Experiment plugs loopholes in previous demonstrations of 'action at a distance', against Einstein's objections — and could make data encryption safer.
It’s a bad day both for Albert Einstein and for hackers. The most rigorous test of quantum theory ever carried out has confirmed that the ‘spooky action at a distance’ that the German physicist famously hated — in which manipulating one object instantaneously seems to affect another, far away one — is an inherent part of the quantum world.
The experiment, performed in the Netherlands, could be the final nail in the coffin for models of the atomic world that are more intuitive than standard quantum mechanics, say some physicists. It could also enable quantum engineers to develop a new suite of ultrasecure cryptographic devices.
“From a fundamental point of view, this is truly history-making,” says Nicolas Gisin, a quantum physicist at the University of Geneva in Switzerland.
In quantum mechanics, objects can be in multiple states simultaneously: for example, an atom can be in two places, or spin in opposite directions, at once. Measuring an object forces it to snap into a well-defined state. Furthermore, the properties of different objects can become ‘entangled’, meaning that their states are linked: when a property of one such object is measured, the properties of all its entangled twins become set, too.
This idea galled Einstein because it seemed that this ghostly influence would be transmitted instantaneously between even vastly separated but entangled particles — implying that it could contravene the universal rule that nothing can travel faster than the speed of light. He proposed that quantum particles do have set properties before they are measured, called hidden variables. And even though those variables cannot be accessed, he suggested that they pre-program entangled particles to behave in correlated ways.
In the 1960s, Irish physicist John Bell proposed a test that could discriminate between Einstein’s hidden variables and the spooky interpretation of quantum mechanics1. He calculated that hidden variables can explain correlations only up to some maximum limit. If that level is exceeded, then Einstein’s model must be wrong.
The first Bell test was carried out in 19812, by Alain Aspect’s team at the Institute of Optics in Palaiseau, France. Many more have been performed since, always coming down on the side of spookiness — but each of those experiments has had loopholes that meant that physicists have never been able to fully close the door on Einstein’s view. Experiments that use entangled photons are prone to the ‘detection loophole’: not all photons produced in the experiment are detected, and sometimes as many as 80% are lost. Experimenters therefore have to assume that the properties of the photons they capture are representative of the entire set.
To get around the detection loophole, physicists often use particles that are easier to keep track of than photons, such as atoms. But it is tough to separate distant atoms apart without destroying their entanglement. This opens the ‘communication loophole’: if the entangled atoms are too close together, then, in principle, measurements made on one could affect the other without violating the speed-of-light limit.
In the latest paper3, which was submitted to the arXiv preprint repository on 24 August and has not yet been peer reviewed, a team led by Ronald Hanson of Delft University of Technology reports the first Bell experiment that closes both the detection and the communication loopholes. The team used a cunning technique called entanglement swapping to combine the benefits of using both light and matter. The researchers started with two unentangled electrons sitting in diamond crystals held in different labs on the Delft campus, 1.3 kilometres apart. Each electron was individually entangled with a photon, and both of those photons were then zipped to a third location. There, the two photons were entangled with each other — and this caused both their partner electrons to become entangled, too.
This did not work every time. In total, the team managed to generate 245 entangled pairs of electrons over the course of nine days. The team's measurements exceeded Bell’s bound, once again supporting the standard quantum view. Moreover, the experiment closed both loopholes at once: because the electrons were easy to monitor, the detection loophole was not an issue, and they were separated far enough apart to close the communication loophole, too.
“It is a truly ingenious and beautiful experiment,” says Anton Zeilinger, a physicist at the Vienna Centre for Quantum Science and Technology.
“I wouldn’t be surprised if in the next few years we see one of the authors of this paper, along with some of the older experiments, Aspect’s and others, named on a Nobel prize,” says Matthew Leifer, a quantum physicist at the Perimeter Institute for Theoretical Physics in Waterloo, Canada. “It’s that exciting.”
A loophole-free Bell test also has crucial implications for quantum cryptography, says Leifer. Companies already sell systems that use quantum mechanics to block eavesdroppers. The systems produce entangled pairs of photons, sending one photon in each pair to the first user and the other photon to the second user. The two users then turn these photons into a cryptographic key that only they know. Because observing a quantum system disrupts its properties, if someone tries to eavesdrop on this process it will produce a noticeable effect, setting off an alarm.
The final chink
But loopholes, and the detection loophole in particular, leave the door open to sophisticated eavesdroppers. Through this loophole, malicious companies could sell devices that fool users into thinking that they are getting quantum-entangled particles, while they are instead being given keys that the company can use to spy on them. In 1991, quantum physicist Artur Ekert observed4 that integrating a Bell test into the cryptographic system also would ensure that the system uses a genuine quantum process. For this to be valid, however, the Bell test must be free of any loopholes that a hacker could exploit. The Delft experiment “is the final proof that quantum cryptography can be unconditionally secure”, Zeilinger says.
In practice, however, the entanglement-swapping idea will be hard to implement. The team took more than week to generate a few hundred entangled electron pairs, whereas generating a quantum key would require thousands of bits to be processed per minute, points out Gisin, who is a co-founder of the quantum cryptographic company ID Quantique in Geneva.
Zeilinger also notes that there remains one last, somewhat philosophical loophole, first identified by Bell himself: the possibility that hidden variables could somehow manipulate the experimenters’ choices of what properties to measure, tricking them into thinking quantum theory is correct.
Leifer is less troubled by this ‘freedom-of-choice loophole’, however. “It could be that there is some kind of superdeterminism, so that the choice of measurement settings was determined at the Big Bang,” he says. “We can never prove that is not the case, so I think it’s fair to say that most physicists don’t worry too much about this.”
Bell, J. S. Physics 1, 195–200 (1964).
Aspect, A., Grangier, P. & Roger, G. Phys. Rev. Lett. 49, 91–94 (1982).
Hensen, B. et al. Preprint at http://arxiv.org/abs/1508.05949 (2015).
Ekert, A. K. Phys. Rev. Lett. 67, 661-663 (1991).
Related links in Nature Research
Quantum physics: What is really real? 2015-May-20
Physics: Bell’s theorem still reverberates 2014-Jun-19
Cosmic light could close quantum-weirdness loophole 2014-Feb-25
Physics: Quantum quest 2013-Sep-11
Photons test quantum paradox 2013-Apr-15
Data teleportation: The quantum space race 2012-Dec-05
Related external links
Quantum Science and Technology in Diamond
Rights and permissions
About this article
Cite this article
Merali, Z. Quantum ‘spookiness’ passes toughest test yet. Nature 525, 14–15 (2015). https://doi.org/10.1038/nature.2015.18255
This article is cited by
Entanglement Swapping and Action at a Distance
Foundations of Physics (2021)
A new horizon for quantum information
npj Quantum Information (2015)