Skip to main content

Thank you for visiting You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Experimental violation of n-locality in a star quantum network


The launch of a satellite capable of distributing entanglement through long distances and the first loophole-free violation of Bell inequalities are milestones indicating a clear path for the establishment of quantum networks. However, nonlocality in networks with independent entanglement sources has only been experimentally verified in simple tripartite networks, via the violation of bilocality inequalities. Here, by using a scalable photonic platform, we implement star-shaped quantum networks consisting of up to five distant nodes and four independent entanglement sources. We exploit this platform to violate the chained n-locality inequality and thus witness, in a device-independent way, the emergence of nonlocal correlations among the nodes of the implemented networks. These results open new perspectives for quantum information processing applications in the relevant regime where the observed correlations are compatible with standard local hidden variable models but are non-classical if the independence of the sources is taken into account.


Bell’s theorem1, i.e., the incompatibility of quantum predictions with local hidden variable (LHV) models, is among the most influential results in quantum foundations. Despite being almost 60 years old, only recently the phenomenon of Bell nonlocality has been proven in a loophole-free manner in a series of independent experiments2,3,4,5,6. Apart from its fundamental importance, witnessing Bell nonlocality is at core of many applications in quantum information processing, ranging from quantum communication7 and distributed computing8, to quantum cryptography9, quantum key distribution10,11, and randomness generation12,13.

Indeed, the violation of a Bell inequality allows to bound the secure key rate that can be exchanged among distant nodes in a device-independent (DI) manner14,15,16, that is, with minimal assumptions on measurement apparatuses and relying exclusively on observed data. Most of these findings, however, only hold for the paradigmatic bipartite Bell scenario. Generalizations to the multipartite case have been proposed, for instance, based on multipartite entangled states, such as the Greenberger-Horne-Zeilinger states (GHZ)17. Notwithstanding, generation of such states on a photonic platform is still highly demanding18, affecting the near-term experimental relevance of device-independent communication protocols based on it. Accordingly, quantum networks of growing size and complexity aiming at the so-called quantum internet19,20 are much more likely to be composed of independent sources, each one generating small size entangled states but at much higher quality and rate.

The independence of the sources in a quantum network gives rise to a much richer set of correlations21,22,23,24,25,26,27,28,29,30 as compared with the standard Bell nonlocality. Not only the network scenario allows for nonlocality activation31 and less stringent detection efficiencies32, but also the emergence of truly new kinds of non-classical behaviors30. In spite of much recent theoretical advance, experimental implementations6,33,34,35 have been so far limited to the simplest possible quantum network, the bilocality model21,22. Such scenario is akin to the entanglement swapping experiment, involving two independent sources of entangled states, and only very recently was implemented while closing the locality and independence loopholes at the same time36.

In this work, we provide a proof of principle demonstration of the scalability of such networks, moving beyond the bilocality scenario, by considering up to four independent sources distributing entanglement among five nodes in a star-network topology. To ensure the independence of the sources, we employ four photonic setups located in four different laboratories, each one consisting of a source of entangled photons, pumped by a different laser, and a measurement station. Via this platform, we report the violation of polynomial chained Bell inequalities with an increasing number of parties and measurement settings, hence detecting the presence of nonlocal correlations among the nodes of multipartite networks. Our scalable approach could be useful both for demonstrating the nonlocality of topologically different scenarios30, as well as a testbed for device-independent protocols of information processing in quantum networks37.


Causal modeling approach

Topologically complex networks, composed of several sources and parties, are notoriously hard to characterize, especially if the independence of the sources is taken into consideration. A new approach has been introduced in the last few years to properly analyze these networks, which leverages on the theory of causal inference38. Indeed, the causal modeling approach39 has become a customary and powerful tool to represent classical and quantum networks27,40,41,42,43. In this framework, directed acyclic graphs (DAGs) provide both a graphical and a mathematical way to visualize causal structures (see Fig. 1). Each of the nodes stands for a random variable involved in the process, whose cause and effect relations are encoded by directed edges (arrows).

Fig. 1: Directed acyclic graph (DAG) representation for the star scenario with different number of sources.
figure 1

a Causal structure of the standard Bell scenario in which a single source Λ1 mediates the correlations between the two measurement stations with outcomes A and B and measurement choices X and Y, respectively. b DAG for the bilocal scenario where two independent hidden variables Λ1 and Λ2 distribute the correlations to three measurement stations with outcomes A, B, and C and choice of measurements X, Y, and Z, respectively. c, d DAG for the star-network with three and four independent sources Λ1Λ2Λ3, and Λ1\(,\ldots,\) Λ4, respectively. Each non-central measurement station has outcomes Ai (measurement choices Xi) and the central has outcome B (measurement choices Y).

Bilocality scenario

The simplest quantum network beyond the paradigmatic Bell scenario (Fig. 1a) is the so-called bilocality scenario21,22 depicted in Fig. 1b, that is, a network with two independent sources Λ1 and Λ2. The three nodes, Alice, Bob, and Charlie, can perform measurements of different observables denoted by x1, x2, and y, chosen independently, with outcomes labeled as a1, a2, and b, respectively. Note that such independence in the choice of the measurements is also crucial in standard Bell tests6, in particular for the derivation of Bell inequalities22,27,41.

The aforementioned experiment is described by a probability distribution that, under the bilocality assumption, should be compatible with a bilocal LHV model, given by refs. 21,22

$$ p({a}_{1},{a}_{2},b| {x}_{1},{x}_{2},y)\\ \quad\,=\sum _{{\lambda }_{1},{\lambda }_{2}}p({\lambda }_{1})p({\lambda }_{2})p({a}_{1}| {x}_{1},{\lambda }_{1})p({a}_{2}| {x}_{2},{\lambda }_{2})p(b| y,{\lambda }_{1},{\lambda }_{2}).$$

Assuming that all these variables are dichotomous (with values 0 or 1), any correlation compatible with the bilocal model (1) should fulfill the following nonlinear Bell inequality:

$$S=\sqrt{| {I}_{1}| }+\sqrt{| {I}_{2}| }\le 1,$$


$${I}_{1}=\frac{1}{4}\sum _{{x}_{1},{x}_{2} = 0,1}\langle {A}_{1}^{{x}_{1}}{A}_{2}^{{x}_{2}}{B}^{0}\rangle ,$$
$${I}_{2}=\frac{1}{4}\sum _{{x}_{1},{x}_{2} = 0,1}{(-1)}^{{x}_{1}+{x}_{2}}\langle {A}_{1}^{{x}_{1}}{A}_{2}^{{x}_{2}}{B}^{1}\rangle ,$$

and \(\langle {A}_{1}^{{x}_{1}}{A}_{2}^{{x}_{2}}{B}^{y}\rangle\) being the expectation value of the measurements outcomes of the three nodes:

$$\langle {A}_{1}^{{x}_{1}}{A}_{2}^{{x}_{2}}{B}^{y}\rangle =\sum _{{a}_{1},{a}_{2},b = 0,1}{(-1)}^{{a}_{1}+{a}_{2}+b}p({a}_{1},{a}_{2},b| {x}_{1},{x}_{2},y).$$

In the last 2 years, inequality (2) has been experimentally violated in a number of photonic setups6,33,34,35,36. The first violation33 exploited polarization-entangled photons and the measurements performed in the central node B relied on a complete Bell-state measurement. Notably, bilocality violation can also be achieved with separable measurements22,23, as experimentally realized in refs. 6,35. The violation of bilocality is relevant, in particular, in the intermediate situation where local variable models can reproduce the observed correlations but bilocal models cannot33, namely one can violate a bilocal causality inequality even if the data admits a LHV model, where the independence of the sources is not taken into account. Accordingly, quantum states generating classical correlations in conventional scenarios can become powerful resources in a network, thus enlarging the capabilities to process information in a non-classical way.

n-locality in a star-network

The bilocality scenario can be extended to more complex networks, considering an increasing number of independent sources and involved nodes, as well as different topologies. In particular, a n-locality scenario involves n independent sources distributing correlations among the nodes. A topology that has received much theoretical attention is the star-network21,22,23,24,25, with n + 1 nodes interconnected by n independent sources, which contains the bilocality scenario as a particular case (see Figs. 1b–d). Each of the n peripheral nodes (called Ai) is connected through the source Λi to the central node of the network (called B). Labeling the measurements for B and external nodes Ai by y and xi and their outcomes by b and ai, respectively, a classical n-local hidden variable model implies that any classical observed distribution should be decomposable as

$$ p({a}_{1}\ldots {a}_{n}b| {x}_{1}\ldots {x}_{n}y) \\ \quad = \sum _{{\lambda }_{1},\ldots {\lambda }_{n}}p({a}_{1}| {x}_{1}{\lambda }_{1})\ldots p({a}_{n}| {x}_{n}{\lambda }_{n})p(b| y{\lambda }_{1}\ldots {\lambda }_{n})p({\lambda }_{1})\ldots p({\lambda }_{n}).$$

Considering that each of the nodes can perform k measurements described by dichotomous observables By (central node) and \({A}_{i}^{{x}_{i}}\) (external nodes), the n-local model implies the following nonlinear Bell inequality23:

$${S}_{n}^{k}=\mathop{\sum }\limits_{i = 1}^{k}| {I}_{i}{| }^{1/n}\le k-1$$
$$\,{\text{where}}\,\ {I}_{i}=\frac{1}{{2}^{n}}\mathop{\sum }\limits_{{x}_{1},...,{x}_{n} = i-1}^{i}\langle {A}_{1}^{{x}_{1}}\cdots {A}_{n}^{{x}_{n}}{B}^{i-1}\rangle$$

with \({A}_{i}^{k}=-{A}_{i}^{0}\). This is a generalization both of bilocality inequality (2), as well as of the so-called chained Bell inequality44, which are recovered in the case of n = 2 and n = 1, respectively. For this reason, we call inequality (7) the chained n-locality inequality. A larger number of measurement settings k for the chained form considered here provides advantages in device-independent protocols, either by reducing the experimental constraints for their violation45 or by leading to better security tests46. The set of classical correlations allowed by n-local models is shown in Fig. 3.

Let us now focus on the quantum violation of these inequalities, by highlighting a few important points. First, inequality (7) makes the explicit assumption that the sources of correlations are independent, thus any implementation of the corresponding causal structure should take that into account. For instance, the first experimental implementations33,34 adopted a single laser in order to generate the two pairs of entangled states, opening a loophole in the quantum violation of inequality (2). To avoid this loophole, as detailed below, in our experimental implementation, we used independent entanglement sources in separated laboratories. The second important point is that, in the star-network, Bob (the central node) has access to n independent physical systems, thus the most general measurement he can perform is a measurement in an entangled basis. In fact, theoretical results showing the activation of nonlocality in such networks31 rely on measurements on a GHZ basis. From the experimental perspective, however, such entangled measurements represent an extremely demanding task, as even measurements on a complete Bell basis cannot be implemented using linear optics, without resorting to hybrid or nonlinear approaches47,48. Nicely, however, it has been shown that the optimal quantum violation of the n-locality inequality can already be achieved if all measurements, including those of the central node in the networks, are made in separable bases22,23,24, thus avoiding the request to synchronize photons from different pairs as needed for projection on Bell basis. In summary, not only one can rely on independent sources but also make the simplest possible measurements to detect nonlocality in complex networks, paving the way of an experimentally scalable approach.

Let us now quantify the quantum violation of the n-locality inequality. By generating singlet entangled states and by performing the measurements reported in the Methods section, the upper bound of inequality (7) is the following:

$${S}_{n}^{k}=k\cos (\pi /2k),$$

that can be shown to be the optimal quantum violation24. We note that such bound does not depend on the number of nodes, n, but only on the number of measurements settings, k.

To experimentally implement the star-network causal structure depicted in Fig. 1d, we exploited the photonic platform of Fig. 2 with four independent polarization-entangled photon pair sources (a detailed description of the sources can be found in Supplementary Note 1). As shown in Fig. 2, three of the sources, that are pumped by different pulsed lasers located in the laboratories 1, 3, and 4, rely on spontaneous parametric down-conversion (SPDC) of type II, achieved through Beta-Barium Borate crystals, which emits degenerate photon pairs at 785 nm. Instead, the fourth source, located in laboratory 2, is pumped in the continuous-wave regime and generates photon pairs at 808 nm. This source scheme exploits a SPDC process of type II in a periodically poled KTP nonlinear crystal, placed into a Sagnac interferometer49. Thus, in our experimental implementation of the star-network (Fig. 1d), we strongly enforce the independence of the sources for the implemented causal structure.

Fig. 2: Experimental apparatus.
figure 2

a Four independent polarization-entangled photon pair sources and five measurement stations are available for the experimental realization of violation of the chained n-locality inequality (7) in a star-network configuration. b Physical location of the laboratories and scheme of the experimental apparatus. Distinct laboratories contain one source and one measurement station each, with the exception of Lab. 1, which also contains the central node B of the star-network on a separate optical table. c The entangled photon sources Λ1Λ3, and  Λ4 are realized using a Beta-Barium Borate (BBO) crystal, pumped in a pulsed regime, which emits photon pairs at 785 nm using spontaneous parametric down-conversion (SPDC) of type II. The source Λ2 instead is pumped in continuous-wave regime and employs a periodically poled KTP crystal placed inside a Sagnac interferometer to generate entangled photon pairs at 808 nm via a type II SPDC process. Single photons are then measured in polarization using a half-wave plate (HWP) followed by a polarizing beam splitter (PBS).

When a pair of photons is generated in each crystal, it is split: one photon is sent to the central node B, while the other remains within the laboratory Ai where it was generated, to be measured locally. The distribution of the shared photons among the nodes was accomplished by exploiting different optical fiber links. The maximum length of the fibers used was 25 m. At the output of each fiber, the polarization of the photon was properly compensated, to counteract unavoidable rotations along the path. In each laboratory, there is a measurement station, where polarization analysis can be performed by rotating a half-wave plate (HWP) placed right before a polarizing beam splitter (PBS). This apparatus allows each party to perform a number k of different projective measurements on their subsystem, since they are all represented by linear combinations of the Pauli matrices σx and σz. Accordingly, to perform the k measurement settings required to test inequality (7), each HWP was rotated to switch up to four different settings, in order to perform all the possible measurement combinations, which, in our star-shaped network, amount to 1024 combinations.

Photons arrival events were registered by single photons detectors (SPD) and a different time-tagger in each laboratory, and immediately sent to a central station where the synchronization and the coincidence detection took place. In particular, two detected photons were considered as simultaneous, provided that they were registered within a time, shorter than a given window. The results presented here were obtained using a coincidence time window of 80 μs, but a quantum violation was also observed for narrower values, up to 0.49 μs (see Supplementary Note 3).

We carried out the experiments for causal structures of star networks scenarios with n = 2, 3, 4 sources, whose independence is enforced by exploiting different independent pump lasers for SPDC processes occurring in dislocated laboratories, as mentioned above. Let us note that our setup relies, inevitably, on the measurement independence assumption, i.e., free choice of inputs measurements, as well as on the lack of correlations among the sources. Both such assumptions, indeed, cannot be enforced by any physical principle, but only be made less plausible as possible. For this reason, as already mentioned, we enforced the independence of the sources by adopting different laser devices, which, furthermore, were not relying on the same electric power source. Moreover, it requires the fair-sampling assumption, analogously to other most relevant experiments dealing with quantum networks6,33,34,35,36. In the end, given that the measurements were not performed providing space-like separation, we are assuming the lack of uncontrolled communication channels among the measurements stages, located in the separated laboratories.

In this framework, we managed to distinguish synchronous events by designing a sophisticated software, keeping track of the generation times of all of the four sources, as detailed in the Supplementary Note 3. On the other hand, by not requiring photons of different sources to interfere, we offered the possibility of using different types of sources within the same network and to have significantly higher generation rates.

Violations of n-locality with k = 2 measurement settings

The scheme previously described allows for the violation of n-locality with k different measurement settings. When considering the particular case of k = 2, the optimal measurement settings to perform at the external nodes and summarized in Eq. (10), are performed by the HWPs at measurement stages before PBS and with angles \({\theta }_{0}^{{\rm{A}}}={0}^{\circ }\) for choice xi = 0 and \({\theta }_{1}^{{\rm{A}}}=22.{5}^{\circ }\) for choice xi = 1. For the central node B, the HWP’s angles that project along states in Eq. (13) are \({\theta }_{0}^{{\rm{B}}}=11.2{5}^{\circ }\) for choice y = 0 and \({\theta }_{1}^{{\rm{B}}}=33.7{5}^{\circ }\) for choice y = 1. The corresponding results for this case are presented in Fig. 3 and can be extended by increasing the number of measurements k. The data in Fig. 3 show that the observed values are incompatible with the classical models for n-locality. Nonetheless, the obtained correlations are still compatible with a LHV model with a single shared source among all parties. To witness the non-classicality of the network correlations, the source independence has to be taken into account. In particular, for n = 2, we measured such parameters exploiting all of the six combinations of pairs among the four sources. The maximum observed value is \({S}_{\max }^{{\rm{obs}}}=1.218\pm 0.002\), violating the classical bound by 109 standard deviations. For n = 3, our setup allows for four triples of sources, achieving \({S}_{\max }^{{\rm{obs}}}=1.199\pm 0.004\), a violation of 50 standard deviations with respect to the classical bound. Finally, for n = 4 we obtained a value \({S}_{\max }^{{\rm{obs}}}=1.192\pm 0.005\), corresponding to a violation of 38 standard deviations. All the results for k = 2 are reported in Table 1.

Fig. 3: Experimental correlations represented in the I1, I2 plane (k = 2 settings).
figure 3

The purple, blue, red, and green regions represent the classical correlations for 1-, 2-, 3-, and 4-local scenarios, respectively. The 2-local case corresponds to the bilocal inequality while the 1-local reduces to the paradigmatic CHSH inequality. For n ≥ 2, the gray line bounds the correlations allowed by a local model with no assumption on sources independence. The green point represents the I1I2 values measured in the case of n = 4 sources. The red, blue, and purple points represent the experimental values for all the possible combination of laboratories which are 4, 6, and 4 in the 3-, 2-, and 1-star cases, respectively. Error bars represent the standard error of the mean taken over different sequential acquisitions.

Table 1 Experimental results for different number of sources n and k = 2 measurement settings.

Violations of n-locality with k > 2 measurement settings

An increasing number of settings provides advantages in DI protocols based on the violation of Bell inequalities37. For that reason, we also consider the violation n-locality chained inequality (7) with an increasing number k of settings. In particular, we violated the 4-locality (n = 4) with up to four different measurement settings corresponding to a total 1024 combinations. Using this apparatus, we were able to violate the n-locality chained inequality (7) for the 2-, 3-, and 4-star-shaped networks scenarios, counting the 4-, 6-, and 8-fold coincidences events, in the case of k = 2, 3, 4 measurement settings. For the case of n = 2 and n = 3, each of these measurements was performed on every pair and triplet of the different four parties, thus allowing for six and four different combinations, respectively. The results for the different cases are presented in Fig. 4 as well as Table 2. For the particular case of n = 4 with k = 4, our results yields S = 3.157 ± 0.002, surpassing the classical limit by 71 standard deviations. The experimental values are fully compatible with the theoretical predictions where the noise of the whole system is taken into account (see Supplementary Note 2). Albeit with our apparatus we cannot close the locality loophole, because we would require an increase of the spatial distance among the parties, we approached such condition as much as possible through a reduction of the time window for the detection of coincidence events. Indeed, we present results also for narrower coincidence windows, up to 0.49 μs, which still allow for significant quantum violations (see Supplementary Note 3). Such reduction of the coincidence window lowers the probability of mutual causal influences among the parties in realistic experimental conditions.

Fig. 4: Experimental violation of the chained Bell inequality (7) for a 2, 3, and 4 sources n, depicted in different colors, and 2, 3, and 4 measurement settings k.
figure 4

Solid and dashed lines represent the classical and quantum bounds in (7), respectively, while dotted lines represent the expected value of the violation for noisy states. Measurement errors are not visible in the plot, numerical values are summarized in Table 2.

Table 2 Experimental results for different number of sources n and measurement settings k.


Bell’s theorem is a conceptual cornerstone in our understanding of quantum theory that, with the rise of quantum information science, has also been turned into a novel tool for information processing. In spite of the key developments over the years in tasks such as quantum cryptography, self-testing, and entanglement certification, generalizations of Bell’s theorem beyond the simple single source scenario, in particular from the experimental point of view, are still an almost uncharted territory. That is precisely the aim of this work, to provide the first experimental implementation of a scalable quantum network consisting of an increasing number of independent entanglement sources, separated laboratories and measurement settings.

Here, we chose to investigate a topology that has received considerable theoretical attention lately, the star-network21,22,23,24,25, with a central node sharing an entangled state with n other peripheral nodes. In particular, we focused on the crucial task of certifying, in a device-independent manner, the presence of non-classical correlations among the nodes of the network. To this aim, we violated the chained n-locality inequality, an extension of the famous chained inequalities44 to the network case. The main strengths of this inequality are its adaptability to consider an increasing numbers of nodes in the network and of measurement settings for each party and also the possibility of achieving maximum quantum violation with separable measurements, a significant experimental advantage. We violated the chained n-locality inequality, thus ensuring the presence of truly non-classical correlations, by considering networks up to five nodes (four independent sources) and that each of the nodes could measure up to four different measurement settings.

In particular, networks of this kind might prove relevant, in the future, for the execution of multipartite protocols such as secret sharing50,51,52. Such task consists in a central node aiming to securely share a message with all the other parties, even if some of the receivers are untrusted. The crucial point, in this work, lies in the experimental realization of a quantum network of five stations, within which, the simultaneous presence of nonlocal correlations is certified. In this context, even though the ideal condition of space-like separated parties is not reached, we approximate such condition, by taking coincidence counts within a small time interval. Let us note that the limits on such interval are given by the rates of the sources. This approximate simultaneity, together with the independent sources, can certainly be considered as a very versatile tool for the future implementation of quantum networks and makes our platform easily adaptable to scenarios like the ones proposed by Lee and Hoban37, that could be applied to cryptographic tasks. Furthermore, for practical purposes and applications, the short time interval, that we adopt to detect simultaneous events, makes eventual communications among the parties less plausible in a plethora of realistic scenarios. To conclude, the novelty of our work stems from the presentation of the prototype of a scalable quantum network, going beyond the bilocality scenario, which allowed, for the first time, the violation of the chained n-locality inequalities. Moreover, the versatility of our platform can be exploited to study networks that are attracting growing attention, like the triangle network30 and the linear chain topology underlying quantum repeaters53.


Measurements performed

All of the four sources generate polarization-entangled pairs of photons in the Bell state \(\left|{\psi }^{-}\right\rangle =(\left|01\right\rangle -\left|10\right\rangle )/\sqrt{2}\). To obtain the maximum quantum violation of inequality (7), \(k\cos (\pi /2k)\), all the peripheral parties Ai must perform the following projective measurements on their subsystem:

$$\left|{\Psi }_{k,x}^{0}\right\rangle =\cos (x\pi /2k)\left|0\right\rangle +\sin (x\pi /2k)\left|1\right\rangle ,$$
$$\left|{\Psi }_{k,x}^{1}\right\rangle =\cos (x\pi /2k)\left|1\right\rangle -\sin (x\pi /2k)\left|0\right\rangle ,$$

for each setting xi = x. In turn, the central node B measures each of its n subsystems in the local basis:

$$\left|{\Phi }_{k,y}^{0}\right\rangle =\cos \frac{(2y+1)\pi }{4k}\left|0\right\rangle +\sin \frac{(2y+1)\pi }{4k}\left|1\right\rangle ,$$
$$\left|{\Phi }_{k,y}^{1}\right\rangle =\cos \frac{(2y+1)\pi }{4k}\left|1\right\rangle -\sin \frac{(2y+1)\pi }{4k}\left|0\right\rangle ,$$

for each setting yi = y, where the index i refers the system Bob shares with the i-th non-central part. The resulting measurement corresponds to \({B}_{y}={B}_{y}^{1}\otimes \cdots \otimes {B}_{y}^{n}\), where \({B}_{y}^{j}\) represent the measurement performed on each subsystem. Hence, to evaluate the quantum violation in (7), we need to perform k2n combinations of measurement settings, 2n for each term Ii appearing in (7).

Experimental details

For the experimental setups of Fig. 2, the three different pump lasers for sources 1, 3, and 4, with λ = 397.5 nm are produced by a second harmonic generation (SHG) process from a Ti:Sapphire mode-locked laser with repetition rate of 76 MHz. Photon pairs entangled in the polarization degree of freedom are generated exploiting type-II SPDC in 2-mm-thick beta-barium borate (BBO) crystals. Source 2, instead, employs a continuous-wave diode laser with wavelength of λ = 404 nm, which pumps a 20-mm-thick periodically poled KTP crystal inside a Sagnac interferometer, to generate photon pairs using a type-II degenerate SPDC process. The photons generated in all the sources are filtered in wavelength and spatial mode by using narrow band interference filters and single-mode fibers, respectively.

Coincidence counting

The photon detection events were collected and timed by a different time-tagger device for each party, located in the corresponding laboratory (see Fig. 2b). For each 1 s of data acquisition the events were sent to a central server, along with a random clock signal shared between all the time-taggers, which was used to synchronize the timestamps of events relative to different devices. To filter out part of the noise the raw data was first pre-processed by keeping only double coincidence events for each photon source, using a narrow coincidence window of 3.24 ns. Then coincidence events between multiple sources were counted every time one of such double coincidence event was recorded for each source in a window of 80 μs.

Data availability

The data that support the findings of this study are available from the corresponding author upon request.

Code availability

All the custom code developed for this study is available from the corresponding author upon request.


  1. Bell, J. S. On the Einstein-Podolsky-Rosen paradox. Physics 1, 195 (1964).

    MathSciNet  Article  Google Scholar 

  2. Hensen, B. et al. Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature 526, 682 (2015).

    ADS  CAS  PubMed  Article  Google Scholar 

  3. Giustina, M. et al. Significant-loophole-free test of Bell’s theorem with entangled photons. Phys. Rev. Lett. 115, 250401 (2015).

    ADS  PubMed  Article  CAS  Google Scholar 

  4. Shalm, L. K. et al. Strong loophole-free test of local realism. Phys. Rev. Lett. 115, 250402 (2015).

    ADS  PubMed  PubMed Central  Article  CAS  Google Scholar 

  5. Rosenfeld, W. et al. Event-ready Bell test using entangled atoms simultaneously closing detection and locality loopholes. Phys. Rev. Lett. 119, 010402 (2017).

    ADS  PubMed  Article  Google Scholar 

  6. B.B.T. Collaboration. Challenging local realism with human choices. Nature 557, 212 (2018).

  7. Gisin, N. & Thew, R. Quantum communication. Nat. Photonics 1, 165 (2007).

    ADS  CAS  Article  Google Scholar 

  8. Buhrman, H., Cleve, R., Massar, S. & De Wolf, R. Nonlocality and communication complexity. Rev. Mod. Phys. 82, 665 (2010).

    ADS  Article  Google Scholar 

  9. Ekert, A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991).

    ADS  MathSciNet  CAS  PubMed  MATH  Article  Google Scholar 

  10. Barrett, J., Hardy, L. & Kent, A. No signaling and quantum key distribution. Phys. Rev. Lett. 95, 010503 (2005).

    ADS  PubMed  Article  CAS  Google Scholar 

  11. Acin, A., Gisin, N. & Masanes, L. From Bell’s theorem to secure quantum key distribution. Phys. Rev. Lett. 97, 120405 (2006).

    ADS  PubMed  MATH  Article  CAS  Google Scholar 

  12. Pironio, S. et al. Random numbers certified by Bell’s theorem. Nature 464, 1021 (2010).

    ADS  CAS  PubMed  Article  Google Scholar 

  13. Liu, Y. et al. High-speed device-independent quantum random number generation without a detection loophole. Phys. Rev. Lett. 120, 010503 (2018).

    ADS  CAS  PubMed  Article  Google Scholar 

  14. Brunner, N. et al. Bell nonlocality. Rev. Mod. Phys. 86, 419–478 (2014).

    ADS  Article  Google Scholar 

  15. Acín, A. et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).

    ADS  PubMed  Article  CAS  Google Scholar 

  16. Vazirani, U. & Vidick, T. Fully device independent quantum key distribution. Commun. ACM 62, 133–133 (2019).

    Article  Google Scholar 

  17. Fu, Y., Yin, H.-L., Chen, T.-Y. & Chen, Z.-B. Long-distance measurement-device-independent multiparty quantum communication. Phys. Rev. Lett. 114, 090501 (2015).

    ADS  PubMed  Article  CAS  Google Scholar 

  18. Wang, X.-L. et al. Experimental ten-photon entanglement. Phys. Rev. Lett. 117, 210502 (2016).

    ADS  PubMed  Article  CAS  Google Scholar 

  19. Kimble, H. J. The quantum internet. Nature 453, 1023 (2008).

    ADS  CAS  PubMed  Article  Google Scholar 

  20. Wehner, S., Elkouss, D. & Hanson, R. Quantum internet: a vision for the road ahead. Science 362, eaam9288 (2018).

    ADS  MathSciNet  PubMed  MATH  Article  CAS  Google Scholar 

  21. Branciard, C., Gisin, N. & Pironio, S. Characterizing the nonlocal correlations created via entanglement swapping. Phys. Rev. Lett. 104, 170401 (2010).

    ADS  CAS  PubMed  Article  Google Scholar 

  22. Branciard, C., Rosset, D., Gisin, N. & Pironio, S. Bilocal versus nonbilocal correlations in entanglement-swapping experiments. Phys. Rev. A 85, 032119 (2012).

    ADS  Article  CAS  Google Scholar 

  23. Tavakoli, A., Skrzypczyk, P., Cavalcanti, D. & Acín, A. Nonlocal correlations in the star-network configuration. Phys. Rev. A 90, 062109 (2014).

    ADS  Article  CAS  Google Scholar 

  24. Andreoli, F. et al. Maximal qubit violation of n-locality inequalities in a star-shaped quantum network. N. J. Phys. 19, 113020 (2017).

    Article  Google Scholar 

  25. Tavakoli, A., Renou, M. O., Gisin, N. & Brunner, N. Correlations in star networks: from Bell inequalities to network inequalities. N. J. Phys. 19, 073003 (2017).

    MathSciNet  Article  Google Scholar 

  26. Gisin, N. et al. All entangled pure quantum states violate the bilocality inequality. Phys. Rev. A 96, 020304 (2017).

    ADS  MathSciNet  Article  Google Scholar 

  27. Fritz, T. Beyond Bell’s theorem II: scenarios with arbitrary causal structure. Commun. Math. Phys. 341, 391–434 (2016).

    ADS  MathSciNet  MATH  Article  Google Scholar 

  28. Chaves, R. Polynomial Bell inequalities. Phys. Rev. Lett. 116, 010402 (2016).

    ADS  MathSciNet  PubMed  MATH  Article  CAS  Google Scholar 

  29. Canabarro, A., Brito, S. & Chaves, R. Machine learning nonlocal correlations. Phys. Rev. Lett. 122, 200401 (2019).

    ADS  CAS  PubMed  Article  Google Scholar 

  30. Renou, M.-O. et al. Genuine quantum nonlocality in the triangle network. Phys. Rev. Lett. 123, 140401 (2019).

    ADS  MathSciNet  CAS  PubMed  Article  Google Scholar 

  31. Cavalcanti, D., Almeida, M. L., Scarani, V. & Acin, A. Quantum networks reveal quantum nonlocality. Nat. Commun. 2, 184 (2011).

    ADS  PubMed  Article  CAS  Google Scholar 

  32. Pozas-Kerstjens, A. et al. Bounding the sets of classical and quantum correlations in networks. Phys. Rev. Lett. 123, 140503 (2019).

    ADS  MathSciNet  CAS  PubMed  Article  Google Scholar 

  33. Carvacho, G. et al. Experimental violation of local causality in a quantum network. Nat. Commun. 8, 14775 (2017).

    ADS  CAS  PubMed  PubMed Central  Article  Google Scholar 

  34. Saunders, D. J., Bennet, A. J., Branciard, C. & Pryde, G. J. Experimental demonstration of nonbilocal quantum correlations. Sci. Adv. 3, e1602743 (2017).

    ADS  PubMed  PubMed Central  Article  Google Scholar 

  35. Andreoli, F. et al. Experimental bilocality violation without shared reference frames. Phys. Rev. A 95, 062315 (2017).

    ADS  Article  Google Scholar 

  36. Sun, Q.-C. et al. Experimental demonstration of non-bilocality with truly independent sources and strict locality constraints. Nat. Photonics 13, 687–691 (2019).

    ADS  CAS  Article  Google Scholar 

  37. Lee, C. M. & Hoban, M. J. Towards device-independent information processing on general quantum networks. Phys. Rev. Lett. 120, 020504 (2018).

    ADS  MathSciNet  CAS  PubMed  Article  Google Scholar 

  38. Carvacho, G., Chaves, R. & Sciarrino, F. Perspective on experimental quantum causality. EPL (Europhys. Lett.) 125, 30001 (2019).

    ADS  Article  CAS  Google Scholar 

  39. Pearl, J. Causality (Cambridge University Press, 2009).

  40. Wood, C. J. & Spekkens, R. W. The lesson of causal discovery algorithms for quantum correlations: Causal explanations of Bell-inequality violations require fine-tuning. N. J. Phys. 17, 033002 (2015).

    Article  Google Scholar 

  41. Chaves, R., Kueng, R., Brask, J. B. & Gross, D. Unifying framework for relaxations of the causal assumptions in Bell’s theorem. Phys. Rev. Lett. 114, 140403 (2015).

    ADS  CAS  PubMed  Article  Google Scholar 

  42. Chaves, R. et al. Quantum violation of an instrumental test. Nat. Phys. 14, 291 (2018).

    ADS  CAS  Article  Google Scholar 

  43. Polino, E. et al. Device-independent test of a delayed choice experiment. Phys. Rev. A 100, 022111 (2019).

    ADS  CAS  Article  Google Scholar 

  44. Braunstein, S. L. & Caves, C. M. Wringing out better Bell inequalities. Ann. Phys. 202, 22–56 (1990).

    ADS  MATH  Article  Google Scholar 

  45. Vértesi, T., Pironio, S. & Brunner, N. Closing the detection loophole in Bell experiments using qudits. Phys. Rev. Lett. 104, 060401 (2010).

    ADS  PubMed  Article  CAS  Google Scholar 

  46. Masanes, L., Pironio, S. & Acín, A. Secure device-independent quantum key distribution with causally independent measurement devices. Nat. Commun. 2, 238 (2011).

    ADS  PubMed  Article  CAS  Google Scholar 

  47. Vaidman, L. & Yoran, N. Methods for reliable teleportation. Phys. Rev. A 59, 116–125 (1999).

    ADS  CAS  Article  Google Scholar 

  48. Lütkenhaus, N., Calsamiglia, J. & Suominen, K.-A. Bell measurements for teleportation. Phys. Rev. A 59, 3295–3300 (1999).

    ADS  MathSciNet  Article  Google Scholar 

  49. Kim, T., Fiorentino, M. & Wong, F. N. Phase-stable source of polarization-entangled photons using a polarization Sagnac interferometer. Phys. Rev. A 73, 012316 (2006).

    ADS  Article  CAS  Google Scholar 

  50. Blakley, G. R. Safeguarding cryptographic keys. In 1979 International Workshop on Managing Requirements Knowledge (MARK) 313–318 (IEEE, 2006).

  51. Shamir, A. Safeguarding cryptographic keys. Commun. ACM 22, 612–613 (1979).

    Article  Google Scholar 

  52. Beimel, A. Secret-sharing schemes: a survey. In International Conference on Coding and Cryptology 11–46 (Springer, 2011).

  53. Briegel, H.-J., Dür, W., Cirac, J. I. & Zoller, P. Quantum repeaters: the role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932 (1998).

    ADS  CAS  Article  Google Scholar 

Download references


We thank F. Andreoli for useful discussions. This work was supported by The John Templeton Foundation via the grant Q-CAUSAL No. 61084, by MIUR (Ministero dell’Istruzione, dell’Università e della Ricerca), via project PRIN 2017 “Taming complexity via QUantum Strategies a Hybrid Integrated Photonic approach” (QUSHIP) Id. 2017SRNBRK, by Sapienza Progetto di Ateneo H2020-ERC QUMAC (MAChine learning via hybrid integrated QUANTUM photonics), by the Regione Lazio program “Progetti di Gruppi di ricerca” legge Regionale n. 13/2008 (SINFONIA project, prot. n. 85-2017-15200) via LazioInnova spa, and by the QuantERA ERA-NET Cofund in Quantum Technologies 2017 project HiPhoP (High dimensional quantum Photonic Platform, projectID 731473). R.C. also acknowledges the Brazilian ministries MEC and MCTIC, CNPq (Grants No. 307172/2017-1 and No. 406574/2018-9 and INCT-IQ) and the Serrapilheira Institute (grant number Serra-1708-15763). G.C. thanks Becas Chile and Conicyt.

Author information

Authors and Affiliations



D.P., I.A., G.C., R.C., and F.S. Conceived the experiment; D.P., I.A., G.M., E.P., T.G., A.S., M.V., G.M.I., N.S., G.C., and F.S. devised and performed the experiment; D.P., G.M., I.A., E.P., N.S., G.C., R.C., and F.S. performed the data analysis; all the authors discussed the results and contributed to the writing of the paper.

Corresponding author

Correspondence to Fabio Sciarrino.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Peer review information Nature Communications thanks Nicolas Brunner and the other anonymous reviewer(s) for their contribution to the peer review of this work. Peer reviewer reports are available.

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Poderini, D., Agresti, I., Marchese, G. et al. Experimental violation of n-locality in a star quantum network. Nat Commun 11, 2467 (2020).

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI:


By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.


Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing