Trading symmetry for Hilbert-space dimension in Bell-inequality violation

Hsin-Yu Hsu Department of Physics and Center for Quantum Frontiers of Research & Technology (QFort), National Cheng Kung University, Tainan 701, Taiwan    Gelo Noel M. Tabia Hon Hai (Foxconn) Research Institute, Taipei, Taiwan Department of Physics and Center for Quantum Frontiers of Research & Technology (QFort), National Cheng Kung University, Tainan 701, Taiwan Physics Division, National Center for Theoretical Sciences, Taipei 106319, Taiwan    Kai-Siang Chen Department of Physics and Center for Quantum Frontiers of Research & Technology (QFort), National Cheng Kung University, Tainan 701, Taiwan    Mu-En Liu Université Paris-Saclay, CEA, CNRS, Institut de physique théorique, 91191, Gif-sur-Yvette, France Department of Physics and Center for Quantum Frontiers of Research & Technology (QFort), National Cheng Kung University, Tainan 701, Taiwan    Tamás Vértesi HUN-REN Institute for Nuclear Research, P.O. Box 51, H-4001 Debrecen, Hungary    Nicolas Brunner Department of Applied Physics, University of Geneva, 1211 Geneva 4, Switzerland    Yeong-Cherng Liang [email protected] Department of Physics and Center for Quantum Frontiers of Research & Technology (QFort), National Cheng Kung University, Tainan 701, Taiwan Physics Division, National Center for Theoretical Sciences, Taipei 106319, Taiwan Perimeter Institute for Theoretical Physics, Waterloo, Ontario, Canada, N2L 2Y5
(January 7, 2026)
Abstract

In quantum information, asymmetry, i.e., the lack of symmetry, is a resource allowing one to accomplish certain tasks that are otherwise impossible. Similarly, in a Bell test using any given Bell inequality, the maximum violation achievable using quantum strategies respecting or disregarding a certain symmetry can be different. In this work, we focus on the symmetry involved in the exchange of parties and explore when we have to trade this symmetry for a lower-dimensional quantum strategy in achieving the maximal violation of given Bell inequalities. For the family of symmetric Collins-Gisin-Linden-Massar-Popescu inequalities, we provide evidence showing that there is no such trade-off. However, for several other Bell inequalities with a small number of dichotomic measurement settings, we show that symmetric quantum strategies in the minimal Hilbert space dimension can only lead to a suboptimal Bell violation. In other words, there exist symmetric Bell inequalities that can only be maximally violated by asymmetric quantum strategies of minimal dimension. In contrast, one can also find examples of asymmetric Bell inequalities that are maximally violated by symmetric correlations. The implications of these findings on the geometry of the set of quantum correlations and the possibility of performing self-testing therefrom are briefly discussed.

I Introduction

Quantum nonlocality, i.e., the quantum violation of a Bell inequality [1], manifests that quantum theory is incompatible with the notion of local causality [2]. In particular, no local-hidden-variable (LHV) theory can reproduce all quantum correlations (measurement statistics) appearing in a Bell experiment. Apart from its foundational significance, the possibility of device-independent [3, 4] (DI) quantum information processing (QIP) also arises as an important byproduct of investigating the general phenomenon of Bell nonlocality [4]. Notable examples of DIQIP protocols include quantum key distribution [5, 6, 7, 8], randomness expansion [9, 10], and various possibilities of black-box certification (see, e.g., [4, 11, 12, 13, 14, 15, 16, 17]).

Although the discussion of Bell nonlocality often centers around the lowest-dimensional qubit systems, the Bell violation of higher-dimensional (HD) quantum states has also been explored both theoretically [18, 19, 20, 21, 22, 23, 24, 25, 26, 27] and experimentally [28, 29, 30, 31]. In fact, it has long been recognized that HD quantum systems can lead to a stronger violation, and hence better resistance to (white) noise [18, 19, 20] and losses [25]. The local Hilbert space dimensions (HSDs) of the shared state, which reflect the complexity of the underlying degrees of freedom, thus serve as a resource for demonstrating Bell nonlocality.

However, for any Bell inequality, there is usually a finite-dimensional quantum strategy (QS)—consisting of the state shared by distant observers and their choice of local measurements—that can attain the maximal violation allowed in quantum theory. For example, it suffices [32] to consider qubits in maximizing the violation of any Bell inequality involving only two binary-outcome local measurements. The general problem of determining the minimal HSD required, nevertheless, is highly nontrivial, see, e.g., [33, 34, 35].

In the case when a Bell inequality comes with a certain symmetry, such as being party-permutation-invariant (PPI) [36, 37, 12, 38, 39], the task of finding its maximal quantum violation can be simplified [40] by considering only quantum correlations, and hence QSs that respect the same symmetry. In particular, when combined with a semidefinite programming (SDP) characterization of the quantum set of correlations [41], either with [42, 43, 44, 45] or without [46, 47, 48, 40] a dimension constraint, the above observation leads to a significant reduction [40, 49, 50, 51] in the number of optimization parameters. In finding an explicit QS that realizes this maximal violation, note, however, that this reduction to symmetry QSs may come at a price of an increase [40] in the required HSD.

Will it be possible to enjoy this symmetry reduction while keeping the required QS at its minimal HSD? Notice that correlations respecting any given symmetry represent a strict subset of all possible correlations. In this context, asymmetry is evidently a resource for Bell-inequality violation. Hence, if the answer to this question is negative for any given Bell inequality, there exists a trade-off between two kinds of resources—HSD and asymmetry—that one may employ to maximize its quantum violation. Here, we systematically explore and answer this question for Bell inequalities defined in several bipartite Bell scenarios, including those with binary outcomes and up to four alternative measurements, as well as those with an arbitrary number of outcomes but only binary measurement choices.

We structure the rest of this paper as follows. In Section˜II, we introduce our notations, recapitulate essential notions of Bell nonlocality [4], and provide a more formal explanation of the notion of a minimal QS. After that, in Section˜III, we introduce the various definitions related to the symmetry of PPI and remind specifically in Section˜III.2 how a QS giving rise to a symmetric correlation can always be converted into a purified, symmetric QS. Examples of Bell inequalities that can be maximally violated using a symmetric QS in the minimal dimension are then provided in Section˜IV. In contrast, examples where a trade-off exists are presented in Section˜V. In Section˜VI, we give a general discussion of asymmetric QSs giving rise to symmetric correlations. Then, we discuss in Section˜VII the implications of some of these examples on the geometry of the set of quantum correlations and self-testing. Finally, we conclude in Section˜VIII. We provide further details about the numerical methods employed in appendix˜A and other miscellaneous results in appendix˜B.

II Preliminaries

II.1 Correlations in Bell scenarios

Consider the bipartite Bell scenario (2,m,n)(2,m,n), in which two parties, Alice and Bob, can both perform mm measurements, each resulting in nn outcomes. Let [n]:={0,1,,n1}[n]:=\{0,1,\cdots,n-1\}. We label Alice’s and Bob’s settings by x,y[m]x,y\in[m] and their outcomes by a,b[n]a,b\in[n], respectively. The statistics of a Bell test yield the joint probability distribution (or correlation) PAB={PAB(a,b|x,y)}\vec{P}_{\rm AB}=\{P_{\rm AB}(a,b|x,y)\}, which manifests how well their measurement outcomes correlate. Throughout, when there is no risk of confusion, the subscripts AB will be omitted for simplicity.

We say that a correlation is Bell-local (hereafter abbreviated as local) if it admits an LHV description [1]:

PAB(a,b|x,y)=λq(λ)fA(a|x,λ)fB(b|y,λ),P_{\rm AB}(a,b|x,y)\overset{\mathcal{L}}{=}\sum_{\lambda}q(\lambda)f_{\rm A}(a|x,\lambda)f_{\rm B}(b|y,\lambda), (1)

where λ\lambda is the local-hidden variable (equivalently, shared randomness), q(λ)q(\lambda) is its distribution weight, and fi(|,λ)=0,1f_{i}(\cdot|\cdot,\lambda)=0,1 with i{A,B}i\in\{A,B\} are local response functions. Note that \mathcal{L}—the set of local correlations—forms a convex polytope, called the Bell polytope, which consists of finitely many extreme points, each corresponding to a local deterministic strategy.

When the outcomes are binary, i.e., n=2n=2, we can also conveniently express a correlation P\vec{P} through the expectation values (or correlators) Ax\langle A_{x}\rangle, By\langle B_{y}\rangle, and AxBy\langle A_{x}B_{y}\rangle, defined as:

Ax=a=0,1(1)aPA(a|x),By=b=0,1(1)bPB(b|y),\displaystyle\langle A_{x}\rangle=\sum_{a=0,1}(-1)^{a}P_{\rm A}(a|x),\,\,\langle B_{y}\rangle=\sum_{b=0,1}(-1)^{b}P_{\rm B}(b|y), (2)
AxBy=a,b=0,1(1)a+bPAB(a,b|x,y),\displaystyle\langle A_{x}B_{y}\rangle=\sum_{a,b=0,1}(-1)^{a+b}P_{\rm AB}(a,b|x,y),

where AxA_{x} (ByB_{y}) is the outcome of Alice (Bob) for her (his) xx-th (yy-th) measurement, while PAP_{\rm A} and PBP_{\rm B} are obtained from PABP_{\rm AB} via the marginalization over BB and AA, respectively. For example, PA(a|x)=bPAB(a,b|x,y)P_{\rm A}(a|x)=\sum_{b}P_{\rm AB}(a,b|x,y) for all a,xa,x.

In contrast with those compatible with an LHV description, a correlation P\vec{P} is said to be quantum if it arises from locally measuring a shared quantum state ρAB\rho_{\rm AB}, say, acting on DD\mathbb{C}^{D}\otimes\mathbb{C}^{D}. Explicitly, a quantum correlation P\vec{P} associated with a quantum strategy (QS)

𝔔={ρAB,{Ma|xA}a,x,{Mb|yB}b,y}\mathfrak{Q}=\{\rho_{\rm AB},\{M_{a|x}^{A}\}_{a,x},\{M_{b|y}^{B}\}_{b,y}\} (3)

of local HSD upper bounded by DD may be computed from Born’s rule as:

PAB(a,b|x,y)=𝒬tr(ρABMa|xAMb|yB).P_{\rm AB}(a,b|x,y)\overset{\mathcal{Q}}{=}\mathrm{tr}(\rho_{\rm AB}M_{a|x}^{A}\otimes M_{b|y}^{B}). (4)

Here, {Ma|xA}a\{M_{a|x}^{A}\}_{a} (respectively {Mb|yB}b\{M_{b|y}^{B}\}_{b}) is a positive operator-valued measure (POVM) for Alice’s xx-th (Bob’s yy-th) measurement, i.e., aMa|xA=𝕀D\sum_{a}M_{a|x}^{A}=\mathbb{I}_{D} and Ma|xA0M_{a|x}^{A}\succeq 0 for all a,xa,x where 𝕀D\mathbb{I}_{D} is the identity operator acting on D\mathbb{C}^{D}. Henceforth, we denote by 𝒬\mathcal{Q} the set of quantum correlations (for any given Bell scenario). A celebrated discovery by Bell [1] is that not all P𝒬\vec{P}\in\mathcal{Q} can be cast in the form of Eq.˜1, viz. some quantum P\vec{P} lies outside of \mathcal{L}.

Mathematically, a Bell polytope \mathcal{L} can equivalently be described in terms of a minimal set of halfspaces, called Bell inequalities. In the (2,m,n)(2,m,n) Bell scenario, a general linear Bell inequality reads as:

Iβ=βP=x,y=0m1a,b=0n1βabxyPAB(a,b|x,y)LβI_{\vec{\beta}}=\vec{\beta}\cdot\vec{P}=\sum_{x,y=0}^{m-1}\sum_{a,b=0}^{n-1}\beta_{ab}^{xy}P_{\rm AB}(a,b|x,y)\overset{\mathcal{L}}{\leq}L_{\vec{\beta}} (5)

where β={βabxy}\vec{\beta}=\{\beta_{ab}^{xy}\} is a vector of real coefficients that determine the corresponding local bound LβL_{\vec{\beta}}. By definition, a Bell inequality, cf. Eq.˜5, is satisfied by all P\vec{P}\in\mathcal{L}. Hence, the fact that a P\vec{P}\not\in\mathcal{L}, i.e., the correlation P\vec{P} is nonlocal, can be witnessed from its violation of a Bell inequality.

As an explicit example, recall from [52] the simplest nontrivial Bell inequality, i.e., the CHSH Bell inequality, which admits a PPI form:

ICHSH=x,y=01a,b=01(1)xy+a+bPAB(a,b|x,y)2.I_{\text{CHSH}}=\sum_{x,y=0}^{1}\sum_{a,b=0}^{1}(-1)^{xy+a+b}P_{\rm AB}(a,b|x,y)\overset{\mathcal{L}}{\leq}2. (6)

Often, this is also written, in the notations of Eq.˜2, as

ICHSH=A0B0+A0B1+A1B0A1B12.\displaystyle I_{\text{CHSH}}=\langle A_{0}B_{0}\rangle+\langle A_{0}B_{1}\rangle+\langle A_{1}B_{0}\rangle-\langle A_{1}B_{1}\rangle\overset{\mathcal{L}}{\leq}2. (7)

II.2 Minimal QS for maximal quantum violation

For any given Bell inequality II, it is natural to wonder the extent to which it can be violated quantum-mechanically and identify the QSs that result in this maximal violation. In particular, from a resource-theoretic perspective, it is of interest to determine the minimal, i.e., the smallest local HSD dmd_{\text{m}} capable of realizing such a quantum violation. For concreteness, we refer to any QS in dmd_{\text{m}} that realizes the maximal quantum violation of a Bell inequality as a minimal maximizing QS, which we denote by 𝔔dm\mathfrak{Q}^{*}_{d_{\text{m}}}.

For example, for Bell inequalities defined in an (N,2,2)(N,2,2) Bell scenario (with NN being any integer larger than or equal to 22), it is known [32] that dm=2d_{\text{m}}=2 and we may take 𝔔dm\mathfrak{Q}^{*}_{d_{\text{m}}} to be an NN-qubit pure state along with projection-valued measures (PVMs), i.e., projective measurements. In particular, a well-known two-qubit strategy achieving the maximal violation of the CHSH Bell inequality [52] of Eq.˜7 consists of the following state and observables:

|Φ+AB=12[|00+|11],A^0=σz,A^1=σx,B^k=12[σz+(1)kσx],k=0,1,\begin{gathered}\ket{\Phi^{+}}_{\rm AB}=\frac{1}{\sqrt{2}}[{\ket{00}}+\ket{11}],\\ \hat{A}_{0}=\sigma_{z},\quad\hat{A}_{1}=\sigma_{x},\\ \hat{B}_{k}=\frac{1}{\sqrt{2}}\big[\sigma_{z}+(-1)^{k}\sigma_{x}\big],\quad k=0,1,\end{gathered} (8)

where σi\sigma_{i} with i{x,y,z}i\in\{x,y,z\} are Pauli matrices, while A^x\hat{A}_{x} and B^y\hat{B}_{y} are Alice’s xx-th and Bob’s yy-th observable, which are related to their POVMs by A^x=a(1)aMa|xA\hat{A}_{x}=\sum_{a}(-1)^{a}M^{A}_{a|x} and B^y=b(1)bMb|yB\hat{B}_{y}=\sum_{b}(-1)^{b}M^{B}_{b|y}.

Beyond CHSH, surprisingly little is known about the dmd_{\text{m}} of various Bell inequalities. Results from [21], [47], and [51] show that for the family of CGLMP inequalities [20] IdI_{d} with integer d8d\leq 8, their minimal dimension dmdd_{\text{m}}\leq d. For the specific case of d=3d=3, a dimension bound deduced from a negativity [53] lower bound [40] further shows that this bound is tight, likewise for the cases of d=4d=4 and 55, as we show in Section˜B.1.2.

On the other hand, for the I3322I_{3322} inequality from [54], its dmd_{\text{m}} could well be infinite, see [34]. Beyond these, the maximal Bell violation of various other Bell inequalities in the bipartite [33, 24, 30, 55] and multipartite [56] Bell scenarios has also been investigated. Again, each explicit QS attaining the quantum maximum provides an upper bound on the corresponding dmd_{\text{m}}. Some other, more general upper bounds on dmd_{\text{m}} have also been recently established in [35].

III The symmetry of party-permutation invariance

In Moroder et al. [40], it has been shown that any PPI quantum correlation can always be realized by a QS involving a PPI state and the same set of local measurements performed by each party. Consequently, when there is no restriction in HSD, the maximal quantum violation of a PPI Bell inequality is always attainable [40] using a PPI QS. In this section, we introduce several definitions pertaining to the symmetry of PPI, which is the only symmetry considered in this work.

III.1 Symmetric correlations, Bell inequalities, and strategies

Definition 1 (Symmetric correlation).

A correlation PAB\vec{P}_{\rm AB} arising from a bipartite scenario is said to be symmetric if it remains invariant under the exchange of parties, AB{\rm A}\leftrightarrow{\rm B}, i.e., the simultaneous exchange of the parties’ settings xyx\leftrightarrow y and outcomes aba\leftrightarrow b:

PAB(a,b|x,y)=PAB(b,a|y,x),a,b,x,y.P_{\rm AB}(a,b|x,y)=P_{\rm AB}(b,a|y,x),\quad\forall\,\,a,b,x,y. (9)
Definition 2 (Symmetric Bell inequality).

Consider a Bell inequality, cf. Eq.˜5, characterized by the coefficients, β={βxyab}\vec{\beta}=\{\beta^{ab}_{xy}\}. We say that a Bell inequality is symmetric if the coefficients satisfy

βxyab=βyxba,\displaystyle\beta^{ab}_{xy}=\beta^{ba}_{yx}, a,b,x,y.\displaystyle\forall\,\,a,b,x,y. (10)

Throughout, we use P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}} (β\vec{\beta}_{\scalebox{0.6}{$\leftrightarrow$}}) to denote a symmetric correlation (Bell inequality) whenever we want to emphasize that it satisfies Eq.˜9 [Eq.˜10]. Notably, synchronous correlations [57] arising from the maximally entangled states [58] are symmetric. Synchronous correlations are characterized by the extra constraint: PAB(a,ba|x,x)=0,xP_{\rm AB}(a,b\neq a|x,x)=0,\forall\,\,x, which means that in the context of a nonlocal game [59], the two players must return the same answer upon receiving identical inputs.

Let us now recall from [40, Proposition 1] a particular kind of QSs that yield a symmetric correlation P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}}.

Definition 3 (Symmetric quantum strategy).

In a bipartite Bell scenario, a symmetric QS (abbreviated as SQS), is a QS where both parties perform the same measurements (i.e., Ma|xB=Ma|xAM^{B}_{a|x}=M^{A}_{a|x} \forall a,xa,x) on a shared PPI state ρBA=ρAB\rho_{\rm BA}=\rho_{\rm AB}, where

ρBA:=SρABS,\rho_{\rm BA}:=S\rho_{\rm AB}S^{\dagger}, (11)

and

S:=ij|ij|A|ji|BS:=\sum_{ij}\outerproduct{i}{j}_{\text{A}}\otimes\outerproduct{j}{i}_{\text{B}} (12)

is the swap (unitary) operator and {|i}i\{\ket{i}\}_{i} is an orthonormal set of basis vectors.

From Eq.˜4 and Definition˜3, one can see that an SQS must give rise to a symmetric quantum correlation P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}}:

PAB(a,b|x,y)\displaystyle P_{\rm AB}(a,b|x,y) =tr(ρABMa|xAMb|yB)\displaystyle=\mathrm{tr}(\rho_{\rm AB}M_{a|x}^{A}\otimes M_{b|y}^{B}) (13)
=tr(SρABSSMa|xAMb|yBS)\displaystyle=\mathrm{tr}(S\rho_{\rm AB}S^{\dagger}SM_{a|x}^{A}\otimes M_{b|y}^{B}S^{\dagger})
=tr(ρBAMb|yBMa|xA)\displaystyle=\mathrm{tr}(\rho_{\rm BA}M_{b|y}^{B}\otimes M_{a|x}^{A})
=tr(ρABMb|yAMa|xB)\displaystyle=\mathrm{tr}(\rho_{\rm AB}M_{b|y}^{A}\otimes M_{a|x}^{B})
=PAB(b,a|y,x),\displaystyle=P_{\rm AB}(b,a|y,x),

where we have used the unitarity of SS and the cyclic property of trace to arrive at the second equality, Eqs.˜11 and 12 to arrive at the third equality, and Definition˜3 to arrive at the fourth equality. Thus, an SQS yields a symmetric correlation, cf. Definition˜1.

Nevertheless, a P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}} is not necessarily realized by an SQS. For example, the maximal-CHSH-violating two-qubit strategy of Eq.˜8—with the two parties performing different measurements—is clearly not symmetric, even though it gives the evidently symmetric Tsirelson correlation PT\vec{P}_{T} [60]:

PT{PAB(a,b|x,y)=14[1+(1)xy+a+b2]},\vec{P}_{T}\coloneqq\left\{P_{\rm AB}(a,b|x,y)=\frac{1}{4}\left[1+\frac{(-1)^{xy+a+b}}{\sqrt{2}}\right]\right\}, (14)

III.2 Symmetrization and purification of a QS

While a symmetric quantum correlation P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}} need not originate from an SQS, when there is no restriction in the Hilbert space dimension, any asymmetric QS giving a symmetric correlation can always be transformed into an SQS producing the same P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}}. We now recall from [40] such a transformation. Given an arbitrary 𝔔={ρAB,{Ma|xA}a,x,{Mb|yB}b,y}\mathfrak{Q}=\{\rho_{\rm AB},\{M_{a|x}^{A}\}_{a,x},\{M_{b|y}^{B}\}_{b,y}\} realizing a symmetric correlation, its symmetrized version

𝔔lrvec:={ρlrvecAB,{Na|x}a,x,{Nb|y}b,y}\lrvec{\mathfrak{Q}}:=\{\lrvec{\rho}_{\rm AB},\{N_{a|x}\}_{a,x},\{N_{b|y}\}_{b,y}\} (15)

can be constructed by introducing ancillary projectors {|00|,|11|}\{\outerproduct{0}{0},\outerproduct{1}{1}\} associated with each party (see [40, Eqs. (17,18)]):

ρlrvecAB\displaystyle\lrvec{\rho}_{\rm AB} =12[ρAB|01AB01|+ρBA|10AB10|],\displaystyle=\frac{1}{2}\left[\rho_{\rm AB}\otimes\ket{01}_{{\rm A}^{\prime}{\rm B}^{\prime}}\!\bra{01}+\rho_{\rm BA}\otimes\ket{10}_{{\rm A}^{\prime}{\rm B}^{\prime}}\!\bra{10}\right],
Na|x\displaystyle N_{a|x} =Ma|xA|00|+Ma|xB|11|,\displaystyle=M_{a|x}^{A}\otimes\outerproduct{0}{0}+M_{a|x}^{B}\otimes\outerproduct{1}{1}, (16)

where A{\rm A}^{\prime} (B{\rm B}^{\prime}) is a label of Alice’s (Bob’s) ancillary space. By construction, both parties employ the same POVMs given by {Na|x}a|x\{N_{a|x}\}_{a|x}, whilst the PPI nature of ρlrvecAB\lrvec{\rho}_{\rm AB} can also be straightforwardly verified. To see that both 𝔔\mathfrak{Q} and 𝔔lrvec\lrvec{\mathfrak{Q}} give the same symmetric correlation, let us denote by PlrvecAB(a,b|x,y)\lrvec{P}_{\rm AB}(a,b|x,y) components of the correlation arising from Eq.˜15 and notice from Eqs.˜4 and III.2 that

PlrvecAB(a,b|x,y)=tr[(Na|xNb|y)ρlrvecAB]\displaystyle\lrvec{P}_{\rm AB}(a,b|x,y)=\ \mathrm{tr}\Big[\big(N_{a|x}\otimes N_{b|y}\big)\lrvec{\rho}_{\rm AB}\Big] (17)
=\displaystyle= 12tr[(Ma|xAMb|yB)ρAB+(Ma|xBMb|yA)ρBA]\displaystyle\frac{1}{2}\mathrm{tr}\Big[\big(M^{A}_{a|x}\otimes M^{B}_{b|y}\big)\rho_{\rm AB}+\big(M^{B}_{a|x}\otimes M^{A}_{b|y}\big)\rho_{\rm BA}\Big]
=\displaystyle= PAB(a,b|x,y)+PAB(b,a|y,x)2=PAB(a,b|x,y),\displaystyle\frac{P_{\rm AB}(a,b|x,y)+P_{\rm AB}(b,a|y,x)}{2}=P_{\rm AB}(a,b|x,y),

where the last equality follows from the assumed symmetry of P\vec{P}. Thus, this symmetrization embeds the original 𝔔\mathfrak{Q} acting on \mathcal{H}\otimes\mathcal{H} to an SQS acting on [2][2][\mathcal{H}\otimes\mathbb{C}^{2}]\otimes[\mathcal{H}\otimes\mathbb{C}^{2}], doubling the original local HSD, while preserving the produced correlation P\vec{P}. Importantly, as we see below, the symmetrization of a QS may also be achieved, in some cases, via a local unitary transformation.

Quantum Strategy (QS):𝔔\mathfrak{Q}, cf. Eq.˜3Purified QS:𝔔\mathfrak{Q}^{\prime}, cf. Eq.˜18Symmetric QS:𝔔lrvec\lrvec{\mathfrak{Q}}, cf. Eq.˜15Purified, symmetric QS:𝔔~\tilde{\mathfrak{Q}}, cf. Eq.˜19Dilation [61]+ PurificationSymmetrization [40]Section˜III.2Dilation [61]+ Purification [62]SymmetrizationEq.˜20UU:Local unitary
Figure 1: Schematic showing different pathways to obtain a purified, symmetric quantum strategy (PSQS) 𝔔~\tilde{\mathfrak{Q}} from any quantum strategy (QS) 𝔔\mathfrak{Q} producing a symmetric correlation P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}}. In general, this involves performing step 1. Naimark dilation + purification (horizontal solid arrow), and 2. symmetrization (vertical solid arrow) in either order. In both cases, the local HSD is at least doubled. However, if the initial strategy 𝔔\mathfrak{Q} consists of a pure state and PVMs, it may even be possible to obtain a PSQS via a local unitary transformation (dashed arrow), which preserves the local HSD: an example being the transformation of the strategy of Eq.˜8 to that of Eq.˜21.

On the other hand, it is also well-known that for any given 𝔔\mathfrak{Q} realizing a correlation P\vec{P}, one can obtain, through Naimark dilation ([61, Section 9]) and quantum state purification, a purified QS (PQS)

𝔔={|ψABψ|,{Πa|xA}a,x,{Πb|yB}b,y},(Πa|xA)2=Πa|xAa,x,(Πb|yB)2=Πb|yBb,y,\begin{gathered}\mathfrak{Q}^{\prime}=\{\ket{\psi}_{\rm AB}\bra{\psi},\{\Pi_{a|x}^{A}\}_{a,x},\{\Pi_{b|y}^{B}\}_{b,y}\},\\ (\Pi_{a|x}^{A})^{2}=\Pi_{a|x}^{A}\,\,\forall\,\,a,x,\quad(\Pi_{b|y}^{B})^{2}=\Pi_{b|y}^{B}\,\,\forall\,\,b,y,\end{gathered} (18)

that realizes P\vec{P}. In particular, if the state defined in 𝔔\mathfrak{Q} is a (multipartite) PPI density operator, one can follow the method described in [62, Section 4.2] to purify it into a pure state lying in the symmetric subspace. Hence, by concatenating the symmetrization procedure of [40] and the purification procedure, one can always obtain a purified SQS (PSQS) realizing any given P𝒬\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}}\in\mathcal{Q}. Alternatively, from 𝔔\mathfrak{Q}^{\prime}, we can also obtain a PSQS

𝔔~:={|ϕ~ABϕ|~,{Π~a|x}a,x,{Π~b|y}b,y}\tilde{\mathfrak{Q}}:=\{\tilde{\ket{\phi}}_{\rm AB}\tilde{\bra{\phi}},\{\tilde{\Pi}_{a|x}\}_{a,x},\{\tilde{\Pi}_{b|y}\}_{b,y}\} (19)

via

|ϕ~AB\displaystyle\tilde{\ket{\phi}}_{\rm AB} =12[|ψAB|01AB+|ψBA|10AB],\displaystyle=\frac{1}{\sqrt{2}}\left[\ket{\psi}_{\rm AB}\ket{01}_{{\rm A}^{\prime}{\rm B}^{\prime}}+\ket{\psi}_{\rm BA}\ket{10}_{{\rm A}^{\prime}{\rm B}^{\prime}}\right], (20)
Π~a|x\displaystyle\tilde{\Pi}_{a|x} =Πa|xA|00|+Πa|xB|11|.\displaystyle=\Pi_{a|x}^{A}\otimes\outerproduct{0}{0}+\Pi_{a|x}^{B}\otimes\outerproduct{1}{1}.

Hence, we have shown that the following Proposition holds.

Proposition 1.

In a bipartite Bell scenario, a symmetric correlation, cf. Definition˜1, can always be realized using an SQS consisting of a PPI bipartite pure state and with both parties performing the same local PVMs.

Notice that Proposition 1 can be seen as a strengthening of the observation given in [40], in that we may not only take the QS reproducing any given P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}} to be symmetric, but also purified. Evidently, Definitions˜1, 2 and 3 can be naturally generalized to an NN-partite Bell scenario (with N>2N>2) by demanding PPI for all possible permutations of parties. In this regard, we remark that the above symmetrization procedures, and hence Proposition 1, can be generalized to give the following result.

Proposition 2.

In a multipartite Bell scenario, a PPI correlation can always be realized using a PPI QS consisting of a pure state lying on the symmetric subspace and with all parties performing the same local PVMs.

IV Examples where SQS in the minimal dimension can be maximizing

We now give some examples of symmetric Bell inequalities where we observe no trade-off between symmetry and dimension. In other words, for these inequalities, one can indeed find a 𝔔dm\mathfrak{Q}^{*}_{d_{\text{m}}} that is also an SQS, which we shall denote by 𝔔lrvecdm\lrvec{\mathfrak{Q}}^{*}_{d_{\text{m}}}

IV.1 The CHSH Bell inequality

Our first example involves the CHSH Bell inequality of Eq.˜6, which is—modulo the freedom in relabeling [54] of settings and outcomes— known [63] to be the only nontrivial facet-defining Bell inequalities in the simplest bipartite Bell scenario. The maximal quantum violation of CHSH can be attained using the asymmetric QS defined in Eq.˜8, giving the symmetric Tsirelson correlation PT\vec{P}_{T} of Eq.˜14 and the so-called Tsirelson bound [60] of 222\sqrt{2}. However, as mentioned in [11, Section IV.A] (see also [64]), this quantum value of ICHSHI_{\text{CHSH}} can also be obtained using an SQS.

To this end, it suffices 111Note that the same transformation is obtained by first rotating by π4-\frac{\pi}{4} about the yy-axis, then by π\pi about the zz-axis on the Bloch sphere. to apply on Bob’s qubits a θ=π\theta=\pi rotation Rn^(θ)=exp(iθ2n^σ)R_{\hat{n}}(\theta)=\exp(-\frac{i\theta}{2}\hat{n}\cdot\vec{\sigma}) about the n^\hat{n}-axis of the Bloch sphere, where n^=(sinπ8,0,cosπ8)\hat{n}=(\sin\frac{\pi}{8},0,\cos\frac{\pi}{8}) and σ=(σx,σy,σz)\vec{\sigma}=(\sigma_{x},\sigma_{y},\sigma_{z}). The resulting shared state, which is indeed symmetric, can be written as

|ψAB\displaystyle\ket{\psi}_{\rm AB} =𝕀ARn^(π)|Φ+AB\displaystyle=\mathbb{I}_{A}\otimes R_{\hat{n}}(\pi)\ket{\Phi^{+}}_{\rm AB} (21a)
=i[cos(π8)|Φ+sin(π8)|Ψ+],\displaystyle=-i\Big[\cos(\frac{\pi}{8})\ket{\Phi^{-}}+\sin(\frac{\pi}{8})\ket{\Psi^{+}}\Big],
where |Φ=12[|00|11]\ket{\Phi^{-}}=\frac{1}{\sqrt{2}}[\ket{00}-\ket{11}] and |Ψ+=12[|01+|10]\ket{\Psi^{+}}=\frac{1}{\sqrt{2}}[\ket{01}+\ket{10}]. Moreover, after the same unitary transformation, Alice’s and Bob’s observables become
A^0=B^0=σz,A^1=B^1=σx,\hat{A}_{0}=\hat{B}_{0}=\sigma_{z},\quad\hat{A}_{1}=\hat{B}_{1}=\sigma_{x}, (21b)

which are clearly symmetric. As we see next in Section˜IV.2, the SQS of Eq.˜21 can be seen as the d=2d=2 instance of a more general family of SQSs.

IV.2 The CGLMP Bell inequalities

The CGLMP inequality [20] (see also [65]), denoted by IdI_{d}, constitutes a facet-defining inequality of the Bell polytope [66] in the (2,2,d)(2,2,d) Bell scenario.222For d3d\geq 3, the outcome-lifted [67] CHSH is another facet-defining Bell inequality in this scenario, but we know from the results of [68] that it cannot exhibit a trade-off. Specifically, for d=2d=2, it may be rewritten as the CHSH Bell inequality of Eq.˜7 after the relabeling B1B2B_{1}\leftrightarrow B_{2}. Although IdI_{d} in its original form [20] is not PPI, it can be recast into a symmetric form (cf. Definition˜2) by, e.g., relabeling all of Alice’s outcomes from aa to dad-a.

Alternatively, as demonstrated in [69, Appendix B.1.1], by applying the no-signaling conditions [70, 71], normalization constraints, and appropriate relabeling of the outcomes, the CGLMP inequality can be converted to the I22ddI_{22dd} inequality [54], which is manifestly symmetric:

I22dd\displaystyle I_{22dd} =a,bPAB(a,b|0,0)a,bPAB(a,b|1,1)\displaystyle=\sum_{a,b\in\triangle_{\leq}}P_{\rm AB}(a,b|0,0)-\sum_{a,b\in\triangle_{\geq}}P_{\rm AB}(a,b|1,1)
+a,b[PAB(a,b|0,1)+PAB(a,b|1,0)]\displaystyle+\sum_{a,b\in\triangle_{\geq}}\left[P_{\rm AB}(a,b|0,1)+P_{\rm AB}(a,b|1,0)\right] (22)
a=0d2PA(a|0)b=0d2PB(b|0)0,\displaystyle-\sum_{a=0}^{d-2}P_{\rm A}(a|0)-\sum_{b=0}^{d-2}P_{\rm B}(b|0)\overset{\mathcal{L}}{\leq}0,

where \triangle_{\leq} and \triangle_{\geq} refer, respectively, to the set of a,b[d1]a,b\in[d-1] such that a+bd2a+b\leq d-2 and a+bd2a+b\geq d-2. Moreover, for any given 𝔔\mathfrak{Q}, the Bell value of IdI_{d} and that of I22ddI_{22dd} are related [69] by

Id=2dd1I22dd+2.I_{d}=\frac{2d}{d-1}I_{22dd}+2. (23)

The best-known Bell violation of the CGLMP inequality IdI_{d} (or equivalently I22ddI_{22dd}) can be achieved by locally measuring a partially entangled two-qudit state [21] in the judiciously chosen “Fourier-transformed” bases [20] (implementable via a multiport beam splitter in a photonic setup, see, e.g., [18, 19]). Numerical optimizations from [21, 47] confirm this QS to be optimal for dimensions 2d82\leq d\leq 8. In particular, for d<5d<5, a sum-of-squares decomposition in the symmetric form provides an analytic bound on the maximal quantum violation [51].

However, the optimal measurements considered in [20] are not PPI, even after we incorporate the outcome-relabeling needed to cast IdI_{d} in a PPI form. In the following, we present a family of SQSs that match the best known I22ddI_{22dd} (and hence IdI_{d}) Bell-inequality violation. For this purpose, we specify the POVMs (with Ma|xB=Ma|xAa,xM_{a|x}^{B}=M_{a|x}^{A}\,\,\forall\,\,a,x) as:

Ma|0A=|aa|,Ma|1A=U|aa|U,U:=TWM_{a|0}^{A}=\outerproduct{a}{a},\quad M_{a|1}^{A}=U\outerproduct{a}{a}U^{\dagger},\quad U:=TW (24a)
where {|a}a=0d1\{\ket{a}\}_{a=0}^{d-1} is the computational basis, and the d×dd\times d unitary operator UU is defined via333To see that the operator UU define as such is indeed unitary, see Section B.1.1.
T:=1𝕀d1 and W:=i,j[d]|ij|dsin([(ij12)πd)].T:=-1\bigoplus\mathbb{I}_{d-1}\penalty 10000\ \text{ and }\penalty 10000\ W:=\!\!\!\sum_{i,j\in[d]}\frac{\ket{i}\bra{j}}{d\sin{[(i-j-\frac{1}{2})\frac{\pi}{d}}]}. (24b)

Accordingly, the quantum state to be measured |ψd\ket{\psi_{d}} is obtained by solving the eigenvector corresponding to the largest eigenvalue of the symmetric I22ddI_{22dd} Bell operator [72].

As an explicit example, the optimal QS for d=3d=3 consists of measuring

|ψ3=γ\displaystyle\ket{\psi_{3}}=\gamma [α(|00|12|21)+(|01+|10+|22)\displaystyle\Big[\alpha(\ket{00}-\ket{12}-\ket{21})+\left(\ket{01}+\ket{10}+\ket{22}\right)
α+12(|02+|20|11)],\displaystyle\left.-\frac{\alpha+1}{2}(\ket{02}+\ket{20}-\ket{11})\right], (25)

where α=5332\alpha=\frac{5-\sqrt{33}}{2} and γ=23255933\gamma=\frac{2}{3}\sqrt{\frac{2}{55-9\sqrt{33}}} is a normalization factor. Modulo a local change of basis, |ψ3\ket{\psi_{3}} is exactly the optimal state for Id=3I_{d=3} found in [21] (see also [11]). More generally, the optimal quantum state obtained via the Bell operator defined by the PPI measurement strategy of Eq.˜24 is easily seen to be PPI, too. Furthermore, for d=2d=2 to 1919, our computation shows that—to six or more significant digits—the SQS formed by these states and measurements indeed gives an I22ddI_{22dd} (and hence IdI_{d}) value that coincides with the upper bound obtained from the SDP hierarchy of Navascués-Pironio-Acín (NPA). See Section˜B.1.2 for details.

V Examples where SQS in the minimal dimension must be suboptimal

Next, we present some examples of symmetric Bell inequalities where a trade-off between symmetry and dimension has been found.

V.1 Inequalities in the (2,3,2)(2,3,2) Bell scenario

The complete set of facet-defining Bell inequalities for this Bell scenario was first determined by Froissart [73], then independently rediscovered by Pitowsky and Svozil [74], Sliwa [75], as well as Collins and Gisin [54]. In this case, apart from the (input-lifted [67]) CHSH inequality of Eq.˜6, there is also the so-called I3322I_{3322} inequality, commonly known in an asymmetric form [54, Eq. (19)]. However, via an appropriate relabeling, we can also rewrite this inequality in a PPI form: see [75] and [76] for a symmetric form of this inequality written, respectively, in terms of correlators and probabilities, cf. Eq.˜5. Since dmd_{\text{m}} for this inequality could well be infinite [34], and one can always follow the procedure outlined in Fig.˜1 to obtain an SQS that is still infinite dimensional, there is little hope to exhibit a trade-off between symmetry and dimension for this Bell inequality.

At first glance, the symmetric I3322I_{3322}-like Bell inequality of [77, Eq. (27)] may seem like an example exhibiting a trade-off, since it was shown therein that its maximal violation can be attained using a family of PPI correlations P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}} that arise from asymmetric two-qubit strategies. However, a closer inspection reveals that these strategies—as with Eq.˜8—can be transformed into a symmetric form via a local unitary, see Section˜B.2 for details.

In contrast, consider for α[1.5,3]\alpha\in[1.5,3] the following family of symmetric Bell inequalities in correlator form:

IS(α)\displaystyle{I}_{S}(\alpha) =A0+B0+A1+B1+α(A2+B2)\displaystyle=\langle A_{0}\rangle+\langle B_{0}\rangle+\langle A_{1}\rangle+\langle B_{1}\rangle+\alpha\left(\langle A_{2}\rangle+\langle B_{2}\rangle\right)
+A0B2+A2B0A2B1A1B2\displaystyle\quad+\langle A_{0}B_{2}\rangle+\langle A_{2}B_{0}\rangle-\langle A_{2}B_{1}\rangle-\langle A_{1}B_{2}\rangle
A2B22(A1B0+A0B1+A1B1)\displaystyle\quad-\langle A_{2}B_{2}\rangle-2\left(\langle A_{1}B_{0}\rangle+\langle A_{0}B_{1}\rangle+\langle A_{1}B_{1}\rangle\right)
2α+5,\displaystyle\overset{\mathcal{L}}{\leq}2\alpha+5, (26)

where the local bound is easily verified to be saturated by the symmetric local deterministic strategy

Ax=(1)x,By=(1)yx,y{0,1,2}.A_{x}=(-1)^{x},\quad B_{y}=(-1)^{y}\quad\forall\,\,x,y\in\{0,1,2\}. (27)

For concreteness, consider now the special case of α=2\alpha=2. Quantum mechanically, it can be verified that an asymmetric two-qubit strategy (see Section˜B.3 for details), which involves a degenerate measurement for B^2\hat{B}_{2}, leads to the value 13(13+413)9.1407\frac{1}{3}{\left(13+4\sqrt{13}\right)}\simeq 9.1407, correspondingly. Moreover, this quantum violation arising from the resulting asymmetric correlation agrees with the quantum upper bound on IS(2)I_{S}(2) obtained from the NPA hierarchy to a precision better than 10810^{-8}. Hence, dm=2d_{\text{m}}=2 for this inequality. However, if we, instead, only consider SQS facilitated by qubits and PVMs,444Note that it suffices [59, 78] to consider PVMs in maximizing the Bell violation of all two-outcome Bell inequalities. then our computation—using the method described in Section˜A.1.2—shows that such strategies cannot even violate the Bell inequality of Section˜V.1 at all. In other words, there is a trade-off between symmetry and dimension in getting the maximal Bell violation of ISI_{S}.

More generally, as we illustrate in Fig.˜2, even though an asymmetric qubit strategy involving a degenerate measurement for B^2\hat{B}_{2} can lead to the maximal quantum violation of IS(α)I_{S}(\alpha) (up to numerical precision) for all α[1.5,3]\alpha\in[1.5,3], the maximal quantum violation attainable by a symmetric qubit QS is always suboptimal. In fact, for α(1.975,3]\alpha\in(1.975,3], these latter strategies can, at best, give the local bound of 2α+52\alpha+5.

Refer to caption
Figure 2: Maximal Bell value of IS(α)I_{S}(\alpha) for α[1.5,3]\alpha\in[1.5,3] under various constraints. From bottom to top, we have, respectively, the local bound of 2α+52\alpha+5 (red, dashed), the symmetric qubit upper bound (blue, dotted) computed using the method described in appendix˜A, and the general quantum bound (yellow, solid), which is attainable using a two-qubit QS involving a degenerate observable for one of the parties.

V.2 Inequalities in the (2,4,2)(2,4,2) Bell scenario

Quantum bound SQS bound Quantum bound SQS bound
dm=2d_{\text{m}}=2 d=2d=2 d=3d=3 dm=3d_{\text{m}}=3 d=3d=3 d=4d=4 d=5d=5
I44224I_{4422}^{4} 0.4142 0.2500 0.3846 I44228I_{4422}^{8} LB 0.4878 0.4843 0.4843 0.4843
I442213I_{4422}^{13} 0.4349 0.2500 0.3466 UB 0.4878 0.4878
I442215I_{4422}^{15} 0.4349 0.3913 0.4067 I442219I_{4422}^{19} LB 0.4972 0.4514 0.4832 0.4836
J442242J_{4422}^{42} 0.6722 0.5682 0.5682 UB 0.4972 0.4972
J442286J_{4422}^{86} 0.7559 0.7500 0.7500 J442213J_{4422}^{13} LB 0.6927 0.6671 0.6671 0.6722
J4422113J_{4422}^{113} 0.8484 0.8195 0.8195 UB 0.6927 0.6927
Table 1: List of symmetric facet-defining Bell inequalities in the (2,4,2)(2,4,2) Bell scenario, where there exists a trade-off between dimension and symmetry in their quantum violation. The first three block columns on the left give, respectively, the list of six inequalities whose dm=2d_{\text{m}}=2, their maximal quantum violation (obtained from NPA level 3 and a matching QS of dimension dmd_{\text{m}}), and their SQS bound for d[dm,2dm)d\in[d_{\text{m}},2d_{\text{m}}). The three block columns on the right give the analogous results for three inequalities whose dm=3d_{\text{m}}=3. Note, however, that for these inequalities, the best lower bound (LB) we have found for d=4,5d=4,5 falls short of the corresponding SDP upper bound (UB).

As we increase the number of settings to four, it is known [79, 55, 80] that the Bell polytope is completely characterized by 175 facet-defining classes of Bell inequalities. Among them, 55 are known [36] to admit a symmetric representation. Several of these, namely, the trivial positivity facet, the CHSH inequality of Eq.˜6, and the I3322I_{3322} inequality, are liftings [67] of facet-defining Bell inequalities from simpler Bell scenarios.

For the remaining 52 symmetric Bell inequaliites with four settings, except for J442262J_{4422}^{62} (whose dmd_{\text{m}} remains unknown [34]) and 8 others (see Table˜1 as well as Tables˜5 and 6 of Section˜B.4), all the rest can be maximally violated using qubit strategies, i.e., having dm=2d_{\text{m}}=2. Moreover, our computation results show that for 42 out of these 52 inequalities, there is no trade-off, i.e., there exists a 𝔔lrvecdm\lrvec{\mathfrak{Q}}^{*}_{d_{\text{m}}}. For ease of reference, we provide this list of 42 inequalities and their maximal quantum violation in Table˜5 of Section˜B.4.

After discounting J442262J_{4422}^{62}, we are left with 9 symmetric inequalities, where we observe a trade-off between dimension and symmetry; see Table˜1 for details. It is worth noting that for all these 9 inequalities, as with IS(α)I_{S}(\alpha), the 𝔔lrvecdm\lrvec{\mathfrak{Q}}^{*}_{d_{\text{m}}} we have found always involves projectors of unequal ranks between Alice and Bob, i.e., rank(Ma|xB)rank(Ma|xA)\text{rank}(M_{a|x}^{B})\neq\text{rank}(M_{a|x}^{A}) for some a,xa,x, thereby making these QS evidently asymmetric. In fact, a closer inspection reveals that the resulting correlation is also asymmetric.

Also worth noting is that for the J442242J_{4422}^{42} inequality, we further observe a gap between the maximal quantum value attainable using qubit SQS and symmetric correlations that may also arise from asymmetric strategies. Indeed, for these two classes of strategies, the maximal quantum values attainable are 0.56820.5682 and 0.60120.6012, respectively. More explicitly, the latter value can be achieved by adopting the following asymmetric QS consisting of the shared state

|ψ=sin(α)|00+cos(α)|11,\ket{\psi}=-\sin{\alpha}\ket{00}+\cos{\alpha}\ket{11}, (28a)
with α=42.5092\alpha=42.5092^{\circ} and the mirror-symmetric observables
A^x=axσ,B^y=byσ=(ayσ),\hat{A}_{x}=\vec{a}_{x}\cdot\vec{\sigma},\quad\hat{B}_{y}=\vec{b}_{y}\cdot\vec{\sigma}=(\vec{a}_{y}\cdot\vec{\sigma})^{*}, (28b)
where denotes complex conjugation and the measurement (Bloch) vectors ak:=(sinθkcosϕk,sinθksinϕk,cosθk)\vec{a}_{k}:=(\sin\theta_{k}\cos\phi_{k},\sin\theta_{k}\sin\phi_{k},\cos\theta_{k}),
θ0=61.9767,\displaystyle\theta_{0}=19767^{\circ}, ϕ0\displaystyle\quad\phi_{0} =166.1570,\displaystyle=661570^{\circ}, (28c)
θ1=0,\displaystyle\theta_{1}=0^{\circ}, ϕ1\displaystyle\quad\phi_{1} arbitrary,\displaystyle\text{ arbitrary},
θ2=54.3423,\displaystyle\theta_{2}=43423^{\circ}, ϕ2\displaystyle\quad\phi_{2} =41.5892,\displaystyle=15892^{\circ},
θ3=52.2700,\displaystyle\theta_{3}=22700^{\circ}, ϕ3\displaystyle\quad\phi_{3} =71.170,\displaystyle=-1170^{\circ},

Equivalently, bk\vec{b}_{k} may be obtained from ak\vec{a}_{k} by the substitution ϕkϕk\phi_{k}\to-\phi_{k}. For graphical representation of ak\vec{a}_{k} and bk\vec{b}_{k}, see Fig.˜3.

Refer to caption
Figure 3: Measurement directions ak\vec{a}_{k} (solid line) and bk\vec{b}_{k} (dashed line) for k=0,1,2,3k=0,1,2,3 corresponding to the QS described in Eq.˜28. Notice that each bk\vec{b}_{k} may be obtained from the corresponding ak\vec{a}_{k} by performing a mirror reflection about the xzx-z plane (the pale blue plane), making it evident that the QS is asymmetric. Surprisingly, the resulting correlation is symmetric and gives a Bell value 0.6012\approx 0.6012 for the J442242J^{42}_{4422} inequality, higher than the 0.5682 bound achievable by any qubit SQS.

In the next section, we provide a proof showing that QSs of the kind given in Eq.˜28 not only produce a symmetric correlation, but also cannot be symmetrized via a local unitary transformation.

VI Asymmetric strategies giving symmetric correlations

VI.1 Symmetric correlations from mirror-symmetric strategies

To see that the correlation resulting from Eq.˜28 is indeed PPI, we remark that a more general class of mirror-symmetric strategies must also produce symmetric correlations. Indeed, Eq.˜28a is easily seen to be a special case of the following family of two-qubit pure states:

|ϕ(α)=cos(α)|ψSym+isin(α)|Ψ,\ket{\phi(\alpha)}=\cos{\alpha}\ket{\psi}_{\text{Sym}}+i\sin{\alpha}\ket{\Psi^{-}}, (29)

where |Ψ=12(|01|10)\ket{\Psi^{-}}=\frac{1}{\sqrt{2}}(\ket{01}-\ket{10}) is the singlet state and |ψSym\ket{\psi}_{\text{Sym}} is some real symmetric state (i.e., a real, linear combination of the remaining three Bell states |Φ±\ket{\Phi^{\pm}} and |Ψ+\ket{\Psi^{+}}).

Moreover, if we locally measure Eq.˜29 for a pair of measurement directions {ak},{bk}\{\vec{a}_{k}\},\{\vec{b}_{k}\} mirror-symmetric with respect to the xzx-z plane of the Bloch sphere, i.e.,

ak=bkkwhere=diag(1,1,1),\mathcal{M}\vec{a}_{k}=\vec{b}_{k}\penalty 10000\ \forall\,\,k\quad\text{where}\quad\mathcal{M}=\text{diag}(1,-1,1), (30)

it follows that the resulting correlation P\vec{P} must be symmetric.

Theorem 3.

Quantum correlation obtained by performing an arbitrary number of dichotomic measurements that are mirror-symmetric with respect to the xzx-z plane, c.f. Eq.˜30, on the asymmetric state of Eq.˜29 is symmetric.

To see that this is the case, we start by establishing the following Lemma.

Lemma 4.

If a pair of measurement bases ak,bk\vec{a}_{k},\vec{b}_{k} are mirror-symmetric with respect to the xzx-z plane, i.e., Eq.˜30 holds, then their POVM elements satisfy

Ma|kB=(Ma|kA)a,k.M^{B}_{a|k}=(M^{A}_{a|k})^{*}\quad\forall\,\,a,k. (31)
Proof.

For dichotomic measurements, the POVM elements can be expressed as

Ma|kA=12[𝕀2+(1)aakσ],Mb|kB=12[𝕀2+(1)bbkσ],M^{A}_{a|k}=\frac{1}{2}[\mathbb{I}_{2}+(-1)^{a}\vec{a}_{k}\cdot\vec{\sigma}],\penalty 10000\ M^{B}_{b|k}=\frac{1}{2}[\mathbb{I}_{2}+(-1)^{b}\vec{b}_{k}\cdot\vec{\sigma}], (32)

where σ\vec{\sigma} is the vector of Pauli matrices, and a,b{0,1}a,b\in\{0,1\}. Since ak=bk\mathcal{M}\vec{a}_{k}=\vec{b}_{k}, we have

bkσ=(ak)σ=ak1σkak2σy+ak3σz=(akσ).\vec{b}_{k}\cdot\vec{\sigma}=(\mathcal{M}\vec{a}_{k})\cdot\vec{\sigma}=a_{k}^{1}\sigma_{k}-a_{k}^{2}\sigma_{y}+a_{k}^{3}\sigma_{z}=(\vec{a}_{k}\cdot\vec{\sigma})^{*}. (33)

Therefore, Mb|kB=12[𝕀2+(1)b(akσ)]=(Mb|kA)M^{B}_{b|k}=\frac{1}{2}[\mathbb{I}_{2}+(-1)^{b}(\vec{a}_{k}\cdot\vec{\sigma})^{*}]=(M^{A}_{b|k})^{*}. ∎

The proof of Theorem˜3 may now be completed as follows.

Proof.

Using Lemma 4, the joint probability distribution PAB(a,b|x,y)P_{AB}(a,b|x,y) arising from measuring the state |ϕ(α)\ket{\phi(\alpha)} with the mirror-symmetric measurements reads as:

PAB(a,b|x,y)\displaystyle P_{\rm AB}(a,b|x,y) =ϕ(α)|Ma|xAMb|yB|ϕ(α)\displaystyle=\bra{\phi(\alpha)}M^{A}_{a|x}\otimes M^{B}_{b|y}\ket{\phi(\alpha)} (34)
=ϕ(α)|Ma|xA(Mb|yA)|ϕ(α)\displaystyle=\bra{\phi(\alpha)}M^{A}_{a|x}\otimes(M^{A}_{b|y})^{*}\ket{\phi(\alpha)}

Since PAB(a,b|x,y)P_{AB}(a,b|x,y) is real-valued, we have

PAB(a,b|x,y)\displaystyle P_{\rm AB}(a,b|x,y) =PAB(a,b|x,y)\displaystyle=P_{\rm AB}(a,b|x,y)^{*} (35)
=ϕ(α)|(Ma|xA)Mb|yA|ϕ(α),\displaystyle=\bra{\phi(\alpha)^{*}}(M^{A}_{a|x})^{*}\otimes M^{A}_{b|y}\ket{\phi(\alpha)^{*}},

where |ϕ(α)cosα|ψSymisinα|Ψ\ket{\phi(\alpha)^{*}}\coloneqq\cos\alpha\ket{\psi}_{\text{Sym}}-i\sin\alpha\ket{\Psi^{-}}, i.e., the complex conjugation of |ϕ(α)\ket{\phi(\alpha)}. With the observation that S|ϕ(α)=|ϕ(α)S\ket{\phi(\alpha)}=\ket{\phi(\alpha)^{*}}, where SS is the swap operator, we can further reduce PAB(a,b|x,y)P_{\rm AB}(a,b|x,y) to

PAB(a,b|x,y)\displaystyle P_{\rm AB}(a,b|x,y) =ϕ(α)|S[(Ma|xA)Mb|yA]S|ϕ(α)\displaystyle=\bra{\phi(\alpha)}S^{\dagger}\big[(M^{A}_{a|x})^{*}\otimes M^{A}_{b|y}\big]S\ket{\phi(\alpha)} (36)
=ϕ(α)|Mb|yA(Ma|xA)|ϕ(α)\displaystyle=\bra{\phi(\alpha)}M^{A}_{b|y}\otimes(M^{A}_{a|x})^{*}\ket{\phi(\alpha)}
=ϕ(α)|Mb|yAMa|xB|ϕ(α)\displaystyle=\bra{\phi(\alpha)}M^{A}_{b|y}\otimes M^{B}_{a|x}\ket{\phi(\alpha)}
=PAB(b,a|y,x),\displaystyle=P_{\rm AB}(b,a|y,x),

where Lemma 4 is again utilized to arrive at the third equality. Hence, PAB(a,b|x,y)P_{\rm AB}(a,b|x,y) arising from this strategy satisfies the symmetry condition PAB(a,b|x,y)=PAB(b,a|y,x)P_{\rm AB}(a,b|x,y)=P_{\rm AB}(b,a|y,x) defined in Definition˜1. ∎

We now show that no local operations can symmetrize the measurement bases of the two players provided that their measurement directions are each not coplanar on the Bloch sphere.

Proposition 5.

Let {ak}k=1m3\{\vec{a}_{k}\}_{k=1}^{m}\subset\mathbb{R}^{3} with m3m\geq 3 be non-coplanar, i.e, dim(span{ak})=3\dim(\text{span}\{\vec{a}_{k}\})=3, and let {bk}k=1m\{\vec{b}_{k}\}_{k=1}^{m} satisfy Eq.˜30, where O(3)\mathcal{M}\in O(3) is a reflection. Then there do not exist local unitaries UA,UBSU(2)U_{A},U_{B}\in SU(2) such that the resulting measurement directions satisfy ak=bk\vec{a}^{\prime}_{k}=\vec{b}^{\prime}_{k} for all kk.

Proof.

Suppose the contrary that there exists UA,UBSU(2)U_{A},U_{B}\in SU(2) such that

UA(akσ)UA\displaystyle U_{A}(\vec{a}_{k}\cdot\vec{\sigma})U_{A}^{\dagger} =akσ\displaystyle=\vec{a}_{k}^{\prime}\cdot\vec{\sigma} k,\displaystyle\forall\,\,k, (37)
UB(bkσ)UB\displaystyle U_{B}(\vec{b}_{k}\cdot\vec{\sigma})U_{B}^{\dagger} =bkσ\displaystyle=\vec{b}_{k}^{\prime}\cdot\vec{\sigma} k,\displaystyle\forall\,\,k,

with ak=bk\vec{a}^{\prime}_{k}=\vec{b}^{\prime}_{k} for all kk.

Let UUBUAU\coloneqq U_{B}^{\dagger}U_{A}. Since ak=bk\vec{a}^{\prime}_{k}=\vec{b}^{\prime}_{k} for all kk, we have U(akσ)U=bkσkU(\vec{a}_{k}\cdot\vec{\sigma})U^{\dagger}=\vec{b}_{k}\cdot\vec{\sigma}\penalty 10000\ \forall\,\,k. So we can focus on proving the existence of this single unitary UU. It is well-known that for each USU(2)U\in SU(2) there exists a rotation SO(3)\mathcal{R}\in SO(3) such that U(vσ)U=(v)σ,v3U(\vec{v}\cdot\vec{\sigma})U^{\dagger}=(\mathcal{R}\vec{v})\cdot\vec{\sigma},\forall\,\,\vec{v}\in\mathbb{R}^{3}. Hence, there exists some \mathcal{R} such that ak=bkk\mathcal{R}\vec{a}_{k}=\vec{b}_{k}\penalty 10000\ \forall\,\,k. By assumption, we also have ak=bkk\mathcal{M}\vec{a}_{k}=\vec{b}_{k}\penalty 10000\ \forall\,\,k. Altogether, we have Tak=akk\mathcal{R}^{T}\mathcal{M}\vec{a}_{k}=\vec{a}_{k}\penalty 10000\ \forall\,\,k, using the fact that T=1\mathcal{R}^{T}=\mathcal{R}^{-1} for any orthogonal matrix \mathcal{R}. Define 𝒬:=T\mathcal{Q}:=\mathcal{R}^{T}\mathcal{M}. Since the set {ak}\{\vec{a}_{k}\} are not coplanar, they span 3\mathbb{R}^{3}. And since 𝒬ak=ak\mathcal{Q}\vec{a}_{k}=\vec{a}_{k} for all kk, the multiplicity of the eigenvalue 11 of 𝒬\mathcal{Q} must be 33, whenever the cardinality of the set {ak}k=1m\{\vec{a}_{k}\}_{k=1}^{m} satisfies m3m\geq 3. In other words, 𝒬=𝕀3\mathcal{Q}=\mathbb{I}_{3} (in some basis). However, this is impossible since det(𝒬)=det(T)det()=det()=1\det(\mathcal{Q})=\det(\mathcal{R}^{T})\det(\mathcal{M})=\det(\mathcal{M})=-1, where the last equality follows from the fact that \mathcal{M} is a reflection. ∎

In addition, as a special case of the following Proposition, we see that the only pure states that can generate symmetric correlations with mirror-symmetric qubit measurements are exactly those of the form defined in Eq.˜29.

Proposition 6.

Let 𝔔={|ψ,{Ma|xA},{Mb|yB}}\mathfrak{Q}=\{\ket{\psi},\{M_{a|x}^{A}\},\{M_{b|y}^{B}\}\} be a QS satisfying Ma|kB=(Ma|kA)a,kM_{a|k}^{B}=(M_{a|k}^{A})^{*}\penalty 10000\ \forall\penalty 10000\ a,k and that produces a symmetric correlation. Suppose further that the collection of {Ma|xA}a,x\{M_{a|x}^{A}\}_{a,x} over all possible a,xa,x spans the entire space that they act on. Then, apart from a global phase factor, the state |ψ\ket{\psi} must be of the form

|ψ=cs|ψSym+ca|ψASym.\ket{\psi}=c_{s}\ket{\psi}_{\text{Sym}}+c_{a}\ket{\psi}_{\text{ASym}}. (38)

Here, cs|ψSymc_{s}\ket{\psi}_{\text{Sym}} is a real-valued symmetric (Sym) state and ca|ψASymc_{a}\ket{\psi}_{\text{ASym}} is a purely imaginary antisymmetric (ASym) state, i.e.,

S|ψSym=|ψSym,S|ψASym=|ψASymS\ket{\psi}_{\text{Sym}}=\ket{\psi}_{\text{Sym}},\quad S\ket{\psi}_{\text{ASym}}=-\ket{\psi}_{\text{ASym}} (39)

where SS is the swap operator defined in Eq.˜12.

Proof.

By assumption, |ψ\ket{\psi} produces a symmetric correlation when measured with POVMs satisfying Eq.˜31. For convenience, we write |ψ:=(|ψ)\ket{\psi^{*}}:=(\ket{\psi})^{*}, |ψSym:=(|ψSym)\ket{\psi^{*}}_{\text{Sym}}:=(\ket{\psi}_{\text{Sym}})^{*}, and |ψASym:=(|ψASym)\ket{\psi^{*}}_{\text{ASym}}:=(\ket{\psi}_{\text{ASym}})^{*}. To prove the Lemma, we employ the three properties:

  1. (i)

    the correlation is symmetric, i.e., PAB(a,b|x,y)=PAB(b,a|y,x)P_{\rm AB}(a,b|x,y)=P_{\rm AB}(b,a|y,x),

  2. (ii)

    the correlation is real-valued, i.e., PAB(a,b|x,y)=PAB(a,b|x,y)P_{\rm AB}(a,b|x,y)=P_{\rm AB}(a,b|x,y)^{*}, and

  3. (iii)

    the POVMs satisfy Eq.˜31.

Using (ii) and (iii), we arrive at the following:

PAB(a,b|x,y)=ψ|MaxAMb|yB|ψ| \displaystyle P_{\rm AB}(a,b|x,y)=\braket{\psi|M_{a}{x}^{A}\otimes M_{b|y}^{B}|\psi|\hfil{\\ }} =ψ|(MaxA)(Mb|yB)|ψ| \displaystyle=\braket{\psi^{*}|(M_{a}{x}^{A})^{*}\otimes(M_{b|y}^{B})^{*}|\psi^{*}|{\\ }} =ψ|(MaxA)Mb|yA|ψ|,\displaystyle=\braket{\psi^{*}|(M_{a}{x}^{A})^{*}\otimes M_{b|y}^{A}|\psi^{*}|,} (40)

while with (i), (iii), and the defining property of the swap operator, we arrive at

PAB(a,b|x,y)=ψ|MaxAMb|yB|ψ| \displaystyle P_{\rm AB}(a,b|x,y)=\braket{\psi|M_{a}{x}^{A}\otimes M_{b|y}^{B}|\psi|\hfil{\\ }} =ψ|MbyAMa|xB|ψ| \displaystyle=\braket{\psi|M_{b}{y}^{A}\otimes M_{a|x}^{B}|\psi|{\\ }} =ψ|S[(MaxA)Mb|yA]S|ψ|.\displaystyle=\braket{\psi|S[(M_{a}{x}^{A})^{*}\otimes M_{b|y}^{A}]S^{\dagger}|\psi|.} (41)

Subtracting the terms at the end of the last two lines yields

tr[(Ma|xA)Mb|yAX]=0,a,b,x,y.\mathrm{tr}\Big[(M_{a|x}^{A})^{*}\otimes M_{b|y}^{A}X\Big]=0,\forall\,\,a,b,x,y. (42)

where X:=|ψψ|S|ψψ|SX:=\outerproduct{\psi^{*}}{\psi^{*}}-S^{\dagger}\outerproduct{\psi}{\psi}S. Now, since {Ma|xA}\{M_{a|x}^{A}\} span the entire space that they act on, {(Ma|xA)Mb|yA}\{(M_{a|x}^{A})^{*}\otimes M_{b|y}^{A}\} also span the entire composite Hilbert space. In particular, we can consider an appropriate linear combination of these operators, and hence of Eq.˜42, to arrive at tr(XX)=0\mathrm{tr}\Big(X^{\dagger}X\Big)=0. However, the left-hand side of the last equation is simply the Hilbert-Schmidt norm of the operator XX. This means that XX must be identically zero, and hence

S|ψ=eiθ|ψS\ket{\psi}=e^{i\theta}\ket{\psi^{*}} (43)

for some θ[0,2π)\theta\in[0,2\pi).

Without loss of generality, we can express |ψ\ket{\psi} as a linear combination of Sym and ASym components, cf. Eqs.˜38 and 39 where cs,cac_{s},c_{a}\in\mathbb{C} while both |ψSym\ket{\psi}_{\text{Sym}} and |ψASym\ket{\psi}_{\text{ASym}} may be complex. Substituting Eq.˜38 into Eq.˜43 gives

cs|ψSym=eiθcs|ψSym,ca|ψASym=eiθca|ψASym,c_{s}\ket{\psi}_{\text{Sym}}=e^{i\theta}c_{s}^{*}\ket{\psi^{*}}_{\text{Sym}},\quad-c_{a}\ket{\psi}_{\text{ASym}}=e^{i\theta}c_{a}^{*}\ket{\psi^{*}}_{\text{ASym}}, (44)

where we have used the complex conjugation of Eq.˜39. Let us define c~seiθ/2cs\tilde{c}_{s}\coloneqq e^{-i\theta/2}c_{s} and c~aeiθ/2ca\tilde{c}_{a}\coloneqq e^{-i\theta/2}c_{a}. Then, it follows from Eq.˜44 that

c~s|ψSym=c~s|ψSym,c~a|ψASym=c~a|ψASym,\tilde{c}_{s}\ket{\psi}_{\text{Sym}}=\tilde{c}_{s}^{*}\ket{\psi^{*}}_{\text{Sym}},\quad-\tilde{c}_{a}\ket{\psi}_{\text{ASym}}=\tilde{c}_{a}^{*}\ket{\psi^{*}}_{\text{ASym}}, (45)

indicating that c~s|ψSym\tilde{c}_{s}\ket{\psi}_{\text{Sym}} is a real-valued symmetric vector, while c~a|ψASym\tilde{c}_{a}\ket{\psi}_{\text{ASym}} is a purely imaginary anti-symmetric vector. Hence, we can write |ψ=eiθ/2(c~s|ψSym+c~a|ψASym)\ket{\psi}=e^{i\theta/2}\left(\tilde{c}_{s}\ket{\psi}_{\text{Sym}}+\tilde{c}_{a}\ket{\psi}_{\text{ASym}}\right), which completes the proof. This is equivalent to the form defined in Eq.˜29 up to some global phase. ∎

VI.2 More general construction of QS giving symmetric correlations

The discussion in Section˜VI.1 makes evident that symmetric correlations may arise beyond SQSs. In fact, we may consider both SQSs and mirror-symmetric strategies discussed in Section˜VI.1 as special cases of a more general construction. To this end, let us note from Eq.˜4 and Definition˜1 that for a symmetric correlation P=P\vec{P}=\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}}, we have

PAB(a,b|x,y)=tr(ρABMa|xAMb|yB)=PAB(b,a|y,x).P_{\rm AB}(a,b|x,y)=\mathrm{tr}(\rho_{\rm AB}M^{A}_{a|x}\otimes M^{B}_{b|y})=P_{\rm AB}(b,a|y,x). (46)

By definition, we may also write the last term of Eq.˜46 as

PAB(b,a|y,x)=PBA(a,b|x,y)=tr(ρBAMa|xBMb|yA)P_{\rm AB}(b,a|y,x)=P_{\rm BA}(a,b|x,y)=\mathrm{tr}(\rho_{\rm BA}M^{B}_{a|x}\otimes M^{A}_{b|y}) (47)

Consider now a linear positive map O:()()O:\mathcal{B}(\mathcal{H}\otimes\mathcal{H})\rightarrow\mathcal{B}(\mathcal{H}\otimes\mathcal{H}) that leaves the trace in Eq.˜46 invariant, i.e.,

PAB(a,b|x,y)=tr[O(ρAB)O(Ma|xAMb|yB)],P_{\rm AB}(a,b|x,y)=\mathrm{tr}\left[O(\rho_{\rm AB})O(M^{A}_{a|x}\otimes M^{B}_{b|y})\right], (48)

for some 𝔔={ρAB,{Ma|xA}a,x,{Mb|yB}b,y}\mathfrak{Q}=\{\rho_{\rm AB},\{M_{a|x}^{A}\}_{a,x},\{M_{b|y}^{B}\}_{b,y}\}. After substituting Eqs.˜47 and 48 into Eq.˜46, we see that for the latter to hold, it suffices that the following conditions hold

O(ρAB)=ρBA,\displaystyle O(\rho_{\rm AB})=\rho_{\rm BA}, (49a)
O(Ma|xAMb|yB)=Ma|xBMb|yAa,b,x,y.\displaystyle O(M^{A}_{a|x}\otimes M^{B}_{b|y})=M^{B}_{a|x}\otimes M^{A}_{b|y}\,\,\forall\,\,a,b,x,y. (49b)

For example, if we take OO to be the identity map, then Eq.˜49 implies that:

ρAB=ρBA,\displaystyle\rho_{\rm AB}=\rho_{\rm BA}, (50a)
Ma|xAMb|yB=Ma|xBMb|yAa,b,x,y.\displaystyle M^{A}_{a|x}\otimes M^{B}_{b|y}=M^{B}_{a|x}\otimes M^{A}_{b|y}\,\,\forall\,\,a,b,x,y. (50b)

By summing both sides of Eq.˜50b, e.g., over bb and using the normalization condition of a POVM, we see that Eq.˜50 is exactly the condition of an SQS, cf. Definition˜3

On the other hand, if we take OO to the complex conjugation (or equivalently, transposition) operation, then Eq.˜49 becomes

(ρAB)=ρBA,\displaystyle(\rho_{\rm AB})^{*}=\rho_{\rm BA}, (51a)
(Ma|xA)(Mb|yB)=Ma|xBMb|yAa,b,x,y,\displaystyle(M^{A}_{a|x})^{*}\otimes(M^{B}_{b|y})^{*}=M^{B}_{a|x}\otimes M^{A}_{b|y}\,\,\forall\,\,a,b,x,y, (51b)

which is easily verified to hold for mirror-symmetric strategies discussed in Section˜VI.1, see Eqs.˜31 and 43.

For an explicit example, if we take mirror-symmetric qubit measurements, then for any two-qubit state, we have

ρ=14(𝕀𝕀+(rσ)𝕀+𝕀(sσ)+i,j=13Tijσiσj),\rho=\frac{1}{4}\Big(\mathbb{I}\otimes\mathbb{I}+(\vec{r}\cdot\vec{\sigma})\otimes\mathbb{I}+\mathbb{I}\otimes(\vec{s}\cdot\vec{\sigma})+\sum_{i,j=1}^{3}T_{ij}\,\sigma_{i}\otimes\sigma_{j}\Big), (52)

where r=(rx,ry,rz)\vec{r}=(r_{x},r_{y},r_{z}), s=(sx,sy,sz)\vec{s}=(s_{x},s_{y},s_{z}) and TT is the correlation matrix. To satisfy Eq.˜51, we require s=(rx,ry,rz)\vec{s}=(r_{x},-r_{y},r_{z}) and

T=(TxxTxyTxzTxyTyyTyzTxzTyzTzz).T=\begin{pmatrix}T_{xx}&T_{xy}&T_{xz}\\ -T_{xy}&T_{yy}&T_{yz}\\ T_{xz}&-T_{yz}&T_{zz}\end{pmatrix}. (53)

This gives the most general form of a two-qubit state that produces a symmetric correlation with mirror-symmetric measurements.

VII Asymmetry and the geometry of the quantum set of correlations

VII.1 Maximal quantum violation of a symmetric Bell inequality by an asymmetric correlation

As illustrated above, there exist symmetric Bell inequalities that can be maximally violated by an asymmetric correlation. It turns out that this has a nontrivial implication on the geometry of the quantum set of correlations, as we summarize in the following proposition.

Proposition 7.

If an asymmetric quantum correlation maximally violates a symmetric Bell inequality, then the set of quantum maximizers of this Bell inequality forms at least a one-dimensional flat region (boundary) in the space of correlations.

Proof.

Let II be a symmetric Bell inequality defined (for an NN-partite Bell scenario) via β\vec{\beta}, cf. Eq.˜10, and P\vec{P}^{*} be a quantum maximizer of II that is asymmetric. The asymmetric nature of P\vec{P}^{*} implies that there must exist at least one element σ\sigma from the symmetric group SNS_{N} such that upon its action on P\vec{P}, we obtain Pσ:=VσPP\vec{P}_{\sigma}:=V_{\sigma}\vec{P}^{*}\neq\vec{P}^{*} where VσV_{\sigma} is the permutation operator effecting the permutation σ\sigma. Since P\vec{P}^{*} is a maximizer of II and β\vec{\beta} is symmetric, we see that

maxP𝒬I\displaystyle\max_{\vec{P}\in\mathcal{Q}}I =maxP𝒬βP=βP\displaystyle=\max_{\vec{P}\in\mathcal{Q}}\vec{\beta}\cdot\vec{P}=\vec{\beta}\cdot\vec{P}^{*} (54)
=(Vσβ)(VσP)=βPσ,\displaystyle=(V_{\sigma}\vec{\beta})\cdot(V_{\sigma}\vec{P}^{*})=\vec{\beta}\cdot\vec{P}_{\sigma},

where the third equality follows from the fact that a simultaneous permutation on the Bell coefficients β\vec{\beta} and the correlation P\vec{P}^{*} leaves their inner product unchanged. Hence, Pσ\vec{P}_{\sigma} must also be a maximizer of II. Combining this observation with the linearity of II in P\vec{P}, we see that any convex combination of P\vec{P}^{*} and Pσ\vec{P}_{\sigma}, i.e.,

Pc=cP+(1c)Pσ,c[0,1],\vec{P}_{c}=c\vec{P}^{*}+(1-c)\vec{P}_{\sigma},\ c\in[0,1], (55)

is also a maximizer of II. Since 𝒬\mathcal{Q} is convex and II is linear in P\vec{P}, only those correlations P\vec{P} lying on the boundary of 𝒬\mathcal{Q} can be a maximizer of II in 𝒬\mathcal{Q}. In other words, the set of correlations defined by Eq.˜55 forms a one-dimensional flat region of the quantum boundary, thus concluding the proof. ∎

An important consequence of Proposition 7 is the following Corollary.

Corollary 8.

A symmetric Bell inequality II admitting an asymmetric maximizer cannot be used to self-test any reference quantum strategy 𝔔\mathfrak{Q} based on the observed maximal violation of II alone.

Proof.

Self-testing [81] of a reference strategy 𝔔\mathfrak{Q} based on an observed Bell value refers to the possibility of deducing from this observation that the underlying strategy, modulo irrelevant local degrees of freedom, must be 𝔔\mathfrak{Q}. A necessary condition for this possibility is that there is only a unique quantum correlation leading to this Bell value. By assumption, the symmetric inequality II admits an asymmetric maximizer, thus it follows from Proposition 7 that its maximizer is not unique, thus rendering it impossible to perform self-testing from the maximal violation of II alone. ∎

Notice, however, that the above Corollary does not preclude the possibility of self-testing the underlying state (but not the measurements) from the observed Bell value, like the examples discussed in [68, 82, 83]. Also noteworthy is that flat regions of the quantum boundary have been extensively discussed in [77]. However, most of the examples presented therein concern flat regions that are described by a trivial Bell inequality, i.e., one that is not violated by quantum theory. In contrast, the flat region corresponding to IS(α)I_{S}(\alpha) of Section˜V.1, as with that for the inequalities listed in Table˜1, does not intersect with the Bell polytope.

VII.2 Maximal quantum violation of an asymmetric Bell inequality by a symmetric correlation

While a symmetric Bell inequality can be maximally violated by a symmetric correlation, we generally cannot hope that the same conclusion holds for an asymmetric Bell inequality. To see this, consider, e.g., the CHSH inequality obtained from Eq.˜7 by the relabeling B0B1B_{0}\leftrightarrow B_{1}:

ICHSH=A0B0+A0B1A1B0+A1B12.I_{\text{CHSH}}=\langle A_{0}B_{0}\rangle+\langle A_{0}B_{1}\rangle-\langle A_{1}B_{0}\rangle+\langle A_{1}B_{1}\rangle\overset{\mathcal{L}}{\leq}2. (56)

If a correlation P\vec{P} violates this inequality, one would have

A0B0+A0B1A1B0+A1B1>2.\langle A_{0}B_{0}\rangle+\langle A_{0}B_{1}\rangle-\langle A_{1}B_{0}\rangle+\langle A_{1}B_{1}\rangle>2. (57)

If the P\vec{P} is also PPI, then the correlation remains invariant under the transformation AkBkA_{k}\leftrightarrow B_{k} for all k=0,1k=0,1, which means that it must also satisfy, from Eq.˜57, after a simultaneous relabeling for P\vec{P} and β\vec{\beta}:

A0B0+A1B0A0B1+A1B1>2.\langle A_{0}B_{0}\rangle+\langle A_{1}B_{0}\rangle-\langle A_{0}B_{1}\rangle+\langle A_{1}B_{1}\rangle>2. (58)

However, the conjunction of Eqs.˜57 and 58 contradicts the fact [84] that any correlation P\vec{P} can violate at most one version of the CHSH Bell inequality. In other words, no symmetric correlation can violate the asymmetric CHSH Bell inequality of Eq.˜57, let alone maximally.

In contrast, consider the following two-parameter family of Bell inequalities:

Ir0,r1=\displaystyle I_{r_{0},r_{1}}=\,\, r0[A0+A12B0]+r1[A0A12B1]\displaystyle r_{0}\left[\frac{A_{0}+A_{1}}{\sqrt{2}}-B_{0}\right]+r_{1}\left[\frac{A_{0}-A_{1}}{\sqrt{2}}-B_{1}\right]
+122βCHSHg(r0,r1)\displaystyle+\frac{1}{2\sqrt{2}}\beta_{\text{CHSH}}\overset{\mathcal{L}}{\leq}g(r_{0},r_{1}) (59a)
for
r1(2+1)r0,r_{1}\neq-(\sqrt{2}+1)r_{0}, (59b)

and the pair (r0,r1)(r_{0},r_{1}) could otherwise take any value within the interior of the octagon spanned by the 8 vertices:

±(12ζ,0),±(ζ,ζ),±(0,12ζ),±(ζ,ζ),\pm(\frac{1}{2}-\zeta,0),\,\pm(\zeta,\zeta),\,\pm(0,\frac{1}{2}-\zeta),\,\pm(\zeta,-\zeta),\, (60)

with ζ:=1212\zeta:=\frac{1}{\sqrt{2}}-\frac{1}{2}. For completeness, we provide the local bound g(r0,r1)g(r_{0},r_{1}) of this two-parameter family of inequalities in Eq.˜84 of Section˜B.6. It is easy to verify that the Bell inequalities of Eq.˜59 cannot be written in a PPI form, even after any relabeling of the settings and outcomes. At the same time, it has been shown in [85] that they are all maximally violated by the Tsirelson correlation PT\vec{P}_{T} of Eq.˜14, which is PPI. In other words, the family of asymmetric Bell inequalities given by Eq.˜59 are all maximally violated by the same symmetric correlation PT\vec{P}_{T}.

VIII Conclusion

Due to the arbitrariness in the classical labeling (of settings, outcomes, and parties) as well as the degeneracy arising from the normalization and no-signaling constraints, a Bell inequality may be rewritten in various forms. However, even after incorporating these degrees of freedom, not all Bell inequalities can be cast in a symmetric (party-permutation-invariant, PPI) form. In this work, we have focused on (facet-defining) Bell inequalities that indeed admit a symmetric representation.

In particular, we have explored the possibility of finding, for symmetric Bell inequalities, a symmetric quantum strategy (SQS) of minimal dimension that maximizes their Bell violation. Our results show that, for integer d[2,19]d\in[2,19], there exists an SQS in dimension dd maximizing the Bell violation of the family of symmetric I22ddI_{22dd} inequalities (known [69] to be equivalent to the CGLMP Bell inequalities). Moreover, for d5d\leq 5, no quantum strategy of a smaller Hilbert dimension can attain the same maximal value.

However, for a family of symmetric Bell inequalities in the (2,3,2)(2,3,2) Bell scenario and 9 of the nontrivial, symmetric, genuine four-setting facet-defining Bell inequalities applicable to the (2,4,2)(2,4,2) Bell scenario, we observe a gap between the maximal quantum violation achievable and that arising from an SQS of minimal dimension. In other words, there exists a trade-off between symmetry and dimension for achieving the maximal quantum violation of these inequalities—either we opt for an SQS that is higher-dimensional, or we go for an asymmetric quantum strategy (QS) that is of minimal dimension, but not both. Note, however, that we do not know if one can find an example of such a trade-off in a simpler Bell scenario, a problem that may deserve further investigation.

Interestingly, since the optimal, minimal-dimension quantum strategy for all these symmetric inequalities gives rise to an asymmetric correlation, it follows from Proposition 7 that the quantum maximizers of each of these Bell inequalities must define a flat region of the quantum boundary. As explained in Section˜VII, this feature has negative implications on the possibility of performing self-testing using the observed quantum violation of these inequalities.

Also worth noting is that among the inequalities showing a trade-off, the maximal (qubit) violations of J442242J_{4422}^{42} under different constraints satisfy:

maxQubit SQSJ442242<maxQubit PJ442242<maxQubit PJ442242=maxP𝒬J442242.\max_{\text{Qubit SQS}}J_{4422}^{42}<\max_{\text{Qubit $\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}}$}}J_{4422}^{42}<\max_{\text{Qubit $\vec{P}$}}J_{4422}^{42}=\max_{\vec{P}\in\mathcal{Q}}J_{4422}^{42}. (61)

Hence, with the assumption that the employed QS is a qubit strategy, one may certify that the underlying strategy is asymmetrical, even if the observed correlation is symmetric, i.e.,

J442242Qubit SQS0.5682J_{4422}^{42}\overset{\text{Qubit SQS}}{\leq}0.5682 (62)

serves as a semi-device-independent [86] witness for an asymmetric qubit QS. In fact, the trade-off is so strong that even if we allow arbitrary symmetric correlations attainable with two-qubit QSs, there remains a gap with the maximal quantum violation of J442242J_{4422}^{42}. In contrast, we present in Section˜B.5 an example of a 99-setting Bell inequality that again shows a gap between the maximal two-qubit SQS violation and that achievable with two-qubit symmetric correlations, but where the latter already achieves the quantum maximum.

Bell Inequality Facet β\vec{\beta}_{\scalebox{0.6}{$\leftrightarrow$}} dmd_{\text{m}} 𝔔lrvecdm\lrvec{\mathfrak{Q}}^{*}_{d_{\text{m}}} (SQS, P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}}, P\vec{P}^{*})
CHSH [52]: Eq.˜7 2 Eq.˜8:(✗, ✓, ✓)
CHSH [52]: Eq.˜7 2 Eq.˜21:(✓,✓, ✓)
I2233I_{2233} [54]: Section˜IV.2 3 Eq.˜24:✓, ✓, ✓)
I3322cI_{3322c} [77]: Section˜V.1 2 Eq.˜73:(✓, ✓, ✓)
IS(α)I_{S}(\alpha): Section˜V.1 2 Eq.˜74:(✗, ✗, ✓)
J442242J_{4422}^{42}[33]: Section˜B.4 2 Eq.˜28:(✗, ✓, ✗)
Ir0,r1I_{r_{0},r_{1}} [85]: Eq.˜59 2 Eq.˜21:(✓,✓, ✓)
Table 2: Summary of some of the examples presented in this work. From left to right, we list the Bell inequality considered (together with the equation number where we list its explicit form), its facet-defining property, its symmetric property (PPI or not), the dimension dmd_{\text{m}} of its minimal maximizing quantum strategy 𝔔dm\mathfrak{Q}^{*}_{d_{\text{m}}}, and whether there exists a 𝔔lrvecdm\lrvec{\mathfrak{Q}}^{*}_{d_{\text{m}}}, i.e., a 𝔔dm\mathfrak{Q}^{*}_{d_{\text{m}}} that is also an symmetric (its absence, marked by ✗, indicates the existence of a trade-off between symmetry and dimension). Further to the right, we list the equation number of an explicit QS considered, and indicate whether it is an SQS, whether the resulting correlation is symmetric (P\vec{P}_{\scalebox{0.6}{$\leftrightarrow$}}), and whether it maximizes the corresponding Bell-inequality violation (P\vec{P}^{*}).

Of course, by considering a nontrivial, asymmetric Bell inequality, one may also hope to drop the dimension assumption and go for a fully device-independent witness for asymmetry. Indeed, for all facet-defining Bell inequalities in the (2,m,2)(2,m,2) and (2,2,d)(2,2,d) Bell scenarios with m4m\leq 4 and d5d\leq 5, we observe that there always exists an asymmetric representation that cannot be violated by symmetric quantum correlations. It will certainly be interesting to see if this feature holds true in general, specifically, for all Bell scenarios. For a summary of some other results we have obtained, see Table˜2.

Note also that the realizability of symmetric distributions by a symmetric model has also been explored in the context of network nonlocality. In fact, it has recently been shown [87] that there exist symmetric distributions in the triangle network (under exchange of parties) that cannot be created via a symmetric model assuming only no-signaling, regardless of the dimension or nature of the system. Moreover, such intriguing distributions can be created via a local asymmetric model.

Finally, note also that while we have focused on the symmetry of (full) permutation invariance, there are clearly interesting alternatives to consider. For instance, one may consider Bell inequalities that exhibit translationally (also called cyclic-permutation) invariance [56, 88, 89]. Could one find a similar kind of trade-off between dimension and symmetry? We leave the exploration of this and other interesting questions for future work.

Acknowledgements.
We thank István Márton, Károly F. Pál, Gilles Pütz, William Slofstra, and Elie Wolfe for helpful discussions. HYH thanks Bo-An Tsai for sharing his code, which led to some of the results presented here. KSC thanks the hospitality of the Institut Néel, where part of this work was completed. This work was supported by the National Science and Technology Council, Taiwan (Grants No. 109-2112-M-006-010-MY3, 112-2628-M-006-007-MY4, 113-2917-I-006-023, 113-2918-I-006-001), the Foxconn Research Institute, Taipei, Taiwan, in part by the Higher Education Sprout Project, Ministry of Education, to the Headquarters of University Advancement at the National Cheng Kung University (NCKU), and in part by the Perimeter Institute for Theoretical Physics. Research at Perimeter Institute is supported by the Government of Canada through the Department of Innovation, Science, and Economic Development, and by the Province of Ontario through the Ministry of Colleges and Universities. T. V. acknowledges the support of the European Union (CHIST-ERA MoDIC), the National Research, Development and Innovation Office NKFIH (Grants No. 2023-1.2.1-ERA_NET-2023-00009 and No. K145927) and the ‘Frontline’ Research Excellence Program of the NKFIH (No. KKP133827).

Appendix A Bounding quantum values of Bell inequality allowed by symmetric correlations and symmetric strategies

Let ()\mathcal{B}(\mathcal{H}) be the set of operators acting on \mathcal{H}. Given a bipartite Bell inequality specified by the coefficients β\vec{\beta}, our goal is to obtain its maximal value over all possible symmetric quantum strategies (SQSs) of local Hilbert space dimension upper bounded by dDd\leq D, i.e.,

maxρAB,{Ma|x}\displaystyle\max_{\rho_{\rm AB},\{M_{a|x}\}}\quad βP\displaystyle\qquad\ \vec{\beta}\cdot\vec{P}
such that PAB(a,b|x,y)=tr(ρABMa|xMb|y),\displaystyle\ P_{\rm AB}(a,b|x,y)=\mathrm{tr}(\rho_{\rm AB}M_{a|x}\otimes M_{b|y}),
tr(ρAB)=1,ρAB=SρABS0,\displaystyle\ \mathrm{tr}(\rho_{\rm AB})=1,\quad\rho_{\rm AB}=S\rho_{\rm AB}S^{\dagger}\succeq 0,
ρAB(DD),\displaystyle\ \rho_{\rm AB}\in\mathcal{B}(\mathbb{C}^{D}\otimes\mathbb{C}^{D}), (63)
aMa|x=𝕀Dx,Ma|x0,a,x,\displaystyle\ \sum_{a}M_{a|x}=\mathbb{I}_{D}\ \forall\ x,\quad M_{a|x}\succeq 0,\ \forall\ a,x,

where SS defined in Eq.˜12 is the swap operator.

Since an SQS necessarily gives a symmetric correlation, cf. Eq.˜13, this problem may be relaxed, e.g., by optimizing over symmetric correlations attainable by QSs of the same HSD, i.e.,

maxρAB,{Ma|xA},{Mb|yB}\displaystyle\max_{\rho_{\rm AB},\{M^{A}_{a|x}\},\{M^{B}_{b|y}\}}\,\, βP\displaystyle\qquad\ \vec{\beta}\cdot\vec{P}
such that PAB(a,b|x,y)=PAB(b,a|y,x),\displaystyle\ P_{\rm AB}(a,b|x,y)=P_{\rm AB}(b,a|y,x),
PAB(a,b|x,y)=tr(ρABMa|xAMb|yB),\displaystyle\ P_{\rm AB}(a,b|x,y)=\mathrm{tr}(\rho_{\rm AB}M^{A}_{a|x}\otimes M^{B}_{b|y}),
tr(ρAB)=1,ρAB0,\displaystyle\ \mathrm{tr}(\rho_{\rm AB})=1,\,\,\rho_{\rm AB}\succeq 0,\,\,
ρAB(DD),\displaystyle\ \rho_{\rm AB}\in\mathcal{B}(\mathbb{C}^{D}\otimes\mathbb{C}^{D}), (64)
aMa|xA=𝕀Dx,Ma|xA0,a,x,\displaystyle\ \sum_{a}M^{A}_{a|x}=\mathbb{I}_{D}\ \forall\ x,\quad M^{A}_{a|x}\succeq 0,\ \forall\ a,x,
bMb|yB=𝕀Dy,Mb|yB0,b,y.\displaystyle\ \sum_{b}M^{B}_{b|y}=\mathbb{I}_{D}\ \forall\ y,\quad M^{B}_{b|y}\succeq 0,\ \forall\ b,y.

In other words, the optimum value of appendix˜A is always larger than or equal to that of appendix˜A.

A.1 Upper bounding the quantum violation of a Bell inequality

A.1.1 Without dimensional constraints

When there is no dimension constraint, i.e., if D=D=\infty, there is no distinction between the Bell value achievable by SQSs and symmetric correlations, see Proposition 2. Then, an upper bound on the maximal quantum violation by SQS can be obtained by solving any SDP hierarchy that outer approximates the quantum set 𝒬\mathcal{Q}, such as that due to Navascués-Pironio-Acín (NPA) [46, 47] and Moroder et al. [40], but now with the additional constraints that all the moments are invariant under the action of the symmetry group GG. For example, in the case of a bipartite Bell scenario, cf. Definition˜1, we require that all moments remain invariant under the exchange ABA\leftrightarrow B, which means that all moments of the kind Ma1|x1AMak|xkAMb1|y1BMb|yB\langle M^{A}_{a_{1}|x_{1}}\cdots M^{A}_{a_{k}|x_{k}}M^{B}_{b_{1}|y_{1}}\cdots M^{B}_{b_{\ell}|y_{\ell}}\rangle can be taken to be the same as Mb1|y1AMb|yAMa1|x1BMak|xkB\langle M^{A}_{b_{1}|y_{1}}\cdots M^{A}_{b_{\ell}|y_{\ell}}M^{B}_{a_{1}|x_{1}}\cdots M^{B}_{a_{k}|x_{k}}\rangle. To this end, one may first take the moment matrix Γ\Gamma at any given level of these hierarchies and perform the twirling,

Γ¯=1|G|σGUσΓUσ,\bar{\Gamma}=\frac{1}{|G|}\sum_{\sigma\in G}U_{\sigma}\Gamma U_{\sigma}^{\dagger}, (65)

where UσU_{\sigma} is the unitary operator that effects the appropriate row-permutation of Γ\Gamma corresponding to the action of σ\sigma. Clearly, Γ¯\bar{\Gamma} consists of fewer independent moments compared with Γ\Gamma. A symmetric upper bound is then obtained by maximizing the Bell value subject to Γ¯0\bar{\Gamma}\succeq 0 instead of Γ0\Gamma\succeq 0. For further information, see the detailed discussion given in [49, 51].

A.1.2 With dimensional constraints

When a local dimension bound dDd\leq D is present, a powerful analog of the NPA hierarchy was proposed in [44, 45]. In particular, the software package QDimSum discussed in [50] has been developed to implement precisely this and other related finite-dimensional optimizations. To this end, notice that whenever a symmetric Bell inequality is provided to QDimSum as an objective function, Eq.˜65 is implemented with respect to the symmetric group GG that leaves the Bell inequality invariant. Hence, whenever we use QDimSum to maximize the value of a PPI Bell inequality, we naturally obtain an upper bound on appendix˜A, i.e., the maximal value allowed by symmetric correlations arising from dimension-bounded (not necessarily symmetric) QSs.

To obtain a (tighter) upper bound applicable to SQS, i.e., appendix˜A, we modify the sampling procedure described in [44, 45] for generating random moment and localizing matrices. Specifically, instead of sampling normalized random pure states from AB=DD\mathcal{H}_{A}\otimes\mathcal{H}_{B}=\mathbb{C}^{D}\otimes\mathbb{C}^{D}, we randomly sample symmetric (antisymmetric) pure states from AB\mathcal{H}_{A}\otimes\mathcal{H}_{B} by considering random, but normalized linear combination of vectors from the symmetric (antisymmetric) subspace of AB\mathcal{H}_{A}\otimes\mathcal{H}_{B}. Moreover, instead of sampling random POVMs for Alice and Bob independently, we randomly sample Alice’s POVM and make Bob’s POVMs identical to those of Alice.

A.2 Lower bounding the quantum violation of a Bell inequality

A.2.1 Over symmetric quantum strategies

To obtain a lower bound for the maximization problem of appendix˜A, we may:

  1. 1.

    Without loss of generality, take ρAB=|ψψ|\rho_{\text{AB}}=\ket{\psi}\!\!\bra{\psi} to be a pure state and choose |ψ\ket{\psi} to be an arbitrary, normalized linear combination of basis states in the (anti)symmetric subspace.

  2. 2.

    Set each Ma|xM_{a|x} to be a projector

    Ma|x=Πa|x=Πa|x2=j=1ra|x|ϕa,x,jϕa,x,j|M_{a|x}=\Pi_{a|x}=\Pi_{a|x}^{2}=\sum_{j=1}^{r_{a|x}}\ket{\phi_{a,x,j}}\!\!\bra{\phi_{a,x,j}} (66)

    such that the sum of their rank ara|x=D\sum_{a}r_{a|x}=D for all xx, where {|ϕa,x,j}a,j\{\ket{\phi_{a,x,j}}\}_{a,j} may be taken as an orthonormal set of column vectors forming a D×DD\times D unitary matrix UxU_{x}.

  3. 3.

    Optimize over the the parameters defining |ψ\ket{\psi} and the unitary operators {Ux}x\{U_{x}\}_{x}.

Notice that for step (1), a general symmetric and antisymmetric state can be expressed, respectively, as a linear combination of D(D+1)2\frac{D(D+1)}{2} symmetric and D(D1)2\frac{D(D-1)}{2} antisymmetric basis states. Moreover, for step (2), the QLib package [90] provides a convenient parametrization of any element of SU(DD) via D21D^{2}-1 real parameters. All these parameters can then be optimized over, e.g., using the 𝖿𝗆𝗂𝗇𝗎𝗇𝖼\mathsf{fminunc} function in MATLAB to obtain a local maximum of appendix˜A. Since these are high-dimensional optimizations over O((m+1)D2)O((m+1)D^{2}) real parameters, with mm being the number of measurement settings, it is usually necessary to perform multiple optimizations to get a good lower bound.

A.2.2 Over symmetric quantum correlations

For the maximization problem of appendix˜A, which provides an upper bound to that of appendix˜A, we may adapt the (see-saw) algorithm described in [78, 33, 24] to iteratively optimize over

  1. 1.

    Alice’s POVM {Ma|xA}a,x\{M^{A}_{a|x}\}_{a,x} for given state ρAB\rho_{\text{AB}} and Bob’s POVM {Mb|yB}b,y\{M^{B}_{b|y}\}_{b,y};

  2. 2.

    Bob’s POVM {Mb|yB}b,y\{M^{B}_{b|y}\}_{b,y} for given state ρAB\rho_{\text{AB}} and Alice’s POVM {Ma|xA}a,x\{M^{A}_{a|x}\}_{a,x};

  3. 3.

    ρAB\rho_{\text{AB}} for given Alice’s POVM {Ma|xA}a,x\{M^{A}_{a|x}\}_{a,x} and Bob’s POVM {Mb|yB}b,y\{M^{B}_{b|y}\}_{b,y}.

Note that each of these optimization problems is an SDP and remains so even if we include the symmetry requirement of Eq.˜9, cf. the first constraint of appendix˜A. Moreover, if the optimized strategy turns out to be symmetric, the optimum value would also be a legitimate lower bound of appendix˜A. Also, instead of Step 2, one may manually set Bob’s POVM to be the same as that of Alice before running step (3) above [while imposing Eq.˜9] to ensure that the resulting strategy is an SQS. However, with this modification, the iterative algorithm is no longer guaranteed to converge.

Appendix B Miscellaneous Details

B.1 CGLMP Inequalities and their quantum violation

B.1.1 Unitarity of the operators specified in Eq.˜24b

Here, we provide further details to illustrate the unitarity of the operators given in Eq.˜24b, and hence U=TWU=TW. In the case of TT, since it is a diagonal matrix having only eigenvalues 11 and 1-1, it is unitary.

To see that WW is unitary, it suffices to show that its rows are orthonormal, which from Eq.˜24b, amounts to demanding

1d2k=0d1csc[(ik12)πd]csc[(k12)πd]=δi,.\frac{1}{d^{2}}\sum_{k=0}^{d-1}\csc\left[\tfrac{\left(i-k-\frac{1}{2}\right)\pi}{d}\right]\csc\left[\tfrac{\left(\ell-k-\frac{1}{2}\right)\pi}{d}\right]=\delta_{i,\ell}. (67)

We now give a proof that Eq.˜67 holds.

Proof.

We start by noting the trigonometric identity

k=0d1csc[x+kπd]csc[y+kπd]=dcot(dx)cot(dy)sin(yx),\sum_{k=0}^{d-1}\csc\left[x+\frac{k\pi}{d}\right]\csc\left[y+\frac{k\pi}{d}\right]=d\frac{\cot(dx)-\cot(dy)}{\sin(y-x)}, (68)

which holds for any real x,yx,y and any integer d2d\geq 2. Eq.˜68 can be easily shown from the more familiar identities:

cscucscv=cotucotvsin(vu),k=0d1cot[x+kπd]=dcot(dx),\begin{gathered}\csc u\csc v=\frac{\cot u-\cot v}{\sin(v-u)},\quad\sum_{k=0}^{d-1}\cot\left[x+\frac{k\pi}{d}\right]=d\cot(dx),\end{gathered} (69)

by setting u=x+kπdu=x+\frac{k\pi}{d}, v=y+kπdv=y+\frac{k\pi}{d}, and summing both sides of the first identity over kk.

Next, let x=πd(i+12d)x=\frac{\pi}{d}(i+\frac{1}{2}-d), y=πd(+12d)y=\frac{\pi}{d}(\ell+\frac{1}{2}-d) and substitute these into Eq.˜68. Then, the LHS of Eq.˜68 becomes k=0d1csc[(i+12d+k)πd]csc[(+12d+k)πd]\sum_{k=0}^{d-1}\csc\left[(i+\frac{1}{2}-d+k)\frac{\pi}{d}\right]\csc\left[(\ell+\frac{1}{2}-d+k)\frac{\pi}{d}\right]. The value of this expression remains unchanged if we replace the summation index kk by d1kd-1-k, thus giving, modulo a factor of d2d^{2}, exactly the LHS of Eq.˜67. Incorporating this factor, we may then rewrite the LHS of Eq.˜67, via Eq.˜68, as

1dcot[(i+12d)π]cot[(+12d)π]sin[(i)πd]\frac{1}{d}\frac{\cot[(i+\frac{1}{2}-d)\pi]-\cot[(\ell+\frac{1}{2}-d)\pi]}{\sin[(\ell-i)\frac{\pi}{d}]} (70)

Consider now the case where ii\neq\ell, then the denominator of Eq.˜70 never vanishes for i,[d]i,\ell\in[d]. However, since (i+12d)π(i+\frac{1}{2}-d)\pi is a half-integer multiple of π\pi [likewise for (+12d)π(\ell+\frac{1}{2}-d)\pi], their cotangent vanishes, and hence the numerator also vanishes, i.e., Eq.˜70, and thus the LHS of Eq.˜67 vanishes whenever ii\neq\ell. To evaluate Eq.˜70 for the case of i=i=\ell, we apply the l’Hôpital rule to obtain

csc2[(i+12d)π]=1i,[d],\csc^{2}[(i+\frac{1}{2}-d)\pi]=1\quad\forall\,i,\ell\in[d], (71)

since (i+12d)π(i+\frac{1}{2}-d)\pi is a half-integer multiple of π\pi. In other words, the LHS of Eq.˜67 indeed becomes unity if i=i=\ell. Hence, Eq.˜67 holds as claimed. ∎

B.1.2 Optimal quantum violation and the minimal dimension dmd_{\text{m}}

In Table˜3, we summarize our results concerning the maximal quantum violation of the CGLMP inequality [20] IdI_{d} for d=2d=2 to 1919, obtained via the SQS described in Eq.˜24. Notice that these results generalize those presented in [21, 47] for d=2d=2 to 88.

dd Quantum value Difference dd Quantum value Difference
2 2.82842718 \leq 5.9e-8 11 3.15549968 \leq 1.9e-7
3 2.91485425 \leq 4.1e-8 12 3.16979224 \leq 2.6e-7
4 2.97269840 \leq 1.5e-7 13 3.18274300 \leq 2.7e-7
5 3.01571048 \leq 7.7e-9 14 3.19456537 \leq 3e-8
6 3.04970041 \leq 1.8e-10 15 3.20542659 \leq 1.3e-7
7 3.07764831 \leq 2.4e-9 16 3.21546005 \leq 1.34e-6
8 3.10128058 \leq 1.1e-10 17 3.22477378 \leq 2.5e-7
9 3.12168442 \leq 1e-8 18 3.23345644 \leq 4e-8
10 3.13958741 \leq 1.6e-7 19 3.24158164 \leq 9e-8
Table 3: Comparison of the quantum violation of the CGLMP inequality IdI_{d} based on the SQS of Eq.˜24 and the quantum upper bound obtained from NPA Level 1+AB1+AB. Shown in the table is the value of the parameter dd from 2 to 19, the quantum value of IdI_{d}, and its difference from the NPA upper bound, which falls within the numerical precision of the solver.

Next, we show in Table˜4 our results for bounding the minimal dimension dmd_{\text{m}} required to get the maximal violation (or the maximal-violating correlation) of the CGLMP inequality for d=2d=2 to 77.

dd Neg (|ψd\ket{\psi_{d}}) Neg(IdI_{d}^{*}) Neg(P\vec{P}^{*}) Level Size dmd_{\text{m}}
2 0.5 0.5000 0.5000 2 (25; 31) 2
3 0.9836 0.9835 0.9836 2 (169l; 1,003) 3
4 1.4561 1.4559 1.4561 2 (625; 14,797) 4
5 1.9203 1.8905 1.8909 2 (1,681; 116,702) 5
6 2.3778 1.7578 1.7603 1+ (2,025; 118,155) \geq 5
7 2.8298 1.5896 1.5919 1+ (2,809; 97,423) \geq 5
Table 4: Negativity and dimension lower bound from the maximal violation of the CGLMP inequality. From left to right, we list the parameter dd specifying the CGLMP inequality IdI_{d}, negativity [53] of the optimal quantum state |ψd\ket{\psi_{d}} obtained from Eq.˜24, negativity lower bound based on observing the maximal violation IdI_{d}^{*} of the CGLMP inequality, negativity lower bound based on observing the maximal IdI_{d}-violating correlation, the level of the Moroder hierarchy [40] involved in the computation of Neg(IdI_{d}^{*}) and Neg(P\vec{P}^{*}), the size of the SDP (size of the moment matrix, number of independent moments after symmetrization), and the corresponding lower bound on dmd_{\text{m}} for IdI_{d} (obtained by comparing against the maximum value of d12\frac{d-1}{2} attainable for a two-qudit system).
Inequality dmd_{\text{m}} Quantum Bound Inequality dmd_{\text{m}} Quantum Bound Inequality dmd_{\text{m}} Quantum Bound
A5A_{5} 2 0.4353 I442220I_{4422}^{20} 4 0.4677 J442261J_{4422}^{61} 2 0.8175
A6A_{6} 4 0.3004 J442212J_{4422}^{12} 4 0.7262 J442285J_{4422}^{85} 2 0.9763
A7(I44221)A_{7}\,\bigl(I_{4422}^{1}\bigr) 3 0.2879 J442217J_{4422}^{17} 2 0.6380 J442290J_{4422}^{90} 2 0.8398
AII1AII_{1} 2 0.6056 J442218J_{4422}^{18} 2 1.0130 J442291J_{4422}^{91} 2 1.2993
AS1AS_{1} 2 0.5413 J442219J_{4422}^{19} 2 0.6742 J442292J_{4422}^{92} 2 1.0648
AS2AS_{2} 2 0.8785 J442222J_{4422}^{22} 2 0.8156 J442297J_{4422}^{97} 2 1.1584
I44229I_{4422}^{9} 2 0.4617 J442226J_{4422}^{26} 2 0.6402 J4422102J_{4422}^{102} 2 0.6651
I442210I_{4422}^{10} 2 0.6139 J442227J_{4422}^{27} 2 0.8972 J4422105J_{4422}^{105} 2 1.0742
I442211I_{4422}^{11} 2 0.6383 J442228J_{4422}^{28} 2 0.7500 J4422108J_{4422}^{108} 2 0.9677
I442212I_{4422}^{12} 2 0.6188 J442229J_{4422}^{29} 2 1.0246 J4422109J_{4422}^{109} 2 1.7261
I442214I_{4422}^{14} 2 0.4794 J442232J_{4422}^{32} 2 0.5901 J4422110J_{4422}^{110} 2 0.9457
I442216I_{4422}^{16} 2 0.4142 J442241J_{4422}^{41} 2 0.7596 J4422125J_{4422}^{125} 2 1.0000
I442217I_{4422}^{17} 2 0.6714 J442258J_{4422}^{58} 2 0.8814 S24251S_{242}^{51} 2 1.0135
I442218I_{4422}^{18} 3 0.6430 J442260J_{4422}^{60} 2 0.5923 S24252S_{242}^{52} 2 0.8704
Table 5: List of all symmetric facet-defining four-setting, two-outcome Bell inequalities whose maximal quantum violation (denoted as “Quantum Bound”) is achievable using an SQS of minimal dimension dmd_{\text{m}}. In other words, to attain the maximal quantum violation of these inequalities, there is no trade-off between symmetry and dimension.

B.2 SQS maximally violating an I3322I_{3322}-like inequality

Consider the Bell inequality from [77, Eq. (27)]

I3322c=\displaystyle I_{3322c}= A0B1+A0B2+A1B0+A2B0\displaystyle\langle A_{0}B_{1}\rangle+\langle A_{0}B_{2}\rangle+\langle A_{1}B_{0}\rangle+\langle A_{2}B_{0}\rangle (72)
+\displaystyle+ A0B0+A1B1A1B2A2B14,\displaystyle\langle A_{0}B_{0}\rangle+\langle A_{1}B_{1}\rangle-\langle A_{1}B_{2}\rangle-\langle A_{2}B_{1}\rangle\overset{\mathcal{L}}{\leq}4,

which can be seen, after relabeling, as keeping only the correlation part of the I3322I_{3322} inequality. The optimal quantum strategy presented in [77] is not PPI. However, we can turn it into an SQS by first applying σz\sigma_{z}, followed by Rx^(α)R_{\hat{x}}(\alpha) on Bob’s Hilbert space. After this rotation, the strategy becomes

|ψ\displaystyle\ket{\psi} =isinα2|Φ+cosα2|Ψ+,\displaystyle=i\sin\frac{\alpha}{2}\ket{\Phi^{+}}-\cos\frac{\alpha}{2}\ket{\Psi^{+}}, (73)
A^0\displaystyle\hat{A}_{0} =B^0=12(2cos(π6)σx+cos(α)σy+sin(α)σz),\displaystyle=\hat{B}_{0}=\frac{1}{2}\big(2\cos{\frac{\pi}{6}}\,\sigma_{x}+\cos{\alpha}\,\sigma_{y}+\sin{\alpha}\,\sigma_{z}\big),
A^1\displaystyle\hat{A}_{1} =B^1=12(2cos(π6)σxcos(α)σysin(α)σz),\displaystyle=\hat{B}_{1}=\frac{1}{2}\big(2\cos{\frac{\pi}{6}}\,\sigma_{x}-\cos{\alpha}\,\sigma_{y}-\sin{\alpha}\,\sigma_{z}\big),
A^2\displaystyle\hat{A}_{2} =B^2=σy,\displaystyle=\hat{B}_{2}=\sigma_{y},

which is easily verified to give a quantum value of 55 for all α[0,2π]\alpha\in[0,2\pi]. Notice that, by construction, despite its dependence on α\alpha, the two-qubit state of Eq.˜73 is always maximally entangled.

B.3 Optimal quantum strategy for IS(α)I_{S}(\alpha)

An asymmetric two-qubit quantum strategy that gives the maximal violation of the family of Bell inequalities of Section˜V.1 consists of Alice and Bob sharing the two-qubit state

|ψ=p|00+1p|11,\ket{\psi}=\sqrt{p}\ket{00}+\sqrt{1-p}\ket{11}, (74a)
and measuring the dichotomic observables:
A^0=sσx+1s2σz,A^1=σx,A^2=σz,B^y=tσx+(1)y1t2σzfor y=0,1, and B^2=𝕀2.\begin{gathered}\hat{A}_{0}=s\,\sigma_{x}+\sqrt{1-s^{2}}\sigma_{z},\quad\hat{A}_{1}=\sigma_{x},\quad\hat{A}_{2}=\sigma_{z},\\ \hat{B}_{y}=t\,\sigma_{x}+(-1)^{y}\sqrt{1-t^{2}}\sigma_{z}\,\,\text{for }y=0,1,\text{ and }\,\,\hat{B}_{2}=\mathbb{I}_{2}.\end{gathered} (74b)
For α=1.5\alpha=1.5, the actual values of these parameters are
p=1621,s=817,t=53,p=\tfrac{16}{21},\quad s=\tfrac{8}{17},\quad t=-\tfrac{\sqrt{5}}{3}, (74c)
thereby giving IS(1.5)=813I_{S}(1.5)=8\frac{1}{3}, while those for α=2\alpha=2 are
p=2(1+13)313,s=10131861,t=111318.p=\tfrac{2(1+\sqrt{13})}{3\sqrt{13}},\quad s=\tfrac{10\sqrt{13}-18}{61},\quad t=-\sqrt{\tfrac{11-\sqrt{13}}{18}}. (74d)

B.4 Symmetric bipartite facet-defining Bell inequalities with four binary-outcome measurements

Among the complete list of 175 facet-defining Bell inequalities of the Bell scenario (2,4,2)(2,4,2), 55 of them can be cast in a symmetric form. Apart from the positivity facet, the CHSH Bell inequality of Eq.˜6, the (symmetric) I3322I_{3322} Bell inequality [75, 76], the 9 inequalities listed in Table˜1, and the J442242J^{42}_{4422} inequality, the remaining 42 symmetric four-setting facet-defining Bell inequalities, listed in Table˜5, show no trade-off between symmetry and dimension.

For completeness, we provide here the explicit form of the J442242J^{42}_{4422} Bell inequality:

J442242=\displaystyle J^{42}_{4422}= 3PAB(0,0|0,0)+PAB(0,0|1,1)\displaystyle-3P_{\rm AB}(0,0|0,0)+P_{\rm AB}(0,0|1,1)
+PAB(0,0|2,3)+y12PAB(0,0|1,y)\displaystyle+P_{\rm AB}(0,0|2,3)+\sum_{y\neq 1}2P_{\rm AB}(0,0|1,y)
+y=23[PAB(0,0|0,y)2PAB(0,0|y,y)]\displaystyle+\sum_{y=2}^{3}\left[P_{\rm AB}(0,0|0,y)-2P_{\rm AB}(0,0|y,y)\right] (75)
[PA(0|0)+PA(0|3)+4PA(0|1)]+0,\displaystyle-\left[P_{\rm A}(0|0)+P_{\rm A}(0|3)+4P_{\rm A}(0|1)\right]+\circlearrowright\,\,\overset{\mathcal{L}}{\leq}0,

where we use \circlearrowright to refer to the six remaining terms of PAB(0,0|x,y)P_{\rm AB}(0,0|x,y) and PB(0|y)P_{\rm B}(0|y)s that have to be included to ensure that the Bell inequality is PPI.

For the various SQS (and symmetric-correlation) bounds of those inequalities from Table˜5 with dm>2d_{\text{m}}>2, see Table˜6.

Inequality dmd_{m} d=2d=2 d=3d=3 Quantum Bound
A6A_{6} 4 0.2990 0.2990 0.3004
A7(I44221)A_{7}\,\bigl(I_{4422}^{1}\bigr) 3 0.2500 0.2879 0.2879
I442218I_{4422}^{18} 3 0.4676 0.6430 0.6430
I442220I_{4422}^{20} 4 0.3056 0.3662 (0.4362) 0.4677
J442212J_{4422}^{12} 4 0.6719 0.6830 0.7262
Table 6: Subset of inequalities from Table˜5 whose minimal dimension dm>2d_{\text{m}}>2. The third and fourth columns show, respectively, the SQS bound for d=2d=2 and d=3d=3, which also coincides with the symmetric correlation bound derived from [50], except for I442220I_{4422}^{20}, where the latter bound is included in parentheses.

B.5 Quantum violation of I9I_{9}

In this Appendix, we shall present a symmetric Bell inequality I9I_{9} defined for the (2,9,2)(2,9,2) Bell scenario such that there is again a trade-off between symmetry and dimension when one maximizes its Bell violation. In particular, even though the maximal quantum violation of I9I_{9} can be achieved using a symmetric correlation arising from a symmetric two-qubit state and a mirror-symmetric measurement strategy, the maximal quantum value attainable using a two-qubit SQS is always suboptimal.

Let us first recall the self-testing results shown in [91]. There, the authors considered the following Bell inequality (introduced in [92]):

CHSH3\displaystyle\text{CHSH}_{3} =CHSH(1,2;4,5)+CHSH(1,3;6,7)\displaystyle=\text{CHSH}(1,2;4,5)+\text{CHSH}(1,3;6,7) (76)
+CHSH(2,3;8,9),\displaystyle+\text{CHSH}(2,3;8,9),

where, cf. Eq.˜7,

CHSH(x1,x2;y1,y2)Ax1(By1+By2)+Ax2(By1By2).\text{CHSH}(x_{1},x_{2};y_{1},y_{2})\coloneqq\braket{A_{x_{1}}(B_{y_{1}}+B_{y_{2}})}+\braket{A_{x_{2}}(B_{y_{1}}-B_{y_{2}})}. (77)

The maximal quantum violation of CHSH3\text{CHSH}_{3} is easily seen to be 3×22=623\times 2\sqrt{2}=6\sqrt{2}, which one can attain by locally measuring the Bell state |Φ+\ket{\Phi^{+}} with the following dichotomic observables:

A^1=σz,A^2=σx,A^3=σy,B^4=σz+σx2,B^5=σzσx2,B^6=σz+σy2,B^7=σzσy2,B^8=σx+σy2,B^9=σxσy2.\begin{gathered}\hat{A}_{1}=\sigma_{z},\quad\hat{A}_{2}=\sigma_{x},\quad\hat{A}_{3}=-\sigma_{y},\\ \hat{B}_{4}=\frac{\sigma_{z}+\sigma_{x}}{\sqrt{2}},\quad\hat{B}_{5}=\frac{\sigma_{z}-\sigma_{x}}{\sqrt{2}},\\ \hat{B}_{6}=\frac{\sigma_{z}+\sigma_{y}}{\sqrt{2}},\quad\hat{B}_{7}=\frac{\sigma_{z}-\sigma_{y}}{\sqrt{2}},\\ \hat{B}_{8}=\frac{\sigma_{x}+\sigma_{y}}{\sqrt{2}},\quad\hat{B}_{9}=\frac{\sigma_{x}-\sigma_{y}}{\sqrt{2}}.\end{gathered} (78)

In fact, it was shown in [91] that the maximal quantum value of 626\sqrt{2} self-tests the two-qubit maximally entangled state |Φ+\ket{\Phi^{+}} and, up to complex conjugation, the Pauli observables A^x\hat{A}_{x} for x=1,2,x=1,2, and 33. Now consider the following Bell inequality in the scenario of (2,9,2)(2,9,2):

I9=CHSH3+CHSH3+k=13AkBk,I_{9}=\text{CHSH}_{3}+\text{CHSH}_{3}^{\prime}+\sum_{k=1}^{3}\braket{A_{k}B_{k}}, (79)

where CHSH3\text{CHSH}_{3}^{\prime} is obtained from CHSH3\text{CHSH}_{3} by swapping the roles of Alice and Bob, i.e., CHSH3=CHSH(4,5;1,2)+CHSH(6,7;1,3)+CHSH(8,9;2,3)\text{CHSH}_{3}^{\prime}=\text{CHSH}(4,5;1,2)+\text{CHSH}(6,7;1,3)+\text{CHSH}(8,9;2,3). The inequality I9I_{9} is symmetric according to Definition˜2.

Proposition 9.

The maximal quantum value of I9I_{9} cannot be achieved by any symmetric qubit quantum strategy.

Proof.

The maximal quantum value of I9I_{9}, namely 122+312\sqrt{2}+3, can be attained by locally measuring |Φ+\ket{\Phi^{+}} with the observables {A^x}x=13\{\hat{A}_{x}\}_{x=1}^{3}, {B^y}y=49\{\hat{B}_{y}\}_{y=4}^{9} specified in Eq.˜78 and their complex conjugation, i.e., A^k:=(B^k)\hat{A}_{k}:=(\hat{B}_{k})^{*} for k=4k=4 to 9 and B^k:=(A^k)\hat{B}_{k}:=(\hat{A}_{k})^{*} for k=1k=1 to 3. In particular, any realization achieving the maximal value of I9I_{9} also achieves the maximal value of CHSH3\mathrm{CHSH}_{3}. According to the self-testing result of [91], the underlying state |ψ\ket{\psi} is therefore locally isometric to a two-qubit maximally entangled state, |Φ+\ket{\Phi^{+}}. In particular, the state |ψ\ket{\psi} in any qubit strategy reaching the maximal value of I9I_{9} can be written as |ψ=\IU|Φ+\ket{\psi}=\I\otimes U\ket{\Phi^{+}} for some USU(2)U\in SU(2). The identity V\I|Φ+=\IVT|Φ+V\otimes\I\ket{\Phi^{+}}=\I\otimes V^{T}\ket{\Phi^{+}} allows us to consider local unitaries operating on only one side without loss of generality.

Suppose, for contradiction, that there exists some symmetric qubit strategy achieving the maximal value of I9I_{9}, i.e., Ai=BiA_{i}=B_{i}, for i=1,2,3i=1,2,3. To reach 122+312\sqrt{2}+3, the three diagonal correlators AiBi\braket{A_{i}B_{i}} must all be 11. Then for each i{1,2,3}i\in\{1,2,3\}, we have

1=ψ|A^iA^i|ψ=Φ+|A^iUA^iU|Φ+1,1=\braket{\psi|\hat{A}_{i}\otimes\hat{A}_{i}|\psi}=\braket{\Phi^{+}|\hat{A}_{i}\otimes U^{\dagger}\hat{A}_{i}U|\Phi^{+}}\leq 1, (80)

where the last inequality follows from the Cauchy-Schwarz inequality. Since the inequality is saturated, we must have |Φ+=A^iUA^iU|Φ+{\ket{\Phi^{+}}=\hat{A}_{i}\otimes U^{\dagger}\hat{A}_{i}U\ket{\Phi^{+}}} =𝕀2(A^i)TUA^iU|Φ+=\mathbb{I}_{2}\otimes(\hat{A}_{i})^{\text{\tiny T}}U^{\dagger}\hat{A}_{i}U\ket{\Phi^{+}}, where (.)T(.)^{\text{\tiny T}} denotes transposition. Applying 0|𝕀2\bra{0}\otimes\mathbb{I}_{2} and 1|𝕀2\bra{1}\otimes\mathbb{I}_{2} on both sides, we infer that (A^i)TUA^iU=𝕀2(\hat{A}_{i})^{\text{\tiny T}}U^{\dagger}\hat{A}_{i}U=\mathbb{I}_{2}, which further implies that

(A^i)T=UA^iUfor i=1,2,3,(\hat{A}_{i})^{\text{\tiny T}}=U^{\dagger}\hat{A}_{i}U\quad\text{for }i=1,2,3, (81)

where we have used the fact a qubit observable A^i\hat{A}_{i} [and hence (A^i)T(\hat{A}_{i})^{\text{\tiny T}}] squares to the identity operator. Equivalently, Eq.˜81 means that there exists some rotation SO(3)\mathcal{R}\in SO(3) satisfying

(ai)σ=(ai)σ,(\mathcal{M}\vec{a}_{i})\cdot\vec{\sigma}=(\mathcal{R}\vec{a}_{i})\cdot\vec{\sigma}, (82)

where A^i=aiσ\hat{A}_{i}=\vec{a}_{i}\cdot\vec{\sigma} and =diag(1,1,1)\mathcal{M}=\text{diag}(1,-1,1). Heuristically, it asserts the existence of some rotation \mathcal{R} that can simultaneously map all ai\vec{a}_{i}s to each of their own reflection ai=ai,i=1,2,3\vec{a}_{i}^{\prime}=\mathcal{M}\vec{a}_{i},i=1,2,3.

However, at the maximal CHSH3\mathrm{CHSH}_{3} value, the observables A1,A2,A3A_{1},A_{2},A_{3} correspond to three mutually orthogonal Bloch vectors [91] a1,a2,a3\vec{a}_{1},\vec{a}_{2},\vec{a}_{3}, which cannot be coplanar. Hence, as explained in Proposition 5, there cannot be a rotation \mathcal{R} that satisfies Eq.˜82, thus leading to a contradiction. Therefore, no symmetric qubit strategies could reach the maximal quantum value of I9I_{9}. ∎

What then is the largest value of I9I_{9} achievable with a qubit SQS? To this end, the best violation that we have found using a qubit SQS is 63+919.3923<122+36\sqrt{3}+9\simeq 19.3923<12\sqrt{2}+3, where the SQS consists of measuring the Bell state |Φ+\ket{\Phi^{+}} with the observables

A^1=A^9=σz,A^8=σx,A^2=A^6=3σx+σz2,A^3=A^5=3σxσz2,A^4=σx+3σz2,A^7=σx+3σz2,\begin{gathered}\hat{A}_{1}=\hat{A}_{9}=\sigma_{z},\quad\hat{A}_{8}=\sigma_{x},\\ \hat{A}_{2}=\hat{A}_{6}=\frac{\sqrt{3}\sigma_{x}+\sigma_{z}}{2},\\ \hat{A}_{3}=-\hat{A}_{5}=\frac{\sqrt{3}\sigma_{x}-\sigma_{z}}{2},\\ \hat{A}_{4}=\frac{\sigma_{x}+\sqrt{3}\sigma_{z}}{2},\quad\hat{A}_{7}=\frac{-\sigma_{x}+\sqrt{3}\sigma_{z}}{2},\end{gathered} (83)

and B^i=A^i\hat{B}_{i}=\hat{A}_{i} for i=1i=1 to 99. Note that all these observables are real, and thus give rise to measurement (Bloch) vectors ak=bk\vec{a}_{k}=\vec{b}_{k} lying on the xzx-z plane.

B.6 Local bound for the Bell inequalities of Eq.˜59

The local upper bound g(r0,r1)g(r_{0},r_{1}) for the Bell expression defined in Eq.˜59 is, for any given pair (r0,r1)(r_{0},r_{1}):

max{12±r0±(21)r1,12±r1±(21)r0},\max\left\{\frac{1}{\sqrt{2}}\pm r_{0}\pm(\sqrt{2}-1)r_{1},\frac{1}{\sqrt{2}}\pm r_{1}\pm(\sqrt{2}-1)r_{0}\right\}, (84)

where the ±\pm expression in each term allows all combinations of signs. The actual bound depends on the octagon slice [spanned by (0,0)(0,0) and the vertices of Eq.˜60] to which the point (r0,r1)(r_{0},r_{1}) belongs.

For instance, consider the case where (r0,r1)(r_{0},r_{1}) belongs to the octagon slice spanned by (0,0)(0,0), (12ζ,0)(\frac{1}{2}-\zeta,0), and (ζ,ζ)(\zeta,\zeta), with ζ:=1212\zeta:=\frac{1}{\sqrt{2}}-\frac{1}{2}. Since r0r10r_{0}\geq r_{1}\geq 0, evaluating the maximum from Eq.˜84 gives

g(r0,r1)=12+r0+(21)r1.g(r_{0},r_{1})=\frac{1}{\sqrt{2}}+r_{0}+(\sqrt{2}-1)r_{1}. (85)

Similarly, if (r0,r1)(r_{0},r_{1}) belongs to the octagon slice spanned by (0,0)(0,0), (0,ζ12)(0,\zeta-\frac{1}{2}), and (ζ,ζ)(-\zeta,-\zeta), then r1r00r_{1}\leq r_{0}\leq 0, thus evaluating the maximum from Eq.˜84 gives

g(r0,r1)=12r1(21)r0.g(r_{0},r_{1})=\frac{1}{\sqrt{2}}-r_{1}-(\sqrt{2}-1)r_{0}. (86)

The local upper bound g(r0,r1)g(r_{0},r_{1}) of Ir0,r1I_{r_{0},r_{1}} for (r0,r1)(r_{0},r_{1}) belonging to the other six octagon slices can be easily deduced accordingly.

References

  • Bell [1964] J. S. Bell, Physics 1, 195 (1964).
  • Bell [2004] J. S. Bell, Speakable and Unspeakable in Quantum Mechanics: Collected Papers on Quantum Philosophy, 2nd ed. (Cambridge University Press, 2004).
  • Scarani [2012] V. Scarani, The device-independent outlook on quantum physics, Acta Phys. Slovaca 62, 347 (2012).
  • Brunner et al. [2014] N. Brunner, D. Cavalcanti, S. Pironio, V. Scarani, and S. Wehner, Bell nonlocality, Rev. Mod. Phys. 86, 419 (2014).
  • Ekert [1991] A. K. Ekert, Quantum cryptography based on Bell’s theorem, Phys. Rev. Lett. 67, 661 (1991).
  • Mayers and Yao [2004] D. Mayers and A. Yao, Self Testing Quantum Apparatus, Quantum Info. Comput. 4, 273 (2004).
  • Barrett et al. [2005a] J. Barrett, L. Hardy, and A. Kent, No Signaling and Quantum Key Distribution, Phys. Rev. Lett. 95, 010503 (2005a).
  • Vazirani and Vidick [2014] U. Vazirani and T. Vidick, Fully Device-Independent Quantum Key Distribution, Phys. Rev. Lett. 113, 140501 (2014).
  • Pironio et al. [2010] S. Pironio, A. Acín, S. Massar, A. B. d. l. Giroday, D. N. Matsukevich, P. Maunz, S. Olmschenk, D. Hayes, L. Luo, T. A. Manning, and C. Monroe, Random numbers certified by Bell’s theorem, Nature 464, 1021 (2010).
  • Colbeck and Kent [2011] R. Colbeck and A. Kent, Private randomness expansion with untrusted devices, J. Phys. A 44, 095305 (2011).
  • Bancal et al. [2015] J.-D. Bancal, M. Navascués, V. Scarani, T. Vértesi, and T. H. Yang, Physical characterization of devices from nonlocal correlations, Phys. Rev. A 91, 022115 (2015).
  • Liang et al. [2015] Y.-C. Liang, D. Rosset, J.-D. Bancal, G. Pütz, T. J. Barnea, and N. Gisin, Family of Bell-like Inequalities as Device-Independent Witnesses for Entanglement Depth, Phys. Rev. Lett. 114, 190401 (2015).
  • Chen et al. [2016] S.-L. Chen, C. Budroni, Y.-C. Liang, and Y.-N. Chen, Natural Framework for Device-Independent Quantification of Quantum Steerability, Measurement Incompatibility, and Self-Testing, Phys. Rev. Lett. 116, 240401 (2016).
  • Sekatski et al. [2018] P. Sekatski, J.-D. Bancal, S. Wagner, and N. Sangouard, Certifying the Building Blocks of Quantum Computers from Bell’s Theorem, Phys. Rev. Lett. 121, 180505 (2018).
  • Tavakoli et al. [2021] A. Tavakoli, M. Farkas, D. Rosset, J.-D. Bancal, and J. Kaniewski, Mutually unbiased bases and symmetric informationally complete measurements in Bell experiments, Sci. Adv. 7, eabc3847 (2021).
  • Wagner et al. [2020] S. Wagner, J.-D. Bancal, N. Sangouard, and P. Sekatski, Device-independent characterization of quantum instruments, Quantum 4, 243 (2020).
  • Chen et al. [2021] S.-L. Chen, H.-Y. Ku, W. Zhou, J. Tura, and Y.-N. Chen, Robust self-testing of steerable quantum assemblages and its applications on device-independent quantum certification, Quantum 5, 552 (2021).
  • Kaszlikowski et al. [2000] D. Kaszlikowski, P. Gnaciński, M. Żukowski, W. Miklaszewski, and A. Zeilinger, Violations of local realism by two entangled N\mathit{N}-dimensional systems are stronger than for two qubits, Phys. Rev. Lett. 85, 4418 (2000).
  • Durt et al. [2001] T. Durt, D. Kaszlikowski, and M. Żukowski, Violations of local realism with quantum systems described by N-dimensional Hilbert spaces up to N=16{N}=16, Phys. Rev. A 64, 024101 (2001).
  • Collins et al. [2002] D. Collins, N. Gisin, N. Linden, S. Massar, and S. Popescu, Bell Inequalities for Arbitrarily High-Dimensional Systems, Phys. Rev. Lett. 88, 040404 (2002).
  • Acín et al. [2002] A. Acín, T. Durt, N. Gisin, and J. I. Latorre, Quantum nonlocality in two three-level systems, Phys. Rev. A 65, 052325 (2002).
  • Barrett et al. [2006] J. Barrett, A. Kent, and S. Pironio, Maximally nonlocal and monogamous quantum correlations, Phys. Rev. Lett. 97, 170409 (2006).
  • Lee et al. [2007] S.-W. Lee, Y. W. Cheong, and J. Lee, Generalized structure of Bell inequalities for bipartite arbitrary-dimensional systems, Phys. Rev. A 76, 032108 (2007).
  • Liang et al. [2009] Y.-C. Liang, C.-W. Lim, and D.-L. Deng, Reexamination of a multisetting Bell inequality for qudits, Phys. Rev. A 80, 052116 (2009).
  • Vértesi et al. [2010] T. Vértesi, S. Pironio, and N. Brunner, Closing the detection loophole in Bell experiments using qudits, Phys. Rev. Lett. 104, 060401 (2010).
  • Salavrakos et al. [2017] A. Salavrakos, R. Augusiak, J. Tura, P. Wittek, A. Acín, and S. Pironio, Bell inequalities tailored to maximally entangled states, Phys. Rev. Lett. 119, 040402 (2017).
  • Tabia et al. [2022] G. N. M. Tabia, V. S. R. Bavana, S.-X. Yang, and Y.-C. Liang, Bell inequality violations with random mutually unbiased bases, Phys. Rev. A 106, 012209 (2022).
  • Thew et al. [2004] R. T. Thew, A. Acín, H. Zbinden, and N. Gisin, Bell-type test of energy-time entangled qutrits, Phys. Rev. Lett. 93, 010503 (2004).
  • Dada et al. [2011] A. C. Dada, J. Leach, G. S. Buller, M. J. Padgett, and E. Andersson, Experimental high-dimensional two-photon entanglement and violations of generalized Bell inequalities, Nat. Phys. 7, 677 (2011).
  • Schwarz et al. [2016] S. Schwarz, B. Bessire, A. Stefanov, and Y.-C. Liang, Bipartite Bell inequalities with three ternary-outcome measurements - from theory to experiments, New J. Phys. 18, 035001 (2016).
  • Lo et al. [2016] H.-P. Lo, C.-M. Li, A. Yabushita, Y.-N. Chen, C.-W. Luo, and T. Kobayashi, Experimental violation of Bell inequalities for multi-dimensional systems, Sci Rep. 6, 22088 (2016).
  • Masanes [2006] L. Masanes, Asymptotic Violation of Bell inequalities and distillability, Phys. Rev. Lett. 97, 050503 (2006).
  • Pál and Vértesi [2009] K. F. Pál and T. Vértesi, Quantum bounds on Bell inequalities, Phys. Rev. A 79, 022120 (2009).
  • Pál and Vértesi [2010] K. F. Pál and T. Vértesi, Maximal violation of a bipartite three-setting, two-outcome Bell inequality using infinite-dimensional quantum systems, Phys. Rev. A 82, 022116 (2010).
  • Panahi et al. [2025] Y. Panahi, M. C. Alañón, D. Centeno, R. J. Costales, L. Mrini, S. Bhattacharyya, and E. Wolfe, Upper bounding Hilbert space dimensions which can realize all the quantum correlations (2025), arXiv:2505.20519 .
  • Bancal et al. [2010] J.-D. Bancal, N. Gisin, and S. Pironio, Looking for symmetric Bell inequalities, J. Phys. A 43, 385303 (2010).
  • Bancal et al. [2012] J.-D. Bancal, C. Branciard, N. Brunner, N. Gisin, and Y.-C. Liang, A framework for the study of symmetric full-correlation Bell-like inequalities, J. Phys. A 45, 125301 (2012).
  • Fadel and Tura [2017] M. Fadel and J. Tura, Bounding the set of classical correlations of a many-body system, Phys. Rev. Lett. 119, 230402 (2017).
  • Aloy et al. [2024] A. Aloy, G. Müller-Rigat, J. Tura, and M. Fadel, Deriving Three-Outcome Permutationally Invariant Bell Inequalities, Entropy 26, 816 (2024).
  • Moroder et al. [2013] T. Moroder, J.-D. Bancal, Y.-C. Liang, M. Hofmann, and O. Gühne, Device-Independent Entanglement Quantification and Related Applications, Phys. Rev. Lett. 111, 030501 (2013).
  • Tavakoli et al. [2024] A. Tavakoli, A. Pozas-Kerstjens, P. Brown, and M. Araújo, Semidefinite programming relaxations for quantum correlations, Rev. Mod. Phys. 96, 045006 (2024).
  • Brunner et al. [2008] N. Brunner, S. Pironio, A. Acin, N. Gisin, A. A. Méthot, and V. Scarani, Testing the Dimension of Hilbert Spaces, Phys. Rev. Lett. 100, 210503 (2008).
  • Navascués et al. [2014] M. Navascués, G. de la Torre, and T. Vértesi, Characterization of Quantum Correlations with Local Dimension Constraints and Its Device-Independent Applications, Phys. Rev. X 4, 011011 (2014).
  • Navascués and Vértesi [2015] M. Navascués and T. Vértesi, Bounding the Set of Finite Dimensional Quantum Correlations, Phys. Rev. Lett. 115, 020501 (2015).
  • Navascués et al. [2015] M. Navascués, A. Feix, M. Araújo, and T. Vértesi, Characterizing finite-dimensional quantum behavior, Phys. Rev. A 92, 042117 (2015).
  • Navascués et al. [2007] M. Navascués, S. Pironio, and A. Acín, Bounding the Set of Quantum Correlations, Phys. Rev. Lett. 98, 010401 (2007).
  • Navascués et al. [2008] M. Navascués, S. Pironio, and A. Acín, A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations, New J. Phys. 10, 073013 (2008).
  • Doherty et al. [2008] A. C. Doherty, Y.-C. Liang, B. Toner, and S. Wehner, The Quantum Moment Problem and Bounds on Entangled Multi-prover Games, in 23rd Annu. IEEE Conf. on Comput. Comp, 2008, CCC’08 (Los Alamitos, CA, 2008) pp. 199–210.
  • Rosset [2018] D. Rosset, Symdpoly: symmetry-adapted moment relaxations for noncommutative polynomial optimization (2018), arXiv:1808.09598 .
  • Tavakoli et al. [2019] A. Tavakoli, D. Rosset, and M.-O. Renou, Enabling Computation of Correlation Bounds for Finite-Dimensional Quantum Systems via Symmetrization, Phys. Rev. Lett. 122, 070501 (2019).
  • Ioannou and Rosset [2021] M. Ioannou and D. Rosset, Noncommutative polynomial optimization under symmetry (2021), arXiv:2112.10803 .
  • Clauser et al. [1969] J. F. Clauser, M. A. Horne, A. Shimony, and R. A. Holt, Proposed Experiment to Test Local Hidden-Variable Theories, Phys. Rev. Lett. 23, 880 (1969).
  • Vidal and Werner [2002] G. Vidal and R. F. Werner, Computable measure of entanglement, Phys. Rev. A 65, 032314 (2002).
  • Collins and Gisin [2004] D. Collins and N. Gisin, A relevant two qubit Bell inequality inequivalent to the CHSH inequality, J. Phys. A 37, 1775 (2004).
  • Cruzeiro and Gisin [2019] E. Z. Cruzeiro and N. Gisin, Complete list of tight Bell inequalities for two parties with four binary settings, Phys. Rev. A 99, 022104 (2019).
  • Grandjean et al. [2012] B. Grandjean, Y.-C. Liang, J.-D. Bancal, N. Brunner, and N. Gisin, Bell inequalities for three systems and arbitrarily many measurement outcomes, Phys. Rev. A 85, 052113 (2012).
  • Paulsen et al. [2016] V. I. Paulsen, S. Severini, D. Stahlke, I. G. Todorov, and A. Winter, Estimating quantum chromatic numbers, J. Funct. Anal. 270, 2188 (2016).
  • Rodrigues and Lackey [2017] N. Rodrigues and B. Lackey, Nonlocal games, synchronous correlations, and Bell inequalities (2017), arXiv:1707.06200 .
  • Cleve et al. [2004] R. Cleve, P. Hoyer, B. Toner, and J. Watrous, Consequences and limits of nonlocal strategies, in Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004. (2004) pp. 236–249.
  • Cirel’son [1980] B. S. Cirel’son, Quantum generalizations of Bell’s inequality, Lett. Math. Phys. 4, 93 (1980).
  • Harris and Pandey [2016] S. J. Harris and S. K. Pandey, Entanglement and Non-locality PMATH 990/QIC 890 (2016).
  • Renner [2008] R. Renner, Security of Quantum Key Distribution, Int. J. Quantum Inf. 6, 1 (2008).
  • Fine [1982] A. Fine, Hidden Variables, Joint Probability, and the Bell inequalities, Phys. Rev. Lett. 48, 291 (1982).
  • Wu et al. [2016] X. Wu, J.-D. Bancal, M. McKague, and V. Scarani, Device-independent parallel self-testing of two singlets, Phys. Rev. A 93, 062121 (2016).
  • Kaszlikowski et al. [2002] D. Kaszlikowski, L. C. Kwek, J.-L. Chen, M. Żukowski, and C. H. Oh, Clauser-Horne inequality for three-state systems, Phys. Rev. A 65, 032118 (2002).
  • Masanes [2003] L. Masanes, Tight Bell inequality for d-outcome measurements correlations, Quantum Info. Comput. 3, 345 (2003).
  • Pironio [2005] S. Pironio, Lifting Bell inequalities, J. Math. Phys. 46, 062112 (2005).
  • Jebarathinam et al. [2019] C. Jebarathinam, J.-C. Hung, S.-L. Chen, and Y.-C. Liang, Maximal violation of a broad class of Bell inequalities and its implication on self-testing, Phys. Rev. Research 1, 033073 (2019).
  • Liang [2008] Y.-C. Liang, Correlations, Bell Inequality Violation & Quantum Entanglement, Ph.D. thesis, University of Queensland (2008).
  • Popescu and Rohrlich [1994] S. Popescu and D. Rohrlich, Quantum nonlocality as an axiom, Found. Phys. 24, 379 (1994).
  • Barrett et al. [2005b] J. Barrett, N. Linden, S. Massar, S. Pironio, S. Popescu, and D. Roberts, Nonlocal correlations as an information-theoretic resource, Phys. Rev. A 71, 022101 (2005b).
  • Braunstein et al. [1992] S. L. Braunstein, A. Mann, and M. Revzen, Maximal violation of Bell inequalities for mixed states, Phys. Rev. Lett. 68, 3259 (1992).
  • Froissart [1981] M. Froissart, Constructive Generalization of Bell’s Inequalities, Nuov. Cim. B 64, 241 (1981).
  • Pitowsky and Svozil [2001] I. Pitowsky and K. Svozil, Optimal tests of quantum nonlocality, Phys. Rev. A 64, 014102 (2001).
  • Śliwa [2003] C. Śliwa, Symmetries of the Bell correlation inequalities, Phys. Lett. A 317, 165 (2003).
  • Brunner and Gisin [2008] N. Brunner and N. Gisin, Partial list of bipartite Bell inequalities with four binary settings, Phys. Lett. A 372, 3162 (2008).
  • Goh et al. [2018] K. T. Goh, J. Kaniewski, E. Wolfe, T. Vértesi, X. Wu, Y. Cai, Y.-C. Liang, and V. Scarani, Geometry of the set of quantum correlations, Phys. Rev. A 97, 022104 (2018).
  • Liang and Doherty [2007] Y.-C. Liang and A. C. Doherty, Bounds on quantum correlations in Bell-inequality experiments, Phys. Rev. A 75, 042103 (2007).
  • Deza and Dutour Sikirić [2016] M. Deza and M. Dutour Sikirić, Enumeration of the facets of cut polytopes over some highly symmetric graphs, Intl. Trans. in Op. Res. 23, 853 (2016).
  • Oudot et al. [2019] E. Oudot, J.-D. Bancal, P. Sekatski, and N. Sangouard, Bipartite nonlocality with a many-body system, New J. Phys. 21, 103043 (2019).
  • Šupić and Bowles [2020] I. Šupić and J. Bowles, Self-testing of quantum systems: a review, Quantum 4, 337 (2020).
  • Kaniewski [2020] J. Kaniewski, Weak form of self-testing, Phys. Rev. Research 2, 033420 (2020).
  • Gigena and Kaniewski [2022] N. Gigena and J. Kaniewski, Quantum value for a family of I3322{I}_{3322}-like Bell functionals, Phys. Rev. A 106, 012401 (2022).
  • Liang et al. [2010] Y.-C. Liang, N. Harrigan, S. D. Bartlett, and T. Rudolph, Nonclassical correlations from randomly chosen local measurements, Phys. Rev. Lett. 104, 050401 (2010).
  • Barizien and Bancal [2024] V. Barizien and J.-D. Bancal, Extremal Tsirelson Inequalities, Phys. Rev. Lett. 133, 010201 (2024).
  • Liang et al. [2011] Y.-C. Liang, T. Vértesi, and N. Brunner, Semi-device-independent bounds on entanglement, Phys. Rev. A 83, 022108 (2011).
  • William et al. [2025] C. William, P. Remy, J.-D. Bancal, Y. Cai, N. Brunner, and A. Pozas-Kerstjens, Symmetric observations without symmetric causal explanations (2025), arXiv:2502.14950 .
  • Tura et al. [2014] J. Tura, A. B Sainz, T. Vértesi, A. Acín, M. Lewenstein, and R. Augusiak, Translationally invariant multipartite Bell inequalities involving only two-body correlators, J. Phys. A 47, 424024 (2014).
  • Wang et al. [2017] Z. Wang, S. Singh, and M. Navascués, Entanglement and Nonlocality in Infinite 1D Systems, Phys. Rev. Lett. 118, 230401 (2017).
  • Machnes [2007] S. Machnes, QLib - A Matlab package for quantum information theory calculations with applications (2007), arXiv:0708.0478 .
  • Bowles et al. [2018] J. Bowles, I. Šupić, D. Cavalcanti, and A. Acín, Self-testing of pauli observables for device-independent entanglement certification, Phys. Rev. A 98, 042336 (2018).
  • Acín et al. [2016] A. Acín, S. Pironio, T. Vértesi, and P. Wittek, Optimal randomness certification from one entangled bit, Phys. Rev. A 93, 040102 (2016).