr(ab)=2+24\begin{aligned} \operatorname{Pr}(a = b) & = \frac{2 - \sqrt{2}}{4}\\[2mm] \operatorname{Pr}(a \not= b) & = \frac{2 + \sqrt{2}}{4} \end{aligned}Pr(a=b)Pr(a=b)=422=42+2

    For the question pair (1,1),(1,1),(1,1), Alice and Bob win if ab,a\not=b,a=b, and therefore they win in this case with probability

    2+24.\frac{2 + \sqrt{2}}{4}.42+2.

They win in every case with the same probability:

2+240.85. \frac{2 + \sqrt{2}}{4} \approx 0.85.42+20.85.

Therefore, that's the probability that they win overall. That's significantly better than any classical strategy can do for this game; classical strategies have winning probability bounded by 3/4.3/4.3/4. And that makes this a very interesting example.

This happens to be the optimal winning probability for quantum strategies, we can't do any better than this no matter what entangled state or measurements we choose. This fact is known as Tsirelson's inequality, named for Boris Tsirelson who first proved it — and who first described the CHSH experiment as a game.

Geometric picture

It is possible to think about the strategy described above geometrically, which may be helpful for understanding the relationships among the various angles chosen for Alice and Bob's operations.

What Alice effectively does is to choose an angle α,\alpha,α, depending on her question x,x,x, and then to apply UαU_{\alpha}Uα to her qubit and measure. Similarly, Bob chooses an angle β,\beta,β, depending on y,y,y, and then he applies UβU_{\beta}Uβ to his qubit and measures. We've chosen α\alphaα and β\betaβ like this:

α={0x=0π/4x=1β={π/8y=0π/8y=1.\begin{aligned} \alpha & = \begin{cases} 0 & x=0\\ \pi/4 & x=1 \end{cases}\\[2mm] \beta & = \begin{cases} \pi/8 & y = 0\\ -\pi/8 & y = 1. \end{cases} \end{aligned}αβ={0π/4x=0x=1={π/8π/8y=0y=1.

For the moment, though, let's take α\alphaα and β\betaβ to be arbitrary. By choosing α,\alpha,α, Alice effectively defines an orthonormal basis of vectors that looks like this:

Entanglement in action | IBM Quantum Learning (16)

Bob does likewise, except that his angle is β\betaβ:

Entanglement in action | IBM Quantum Learning (17)

The colors of the vectors correspond to Alice and Bob's answers: blue for 000 and red for 1.1.1.

Now, if we combine together (333) and (444) we get the formula

ψαψβϕ+=12ψαψβ;\langle \psi_{\alpha} \otimes\psi_{\beta} \vert \phi^+ \rangle = \frac{1}{\sqrt{2}} \langle \psi_{\alpha} \vert \psi_{\beta} \rangle;ψαψβϕ+=21ψαψβ;

this works for all real numbers α\alphaα and β.\beta.β.

If we follow the same sort of analysis that we went through above, but with α\alphaα and β\betaβ being variables, we find this:

(UαUβ)ϕ+=00ψαψβϕ++01ψαψβ+π/2ϕ++10ψα+π/2ψβϕ++11ψα+π/2ψβ+π/2ϕ+=ψαψβ00+ψαψβ+π/201+ψα+π/2ψβ10+ψα+π/2ψβ+π/2112. \begin{aligned} & \bigl(U_{\alpha} \otimes U_{\beta}\bigr) \vert \phi^+\rangle\\[1mm] & \qquad = \vert 00 \rangle \langle \psi_{\alpha} \otimes \psi_{\beta}\vert \phi^+\rangle + \vert 01 \rangle \langle \psi_{\alpha} \otimes\psi_{\beta + \pi/2}\vert \phi^+\rangle \\ & \qquad \qquad + \vert 10 \rangle \langle \psi_{\alpha+\pi/2} \otimes \psi_{\beta}\vert \phi^+\rangle + \vert 11 \rangle \langle \psi_{\alpha+\pi/2} \otimes \psi_{\beta+\pi/2}\vert \phi^+\rangle\\[2mm] & \qquad = \frac{ \langle \psi_\alpha \vert \psi_\beta \rangle \vert 00\rangle + \langle \psi_\alpha \vert \psi_{\beta+\pi/2} \rangle \vert 01\rangle + \langle \psi_{\alpha+\pi/2} \vert \psi_\beta \rangle \vert 10\rangle + \langle \psi_{\alpha+\pi/2} \vert \psi_{\beta+\pi/2} \rangle \vert 11\rangle }{\sqrt{2}}. \end{aligned}(UαUβ)ϕ+=∣00ψαψβϕ++∣01ψαψβ+π/2ϕ++∣10ψα+π/2ψβϕ++∣11ψα+π/2ψβ+π/2ϕ+=2ψαψβ∣00+ψαψβ+π/2∣01+ψα+π/2ψβ∣10+ψα+π/2ψβ+π/2∣11.

We then conclude these two formulas:

Pr(a=b)=12ψαψβ2+12ψα+π/2ψβ+π/22=cos2(αβ)Pr(ab)=12ψαψβ+π/22+12ψα+π/2ψβ2=sin2(αβ).\begin{aligned} \operatorname{Pr}(a = b) & = \frac{1}{2} \vert \langle \psi_\alpha \vert \psi_\beta \rangle \vert^2 + \frac{1}{2} \vert \langle \psi_{\alpha+\pi/2} \vert \psi_{\beta+\pi/2} \rangle \vert^2 = \cos^2(\alpha - \beta)\\[2mm] \operatorname{Pr}(a \not= b) & = \frac{1}{2} \vert \langle \psi_\alpha \vert \psi_{\beta+\pi/2} \rangle \vert^2 + \frac{1}{2} \vert \langle \psi_{\alpha+\pi/2} \vert \psi_\beta \rangle \vert^2 = \sin^2(\alpha - \beta). \end{aligned}Pr(a=b)Pr(a=b)=21ψαψβ2+21ψα+π/2ψβ+π/22=cos2(αβ)=21ψαψβ+π/22+21ψα+π/2ψβ2=sin2(αβ).

We can connect these equations to the figures above by imagining that we superimpose the bases chosen by Alice and Bob.

Exploring the strategy

When (x,y)=(0,0),(x,y) = (0,0),(x,y)=(0,0), Alice and Bob choose α=0\alpha = 0α=0 and β=π/8,\beta = \pi/8,β=π/8, and by superimposing their bases we obtain this figure:

Entanglement in action | IBM Quantum Learning (18)

The angle between the red vectors is π/8,\pi/8,π/8, which is the same as the angle between the two blue vectors. The probability that Alice and Bob's outcomes agree is the cosine-squared of this angle,

cos2(π8)=2+24,\cos^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2 + \sqrt{2}}{4},cos2(8π)=42+2,

while the probability they disagree is the sine-squared of this angle,

sin2(π8)=224.\sin^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2 - \sqrt{2}}{4}.sin2(8π)=422.

When (x,y)=(0,1),(x,y) = (0,1),(x,y)=(0,1), Alice and Bob choose α=0\alpha = 0α=0 and β=π/8,\beta = -\pi/8,β=π/8, and by superimposing their bases we obtain this figure:

Entanglement in action | IBM Quantum Learning (19)

The angle between the red vectors is again π/8,\pi/8,π/8, as is the angle between the blue vectors. The probability that Alice and Bob's outcomes agree is again the cosine-squared of this angle,

cos2(π8)=2+24,\cos^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2 + \sqrt{2}}{4},cos2(8π)=42+2,

while the probability they disagree is the sine-squared of this angle,

sin2(π8)=224.\sin^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2 - \sqrt{2}}{4}.sin2(8π)=422.

When (x,y)=(1,0),(x,y) = (1,0),(x,y)=(1,0), Alice and Bob choose α=π/4\alpha = \pi/4α=π/4 and β=π/8,\beta = \pi/8,β=π/8, and by superimposing their bases we obtain this figure:

Entanglement in action | IBM Quantum Learning (20)

The bases have changed but the angles haven't — once again the angle between vectors of the same color is π/8.\pi/8.π/8. The probability that Alice and Bob's outcomes agree is

cos2(π8)=2+24,\cos^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2 + \sqrt{2}}{4},cos2(8π)=42+2,

and the probability they disagree is

sin2(π8)=224.\sin^2\Bigl(\frac{\pi}{8}\Bigr) = \frac{2 - \sqrt{2}}{4}.sin2(8π)=422.

When (x,y)=(1,1),(x,y) = (1,1),(x,y)=(1,1), Alice and Bob choose α=π/4\alpha = \pi/4α=π/4 and β=π/8.\beta = -\pi/8.β=π/8. When we superimpose their bases, we see that something different has happened:

Entanglement in action | IBM Quantum Learning (21)

By the way the angles were chosen, this time the angle between vectors having the same color is 3π/83\pi/83π/8 rather than π/8.\pi/8.π/8. The probability that Alice and Bob's outcomes agree is still the cosine-squared of this angle, but this time the value is

cos2(3π8)=224.\cos^2\Bigl(\frac{3\pi}{8}\Bigr) = \frac{2 - \sqrt{2}}{4}.cos2(83π)=422.

The probability the outcomes disagree is the sine-squared of this angle, which in this case is this:

sin2(3π8)=2+24.\sin^2\Bigl(\frac{3\pi}{8}\Bigr) = \frac{2 + \sqrt{2}}{4}.sin2(83π)=42+2.

Remarks

The basic idea of an experiment like the CHSH game, where entanglement leads to statistical results that are inconsistent with any classical description, is due to John Bell, the namesake of the Bell states. For this reason, people often refer to experiments of this sort as Bell tests. Sometimes people also refer to Bell's theorem, which can be formulated in different ways — but the essence of it is that quantum mechanics is not compatible with so-called local hidden variable theories. The CHSH game is a very nice and clean example of a Bell test, and can be viewed as a proof, or demonstration, of Bell's theorem.

The CHSH game offers us one way to experimentally test that the theory of quantum information is an accurate theory. Experiments can be performed that implement the CHSH game, and test the sorts of strategies based on entanglement described above. This provides us with a high degree of confidence that entanglement is real — and unlike the sometimes vague or poetic ways that we come up with to explain entanglement, the CHSH game gives us a concrete and testable way to observe entanglement. The 2022 Nobel Prize in Physics acknowledges the importance of this line of work: the prize was awarded to Alain Aspect, John Clauser (the C in CHSH) and Anton Zeilinger, for observing entanglement through Bell tests on entangled photons.

Qiskit implementation

Run

The ability to run code cells is currently disabled.

Copy to clipboard

No output produced

We can implement the CHSH game together with the quantum strategy defined above in Qiskit as follows.

First, here's the definition of the game itself, which allows an arbitrary strategy to be plugged in as an argument.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

No output produced

Now we'll create a function that outputs a circuit depending on the questions for Alice and Bob. We'll let the qubits have their default names for simplicity, and we'll use the built-in Ry(θ)R_y(\theta)Ry(θ) gate for Alice and Bob's actions.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

No output produced

Here are the four possible circuits, depending on which questions are asked.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

(x,y) = (0,0)

Entanglement in action | IBM Quantum Learning (22)

(x,y) = (0,1)

Entanglement in action | IBM Quantum Learning (23)

(x,y) = (1,0)

Entanglement in action | IBM Quantum Learning (24)

(x,y) = (1,1)

Entanglement in action | IBM Quantum Learning (25)

Now we'll create a job using the Aer simulator that runs the circuit a single time for a given input pair (x,y).(x,y).(x,y).

Run

The ability to run code cells is currently disabled.

Copy to clipboard

No output produced

Finally, we'll play the game 1,000 times and compute the fraction of them that the strategy wins.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

Fraction of games won: 0.863

We can also define a classical strategy and see how well it works. Feel free to change the code to try out different strategies!

Run

The ability to run code cells is currently disabled.

Copy to clipboard

No output produced

Again let's play the game 1,000 times to see how well it works.

Run

The ability to run code cells is currently disabled.

Copy to clipboard

Output:

Fraction of games won: 0.75

Although there's randomness involved, the statistics are very unlikely to deviate too much after 1,000 runs. The quantum strategy wins about 85% of the time while a classical strategy can't win more than about 75% of the time.

Post-Course Survey

Congratulations on completing the "Basics of Quantum Information" course by IBM! Please take a moment to help us improve our course by filling out the following quick survey. Your feedback will be used to enhance our content offering and user experience. Thank you!"

Entanglement in action | IBM Quantum Learning (2024)

References

Top Articles
Latest Posts
Article information

Author: Errol Quitzon

Last Updated:

Views: 6184

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.