2025-11-12T15:52:09.916354

Quantum bounds for compiled XOR games and $d$-outcome CHSH games

Baroni, Vu, Bourdoncle et al.
Nonlocal games play a crucial role in quantum information theory and have numerous applications in certification and cryptographic protocols. Kalai et al. (STOC 2023) introduced a procedure to compile a nonlocal game into a single-prover interactive proof, using a quantum homomorphic encryption scheme, and showed that their compilation method preserves the classical bound of the game. Natarajan and Zhang (FOCS 2023) then showed that the quantum bound is preserved for the specific case of the CHSH game. Extending the proof techniques of Natarajan and Zhang, we show that the compilation procedure of Kalai et al. preserves the quantum bound for two classes of games: XOR games and d-outcome CHSH games. We also establish that, for any pair of qubit measurements, there exists an XOR game such that its optimal winning probability serves as a self-test for that particular pair of measurements.
academic

Quantum bounds for compiled XOR games and dd-outcome CHSH games

Basic Information

  • Paper ID: 2403.05502
  • Title: Quantum bounds for compiled XOR games and dd-outcome CHSH games
  • Authors: Matilde Baroni, Quoc-Huy Vu, Boris Bourdoncle, Eleni Diamanti, Damian Markham, Ivan Šupić
  • Classification: quant-ph (Quantum Physics)
  • Publication Date/Conference: Accepted in Quantum 2025-08-08
  • Paper Link: https://arxiv.org/abs/2403.05502

Abstract

Nonlocal games play a crucial role in quantum information theory with numerous applications in certification and cryptographic protocols. Kalai et al. (STOC 2023) introduced a procedure using quantum homomorphic encryption schemes to compile nonlocal games into single-prover interactive proofs and proved that their compilation method preserves the classical bounds of games. Natarajan and Zhang (FOCS 2023) subsequently proved that for the specific case of CHSH games, quantum bounds are preserved. This paper extends the proof techniques of Natarajan and Zhang, demonstrating that Kalai et al.'s compilation procedure preserves quantum bounds for two classes of games: XOR games and dd-outcome CHSH games. We further establish that for any pair of qubit measurements, there exists an XOR game whose optimal winning probability can serve as a self-test for that specific measurement pair.

Research Background and Motivation

Core Problem

The core problem addressed by this research is: How to convert Bell nonlocality certification tools, which require multiple spatially separated devices, into a single-device setting while preserving their quantum advantage.

Problem Significance

  1. Practical Requirements: Although Bell nonlocality provides information-theoretic security guarantees in theory, it requires at least two non-communicating parties to be spatially separated, which is experimentally challenging.
  2. Computational Platform Compatibility: Existing Bell-type scenarios are incompatible with quantum computing platforms because spatial separation and communication restrictions cannot be enforced on integrated devices.
  3. Broader Applicability of Certification Tools: Converting certification tools from multi-device to single-device settings would significantly enhance their applicability.

Limitations of Existing Methods

  1. Spatial Separation Requirements: Traditional Bell nonlocality requires physical spatial separation, limiting application scenarios.
  2. Limited Theoretical Results: Kalai et al.'s compilation method only proved preservation of classical bounds, lacking upper bounds for quantum bounds.
  3. Game-Specific Limitations: Natarajan and Zhang's results apply only to CHSH games, lacking generality.

Research Motivation

Utilize quantum homomorphic encryption (QHE) to simulate spatial separation by hiding complete input information, thereby compiling nonlocal games into single-prover interactive proofs, and prove that this compilation preserves quantum bounds.

Core Contributions

  1. Extended Quantum Bound Preservation Theorem: Proved that Kalai et al.'s compilation procedure preserves quantum bounds for XOR games and dd-outcome CHSH games, with error being a negligible function of the security parameter.
  2. Established Cryptographic SOS Decomposition Framework: Based on Natarajan and Zhang's techniques, developed cryptographic sum-of-squares (SOS) decomposition methods applicable to broader game categories.
  3. Achieved Computational Self-Testing:
    • Self-testing for arbitrary pairs of qubit measurements
    • Self-testing for three anticommuting qubit observables
  4. Provided New Theoretical Tools: Introduced pseudo-expectation maps that map polynomials of nonlocal observables to correlations observed in compiled games.

Methodology Details

Task Definition

Input: Nonlocal game G, quantum homomorphic encryption scheme QHE Output: Compiled single-prover interactive game G' Constraint: Preserve the quantum bounds of the original game, with error being a negligible function of security parameter κ.

Core Technical Framework

1. Compilation Protocol (KLVY Compilation)

For two-party nonlocal games:

  • First Round: Verifier sends encrypted question xˉ=Enc(x)\bar{x} = \text{Enc}(x) to prover, receives encrypted answer aˉ=Enc(a)\bar{a} = \text{Enc}(a)
  • Second Round: Verifier sends question yy in plaintext to prover, receives plaintext answer bb
  • Decision: Use predicate V(Dec(aˉ),bDec(xˉ),y)V(\text{Dec}(\bar{a}), b|\text{Dec}(\bar{x}), y) to determine win/loss

2. Pseudo-Expectation Map

Define linear operator E~\tilde{E} that maps homogeneous degree-2 polynomials of measurement observables to correlations in compiled games:

E~[AxBy]=Cx,y,E~[ByAx]=Cy,xT\tilde{E}[A_x B_y] = C_{x,y}, \quad \tilde{E}[B_y A_x] = C^T_{y,x}

E~[AxAx]=δx,x,E~[ByBy]=Sy,y\tilde{E}[A_x A_{x'}] = \delta_{x,x'}, \quad \tilde{E}[B_y B_{y'}] = S_{y,y'}

where the correlation matrix is defined as: C=x,yAx,ByxyC = \sum_{x,y} \langle A_x, B_y \rangle |x\rangle\langle y|

3. Cryptographic SOS Decomposition

For XOR games, utilizing the SOS decomposition in Theorem 1:

ξq1Bg=xλx2(AxyFxyBy)2+P({By}y)\xi_q 1 - B_g = \sum_x \frac{\lambda_x}{2}\left(A_x - \sum_y F_{xy}B_y\right)^2 + P(\{B_y\}_y)

Applying the pseudo-expectation map: E~[ξq1Bg]=xλx2E~[(AxyFxyBy)2]+E~[P({By}y)]\tilde{E}[\xi_q 1 - B_g] = \sum_x \frac{\lambda_x}{2}\tilde{E}\left[\left(A_x - \sum_y F_{xy}B_y\right)^2\right] + \tilde{E}[P(\{B_y\}_y)]

Key Lemmas

Lemma 8: For polynomials of the form Px=AxyFxyByP_x = A_x - \sum_y F_{xy}B_y, there exists a negligible function δQHE()\delta_{\text{QHE}}(\cdot) such that: E~[PxPx]δQHE(κ)\tilde{E}[P_x^\dagger P_x] \geq -\delta_{\text{QHE}}(\kappa)

Technical Innovations

  1. Special Form of SOS Decomposition: Proved that SOS decomposition for XOR games can be written such that each term contains only one Alice observable.
  2. Exploitation of Cryptographic Security: Cleverly utilized IND-CPA security of QHE to bound pseudo-expectation values.
  3. High-Dimensional Generalization: Extended the method to SATWAP inequalities for dd-outcome measurements.

Experimental Setup

Theoretical Verification Framework

This work is primarily theoretical, with results verified through mathematical proofs:

  1. XOR Game Class: Verified quantum bound preservation for all XOR games.
  2. d-CHSH Games: Verified quantum bound preservation for SATWAP inequalities.
  3. Self-Testing Protocols: Constructed specific compiled games implementing measurement self-testing.

Evaluation Criteria

  1. Quantum Bound Preservation: The difference between optimal quantum winning probability of compiled game and original game is only negl(κ)\text{negl}(\kappa).
  2. Self-Testing Robustness: Self-testing error bounds under noise and finite security parameters.
  3. Computational Efficiency: Quantum polynomial-time realizability of prover strategies.

Main Results

1. Quantum Bound Preservation for XOR Games (Theorem 3)

Result: Given an XOR game with optimal quantum bias ξq\xi_q, the compiled XOR game has optimal quantum bias ξq+δQHE(κ)\xi_q + \delta_{\text{QHE}}(\kappa), where δQHE()\delta_{\text{QHE}}(\cdot) is a negligible function.

2. dd-Dimensional SATWAP Inequality (Theorem 4)

Result: For dd-dimensional SATWAP Bell inequalities, if dd is polynomial in security parameter κ, then the quantum bound for the compiled SATWAP inequality is (βdSATWAP)q+θ(κ)(\beta^{\text{SATWAP}}_d)_q + \theta(\kappa), where θ()\theta(\cdot) is a negligible function.

3. Self-Testing for Arbitrary Two-Qubit Measurements

Result: For each pair of qubit observables, there exists an XOR game G such that any polynomial-time prover winning the compiled protocol G' with probability at least ωq(G)ϵ\omega_q(G) - \epsilon must implement measurement operators within O(ϵ,negl(κ))O(\sqrt{\epsilon}, \text{negl}(\kappa)) range, up to local isometry.

4. Self-Testing for Three Anticommuting Pauli Observables

Result: The compiled protocol based on the elegant Bell inequality can self-test three anticommuting Pauli measurements σx,σy,σz\sigma_x, \sigma_y, \sigma_z with error O(δ,negl(κ))O(\delta, \text{negl}(\kappa)).

Nonlocal Game Compilation

  1. Kalai et al. (2023): First proposed using QHE to compile nonlocal games, proved classical bound preservation.
  2. Natarajan and Zhang (2023): Proved quantum bound preservation for CHSH games.
  3. Brakerski et al. (2023): Quantum bound analysis for specific CHSH games.

Bell Nonlocality Applications

  1. Device-Independent Quantum Key Distribution: Secure key distribution based on Bell inequality violations.
  2. Certified Randomness: Authenticating true randomness using Bell nonlocality.
  3. Self-Testing: Certifying quantum devices through Bell inequality violations.

Quantum Homomorphic Encryption

  1. Mahadev (2018): First introduced quantum homomorphic encryption concept.
  2. Brakerski (2018): Improved noise-tolerant QHE schemes.

Conclusions and Discussion

Main Conclusions

  1. Extended Generality: Successfully extended quantum bound preservation results from single CHSH games to entire XOR game class and dd-outcome CHSH games.
  2. Computational Self-Testing Implementation: First achieved computational self-testing for arbitrary qubit measurement pairs in single-prover setting.
  3. Theoretical Framework: Established general mathematical framework for analyzing quantum bounds of compiled games.

Limitations

  1. SOS Decomposition Form Restrictions: Method applies only to games with specific SOS decomposition forms (each term contains only one Alice observable).
  2. Security Parameter Dependence: Result precision depends on security parameters of QHE schemes.
  3. Multi-Party Games: Not yet extended to nonlocal games with more than two parties.

Future Directions

  1. Universal Game Classes: Investigate whether compilation procedures preserve quantum bounds for all nonlocal games.
  2. Multi-Party Extension: Generalize methods to multi-party nonlocal games.
  3. Practical Applications: Implement and test compilation protocols on real quantum computing platforms.

In-Depth Evaluation

Strengths

  1. Theoretical Rigor: Complete mathematical proofs with clear technical roadmap.
  2. Practical Value: Addresses important practical problems in Bell nonlocality applications.
  3. Methodological Innovation: Cleverly combines cryptographic security with quantum information theory.
  4. Result Completeness: Not only proves quantum bound preservation but also achieves self-testing functionality.

Weaknesses

  1. Limited Scope: Method requires specific SOS decomposition forms, limiting generality.
  2. Lack of Experimental Verification: Absence of experimental verification on real quantum devices.
  3. Insufficient Efficiency Analysis: Computational complexity analysis of compilation protocol is not thorough.

Impact

  1. Theoretical Contribution: Provides new tools for cross-disciplinary research between quantum cryptography and complexity theory.
  2. Application Prospects: Opens new avenues for device certification on practical quantum computing platforms.
  3. Research Direction: Advances theoretical research on compiled quantum protocols.

Applicable Scenarios

  1. Quantum Device Certification: Certifying quantum device performance on integrated quantum computing platforms.
  2. Quantum Cryptographic Protocols: Designing quantum cryptographic schemes based on computational assumptions.
  3. Quantum Advantage Verification: Verifying quantum computational advantage in single-device environments.

References

  1. Kalai et al. "Quantum advantage from any non-local game." STOC 2023
  2. Natarajan and Zhang. "Bounding the quantum value of compiled nonlocal games: From CHSH to BQP verification." FOCS 2023
  3. Mahadev. "Classical homomorphic encryption for quantum circuits." FOCS 2018
  4. Brakerski. "Quantum FHE (almost) as secure as classical." CRYPTO 2018

This paper makes important contributions at the intersection of quantum information theory and cryptography. Through clever mathematical techniques, it converts multi-party quantum protocols into single-party protocols while preserving their quantum advantages, providing important theoretical foundations for practical quantum computing applications.