Skip to main content
Entropy logoLink to Entropy
. 2019 Jan 19;21(1):92. doi: 10.3390/e21010092

Remote Sampling with Applications to General Entanglement Simulation

Gilles Brassard 1,2,*, Luc Devroye 3, Claude Gravel 4,†,*
PMCID: PMC7514202  PMID: 33266808

Abstract

We show how to sample exactly discrete probability distributions whose defining parameters are distributed among remote parties. For this purpose, von Neumann’s rejection algorithm is turned into a distributed sampling communication protocol. We study the expected number of bits communicated among the parties and also exhibit a trade-off between the number of rounds of the rejection algorithm and the number of bits transmitted in the initial phase. Finally, we apply remote sampling to the simulation of quantum entanglement in its essentially most general form possible, when an arbitrary finite number m of parties share systems of arbitrary finite dimensions on which they apply arbitrary measurements (not restricted to being projective measurements, but restricted to finitely many possible outcomes). In case the dimension of the systems and the number of possible outcomes per party are bounded by a constant, it suffices to communicate an expected O(m2) bits in order to simulate exactly the outcomes that these measurements would have produced on those systems.

Keywords: communication complexity, quantum theory, classical simulation of entanglement, exact sampling, random bit model, entropy

1. Introduction

Let X be a nonempty finite set containing n elements and p=(px)xX be a probability vector parameterized by some vector θ=(θ1,,θm)Θm for an integer m2. For instance, the set Θ can be the real interval [0,1] or the set of Hermitian semi-definite positive matrices as it is the case for the simulation of entanglement. The probability vector p defines a random variable X such that P{X=x}=defpx for xX. To sample exactly the probability vector p means to produce an output x such that P{X=x}=px. The problem of sampling probability distributions has been studied and is still studied extensively within different random and computational models. Here, we are interested in sampling exactly a discrete distribution whose defining parameters are distributed among m different parties. The θi’s for i{1,,m} are stored in m different locations where the ith party holds θi. In general, any communication topology between the parties would be allowed, but, in this work, we concentrate for simplicity on a model in which we add a designated party known as the leader, whereas the m other parties are known as the custodians because each of them is sole keeper of the corresponding parameter θ—hence there are m+1 parties in total. The leader communicates in both directions with the custodians, who do not communicate among themselves. Allowing inter-custodian communication would not improve the communication efficiency of our scheme and can, at best, halve the number of bits communicated in any protocol. However, it could dramatically improve the sampling time in a realistic model in which each party is limited to sending and receiving a fixed number of bits at any given time step, as demonstrated in our previous work [1] concerning a special case of the problem considered here. The communication scheme is illustrated in Figure 1.

Figure 1.

Figure 1

The communication scheme.

It may seem paradoxical that the leader can sample exactly the probability vector p with a finite expected number of bits sent by the custodians, who may hold continuous parameters that define p. However, this counterintuitive possibility has been known to be achievable for more than a quarter-century in earlier work on the simulation of quantum entanglement by classical communication, starting with Refs. [2,3,4,5,6,7], continuing with Refs. [8,9,10,11,12,13,14], etc. for the bipartite case and Refs. [15,16,17], etc. for the multipartite case, and culminating with our own Ref. [1].

Our protocol to sample remotely a given probability vector is presented in Section 2. For this purpose, the von Neumann rejection algorithm [18] is modified to produce an output xX with exact probability px using mere approximations of those probabilities, which are computed based on partial knowledge of the parameters transmitted on demand by the custodians to the leader. For the sake of simplicity, and to concentrate on the new techniques, we assume initially that algebraic operations on real numbers can be carried out with infinite precision and that continuous random variables can be sampled. Later, in Section 4, we build on techniques developed in Ref. [1] to obtain exact sampling in a realistic scenario in which all computations are performed with finite precision and the only source of randomness comes from flipping independent fair coins.

In the intervening Section 3, we study our motivating application of remote sampling, which is the simulation of quantum entanglement using classical resources and classical communication. Readers who may not be interested in quantum information can still benefit from Section 2 and most of Section 4, which make no reference to quantum theory in order to explain our general remote sampling strategies. A special case of remote sampling has been used by the authors [1], in which the aim was to sample a specific probability distribution appearing often in quantum information science, namely the m-partite Greenberger–Horne–Zeilinger (GHZ) distribution [19]. More generally, consider a quantum system of dimension d=d1dm represented by a density matrix ρ known by the leader (surprisingly, the custodians have no need to know ρ). Suppose that there are m generalized measurements (povms) acting on quantum systems of dimensions d1,,dm whose possible outcomes lie in sets X1,,Xm of cardinality n1,,nm, respectively. Each custodian knows one and only one of the povms and nothing else about the others. The leader does not know initially any information about any of the povms. Suppose in addition that the leader can generate independent identically distributed uniform random variables on the real interval [0,1]. We show how to generate a random vector X=(X1,,Xm)X=X1××Xm sampled from the exact joint probability distribution that would be obtained if each custodian i had the ith share of ρ (of dimension di) and measured it according to the ith povm, producing outcome xiXi. This task is defined formally in Section 3, where we prove that the total expected number of bits transmitted between the leader and the custodians using remote sampling is O(m2) provided all the di’s and ni’s are bounded by some constant. The exact formula, involving m as well as the di’s and ni’s, is given as Equation (14) in Section 3, where d and n denote the product of the di’s and the ni’s, respectively. In Section 4, we obtain the same asymptotic result in the more realistic scenario in which the only source of randomness comes from independent identically distributed uniform random bits. This result subsumes that of Ref. [1] since all di’s and ni’s are equal to 2 for projective measurements on individual qubits of the m-partite GHZ state.

2. Remote Sampling

As explained in the Introduction, we show how to sample remotely a discrete probability vector p=(px)xX. The task of sampling is carried by a leader ignorant of some parameters θ=(θ1,,θm) that come in the definition of the probability vector, where each θi is known by the ith custodian only, with whom the leader can communicate. We strive to minimize the amount of communication required to achieve this task.

To solve our conundrum, we modify the von Neumann rejection algorithm [18,20]. Before explaining those modifications, let us review the original algorithm. Let q=(qx)xX be a probability vector that we know how to sample on the same set X, and let C1 be such that pxCqx for all xX. The classical von Neumann rejection algorithm is shown as Algorithm 1. It is well known that the expected number of times round the repeat loop is exactly C.

Algorithm 1 Original von Neumann rejection algorithm
  • 1:

    repeat

  • 2:

       Sample X according to (qx)xX

  • 3:

       Sample U uniformly on [0,1]

  • 4:

       if UCqXpX then

  • 5:

         return X {X is accepted}

  • 6:

      end if

  • 7:

    end repeat

If only partial knowledge about the parameters defining p is known, it would seem that the condition in line 4 cannot be decided. Nevertheless, the strategy is to build a sequence of increasingly accurate approximations that converge to the left and right sides of the test. As explained below, the number of bits transmitted depends on the number of bits needed to compute q, and on the accuracy in p required to accept or reject. This task can be achieved either in the random bit model, in which only i.i.d. random bits are generated, or in the less realistic uniform model, in which uniform continuous random variables are needed. The random bit model was originally suggested by von Neumann [18], but only later given this name and formalized by Knuth and Yao [21]. In this section, we concentrate for simplicity on the uniform model, leaving the more practical random bit model for Section 4.

Definition 1.

A t-bit approximation of a real number x is any x^ such that |xx^|2t. A special case of t-bit approximation is the t-bit truncation x^=sign(x)|x|2t/2t, where sign(x) is equal to +1, 0 or 1 depending on the sign of x. If α=a+bi is a complex number, where i=1, then a t-bit approximation (resp. truncation) α^ of α is any a^+b^i, where a^ and b^ are t-bit approximations (resp. truncations) of a and b, respectively.

Note that we assume without loss of generality that approximations of probabilities are always constrained to be real numbers between 0 and 1, which can be enforced by snapping any out-of-bound approximation (even if it is a complex number) to the closest valid value.

Consider an integer t0>0 to be determined later. Our strategy is for the leader to compute the probability vector q=(qx)xX defined below, based on t0-bit approximations px(t0) of the probabilities px for each xX. For this purpose, the leader receives sufficient information from the custodians to build the entire vector q at the outset of the protocol. This makes q the “easy-to-sample” distribution required in von Neumann’s technique, which is easy not from a computational viewpoint, but in the sense that no further communication is required for the leader to sample it as many times as needed.

Let

C=xpx(t0)+2t0 (1)

and

qx=px(t0)+2t0/C. (2)

Noting that xqx=1, these qx define a proper probability vector q=(qx)xX. Using the definition of a t-bit approximation and the definition of qx from Equation (2), we have that

pxpx(t0)+2t0=Cqxpx+2×2t0.

Taking the sum over the possible values for x and recalling that set X is of cardinality n,

1C1+21t0n. (3)

Consider any xX sampled according to q and U sampled uniformly in [0,1] as in lines 2 and 3 of Algorithm 1. Should x be accepted because UCqxpx, this can be certified by any t-bit approximation px(t) of px such that UCqxpx(t)2t for some positive integer t since px(t)px+2t. Conversely, any integer t such that UCqx>px(t)+2t certifies that x should be rejected because it implies that UCqx>px since px(t)px2t. On the other hand, no decision can be made concerning UCqx versus px if 2t<UCqxpx(t)2t. It follows that one can modify Algorithm 1 above into Algorithm 2 below, in which a sufficiently precise approximation of px suffices to make the correct decision to accept or reject an x sampled according to distribution q. A well-chosen value of t0 must be input into this algorithm, as discussed later.

Algorithm 2 Modified rejection algorithm—Protocol for the leader
Input: Value of t0
  • 1:

    Compute px(t0) for each xX

    {The leader needs information from the custodians in order to compute these approximations}

  • 2:

    Compute C and q=(qx)xX as per Equations (1) and (2)

  • 3:

    Sample X according to q

  • 4:

    Sample U uniformly on [0,1]

  • 5:

    fort=t0do

  • 6:

       if UCqXpX(t)2t then

  • 7:

         return X {X is accepted}

  • 8:

       else if UCqX>pX(t)+2t then

  • 9:

         go to line 3 {X is rejected}

  • 10:

      else

  • 11:

        Continue the for loop

        {We cannot decide whether to accept or reject because 2t<UCqxpx(t)2t;

        communication may be required in order for the leader to compute pX(t+1);

        it could be that bits previously communicated to compute px(t) can be reused.}

  • 12:

       end if

  • 13:

    end for

Theorem 1.

Algorithm 2 is correct, i.e., it terminates and returns X=x with probability px. Furthermore, let T be the random variable that denotes the value of variable t upon termination of any instance of the for loop, whether the loop terminates in rejection or acceptation. Then,

E(T)t0+3. (4)

Proof. 

Consider any xX and tt0. To reach T>t, it must be that 2t<UCqxpx(t)2t. Noting that qx0 according to Equation (2), the probability that T>t when X=x is therefore upper-bounded as follows:

PT>t|X=xP2t<UCqxpx(t)2t=Ppx(t)2tCqx<Upx(t)+2tCqxpx(t)+2tCqxpx(t)2tCqx=2×2tCqx2t0t+1. (5)

The last inequality uses the fact that

Cqx=px(t0)+2t02t0.

It follows that the probability that more turns round the for loop are required decreases exponentially with each new turn once t>t0+1, which suffices to guarantee termination of the for loop with probability 1. Termination of the algorithm itself comes from the fact that the choice of X and U in lines 3 and 4 leads to acceptance at line 7—and therefore termination—with probability 1/C, as demonstrated by von Neumann in the analysis of his rejection algorithm.

The fact that X=x is returned with probability px is an immediate consequence of the correctness of the von Neumann rejection algorithm since our adaptation of this method to handle the fact that only approximations of pX are available does not change the decision to accept or reject any given candidate sampled according to q.

In order to bound the expectation of T, we note that P{T>t|X=x}=1 when t<t0 since we start the for loop at t=t0. We can also use vacuous P{T>t0|X=x}1 rather than the worse-than-vacuous upper bound of 2 given by Equation (5) in the case t=t0. Therefore,

E(T|X=x)=t=0P{T>t|X=x}=t=0t0P{T>t|X=x}+t=t0+1P{T>t|X=x}t0+1+2t0+1t=t0+12t=t0+3.

It remains to note that, since E(T|X=x)t0+3 for all xX, it follows that E(T)t0+3 without condition. □

Let S be the random variable that represents the number of times variable X is sampled according to q at line 3, and let Ti be the random variable that represents the value of variable T upon termination of the ith instance of the for loop starting at line 5, for i{1,,S}. The random variables Ti are independently and identically distributed as the random variable T in Theorem 1 and the expected value of S is C. Let X1,,XS be the random variables chosen at successive passes at line 3, so that X1,,XS1 are rejected, whereas XS is returned as the final result of the algorithm.

To analyse the communication complexity of Algorithm 2, we introduce function γx(t) for each xX and t>t0, which denotes the incremental number of bits that the leader must receive from the custodians in order to compute px(t), taking account of the information that may already be available if he had previously computed px(t1). For completeness, we include in γx(t) the cost of the communication required for the leader to request more information from the custodians. We also introduce function δ(t) for t0, which denotes the number of bits that the leader must receive from the custodians in order to compute px(t) for all xX in a “simultaneous” manner. Note that it could be much less expensive to compute those n values than n times the cost of computing any single one of them because some of the parameters held by the custodians may be relevant to more than one of the px’s. The total number of bits communicated in order to implement Algorithm 2 is therefore given by random variable

Z=δ(t0)+i=1St=t0+1TiγXi(t).

For simplicity, let us define function γ(t)=defmaxxXγx(t). We then have

Zδ(t0)+i=1St=t0+1Tiγ(t),

whose expectation, according to Wald’s identity, is

E(Z)δ(t0)+E(S)Et=t0+1Tγ(t). (6)

Assuming the value of γ(t) is upper-bounded by some γ,

E(Z)δ(t0)+E(S)E(Tt0)γδ(t0)+3γCδ(t0)+3γ1+21t0n (7)

because E(S)=C and using Equations (4) and (3).

Depending on the specific application, which determines γ and function δ(t), Equation (7) is key to a trade-off that can lead to an optimal choice of t0 since a larger t0 decreases 21t0 but is likely to increase δ(t0). The value of γ may play a rôle in the balance. The next section, in which we consider the simulation of quantum entanglement by classical communication, gives an example of this trade-off in action.

3. Simulation of Quantum Entanglement Based on Remote Sampling

Before introducing the simulation of entanglement, let us establish some notation and mention the mathematical objects that we shall need. It is assumed that the reader is familiar with linear algebra, in particular the notion of a semi-definite positive matrix, Hermitian matrix, trace of a matrix, tensor product, etc. For a discussion about the probabilistic and statistical nature of quantum theory, see Ref. [22]. For convenience, we use [n] to denote the set {1,2,,n} for any integer n.

Consider integers m,d1,d2,,dm,n1,n2,,nm, all greater than or equal to 2. Define d=i=1mdi and n=i=1mni. Let ρ be a d×d density matrix. Recall that any density matrix is Hermitian, semi-definite positive and unit-trace, which implies that its diagonal elements are real numbers between 0 and 1. For each i[m] and j[ni], let Mij be a di×di Hermitian semi-definite positive matrix such that

j[ni]Mij=Idi, (8)

where Idi is the di×di identity matrix. In other words, each set {Mij}j[ni] is a povm (positive-operator valued measure) [22].

As introduced in Section 1, we consider one leader and m custodians. The leader knows density matrix ρ and the ith custodian knows the ith povm, meaning that he knows the matrices Mij for all j[ni]. If a physical system of dimension d in state ρ were shared between the custodians, in the sense that the ith custodian had possession of the ith subsystem of dimension di, each custodian could perform locally his assigned povm and output the outcome, an integer between 1 and ni. The joint output would belong to X=def[n1]×[n2]××[nm], a set of cardinality n, sampled according to the probability distribution stipulated by the laws of quantum theory, which we review below.

Our task is to sample X with the exact same probability distribution even though there is no physical system in state ρ available to the custodians, and in fact all parties considered are purely classical! We know from Bell’s Theorem [23] that this task is impossible in general without communication, even when m=2, and our goal is to minimize the amount of communication required to achieve it. Special cases of this problem have been studied extensively for expected [1,2,4,5,6], etc. and worst-case [3,8], etc. communication complexity, but here we solve it in its essentially most general setting, albeit only in the expected sense. For this purpose, the leader will centralize the operations while requesting as little information as possible from the custodians on their assigned povms. Once the leader has successfully sampled X=(X1,,Xm), he transmits each Xi to the ith custodian, who can then output it as would have been the case had quantum measurements actually taken place.

We now review the probability distribution X that we need to sample, according to quantum theory. For each vector x=(x1,,xm)X, let Mx be the d×d tensor product of matrices Mixi for each i[m]:

Mx=i=1mMixi. (9)

The set {Mx}xX forms a global povm of dimension d, which applied to density matrix ρ defines a joint probability vector on X. The probability px of obtaining any x=(x1,,xm)X is given by

px=TrρMx=Trρi=1mMixi. (10)

For a matrix A of size s×s and any pair of indices r and c between 0 and s1, we use (A)rc to denote the entry of A located in the rth row and cth column. Matrix indices start at 0 rather than 1 to facilitate Fact 2 below. We now state various facts for which we provide cursory justifications since they follow from elementary linear algebra and quantum theory, or they are lifted from previous work.

Fact 1.

For all xX, we have 0px1 when px is defined according to Equation (10); furthermore, xXpx=1. This is obvious because quantum theory tells us that Equation (10) defines a probability distribution over all possible outcomes xX, as sampled by the joint measurement. Naturally, this statement could also be proven from Equations (8) and (10) using elementary linear algebra.

Fact 2.

For each x=(x1,,xm)X, matrix Mx is the tensor product of m matrices as given in Equation (9). Therefore, each entry (Mx)rc is the product of m entries of the Mixi’s. Specifically, consider any indices r and c between 0 and d1 and let ri and ci be the indices between 0 and di1, for each i[m], such that

r=r1+r2d1+r3d1d2++rmd1dm1,c=c1+c2d1+c3d1d2++cmd1dm1.

The ri’s and ci’s are uniquely defined by the principle of mixed-radix numeration. We have

(Mx)rc=i=1mMixirici.

Fact 3.

Let M be a Hermitian semi-definite positive matrix. Every entry (M)ij of the matrix satisfies

|(M)ij|(M)ii(M)jj.

This follows from the fact that all principal submatrices of any Hermitian semi-definite positive matrix are semi-definite positive [24] (Observation 7.1.2, page 430). In particular, the principal submatrix

(M)ii(M)ij(M)ji(M)jj

is semi-definite positive, and therefore it has nonnegative determinant:

(M)ii(M)jj(M)ij(M)ji=(M)ii(M)jj(M)ij(M)ij*=(M)ii(M)jj|(M)ij|20

by virtue of M being Hermitian, where α* denotes the complex conjugate of α.

Fact 4.

The norm |(ρ)ij| of any entry of a density matrix ρ is less than or equal to 1. This follows directly from Fact 3 since density matrices are Hermitian semi-definite positive, and from the fact that diagonal entries of density matrices, such as (ρ)ii and (ρ)jj, are real values between 0 and 1.

Fact 5.

Given any povm {M}=1L, we have that

  1. 0(M)ii1 for all and i, and

  2. |(M)ij|1 for all , i and j.

The first statement follows from the fact that =1LM is the identity matrix by definition of povms, and therefore =1L(M)ii=1 for all i, and the fact that each (M)ii0 because each M is semi-definite positive. The second statement follows from the first by applying Fact 3.

Fact 6.

(This is a special case of Theorem 1 from Ref. [1], with v=0). Let k1 be an integer and consider any two real numbers a and b. If a^ and b^ are arbitrary k-bit approximations of a and b, respectively, then a^+b^ is a (k1)-bit approximation of a+b. If, in addition, a and b are known to lie in interval [1,1], which can also be assumed without loss of generality concerning a^ and b^ since otherwise they can be safely pushed back to the appropriate frontier of this interval, then a^b^ is a (k1)-bit approximation of ab.

Fact 7.

Let k1 be an integer and consider any two complex numbers α and β. If α^ and β^ are arbitrary k-bit approximations of α and β, respectively, then α^+β^ is a (k1)-bit approximation of α+β. If, in addition, k2 and the real and imaginary parts of α and β are known to lie in interval [1,1], which can also be assumed without loss of generality concerning α^ and β^, then α^β^ is a (k2)-bit approximation of αβ. This is a direct consequence of Fact 6 in the case of addition. In the case of multiplication, consider α=a+bi, β=c+di, α^=a^+b^i and β^=c^+d^i, so that

αβ=(acbd)+(ad+bc)iandα^β^=(a^c^b^d^)+(a^d^+b^c^)i.

By the multiplicative part of Fact 6, a^c^, b^d^, a^d^ and b^c^ are (k1)-bit approximations of ac, bd, ad and bc, respectively; and then by the additive part of the same fact (which obviously applies equally well to subtraction), a^c^b^d^ and a^d^+b^c^ are (k2)-bit approximations of acbd and ad+bc, respectively.

Fact 8

(This is Corollary 2 from Ref. [1]). Let m2 and klgm be integers and let {aj}j=1m and {a^j}j=1m be real numbers and their k-bit approximations, respectively, all in interval [1,1]. Then, j=1ma^j is a (klgm)-bit approximation of j=1maj.

Fact 9.

Let m2 and k2lgm be integers and let {αj}j=1m and {α^j}j=1m be complex numbers and their k-bit approximations, respectively. Provided it is known that |αj|1 for each j[m], a (k2lgm)-bit approximation of j=1mαj can be computed from knowledge of the α^j’s. The proof of this fact follows essentially the same template as Fact 8, except that two bits of precision may be lost at each level up the binary tree introduced in Ref. [1], due to the difference between Facts 6 and 7. A subtlety occurs in the need for Fact 7 to apply that the real and imaginary parts of all the complex numbers under consideration must lie in interval [1,1]. This is automatic for the exact values since the αj’s are upper-bounded in norm by 1 and the product of such-bounded complex numbers is also upper-bounded in norm by 1, which implies that their real and imaginary parts lie in interval [1,1]. For the approximations, however, we cannot force their norm to be bounded by 1 because we need the approximations to be rational for communication purposes. Fortunately, we can force the real and imaginary parts of all approximations computed at each level up the binary tree to lie in interval [1,1] because we know that they approximate such-bounded numbers. Note that the product of two complex numbers whose real and imaginary parts lie in interval [1,1], such as 1+2ki and 12ki, may not have this property, even if they are k-bit approximations of numbers bounded in norm by 1.

Fact 10.

Let s2 and klgs be integers and let {αj}j=1s and {α^j}j=1s be complex numbers and their k-bit approximations, respectively, without any restriction on their norm. Then j=1sα^j is a (klgs)-bit approximation of j=1sαj. Again, this follows the same proof template as Fact 8, substituting multiplication of real numbers by addition of complex numbers, which allows us to drop any condition on the size of the numbers considered.

Fact 11.

Consider any x=(x1,,xm)X and any positive integer t. In order to compute a t-bit approximation of px, it suffices to have (t+1+2lgd+2lgm)-bit approximations of each entry of the Mixi matrices for all i[m]. This is because

px=Tr(ρMx)=r=0d1(ρMx)rr=r=0d1c=0d1(ρ)rc(Mx)cr=r=0d1c=0d1(ρ)rci=1m(Mixi)ciri (11)

by virtue of Fact 2. Every term of the double sum in Equation (11) involves a product of m entries, one per povm element, and therefore incurs a loss of at most 2lgm bits of precision by Fact 9, whose condition holds thanks to Fact 5. An additional bit of precision may be lost in the multiplication by (ρ)rc, even though that value is available with arbitrary precision (and is upper-bounded by 1 in norm by Fact 4) because of the additions involved in multiplying complex numbers. Then, we have to add s=d2 terms, which incurs an additional loss of at most lgs=2lgd bits of precision by Fact 10. In total, (t+1+2lgd+2lgm)-bit approximations of the (Mixi)ciri’s will result in a t-bit approximation of px.

Fact 12.

The leader can compute px(t) for any specific x=(x1,,xm)X and integer t if he receives a total of

(t+2+2lgd+2lgm)i=1mdi2

bits from the custodians. This is because the ith custodian has the description of matrix Mixi of size di×di, which is defined by exactly di2 real numbers since the matrix is Hermitian. By virtue of Fact 11, it is sufficient for the leader to have (t+1+2lgd+2lgm)-bit approximations for all those i=1mdi2 numbers. Since each one of them lies in interval [−1, 1] by Fact 5, well-chosen k-bit approximations (for instance k-bit truncations) can be conveyed by the transmission of k+1 bits, one of which carries the sign.

Note that the t-bit approximation of px computed according to Fact 12, say a+bi, may very well have a nonzero imaginary part b, albeit necessarily between 2t and 2t. Since px(t) must be a real number between 0 and 1, the leader sets px(t)=max(0,min(1,a)), taking no account of b, although a paranoid leader may wish to test that 2tb2t indeed and raise an alarm in case it is not (which of course is mathematically impossible unless the custodians are not given proper povms, unless they misbehave, or unless a computation or communication error has occurred).

Fact 13.

For any t, the leader can compute px(t) for each and every xX if he receives

δ(t)=def(t+2+2lgd+2lgm)i=1mnidi2

bits from the custodians. This is because it suffices for each custodian i to send to the leader (t+1+2lgd+2lgm)-bit approximations of all nidi2 real numbers that define the entire ith povm, i.e., all the matrices Mij for j[ni]. This is a nice example of the fact that it may be much less expensive for the leader to compute at once px(t) for all xX, rather than computing them one by one independently, which would cost

n(t+2+2lgd+2lgm)i=1mdi2=(t+2+2lgd+2lgm)i=1mndi2δ(t)

bits of communication by applying n times Fact 12.

After all these preliminaries, we are now ready to adapt the general template of Algorithm 2 to our entanglement-simulation conundrum, yielding Algorithm 3. We postpone the choice of t0 until after the communication complexity analysis of this new algorithm.

Algorithm 3 Protocol for simulating arbitrary entanglement subjected to arbitrary measurements
  • 1:

    Each custodian i[m] sends his value of ni to the leader, who computes n=i=1mni

  • 2:

    The leader chooses t0 and informs the custodians of its value

  • 3:

    Each custodian i[m] sends to the leader (t0+1+2lgd+2lgm)-bit truncations

    of the real and imaginary parts of the entries defining matrix Mij for each j[ni]

  • 4:

    The leader computes px(t0) for every xX, using Fact 13

  • 5:

    The leader computes C and q=(qx)xX as per Equations (1) and (2)

  • 6:

    acceptfalse

  • 7:

    repeat

  • 8:

       rejectfalse

  • 9:

       The leader samples X=(X1,X2,,Xm) according to q

  • 10:

       The leader informs each custodian i[m] of the value of Xi

  • 11:

       The leader samples U uniformly on [0,1]

  • 12:

       tt0

  • 13:

       repeat

  • 14:

          if UCqXpX(t)2t then

  • 15:

             accepttrue {X is accepted}

  • 16:

          else if UCqX>pX(t)+2t then

  • 17:

             rejecttrue {X is rejected}

  • 18:

          else

  • 19:

             The leader asks each custodian i[m] for one more bit in the truncation

             of the real and imaginary parts of the entries defining matrix MiXi;

  • 20:

             Using this information, the leader updates pX(t) into pX(t+1);

  • 21:

             tt+1

  • 22:

          end if

  • 23:

       until accept or reject

  • 24:

    until accept

  • 25:

    The leader requests each custodian i[m] to output his Xi

To analyse the expected number of bits of communication required by this algorithm, we apply Equation (7) from Section 2 after defining explicitly the cost parameters δ(t0) for the initial computation of px(t0) for all xX at lines 3 and 4, and γ for the upgrade from a specific pX(t) to pX(t+1) at lines 19 and 20. For simplicity, we shall ignore the negligible amount of communication entailed at line 1 (which is i=1mlgnim+lgn bits), line 2 (lgt0 bits), line 10 (also i=1mlgni bits, but repeated E(S)1+21t0n times) and line 25 (m bits) because they are not taken into account in Equation (7) since they are absent from Algorithm 2. If we counted it all, this would add O((1+21t0n)lgn+lgt0) bits to Equation (13) below, which would be less than 10lgn bits added to Equation (14), with no effect at all on Equation (15).

According to Fact 13,

δ(t0)=(t0+2+2lgd+2lgm)i=1mnidi2.

The cost of line 19 is very modest because we use truncations rather than general approximations in line 3 for the leader to compute px(t0) for all xX. Indeed, it suffices to obtain a single additional bit of precision in the real and imaginary parts of each entry defining matrix MiXi from each custodian i[m]. The cost of this update is simply

γ=m+i=1mdi2 (12)

bits of communication, where the addition of m is to account for the leader needing to request new bits from the custodians. This is a nice example of what we meant by “it could be that bits previously communicated can be reused” in line 11 of Algorithm 2.

Putting it all together in Equation (7), the total expected number of bits communicated in Algorithm 3 in order to sample exactly according to the quantum probability distribution is

E(Z)δ(t0)+3γ1+21t0n(t0+2+2lgd+2lgm)i=1mnidi2+31+21t0nm+i=1mdi2. (13)

We are finally in a position to choose the value of parameter t0. First note that n=i=1mni2m. Therefore, any constant choice of t0 will entail an expected amount of communication that is exponential in m because of the right-hand term in Equation (13). At the other extreme, choosing t0=n would also entail an expected amount of communication that is exponential in m, this time because of the left-hand term in Equation (13). A good compromise is to choose t0=lgn, which results in 1C3 according to Equation (3), because in that case 2t0n and therefore

1C1+21t0n=1+2n2t03,

so that Equation (13) becomes

E(Z)(lgn+2lgd+2lgm+2)i=1mnidi2+9m+i=1mdi2. (14)

In case all the ni’s and di’s are upper-bounded by some constant ξ, we have that n=i=1mniξm, hence lgnmlgξ, similarly lgdmlgξ, and also i=1mnidi2mξ3. It follows that

E(Z)(3ξ3lgξ)m2+O(mlogm), (15)

which is on the order of m2, thus matching with our most general method the result that was already known for the very specific case of simulating the quantum m-partite GHZ distribution [1].

4. Practical Implementation Using a Source of Discrete Randomness

In practice, we cannot work with continuous random variables since our computers have finite storage capacities and finite precision arithmetic. Furthermore, the generation of uniform continuous random variables does not make sense computationally speaking and we must adapt Algorithms 2 and 3 to work in a finite world.

For this purpose, recall that U is a uniform continuous random variable on [0,1] used in all the algorithms seen so far. For each i1, let Ui denote the ith bit in the binary expansion of U, so that

U=0.U1U2=i=1Ui2i.

We acknowledge the fact that the Ui’s are not uniquely defined in case U=j/2k for integers k>0 and 0<j<2k, but we only mention this phenomenon to ignore it since it occurs with probability 0 when U is uniformly distributed on [0,1]. We denote the t-bit truncation of U by U[t]:

U[t]=def2tU/2t=i=1tUi2i.

For all t1, we have that

U[t]U<U[t]+2t. (16)

We modify Algorithm 2 into Algorithm 4 as follows, leaving to the reader the corresponding modification of Algorithm 3, thus yielding a practical protocol for the simulation of general entanglement under arbitrary measurements.

Algorithm 4 Modified rejection algorithm with discrete randomness source—Protocol for the leader
Input: Value of t0
  • 1:

    Compute px(t0) for each xX

    {The leader needs information from the custodians in order to compute these approximations}

  • 2:

    Compute C and q=(qx)xX as per Equations (1) and (2)

  • 3:

    Sample X according to q

  • 4:

    U[0]0

  • 5:

    for t=1 to t01 do

  • 6:

      Generate i.i.d. unbiased bit Ut

  • 7:

      U[t]U[t1]+Ut2t

  • 8:

    end for

  • 9:

    fort=t0do

  • 10:

      Generate i.i.d. unbiased bit Ut

  • 11:

      U[t]U[t1]+Ut2t

  • 12:

      if U[t]+2tCqXpX(t)2t then

  • 13:

        return X {X is accepted}

  • 14:

      else if U[t]CqX>pX(t)+2t then

  • 15:

        go to line 3 {X is rejected}

  • 16:

      else

  • 17:

        Continue the for loop

        {We cannot decide to accept or reject because (1+CqX)2t<U[t]CqXpX(t)2t; communication may be required in order for the leader to compute pX(t+1); it could be that bits previously communicated to compute px(t) can be reused.}

  • 18:

      end if

  • 19:

    end for

Theorem 2.

Algorithm 4 is correct, i.e., it terminates and returns X=x with probability px. Furthermore, let T be the random variable that denotes the value of variable t upon termination of any instance of the for loop that starts at line 9, whether it terminates in rejection or acceptation. Then,

E(T)t0+3+2t0.

Proof. 

This is very similar to the proof of Theorem 1, so let us concentrate on the differences. First note that it follows from Equation (16) and the fact that |pX(t)pX|2t that

U[t]+2tCqXpX(t)2tUCqXpX(t)2tUCqXpX

and

U[t]CqX>pX(t)+2tUCqX>pX(t)+2tUCqX>pX.

Therefore, whenever X is accepted at line 13 (resp. rejected at line 15), it would also have been accepted (resp. rejected) in the original von Neumann algorithm, which shows sampling correctness. Conversely, whenever we reach a value of tt0 such that U[t]+2tCqX>pX(t)2t and U[t]CqXpX(t)+2t, we do not have enough information to decide whether to accept or reject, and therefore we reach line 17, causing t to increase. This happens precisely when

(1+CqX)2t<U[t]CqXpX(t)2t.

To obtain an upper bound on E(T), we mimic the proof of Theorem 1, but in the discrete rather than continuous regime. In particular, for any xX and tt0,

PT>t|X=xP(1+Cqx)2t<U[t]Cqxpx(t)2t=Ppx(t)(1+Cqx)2t<U[t]Cqxpx(t)+2t=P2tpx(t)Cqx1+CqxCqx<2tU[t]2tpx(t)Cqx+1Cqx2tpx(t)Cqx+1Cqx2tpx(t)Cqx1+CqxCqx+12t (17)
=21+1Cqx2t2t0t+1+21tbecauseCqx2t0. (18)

To understand Equation (17), think of 2tU[t] as an integer chosen randomly and uniformly between 0 and 2t1. The probability that it falls within some real interval (a,b] for a<b is equal to 2t times the number of integers between 0 and 2t1 in that interval, the latter being upper-bounded by the number of unrestricted integers in that interval, which is at most ba+1.

Noting how similar Equation (18) is to the corresponding Equation (5) in the analysis of Algorithm 2, it is not surprising that the expected value of T will be similar as well. Indeed, continuing as in the proof of Theorem 1, without belabouring the details,

E(T|X=x)=t=0P{T>t|X=x}=t=0t0+1P{T>t|X=x}+t=t0+2P{T>t|X=x}t0+2+2t0+1t=t0+22t+2t=t0+22t=t0+3+2t0. (19)

We conclude that E(T)t0+3+2t0 without condition since Equation (19) does not depend on x. □

The similarity between Theorems 1 and 2 means that there is no significant additional cost in the amount of communication required to achieve remote sampling in the random bit model. i.e., if we consider a realistic scenario in which the only source of randomness comes from i.i.d. unbiased bits, compared to an unrealistic scenario in which continuous random variables can be drawn. For instance, the reasoning that led to Equation (7) applies mutatis mutandis to conclude that the expected number Z of bits that needs to be communicated to achieve remote sampling in the random bit model is

E(Z)δ(t0)+3+2t01+21t0nγ,

where δ and γ have the same meaning as in Section 2.

If we use the random bit approach for the general simulation of quantum entanglement studied in Section 3, choosing t0=lgn again, Equation (14) becomes

E(Z)(lgn+2lgd+2lgm+2)i=1mnidi2+3(3+1/n)m+i=1mdi2, (20)

which reduces to the identical

E(Z)(3ξ3lgξ)m2+O(mlogm)

in case all the ni’s and di’s are upper-bounded by some constant ξ, which again is on the order of m2.

In addition to communication complexity, another natural efficiency measure in the random bit model concerns the expected number of random bits that needs to be drawn in order to achieve sampling. Randomness is needed in lines 3, 6 and 10 of Algorithm 4. A single random bit is required each time lines 6 and 10 are entered, but line 3 calls for sampling X according to distribution q. Let Vi be the random variable that represents the number of random bits needed on the ith passage through line 3. For this purpose, we use the algorithm introduced by Donald Knuth and Andrew Chi-Chih Yao [21], which enables sampling within any finite discrete probability distribution in the random bit model by using an expectation of no more than two random bits in addition to the Shannon binary entropy of the distribution. Since each such sampling is independent from the others, it follows that Vi is independently and identically distributed as a random variable V such that

E(V)2+H(q)2+lgn, (21)

where H(q) denotes the binary entropy of q, which is never more than the base-two logarithm of the number of atoms in the distribution, here n.

Let R be the random variable that represents the number of random bits drawn when running Algorithm 4. Reusing the notation of Section 2, let S be the random variable that represents the number of times variable X is sampled at line 3 and let Ti be the random variable that represents the value of variable T upon termination of the ith instance of the for loop starting at line 9, for i{1,,S}. The random variables Ti are independently and identically distributed as the random variable T in Theorem 2 and the expected value of S is C. Since one new random bit is generated precisely each time variable t is increased by 1 in any pass through either for loops (line 5 or 9), we simply have

R=i=1SVi+Ti.

By virtue of Equations (3) and (21), Theorem 2, and using Wald’s identity again, we conclude that:

E(R)=E(S)E(V)+E(T)1+21t0nlgn+t0+5+2t0.

Taking t0=lgn again, remote sampling can be completed using an expected number of random bit in O(lgn), with a hidden multiplicative constant no larger than 6. The hidden constant can be reduced arbitrarily close to 2 by taking t0=lgn+a for an arbitrarily large constant a. Whenever target distribution p has close to full entropy, this is only twice the optimal number of random bits that would be required according to the Knuth–Yao lower bound [21] in the usual case when full knowledge of p is available in a central place rather than having to perform remote sampling. Note, however, that, if our primary consideration is to optimize communication for the classical simulation of entanglement, as in Section 3, choosing t0=lgna would be a better idea because the summation in the left-hand term of Equation (13) dominates that of the right-hand term. For this inconsequential optimization, a does not have to be a constant, but it should not exceed lg(ξm), where ξ is our usual upper bound on the number of possible outcomes for each participant (if it exists), lest the right-hand term of Equation (13) overtake the left-hand term. Provided ξ exists, the expected number of random bits that needs to be drawn is linear in the number of participants.

The need for continuous random variables was not the only unrealistic assumption in Algorithms 1–3. We had also assumed implicitly that custodians know their private parameters precisely (and that the leader knows exactly each entry of density matrix ρ in Section 3). This could be reasonable in some situations, but it could also be that some of those parameters are transcendental numbers or the result of applying transcendental functions to other parameters, for example cosπ/8. More interestingly, it could be that the actual parameters are spoon-fed to the custodians by examiners, who want to test the custodians’ ability to respond appropriately to unpredictable inputs. However, all we need is for the custodians to be able to obtain their own parameters with arbitrary precision, so that they can provide that information to the leader upon request. For example, if a parameter is π/4 and the leader requests a k-bit approximation of that parameter, the custodian can compute some number x^ such that |x^π/4|2k and provide it to the leader. For communication efficiency purposes, it is best if x^ itself requires only k bits to be communicated, or perhaps one more (for the sign) in case the parameter is constrained to be between 1 and 1. It is even better if the custodian can supply a k-bit truncation because this enables the possibility to upgrade it to a (k+1)-bit truncation by the transmission of a single bit upon request from the leader, as we have done explicitly for the simulation of entanglement at line 19 of Algorithm 3 in Section 3.

Nevertheless, it may be impossible for the custodians to compute truncations of their own parameters in some cases, even when they can compute arbitrarily precise approximations. Consider for instance a situation in which one parameter held by a custodian is x=cosθ for some angle θ for which he can only obtain arbitrarily precise truncations. Unbeknownst to the custodian, θ=π/3 and therefore x=1/2. No matter how many bits the custodian obtains in the truncation of θ, however, he can never decide whether θ<π/3 or θπ/3. In the first case, x<1/2 and therefore the 1-bit truncation of x should be 0, whereas in the second (correct) case, x1/2 and therefore the 1-bit truncation of x is 1/2 (or 0.1 in binary). Thus, the custodian will be unable to respond if the leader asks him for a 1-bit truncation of x, no matter how much time he spends on the task. In this example, by contrast, the custodian can supply the leader with arbitrarily precise approximations of x from appropriate approximations of θ. Should a situation like this occur, for instance in the simulation of entanglement, there would be two solutions. The first one is for the custodian to transmit increasingly precise truncations of θ to the leader and let him compute the cosine on it. This approach is only valid if it is known at the outset that the custodian’s parameter will be of that form, which was essentially the solution taken in our earlier work on the simulation of the quantum m-partite GHZ distribution [1]. The more general solution is to modify the protocol and declare that custodians can send arbitrary approximations to the leader rather than truncations. The consequence on Algorithm 3 is that line 19 would become much more expensive since each custodian i would have to transmit a fresh one-bit-better approximation for the real and imaginary parts of the di2 entries defining matrix MiXi. As a result, efficiency parameter γ(t) in Equation (6) would become

γ(t)=m+(t+2+2lgd+2lgm)i=1mdi2,

which should be compared with the much smaller (constant) value of γ given in Equation (12) when truncations of the parameters are available. Nevertheless, taking t0=lgn again, this increase in γ(t) would make no significant difference in the total number of bits transmitted for the simulation of entanglement because it would increase only the right-hand term in Equations (14) and (20), but not enough to make it dominate the left-hand term. All counted, we still have an expected number of bits transmitted that is upper-bounded by (3ξ3lgξ)m2+O(mlogm) whenever all the ni’s and di’s are upper-bounded by some constant ξ, which again is on the order of m2.

5. Discussion and Open Problems

We have introduced and studied the general problem of sampling a discrete probability distribution characterized by parameters that are scattered in remote locations. Our main goal was to minimize the amount of communication required to solve this conundrum. We considered both the unrealistic model in which arithmetic can be carried out with infinite precision and continuous random variables can be sampled exactly, and the more reasonable random bit model studied by Knuth and Yao [21], in which all arithmetic is carried out with finite precision and the only source of randomness comes from independent tosses of a fair coin. For a small increase in the amount of communication, we can fine-tune our technique to require only twice the number of random bits that would be provably required in the standard context in which all the parameters defining the probability distribution would be available in a single location, provided the entropy of the distribution is close to maximal.

When our framework is applied to the problem of simulating quantum entanglement with classical communication in its essentially most general form, we find that an expected number of O(m2) bits of communication suffices when there are m participants and each one of them (in the simulated world) is given an arbitrary quantum system of bounded dimension and asked to perform an arbitrary generalized measurement (povm) with a bounded number of possible outcomes. This result generalizes and supersedes the best approach previously known in the context of multi-party entanglement, which was for the simulation of the m-partite GHZ state under projective measurements [1]. Our technique also applies without the boundedness condition on the dimension of individual systems and the number of possible outcomes per party, provided those parameters remain finite.

It would be preferable if we could eliminate the dependency of the expected number of bits of communication on the number of possible measurement outcomes. Is perfect simulation possible at all when that number is infinite, regardless of communication efficiency, a scenario in which our approach cannot be applied? In the bipartite case, Serge Massar, Dave Bacon, Nicolas Cerf, and Richard Cleve proved that classical communication can serve to simulate the effect of arbitrary measurements on maximally entangled states in a way that does not require any bounds on the number of possible outcomes [6]. More specifically, they showed that arbitrary povms on systems of n Bell states can be simulated with an expectation of O(n2n) bits of communication. However, their approach exploits the equivalence of this problem with a variant known as classical teleportation [5], in which one party has full knowledge of the quantum state and the other has full knowledge of the measurement to be applied to that state. Unfortunately, the equivalence between those two problems breaks down in a multipartite scenario and there is no obvious way to extend the approach. We leave as an open question the possibility of a simulation protocol in which the expected amount of communication would only depend on the number of participants and the dimension of their simulated quantum systems.

Our work leaves several additional important questions open. Recall that our approach provides a bounded amount on the expected communication required to perform exact remote sampling. The most challenging open question is to determine if it is possible to achieve the same goal with a guaranteed bounded amount of communication in the worst case. If possible, this would certainly require the participants to share ahead of time the realization of random variables, possibly even continuous ones. Furthermore, a radically different approach would be needed since we had based ours on the von Neumann rejection algorithm, which has intrinsically no worst-case upper bound on its performance. This task may seem hopeless, but it has been shown to be possible for special cases of entanglement simulation in which the remote parameters are taken from a continuum of possibilities [3,8], despite earlier “proofs” that it is impossible [2].

A much easier task would be to consider other communication models, in which communication is no longer restricted to being between a single leader and various custodians. Would there be an advantage in communicating through the edges of a complete graph? Obviously, the maximum possible savings in terms of communication would be a factor of 2 since any time one participant wants to send a bit to some other participant, he can do so via the leader. However, if we care not only about the total number of bits communicated, but also the time it takes to complete the protocol in a realistic model in which each party is limited to sending and receiving a fixed number of bits at any given time step, parallelizing communication could become valuable. We had already shown in Ref. [1] that a parallel model of communication can dramatically improve the time needed to sample the m-partite GHZ distribution. Can this approach be generalized to arbitrary remote sampling settings?

Finally, we would like to see applications for remote sampling outside the realm of quantum information science.

Acknowledgments

The authors are very grateful to Nicolas Gisin for his interest in this work and the many discussions we have had with him on this topic in the past decade. Marc Kaplan provided important insights in earlier joint work on the simulation of entanglement. We also acknowledge useful suggestions provided by the anonymous referees, including the suggestion to look into Ref. [6].

Abbreviations

The following abbreviations are used in this manuscript:

i.i.d. independent identically distributed
GHZ Greenberger–Horne–Zeilinger
POVM positive-operator valued measure

Author Contributions

According to the tradition in our field, the authors are listed in alphabetical order. Conceptualization, G.B., L.D. and C.G.; Formal Analysis, G.B. and C.G.; Supervision, G.B. and L.D.; Validation, L.D.; Writing—Original Draft, C.G.; Writing—Review and Editing, G.B. and C.G.

Funding

The work of G.B. is supported in part by the Canadian Institute for Advanced Research, the Canada Research Chair program, Canada’s Natural Sciences and Engineering Research Council (nserc) and Québec’s Institut transdisciplinaire d’information quantique. The work of L.D. is supported in part by nserc.

Conflicts of Interest

The authors declare no conflict of interest. The funding sponsors had no role in the design of the study, in the writing of the manuscript, and in the decision to publish the results.

References

  • 1.Brassard G., Devroye L., Gravel C. Exact classical simulation of the quantum-mechanical GHZ distribution. IEEE Trans. Inf. Theory. 2016;62:876–890. doi: 10.1109/TIT.2015.2504525. [DOI] [Google Scholar]
  • 2.Maudlin T. PSA: Proceedings of the Biennial Meeting of the Philosophy of Science Association. The University of Chicago Press; Chicago, IL, USA: 1992. Bell’s inequality, information transmission, and prism models; pp. 404–417. [Google Scholar]
  • 3.Brassard G., Cleve R., Tapp A. Cost of exactly simulating quantum entanglement with classical communication. Phys. Rev. Lett. 1999;83:1874–1877. doi: 10.1103/PhysRevLett.83.1874. [DOI] [Google Scholar]
  • 4.Steiner M. Towards quantifying non-local information transfer: Finite-bit non-locality. Phys. Lett. A. 2000;270:239–244. doi: 10.1016/S0375-9601(00)00315-7. [DOI] [Google Scholar]
  • 5.Cerf N.J., Gisin N., Massar S. Classical teleportation of a quantum bit. Phys. Rev. Lett. 2000;84:2521–2524. doi: 10.1103/PhysRevLett.84.2521. [DOI] [PubMed] [Google Scholar]
  • 6.Massar S., Bacon D., Cerf N.J., Cleve R. Classical simulation of quantum entanglement without local hidden variables. Phys. Rev. A. 2001;63:052305. doi: 10.1103/PhysRevA.63.052305. [DOI] [Google Scholar]
  • 7.Gisin N., Gisin B. A local variable model for entanglement swapping exploiting the detection loophole. Phys. Lett. A. 2002;297:279–284. doi: 10.1016/S0375-9601(02)00428-0. [DOI] [Google Scholar]
  • 8.Toner B., Bacon D. Communication cost of simulating Bell correlations. Phys. Rev. Lett. 2003;91:187904. doi: 10.1103/PhysRevLett.91.187904. [DOI] [PubMed] [Google Scholar]
  • 9.Pironio S. Violations of Bell inequalities as lower bounds on the communication cost of nonlocal correlations. Phys. Rev. A. 2003;68:062102. doi: 10.1103/PhysRevA.68.062102. [DOI] [Google Scholar]
  • 10.Degorre J., Laplante S., Roland J. Simulating quantum correlations as a distributed sampling problem. Phys. Rev. A. 2005;72:062314. doi: 10.1103/PhysRevA.72.062314. [DOI] [Google Scholar]
  • 11.Shi Y., Zhu Y. Tensor norms and the classical communication complexity of nonlocal quantum measurement. SIAM J. Comput. 2008;38:753–766. doi: 10.1137/050644768. [DOI] [Google Scholar]
  • 12.Degorre J., Kaplan M., Laplante S., Roland J. The communication complexity of non-signaling distributions. In: Královič R., Niwiński D., editors. Proceedings of Mathematical Foundations of Computer Science. Springer; Berlin/Heidelberg, Germany: 2009. pp. 270–281. [Google Scholar]
  • 13.Regev O., Toner B. Simulating quantum correlations with finite communication. SIAM J. Comput. 2009;39:1562–1580. doi: 10.1137/080723909. [DOI] [Google Scholar]
  • 14.Vértesi T., Bene E. Lower bound on the communication cost of simulating bipartite quantum correlations. Phys. Rev. A. 2009;80:062316. doi: 10.1103/PhysRevA.80.062316. [DOI] [Google Scholar]
  • 15.Bancal J.-D., Branciard C., Gisin N. Simulation of equatorial von Neumann measurements on GHZ states using nonlocal resources. Adv. Math. Phys. 2010;2010:293245. doi: 10.1155/2010/293245. [DOI] [Google Scholar]
  • 16.Branciard C., Gisin N. Quantifying the nonlocality of Greenberger-Horne-Zeilinger quantum correlations by a bounded communication simulation protocol. Phys. Rev. Lett. 2011;107:020401. doi: 10.1103/PhysRevLett.107.020401. [DOI] [PubMed] [Google Scholar]
  • 17.Brassard G., Kaplan M. Simulating equatorial measurements on GHZ states with finite expected communication cost; Proceedings of the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography (TQC); Tokyo, Japan. 17–19 May 2012; pp. 65–73. [Google Scholar]
  • 18.von Neumann J. Various techniques used in connection with random digits. Monte Carlo Methods. Natl. Bur. Stand. 1951;12:36–38. [Google Scholar]
  • 19.Greenberger D.M., Horne M.A., Zeilinger A. Going beyond Bell’s theorem. In: Kafatos M., editor. Bell’s Theorem, Quantum Theory and Conceptions of the Universe. Kluwer Academic; Dordrecht, The Netherlands: 1989. pp. 69–72. [Google Scholar]
  • 20.Devroye L. Non-Uniform Random Variate Generation. Springer; New York, NY, USA: 1986. [Google Scholar]
  • 21.Knuth D.E., Yao A.C.-C. The complexity of nonuniform random number generation. In: Traub J.F., editor. Algorithms and Complexity: New Directions and Recent Results. Academic Press; New York, NY, USA: 1976. pp. 357–428. [Google Scholar]
  • 22.Holevo A.S. Statistical Structure of Quantum Theory. Springer; New York, NY, USA: 2001. [Google Scholar]
  • 23.Bell J.S. On the Einstein-Podolsky-Rosen paradox. Physics. 1964;1:195–200. doi: 10.1103/PhysicsPhysiqueFizika.1.195. [DOI] [Google Scholar]
  • 24.Horn R.A., Johnson C.R. Matrix Analysis. Cambridge University Press; Cambridge, UK: 2012. [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES