Monthly Archives: February 2021

Mutually unbiased bases and symmetric informationally complete measurements in Bell experiments – Science Advances

Posted: February 14, 2021 at 1:59 pm

INTRODUCTION

Measurements are crucial and compelling processes at the heart of quantum physics. Quantum measurements, in their diverse shapes and forms, constitute the bridge between the abstract formulation of quantum theory and concrete data produced in laboratories. Crucially, the quantum formalism of measurement processes gives rise to experimental statistics that elude classical models. Therefore, appropriate measurements are indispensable for harvesting and revealing quantum phenomena. Sophisticated manipulation of quantum measurements is both at the heart of the most well-known features of quantum theory such as contextuality (1) and the violation of Bell inequalities (2) as well as its most groundbreaking applications such as quantum cryptography (3) and quantum computation (4). In the broad landscape of quantum measurements (5), certain classes of measurements are outstanding because of their breadth of relevance in foundations of quantum theory and applications in quantum information processing.

Two widely celebrated, intensively studied, and broadly useful classes of measurements are known as mutually unbiased bases (MUBs) and symmetric informationally complete measurements (SICs). Two measurements are said to be mutually unbiased if by preparing any eigenstate of the first measurement and then performing the second measurement, one finds that all outcomes are equally likely (6). A typical example of MUBs corresponds to measuring two perpendicular components of the polarization of a photon. A SIC is a quantum measurement with the largest number of possible outcomes such that all measurement operators have equal magnitude overlaps (7, 8). Thus, the former is a relationship between two different measurements, whereas the latter is a relationship within a single measurement. Since MUBs and SICs are both conceptually natural, elegant, and (as it turns out) practically important classes of measurements, they are often studied in the same context (914). Let us briefly review their importance to foundational and applied aspects of quantum theory.

MUBs are central to the concept of complementarity in quantum theory, i.e., how the knowledge of one quantity limits (or erases) the knowledge of another quantity [see, e.g., (15) for a review of MUBs]. This is often highlighted through variants of the famous Stern-Gerlach experiment in which different Pauli observables are applied to a qubit. For instance, after first measuring (say) x, we know whether our system points up or down the x axis. If we then measure z, our knowledge of the outcome of yet another x measurement is entirely erased since z and x are MUBs. This phenomenon leads to an inherent uncertainty for the outcomes of MUB measurements on all quantum states, which can be formalized in terms of entropic quantities, leading to so-called entropic uncertainty relations. It is then natural that MUBs give rise to the strongest entropic uncertainties in quantum theory (16). Moreover, MUBs play a prominent role in quantum cryptography, where they are used in many of the most well-known quantum key distribution protocols (1721) and in secret sharing protocols (2224). Their appeal to cryptography stems from the idea that eavesdroppers who measure an eigenstate of one basis in another basis unbiased to it obtain no useful information, while they also induce a large disturbance in the state that allows their presence to be detected. Furthermore, complete (i.e., largest possible in a given dimension) sets of MUBs are tomographically complete, and their symmetric properties make them pivotal for quantum state tomography (25, 26). In addition, MUBs are useful for a range of other problems such as quantum random access coding (2731), quantum error correction (32, 33), and entanglement detection (34). This broad scope of relevance has motivated much effort toward determining the largest number of MUBs that exist in general Hilbert space dimensions (15).

The motivations behind the study of SICs are quite similar to the ones discussed for MUBs. It has been shown that SICs are natural measurements for quantum state tomography (35), which has also prompted several experimental realizations of SICs (3638). In addition, some protocols for quantum key distribution derive their success directly from the defining properties of SICs (39, 40), which have also been experimentally demonstrated (41). Furthermore, a key property of SICs is that they have the largest number of outcomes possible while still being extremal measurements, i.e., they cannot be simulated by stochastically implementing other measurements. This gives SICs a central role in a range of applications, which include random number generation from entangled qubits (42), certification of nonprojective measurements (4346), semidevice-independent self-testing (45), and entanglement detection (47, 48). Moreover, SICs have a key role in quantum Bayesianism (49), and they exhibit interesting connections to several areas of mathematics, for instance, Lie and Jordan algebras (50) and algebraic number theory (51). Because of their broad interest, much research effort has been directed toward proving the existence of SICs in all Hilbert space dimensions (presently known, at least, up to dimension 193) (7, 8, 5255). See, e.g., (54) for a recent review of SICs.

In this work, we broadly investigate MUBs and SICs in the context of Bell nonlocality experiments. In these experiments, two separated observers perform measurements on entangled quantum systems that can produce nonlocal correlations that elude any local hidden variable model (56). In recent years, Bell inequalities have played a key role in the rise of device-independent quantum information processing where they are used to certify properties of quantum systems. Naturally, certification of a physical property can be achieved under different assumptions of varying strength. Device-independent approaches offer the strongest form of certification since the only assumptions made are space-like separation and the validity of quantum theory. The advent of device-independent quantum information processing has revived interest in Bell inequalities, as these can now be tailored to the purpose of certifying useful resources for quantum information processing. The primary focus of such certification has been on various types of entangled states (57). However, quantum measurements are equally important building blocks for quantum information processing. Nevertheless, our understanding of which arrangements of high-dimensional measurements can be certified in a device-independent manner is highly limited. We speak of arrangements of measurements because for a single measurement (acting on a quantum system with no internal structure), no interesting property can be certified. The task becomes nontrivial when at least two measurements are present and we can certify the relation between them. The simplest approach relies on combining known self-testing results for two-qubit systems, which allows us to certify high-dimensional measurements constructed out of qubit building blocks (58, 59). Alternatively, device-independent certification of high-dimensional structures can be proven from scratch, but to the best of our knowledge, only two results of this type have been proven: (i) a triple of MUBs in dimension three (60) and (ii) the measurements conjectured to be optimal for the Collins-Gisin-Linden-Massar-Popescu Bell inequality (the former is a single result, while the latter is a family parameterized by the dimension d 2) (61). None of these results can be used to certify MUBs in dimension d 4.

Since mutual unbiasedness and symmetric informational completeness are natural and broadly important concepts in quantum theory, they are prime candidates of interest for such certification in general Hilbert space dimensions. This challenge is increasingly relevant because of the broader experimental advances toward high-dimensional systems along the frontier of quantum information theory. This is also reflected in the fact that recent experimental implementations of MUBs and SICs can go well beyond the few lowest Hilbert space dimensions (38, 41, 62).

Focusing on mutual unbiasedness and symmetric informational completeness, we solve the above challenges. To this end, we first construct Bell inequalities that are maximally violated using a maximally entangled state of local dimension d and, respectively, a pair of d-dimensional MUBs and a d-dimensional SIC. In the case of MUBs, we show that the maximal quantum violation of the proposed Bell inequality device independently certifies that the measurements satisfy an operational definition of mutual unbiasedness as well as that the shared state is essentially a maximally entangled state of local dimension d. Similarly, in the case of SICs, we find that the maximal quantum violation device independently certifies that the measurements satisfy an analogous operational definition of symmetric informational completeness. Moreover, we also show that our Bell inequalities are useful in two practically relevant tasks. For the case of MUBs, we consider a scheme for device-independent quantum key distribution and prove a key rate of log d bits, which is optimal for any protocol that extracts key from a d-outcome measurement. For SICs, we construct a scheme for device-independent random number generation. For two-dimensional SICs, we obtain the largest amount of randomness possible for any protocol based on qubits. For three-dimensional SICs, we obtain more randomness than can be obtained in any protocol based on projective measurements and quantum systems of dimension up to seven. For low dimensions, we numerically show that both protocols are robust to noise, which is imperative to any experiment. The implementation of these two protocols involves performing a Bell-type experiment, estimating the outcome statistics and computing the resulting Bell inequality violation. The efficiency and security of the protocol is then deduced only from the observed Bell inequality violation, i.e., it does not require a complete characterization of the devices. Device-independent protocols can, in principle, be implemented on any experimental platform suitable for Bell nonlocality experiments, such as entangled spins (63), entangled photons (64, 65), and entangled atoms (66).

The task of finding Bell inequalities that are maximally violated by MUBs for d 3 has been attempted several times (6770) but with limited success. The only convincing candidate is the inequality corresponding to d = 3 studied in (67), and even then, there is only numerical evidence (no analytical proof is known). Some progress has been made in (60), which considers the case of prime d and proposes a family of Bell inequalities maximally violated by a specific set of d MUBs in dimension d. These inequalities, however, have two drawbacks: (i) There is no generalization to the case of nonprime d, and (ii) even for the case of prime d, we have no characterization of the quantum realizations that achieve the maximal violation.

In this work, we present a family of Bell inequalities in which the maximal quantum violation is achieved with a maximally entangled state and any pair of d-dimensional MUBs. These Bell inequalities have been constructed so that their maximal quantum violation can be computed analytically, which then enables us to obtain a detailed characterization of the optimal realizations. As a result we find a previously unidentified, intermediate form of device-independent certification.

We formally define a pair of MUBs as two orthonormal bases on a d-dimensional Hilbert space d, namely, {ej}j=1d and {fk}k=1d, with the property thatejfk2=1d(1)for all j and k. The constant on the right-hand side is merely a consequence of the two bases being normalized. To this end, consider a bipartite Bell scenario parameterized by an integer d 2. Alice randomly receives one of d2 possible inputs labeled by x x1x2 [d]2 (where [s] {1, , s}) and produces a ternary output labeled by a {1,2, }. Bob receives a random binary input labeled by y {1,2} and produces a d-valued output labeled by b [d]. The joint probability distribution in the Bell scenario is denoted by p(a, bx, y), and the scenario is illustrated in Fig. 1.

Alice receives one of d2 inputs and produces a ternary output, while Bob receives a binary input and produces a d-valued output.

To make our choice of Bell functional transparent, we will phrase it as a game in which Alice and Bob collectively win or lose points. If Alice outputs a = , then no points will be won or lost. If she outputs a {1,2}, then points will be won or lost if b = xy. More specifically, Alice and Bob win a point if a = y and lose a point if a=y, where the bar sign flips the value of y {1,2}. This leads to the scoreRdMUBx,yp(a=y,b=xyx,y)p(a=y,b=xyx,y)(2)where the sum goes over x = x1x2 [d]2 and y {1,2}.

At this point, the outcome a = might seem artificial, so let us show why it plays a crucial role in the construction of the game. To this end, we use intuition based on the hypothetical case in which Alice and Bob share a maximally entangled statedmax=1dk=1dk,k(3)

The reason that we consider the maximally entangled state is that we aim to tailor the Bell inequalities so that this state is optimal. Then, we would like to ensure that Alice, via her measurement and for her outcomes a {1,2}, remotely prepares Bob in a pure state. This would allow Bob to create stronger correlations as compared to the case of Alice remotely preparing his system is a mixed state. Hence, this corresponds to Alices outcomes a {1,2} being represented by rank-one projectors. Since the subsystems of dmax are maximally mixed, it follows that (a = 1x) = p(a = 2x) = 1/d x. Thus, we want to motivate Alice to use a strategy in which she outputs a = with probability p(a = x) = 1 2/d. Our tool for this purpose is to introduce a penalty. Specifically, whenever Alice decides to output a {1,2}, she is penalized by losing d points. Thus, the total score (the Bell functional) readsSdMUBRdMUBdx(p(a=1x)+p(a=2x))(4)

Now, outputting a {1,2} not only contributes toward RdMUB but also causes a penalty d. Therefore, we expect to see a trade-off between d and the rate at which Alice outputs a = . We must suitably choose d such that Alices best strategy is to output a = with (on average over x) the desired probability p(a = x) = 1 2/d. This accounts for the intuition that leads us to the following Bell inequalities for MUBs.

Theorem II.1 (Bell inequalities for MUBs). The Bell functional SdMUB in Eq. 4 withd=12d1d(5)obeys the tight local boundSdMUBLHV2(d1)(112d1d)(6)and the quantum boundSdMUBQd(d1)(7)

Moreover, the quantum bound can be saturated by sharing a maximally entangled state of local dimension d and Bob performing measurements in any two MUBs.

Proof. A complete proof is presented in the Supplementary Materials (section S1A). The essential ingredient to obtain the bound in Eq. 7 is the Cauchy-Schwarz inequality. Furthermore, for local models, by inspecting the symmetries of the Bell functional SdMUB, one finds that the local bound can be attained by Bob always outputting b = 1. This greatly simplifies the evaluation of the bound in Eq. 6.

To see that the bound in Eq. 7 can be saturated in quantum theory, let us evaluate the Bell functional for a particular quantum realization. Let be the shared state, {Px1}x1=1d and {Qx2}x2=1d be the measurement operators of Bob corresponding to y = 1 and y = 2, respectively, and Ax be the observable of Alice defined as the difference between Alices outcome-one and outcome-two measurement operators, i.e., Ax=Ax1Ax2. Then, the Bell functional readsSdMUB=xAx(Px1Qx2)d(Ax1+Ax2)1(8)

Now, we choose the maximally entangled state of local dimension d, i.e., =dmax, and define Bobs measurements as rank-one projectors Px1 = x1x1 and Qx2 = x2x2, which correspond to MUBs, i.e., x1x22 = 1/d. Last, we choose Alices observables as Ax=d/(d1)(Px1Qx2)T, where the prefactor ensures the correct normalization and T denotes the transpose in the standard basis. Note that Ax is a rank-two operator; the corresponding measurement operator Ax1 (Ax2) is a rank-one projector onto the eigenvector of Ax associated to the positive (negative) eigenvalue. Since the subsystems of dmax are maximally mixed, this implies dmax(Ax1+Ax2)1dmax=2/d. Inserting all this into the above quantum model and exploiting the fact that for any linear operator O, we have O1dmax=1OTdmax, we straightforwardly saturate the bound in Eq. 7.

We remark that for the case of d = 2 one could also choose 2 = 0 and retain the property that qubit MUBs are optimal. In this case, the marginal term is not necessary because in the optimal realization, Alice never outputs . Then, the quantum bound becomes 22, and the local bound becomes 2. The resulting Bell inequality resembles the Clauser-Horne-Shimony-Holt (CHSH) inequality (71) not only because it gives the same local and quantum values but also because the optimal realizations coincide. More specifically, the measurements of Bob are precisely the optimal CHSH measurements, whereas the four measurements of Alice correspond to two pairs of optimal CHSH measurements.

Theorem II establishes that a pair of MUBs of any dimension can generate a maximal quantum violation in a Bell inequality test. We now turn to the converse matter, namely, that of device-independent certification. Specifically, given that we observe the maximal quantum violation, i.e., equality in Eq. 7, what can be said about the shared state and the measurements? Since the measurement operators can only be characterized on the support of the state, to simplify the notation, let us assume that the marginal states of Alice and Bob are full rank. (Note that this is not a physical assumption but a mathematical convention that simplifies the notation in the rest of this work. Whenever the marginal state is not full rank, the local Hilbert space naturally decomposes as a direct sum of two terms, where the state is only supported on one of them. The measurement operators can only be characterized on the support of the state, and that is precisely what we achieve. This convention allows us to only write out the part that can be characterized and leave out the rest.)

Theorem II.2 (Device-independent certification). The maximal quantum value of the Bell functional SdMUB in Eq. 4 implies that (i) there exist local isometries that allow Alice and Bob to extract a maximally entangled state of local dimension d, and (i) if the marginal state of Bob is full rank, the two d-outcome measurements that he performs satisfy the relationsPa=dPaQbPaandQb=dQbPaQb(9)for all a and b.

Proof. The proof is detailed in the Supplementary Materials (section S1A). Here, we briefly summarize the part concerning Bobs measurements. Since the Cauchy-Schwarz inequality is the main tool for proving the quantum bound in Eq. 7, saturating it implies that the Cauchy-Schwarz inequality is also saturated. This allows us to deduce that the measurements of Bob are projective, and moreover, we obtain the following optimality conditionAx1=1dd1(Px1Qx2)(10)for all x1, x2 [d] where the factor d/(d1) can be regarded as a normalization. Since we do not attempt to certify the measurements of Alice, we can, without loss of generality, assume that they are projective. This implies that the spectrum of Ax only contains { + 1, 1,0} and therefore (Ax)3 = Ax. This allows us to obtain a relation that only contains Bobs operators. Tracing out Alices system and subsequently eliminating the marginal state of Bob (it is assumed to be full rank) leads toPx1Qx2=dd1(Px1Qx2)3(11)

Expanding this relation and then using projectivity and the completeness of measurements, one recovers the result in Eq. 9.

We have shown that observing the maximal quantum value of SdMUB implies that the measurements of Bob satisfy the relations given in Eq. 9. It is natural to ask whether a stronger conclusion can be derived, but the answer turns out to be negative. In the Supplementary Materials (section S1B), we show that any pair of d-outcome measurements (acting on a finite-dimensional Hilbert space) satisfying the relations in Eq. 9 is capable of generating the maximal Bell inequality violation. For d = 2,3, the relations given in Eq. 9 imply that the unknown measurements correspond to a direct sum of MUBs (see section S2C) and since, in these dimensions, there exists only a single pair of MUBs (up to unitaries and complex conjugation), our results imply a self-testing statement of the usual kind. However, since, in higher dimensions, not all pairs of MUBs are equivalent (72), our certification statement is less informative than the usual formulation of self-testing. In other words, our inequalities allow us to self-test the quantum state, but we cannot completely determine the measurements [see (73, 74) for related results]. Note that we could also conduct a device-independent characterization of the measurements of Alice. Equation 61 from the Supplementary Materials enables us to relate the measurements of Alice to the measurements of Bob, which we have already characterized. However, since we do not expect the observables of Alice to satisfy any simple algebraic relations and since they are not directly relevant for the scope of this work (namely, MUBs and SICs), we do not pursue this direction.

The certification provided in Theorem II.2 turns out to be sufficient to determine all the probabilities p(a, b x, y) that arise in the Bell experiment (see section S1C), which means that the maximal quantum value of SdMUB is achieved by a single probability distribution. Because of the existence of inequivalent pairs of MUBs in certain dimensions (e.g., for d = 4), this constitutes the first example of an extremal point of the quantum set, which admits inequivalent quantum realizations. Recall that the notion of equivalence that we use is precisely the one that appears in the context of self-testing, i.e., we allow for additional degrees of freedom, local isometries, and a transposition.

It is important to understand the relation between the condition given in Eq. 9 and the concept of MUBs. Naturally, if {Pa}a=1d and {Qb}b=1d are d-dimensional MUBs, then the relations (Eq. 9) are satisfied. However, there exist solutions to Eq. 9 that are neither MUBs nor direct sums thereof. While, as mentioned above, for d = 2,3, one can show that any measurements satisfying the relations (Eq. 9) must correspond to a direct sum of MUBs, this is not true in general. For d = 4,5, we have found explicit examples of measurement operators satisfying Eq. 9, which cannot be written as a direct sum of MUBs. They cannot even be transformed into a pair of MUBs via a completely positive unital map (see section S2 for details). These results beg the crucial question: How should one interpret the condition given in Eq. 9?

To answer this question, we resort to an operational formulation of what it means for two measurements to be mutually unbiased. An operational approach must rely on observable quantities (i.e., probabilities), as opposed to algebraic relations between vectors or operators. This notion, which we refer to as mutually unbiased measurements (MUMs), was recently formalized by Tasca et al. (75). Note that in what follows, we use the term eigenvector to refer to eigenvectors corresponding to nonzero eigenvalues.

Definition II.3 (MUMs). We say that two n-outcome measurements {Pa}a=1n and {Qb}b=1n are mutually unbiased if they are projective and the following implications holdPa=1Qb=1nQb=1Pa=1n(12)for all a and b. That is, two projective measurements are mutually unbiased if the eigenvectors of one measurement give rise to a uniform outcome distribution for the other measurement.

Note that this definition precisely captures the intuition behind MUBs without the need to specify the dimension of the underlying Hilbert space. MUMs admit a simple algebraic characterization.

Theorem II.4. Two n-outcome measurements {Pa}a=1n and {Qb}b=1n are mutually unbiased if and only ifPa=nPaQbPaandQb=nQbPaQb(13)for all a and b.

Proof. Let us first assume that the algebraic relations hold. By summing over the middle index, one finds that both measurements are projective. Moreover, if is an eigenvector of Pa, then Qb=PaQbPa=1nPa=1n

By symmetry, the analogous property holds if is an eigenvector of Qb. Conversely, let us show that MUMs must satisfy the above algebraic relations. Since aPa=1, we can choose an orthonormal basis of the Hilbert space composed only of the eigenvectors of the measurement operators. Let {eja}a,j be an orthonormal basis, where a [n] tells us which projector the eigenvector corresponds to and j labels the eigenvectors within a fixed projector (if Pa has finite rank, then j [tr Pa]; otherwise, j ). By construction, for such a basis, we have

Paeja=aaeja. To show that Pa = nPaQbPa, it suffices to show that the two operators have the same coefficients in this basis. SinceejanPaQbPaeka=naaaaejaQbeka(14)ejaPaeka=aaaajk(15)it suffices to show that nejaQbeka=jk. For j = k, this is a direct consequence of the definition in Eq. 12. To prove the other case, define =(eja+eieka)/2, for [0,2). Since Pa = , we have Qb = 1/n. Writing this equality out gives1n=12(2n+eiejaQbeka+eiekaQbeja)(16)

Choosing = 0 implies that the real part of ejaQbeka vanishes, while = /2 implies that the imaginary part vanishes. Proving the relation Qb = nQbPaQb proceeds in an analogous fashion.

Theorem II.4 implies that the maximal violation of the Bell inequality for MUBs certifies precisely the fact the Bobs measurements are mutually unbiased. To provide further evidence that MUMs constitute the correct device-independent generalization of MUBs, we give two specific situations in which the two objects behave in the same manner.

Maassen and Uffink (16) considered a scenario in which two measurements (with a finite number of outcomes) are performed on an unknown state. Their famous uncertainty relation provides a state-independent lower bound on the sum of the Shannon entropies of the resulting distributions. While the original result only applies to rank-one projective measurements, a generalization to nonprojective measurements reads (76)H(P)+H(Q)logc(17)where H denotes the Shannon entropy and c=maxa,bPaQb2, where is the operator norm. If we restrict ourselves to rank-one projective measurements on a Hilbert space of dimension d, then one finds that the largest uncertainty, corresponding to c = 1/d, is obtained only by MUBs. It turns out that precisely the same value is achieved by any pair of MUMs with d outcomes regardless of the dimension of the Hilbert spacec=maxa,bPaQb2=maxa,bPaQb2=maxa,bPaQbPa=maxaPa/d=1d(18)

A closely related concept is that of measurement incompatibility, which captures the phenomenon that two measurements cannot be performed simultaneously on a single copy of a system. The extent to which two measurements are incompatible can be quantified, e.g., by so-called incompatibility robustness measures (77). In the Supplementary Materials (section S2D), we show that according to these measures, MUMs are exactly as incompatible as MUBs. Moreover, we can show that for the so-called generalized incompatibility robustness (78), MUMs are among the most incompatible pairs of d-outcome measurements.

The fact that the maximal quantum violation of the Bell inequalities introduced above requires a maximally entangled state and MUMs and, moreover, that it is achieved by a unique probability distribution suggests that these inequalities might be useful for device-independent quantum information processing. In the task of quantum key distribution (3, 17, 18), Alice and Bob aim to establish a shared dataset (a key) that is secure against a malicious eavesdropper. Such a task requires the use of incompatible measurements, and MUBs in dimension d = 2 constitute the most popular choice. Since, in the ideal case, the measurement outcomes of Alice and Bob that contribute to the key should be perfectly correlated, most protocols are based on maximally entangled states. In the device-independent approach to quantum key distribution, the amount of key and its security is deduced from the observed Bell inequality violation.

We present a proof-of-principle application to device-independent quantum key distribution based on the quantum nonlocality witnessed through the Bell functional in Eq. 4. In the ideal case, Alice and Bob follow the strategy that gives them the maximal violation, i.e., they share a maximally entangled state of local dimension d and Bob measures two MUBs. To generate the key, we provide Alice with an extra setting that produces outcomes that are perfectly correlated with the outcomes of the first setting of Bob. This will be the only pair of settings from which the raw key will be extracted, and let us denote them by x = x* and y = y* = 1. In most rounds of the experiment, Alice and Bob choose these settings and therefore contribute toward the raw key. However, to ensure security, a small number of rounds is used to evaluate the Bell functional. In these rounds, which are chosen at random, Alice and Bob randomly choose their measurement settings. Once the experiment is complete, the resulting value of the Bell functional is used to infer the amount of secure raw key shared between Alice and Bob. The raw key can then be turned into the final key by standard classical postprocessing. For simplicity, we consider only individual attacks, and moreover, we focus on the limit of asymptotically many rounds in which fluctuations due to finite statistics can be neglected.

The key rate, K, can be lower bounded by (79)Klog(Pg)H(By*Ax*)(19)where Pg denotes the highest probability that the eavesdropper can correctly guess Bobs outcome when his setting is y* given that the Bell inequality value was observed, and H( ) denotes the conditional Shannon entropy. The guessing probability Pg is defined asPgsup{c=1dABE1PcEcABE}(20)where {Ec}c=1d is the measurement used by the eavesdropper to produce her guess, the expression inside the curly braces is the probability that her outcome is the same as Bobs for a particular realization, and the supremum is taken over all quantum realizations (the tripartite state and measurements of all three parties) compatible with the observed Bell inequality value .

Let us first focus on the key rate in a noise-free scenario, i.e., in a scenario in which SdMUB attains its maximal value. Then, one straightforwardly arrives at the following result.

Theorem II.5 (Device-independent key rate). In the noiseless case, the quantum key distribution protocol based on SdMUB achieves the key rate ofK=logd(21)for any integer d 2.

Proof. In the noiseless case, Alice and Bob observe exactly the correlations predicted by the ideal setup. In this case, the outcomes for settings (x*, y*) are perfectly correlated, which implies that H(By*Ax*) = 0. Therefore, the only nontrivial task is to bound the guessing probability.

Since the actions of the eavesdropper commute with the actions of Alice and Bob, we can assume that she performs her measurement first. If the probability of the eavesdropper observing outcome c [d], which we denote by p(c), is nonzero, then the (normalized) state of Alice and Bob conditioned on the eavesdropper observing that outcome is given byAB(c)=1p(c)trC[(11Ec)ABEABE](22)

Now, Alice and Bob share one of the postmeasurement states AB(c), and when they perform their Bell inequality test, they will obtain different distributions depending on c, which we write as pc(a, b x, y). However, since the statistics achieve the maximal quantum value of SdMUB and we have previously shown that the maximal quantum value is achieved by a single probability point, all the probability distributions pc(a, b x, y) must be the same. Moreover, we have shown that for this probability point, the marginal distribution of outcomes on Bobs side is uniform over [d] for both inputs. This implies thatPg=c=1dp(c)pc(b=cy=1)=1d(23)because pc(b=cy=1)=p(b=cy=1)=1d for all c.

We remark that the argument above is a direct consequence of a more general result that states that if a bipartite probability distribution is a nonlocal extremal point of the quantum set, then no external party can be correlated with the outcomes (80). The obtained key rate is the largest possible for general setups in which the key is generated from a d-outcome measurement. In addition, the key rate is optimal for all protocols based on a pair of entangled d-dimensional systems subject to projective measurements. This follows from the fact that projective measurements in d cannot have more than d outcomes. It has recently been shown that the same amount of randomness can be generated using a modified version of the Collins-Gisin-Linden-Massar-Popescu inequalities (61), but note that the measurements used there do not correspond to MUBs (except for the special case of d = 2).

Let us now depart from the noise-free case and estimate the key rate in the presence of noise. To ensure that both the guessing probability and the conditional Shannon entropy can be computed in terms of a single noise parameter, we have to introduce an explicit noise model. We use the standard approach in which the measurements remain unchanged, while the maximally entangled state is replaced with an isotropic state given byv=vdmaxdmax+1vd21(24)where v [0,1] is the visibility of the state. Using this state and the ideal measurements for Alice and Bob, the relation between v and SdMUB can be easily derived from Eq. 8, namelyv=12(1+SdMUBd(d1))(25)

Using this formula, we also obtain the value of H(By* Ax*) as a function of the Bell violation. The remaining part of Eq. 19 is the guessing probability (Eq. 20). In the case of d = 3, we proceed to bound this quantity through semidefinite programming.

Concretely, we implement the three-party semidefinite relaxation (81) of the set of quantum correlations at local level 1 (we attribute one operator to each outcome of Bob and the eavesdropper but only take into account the first two outcomes of Alice). This results in a moment matrix of size 532 532 with 15,617 variables. The guessing probability is directly given by the sum of three elements of the moment matrix. It can then be maximized under the constraints that the value of the Bell functional S3MUB is fixed and the moment matrix is positive semidefinite. However, we notice that this problem is invariant under the following relabeling: b (b) for y = 1, c (c), and x1 (x1), where S3 is a permutation of three elements. Therefore, it is possible to simplify this semidefinite program by requiring the matrix to be invariant under the group action of S3 on the moment matrix (i.e., it is a Reynolds matrix) (43, 82, 83). This reduces the number of free variables in the moment matrix to 2823. With the Self-Dual Minimization (SeDuMi) (84) solver, this lowers the precision (1.1 106 instead of 8.4 108) but speeds up the computation (155 s instead of 8928 s) and requires less memory (0.1 gigabytes instead of 5.5 gigabytes). For the maximal value of SdMUB, we recover the noise-free result of K = log 3 up to the fifth digit. In addition, we have a key rate of at least one bit when SdMUB2.432 and a nonzero key rate when SdMUB2.375. The latter is close to the local bound, which is SdMUB2.367. The resulting lower bound on the key rate as a function of the Bell inequality violation is plotted in Fig. 2.

We now shift our focus from MUBs to SICs. We construct Bell inequalities whose maximal quantum violations are achieved with SICs. We formally define a SIC as a set of d2 unit vectors in d, namely, {rj}j=1d2, with the property thatrjrk2=1d+1(26)for all j k, where the constant on the right-hand side is fixed by normalization. The reason for there being precisely d2 elements in a SIC is that this is the largest number of unit vectors in d that could possibly admit the uniform overlap property (Eq. 26). Moreover, we formally distinguish between a SIC as the presented set of rank-one projectors and a SIC-POVM (positive operator-valued measure), which is the generalized quantum measurement with d2 possible outcomes corresponding to the subnormalized projectors {1drkrk}k=1d2.

Since the treatment of SICs in Bell nonlocality turns out to be more challenging than for the case of MUBs, we first establish the relevance of SICs in a simplified Bell scenario subject to additional constraints. This serves as a stepping stone to a subsequent relaxation, which gives a standard (unconstrained) Bell inequality for SICs. We then focus on the device-independent certification power of these inequalities, which leads us to an operational notion of symmetric informational completeness. Last, we extend the Bell inequalities so that their maximal quantum violations are achieved with both projectors forming SICs and a single generalized measurement corresponding to a SIC-POVM.

Stepping stone: Quantum correlations for SICs. Consider a Bell scenario, parameterized by an integer d 2, involving two parties Alice and Bob who share a physical system. Alice receives an input labeled by a tuple (x1, x2) representing one of (d22) possible inputs, which we collectively refer to as x = x1x2. The tuple is randomly taken from the set Pairs(d2) {x x1, x2 [d2] and x1 < x2}. Alice performs a measurement on her part of the shared system and produces a ternary output labeled by a {1,2, }. Bob receives an input labeled by y [d2], and the associated measurement produces a binary outcome labeled by b {1, }. The joint probability distribution is denoted by p(a, b x, y), and the Bell scenario is illustrated in Fig. 3.

Alice receives one of (d22) inputs and returns a ternary outcome, while Bob receives one of d2 inputs and returns a binary outcome.

Similar to the case of MUBs, to make our choice of Bell functional transparent, we phrase it as a game played by Alice and Bob. We imagine that their inputs are supplied by a referee, who promises to provide x = x1x2 and y such that either y = x1 or y = x2. Similar to the previous game, Alice can output a = to ensure that no points are won or lost. However, in this game also, Bob can ensure that no points are won or lost by outputting b = . If neither of them outputs , then a point is either won or lost. Specifically, when a = 1, a point is won if y = x1 (and lost otherwise), whereas if a = 2, then a point is won if y = x2 (and lost otherwise). Let us remark that in this game, Bobs only role is to decide whether, in a given round, points can be won/lost or not. For this game, the total number of points (the Bell functional) readsRdSICx1

Let us now impose additional constraints on the marginal distributions of the outputs. More specifically, we require thatx:p(a=1x)+p(a=2x)=2dy:p(b=1y)=1d(28)

The intuition behind these constraints is analogous to that discussed for the case of MUBs. Namely, we imagine that Alice and Bob perform measurements on a maximally entangled state of local dimension d. Then, we wish to fix the marginals such that the measurements of Alice (Bob) for the outcomes a {1,2} (b = 1) remotely prepare Bobs (Alices) subsystem in a pure state. This corresponds to the marginals p(a = 1 x) = p(a = 2 x) = p(b = 1 x) = 1/d, which is reflected in the marginal constraints in Eq. 28. We remark that imposing these constraints simplifies both the intuitive understanding of the game and the derivation of the results below. However, it merely serves as a stepping stone to a more general subsequent treatment in which the constraints (Eq. 28) will be removed.

To write the value of the Bell functional of a quantum realization, let us introduce two simplifications. The measurement operators of Alice are denoted by {Axa}, and as before, it is convenient to work with the observables defined as Ax=Ax1Ax2. The measurements of Bob are denoted by {Byb}, but since they only have two outcomes, all the expressions can be written in terms of a single operator from each input y. In our case, it is convenient to use the outcome-one operator, and for convenience, we will skip the superscript,, i.e., we will write ByBy1 for all y. Then, the Bell functional evaluated on a specific quantum realization readsRdSIC=x1

Note that the Bell functional, in particular, when written in a quantum model, is much reminiscent of the expression RdMUB (Eq. 2) encountered for MUBs, with the key difference that the roles of the inputs and outputs of Bob are swapped. Let us consider a quantum strategy in which Alice and Bob share a maximally entangled state dmax. Moreover, Bobs measurements are defined as By = yy, where {y}y=1d2 is a set of unit vectors forming a SIC (assuming it exists in dimension d), i.e., y y2 = 1/(d + 1) for all y y. In addition, we define Alices observables as Ax=(d+1)/d(Bx1Bx2)T, where the prefactor ensures normalization. First, since the subsystems of Alice and Bob are maximally mixed and the outcomes a {1,2} and b = 1 each correspond to rank-one projectors, the marginal constraints in Eq. 28 are satisfied. Using the fact that for any linear operator O we have O1dmax=1OTdmax, we find thatRdSIC=d+1dx1

This strategy relying on a maximally entangled state and a SIC achieves the maximal quantum value of RdSIC under the constraints of Eq. 28. In the Supplementary Materials (section S3A), we prove that under these constraints, the tight quantum and no-signaling bounds on RdSIC readRdSICQd(d1)d(d+1)(31)RdSICNSd(d21)(32)

We remark that SICs are not known to exist in all Hilbert space dimensions. However, their existence in all dimensions is strongly conjectured, and explicit SICs have been found in all dimensions up to 193 (5355).

Bell inequalities for SICs. The marginal constraints in Eq. 28 allowed us to prove that the quantum realization based on SICs achieves the maximal quantum value of RdSIC. Our goal now is to remove these constraints to obtain a standard Bell functional. Analogously to the case of MUBs, we add marginal terms to the original functional RdSIC.

To this end, we introduce penalties for both Alice and Bob. Specifically, if Alice outputs a {1,2}, then they lose d points, whereas if Bob outputs b = 1, then they lose d points. The total number of points in the modified game constitutes our final Bell functionalSdSICRdSICdx1

Hence, our aim is to suitably choose the penalties d and d so that the maximal quantum value of SdSIC is achieved with a strategy that closely mimics the marginal constraints (Eq. 28) and thus maintains the optimality of Bob performing a SIC.

Theorem II.6 (Bell inequalities for SICs). The Bell functional SdSIC in Eq. 33 withd=1d,22dd+1d=d22d(d+1)(34)obeys the tight local boundSdSICLHV{4ford=2d2(d1)d(d2d1)dd+1ford3(35)and the quantum boundSdSICQd+2d,22d(d+1)(36)

Moreover, the quantum bound is tight and can be saturated by sharing a maximally entangled state of local dimension d and choosing Bobs outcome-one projectors to form a SIC.

Proof. The proof is presented in the Supplementary Materials (section S3B). To obtain the quantum bound in Eq. 36, the key ingredients are the Cauchy-Schwarz inequality and semidefinite relaxations of polynomial optimization problems. To derive the local bound in Eq. 35, the key observation is that the symmetries of the Bell functional allow us to notably simplify the problem.

The fact that the quantum bound is saturated by a maximally entangled state and Bob performing a SIC can be seen immediately from the previous discussion that led to Eq. 30. With that strategy, we find RdSIC=d(d1)d(d+1). Since it also respects (a = 1x) + p(a = 2x) = 2/d x, as well as p(b = 1y) = 1/d y, a direct insertion into Eq. 33 saturates the bound in Eq. 36. Note that in the limit of d both the local bound and the quantum bound grow quadratically in d.

We remark that for the special case of d = 2, no penalties are needed to maintain the optimality of SICs (which is why the Kronecker delta appears in Eq. 34). The derived Bell inequality for a qubit SIC (which corresponds to a tetrahedron configuration on the Bloch sphere) can be compared to the so-called elegant Bell inequality (85) whose maximal violation is also achieved using the tetrahedron configuration. While we require six settings of Alice and four settings of Bob, the elegant Bell inequality requires only four settings of Alice and three settings of Bob. However, the additional complexity in our setup carries an advantage when considering the critical visibility of the shared state, i.e., the smallest value of v in Eq. 24 (defining an isotropic state) for which the Bell inequality is violated. The critical visibility for violating the elegant Bell inequality is 86.6%, whereas for our Bell inequality, it is lowered to 81.6%. We remark that on the Bloch sphere, the antipodal points corresponding to the four measurements of Alice and the six measurements of Bob form a cube and a cuboctahedron, respectively, which constitutes an instance of the type of Bell inequalities proposed in (86).

Device-independent certification. Theorem II.6 shows that for any dimension d 2, we can construct a Bell inequality that is maximally violated by a SIC in that dimension (provided that a SIC exists). Let us now consider the converse question, namely, that of device-independent certification. In analogy with the case of MUBs (Eq. 9), we find a simple description of Bobs measurements.

Theorem II.7 (Device-independent certification). The maximal quantum value of the Bell functional SdSIC, provided that the marginal state of Bob is full rank, implies that his measurement operators {By}y=1d2 are projective and satisfyyBy=d1(37)andBy=(d+1)ByByBy(38)for all y y.

A complete proof, which is similar in spirit to the proof of Theorem II.2, can be found in the Supplementary Materials (section S3C). For the special case of d = 2, the conclusion can be made even more accurate: The maximal quantum violation of S2SIC implies that Bobs outcome-one projectors are rank-one projectors acting on a qubit whose Bloch vectors form a regular tetrahedron (up to the three standard equivalences used in self-testing).

Similar to the case of MUBs, we face the key question of interpreting the condition in Eq. 38 and its relation to SICs. Again, in analogy with the case of MUBs, we note that the concept of a SIC references the dimension of the Hilbert space, which should not appear explicitly in a device-independent scenario. Hence, we consider an operational approach to SICs, which must rely on observable quantities (i.e., probabilities). This leads us to the following natural definition of a set of projectors being operationally symmetric informationally complete (OP-SIC).

Definition II.8 (Operational SIC). We say that a set of projectors {Ba}a=1n2 is OP-SIC ifaBa=n1(39)andBa=1Bb=1n+1(40)for all a b.

This definition trivially encompasses SICs as special instances of OP-SICs. An argument analogous to the proof of Theorem II.4 shows that this definition is in fact equivalent to the relations given in Eqs. 37 and 38. Hence, in analogy with the case of MUBs, the property of Bobs measurements certified by the maximal violation of our Bell inequality is precisely the notion of OP-SICs.

Adding a SIC-POVM. The Bell inequalities proposed above (Bell functional SdSIC) are tailored to sets of rank-one projectors forming a SIC. However, it is also interesting to consider a closely related entity, namely, a SIC-POVM, which is obtained simply by normalizing these projectors, so that they can be collectively interpreted as arising from a single measurement. That is, a SIC-POVM on d is a measurement {Ea}a=1d2 in which every measurement operator can be written as Ea=1daa, where the set of rank-one projectors { aa }a forms a SIC. Because of the simple relation between SICs and SIC-POVMs, we can extend the Bell inequalities for SICs proposed above such that they are optimally implemented with both a SIC (as before) and a SIC-POVM.

It is clear that to make SIC-POVMs relevant to the Bell experiment, it must involve at least one setting that corresponds to a d2-outcome measurement. For the Bell scenario previously considered for SICs (see Fig. 3), no such measurement is present. Therefore, we supplement the original Bell scenario by introducing a single additional measurement setting of Alice, labeled by povm, which has d2 outcomes labeled by a [d2]. The modified Bell scenario is illustrated in Fig. 4. We construct the Bell functional TdSIC for this scenario by modifying the previously considered Bell functional SdSICTdSIC=SdSICy=1d2p(a=y,b=povm,y)(41)

This scenario modifies the original Bell scenario for SICs (see Fig. 3) by supplying Alice with an extra setting labeled by povm, which has d2 possible outcomes.

Hence, whenever Bob outputs and the outcome associated to the setting povm coincides with the input of Bob, a point is lost. Evidently, the largest quantum value of TdSIC is no greater than the largest quantum value of SdSIC. For the former to equal the latter, we require that (i) SdSIC reaches its maximal quantum value (which is given in Eq. 36) and (ii) that (a = y, b = povm, y) = 0 y. We have already seen that by sharing a maximally entangled state and Bobs outcome-one projectors {By}y forming a SIC, the condition (i) can be satisfied. By normalization, we have that Bobs outcome- projectors are By=>1By. Again, noting that for any linear operator O we have O1dmax=1OTdmax, observe that if Bob applies By, then Alices local state is orthogonal to By. Hence, if Alice chooses her POVM {Ea}, corresponding to the setting povm, as the SIC-POVM defined by Ea=1dBaT, the probability of finding a = y vanishes. This satisfies condition (ii). Hence, we conclude that in a general quantum modelTdSICQd+2d,22d(d+1)(42)and that the bound can be saturated by supplementing the previous optimal realization with a SIC-POVM on Alices side.

The fact that the Bell functionals SdSIC and TdSIC achieve their maximal quantum values with a SIC and a SIC-POVM, respectively, opens up the possibility for device-independent quantum information protocols for tasks in which SICs and SIC-POVMs are desirable. We focus on one such application, namely, that of device-independent quantum random number generation (87). This is the task of certifying that the data generated by a party cannot be predicted by a malicious eavesdropper. In the device-independent setting, both the amount of randomness and its security are derived from the violation of a Bell inequality.

Nonprojective measurements, such as SIC-POVMs, are useful for this task. The reason is that a Bell experiment implemented with entangled systems of local dimension d and standard projective measurements cannot have more than d outcomes. Consequently, one cannot hope to certify more than log d bits of local randomness. However, Bell experiment relying on d-dimensional entanglement implemented with (extremal) nonprojective measurements can have up to d2 outcomes (88). This opens the possibility of generating up to 2 log d bits of local randomness without increasing the dimension of the shared entangled state. Notably, for the case of d = 2, such optimal quantum random number generation has been shown using a qubit SIC-POVM (42).

Here, we use our Bell inequalities for SIC-POVMs to significantly outperform standard protocols relying on projective measurements on d-dimensional entangled states. To this end, we briefly summarize the scenario for randomness generation. Alice and Bob perform many rounds of the Bell experiment illustrated in Figure 4. Alice will attempt to generate local randomness from the outcomes of her setting labeled by povm. In most rounds of the Bell experiment, Alice performs povm and records the outcome a. In a smaller number of rounds, she randomly chooses her measurement setting, and the data are used toward estimating the value of the Bell functional TdSIC defined in Eq. 41. A malicious eavesdropper may attempt to guess Alices relevant outcome a. To this end, the eavesdropper may entangle her system with that of Alice and Bob and perform a well-chosen POVM {Ec}c to enhance her guess. In analogy to Eq. 20, the eavesdroppers guessing probability readsPgsup{c=1d2ABEApovmc1EcABE}(43)where {Ec}c=1d2 is the measurement used by the eavesdropper to produce her guess, the expression inside the curly braces is the probability that her outcome is the same as Alices outcome for the setting povm for a particular realization, and the supremum is taken over all quantum realizations (the tripartite state and measurements of all three parties) compatible with the observed Bell inequality violation =TdSIC.

We quantify the randomness generated by Alice using the conditional min-entropy Hmin(ApovmE)=log(Pg). To obtain a device-independent lower bound on the randomness, we must evaluate an upper bound on Pg for a given observed value of the Bell functional. We saw in the Application: Device-independent quantum key distribution section that if the eavesdropper is only trying to guess the outcome of a single measurement setting, we can, without loss of generality, assume that they are only classically correlated with the systems of Alice and Bob. As before, we restrict ourselves to the asymptotic limit of many rounds, in which fluctuations due to finite statistics can be neglected.

To bound the randomness for some given value of TdSIC, we use the hierarchy of quantum correlations (81). We restrict ourselves to the cases of d = 2 and d = 3. For the case of d = 2, we construct a moment matrix with the operators {(1,Ax)(1,By)(1,E)}{Apovm(1,By,E)}, neglecting the outcome. The matrix is of size 361 361 with 10,116 variables. Again, we can make use of symmetry to simplify the semidefinite program. In this case, the following permutation leaves the problem invariant: x1 (x1), x2 (x2), a f(a, x1, x2), a (a), y (y), and c (c), wheref(a,x1,x2)={a(x1)<(x2)2(x1)(x2)anda=11(x1)(x2)anda=2(x1)(x2)anda=(44)and S4. Using this symmetry reduces the number of free variables to 477. The trade-off between the amount of certified randomness and the nonlocality is illustrated in Fig. 5. We find that for sufficiently large values of T2SIC (roughly T2SIC4.8718), we outperform the one-bit limitation associated to projective measurements on entangled qubits. Notably, for even larger values of T2SIC, we also outperform the restriction of log 3 bits associated to projective measurements on entangled systems of local dimension three. For the optimal value of T2SIC we find Hmin(Apovm E) 1.999, which is compatible up to numerical precision with the largest possible amount of randomness obtainable from qubit systems under general measurements, namely, two bits. This two-bit limit stems from the fact that every qubit measurement with more than four outcomes can be stochastically simulated with measurements of at most four outcomes (88).

For the case of d = 3, we bound the guessing probability following the method of (87). This has the advantage of requiring only a bipartite, and hence smaller, moment matrix than the tripartite formulation. However, the amount of symmetry leaving the problem invariant is reduced because the objective function only involves one outcome. Concretely, we construct a moment matrix of size 820 820 with 263,549 variables. We then write the guessing probability as P(a = 1povm) and identify the following group of permutations, leaving the problem invariant: x1 (x1), x2 (x2), a f(a, x1, x2), a (a), and y (y), where S9 leaves element 1 invariant and permutes elements 2, ,9 in all possible ways. Taking this symmetry into account reduces the number of free variables to 460. To further simplify the problem, we make use of RepLAB, a recently developed tool that decomposes representations of finite groups into irreducible representations (89, 90). This allows us to write the moment matrix in a preferred basis in which it is block diagonal. The semidefinite constraint can then be imposed on each block independently, with the largest block size 28 28 instead of 820 820. Solving one semidefinite program with SeDuMi (84) then takes 0.7 s with <0.1 gigabytes of memory instead of 162 s/0.2 gigabytes without block diagonalization and fails because of lack of memory without any symmetrization (>400 gigabytes required).

Using entangled states of dimension 3 and corresponding SIC-POVMs, one can attain the full range of values for T3SIC. The guessing probability is independent of the outcome guessed by the eavesdropper, and we can verify that the bound that we obtain is convex, hence guaranteeing that no mixture of strategy by the eavesdropper must be considered (87). The randomness is then given in Fig. 6, which indicates that by increasing the value of T3SIC, we can obtain more randomness than the best possible schemes relying on standard projective measurements and entangled systems of dimensions 3,4,5,6, and 7. In particular, in the case of T3SIC being maximal, we find that Hmin(ApovmE) 3.03 bits. This is larger than what can be obtained by performing projective measurements on eight dimensional systems (since log 8 = 3 bits). It is, however, worth noting that this last value is obtained at the boundary of the set of quantum correlations where the precision of the solver is significantly reduced (in particular, the DIMACS errors at this point are of the order of 104). It is not straightforward to estimate the extent to which this reduced precision may influence the guessing probability, so it would be interesting to reproduce this computation with a more precise solver such as SDPA (91).

Acknowledgments: We would like to thank T. de Lima Silva and N. Gisin for fruitful discussions. We thank M. Arajo for helpful comments. Funding: This work was supported by the Swiss National Science Foundation (starting grant DIAQ, NCCRQSIT). A.T. acknowledges support from the Swiss National Science Foundation (Early PostDoc Mobility fellowship P2GEP2 194800). The project Robust certification of quantum devices is carried out within the HOMING programme of the Foundation for Polish Science cofinanced by the European Union under the European Regional Development Fund. M.F. acknowledges support from the Polish NCN grant Sonata UMO-2014/14/E/ST2/00020, the European Research Council (ERC) under the European Unions Horizon 2020 research and innovation programme ERC AdG CERQUTE (grant agreement no. 834266), the State Research Agency (AEI) TRANQI (PID2019-106888GB-I00/10.13039/501100011033), the Government of Spain (FIS2020-TRANQI; Severo Ochoa CEX2019-000910-S), Fundaci Cellex, Fundaci Mir-Puig, and Generalitat de Catalunya (CERCA, AGAUR). Author contributions: A.T. and J.K. proposed the basic concept. A.T., M.F., J.-D.B., and J.K. developed the theory and the proofs. D.R. developed a software that was used to facilitate particular computations. A.T., M.F., J.-D.B., and J.K. discussed the results and participated in the writing of the manuscript. Competing interests: The authors declare that they have no competing interests. Data and materials availability: All data needed to evaluate the conclusions in the paper are present in the paper and/or the Supplementary Materials. Additional data related to this paper may be requested from the authors.

Read the original:

Mutually unbiased bases and symmetric informationally complete measurements in Bell experiments - Science Advances

Posted in Quantum Physics | Comments Off on Mutually unbiased bases and symmetric informationally complete measurements in Bell experiments – Science Advances

Yale Quantum Institute Co-sponsored Event – Alternative Realities for the Living – Quantum Physics & Fiction – Yale News

Posted: at 1:59 pm

Friday February 12 at 4 pm Zoom Webinar

Join us for the 11thtalk of Yale Quantum Institute series of nontechnical talks aiming to bring a new regard to quantum physics and STEM by having experts cast new light on often-overlooked aspects of scientific work.

The acclaimed Nigerian Poet and Novelist Ben Okri, one of the foremost postmodern authors, is joining us to talk about his newest book Prayer For The Living, which includes the Quantum Physics Murder Mystery Alternative Realities are True. During this event, Ben will read this short story, share how quantum physics came muddy the water of this British police investigation, and answer the audience questions about his extensive body of work.

This talk, co-sponsored byThe Franke Program in Science and the Humanities,is open to all and will be accessible to students, researchers, the wider university public and the New Haven Community.

Order Ben Okris newest book: Prayer for the Living onBookshop.org,Akashic, orAmazon.

Register here:https://yale.zoom.us/webinar/register/8816106641445/WN_1LIwOVD3SrKsHrThae3caA

Go here to read the rest:

Yale Quantum Institute Co-sponsored Event - Alternative Realities for the Living - Quantum Physics & Fiction - Yale News

Posted in Quantum Physics | Comments Off on Yale Quantum Institute Co-sponsored Event – Alternative Realities for the Living – Quantum Physics & Fiction – Yale News

Dont Tell Einstein, but Black Holes Might Have Hair – WIRED

Posted: at 1:59 pm

Identical twins have nothing on black holes. Twins may grow from the same genetic blueprints, but they can differ in a thousand waysfrom temperament to hairstyle. Black holes, according to Albert Einsteins theory of gravity, can have just three characteristicsmass, spin and charge. If those values are the same for any two black holes, it is impossible to discern one twin from the other. Black holes, they say, have no hair.

In classical general relativity, they would be exactly identical, said Paul Chesler, a theoretical physicist at Harvard University. You cant tell the difference.

Yet scientists have begun to wonder if the no-hair theorem is strictly true. In 2012, a mathematician named Stefanos Aretakisthen at the University of Cambridge and now at the University of Torontosuggested that some black holes might have instabilities on their event horizons. These instabilities would effectively give some regions of a black holes horizon a stronger gravitational pull than others. That would make otherwise identical black holes distinguishable.

However, his equations only showed that this was possible for so-called extremal black holesones that have a maximum value possible for either their mass, spin, or charge. And as far as we know, these black holes cannot exist, at least exactly, in nature, said Chesler.

But what if you had a near-extremal black hole, one that approached these extreme values but didnt quite reach them? Such a black hole should be able to exist, at least in theory. Could it have detectable violations of the no-hair theorem?

A paper published late last month shows that it could. Moreover, this hair could be detected by gravitational wave observatories.

Aretakis basically suggested there was some information that was left on the horizon, said Gaurav Khanna, a physicist at the University of Massachusetts and the University of Rhode Island and one of the coauthors. Our paper opens up the possibility of measuring this hair.

In particular, the scientists suggest that remnants either of the black holes formation or of later disturbances, such as matter falling into the black hole, could create gravitational instabilities on or near the event horizon of a near-extremal black hole. We would expect that the gravitational signal we would see would be quite different from ordinary black holes that are not extremal, said Khanna.

If black holes do have hairthus retaining some information about their pastthis could have implications for the famous black hole information paradox put forward by the late physicist Stephen Hawking, said Lia Medeiros, an astrophysicist at the Institute for Advanced Study in Princeton, New Jersey. That paradox distills the fundamental conflict between general relativity and quantum mechanics, the two great pillars of 20th-century physics. If you violate one of the assumptions [of the information paradox], you might be able to solve the paradox itself, said Medeiros. One of the assumptions is the no-hair theorem.

The ramifications of that could be broad. If we can prove the actual space-time of the black hole outside of the black hole is different from what we expect, then I think that is going to have really huge implications for general relativity, said Medeiros, who coauthored a paper in October that addressed whether the observed geometry of black holes is consistent with predictions.

Perhaps the most exciting aspect of this latest paper, however, is that it could provide a way to merge observations of black holes with fundamental physics. Detecting hair on black holesperhaps the most extreme astrophysical laboratories in the universecould allow us to probe ideas such as string theory and quantum gravity in a way that has never been possible before.

One of the big issues with string theory and quantum gravity is that its really hard to test those predictions, said Medeiros. So if you have anything thats even remotely testable, thats amazing.

There are major hurdles, however. Its not certain that near-extremal black holes exist. (The best simulations at the moment typically produce black holes that are 30 percent away from being extremal, said Chesler.) And even if they do, its not clear if gravitational wave detectors would be sensitive enough to spot these instabilities from the hair.

Here is the original post:

Dont Tell Einstein, but Black Holes Might Have Hair - WIRED

Posted in Quantum Physics | Comments Off on Dont Tell Einstein, but Black Holes Might Have Hair – WIRED

A Magnetic Twist to Graphene Could Offer a Dramatic Increase in Processing Speeds Compared to Electronics – SciTechDaily

Posted: at 1:59 pm

Schematic of a valley-spiral in magnetically encapsulated twisted bilayer graphene. Credit: Jose Lado

By combining ferromagnets and two rotated layers of graphene, researchers open up a new platform for strongly interacting states using graphenes unique quantum degree of freedom.

Electrons in materials have a property known as spin, which is responsible for a variety of properties, the most well-known of which is magnetism. Permanent magnets, like the ones used for refrigerator doors, have all the spins in their electrons aligned in the same direction. Scientists refer to this behavior as ferromagnetism, and the research field of trying to manipulate spin as spintronics.

Down in the quantum world, spins can arrange in more exotic ways, giving rise to frustrated states and entangled magnets. Interestingly, a property similar to spin, known as the valley, appears in graphene materials. This unique feature has given rise to the field of valleytronics, which aims to exploit the valley property for emergent physics and information processing, very much like spintronics relies on pure spin physics.

Valleytronics would potentially allow encoding information in the quantum valley degree of freedom, similar to how electronics do it with charge and spintronics with the spin. Explains Professor Jose Lado, from Aaltos Department of applied physics, and one of the authors of the work. Whats more, valleytronic devices would offer a dramatic increase in the processing speeds in comparison with electronics, and with much higher stability towards magnetic field noise in comparison with spintronic devices.

Structures made of rotated, ultra-thin materials provide a rich solid-state platform for designing novel devices. In particular, slightly twisted graphene layers have recently been shown to have exciting unconventional properties, that can ultimately lead to a new family of materials for quantum technologies. These unconventional states which are already being explored depend on electrical charge or spin. The open question is if the valley can also lead to its own family of exciting states.

For this goal, it turns out that conventional ferromagnets play a vital role, pushing graphene to the realms of valley physics. In a recent work, Ph.D. student Tobias Wolf, together with Profs. Oded Zilberberg and Gianni Blatter at ETH Zurich, and Prof. Jose Lado at Aalto University, showed a new direction for correlated physics in magnetic van der Waals materials.

The team showed that sandwiching two slightly rotated layers of graphene between a ferromagnetic insulator provides a unique setting for new electronic states. The combination of ferromagnets, graphenes twist engineering, and relativistic effects force the valley property to dominate the behavior of the electrons in the material. In particular, the researchers showed how these valley-only states can be tuned electrically, providing a materials platform in which valley-only states can be generated. Building on top of the recent breakthrough in spintronics and van der Waals materials, valley physics in magnetic twisted van der Waals multilayers opens the door to the new realm of correlated twisted valleytronics.

Demonstrating these states represents the starting point towards new exotic entangled valley states. Said Professor Lado, Ultimately, engineering these valley states can allow realizing quantum entangled valley liquids and fractional quantum valley Hall states. These two exotic states of matter have not been found in nature yet, and would open exciting possibilities towards a potentially new graphene-based platform for topological quantum computing.

Reference: Spontaneous Valley Spirals in Magnetically Encapsulated Twisted Bilayer Graphene by Tobias M.R. Wolf, Oded Zilberberg, Gianni Blatter and Jose L. Lado, 4 February 2021, Physical Review Letters.DOI: 10.1103/PhysRevLett.126.056803

Original post:

A Magnetic Twist to Graphene Could Offer a Dramatic Increase in Processing Speeds Compared to Electronics - SciTechDaily

Posted in Quantum Physics | Comments Off on A Magnetic Twist to Graphene Could Offer a Dramatic Increase in Processing Speeds Compared to Electronics – SciTechDaily

The Interplay between Quantum Theory And Artificial Intelligence – Analytics India Magazine

Posted: at 1:59 pm

Download our Mobile App

Machine Learning Developers Summit (MLDS 2021) is one of the biggest gatherings of machine learning developers in India. With more than 1,500 machine learning developers, 60 speakers from around 200 organisations, the conference corrals Indias leading Machine Learning innovators and practitioners to share their ideas about machine learning tools, advanced development and more.

Anish Agarwal, Director, Data & Analytics, India at NatWest Group, talked about The Interplay between Quantum Theory And Artificial Intelligence at MLDS 2021.

The session started with an introduction to emerging technologies like artificial intelligence, a brief on quantum computing, different forms of quantum technology used for various military as well as civilian applications, how it is different from the classical computers as well as how quantum computing plays a vital role in the advancement of artificial intelligence.

In the field of quantum computing, Agarwal discussed the technique of quantum artificial intelligence, how it can be used for computation of machine learning algorithms and what makes this technology unique.

Quantum AI can help in achieving results that are impossible with classical computers. He said, as per reports, 25 percent of fortune global 500 companies will have a competitive edge from quantum computing by the year 2023. Tech giants like Google, Microsoft are doubling down on quantum computing.

He then explained the possibilities of applying quantum computing in AI:

He said, Quantum machine learning (QML) is not one settled homogeneous field. This is because machine learning itself is quite diverse in nature. He added, Quantum Machine Learning is simply the field exploring the connections between quantum computing and quantum physics on one hand and machine learning and related fields on the other hand.

Agarwal then deliberated on Quantum Game Theory and compared it with classical game theory. He said quantum game theory can be used to overcome critical problems in quantum communications.

He also discussed the advantages of quantum AI:

Agarwal concluded the session by touching upon the key applications of quantum artificial intelligence. Lastly, he mentioned some of the critical milestones for quantum AI and busted a few myths related to quantum computing techniques.

The critical milestones include:

A Technical Journalist who loves writing about Machine Learning and Artificial Intelligence. A lover of music, writing and learning something out of the box. Contact: [emailprotected]

Excerpt from:

The Interplay between Quantum Theory And Artificial Intelligence - Analytics India Magazine

Posted in Quantum Physics | Comments Off on The Interplay between Quantum Theory And Artificial Intelligence – Analytics India Magazine

In Violation of Einstein, Black Holes Might Have ‘Hair’ – Quanta Magazine

Posted: at 1:58 pm

Identical twins have nothing on black holes. Twins may grow from the same genetic blueprints, but they can differ in a thousand ways from temperament to hairstyle. Black holes, according to Albert Einsteins theory of gravity, can have just three characteristics mass, spin and charge. If those values are the same for any two black holes, it is impossible to discern one twin from the other. Black holes, they say, have no hair.

In classical general relativity, they would be exactly identical, said Paul Chesler, a theoretical physicist at Harvard University. You cant tell the difference.

Yet scientists have begun to wonder if the no-hair theorem is strictly true. In 2012, a mathematician named Stefanos Aretakis then at the University of Cambridge and now at the University of Toronto suggested that some black holes might have instabilities on their event horizons. These instabilities would effectively give some regions of a black holes horizon a stronger gravitational pull than others. That would make otherwise identical black holes distinguishable.

However, his equations only showed that this was possible for so-called extremal black holes ones that have a maximum value possible for either their mass, spin or charge. And as far as we know, these black holes cannot exist, at least exactly, in nature, said Chesler.

But what if you had a near-extremal black hole, one that approached these extreme values but didnt quite reach them? Such a black hole should be able to exist, at least in theory. Could it have detectable violations of the no-hair theorem?

A paper published late last month shows that it could. Moreover, this hair could be detected by gravitational wave observatories.

Aretakis basically suggested there was some information that was left on the horizon, said Gaurav Khanna, a physicist at the University of Massachusetts and the University of Rhode Island and one of the co-authors. Our paper opens up the possibility of measuring this hair.

In particular, the scientists suggest that remnants either of the black holes formation or of later disturbances, such as matter falling into the black hole, could create gravitational instabilities on or near the event horizon of a near-extremal black hole. We would expect that the gravitational signal we would see would be quite different from ordinary black holes that are not extremal, said Khanna.

If black holes do have hair thus retaining some information about their past this could have implications for the famous black hole information paradox put forward by the late physicist Stephen Hawking, said Lia Medeiros, an astrophysicist at the Institute for Advanced Study in Princeton, New Jersey. That paradox distills the fundamental conflict between general relativity and quantum mechanics, the two great pillars of 20th-century physics. If you violate one of the assumptions [of the information paradox], you might be able to solve the paradox itself, said Medeiros. One of the assumptions is the no-hair theorem.

The ramifications of that could be broad. If we can prove the actual space-time of the black hole outside of the black hole is different from what we expect, then I think that is going to have really huge implications for general relativity, said Medeiros, who co-authored a paper in October that addressed whether the observed geometry of black holes is consistent with predictions.

Perhaps the most exciting aspect of this latest paper, however, is that it could provide a way to merge observations of black holes with fundamental physics. Detecting hair on black holes perhaps the most extreme astrophysical laboratories in the universe could allow us to probe ideas such as string theory and quantum gravity in a way that has never been possible before.

One of the big issues [with] string theory and quantum gravity is that its really hard to test those predictions, said Medeiros. So if you have anything thats even remotely testable, thats amazing.

There are major hurdles, however. Its not certain that near-extremal black holes exist. (The best simulations at the moment typically produce black holes that are 30% away from being extremal, said Chesler.) And even if they do, its not clear if gravitational wave detectors would be sensitive enough to spot these instabilities from the hair.

Whats more, the hair is expected to be incredibly short-lived, lasting just fractions of a second.

But the paper itself, at least in principle, seems sound. I dont think that anybody in the community doubts it, said Chesler. Its not speculative. It just turns out Einsteins equations are so complicated that were discovering new properties of them on a yearly basis.

The next step would be to see what sort of signals we should be looking for in our gravitational detectors either LIGO and Virgo, operating today, or future instruments like the European Space Agencys space-based LISA instrument.

One should now build upon their work and really compute what would be the frequency of this gravitational radiation, and understand how we could measure and identify it, said Helvi Witek, an astrophysicist at the University of Illinois, Urbana-Champaign. The next step is to go from this very nice and important theoretical study to what would be the signature.

There are plenty of reasons to want to do so. While the chances of a detection that would prove the paper correct are slim, such a discovery would not only challenge Einsteins theory of general relativity but prove the existence of near-extremal black holes.

We would love to know if nature would even allow for such a beast to exist, said Khanna. It would have pretty dramatic implications for our field.

Correction: February 11, 2021The original version of this article implied that theorists are unable to simulate black holes closer than 30% away from being extremal. In fact, they can simulate near-extremal black holes, but their typical simulations are 30% away from being extremal.

More here:

In Violation of Einstein, Black Holes Might Have 'Hair' - Quanta Magazine

Posted in Quantum Physics | Comments Off on In Violation of Einstein, Black Holes Might Have ‘Hair’ – Quanta Magazine

The most influential Democrat you never hear from – POLITICO

Posted: at 1:58 pm

Nikki Haley enjoyed the MAGA glow while avoiding Trump's brash brand of politics. But in the aftermath of the Capitol insurrection, that position is becoming less and less tenable.

When Vice President Kamala Harris appeared in Manchins home state on TV pushing the coronavirus relief bill, Manchin retorted: Thats not a way of working together. Sinema was similarly unhappy, according to people that spoke with her afterward.

She decided to deal with it privately. She explained that people in her state don't really want me to spend my time weighing in on controversies or palace intrigue. They don't care about that. And attempts at trying to force Sinemas hand will not go anywhere, she insists.

Its not effective to pressure me on anything. Because I am a thoughtful person who takes a lot of time, deliberatively, to make decisions, Sinema said. Once I've made a decision, I feel very comfortable with it. And it doesn't matter what other people think.

Already there are progressive groups itching to send her a primary challenger in 2024, citing her reluctance to gut the filibuster and for voting with Republicans on things like fossil-fuel regulations, barring stimulus checks to undocumented immigrants and approving some of Trumps nominees. But Sinema also voted to remove Trump last year and last week helped advance party-line budget reconciliation efforts despite her laser focus on bringing in Republican support.

Sen. Chris Coons (D-Del.) has known Sinema since she was a state legislator. He isnt surprised at the way she wields her influence as a U.S. senator given how hard she had to fight to be relevant in an Arizona legislature where Democrats werent in the minority, they were in the super-minority.

She knows her own mind. And I think shes someone who has an understandably self-confident assessment of her state and her place in it, her states place in our country and her role in her caucus, Coons said.

As one of a handful of moderates in a caucus that may need lockstep unity to move Bidens agenda, theres plenty of political pressure on Sinema even if she chooses to ignore it. She and Manchin may have to be the deciding votes on Neera Tanden, Bidens nominee to be White House budget chief and perhaps the toughest confirmation the new president will have to steer through the Senate in his first 100 days.

Tanden has little GOP support after her Twitter attacks on Republicans. But Sinema questioned her on policy during her hearing and has not yet done anything to indicate she might tank Tanden's nomination. She said shed also spoken to Tanden privately but declined to divulge where she is leaning: I dont preview where I am on votes. Ever.

Colleagues chalk that up to Sinemas contemplative nature. Sen. Bill Cassidy (R-La.), another GOP ally of Sinemas thats worked with her on family leave policy, said he learned a lot about her in late December as Congress struggled to clinch its last coronavirus bill. When Sen. Pat Toomey (R-Pa.) and Senate Democratic Leader Chuck Schumer (D-N.Y.) sparred over Toomeys effort to restrict some of the Federal Reserves lending programs, Kyrsten is sitting there listening, just listening, Cassidy recalled.

And finally she says: Theyre talking past each other but theyre saying the same thing, Cassidy said. She almost brokered that by just listening.

True to form, Sinema seems more interested in listening than opining at length on the issues of the day. She shuts down a question about how her views play with fellow Democrats: Popularity is not my concern.

During her Senate run, Sinema was a skeptic of Schumers leadership style, but shes not delivering a verdict on his stewardship of the caucus: You should ask Schumer how hes doing as majority leader. Even an innocuous question about her partys direction is met with a brick wall: I know this isnt going to surprise you. I just don't talk about internal stuff publicly.

And thats just fine with Democrats these days, who sense that Sinema is a team player regardless of her unique views. Just listen to her talk about passing coronavirus relief on what may be a party-line vote, and she sounds a bit like Biden: disappointed that Republicans arent yet on board, but confident its the right thing to do.

Bipartisanship is always my first choice, she said. I also want to make sure that we're getting stuff done for Arizonans. They need help and I don't want to see a process that gets bogged down in petty partisanship, like you did last year for much of the year.

More here:

The most influential Democrat you never hear from - POLITICO

Posted in Democrat | Comments Off on The most influential Democrat you never hear from – POLITICO

Tom Perez on Democrats Mistakes and Why Iowa Shouldnt Go First – The New York Times

Posted: at 1:57 pm

Do you think that the D.N.C. should have devoted more attention and resources to down-ballot contests given the results in state legislative and congressional races?

The thing about this election cycle that is really regrettable is that we had record turnout. And we should be celebrating that on a bipartisan basis, because we did really well. We won the presidency. We have the House. We have the Senate. And Republicans won in a number of critical races. Thats undeniable. They won a number of Senate seats. They won a number of congressional seats. And they won because a lot of their people turned out. And instead, what Donald Trump and the far right chose to do is to invest in this fiction that there was some sort of massive voter fraud, which is inaccurate.

The reality is we won a series of really important races. And they won a number of down-ballot races. Those are the facts of 2020. And thats why were absolutely drilling down deeper to answer the question of how did we do well for Mark Kelly and Joe Biden in Arizona and not so well in some of the State House and State Senate races. Really important question. It certainly wasnt for lack of investment. And thats why were looking to understand what else do we have to do.

Why was Latino support for Democrats so much softer in 2020 after four years of Trump than it was in 2016 and elections before that?

Do we need to do more with Latino voters? Absolutely. And I am very committed to that. We did more than the party has ever done. But again, every cycle, we need to build on what we did before. And thats exactly what we will do. The misinformation campaigns in South Florida were very real. And they involved both domestic and foreign actors.

And the appeals to socialism in South Florida were more successful. They made those same socialism arguments in Arizona. But they fell flat. And they fell flat, in no small measure, because we had a really aggressive and longstanding organizing infrastructure in Arizona that enabled us to counteract that.

Will the 2022 and 2024 elections be a referendum on President Bidens handling of the pandemic and the economy?

What voters are going to ask themselves is the same question they always ask. Am I better off than I was two years ago? Am I seeing results that are improving my life? As they are able to return to normalcy, whatever normalcy is going to look like post-Covid, I think that they will appreciate that Joe Biden and Kamala Harris led during this crisis.

Should Iowa and New Hampshire keep going first in the presidential nominating process?

That will be up to the D.N.C.s Rules and Bylaws Committee.

Im aware. But what does the private citizen Tom Perez think?

A diverse state or states need to be first. The difference between going first and going third is really important. We know the importance of momentum in Democratic primaries.

Ill try one more time. Could you make a case for defending Iowa and New Hampshire going first?

The status quo is clearly unacceptable. To simply say, Lets just continue doing this because this is how weve always done it, well, Iowa started going as an early caucus state, I believe, in 1972. The world has changed a lot since 1972 to 2020 and 2024. And so the notion that we need to do it because this is how weve always done it is a woefully insufficient justification for going first again.

This is the Democratic Party of 2020. Its different from the Democratic Party in how we were in 1972. And we need to reflect that change. And so I am confident that the status quo is not going to survive.

How far down the road are you in thinking about running for governor of Maryland?

Im seriously considering a run for governor in Maryland.

We need a governor who can really build strong relationships with the Biden administration, will build strong relationships with every one of the jurisdictions in Maryland.

Marylanders are just like everybody else. We want an end to this pandemic. We want to put kids back to school. We want to put people back to work. The pandemic has disproportionately touched women and communities of color in Maryland. And Ive had the fortune of working in local government, and with the nonprofit faith communities and state government there.

So Im currently listening. Im on a listening tour in Maryland. And I think we need leadership, really, with a bold vision of inclusion and opportunity because ZIP code should never determine destiny in any community across America.

Has Larry Hogan been a good governor for Maryland?

I appreciate the fact that Larry Hogan has said critical things about Donald Trump. I appreciate that. What we really need, I think, in Maryland is leaders who will sweat the details of governance. The pandemic rollout, the vaccination process has been nothing less than chaotic in Maryland. Weve had an unemployment insurance crisis, people waiting months and months to get their unemployment benefits. Thats just a failure of leadership at a state level.

I didnt hear a yes or no on Hogan.

I applaud that he tried to get some tests from South Korea. But then it turned out that the tests didnt work. And he covered it up. And theres always going to be moments where mistakes are made. And good leaders fess up to those mistakes. But he tried to sweep it under the rug.

Again, its great to see a governor who criticizes Donald Trump. But we need governors who do a hell of a lot more than just criticize.

What would you be doing differently to accelerate vaccine distribution and reopen schools faster?

I would be on the phone every day with county executives making sure: What do you need? What do you not have? What do you have? What can we do? I would be relentlessly reaching out to our colleagues in the federal government to say: Heres what we need. Heres whats going on. I would have a war room set up and, again, every single day, say: You value what you measure. You measure what you value. What are we doing?

Donald Trump is partly to blame for this. He was a disaster. But you look at other states other states have been able to work around that and are doing better. Our vaccination rates do not compare well. Were the richest state in the United States Maryland but we have way too many people who are on the outside looking in.

You said good leaders admit their mistakes. What were the biggest mistakes you made at the D.N.C.?

I wish that we could have won more elections. And so Im looking back at what we did and some of the races we didnt win. I was really frustrated in January and early February of 2017, because Donald Trump was in power and he was issuing all sorts of executive actions that were turning life upside down for so many people. That was in the middle of the D.N.C. race because the election wasnt set until the end of February. So we got a late start. And I think that was a mistake.

It was frustrating to see Feb. 27, a month into the administration, and Im just showing up at work for the first time. So I think we have to be very mindful. And if there are periods of time in the future where were in a similar situation, where weve lost the White House, we better make sure we start early because I had to play a lot of catch-up. And that was a mistake.

Read more:

Tom Perez on Democrats Mistakes and Why Iowa Shouldnt Go First - The New York Times

Posted in Democrat | Comments Off on Tom Perez on Democrats Mistakes and Why Iowa Shouldnt Go First – The New York Times

Democrats wrestle with how to quit an acquitted Trump – POLITICO

Posted: at 1:57 pm

It is important that we find out some of the things that the former president may have been involved in that really hurt our country, said Rep. Val Demings (D-Fla.), who served as an impeachment manager during Trump's first trial and wants to continue active oversight of his departed administration. Were trying to set America up for success.

The debate comes as Trump continues to hold a tight grip on the GOP base. And theres no issue that brings Democrats together faster than criticizing him. But with the second impeachment trial coming to an end, Democrats acknowledge they have few options left at their disposal to sanction Trump. Top Democrats all but ruled out a censure resolution against the former president on Saturday, keenly aware that it would be highly unlikely to clear a 60-vote threshold in the Senate after 43 GOP senators voted to acquit.

Speaker Nancy Pelosi explicitly ruled out censure during a post-acquittal news conference Saturday, saying it would let "cowardly senators" who didn't vote to convict "off the hook."

"Censure is a slap in the face of the Constitution," Pelosi said. We censure people for using stationary for the wrong purpose. We dont censure people for inciting an insurrection that kills people in the Capitol.

And there so far appears to be little appetite among Senate Democrats to look at further punishments or probes.

"We dont put presidents in jail, ex-presidents. We just dont do that, said Sen. Jon Tester (D-Mont.). We never have in the past. I dont know why wed start now.

House Democratic leaders dont yet have a road map to deal with Trump after the trial, according to several people familiar with the discussions. But some Democrats made their intentions clear after the vote. House Oversight Chair Carolyn Maloney (D-N.Y.) tweeted that she would "keep working to investigate Jan 6 especially on the question of WHO FINANCED IT," but did not offer details of that probe.

The debate comes as Trump continues to hold a tight grip on the GOP base. | M. Scott Mahaskey/POLITICO

The current legal proceedings already underway including an effort to obtain Trumps financial records will continue, according to senior Democrats. And theres been some talk among members about revoking his post-presidential privileges and strengthening Congresss powers to ensure that future presidents are forced to abide by stricter rules for responding to subpoenas, divesting from businesses and not hiring family members.

Some of those measures are already part of a sprawling government accountability bill that Democrats passed last Congress, designated H.R. 1. That bill is expected to come to the floor as early as March, according to a senior Democratic aide.

Senior Democrats also drafted a bill last year that would address a slew of what the party saw as Trumps abuses of power, proposing stronger subpoena powers for Congress and a suspended statute of limitations for federal offenses conducted by a sitting president. The bill did not come to the floor last Congress, but it could this time around if there is broad enough interest in the caucus.

But right now, the sentiment of many House Democrats is that Trump needs to become an afterthought.

Weve gotta get beyond Trump as best we can, as quickly as we can, Rep. Anthony Brown (D-Md.) said, noting that he would support some restoration of Congress powers, as long as its not a distraction.

Senate Democrats, meanwhile, argue that an acquittal in the impeachment trial doesn't mean the exercise was worthless as a way to hold Trump accountable. In the end, seven Republicans voted to convict, more than originally expected.

And Trump still faces the real possibility of legal punishment, even without Congress. Senate Minority Leader Mitch McConnell (R-Ky.), who voted to acquit, suggested to his caucus Saturday that criminal prosecution for Trump could be appropriate in response to the Jan. 6 insurrection.

State legal authorities are also looking into Trump. Just hours before the Senate voted, news broke that New York prosecutors are investigating financial details of Trump-owned properties a reminder of the expansive web of ongoing investigations outside Washington. And Georgia prosecutors recently opened an investigation into Trump's call to pressure Secretary of State Brad Raffensperger into overturning his loss.

With the trial over, congressional Democrats are now moving forward with crafting a $1.9 trillion coronavirus relief package the partys most urgent priority. An ambitious legislative agenda will follow that, likely starting with infrastructure and immigration.

I dont think people are interested in looking backwards at Trump," said Sen. Debbie Stabenow (D-Mich.).

Still, some in the party argue that deciding whether to keep focusing on making Trump pay or to concentrate on Democratic priorities is a false choice.

I dont think its an either/or," said Rep. Sean Patrick Maloney (D-N.Y.), chair of the House Democrats campaign arm. I dont think it makes any sense for us to be consumed with Donald Trump. But it doesnt mean we shouldnt demand accountability from both President Trump and his enablers, because the truth matters.

But right now, the sentiment of many House Democrats is that Trump needs to become an afterthought. | Alex Brandon/AP Photo

But Democrats are also aware of a key reality: Trump is not going to simply disappear. While hes lost his biggest megaphone his Twitter account the former president is planning to weigh in on GOP primaries and mulling a 2024 run.

Trumps expected return to politics poses further risks for the Democratic Party, which has long struggled with whether to ignore or engage him. In the 2018 midterms, House Democrats successfully neutered Trumps ability to swallow up the national news cycle by running a tightly scripted campaign on health care, ignoring his taunts on contentious issues.

But even after Democrats retook the House, Trump and his Twitter feed commandeered every narrative on a daily basis until the platform finally banned the former president after the Jan. 6 insurrection.

"Its my hope that having seen these shocking and clear videos about his intent" on that day, Sen. Chris Coons (D-Del.) said of Trump, "that they will no longer support him."

With Trump's electoral future murky, Democrats are under intense pressure to deliver on their agenda ahead of the 2022 midterms when many lawmakers privately believe the House majority could again flip.

Many Democrats say that agenda should include proposals to reassert congressional authority after watching Trump trample on the legislative branch for years. But they say even that shouldnt be marketed as a response to Trump.

"If there was a Democratic president who was exceeding the normal traditional authorities of the presidency, Republicans would want that curbed as well, Rep. Elissa Slotkin (D-Mich.) said. Its for everybody. Its not just a punishment."

See more here:

Democrats wrestle with how to quit an acquitted Trump - POLITICO

Posted in Democrat | Comments Off on Democrats wrestle with how to quit an acquitted Trump – POLITICO

House Republicans Announce 47 Democrats They Hope to Unseat – The New York Times

Posted: at 1:57 pm

WASHINGTON The House Republicans campaign arm on Wednesday revealed the list of 47 House Democrats it will target in the 2022 midterm elections, whose results are likely to be determined largely by the popularity of President Biden.

The National Republican Congressional Committees list includes 25 Democrats who were first elected in the Democrats 2018 wave election and six incumbents who represent districts that voted for former President Donald J. Trump in November. It includes a wide array of moderate Democrats, including Representatives Abigail Spanberger of Virginia and Conor Lamb of Pennsylvania, who have publicly sparred with the partys more liberal wing in recent months.

The target list comes three months after House Republicans outperformed pre-election polling and flipped 15 Democratic-held seats in last years elections. The party out of power typically does well in midterm elections: Since World War II, the presidents party has lost an average of 27 House seats in midterm elections.

The 2022 elections have the potential to carry a dynamic unseen in previous midterm contests a referendum on a previous presidents actions. Democrats have already signaled they aim to tie House Republicans to the Jan. 6 riot at the Capitol by a crowd incited by Mr. Trump.

Representative Tom Emmer of Minnesota, the N.R.C.C. chairman, forcefully condemned the rioters during a Wednesday video conference with reporters but also welcomed campaign assistance from Mr. Trump. He said that his committee would continue to embrace the former president and would maintain its policy of not taking sides in primaries even to help incumbent members who voted to impeach the former president.

President Trump and his administration implemented some amazing policies for this country, right? Mr. Emmer said. The economic policies that they advanced, his energy policy, putting Americans and America first, that policy, it was all good. It brought in a ton of new voters to our party. I think Republicans need to celebrate those policies, I think we need to continue to embrace them.

The Republicans list is speculative, given that it will be months before states are able to begin drawing new congressional district lines. The Census Bureau is already late in delivering reapportionment and redistricting data to states, delaying until at least late summer a process that typically begins in February or March.

The tardiness of the census data has left both parties congressional campaign committees in limbo as they seek to recruit candidates for presumptive districts. Sun Belt states like Texas and Florida are expected to add multiple new House districts, while Northern states including Illinois, Ohio and New York are likely to lose at least one seat each.

Mr. Emmer said Republicans would win redistricting and maximize our opportunities.

What Im talking about is fair and transparent, and that the districts make sense and that they reflect not only the geography of the state and that they are a fair representation of the demography of the state, he said.

Seven House Democrats who represent districts Mr. Trump carried in November are on the N.R.C.C. list: Representatives Cindy Axne of Iowa, Cheri Bustos of Illinois, Matt Cartwright of Pennsylvania, Jared Golden of Maine, Elissa Slotkin of Michigan, Andy Kim of New Jersey and Ron Kind of Wisconsin.

Ms. Bustos, who led the House Democrats campaign arm in 2020, had margins of victory that shrunk from 24 percentage points in 2018 to four points in 2020. But with Illinois certain to lose at least one seat, her gerrymandered district, which snakes around to include Democratic-leaning sections of Peoria and Rockford along with the Illinois portion of the Quad Cities, will change before she faces voters again.

The N.R.C.C. also believes a handful of Democrats who underperformed Mr. Biden may be vulnerable against better-funded challengers. Those Democrats include Representatives Katie Porter and Mike Levin of California, who both had significantly less support than Mr. Biden in November.

Go here to see the original:

House Republicans Announce 47 Democrats They Hope to Unseat - The New York Times

Posted in Democrat | Comments Off on House Republicans Announce 47 Democrats They Hope to Unseat – The New York Times