Skip to main content
Proceedings of the National Academy of Sciences of the United States of America logoLink to Proceedings of the National Academy of Sciences of the United States of America
. 2016 Mar 8;113(12):3191–3196. doi: 10.1073/pnas.1507647113

Quantum communication complexity advantage implies violation of a Bell inequality

Harry Buhrman a,b,c, Łukasz Czekaj d,e, Andrzej Grudka f, Michał Horodecki d,e, Paweł Horodecki e,g, Marcin Markiewicz d,e,h, Florian Speelman a, Sergii Strelchuk i,1
PMCID: PMC4812733  PMID: 26957600

Significance

For many communication complexity problems the quantum strategies, distinguished by using Bell nonlocal correlations, provide exponential advantage over the best possible classical strategies. Conversely, for any Bell nonlocal correlations there exists a communication complexity problem that is solved more efficiently using the former. Despite many efforts, there were only two problems for which one could certify that any strategy that outperforms the classical one must harbor Bell nonlocal correlations. We prove that any large advantage over the best known classical strategy makes use of Bell nonlocal correlations. Thus, we provide the missing link to the fundamental equivalence between Bell nonlocality and quantum advantage.

Keywords: quantum, Bell inequality, port-based teleportation, communication complexity, nonlocality

Abstract

We obtain a general connection between a large quantum advantage in communication complexity and Bell nonlocality. We show that given any protocol offering a sufficiently large quantum advantage in communication complexity, there exists a way of obtaining measurement statistics that violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical communication complexity can grow arbitrarily large, the ratio of the quantum value to the classical value of the Bell quantity becomes unbounded with the increase in the number of inputs and outputs.


The key element that distinguishes classical from quantum information theory is quantum correlations. The first attempt to quantify their strength was quantitatively expressed in Bell’s theorem (1). They are similar to classical correlations in that one cannot take advantage of them to perform superluminal communication, yet every attempt to explain such correlations from the point of view of classical theory—namely, to find a local hidden variable model—is impossible. For a long time the existence of quantum correlations was merely of interest to philosophically minded physicists and was considered an exotic peculiarity, rather than a useful resource for practical problems in physics or computer science. This has changed dramatically in recent years—it became apparent that quantum correlations can be used as a resource for a number of distributed information processing tasks (24), producing surprising results (5, 6).

One area where using quantum correlations has wide-reaching practical implications is communication complexity. A typical instance of a communication complexity problem features two parties, Alice and Bob, who are given binary inputs x and y. They wish to compute the value of f(x,y) by exchanging messages between each other. The minimum amount of communication required to accomplish the task by exchanging classical bits (with bounded probability of success) is called classical communication complexity, denoted as C(f).

There are two ways to account for the communication complexity of computing a function when we want to make use of quantum correlations. In the first one, Alice and Bob share any number of instances of the maximally entangled state |ΨAB=(1/2)(|01|10)AB beforehand and are allowed to exchange classical bits to solve the problem. Another approach is to have no preshared entanglement, but instead allow Alice and Bob to exchange qubits. The latter type of protocol can always be converted to the former with preshared entanglement and classical communication. We denote the quantum communication complexity of computing the function f(x,y) (with bounded probability of success) by Q(f).

For a large number of problems, the respective quantum communication complexity is much lower compared with its classical counterpart (4, 7). In such cases, we say that there exists a quantum advantage for communication complexity. In other words, one achieves a quantum advantage if the quantum communication complexity of the function is lower than its corresponding classical communication complexity.

One of the most striking example of quantum advantage is the famous Raz problem (5, 8), where quantum communication complexity is exponentially smaller than classical. Another example is the “hidden matching” problem for which the quantum advantage leads to one of the strongest possible violations of the Bell inequality (9). The latter inequality plays an important role in detecting quantum correlations and certifying the genuinely quantum nature of resources at hand. Previously, to obtain an unbounded violation of a particular Bell inequality one resorted to problems with the exponential quantum advantage. Here, we show that one can achieve the same result, using only polynomial quantum advantage.

As a matter of fact, the very first protocols offering quantum advantage were based on a quantum violation of certain Bell inequalities (6). It was even shown that for a very large class of multiparty Bell inequalities, correlations that violate them lead to a quantum advantage (perhaps, for a peculiar function) (10). This indicates that Bell nonlocality often leads to a quantum advantage. However, there are more and more communication protocols that offer a quantum advantage, but, nevertheless, they are not known to violate any Bell inequality.

It has long been suspected (6) that quantum communication complexity and Bell nonlocality are the two sides of the same coin. Although it is possible to convert a Bell nonlocality testing experiment to the communication complexity instance, the reverse has been known only for some particular examples. The question is whether this relationship holds in general, namely, Is quantum communication inherently equivalent to Bell nonlocality when solving communication complexity problems?

Until now, there were only two concrete examples where one could certify quantum correlations in the context of communication complexity by providing a quantum state and a set of measurements whose statistics violate some Bell inequality. The first case is the “hidden matching” problem and the second one is a theorem, which states that a special subset of protocols that provide quantum advantage also implies the violation of local realism (6). To get the violation of Bell inequalities obtained from the examples above, one had to perform an involved analysis that relied on a problem-specific set of symmetries. Thus, such an approach cannot be generalized to an arbitrary protocol for achieving a quantum advantage in the communication complexity problem.

In this paper, we show that given any (sufficiently large) quantum advantage in communication complexity, there exists a way of obtaining measurement statistics that violate some linear Bell inequality. This completely resolves the question about the equivalence between the quantum communication and Bell nonlocality: Whenever a protocol computes the value of the function f(x,y) better than the best classical protocol, even with a gap that is only quadratic, then there must exist a Bell inequality that is violated.

We provide a universal method that takes a protocol that achieves the quantum advantage in any single- or multiround communication complexity problem and uses it to derive the violation of some linear Bell inequality. This method can be generalized to a setting with more than two parties. Our Bell inequalities lead to a so-called unbounded violation (11): The ratio of the quantum value to the classical value of the Bell quantity can grow arbitrarily large with the increase of the number of inputs and outputs, whenever the ratio of C(f) and (Q(f))2 grows too. In particular, an exponential advantage leads to an exponential ratio.

Our method consists of two parts. In the first part, we use the quantum protocol based on the given communication complexity game to construct a set of quantum measurements on a maximally entangled state The central ingredient of our construction is the recently discovered port-based teleportation (12, 13). In the second part, given a protocol that computes a function f by using Q(f) qubits, and the optimal classical error probability achievable with (Q(f))2 bits, we construct the corresponding linear Bell inequality that is subsequently violated by the above quantum measurements.

For one-way communication complexity problems we develop a much simpler method that is based on the remote state preparation and results in a nonlinear Bell inequality.

Quantum Communication Complexity Protocol

We start by defining a general quantum multiround communication protocol. Two parties, Alice and Bob, receive inputs xX={0,1}n and yY={0,1}n according to some distribution μ and their goal is to compute the function f:X×Y{0,1} by exchanging qubits over multiple rounds. We further use subscripts for the system names to denote the round number. The parties proceed as follows:

  • i)

    Alice applies UxA0M1A1 on her local state ρA0 and sends ρM1 to Bob. In general, M1 may be entangled with A1, which remains with Alice.

  • ii)

    Bob performs UyM1B0M2B1 on the state ρM1σB0. Then he sends back the system M2 to Alice, keeping B1.

  • iii)

    Parties repeat steps i and ii for r1 rounds. In the last round, instead of communicating back to Alice, Bob measures the observable oy and outputs the value of the function f. The observable oy acts on the system M2r1 and Bob’s memory Br1.

The above protocol may be transformed to the form where a one-qubit system is exchanged between Alice and Bob at any round. To achieve this, we split the Q-qubit message from Alice to Bob (or vice versa) into Q rounds of one-qubit transmission and modify the protocol as follows. We start from the initial state, which has the form

|ρAM|θAC|σBM, [1]

where |ρAM and |σBM describe the memory registers that belong to Alice and Bob, respectively. The state |θAC, initially in state |θ=|0 with Alice, is a one-qubit system that is used for message passing from Alice to Bob and vice versa. In each round, Alice applies Uxi to ρθ, and Bob applies Uyi to σθ. In the last round, instead of applying a unitary transformation, Bob performs a measurement. One may view unitaries Uxi and Uyi as controlled gates acting on the memory with the one-qubit register acting as a control. This implies that for given x, in round i the state of Alice’s memory is spanned on at most 2i orthogonal vectors. This observation will be crucial for the construction of a compressed-memory quantum protocol. Thus, we can transform any given protocol that requires Q qubits of communication into one that makes use of 2Q one-qubit exchanges.

From an Arbitrary Protocol to a Compressed-Memory Protocol

One shortcoming of the above protocols is that both players possess a local memory, possibly entangled with the message, which can span an arbitrary number of qubits and therefore could be much too big to properly handle in other parts of our construction. We solve this problem by converting an arbitrary protocol, as described above, to a protocol where we can upper bound the maximum size of the local memory.

The following proposition, which is a consequence of the Yao–Kremer lemma (3, 14), shows that it is possible to compress the parties’ local memory each step and that therefore the size of the local memory can be assumed to be at most the total communication. We include the proof in Supporting Information, section IV.

Proposition 1.

For any Q-qubit quantum communication protocol (without prior entanglement) there exists a Q-qubit quantum communication protocol for which Alice and Bob can encode their local memory on at most Q qubits each.

Quantum Measurements from the Quantum Communication Complexity Protocol

We now show how to convert a multiround compressed-memory protocol for computing f(x,y), which gives a quantum advantage to the violation of a linear Bell inequality. There exist two different protocols to achieve this. The first protocol is based on the recently introduced method of port-based teleportation, which we briefly review in the next section. The second method, discussed at the end of this paper, relies on remote state preparation (15). We base our construction on the port-based teleportation because unlike the remote state preparation it is easily extendible to the multiround protocol and also gives rise to a linear Bell inequality.

Port-Based Teleportation

In deterministic port-based teleportation, the two parties share N pairs of maximally entangled qudits |ΨA1B1|ΨANBN, each of which is called a “port.” To transmit the state |ΨinA0, the sender performs the square-root teleportation measurement given by a set of positive operator valued measure (POVM) elements {Π}i=1N (precisely defined in equation 27 of ref. 13) on all of the systems Ai, i=0,,N, obtaining the result z=1N. Then, he or she communicates z to the receiver who traces out the subsystems B1Bz1Bz+1BN and remains with the teleported state |ΨoutBz in the subsystem Bz. Teleportation always succeeds and the fidelity of the teleported state with the original is F(|ΨinA0,|ΨoutBz)1d2/N. The cost of the classical communication from sender to receiver is equal to c=log2N. The distinctive feature of this protocol is that unlike with original teleportation, it does not require a correction on the receiver’s side.

Constructing Quantum Measurements

Using port-based teleportation we can now construct the relevant quantum measurements. Parties start with the initial state [1] and perform the following protocol:

  • i)

    Alice applies UxA0M1A1 on her local state ρA0. She obtains the state of size Q1=logdimM1+logdimA1, which is teleported to Bob at once, using N1 ports each of dimension 2Q1. This consumes N1 ports. Alice does not communicate the classical teleportation outcomes {i1A}, |{i1A}|=N1 with i1A{1,,N1} to Bob.

  • ii)

    Bob applies the local unitary UyM1B0M2B1 to each of the ports (he does not know the value of i1) and teleports each of the N1 states one-by-one by applying the teleportation measurement using N2 ports each of the dimension 2Q2, where Q2=logdimM2+logdimB1+logdimA1. This consumes N1N2 ports. Bob keeps the set of N2 teleportation outcomes {i1,1B,,i1,N2B}, |{i1,1B,,i1,N2B}|=N1N2, where for each j=1N2, i1,jB{1,,N2}.

  • iii)

    Parties repeat steps i and ii for r1 rounds.

At the end of the protocol we obtain the set of measurements that map the generic communication protocol into the set of correlations,

p({i1A},{i1,1B,,i1,N1B},{i2,1A,,i2,N1N2A},,{ir,1B,,ir,N1N2N2r1B},{o1,,oN1N2Nr}|x,y), [2]

where {oj} are the final teleportation measurements in round r on Bob’s side. An important feature of this construction is that all of the quantum measurements are performed simultaneously but the classical information exchange happens sequentially. A single round of the protocol is depicted in Fig. 1 and the entire protocol is depicted in Fig. 2.

Fig. 1.

Fig. 1.

The structure of a single round of the protocol. Alice applies Ux to her system, which if followed by Bob’s unitary Uy. Bob has no information about the outcome of Alice’s port-based teleportation, i1A, so he teleports each of his qudit subsystems individually, obtaining i1,1B, i1,2B,….

Fig. 2.

Fig. 2.

Constructing quantum measurements. A and B denote Alice’s and Bob’s local subsystems, respectively. Each measurement Mi, i=1,,r2r1 represents the square-root measurement in the port-based teleportation (12).

Simulating the Quantum Protocol

The last part of the puzzle is a method of simulating the compressed-memory quantum protocol, using the above correlations and classical communication.

Lemma 1.

Given a protocol for computing f that uses Q qubits of communication and achieves the success probability psucc1/2+ϵ, ϵ>0, one can simulate it using correlations [2] and 10Q2 bits of classical communication with the success probability psucc1/2+(12Q)2Qϵ.

Proof:

Having access to correlations [2], Alice and Bob exchange their respective outcomes of the teleportation measurements that amount to log2N1N2N3N2r1 bits of communication. This finalizes the port-based teleportation and thus simulates the corresponding quantum protocol. After exchange, Bob returns oL, where L denotes the last index that he received from Alice.

The above protocol is equivalent to 2r rounds of port-based teleportation used for the compressed-memory protocol. Because by the compression of Proposition 1 for every round i the dimension of the teleported state Qi is at most 22Q+1 (the message is encoded in 1 qubit and the local memories are encoded in Q qubits each), we set log2Ni=5Q so that the fidelity of teleportation on each step is F(12Q). Then the protocol has success probability psucc1/2+F2rϵ, where psucc1/2+ϵ is the success probability of the original quantum protocol. Bounding the number of rounds r by the total amount of quantum communication Q, we get psucc1/2+1/2(12Q)2Qϵ. Thus, the total amount of classical communication is bounded above by 10Q2.

Construction of a Bell Inequality and Its Violation

Let us sum up the whole construction. First, we start with a quantum multiround protocol to compute f that uses quantum communication and no shared entanglement. This protocol requires Q qubits of communication and achieves psucc1/2+ϵ. In this protocol, Alice and Bob may use an arbitrary amount of local quantum memory between rounds. Second, we convert it to the protocol with compressed local quantum memory, where the latter can be encoded in Q qubits. The compressed protocol is then used to obtain correlations in the form [2]. These correlations together with classical communication are used to recover the original communication complexity protocol that computes f. This protocol uses O(Q2) bits of classical communication and achieves success probability psucc1/2+(12Q)2Qϵ.

Now, if for a function f(x,y) there exists a gap between C(f) and (Q(f))2 with psucc=1/2+δ for the classical communication complexity protocol, and δϵ—then we observe the quantum violation of the Bell inequality of the form

x,yμ(x,y)qPp(oq=f(x,y)|x,y)12+δ, [3]

where μ is a probability measure on X×Y, the set P denotes the set of all paths from the root to the leaves of length 2r1 of the tree formed by the subsequent outputs of Alice and Bob in the protocol, and p(oq=f(x,y)|x,y) is the marginal probability that comes from summing over all indexes that do not explicitly appear in the path q (Fig. 3). With the exception of the last level, every node on the ith level has Ni children that correspond to the outcome of the ith round of teleportation. The index of the first node in the path corresponds to the state being on Alice’s side and each subsequent index corresponds to the state being either on Alice’s or on Bob’s side in the alternating manner. The leaves of the tree correspond to the outcomes of Bob’s binary observable, which is his guess of the value of the function f(x,y). (Note that in the Bell inequality, only special outputs appear—those given by the paths of length 2r1 from the root to the leaves—whereas in general, outputs will be given by all sequences composed of choosing one node from every level.)

Fig. 3.

Fig. 3.

Exchange of the information after simultaneous teleportations to reveal the path of the teleported system in a three-round protocol. After Alice’s teleportation measurement in the first round the state ended up in port 1. Then, Bob teleports each of the two ports from the array that he used in the previous round, obtaining the outcomes 2 and 3 for ports 1 and 2, respectively. Finally, Alice performs a teleportation measurement for each of her four ports, obtaining the outcomes 2,4,5,8 for the ports 1,2,3,4, respectively. A defines a path q to be a sequence of teleportation outcomes: q={i1,1=1,i2,1=2,i3,2=4}. The last node of the path points to the system, whose outcome provides Bob’s guess. Recall that the measurements are performed at the same time, and the sequential multiround protocol consists only of the exchange of classical information obtained after teleportation. The latter is required to identify the last node of the path, which is used to make a guess about the value of the function.

The Bell inequality [3] is the central quantity of this paper. The left-hand side of the inequality constitutes the maximal success probability of guessing the value of f that can be achieved with the correlations of the form [2]. If this success probability turns out to be greater than the maximal success probability attained by the best classical protocol (the right-hand side of the inequality), this implies that correlations [3] reveal Bell nonlocality.

Large Violation of a Bell Inequality from Communication Complexity

We now show how to combine the above ingredients to get the main result: Whenever C(f)(Q(f))2, we obtain an unbounded violation of the Bell inequality—the ratio of the quantum to the classical value of our Bell inequality grows arbitrarily when we increase the number of inputs and outputs (6, 9, 11, 1618).

To state and proof the main theorem we summarize the above results in the following sequence of steps:

  • i)

    Given a quantum protocol with advantage that uses Q bits of communication and achieves psucc=1/2+ϵ, we convert it (using Proposition 1) to the memoryless protocol that uses 10Q2 bits of communication and achieves the same success probability.

  • ii)

    From the memoryless protocol using measurements and quantum state we obtain the set of quantum correlations Rq.

  • iii)
    Using Rq and 10Q2 bits of classical communication, we obtain a new protocol P¯ that achieves
    psucc12+(12Q)2Qϵ.
    Recall that all of the above measurements are done simultaneously, but the exchange of the corresponding classical information happens sequentially.
  • iv)
    We turn protocol P¯ into a Bell inequality. To this end, we consider a general construction of Bell inequality given any function f(x,y) and a protocol P that uses communication and correlations. Namely, denote fP(a,b,x,y) to be a guess of f(x,y) determined by the protocol for given inputs (x,y) and outputs (a,b). Then, consider the probability of success of guessing the correct value of the function f parameterized by the correlations R,
    pf,Psucc(R)=Prob[fP(a,b,x,y)=f(x,y)]=x,yμ(x,y)a,bR(ab|xy)I{fP(a,b,x,y)=f(x,y)}, [4]

    where I() is the indicator function. Our Bell inequality will simply be a shifted value of guessing probability

Bf,P(R)=pf,Psucc(R)12. [5]
  • v)
    We consider the behavior of the above Bell inequality on classical correlations Rcl as a function of the amount of communication used by P¯. To this end we apply Lemma 3 (proved in Supporting Information, section I), which states that given an arbitrary protocol P that uses CP bits of communication, we have
    Bf,P(Rcl)3CPC(f,2/3).

    We apply it to our protocol P¯.

Our main claim is contained in Theorem 1:

Theorem 1.

Suppose two parties can compute a function f, using the protocol P with Q qubits of communication and the success probability 2/3. Then there exist a quantum correlation Rq and a Bell inequality Bf,P such that

Bf,P(Rq)Bf,P(Rcl)C(f,2/3)630Q(12Q)2Q, [6]

where C(f,2/3) is the classical communication complexity of f with probability 2/3, and Rcl stands for arbitrary classical correlation.

Remark:

Theorem 1 implies that if Q2 is sufficiently smaller than C (i.e., when we have a sufficiently large quantum advantage in communication complexity), then we obtain violation of a Bell inequality.

Proof:

Given the protocol P of computing f with success probability 2/3=1/2+1/6 (where we set ϵ=1/6) while using Q qubits of communication, we consider protocol P¯ from item iii, which uses 10Q2 bits of communication with the same probability of success. If applied to correlations Rq of item ii and using Lemma 1 above, it achieves the success probability 1/2+(12Q)2Q(1/6). Thus, the Bell inequality Bf,P¯ constructed in item v evaluated on Rq gives

Bf,P¯(Rq)(12Q)2Q16. [7]

The next step is to check the value of the same Bell inequality on classical correlations Rcl. To this end, we apply item v with P=P¯, and CP=10Q2, obtaining that for any classical correlations Rcl

Bf,P¯(Rcl)30Q2C(f,2/3). [8]

We put together Eqs. 7 and 8, obtaining the required bound for the ratio of Bell value on our particular quantum correlation Rq and arbitrary classical correlation Rcl:

Bf,P¯(Rq)Bf,P¯(Rcl)C(f,2/3)630Q(12Q)2Q. [9]

For C(f,2/3)Q the right-hand side becomes large, implying large violation of a Bell inequality. The diagrammatic proof of Theorem 1 is depicted in Fig. 4.

Fig. 4.

Fig. 4.

The scheme of the proof of Theorem 1. (A) an initial protocol evaluating function f with bias 1/6, using Q qubits; (B) memoryless protocol, with the same bias, using Q2 qubits; (C) protocol P¯ using quantum correlations and Q2 qubits, with bias still about 1/6; (D) protocol P¯ gives small bias for any classical correlation Rc if Q2 is sufficiently smaller than C(f,2/3).

We provide several examples to demonstrate the power of our result.

Examples

Both of the examples are based on an explicit communication complexity problem called “vector in subspace” that was first introduced in ref. 5. In this problem, Alice and Bob receive the n-dimensional vector v and the description of n/2-dimensional subspace H, respectively, with the promise that either vH or vH. The aim of the game is to determine which subspace v belongs to by exchanging messages between the parties. We consider two variants of the problem below.

Vector in Subspace Problem with One-Way Communication.

In this protocol, there is only one round of communication from Alice to Bob. Also, the local memory is not used. The deterministic quantum protocol requires logn qubits of communication (where n is the length of the vector in the problem), whereas the classical communication complexity is C(f,2/3)=Ω(n3) (8).

Knowing the quantum protocol P explicitly, we obtain a stronger Bell inequality because we do not need to invoke any approximations. Using 5logn bits of communication and correlations [2], we can achieve the quantum success probability of pq=1/2+1/2(125logn)10logn, whereas the classical protocol using the same amount of communication achieves pc=1/2+δ, where δ25logn/An3, for some constant A. Thus, the ratio of quantum to classical values of the Bell inequality given in Theorem 1 is

B(Rq)B(Rcl)=1/2(11/n)5logn/An3=Ω(n6logn), [10]

where we use BBf,P when it does not lead to ambiguity.

Vector in Subspace Problem with Two-Way Communication [Raz Original Problem (5)].

In this protocol, Alice sends Bob a quantum state of size logn (where n is the length of the vector in the problem) and then receives a state of the same size. As in the previous example, the parties do not use any local memory. There exists a deterministic quantum protocol for this problem. The classical communication complexity is C(f,2/3)=Ω(n4/logn). But using only 10logn qubits of communication and correlations [2], we get pq=1/2+(12logn)2. The classical protocol using the same amount of communication achieves pc=1/2+δ, where δ2c(10log2n/n4), for some constant A. Thus, the ratio of quantum to classical Bell values is

B(Rq)B(Rcl)=1/2(11/n)210Alog2n/n4=Ω(n8logn). [11]

One-Way Communication Complexity Problems.

We now detail the scenario when Alice is allowed to send a single message to Bob to introduce a very different approach to obtain the violation of a Bell inequality. In this case, state preparation protocol on Alice’s side followed by the measurement of a quantum state by Bob will suffice. Also, there is no need for the local quantum memory on either side because one does not have to preserve the state of the communication protocol. Therefore, the role of the port-based teleportation is played by the remote state preparation.

One marked difference of this approach is that it consumes a significantly smaller amount of entanglement. Also, in this setting, we obtain the nonlinear Bell inequality that explicitly features the probability of Bob guessing the communication from Alice—something that is not possible using the method that relies on the port-based teleportation.

We first outline the remote state preparation protocol and then construct the relevant Bell inequalities below.

Remote State Preparation.

In the remote state preparation, Alice and Bob share a maximally entangled qudit state |Φ+AB=(1/d)i=0d1|iA|iB. Alice wants to prepare a known quantum state |ϕ on Bob’s side by acting only on her share of the qudit, requiring no postprocessing on his side. To achieve this, she performs a measurement with elements {|ϕ*ϕ*|,I|ϕ*ϕ*|}, where |ϕ* is a conjugation of |ϕ in the computational basis, on her part of |Φ+AB, followed by the communication of the classical outcome to Bob if she measured |ϕ*ϕ*| (we denote this outcome as 1). This protocol has a very low probability of success, 1/d. We discuss the techniques to amplify it in Supporting Information, section II.

Correlations.

Applying the remote state preparation protocol to our communication complexity problem, we obtain the correlations

p(a,b|x,y)=tr[(MxaMyb)ρAB], [12]

where {Mxa} are the POVM elements from the remote state preparation and {Myb} describes Bob’s measurements on the shared state ρAB. In the current setup, the number of the binary observables of Alice and Bob is equal to the number of inputs x and y. The correlations [12] are obtained by acting on a single instance of the entangled state whereas the multiround approach uses in the order of 2Q states. Merging m instances together, we obtain the set of correlations

p({i},{o1,,oN}|x,y), [13]

where iI, I={1,,m} denotes the case when the remote state preparation succeeds and {oi} are the respective outputs. Thus, our Bell inequality may be written in the form [3]:

x,yμ(x,y)iIp(i,oi=f(x,y)|x,y)12+δ. [14]

Nonlinear Bell Inequality.

Here we derive a Bell inequality for the case where the parties have the option to abort at any stage of the protocol. Our inequality turns out to be nonlinear and will depend only on two parameters, pA and pB, defined as follows:

  • pA—probability that Alice succeeded, i.e., her outcome is 1 (averaged over all observables by the measure μ):
    pA=x,yμ(x,y)p(a=1|x,y). [15]
    This probability turns out to be equal to Bob successfully “guessing” the communication from Alice in the absence of communication from the latter.
  • pB—conditional probability that Bob’s outcome is equal to value of the function, given that Alice succeeded:
    pB=x,yμ(x,y)p(b=f(x,y)|x,y,a=1). [16]

Using roughly m1/pA instances of the state ρAB, Alice obtains one successful outcome a=1 on average. Then, Alice communicates to Bob this successful instance.

To obtain the inequality, we show how Alice and Bob may guess the correct value of the function. In this setup, as in the previous case, Alice uses m1/pA instances of the state ρAB. Then Alice communicates to Bob the first instance where the outcome appeared, using logmlogpA bits. Finally, Bob looks at the outcome for the successful instance and with probability pB obtains the value of the function f.

If Alice and Bob share a state that admits a local-realistic description, then the used communication cannot be smaller than the value C(pB,n), because it is the optimal value attainable by classical means. Thus, for any local-realistic state, we must necessarily have

log1pAC(pB,n). [17]

See Supporting Information, section III for further details.

Discussion

Examples show that our protocol produces large violations that are a bit weaker than the best known ones such as n/log2n (16) or n/logn (9). This seems to be the price for its universality. However, it is an interesting open question, whether one can find a communication complexity protocol, such that the obtained Bell inequality would admit more dramatic violation than what is currently achievable. Another challenge is to decrease the amount of entanglement used to violate our Bell inequalities, which in our construction is exponential in the quantum communication complexity of the given problem. Similarly, the output size grows exponentially, which gives rise to the question of whether there exists a more efficient method of exhibiting the Bell nonlocality of quantum communication complexity schemes. The last two challenges could be addressed by devising a more efficient teleportation protocol or improving one of the existing ones (19). Finally, our method does not cover the protocols with initial entanglement. This is quite paradoxical, because protocols that use initial entanglement should be Bell nonlocal even more explicitly. It is therefore desirable to search for a method of demonstrating the Bell nonlocality of such protocols.

I) Proof of Lemma

Lemma 3.

For a protocol P supplemented by classical correlations Rc and using CP bits of communication, the shifted success probability of computing f is bounded above as

Bf,P(Rc)CPC(f,2/3). [S1]

Proof:

Consider the success probability of the protocol P in the statement of Lemma 3 after the exchange of CP messages:

pc=12+Bf,P(Rc)23. [S2]

To express the ratio [S1] we need to find Bf,P(Rc) in terms of communication complexity. We achieve this by using the amplification argument (see Supporting Information, section II for the proof), which boosts the success probability to 2/3 at the expense of sending at most C(f,pc) bits of communication:

C(f,pc)13(pc12)2C(f,23)=13(Bf,P(Rc))2C(f,23). [S3]

Thus,

Bf,P(Rc)3C(f,pc)C(f,2/3)=3CPC(f,2/3). [S4]

II) Communication Complexity for Arbitrary Success Probability from Communication Complexity for Fixed Success Probability

Here we use the amplification (pumping) argument, which is a well-known technique for increasing the success probability of a randomized protocol (20) by repetition, and prove the following bound for the communication required by a randomized algorithm,

C(f,pS)13(pS12)2C(f,23), [S5]

where C(f,pS) stands for communication complexity of an arbitrary (quantum or classical) randomized protocol. The bound is valid for 1/2<pS<2/3. We use the pumping argument to show that a smaller C(f,pS) would enable one to construct a protocol that uses less communication than C(f,2/3) and achieves pS=2/3 and hence leads to a contradiction.

Let protocol Π use C(1/2+ϵ) bits of communication to achieve pS=1/2+ϵ. Let us consider protocol Π in which Alice and Bob repeat protocol Π l times and then Bob returns as an answer the most common output of Π. Because we are restricted to Boolean functions, the success probability pS of Π is equal to the probability that protocol Π gives the correct answer no less than l/2+1 times. By the Chernoff bound we get

pS1exp(12lϵ2). [S6]

Because we require that pS2/3, we get that

l3ϵ2. [S7]

From the communication complexity bound, it is known that to achieve pS=2/3, the protocol Π requires at least C(f,2/3) bits of communication. On the other hand, protocol Π repeats protocol Π l times and uses lC(f,1/2+ϵ) bits of communication. Putting this together, we have

lC(f,12+ϵ)C(f,23). [S8]

Using relation [S7] we get finally

C(f,12+ϵ)ϵ23C(f,23). [S9]

For 1/2+ϵ=2/3 our estimation leads to a communication complexity bound of 1/108C(f,2/3) which is much below the true value. This discrepancy comes from the nonoptimality of the pumping protocol.

III) Rigorous Derivation of the Nonlinear Bell Inequality and Its Violation

We now derive the nonlinear Bell inequality

log1/pA+loglog1/δ+1Cμ(f,n,(1δ)pA+δ/2), [S10]

where the classical communication complexity C(f,p) is additionally parameterized by μ and the size of the problem n. First, we construct a one-way protocol with classical communication that makes use of shared entanglement given the set of correlations. We restrict ourselves to the family of correlations p(a,b|x,y) with x,y{0,1}n, a,b{0,1}. As usual, a=1 is interpreted as the success on Alice’s side. When the latter occurs, we expect b to hold the value of the function b=f(x,y). This restriction does not limit the generality because we may always take negation of a,b,x,y, which is a local operation.

We show that for any correlation p(a,b|x,y), characterized by n, pA, and pB (defined in the main text) leads to the protocol ΠB solving a problem of size n, using log1/pA+loglogδ+1 bits of communication and achieving pSμ=(1δ)pB+δ/2 for the initial probability distribution μ(x,y).

Protocol ΠB works as follows. Let Alice and Bob share k/pA copies of the correlations. They use their inputs x, y to select the appropriate measurements. Alice sends to Bob the index i of the first correlation where she obtained a=1. Then, Bob estimates b for the respective correlation i and returns it as an output of protocol ΠB. In the case when none of the boxes returned a=1, Alice outputs ABORT and Bob returns a random bit.

The protocol requires logk/pA bits of communication to encode i of the box and 1 extra bit to encode the message ABORT. The probability that Alice gets a=1 for at least one instance is 1(1pA)k/pA12k. For this case Bob returns b=f(x,y) with the probability pB. If Bob receives ABORT, he returns the proper value with probability 1/2. Putting δ=2k we get an overall success probability of pSμ=(1δ)pB+δ/2 with communication of log1/pA+loglog1/δ+1 bits.

For all of the correlations with the local hidden variable model we get

log1/pA+loglog1/δ+1Cμ(f,n,(1δ)pB+δ/2). [S11]

In the case when the communication complexity is given only for the fixed probability of success pS=2/3, by the pumping argument and the fact that Cμ(2/3,n)Cμ(pS,n) for pS2/3 we obtain

log1/pA+loglog1/δ+1 [S12]
{13((1δ)pB+δ/212)2Cμ(23,n),if (1δ)pB+δ/223,Cμ(23,n),if (1δ)pB+δ/2>23.

Using the fact that correlations obtained from a quantum protocol with communication complexity Q and success probability pS are characterized by pA=2Q and pB=pS and inserting them into [S11], we make the following observation:

Observation 1.

Let Cμ(f,n,pSC) be defined as in Eq. S10. If correlations obtained by construction of Eq. 2 in the main text from a quantum protocol with success probability pS and communication complexity Q do not violate the Bell inequality [S11], then

Q(f,n,pS)maxδ(Cμ(f,n,(1δ)pS+δ/2)loglog1/δ)2. [S13]

To witness the violation of a Bell inequality constructed for a particular function f, it suffices to know how Cμ(f,n,pSC) dominates over Qμ(f,n,pSQ) for some fixed pSQpSC. [Function g(n) dominates h(n) if for any constant k there exists n0 such that for any n>n0 we have kg(n)h(n).]

IV) Memory Compression of Quantum Communication Protocols

We convert an arbitrary quantum communication protocol into one where on each round Alice and Bob compress their memory and teleport it alongside the message. This ensures that they do not store any information associated with the message between the rounds.

The theoretical underpinning of such conversion is Lemma 2, proved by Yao (3) and Kremer (14) (also ref. 21, lemma 7.2.1 and ref. 22, appendix A). Lemma 2 applies to protocols where only a single qubit is sent per round. One can also derive a version of the latter where the message size is variable per round, which gives a more efficient memoryless version of protocols that need only a small number of rounds.

Lemma 2.

The state of an -qubit protocol (without prior entanglement) on input (x,y) can be written as

i{0,1}αi(x)βi(y)|Ai(x)|i|Bi(y),

where the αi(x) and βi(y) are complex numbers of magnitude 1, the |Ai(x),|Bi(y) are unit vectors belonging to Alice and Bob, respectively, and i denotes the last bit of the -bit string i.

Consider the state description given by Lemma 2 for our quantum protocol after m rounds. Let {|Ai(x)}i{0,1}l describe Alice’s local states encoded in k qubits, for some k. Because there are only 2m different vectors |Ai(x), there exists a unitary Um(x) and a collection of m-qubit states |A^i(x) such that for all i{0,1}m we have Um(x)|Ai(x)=|0(km)|A^i(x). [More precisely, we can find some orthonormal basis |ei(x) for the space spanned by the (not necessarily orthogonal) |Ai(x), which consists of at most 2m basis vectors. Then we can write Um(x)=i{0,1}m|00iei(x)|+T, where T is the completion of the unitary transformation on the orthogonal complement of the subspace spanned by the |ei(x) vectors, to the orthogonal complement of the subspace spanned by the |00i vectors.] Similarly on Bob’s side there exists a unitary Vm(y) such that Vm(y)|Bi(y)=|0(km)|B^i(y), where k is the number of qubits used to encode Bob’s local state {|Bi(x)}i{0,1}l in the original protocol and every |B^i(y) is an m-qubit state.

Therefore, the state of the protocol after m rounds can be written as

(Um(x)Vm(y))×[|00A|00Bi{0,1}mαi(x)βi(y)|A^i(x)|im|B^i(y)],

where |00A and |00B are the trivial local states on Alice and Bob, respectively. Then all of the local memory of the m-round protocol can be encoded in m qubits. This proves Proposition 1 in the main text.

Acknowledgments

Part of this work was done at the National Quantum Information Centre of Gdańsk as well as during the Program on Mathematical Challenges in Quantum Information, Isaac Newton Institute for Mathematical Sciences, 2013. This work is supported by European Commission (EC) IP QESSENCE, European Research Council (ERC) AdG QOLAPS, European Union (EU) project RAQUEL, Grant NCN Maestro (DEC- 2011/02/A/ST2/00305), the EU project SIQS, and MNiSW Grant IdP2011 000361. H.B. is partially funded through the Netherlands Organisation for Scientific Research Gravitation Grant Networks. S.S. acknowledges the support of Sidney Sussex College.

Footnotes

The authors declare no conflict of interest.

This article is a PNAS Direct Submission.

This article contains supporting information online at www.pnas.org/lookup/suppl/doi:10.1073/pnas.1507647113/-/DCSupplemental.

References

  • 1.Bell JS. On the Einstein-Podolsky-Rosen paradox. Physics. 1964;1(3):195–200. [Google Scholar]
  • 2.Yao A-C. Some complexity questions related to distributed computing. In: Fischer MJ, Demillo RA, Lynch NA, Burkhard WA, Aho AV, editors. Proceedings of 11th Annual ACM Symposium on the Theory of Computing. ACM Press; New York: 1979. pp. 209–213. [Google Scholar]
  • 3.Yao A-C. 1993. Quantum circuit complexity. Proceedings of 34th IEEE Symposium on Foundations of Computer Science (IEEE Computer Society, Palo Alto, CA), pp 352–360.
  • 4.Cleve R, Buhrman H. Substituting quantum entanglement for communication. Phys Rev A. 1997;56(2):1201. [Google Scholar]
  • 5.Raz R. Exponential separation of quantum and classical communication. In: Vitter JS, Larmore L, Leighton T, editors. Proceedings of 31st Annual ACM Symposium on the Theory of Computing. ACM; New York: 1999. pp. 358–367. [Google Scholar]
  • 6.Buhrman H, Cleve R, Massar S, de Wolf R. Nonlocality and communication complexity. Rev Mod Phys. 2010;82(1):665. [Google Scholar]
  • 7.Buhrman H, Cleve R, van Dam W. Quantum entanglement and communication complexity. SIAM J Comput. 2001;30:1829–1841. [Google Scholar]
  • 8.Regev O, Klartag B. 2011. Quantum one-way communication can be exponentially stronger than classical communication. Proceedings of 43rd Annual ACM Symposium on Theory of Computing, ed Vadhan S (ACM, New York), Vol 31, pp 31–40.
  • 9.Buhrman H, Scarpa G, de Wolf R. 2010. Better non-local games from hidden matching. arXiv:1007.2359.
  • 10.Brukner C, Zukowski M, Pan J-W, Zeilinger A. Bell’s inequalities and quantum communication complexity. Phys Rev Lett. 2004;92(12):127901. doi: 10.1103/PhysRevLett.92.127901. [DOI] [PubMed] [Google Scholar]
  • 11.Junge M, et al. Unbounded violations of bipartite Bell inequalities via operator space theory. Commun Math Phys. 2010;300(3):715–739. [Google Scholar]
  • 12.Ishizaka S, Hiroshima T. Asymptotic teleportation scheme as a universal programmable quantum processor. Phys Rev Lett. 2008;101(24):240501. doi: 10.1103/PhysRevLett.101.240501. [DOI] [PubMed] [Google Scholar]
  • 13.Ishizaka S, Hiroshima T. Quantum teleportation scheme by selecting one of multiple output ports. Phys Rev A. 2009;79(4):042306. [Google Scholar]
  • 14.Kremer I. 1995. Quantum communication. Master’s thesis (Hebrew University, Jerusalem)
  • 15.Bennett C. Remote preparation of quantum states. IEEE Trans Inf Theory. 2005;51(1):56–74. [Google Scholar]
  • 16.Buhrman H, Regev O, Scarpa G, de Wolf R. 2011. Near-optimal and explicit Bell inequality violations. IEEE Conference on Computational Complexity (IEEE Computer Society, Washington, DC), Vol 157, pp 157–166.
  • 17.Palazuelos C. 2012. On the largest Bell violation attainable by a quantum state. arXiv:1206.3695.
  • 18.Junge M, Palazuelos C. Large violation of Bell inequalities with low entanglement. Commun Math Phys. 2011;306:695. [Google Scholar]
  • 19.Pirandola S, Eisert J, Weedbrook C, Furusawa A, Braunstein S. 2015. Advances in quantum teleportation. arXiv:1505.07831.
  • 20.Kushilevitz E, Nisan N. Communication Complexity. Cambridge Univ Press; Cambridge, UK: 2006. [Google Scholar]
  • 21.de Wolf R. 2001. Quantum computing and communication complexity. PhD thesis (University of Amsterdam, Amsterdam)
  • 22.Buhrman H, de Wolf R. 2001. Communication complexity lower bounds by polynomials. 16th Annual IEEE Conference on Computational Complexity. [DOI]

Articles from Proceedings of the National Academy of Sciences of the United States of America are provided here courtesy of National Academy of Sciences

RESOURCES