No-go theorem for device-independent security in ...

26
PHYSICAL REVIEW RESEARCH 3, 033146 (2021) No-go theorem for device-independent security in relativistic causal theories R. Salazar, 1, 2, 3, 4 , * M. KamoΒ΄ n, 2 K. Horodecki, 3, 5 D. Goyeneche, 6 D. Saha, 1, 7 R. Ramanathan, 8 and P. Horodecki 2, 5 1 Institute of Theoretical Physics and Astrophysics, National Quantum Information Centre, University of Gdansk, 80-308 Gdansk, Poland 2 Faculty of Applied Physics and Mathematics, National Quantum Information Centre, Gdansk University of Technology, 80-233 Gdansk, Poland 3 Institute of Informatics Faculty of Mathematics, Physics, and Informatics, University of Gdansk, 80-308 Gdansk, Poland 4 Institute of Physics, Jagiellonian University, 30-059 Krakow, Poland 5 International Centre for Theory of Quantum Technologies, University of Gdansk, Wita Stwosza 63, 80-308 Gdansk, Poland 6 Departamento de FΓ­sica, Facultad de Ciencias BΓ‘sicas, Universidad de Antofagasta, Casilla 170, Antofagasta, Chile 7 Center for Theoretical Physics, Polish Academy of Sciences, Aleja LotnikΓ³w 32/46, 02-668 Warsaw, Poland 8 Department of Computer Science, University of Hong Kong, Pokfulam Road, Hong Kong (Received 25 May 2021; accepted 28 June 2021; published 13 August 2021) A fundamental question in device-independent quantum cryptography is to determine the minimal physical principle upon which the security of such a cryptographic protocol (such as for key distribution or for randomness generation) may be based. Since the seminal work on device-independent quantum key distribution by J. Barrett, L. Hardy, and A. Kent [Phys. Rev. Lett. 95, 010503 (2005)], a conjectured candidate for certification of device- independent security has been the principle of relativistic causality, namely the disallowance of causal loops. While this principle has thus far been equated with the no-signaling constraints, it has been shown recently that in multiparty Bell scenarios, the no-signaling constraints are sufficient but not necessary for relativistic causality, and a refined set of constraints has been proposed that more precisely capture the notion of relativistic causality. In this paper, we build upon this finding to show that, in contrast to the no-signaling constraints, the constraints of relativistic causality are not sufficient for certification of device-independent security. More specifically, we show that there exist correlations allowed by the causality principle that allow an adversary to gain complete information about the measurement outcomes of honest parties in any device-independent cryptographic protocol, thereby rendering the protocol completely insecure. As a tool to develop this adversarial attack strategy, we fully characterize the set of correlations allowed by relativistic causality in the tripartite Bell scenario of three parties, each performing two binary measurements, that may be of independent interest. We also demonstrate the difference between the relativistic causal correlations and those allowed by the usual no- signaling constraints by presenting explicit communication tasks wherein the two sets exhibit striking difference in their respective winning probabilities. DOI: 10.1103/PhysRevResearch.3.033146 I. INTRODUCTION Quantum cryptography has played a foundational role in the development of the field of quantum information (QI), covering a plethora of security scenarios ranging from secure key distribution to randomness generation and bit commit- ment [1,2]. The security of quantum cryptographic protocols is based on the very laws of nature, and does not rely on any restrictions on the computational power of an adversary. Furthermore, quantum mechanics also allows for the high- est form of security called device-independent (DI) security [3–10]. In the DI paradigm, the honest users do not even * [email protected] Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI. need to trust the devices used to execute the protocol, and can verify the security of the protocol directly by checking for a Bell inequality violation by the input-output statistics of their devices. Security of DI cryptographic protocols (such as for key distribution or randomness generation) has been shown in two different scenarios. In one scenario, the adversary is assumed to be constrained by the entire machinery of quantum me- chanics [11]. In the second scenario, the adversary is only assumed to be constrained by the no-signaling constraints [3,4,7–9]. The no-signaling constraints have been justified on the grounds of special relativity; namely they were designed to capture the notion of no-faster-than-light transfer of infor- mation, or equivalently of relativistic causality, namely the disallowance of causal loops in a physical theory. Recently it has been shown [12] that in Bell scenarios with more than two spatially separated parties, the no-signaling constraints are, in general, sufficient but not necessary for a theory to obey the principle of relativistic causality. In their stead, a (in general, smaller) subset of relativistic causality constraints 2643-1564/2021/3(3)/033146(26) 033146-1 Published by the American Physical Society

Transcript of No-go theorem for device-independent security in ...

Page 1: No-go theorem for device-independent security in ...

PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

No-go theorem for device-independent security in relativistic causal theories

R. Salazar,1,2,3,4,* M. Kamon,2 K. Horodecki,3,5 D. Goyeneche,6 D. Saha,1,7 R. Ramanathan,8 and P. Horodecki2,5

1Institute of Theoretical Physics and Astrophysics, National Quantum Information Centre, University of Gdansk, 80-308 Gdansk, Poland2Faculty of Applied Physics and Mathematics, National Quantum Information Centre, Gdansk University of Technology,

80-233 Gdansk, Poland3Institute of Informatics Faculty of Mathematics, Physics, and Informatics, University of Gdansk, 80-308 Gdansk, Poland

4Institute of Physics, Jagiellonian University, 30-059 Krakow, Poland5International Centre for Theory of Quantum Technologies, University of Gdansk, Wita Stwosza 63, 80-308 Gdansk, Poland

6Departamento de FΓ­sica, Facultad de Ciencias BΓ‘sicas, Universidad de Antofagasta, Casilla 170, Antofagasta, Chile7Center for Theoretical Physics, Polish Academy of Sciences, Aleja LotnikΓ³w 32/46, 02-668 Warsaw, Poland

8Department of Computer Science, University of Hong Kong, Pokfulam Road, Hong Kong

(Received 25 May 2021; accepted 28 June 2021; published 13 August 2021)

A fundamental question in device-independent quantum cryptography is to determine the minimal physicalprinciple upon which the security of such a cryptographic protocol (such as for key distribution or for randomnessgeneration) may be based. Since the seminal work on device-independent quantum key distribution by J. Barrett,L. Hardy, and A. Kent [Phys. Rev. Lett. 95, 010503 (2005)], a conjectured candidate for certification of device-independent security has been the principle of relativistic causality, namely the disallowance of causal loops.While this principle has thus far been equated with the no-signaling constraints, it has been shown recentlythat in multiparty Bell scenarios, the no-signaling constraints are sufficient but not necessary for relativisticcausality, and a refined set of constraints has been proposed that more precisely capture the notion of relativisticcausality. In this paper, we build upon this finding to show that, in contrast to the no-signaling constraints,the constraints of relativistic causality are not sufficient for certification of device-independent security. Morespecifically, we show that there exist correlations allowed by the causality principle that allow an adversaryto gain complete information about the measurement outcomes of honest parties in any device-independentcryptographic protocol, thereby rendering the protocol completely insecure. As a tool to develop this adversarialattack strategy, we fully characterize the set of correlations allowed by relativistic causality in the tripartite Bellscenario of three parties, each performing two binary measurements, that may be of independent interest. Wealso demonstrate the difference between the relativistic causal correlations and those allowed by the usual no-signaling constraints by presenting explicit communication tasks wherein the two sets exhibit striking differencein their respective winning probabilities.

DOI: 10.1103/PhysRevResearch.3.033146

I. INTRODUCTION

Quantum cryptography has played a foundational role inthe development of the field of quantum information (QI),covering a plethora of security scenarios ranging from securekey distribution to randomness generation and bit commit-ment [1,2]. The security of quantum cryptographic protocolsis based on the very laws of nature, and does not rely onany restrictions on the computational power of an adversary.Furthermore, quantum mechanics also allows for the high-est form of security called device-independent (DI) security[3–10]. In the DI paradigm, the honest users do not even

*[email protected]

Published by the American Physical Society under the terms of theCreative Commons Attribution 4.0 International license. Furtherdistribution of this work must maintain attribution to the author(s)and the published article’s title, journal citation, and DOI.

need to trust the devices used to execute the protocol, and canverify the security of the protocol directly by checking for aBell inequality violation by the input-output statistics of theirdevices.

Security of DI cryptographic protocols (such as for keydistribution or randomness generation) has been shown in twodifferent scenarios. In one scenario, the adversary is assumedto be constrained by the entire machinery of quantum me-chanics [11]. In the second scenario, the adversary is onlyassumed to be constrained by the no-signaling constraints[3,4,7–9]. The no-signaling constraints have been justified onthe grounds of special relativity; namely they were designedto capture the notion of no-faster-than-light transfer of infor-mation, or equivalently of relativistic causality, namely thedisallowance of causal loops in a physical theory. Recentlyit has been shown [12] that in Bell scenarios with more thantwo spatially separated parties, the no-signaling constraintsare, in general, sufficient but not necessary for a theory toobey the principle of relativistic causality. In their stead, a(in general, smaller) subset of relativistic causality constraints

2643-1564/2021/3(3)/033146(26) 033146-1 Published by the American Physical Society

Page 2: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

has been proposed, depending on the exact spacetime config-uration of the measurement events, that are both necessaryand sufficient for causality. Since in DI cryptographic sce-narios, one naturally has to deal with at least two spatiallyseparated honest parties (that perform a Bell test on theirdevices) plus an adversary, the tripartite Bell scenario is ingeneral minimal for DI protocols. It is also noteworthy thatthe spacetime configuration of the measurement events ofthe adversary are in general unknown to the honest partiesso that the subset of relativistic causality constraints is themore accurate one to choose in this paradigm. It is thennatural to ask if the security of DI protocols that has thusfar been established based on the no-signaling constraints canequally be established on the basis of the relativistic causalityconstraints alone. In other words, can device-independent se-curity be predicated upon the principle of relativistic causalityalone?

In this paper, we prove a negative answer to this funda-mental question. We show an explicit attack strategy obeyingrelativistic causality that can be executed by two cooperatingadversaries, and that can break the security of any DI proto-col. In particular, we show that independently of the numberof honest parties in the DI protocol, and irrespective of thespecific Bell inequality tested, the two adversaries are ableto perfectly determine (through measurements on their ownsystems) the measurement outcomes obtained by the honestparties. Therefore, any DI protocol that uses these outcomeseither for randomness extraction or for key distribution can-not be proven secure on the basis of relativistic causalityalone. Additional assumptions such as that the adversaries areconstrained by the laws of quantum mechanics, or by someother fundamental physical principle, are therefore requiredto restore device-independent security.

The paper is organized as follows. We first introduce thenotion of relativistic causality and explain how the causalityconstraints differ in general from the no-signaling constraints[12,13]. We then show that the phenomenon of monogamyof Bell inequalities that underpins security of DI protocolsand that has been proven to hold under the usual no-signalingconstraints does not hold when considering the causalityconstraints alone. Specifically, we present spatiotemporal con-figurations of measurement events for which monogamy isbroken for any bipartite Bell inequality. We then present themain result, namely that DI security cannot solely be basedupon the relativistic causality principle. We establish an attackstrategy for two adversaries who exploit specific correlationsallowed by relativistic causality to completely learn a copy ofthe correlations shared by honest parties, as a shared secretbetween the adversaries which they can subsequently recover.We present a detailed proof for the explicit case of two hon-est parties executing a DI key distribution protocol. Finally,as a technical tool that may be of independent interest, weprovide a complete characterization of the set of correlationsallowed by the relativistic causality constraints in the simplesttripartite Bell scenario where three parties each perform twobinary measurements. We demonstrate the difference betweenthese correlations and the usual no-signaling correlations bypresenting explicit communication tasks wherein the two setsexhibit striking difference in their respective winning proba-bilities.

II. RELATIVISTIC CAUSALITY VERSUS NO-SIGNALING

Relativistic causality is the physical principle which statesthat an effect cannot occur from a cause that is not in itspast light cone, and similarly a cause cannot have an effectoutside its future light cone, i.e., that there must be no causalloops in a physical theory [14,15]. This principle captures theidea of no-faster-than-light propagation of information. Theno-signaling constraints are a set of mathematical constraintson the observed probability distributions in a Bell experimentconducted by two or more spatially separated parties that wasdesigned to capture the idea of relativistic causality. Specif-ically, the no-signaling constraints state that the conditionalprobability distribution of the measurement outcomes of anysubset of parties is independent of the input choice of theremaining parties, and are in general sufficient to ensure thatthere are no causal loops in the theory. On the other hand,it was pointed out in [12,13] that in general, not all the no-signaling constraints are necessary to ensure that relativisticcausality holds. In particular, in Bell experiments with threeor more spatially separated parties, there exist spacetime con-figurations of the three parties’ measurement events such thata subset of the no-signaling constraints are already sufficientto ensure relativistic causality. As such, in multiparty Bell sce-narios, the set of constraints necessary to guarantee relativisticcausality are in general a subset of the no-signaling condi-tions. As pointed out earlier, this is especially relevant in Bellexperiments conducted as part of DI cryptographic protocols,where the spacetime configuration of the measurement eventsof one of the parties, namely the adversary, is not under thehonest parties’ control. We explain the difference between thetwo sets of constraints with a particularly relevant examplehere. Consider a Bell experiment with three partiesβ€”Alice(A), Bob (B), and Charlie (C). The input choices for the threeparties are labeled x, y, z, respectively, with the correspondingmeasurement outcomes being labeled a, b, c. Now, considerthe spacetime measurement configuration of the three parties’measurement events shown in Fig. 1. The noteworthy propertyof this configuration is that the intersection of the future lightcones of measurement events detected by Alice and Charlieis contained within the future light cone of the measure-ment event detected by Bob. This property ensures that nobreakdown of causality occurs if the joint distribution of theoutcomes a, c were to depend on Bob’s input y. This maybe intuitively understood from the fact that the informationconcerning the correlations between a and c is only accessibleat a point in the intersection of the future light cones of Aliceand Charlie’s measurement events, which is itself containedwithin the future light cone of Bob’s measurement event. Thisobservation, shown with a more detailed argument in [12,13],implies that only a strict subset of the no-signaling constraints,given in (1) and called the relativistic causality constraints, isnecessary and sufficient to ensure causality when the measure-ment events follow this spacetime configuration:

βˆ‘a

P(a, b, c | x, y, z) =βˆ‘

a

P(a, b, c | xβ€², y, z),

βˆ‘c

P(a, b, c | x, y, z) =βˆ‘

c

P(a, b, c | x, y, zβ€²),

033146-2

Page 3: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

A B C

< A, C >

ct

x

FIG. 1. Spacetime configuration of measurement events in thethree-party Bell experiment, when measurements are simultaneous ina common reference frame. The information about two-point corre-lations γ€ˆA,C〉 between Alice and Charlie’s outputs is only accessiblein the yellow region that lies within the causal future of Bob’smeasurement event.

βˆ‘b,c

P(a, b, c | x, y, z) =βˆ‘b,c

P(a, b, c | x, yβ€², zβ€²),

βˆ‘a,b

P(a, b, c | x, y, z) =βˆ‘a,b

P(a, b, c | xβ€², yβ€², z),

for all x, xβ€², y, yβ€², z, zβ€², a, b, c. We refer to the above set ofconstraints as the relativistic causality constraints in thismeasurement configuration. A couple of points are worthmentioning here. First, the absence of the no-signaling con-dition for AC does not imply the presence of signaling, i.e.,a faster-than-light transmission of information in a standard,point-to-point sense. Second, the above observation showsthat in general multiparty Bell scenarios, the set of necessaryand sufficient constraints to guarantee relativistic causalitydepends explicitly on the spacetime configuration of the mea-surement events of all participating parties. This also meansthat the polytope of behaviors (correlations) obeying relativis-tic causality is richer in structure and in general has a higherdimensionality than the usual no-signaling polytope for themultiparty Bell scenario. Finally, we also note that the aboveconstraints are manifestly Lorentz covariant. If the intersec-tion of the future light cones of A and C is contained within thefuture light cone of B in one inertial reference frame, then thesame holds for all inertial reference frames. In Appendix B,we provide the necessary and sufficient constraints imposedby relativistic causality for an arbitrary number of parties inarbitrary globally hyperbolic spacetime.

III. MONOGAMY OF NONLOCALITY

One of the most intriguing properties of quantum nonlocalcorrelations is the phenomenon of monogamy of nonlocality.The monogamy relations were first derived, based on the no-signaling constraints for the well-known CHSH inequality, byToner [16], after which more stringent relations based on thelaws of quantum theory were also derived. The monogamyrelations are direct trade-off relations between the amount of

violation of an inequality observed by a pair of agents Aliceand Bob and the correlations between Alice (or Bob) and athird party Charlie’s system. The monogamy of nonlocalityunderpins the security of device-independent key distributionand randomness generation protocols [3,4], besides havingother applications such as in deriving nontrivial bounds oncloning [17], and even helping in the detection of gravitationaldecoherence [18]. Since, as we have seen, the relativisticcausality constraints are in general only a strict subset ofthe no-signaling constraints, a fundamental question arises:Can the monogamy of nonlocality be derived on the basisof relativistic causality alone? In this section, we answer thisquestion in the negative in a very general setting. Namely,we show a general theorem stating that there exist spacetimemeasurement configurations such as in Fig. 1 for which notwo-party Bell inequality admits a monogamy relation on thebasis of the relativistic causality constraints alone. Note thatdetailed proofs are deferred to the appendices.

Consider a general bipartite Bell scenario with two partiesAlice and Bob performing measurements labeled x, y andobtaining outcomes a, b, respectively. Let us write a generalBell inequality G in this scenario as

G :=βˆ‘

a,b,x,y

V (a, b, x, y)P(a, b|x, y) οΏ½ Ο‰c(G), (1)

where V (a, b, x, y) is a predicate indicating which probabili-ties enter the Bell expression and Ο‰c(G) denotes the maximalvalue achievable for the Bell expression within a classical(local hidden variable) theory. Let Ο‰rc(G) οΏ½ Ο‰c(G) denote themaximal value achievable within a general physical theoryobeying causality.

The following proposition shows that in a three-party Bellscenario with a third player Charlie performing measurementsz and obtaining outcomes c, when the measurement eventsoccur in the spacetime configuration given by Fig. 1, rela-tivistic causal correlations allow both pairs of parties, i.e., A-Band B-C, to simultaneously observe the maximum relativisticcausal value Ο‰rc(G) of the inequality.

Proposition 1. Consider any bipartite Bell inequality G ofthe form in Eq. (1). Suppose three players A, B,C performtheir measurements in the spacetime configuration of Fig. 1,and that both A-B and B-C test for the violation of G. Then,there exist correlations {P(a, b, c|x, y, z)} obeying relativisticcausality that allow both pairs A-B and B-C to achieve themaximal relativistic causal value Ο‰rc(G) of the inequality.

An important insight gained from Proposition 1 goes intothe very roots of the structure of correlations in theories con-strained by causality alone. In all generalized probabilistictheories studied thus far, given a composite physical system,the extremal points of the polytope of allowed correlationsin the system were always of the form that guaranteed alack of correlations of the system with any external observer.According to Proposition 1, there is a dramatic change intheories constrained by relativistic causality alone (RC theo-ries). In such theories, even extremal points could potentiallybe correlated with an environmental system giving rise to avery interesting structure of allowed behaviors and physicalphenomena.

033146-3

Page 4: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

IV. A NO-GO THEOREM FORDEVICE-INDEPENDENT SECURITY

We build on the shareability of correlations derived inthe previous section to show that for any device-independentcryptographic protocol (say for randomness or key distribu-tion), there exists an attack strategy by two eavesdroppers withsuitably chosen spacetime measurement configurations thatcompletely breaks the security of the protocol. Moreover, thehacking strategy is valid irrespective of the number of honestparties executing the protocol and regardless of the Bell in-equality that they test for in the protocol. First consider anyDI protocol which begins with parallel measurements on thedevice by the two honest parties. These protocols consist ofthe operations called β€œmeasurement on device followed by lo-cal operations and public communication” (MDLOPC) [19].Note that all known protocols secure against the nonsignal-ing adversary perform this MDLOPC paradigm; see, e.g.,[8,9,20]. To establish the result, let us consider N spacelikeseparated parties performing a multiparty Bell test as part of aDI protocol with the general Bell inequality given by

G :=βˆ‘r,q

V (r, q)P(r | q) οΏ½ Ο‰c(G). (2)

Here, the inputs q = x, y1, . . . , yNβˆ’1 and outputs r =a, b1, . . . , bNβˆ’1 correspond to the N reliable agents labeled asA, B1, . . . , BNβˆ’1. We show that even in the extreme noiselessscenario where the honest parties observe the maximal (rela-tivistic causal) value for the Bell expression (2), the protocolis rendered completely insecure against adversaries who arerestricted only by the relativistic causality principle. In otherwords, DI security cannot be predicated upon the causalityprinciple alone.

Theorem 1. Consider a multipartite Bell inequality (2) andassume that N reliable agents perform measurements in somefixed but arbitrary spacetime configuration, obtaining a viola-tion Ο‰βˆ— > Ο‰c. Then, there is a spacetime configuration of twoeavesdroppers, implementing N measurements each, such thatthe correlations of those measurements fully reproduce thestatistics of the N reliable agents, which the eavesdropperscan recover by communicating their results.

A configuration in which two eavesdroppers E1, E2 can usetheir outputs c1, c2 to infer the output a of an honest party Afor any of its inputs x is shown in Fig. 2. Now to be more con-crete, let us explicitly consider the case of a DI quantum keydistribution protocol between two parties Alice (A) and Bob(B), and define the notion of distillable key KRC

D . This quantityis the maximum ratio of the number of key bits divided by theinitial number of devices n, in the asymptotic limit of large n,that can be obtained via protocols based on operations fromn copies of identically prepared quantum systems. For furtherdetails see Definitions 1 and 2 in Appendix E. We build uponTheorem 1 to show that KRC

D is zero within the framework ofrelativistic causal theories.

Theorem 2. (no-go for MDLOPC secure key distribu-tion). For any PAB ≑ P(A, B|X,Y ) satisfying the no-signalingconstraints, there exists a spacetime configuration of twoeavesdroppers E1 and E2 and a four-partite distributionP(A, B, E1, E2|X,Y ) satisfying RC constraints, with bipartite

E1 E2B1 B2 ... A ... Bn

< A, E >

Y

Bnβˆ’1

ct

xct

x

E1 B1 B2A Bn E2...

< A, E >

Y

(a)

(b)

FIG. 2. One-dimensional illustration of the no-go theorem. HereE stands for the correlation between measurement outputs of the twoeavesdroppers E1 and E2. The measurement events A, B1, . . . , BNβˆ’1

of the reliable parties determine a spatial convex hull from whichthere are two possible situations: (a) The party A is in the interior ofthe convex hull of the events, or (b) the party A is at the boundary ofthe convex hull. In both cases the eavesdroppers can choose positionsfar enough such that the inputs Y = y1, . . . , yNβˆ’1 can influence thecorrelation γ€ˆA, E〉. This is allowed by RC theory when the eaves-droppers calibrate the region where information from γ€ˆA, E〉 (pink)is accessible only in a region inside the causal future of all inputs Y(light blue).

marginal distribution on A-B equal to PAB such that

KRCD [P(ABE1E2|XY )] = 0. (3)

Note that in RC theories, the eavesdropper could, in prin-ciple, even decorrelate the honest parties Alice and Bob.However, in such case they would abort the protocol. Hence,the challenge in Theorem 2 was to find an eavesdroppingstrategy, for two eavesdroppers in this case, that works withoutchanging the correlations between Alice and Bob.

At this point, one might be tempted to believe that securitycan be restored by an additional assumption that the devicesare sufficiently shielded from any influence beyond the no-signaling constraints. However, we remark that the attack bythe adversaries is based on the relaxation from no-signalingto relativistic causal constraints. These latter constraints al-low for point-to-region physical influences of correlationswithout having a point-to-point faster-than-light transfer ofinformation [12]. Such effects are locally undetectable andmay be controlled by an adversary, in such a way to have the

033146-4

Page 5: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

correlations within his or her light cone, outside of the regionoccupied by the trusted parties. Moreover, the point-to-regioneffect may have a physical nature that prevents shielding bythe honest parties. In contemporary physics, we know alreadyof a prominent example of a phenomenon of this kind, namelyvacuum correlations in quantum electrodynamics which can-not be shielded for fundamental reasons.

V. THE TRIPARTITE RELATIVISTIC CAUSAL POLYTOPE

For bipartite systems, relativistic causal (RC) constraintscoincide with the no-signaling constraints. The simplest sce-nario where the two differ is the (3,2,2) Bell scenario, i.e.,three parties Alice, Bob, and Charlie performing two binarymeasurements each, in the particular measurement configu-ration of Fig. 1. RC correlations in this case form a finitepolytope that strictly contains the no-signaling polytope. Animportant method to illustrate the difference between the twocorrelations is to consider the following question: Are thereany information processing tasks for which RC correlationswork better than the no-signaling ones? As a tool to answerthis question, we first provide a complete characterization ofthe RC polytope in terms of its extremal behaviors. Morespecifically, by using the software polymake [21], we com-puted [22] all the extremal boxes for the RC polytope in the(3,2,2) scenario (see Appendix I). We found 153 600 extremalbehaviors of the RC polytope, of which 64 belong to the localhidden variable (LHV) polytope, 2144 to the no-signaling(NS) polytope, and 151 392 being outside of the NS poly-tope. Considering equivalences up to local transformationsand symmetry between Alice and Charlie, we have 1 Classi-cal, 5 NS, and 190 genuinely RC equivalence classes, shownexplicitly in Appendix I.

We also computed the general dimensionality of theRC polytope in the Bell scenario (3, m, n), i.e., three par-ties with m measurements having n outcomes each, againin the measurement configuration of Fig. 1. This quantityworks out to D[RC(3, m, n)] = [m(n βˆ’ 1) + 1]3 + m2(m βˆ’1)(n βˆ’ 1)2 βˆ’ 1 which is significantly larger than that of theusual no-signaling polytope. Further details are given inAppendix G.

The above characterization of the relativistic causal be-haviors allowed us to identify communication complexityscenarios, cf. [23], in which relativistic causal correlationsoutperform all no-signaling correlations. As an example, inthe Supplemental Material [24], we show a three-partitefunction that can be fully computed nonlocally using RC cor-relations, while the probability of doing so using no-signalingcorrelations is at most 3/4.

VI. CONCLUDING REMARKS

Many interesting open questions arise from this work.The complete characterization of the RC correlation polytopein the (3,2,2) scenario provides a useful tool to investigatemultiparty nonlocality in causal networks [25–31]. Anotherinteresting question is to investigate the interplay betweencommunication complexity and hardness in security proofs;for instance, does an information-theoretic principle, such asthe nonreduction of communication complexity beyond the

NS constraints, ensure the security of DI protocols? A crucialquestion is to identify natural physical principles upon whichthe security of DI cryptographic protocols can be based. Anopen question is whether these principles would allow correla-tions beyond the limits imposed by the no-signaling condition,in which case a new range of phenomena could be studied.Finally, it would also be interesting to study possible changesto the device-independent paradigm to restore security againstadversaries only constrained by causality.

ACKNOWLEDGMENTS

R.S. acknowledges support of Comision Nacional de In-vestigacion Ciencia y Tecnologia (CONICYT) Programa deFormacion Capital Humano Avanzado/Beca de Postdoctoradoen el extranjero (BECAS CHILE) 74160002, John Temple-ton Foundation and by Foundation for Polish Science underthe grant TEAM-NET project (Contract No. POIR.04.04.00-00-17C1/18-00). M.K., D.G., and P.H. acknowledge supportof John Templeton Foundation. K.H. acknowledges thegrant Sonata Bis 5 (Grant No. 2015/18/E/ST2/00327) fromthe National Science Center and John Templeton Founda-tion. K.H. and P.H. are also supported by the Foundationfor Polish Science (IRAP project, ICTQT, Contract No.2018/MAB/5, co-financed by EU within Smart Growth Op-erational Programme). R.R. acknowledges the support ofthe Start-up Fund β€œDevice-Independent Quantum Commu-nication Networks” from The University of Hong Kong(166DRRAVI), the Seed Fund β€œSecurity of Relativistic Quan-tum Cryptography” (Grant No. 201909185030) and theEarly Career Scheme (ECS) grant β€œDevice-Independent Ran-dom Number Generation and Quantum Key Distributionwith Weak Random Seeds” (Grant No. 27210620)’. D.G.acknowledges partial support from Grant FONDECYT Ini-ciaciΓ³n number 11180474, Chile, and D.S. acknowledgessupport of NCN Grants No. 2016/23/N/ST2/02817 and No.2014/14/E/ST2/00020.

APPENDIX A: INTRODUCTION TO THE APPENDICES

The most fundamental cryptography task is to achieve se-cure communication between two separated parties; this is thetask of secure key distribution. We focus on this task in theparallel measurement scenario, as in this case an adversarycannot pursue drastic attacks. As one of the main results, weshow that contrary to the case of no-signaling theory, there isno protocol in the parallel measurement scenario that allowsfor distributing keys secure against RC adversaries.

The way to check whether security is possible in NS theoryis to test the level of violation of a Bell inequality. Specialcases of Bell inequalities with only either 0 or 1 coefficientsare called games [32]. In NS theory if some two parties sharea device, the statistics of which violate a Bell inequality bya sufficiently high amount (or, in the case of games, winthe game with high enough probability), then the so-calledmonogamy holds: none of them can achieve the same withrespect to some other party, i.e., win the game with someonewith large probability. This fact is fundamental for securecommunication in quantum and NS theories. On our way toanswer the main question we therefore first study whether

033146-5

Page 6: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

monogamy takes place in RC. Interestingly, we show a drasticviolation of this phenomenon in the RC scenario. The abovefact leads to our main contribution: that key rate in any Bell vi-olation based security protocol is zero against RC adversaries.

APPENDIX B: GENERAL CONSTRAINTS OFRELATIVISTIC CAUSAL CORRELATIONS

In this Appendix we introduce a general formalism forthe study of RC constraints in multipartite scenarios and ageneral spacetime. Consider a set of [n] = {1, . . . , n} par-ties with a string of inputs x = {x1, . . . , xn} and string ofoutputs a = {a1, . . . , an}, S βŠ† [n], with complement Sc, suchthat aS = {ai}i∈S and an analogous definition for xS. In thisscenario, the usual no-signaling constraints can be writtenas

P(aS | xS) =βˆ‘aβ€²

Sc

P(aβ€²Sc , aS | xβ€²

Sc , xS)

=βˆ‘aβ€²β€²

Sc

P(aβ€²β€²Sc , aS | xβ€²β€²

Sc , xS) (B1)

for all xβ€²Sc , xβ€²β€²

Sc In words, these constraints state that theprobability distribution of the outputs of any subset of par-ties is independent from the inputs of the complementaryset of parties. In the multipartite relativistic causal set ofconstraints we also consider the spacetime measurementevents {Mx1

a1, . . . , Mxn

an} in the spacetime (M, gΞΌΞ½ ) for some

coordinate system (in special relativity this could be a par-ticular reference frame). For a party p to influence thecorrelations of a set of parties S οΏ½ {p} the event M

xpap must

satisfy β‹‚q∈S

J+(M

xqaq

) βŠ‚ J+(M

xpap

). (B2)

In words, this condition states that the causal future J+(Mxpap )

of party p’s measurement event contains the intersection ofthe causal futures of the measurement events of all the partiesq ∈ S. Thus, a set K of parties might signal to another set Siff for each {p} ∈ K the condition (B2) is satisfied. If K cannotsignal to S we say K οΏ½ S; thus the RC conditions are all thoseof the form

P(aS | xS) =βˆ‘aβ€²

Sc

P(aβ€² | xβ€²)

=βˆ‘aβ€²β€²

Sc

P(aβ€²β€² | xβ€²β€²) iff βˆ€ K βŠ† Sc, K οΏ½ S. (B3)

Of course, in general this definition has redundant constraintsand in general a subset of these constraints can determinethe full set. By definition the RC constraints are a subset ofno-signaling constraints; therefore no-signaling boxes satisfythe RC constrains while the opposite is not always true. Animportant remark to be made here is that for any spacetimeand spacelike separated parties we have

P(ap | xp) =βˆ‘aβ€²{p}c

P(aβ€² | xβ€²) =βˆ‘aβ€²β€²{p}c

P(aβ€²β€² | xβ€²β€²) (B4)

for any single party p. This is the minimum number of RCconstraints, which corresponds to the largest correlation poly-

A B C

< A, C >

ct

x

FIG. 3. A particular spacetime configuration of measurementevents in the three-party Bell experiment. The spacetime locationsof Alice, Bob, and Charlie’s measurement events are A, B, C, respec-tively. The yellow area shows J+(A) ∩ J+(C), the only region wherethe information from the correlations between the outputs of Aliceand Charlie, denoted γ€ˆA,C〉, is accessible. The crucial property ofthis measurement configuration is that J+(A) ∩ J+(C) βŠ‚ J+(B).

tope. Since always the single-party outcome probabilities arewell defined, the signaling in RC can only target sets of partieswith two or more elements, i.e., to a region. In this articlewe only consider cases where signaling from a region is theunion of the several individual signals from parties insidethat region; accordingly we designate the signaling allowedby RC as point-to-region (PTR) signaling without any loss ofgenerality.

APPENDIX C: COMMUNICATION COMPLEXITYADVANTAGE IN RELATIVISTIC CAUSAL THEORIES

The relativistic causal correlations in the measurementconfiguration of Fig. 3 are separated from the usual no-signaling correlations by constraints of the formβˆ‘

b

P(a, b, c|x, y, z) βˆ’βˆ‘

b

P(a, b, c|x, yβ€², z)

= 0 βˆ€ a, c, x, z, y οΏ½= yβ€². (C1)

The usual no-signaling constraints impose equality abovewhile this equality is not necessary for relativistic causalityto hold as shown in [12]. The relaxation of these constraintsis also reflected in a difference between the optimal successprobability Ο‰(G) of multiplayer games in NS theories versusthat in RC theories. We first note that as in the no-signalingcase, the calculation of the optimal success probability of mul-tiplayer games in RC theories can be achieved in polynomialtime by means of a linear program, and second we explainhow advantages in some of these games imply communicationcomplexity advantages.

As a first example of the difference in Ο‰(G) between NSand RC theories, consider the β€œguess your neighbor’s input”game (GYNI) in the (3,2,2) Bell scenario. The inputs x, y, z tothe three parties in the game obey the promise x βŠ• y βŠ• z = 0and the task is for each party to output their neighbor’s input,

033146-6

Page 7: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

so that the expression for the success probability in the gameis given by

Ο‰(GYNI) = 14 [P(000|000) + P(110|011)

+ P(011|101) + P(101|110)]. (C2)

It was shown in [33] that Ο‰c(GYNI) = Ο‰q(GYNI) = 14

while correlations obeying the no-signaling constraints allowωns(GYNI) = 1

3 . Here, Ο‰c, Ο‰q, and Ο‰ns denote the optimalsuccess probability in classical, quantum, and no-signalingtheories, respectively, while similarly Ο‰rc will denote theoptimal success probability in theories that only impose rela-tivistic causality. A simple maximization over the constraintsin Eq. (B3) gives that Ο‰rc(GYNI) = 1

2 and this optimal valueis achieved by the RC box (extremal box class No. 77 inAppendix I):

BRCGYNI : P(abc | xyz)

={

12 , if (1 βŠ• b βŠ• c βŠ• y)(1 βŠ• a βŠ• b βŠ• x) = 1,

0, otherwise.(C3)

As a second example, we present games where RC cor-relations allow the players to win with certainty (successprobability 1) while the best no-signaling strategy gives asuccess probability less than 1. In these games, we considerthree parties, of whom only the outputs of two parties appearin the winning constraint, while the third player helps theothers achieve their task, so that one might term these gamesas β€œgames with allies” (GWA). Specifically, we propose aGWA game for Alice and Charlie with Bob as the ally, with awinning constraint given by

xy βŠ• yz = a βŠ• c, (C4)

where as usual x, y, z denote the inputs of the three playersand a, b, c denote their respective outputs. For this game, asimple maximization over the usual no-signaling constraintsby a linear program shows that Ο‰ns(GWA) = 3

4 . In fact, aclassical strategy exists that achieves this value, and is simplygiven when Alice and Charlie output a = c = 0 for any inputx, y, z. When y = 0, this strategy satisfies the winning con-straint a βŠ• c = (x βŠ• z)y = 0, and when y = 1, this strategysatisfies a βŠ• c = (x βŠ• z) in exactly half of the cases, so thatthe optimal success probability Ο‰c(GWA) = 3

4 is achieved.On the other hand using a RC box is it possible to win theGWA with certainty. Specifically, consider the RC box (ex-tremal box class No. 76 in Appendix I):

BRCGWA : P(abc | xyz)

={

12 , if (1 βŠ• a βŠ• b βŠ• xy)(1 βŠ• b βŠ• c βŠ• zy) = 1,

0, otherwise.(C5)

This box satisfies a βŠ• b = xy and b βŠ• c = zy (two Popescu-Rohrlich type boxes between A-B and B-C) so that it directlysatisfies a βŠ• c = xy βŠ• zy, which gives Ο‰rc(GWA) = 1. In theliterature the condition (C4) appears in [34] as a commu-nication complexity task for Alice and Charlie: They mustcompute functions f (x, y, z) = h(x, y) βŠ• g(y, z), sharing 1 bitof information and without communication with Bob. Thisshows that RC boxes can be used to trivialize some com-munication complexity tasks [34]. This remarkable result

suggests that a communication principle demanding the no-trivialization of GWA games has direct consequences on RCcorrelations. Could it be that a communication principle im-plies enough restrictions to certify a security protocol in RCtheories? We leave for future research the investigation of thisquestion.

APPENDIX D: LACK OF MONOGAMY FOR TWO-PLAYERGAMES IN RC THEORIES

An important consequence of the relaxation of the no-signaling constraints to those that are sufficient to ensurerelativistic causality is the resulting lack of monogamy forgeneral two-player games in RC theories. In particular, whenthe players’ measurements are arranged in the spacetime con-figuration of Fig. 3, for any two-player game G it holds thatΟ‰rc(GAB) = Ο‰rc(GBC ) = Ο‰ns(G). In other words, both playersare able to achieve the maximum no-signaling (equal to therelativistic causal) value of the two-player game G in thisconfiguration. We give the proof of this statement for a generalbipartite Bell inequality in this section.

Consider a general bipartite Bell inequality G of the form

G :=βˆ‘

a,b,x,y

Ξ±a,b,x,yP(a, b|x, y) οΏ½ Ο‰c(G), (D1)

where we take without loss of generality Ξ±a,b,x,y οΏ½ 0 andnormalize the inequality so that Ο‰c(G) οΏ½ 1.

Proposition 2. Consider any bipartite Bell inequality G ofthe form in Eq. (D1). Suppose three players perform theirmeasurements in the spacetime configuration of Fig. 3, andthat both Alice-Bob and Bob-Charlie test for the violationof G. Then, there exist correlations {P(a, b, c|x, y, z)} in RCtheories that allow both A-B and B-C to achieve Ο‰ns(G).

Proof. We construct the required RC box {P(a, b, c|x, y, z)}depending on the bipartite Bell inequality G as follows. Let{Q(a, b|x, y)} be a two-party no-signaling box that achievesthe maximum no-signaling (equal to relativistic causal, in thisbipartite case) value Ο‰ns(G).

Fix y = 1. The box {Q(a, b|x, y = 1)} is local realistic byvirtue of the fact that party B only chooses the single input y =1. We construct a symmetric extension of {Q(a, b|x, y = 1)} tothe three-party box {Q1(a, b, c|x, y = 1, z)} such that the two-party marginals A-B and C-B are equal to Q(a, b|x, y = 1);i.e., we impose

Q(a, b|x, y = 1) =βˆ‘

c

Q1(a, b, c|x, y = 1, z)

=βˆ‘

aβ€²Q1(aβ€², b, cβ€²|xβ€², y = 1, zβ€²)

βˆ€ b, a = cβ€², x = zβ€². (D2)

Such a symmetric extension can always be constructed forthe local realistic box {Q(a, b|x, y = 1)}. To make this moreexplicit, suppose that the box has the following decompositioninto classical deterministic boxes:

Q(a, b|x, y = 1) =βˆ‘

Ξ»

pΞ»QA(a|x, Ξ»)QB(b|y = 1, Ξ»). (D3)

033146-7

Page 8: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

One can then construct the symmetric extension{Q1(a, b, c|x, y = 1, z)} as

Q1(a, b, c|x, y = 1, z)

=βˆ‘

Ξ»

pΞ»QA(a|x, Ξ»)QB(b|y = 1, Ξ»)QA(c|z, Ξ»), (D4)

where the marginal distribution for party C is the same asthat for A, and QA, QB are deterministic boxes. Note thatthe symmetric extension obeys all the usual no-signalingconstraints; i.e., every bipartite marginal Q1(a, b|x, y = 1)and Q1(b, c|y = 1, z) as well as the single-party marginalsQ1(a|x), Q1(b|y = 1), and Q1(c|z) are well defined indepen-dently of the inputs of the remaining parties.

Similarly, fix y = 2, 3, . . . , |Y | and construct the cor-responding symmetric extensions Qk (a, b, c|x, y = k, z) foreach of the local realistic boxes Q(a, b|x, y = k). In all theseboxes again, the bipartite and single-party marginals are welldefined independently of the inputs of the other parties, andmoreover we have that

Qk (a|x) = Qkβ€² (a|x) =βˆ‘

b

Q(a, b|x, y = 1) βˆ€]a, x, k, kβ€²,

Qk (c|z) = Qkβ€² (c|z) =βˆ‘

b

Q(c, b|z, y = 1) βˆ€ c, z, k, kβ€²,

(D5)

by the property of the symmetric extension; i.e., A and C’smarginals are the same in each extension.

Now, putting together all the symmetric extensions, we ob-tain the combined box P(a, b, c|x, y, z) that is the required box

shared by the three parties A, B, and C, with P(a, b, c|x, y =k, z) = Qk (a, b, c|x, y = k, z) for every k, a, b, c, x, z. Thisbox satisfies all the RC constraints in Eq. (B3) by the argumentabove. Note that in general,

βˆ‘b

P(a, b, c|x, y = k, z)

οΏ½=βˆ‘

b

P(a, b, c|x, y = kβ€², z) k οΏ½= kβ€²,

(D6)

but we have seen that this is precisely the missing constraintsfrom the usual no-signaling conditions, that is not necessary toensure by causality in this measurement configuration. Sincethe two-party marginals P(a, b|x, y) and P(c, b|z, y) are bothequal to Q(a, b|x, y), we have that both A-B and B-C achievethe maximum no-signaling value Ο‰ns(G). This completes theproof. οΏ½

As an example of the general proposition above, we findthat the following RC box,

BRCGu

: P(abc | xyz) ={

1d , if a = Ο€xy(b), c = Ο€zy(b),0, otherwise,

(D7)allows both A-B and B-C to achieve the maximum no-signaling value of 1, for any unique game Gu defined by aset of permutations {Ο€xy}.

APPENDIX E: THE NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY IN RELATIVISTIC CAUSAL THEORIES

In this Appendix we complete the proof of the no-go theorem presented in our article. The main theorem is as follows:Theorem 3. Assume that N reliable agents perform their measurements with inputs q = y1, . . . , yN and outputs r = b1, . . . , bN

in arbitrary spacelike separated positions, to compute any multipartite Bell inequality G of the form

G :=βˆ‘r,q

V (r, q)P(r | q) οΏ½ Ο‰c(G), (E1)

in which a violation of G, Ο‰βˆ— > Ο‰c is observed. Then, there is a spacetime configuration for two eavesdroppers’ measurements,so that N correlations of those measurements will reproduce the statistics of the N reliable agents after the eavesdroppers meetor communicate their results.

Proof. We begin with a brief description of the idea of the proof. We consider two eavesdroppers E1 and E2. We show thatsatisfying RC constraints one can construct a device such that the inputs and outputs of the honest parties’ devices are encodedinto correlations between E1 and E2. In order to avoid signaling, the local marginals of the eavesdroppers are uniform, as oneof the Eves in a sense one-time-pads the information of the other. We borrow this idea from the simplest secret sharing scheme.To give a concrete example, the outputs of the honest parties r = b1, . . . , bN will be encoded into variables of Eves d and c,respectively, as follows. For each of j ∈ {1, . . . , N} there is dj = c j βŠ•Hj b j where addition is modulo Hjβ€”the dimension ofb jβ€”and the distribution of c j is 1

Hj. It is easy to see that none of the eavesdroppers can gain any knowledge about each of bj ;

however upon meeting they can learn each of bj perfectly.We are ready to proceed with details of the proof. Consider two eavesdroppers E1, E2 with devices that have only outputs

s1 = c1, . . . , cN , z1, . . . , zN , s2 = d1, . . . , dN ,w1, . . . ,wN , respectively. Let us say the eavesdroppers want to attack all trustedparties B1, . . . , BN . Given a particular reference system S(οΏ½r, t ) there always exists an event pB in a causal spacetime, such thatthe spacetime convex hull B of the spacelike separated measurement events pB1 , . . . , pBN performed by the B1, . . . , BN parties iscompletely inside its causal past Jβˆ’(pB) βŠ‡ B. When the two eavesdroppers E1, E2 can choose any spacelike separated positionsfor their measurement events pE1 , pE2 , in particular they can satisfy J+(pE1 ) ∩ J+(pE2 ) βŠ† J+(pB) for any spacetime which iscausal and simply connected. In this case every B1, . . . , BN can signal to any correlation between the outputs of E1, E2.

033146-8

Page 9: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

Then, the eavesdroppers could distribute a behavior that satisfiesβˆ‘r

Qk(r, s1, s2 | q = k) οΏ½=βˆ‘

r

Qkβ€² (r, s1, s2 | q = kβ€²) βˆ€ k οΏ½= kβ€². (E2)

The correlation between the outputs of E1, E2 can be chosen such that d j = c jβŠ•

Hjb j and w j = z j

βŠ•L j

y j , with Hj thedimension of outputs bj (also outputs c j, d j are chosen to have dimension Hj), Lj the dimension of inputs y j (also outputsz j,w j are chosen to have dimension Lj), and

βŠ•Hj

,βŠ•

L jare sums mod Hj and mod Lj , respectively.

Now, we should check that no-signaling conditions are satisfied according to the scenario. First, because the E1, E2 have noinput, they cannot signal to the B1, . . . , BN . Second, the Qk(r, s1, s2 | q = k) is a classical distribution because it has a singleinput k and in consequence we can choose

Qk(r, s1, s2 | q = k) =βˆ‘

Ξ»

pΞ»QB(r | k, Ξ»(r, k))QE (s1, s2 | k, Ξ»(r, k)) βˆ€ k, (E3)

where QB(r | k, Ξ»(r, k)) reproduce the marginals of Q(r | q = k) for each particular k when Q(r | q) is the no-signaling box thatachieves the value Ο‰β€²(G) > Ο‰c(G) expected by the parties B1, . . . , BN for the Bell inequality G. Because Q(r | q) is no-signaling,then no Bi signals to any Bj . Now, what is left is to check that B1, . . . , BN do not signal either to E2 or to E1. That is,βˆ‘

r,s2

Qk(r, s1, s2 | q = k) =βˆ‘r,s2

Qkβ€² (r, s1, s2 | q = kβ€²) βˆ€ k οΏ½= kβ€²,

βˆ‘r,s1

Qk(r, s1, s2 | q = k) =βˆ‘r,s1

Qkβ€² (r, s1, s2 | q = kβ€²) βˆ€ k οΏ½= kβ€². (E4)

At this point we remark that Ξ» carries on the information from r = b1, . . . , bN which determine the correlation of outputs c j, d j .Now, since dj = c j

βŠ•Hj

b j and w j = z jβŠ•

L jy j the outputs c j, d j, z j,w j depend only on the inputs and outputs y j, b j of agent

Bj . Because of the functional dependencies above we can rewrite QE (s1, s2 | k, Ξ»(r, k)) as

QE (s1, s2 | k, λ(r, k)) =∏

j

Q( j)E (c j, d j, z j,w j | Ξ»(b j, y j ), y j ). (E5)

Here a valid choice for each Q( j)E is

Q( j)E (c j, d j, z j,w j | Ξ»(b j, y j ), y j ) =

{ 1Hj L j

, d j = c jβŠ•

Hjb j and w j = z j

βŠ•L j

y j,

0, otherwise.(E6)

If we consider the behavior of the form (E3) to obtain the marginal of E2,βˆ‘r,s1

Qk(r, s1, s2 | q = k) =βˆ‘r,s1

βˆ‘Ξ»

pΞ»QB(r | k, Ξ»(r, k))QE (s1, s2 | k, Ξ»(r, k))

=βˆ‘

r

βˆ‘Ξ»

pΞ»QB(r | k, Ξ»(r, k))βˆ‘

s1

QE (s1, s2 | k, Ξ»(r, k))

=βˆ‘

r

βˆ‘Ξ»

pΞ»QB(r | k, Ξ»(r, k))βˆ‘cN ,zN

Β· Β· Β·βˆ‘c1,z1

QE (s1, s2 | k, Ξ»(r, k)).

But, if we sum the distributions QE (s1, s2 | k, Ξ»(r, k)) over the components (ci, zi ) of s1 we obtainβˆ‘ci,zi

QE (s1, s2 | k, Ξ»(r, k)) =βˆ‘ci,zi

∏j

Q( j)E (c j, d j, z j,w j | Ξ»(b j, y j ), y j )

=∏j �=i

Q( j)E (c j, d j, z j,w j | Ξ»(b j, y j ), y j )

βˆ‘ci,zi

Q(i)E (ci, di, zi,wi | Ξ»(b j, y j ), y j )

=∏j �=i

Q( j)E (c j, d j, z j,w j | Ξ»(b j, y j ), y j )

βˆ‘ci,zi

Q(i)E

(di = ci

βŠ•Hi

bi,wi = zi

βŠ•Li

yi | Ξ»(b j, y j ), y j

)

=∏j �=i

Q( j)E (c j, d j, z j,w j | Ξ»(b j, y j ), y j )

(1

HiLi

),

where in the last step we use the fact that the permutations Ο€b j (Β·) = (Β·) βŠ•Hj

b j and Ο€y j (Β·) = (Β·) βŠ•L j

y j have aunique value. Since the above calculation is equally valid when summing up over every pair (ci, zi ) of s1 wehave

033146-9

Page 10: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

βˆ‘r,s1

Qk(r, s1, s2 | q = k) =βˆ‘

r

βˆ‘Ξ»

pΞ»QB(r | k, Ξ»(r, k))βˆ‘cN ,zN

Β· Β· Β·βˆ‘c1,z1

QE (s1, s2 | k, Ξ»(r, k))

=βˆ‘

r

βˆ‘Ξ»

pΞ»QB(r | k, Ξ»(r, k))(

1

H1L1

) βˆ‘cN ,zN

Β· Β· Β·βˆ‘c2,z2

∏j �=1

Q( j)E (c j, d j, z j,w j | Ξ»(b j, y j ), y j )

...

=βˆ‘

r

βˆ‘Ξ»

pΞ»QB(r | k, Ξ»(r, k))

(N∏

j=1

1

HjLj

)

=(

N∏j=1

1

HjLj

) βˆ‘r

βˆ‘Ξ»

pλQB(r | k, λ(r, k)) =N∏

j=1

1

HjLj.

Hence, the marginal of E2 is

βˆ‘r,s1

Qk(r, s1, s2 | q = k) =N∏

j=1

1

HjLjβˆ€ k. (E7)

Now, since the permutations Ο€b j (Β·), Ο€y j (Β·) have unique inverses Ο€βˆ’1b j

(Β·), Ο€βˆ’1y j

(Β·), respectively, we can apply the same argumentswhen summing up with every pair (di,wi ) of s2. Then, a direct calculation shows that the marginal of E1 is

βˆ‘r,s2

Qk(r, s1, s2 | q = k) =N∏

j=1

1

HjLjβˆ€ k. (E8)

This demonstrates that the marginals of E1 and E2 are independent from the inputs of Bj for each j ∈ {1, . . . , N}.To complete the attack, we specify how the eavesdroppers can extract the information of Q(r | q) from s1, s2. As we have

seen the value of QE (s1, s2 | q = k, Ξ»(r, k)) is nonzero only when d j = c jβŠ•

Hjb j and w j = z j

βŠ•L j

y j for every j ∈ {1, . . . , N}.Then, from the table of values s1, s2 is possible to compute a table r, q and determine a distribution QE (r, q). From here wecompute

Q(r | q) = QE (r, q)βˆ‘r QE (r, q)

. (E9)

Finally, the eavesdroppers are able to compute Q(r | q) without affecting the violation Ο‰β€²(G) > Ο‰c(G) observed by parties Bj .οΏ½We remark that such attack is possible because behaviors Qk(r, s1, s2 | q = k) are allowed by the relativistic causal con-

straints.

APPENDIX F: NO SECURE KEY DISTILLATION VIA DIRECT MEASUREMENTAND LOPC OPERATIONS, AGAINST RC ADVERSARIES

In the previous Appendix, we have shown that two collaborating eavesdroppers can learn a copy of correlations sharedby two honest parties. Intuitive as it is, in such a case, no cryptographic protocol based on these correlations could beaccomplished. However, cryptography is a domain which studies a plethora of security scenarios. Proving a no-go result foreach of them is a difficult task, as the proof is highly dependent on the mathematical description of a particular scenario (such astwo-party cryptographic protocols, secret sharing, anonymous voting, public-key cryptographic protocols, or private randomnessgeneration). The most fundamental among those scenarios is, no doubt, the secure key distribution between two honest partiesagainst an adversary. To exemplify that it may not be possible in RC, we prove in detail that a broad class of protocols yield zerokey rate in the latter scenario. These are protocols that obtain key via the same measurement in each run of the protocol. They arecalled β€œmeasured device followed by local operations and public communications” (MDLOPC). Notably, all modern protocolsin device-independent cryptography and quantum device-independent cryptography are MDLOPC operations (see [32] and [19]and references therein). Moreover, in the scenario of secure key distribution against the nonsignaling adversary, it is believedthat a more general class cannot yield positive key [35]. This fact justifies our focus on MDLOPC operations that lead to positivekey in the case of a nonsignaling adversary [8,9,36]. As we will see, no such protocol can achieve a positive key rate againstthe relativistic causal ones. Since we will base the discussion on the results of Theorem 3, we will consider two collaboratingadversaries (eavesdroppers) rather than a single one.

1. Scenario for secure key distribution against the relativistic causal adversary

In the scenario of secure key distribution against relativistic causal (RC) adversaries, the M honest parties share N copies ofa (single-use) device. The M parties first measure each of N devices P(ABE1E2|Y1, . . . ,YM , Z1, Z2) with the same direct q :=(y1

1, . . . , y1M ). They further apply an LOPC (local operations and public communications) operation on outputs r := (b1, . . . , bM )

of the measurement. This class of operations (introduced in [19]) is called MDLOPC (measurement on device followed by LOPCoperations).

033146-10

Page 11: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

In practical protocols, there are two phases: testing and key generation. The measurements in the protocol are taken randomlyfor both tests and key generation. There is a finite set of test measurements, while there is a single measurement for key generation[here (y1

i )Mi=1]. The testing rounds are necessary for checking the value of the Bell inequality. If this value is high enough, the

data from key generation rounds are processed to produce key. The whole protocol is aborted otherwise. In what follows, weassume that the device has passed the test, which means that the tested Bell violation is high enough (or even maximal possible).This fact ensures that in the no-signaling case, Alice and Bob would be able in principle to produce key by postprocessing(information reconciliation and privacy amplification). For the sake of clarity, we will present the proof for M = 2 honest partiesand later show how to generalize the result for an arbitrary number of them based on Ref. [37]. Consequently, instead of inputsY1,Y2 and outputs B1, B2 we will write X,Y and A, B, respectively, and use lowercase for the values of random variables (e.g.,X = x,Y = y). In what follows, the attack by the Eves will be chosen such that Z1, Z2 will both be unary, and hence omitted innotation in most cases.

We are ready to define the protocol of key distillation for the case of the two honest parties A and B.Definition 1. A protocol of key distillation is a sequence of MDLOPC operations οΏ½ = {οΏ½N }, performed by the honest

parties, each element of which consisting of a measurement stage {M = (y1i )M

i=1} with y1i = y1, followed by a postprocessing

{PN }. Moreover, for each consecutive N copies of shared devices P ≑ P(A, B, E |XY Z )βŠ—N , it outputs a conditional probabilitydistribution such that βˆ₯βˆ₯οΏ½N (PβŠ—N ) βˆ’ P(dN )

ideal

βˆ₯βˆ₯RC οΏ½ Ξ΅N

Nβ†’βˆžβˆ’β†’ 0, (F1)

where an ideal distribution P(dN )ideal is perfectly correlated between the honest parties, and product with the device of the

eavesdroppers:

P(dN )ideal (A = a, B = b, E1, E2|Z1, Z2) =

(Ξ΄A=a,B=b

dN

)βˆ‘a,b

P(A = a, B = b, E1, E2|Z1, Z2), (F2)

with P(A = a, B = b, E1, E2|Z1, Z2) ≑ οΏ½N (PβŠ—N ). Moreover by ||P βˆ’ Q||RC := supθ∈RC ||ΞΈ (P) βˆ’ ΞΈ (Q)||1, we mean the supre-mum of distinguishability between the distributions achievable by the linear operations satisfying relativistic causality, anddN = dimAN .

Knowing what the protocols of key distillation in the considered scenario are, we can pass to define the quantity of the keysecure against RC adversaries. We limit ourselves here to the case of the key distilled by MDLOPC protocols.

Definition 2 (key secure against RC adversary). Given a tripartite device P ≑ P(ABE |XY Z ) the secret key rate of the protocolof key distillation {οΏ½N }, on N iid copies of the device, denoted by R(οΏ½|P ) is a number lim supNβ†’βˆž

log2 dN

N , where log2 dN is thelength of a secret key shared between Alice and Bob, with dN = dimA(οΏ½N (PβŠ—N )). The rate of device-independent key secureagainst RC adversary in the iid scenario is given by

KRCDI (P) = sup

�N ∈MDLOPCR(�|P ), (F3)

where the supremum is taken with respect to MDLOPC protocols.

2. No-go for MDLOPC protocols

To show that the key rate obtained by MDLOPC operations secure against RC adversaries is zero, we demonstrate an upperbound on the key rate and show that it is zero. We achieve this task by relating the introduced scenario of security againstrelativistic causal adversaries with the so-called secure key agreement (SKA) [38].

Since we are going to refer to SKA, we recall it briefly here. There, the honest parties and an eavesdropper share (asymptot-ically growing number) N copies of a joined probability distribution P(A, BE ). The parties can perform LOPC operations. Theeavesdropper collects the public communication during the protocol. The original security condition that is demanded for anoutput of a key distillation protocol is rather involved [38]. It has been however shown in [19] that a simple lower bound holds:

Theorem 4. [19]. The secret key rate S(A : B||E ) of the SKA cryptographic model [38,39] is lower bounded by the followingasymptotic expression:

S(A : B||E )P(ABE ) οΏ½ supP

lim supNβ†’βˆž

log2 dimA

[PN (PβŠ—N (ABE ))]N, (F4)

with security condition βˆ₯βˆ₯PN (PβŠ—N (ABE )) βˆ’ P(dN )ideal

βˆ₯βˆ₯1 οΏ½ Ξ΄N

Nβ†’βˆžβˆ’β†’ 0, (F5)

where P = βˆͺ∞N=1{PN } is a cryptographic protocol consisting of LOPC operations, acting on N iid copies of the classical

probability distribution P(ABE ). Moreover P(dN )ideal = Ξ΄A=a,B=b

dNP(E ), and P(E ) = βˆ‘

a,b P(A = a, B = b, E ).Let us describe the idea of the proof of the no-go briefly. We consider a family of tripartite devices with unary input

on the eavesdropper’s part (hence omitted in notation) that realize the attack described in Theorem 3. For a fixed numberof copies N , it reads P(ABE1E2|XY )βŠ—N . Since the honest parties first measure their device, the figure of merit is, in fact, a

033146-11

Page 12: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

joined probability distribution P(ABE1E2|X = x,Y = y)βŠ—N . In this case, the norm ||.||RC of the difference of two conditionaldistributions in Eq. (F1) is equal to the variational distance between two distributions. Hence, the key secret against the Evesunder this particular strategy turns out to be upper bounded by the key obtained from P(ABE )βŠ—N by LOPC operations, whereE = (AB). Indeed from Theorem 3, the two Eves can upon meeting learn the realization of the marginal P(AB|X = x,Y = y).In this way, the Eves switch from the RC scenario to the secrete key agreement scenario. In the latter scenario, there is a wellknown bound on the secure key S(A : B||E ), called intrinsic information. The intrinsic information of a distribution P(ABE )is I (A : B ↓ E )P(ABE ) := infοΏ½E :Eβ†’E β€² I (A : B|E β€²)P(ABE β€² ). Here I (A : B|E β€²)P(ABE β€² ) is the conditional mutual information equal toH (AE β€²) + H (BE β€²) βˆ’ H (E β€²) βˆ’ H (ABE β€²) with H (X ) denoting a Shannon entropy of the random variable X , and the infimum istaken over stochastic maps transforming E into E β€². We have then the following:

Theorem 5. [40]. For any tripartite distribution P(ABE ), there is

S(A : B||E )P(ABE ) οΏ½ I (A : B ↓ E )P(ABE ). (F6)

We are ready now to state the main result of this section: a no-go for distillation via MDLOPC operations.Theorem 6. (no-go for MDLOPC secure key distribution). For any PAB ≑ P(A, B|X,Y ) satisfying no-signaling constraints,

there exists a spacetime configuration of two eavesdroppers E1 and E2 and a tripartite distribution P(A, B, E1, E2|X,Y ) satisfyingRC constraints, with marginal distribution on AB equal to PAB such that

KRCD (P(ABE1E2|XY )) = 0. (F7)

Proof. Let us fix Ξ· > 0. For this Ξ· there exist natural N , Ξ΅N > 0 and the operation of the MDLOPC protocol, which isΞ·-optimal. We denote this operation as οΏ½N := PN β—¦ MN . The first part MN is equivalent to an N-fold measurement x1, y1 [thesame on each of the copies of P(ABE1E2|X,Y )]. By Ξ·-optimality we mean that the rate of protocol {οΏ½N } is close by Ξ· to theoptimal KRC

D (P(ABE1E2|XY )):

(1/N ) log2 dimA[οΏ½N (PβŠ—N (ABE1E2|X,Y ))] οΏ½ KRCD (P(ABE1E2|X,Y )) βˆ’ Ξ· (F8)

and βˆ₯βˆ₯οΏ½N (PβŠ—N (ABE1E2|XY )) βˆ’ P(dN )ideal

βˆ₯βˆ₯RC οΏ½ Ξ΅N . (F9)

Now, thanks to Theorem 3 the device P(ABE1E2|XY ) can be chosen such that the two Eves, upon meeting, are able to learna copy of a realization of each copy of the distribution P(A, B|X = x1,Y = y1). Let us note here that the Eves can learn not onlythe outputs AB but also the inputs X,Y . However in the class of MDLOPC protocols the measurement (x1, y1) that attains thesupremum in the definition of KRC

D is known to Eve(s). This is because the protocol, as it is usually assumed, is publicly knownin particular to adversaries. We focus then on the fact that the Eves learn the outputs, so that E ((E1E2)βŠ—N ) = (AB)βŠ—N . Since E is (in principle unnecessary) action of Eves, the key can only be higher after performing E :

log2 dimA[οΏ½N (P(N )(ABE1E2|XY ))]N

= log2 dimA[PN (P(N )(ABE1E2|X = x1,Y = y1))]N

οΏ½ log2 dimA[PN (P(AB(AB))βŠ—N )]

N,

(F10)

where ( 1N )log2 dimA[PN (P(AB(AB))βŠ—N )] is the key rate of the LOPC protocol PN when acting on P(AB(AB))βŠ—N . We have alsoβˆ₯βˆ₯οΏ½N (P(ABE1E2|XY )βŠ—N ) βˆ’ P(dN )

ideal

βˆ₯βˆ₯RC οΏ½ Ξ΅N β‡’ βˆ₯βˆ₯PN (P(AB(AB))βŠ—N ) βˆ’ P(dN )

ideal

βˆ₯βˆ₯1 οΏ½ Ξ΅N . (F11)

Indeed, the measurement (X,Y ) = (x1, y1) operation composed with an LOPC protocol PN is one of the linear operationssatisfying RC; hence we have

supθ∈RC

βˆ₯βˆ₯ΞΈ[οΏ½N (P(AB(AB)|XY )βŠ—N ) βˆ’ P(dN )

ideal

]βˆ₯βˆ₯1 οΏ½ Ξ΅N β‡’ βˆ₯βˆ₯PN (P(ABE1E2|X = x1,Y = y1)βŠ—N ) βˆ’ P(dN )

ideal

βˆ₯βˆ₯1 οΏ½ Ξ΅N , (F12)

where P(dN )ideal = Ξ΄A=a,B=b

dN

βˆ‘a,b P(A = a, B = b, E1E2|X = x1,Y = y1). We use now contractivity of the ||.||1 norm under stochas-

tic maps, including E which maps E1E2 to AB, to obtain finally (F11) with P(dN )ideal = Ξ΄(A=a,B=b)

dNP(AB). Now P(AB(AB)|X =

x1,Y = y1)βŠ—N is a tripartite probability distribution which we denote as P(AB(AB))βŠ—N . It is an instance of the SKA scenario.We can therefore apply Theorem 4 (with Ξ΄N = Ξ΅N ). Indeed, in PN we recognize an LOPC operation such that (since Ξ΅N can bearbitrarily small) we have

S(A : B||(AB)) οΏ½ log2 dimA[PN (P(AB(AB))βŠ—N )]

N. (F13)

Now by Eqs. (F10) and (F8) there is

S(AB||(AB)) οΏ½ log2 dimA[PN (P(AB(AB))βŠ—N )]

NοΏ½ log2 dimA[οΏ½N (P(N )(ABE1E2|XY ))]

NοΏ½ KRC

D (P(ABE1E2|XY )) βˆ’ Ξ·. (F14)

033146-12

Page 13: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

Since Ξ· was arbitrary, we can set it to 0, keeping the above inequality true. It is enough to observe now that

S(A : B||(AB))P(AB(AB)) οΏ½ I (A : B ↓ (AB))P(AB(AB)) = 0. (F15)

The inequality is thanks to Theorem 5. Equality holds due to the fact that the intrinsic information I (A : B ↓ (AB)) equals 0.Indeed, there is

I (A : B|(AB)) = H (A(AB)) + H (B(AB)) βˆ’ H (AB) βˆ’ H (AB(AB))

= H (AAB) + H (BAB) βˆ’ H (AB) βˆ’ H (ABAB) = H (AB) + H (BA) βˆ’ H (AB) βˆ’ H (AB) = 0, (F16)

and so I (A : B ↓ AB) = infΞΊ:ABβ†’E β€² I (A : B|E β€²) = 0, as the infimum is achieved for ΞΊ being an identity operation. From Eq. (F14),and Eq. (F15), we conclude that

KRCD (P(ABE1E2|XY )) οΏ½ S(A : B||(AB)) οΏ½ 0. (F17)

By definition KRCD οΏ½ 0 as the rate 0 is achieved for a protocol which traces out the input yielding output with dN = 1. Hence the

assertion follows from the above inequality. οΏ½In the above proof we have considered M = 2 of the honest parties. We argue now that analogous result holds for the

conference key obtained by the M > 2 parties, secure against RC adversaries. First, the analog of a technical Theorem 4 of [19]is straightforward. Then, the proof of an analog of Theorem 6 goes along similar lines to those for M = 2, with a modificationin Eq. (F15). There we base the discussion on the following analog of Theorem 5 shown in [37] (see Theorem 4, and Example 2there):

S(B1 : B2 : . . . : BM ||E )P(B1,...,BM E ) οΏ½1

(M βˆ’ 1)I (B1 : B2 : . . . : BM ↓ E )P(B1,...,BM E ), (F18)

for any M + 1-partite device P(B1, . . . , BME ), where S(B1 : B2 : . . . : BM ||E ) denotes the so called conference key, whileI (B1 : B2 : . . . : BM ↓ E ) = βˆ‘M

i=1 H (Bi, E ) βˆ’ H (B1, . . . , BM , E ) βˆ’ (M βˆ’ 1)H (E ). The fact that I (B1, . . . , BM ↓ E ) equals zerofor E = (AB) can be checked by direct inspection.

APPENDIX G: DIMENSIONALITY OF THE RC POLYTOPE

In this Appendix we compute the dimensionality D[. . .] of the polytope of RC correlations in the three-party m inputs, noutputs (3, m, n) scenario. We proceed with our calculation in three steps: (1) begin with the general set of constraints and dividethem into appropriate subsets, (2) compute in detail the dimensionality of the (3,2,2) scenario (i.e., D[RC(3, 2, 2)]), and (3)reproduce computation in step 2 for the general scenario of (3, m, n) with the corresponding alterations.

Step 1: General setting

The general setting corresponds to the 3-party, m inputs, n outputs (3, m, n) scenario with correlations satisfying the followingconstraints:

P(a, b, c|x, y, z) ∈ [0, 1] βˆ€x,y,z,a,b,c, (G1)βˆ‘a,b,c

P(a, b, c|x, y, z) = 1 βˆ€x,y,z, (G2)

P(b, c|y, z) =βˆ‘

a

P(a, b, c|x, y, z) =βˆ‘

a

P(a, b, c|xβ€², y, z) βˆ€x,xβ€²,y,z,b,c, (G3)

P(a, b|x, y) =βˆ‘

c

P(a, b, c|x, y, z) =βˆ‘

c

P(a, b, c|x, y, zβ€²) βˆ€z,zβ€²,x,y,a,b, (G4)

P(a|x) =βˆ‘b,c

P(a, b, c|x, y, z) =βˆ‘b,c

P(a, b, c|x, yβ€², zβ€²) βˆ€y,yβ€²,z,zβ€²,x,a, (G5)

P(c|z) =βˆ‘a,b

P(a, b, c|x, y, z) =βˆ‘a,b

P(a, b, c|xβ€², yβ€², z) βˆ€x,xβ€²,y,yβ€²,z,c. (G6)

We divide the equalities (G2)–(G6) into three sets of constraints N = {(G2)}, P = {(G3), (G4)}, and RC = {(G5), (G6)}. Thecardinalities of these sets, for any m, n, are given by

|N | = m3, (G7)

|P| = 2m2n2(m βˆ’ 1), (G8)

|RC| = 2mn(mn βˆ’ 1), (G9)

and together fully describe the (3, m, n) RC polytope.

033146-13

Page 14: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

Since the set of normalization constraints N involves mutually independent equalities we consider themβ€”without loss ofgeneralityβ€”as independent and describe the dependencies of equations in other sets with respect to them.

Step 2: Computing D[RC(3, 2, 2)]

Here we discuss in detail mutual dependencies between equalities in and between the sets N , P , and RC for the (3,2,2)scenario. We begin by writing explicitly all equations of P and RC in the form of tables:

P c1 c2 c3 c4Q1 Q5

r1βˆ‘

a P(a00|000) = βˆ‘a P(a00|100)

βˆ‘c P(00c|000) = βˆ‘

c P(00c|001)r2

βˆ‘a P(a01|000) = βˆ‘

a P(a01|100)βˆ‘

c P(01c|000) = βˆ‘c P(01c|001)

r3βˆ‘

a P(a10|000) = βˆ‘a P(a10|100)

βˆ‘c P(10c|000) = βˆ‘

c P(10c|001)r4

βˆ‘a P(a11|000) = βˆ‘

a P(a11|100)βˆ‘

c P(11c|000) = βˆ‘c P(11c|001)

Q2 Q6r5

βˆ‘a P(a00|001) = βˆ‘

a P(a00|101)βˆ‘

c P(00c|010) = βˆ‘c P(00c|011)

r6βˆ‘

a P(a01|001) = βˆ‘a P(a01|101)

βˆ‘c P(01c|010) = βˆ‘

c P(01c|011)r7

βˆ‘a P(a10|001) = βˆ‘

a P(a10|101)βˆ‘

c P(10c|010) = βˆ‘c P(10c|011)

r8βˆ‘

a P(a11|001) = βˆ‘a P(a11|101)

βˆ‘c P(11c|010) = βˆ‘

c P(11c|011)Q3 Q7

r9βˆ‘

a P(a00|010) = βˆ‘a P(a00|110)

βˆ‘c P(00c|100) = βˆ‘

c P(00c|101)r10

βˆ‘a P(a01|010) = βˆ‘

a P(a01|110)βˆ‘

c P(01c|100) = βˆ‘c P(01c|101)

r11βˆ‘

a P(a10|010) = βˆ‘a P(a10|110)

βˆ‘c P(10c|100) = βˆ‘

c P(10c|101)r12

βˆ‘a P(a11|010) = βˆ‘

a P(a11|110)βˆ‘

c P(11c|100) = βˆ‘c P(11c|101)

Q4 Q8r13

βˆ‘a P(a00|011) = βˆ‘

a P(a00|111)βˆ‘

c P(00c|110) = βˆ‘c P(00c|111)

r14βˆ‘

a P(a01|011) = βˆ‘a P(a01|111)

βˆ‘c P(01c|110) = βˆ‘

c P(01c|111)r15

βˆ‘a P(a10|011) = βˆ‘

a P(a10|111)βˆ‘

c P(10c|110) = βˆ‘c P(10c|111)

r16βˆ‘

a P(a11|011) = βˆ‘a P(a11|111)

βˆ‘c P(11c|110) = βˆ‘

c P(11c|111)

RC c1 c2 c3 c4Q1 Q5

r1βˆ‘

a,b P(ab0|000) = βˆ‘a,b P(ab0|010)

βˆ‘b,c P(0bc|000) = βˆ‘

b,c P(0bc|001)r2 = βˆ‘

a,b P(ab0|100) = βˆ‘b,c P(0bc|010)

r3 = βˆ‘a,b P(ab0|110) = βˆ‘

b,c P(0bc|011)Q2 Q6

r4βˆ‘

a,b P(ab1|000) = βˆ‘a,b P(ab1|010)

βˆ‘b,c P(1bc|000) = βˆ‘

b,c P(1bc|001)r5 = βˆ‘

a,b P(ab1|100) = βˆ‘b,c P(1bc|010)

r6 = βˆ‘a,b P(ab1|110) = βˆ‘

b,c P(1bc|011)Q3 Q7

r7βˆ‘

a,b P(ab0|001) = βˆ‘a,b P(ab0|011)

βˆ‘b,c P(0bc|100) = βˆ‘

b,c P(0bc|101)r8 = βˆ‘

a,b P(ab0|101) = βˆ‘b,c P(0bc|110)

r9 = βˆ‘a,b P(ab0|111) = βˆ‘

b,c P(0bc|111)Q4 Q8

r10βˆ‘

a,b P(ab1|001) = βˆ‘a,b P(ab1|011)

βˆ‘b,c P(1bc|100) = βˆ‘

b,c P(1bc|101)r11 = βˆ‘

a,b P(ab1|101) = βˆ‘b,c P(1bc|110)

r12 = βˆ‘a,b P(ab1|111) = βˆ‘

b,c P(1bc|111)

We use this table as a means to refer to its elements (terms of sums of probabilities) using rows and columns [e.g.,βˆ‘a,b P(ab0|010) ≑ RC(1, 2)] and to define sub-tables referred to as sectors [e.g., P (Q1) or RC(Q2)].Consider P . In each sector P (Qi), i ∈ {1, . . . , 8}, the last equality is implied by the previous ones and one of 8 normalization

conditions in N , which gives 8 dependent equalities. There are two more redundant conditions that can be found by writingtwo sequences of equalities that begin and end with the same sum of probabilities, but with different rows or columns in thetables above. In sectors {P (Q1),P (Q2),P (Q5),P (Q7)} and {P (Q3),P (Q4),P (Q6),P (Q8)} we identify the correspondingtwo sequences (G10) and (G11), respectively. We designate these kind of sequences as closed paths:

P (1, 2) + P (2, 2) = P (1, 1) + P (2, 1) = P (1, 3) + P (3, 3) = P (1, 4) + P (3, 4)= P (5, 1) + P (6, 1) = P (5, 2) + P (6, 2) = P (9, 4) + P (11, 4)= P (9, 3) + P (11, 3),

(G10)

033146-14

Page 15: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

P (9, 2) + P (10, 2) = P (9, 1) + P (10, 1) = P (5, 3) + P (7, 3) = P (5, 4) + P (7, 4)= P (13, 1) + P (14, 1) = P (13, 2) + P (14, 2) = P (13, 4) + P (15, 4)= P (13, 3) + P (15, 3),

(G11)

βˆ‘ac P(a0c|100) = βˆ‘

a P(a00|100) + βˆ‘a P(a01|100) = P (1, 2) + P (2, 2)

= . . . = P (9, 3) + P (11, 3)= βˆ‘

c P(00c|100) + βˆ‘c P(10c|100) = βˆ‘

ac P(a0c|100),(G12)

βˆ‘ac P(a0c|110) = βˆ‘

a P(a00|110) + βˆ‘a P(a01|110) = P (9, 2) + P (10, 2)

= . . . = P (13, 3) + P (15, 3)= βˆ‘

c P(00c|110) + βˆ‘c P(10c|110) = βˆ‘

ac P(a0c|110).(G13)

Notice that the first and last terms in each pair ((G10), (G11)) and ((G12), (G13)) describe the same values.From this observation, it follows that one equality is dependent in {P (Q1),P (Q2),P (Q5),P (Q7)} and similarly one in

{P (Q3),P (Q4),P (Q6),P (Q8)}. This, for the first case, can be schematically represented as

βŽ›βŽœβŽ

⎧βŽͺ⎨βŽͺ⎩

P (1, 1) = P (1, 2)P (2, 1) = P (2, 2)P (9, 3) = P (9, 4)

P (11, 3) = P (11, 4)

⎫βŽͺ⎬βŽͺ⎭ + {P (1, 2) + P (2, 2) = P (9, 3) + P (11, 3)}

⎞⎟⎠

⇓

βŽ›βŽœβŽ

⎧βŽͺ⎨βŽͺ⎩P (1, 2) + P (2, 2) = P (9, 3) + P (11, 3)

P (2, 1) = P (2, 2)P (9, 3) = P (9, 4)

P (11, 3) = P (11, 4)

⎫βŽͺ⎬βŽͺ⎭ β‡’ {P (1, 1) = P (1, 2)}

⎞⎟⎠.

For the second case an analogous reasoning shows the redundancy of one equation. Closed paths (G10) and (G11) are theshortest possible paths in P so there are no more dependent equalities leaving in total 8 + 22 independent conditions for the setof constraints N βˆͺ P .

Now, consider the full set of RC constraints N βˆͺ P βˆͺ RC. Due to the normalization conditions, it follows that each sectorRC(Qi + 1), i ∈ 1, 3, 5, 7, is implied by RC(Qi) giving 12 dependent conditions. Furthermore in each of the remaining sectorsof RC two out of three equalities are implied by P . As an example consider sector RC(Q1), then write

RC(1, 1) = RC(2, 2) ⇔ P (1, 1) + P (3, 1) = P (1, 2) + P (3, 2), (G14)

RC(1, 2) = RC(3, 2) ⇔ P (9, 1) + P (11, 1) = P (9, 2) + P (11, 2). (G15)

In other words two out of three equalities is sector RC(Q1) are implied by sectors P (Q1) and P (Q3). Analogously sectors{P (Q2),P (Q4)}, {P (Q5),P (Q6)}, and {P (Q7),P (Q8)} leave only one independent equation in sectors RC(Q3), RC(Q5), andRC(Q7), respectively. In summary, the RC (3,2,2) polytope is fully described by 34 independent conditions so its dimensionalityis D[RC(3, 2, 2)] = 64 βˆ’ 34 = 30.

Step 3: Computing D[RC(3, m, n)]

We now proceed to compute the dimensionality of the RC polytope in the general (3, m, n) scenario. Like in step 2, we firstconsider the set P . Notice that using normalization conditions we can delete 2(m βˆ’ 1) equations in each of the 2m2 sectors P (Q).To construct closed paths between sectors one needs probabilities that for a given input and output of Bob, sum over all outputsof Alice and Charlie. This, due to normalization that removes, e.g., the last row in each sector, can be done uniquely for n βˆ’ 1outputs and m inputs of Bob for any choice of (m βˆ’ 1)2 combinations of columns for Alice and Charlie. This, in total, gives2m2(m βˆ’ 1) + (n βˆ’ 1)m(m βˆ’ 1)2 dependent equalities and by Eq. (G8), 2m2n2(m βˆ’ 1) + m2n(2 βˆ’ m) + m(1 βˆ’ n) independentequalities.

For the set N βˆͺ P βˆͺ RC normalization conditions together with sectors {RC(Qi), . . . ,RC(Qi + m βˆ’ 1)} imply sectorRC(Qi + m) for i ∈ {l Β· m} with l = {0, 1, . . . , 2 βˆ— (m βˆ’ 1)} leaving 2(n βˆ’ 1)m sectors. By a similar argument to that in the(3,2,2) scenario, in each remaining sector RC(Q) constraints in P imply all sums of probabilities with the same input of Bobleaving only m βˆ’ 1 equations. This gives 2(n βˆ’ 1)m(m βˆ’ 1) independent equalities. Subtracting the total number of independentconditions from (m Β· n)3 gives the dimensionality of RC polytope in the (3, m, n) scenario as

D[RC(3, m, n)] = [m(n βˆ’ 1) + 1]3 + m2(m βˆ’ 1)(n βˆ’ 1)2 βˆ’ 1. (G16)

033146-15

Page 16: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

APPENDIX H: NONTRIVIAL BOUNDS FOR RELATIVISTIC CAUSAL CORRELATIONS

The main contribution of our article is the proof that two eavesdroppers can collaborate to break any device-independentsecurity protocol if they can prepare devices with the strongest correlations allowed by RC theories. The natural assumption thatthe eavesdroppers can choose freely spacetime positions is shown here to be relevant for the proof of the no-go theorem. Thereason is because eavesdroppers must choose necessarily appropriate positions for the measuring devices to reach the strongestcorrelations allowed by RC. In this Appendix we show how a restriction in the spacetime positions of the eavesdroppers couldlimit the device correlations even below the strength of quantum correlations, demonstrating that the selection of the spacetimepositions is crucial for the attack of the eavesdroppers.

We first study trade-off relations between three-party Svetlichny expressions γ€ˆI〉ACD, γ€ˆI〉BCD of the form

γ€ˆI〉ACD + γ€ˆI〉BCD οΏ½ 2B, (H1)

where B is the so-called β€œbroadcast” bound. We remark that the distinguishing feature of RC correlations is the point-to-region(PTR) signaling, described in detail in Appendix B, namely that in certain measurement configurations, a single party can signalto a region thus influencing the correlations between two or more other parties.

Consider a three-party situation with measurement inputs x, y, z and outputs a, b, c for Alice, Bob, and Charlie, respectively.Broadcasting correlations represent the situation when one party sends all the information about its measurement setting andoutcome to the other two parties. In [41,42], it was pointed out that quantum correlations violate broadcasting correlationsand this can be regarded as an alternative notion of genuine multipartite nonlocality. Tripartite broadcasting correlationsP(a, b, c|x, y, z) are defined as follows:

P(a, b, c|x, y, z) =βˆ‘Ξ»1

q(Ξ»1)P(a|x, Ξ»1)P(b|y, x, a, Ξ»1)P(c|z, x, a, Ξ»1)

+βˆ‘Ξ»2

q(Ξ»2)P(b|y, Ξ»2)P(a|x, y, b, Ξ»2)P(c|z, y, b, Ξ»2)

+βˆ‘Ξ»3

q(Ξ»3)P(c|z, Ξ»3)P(b|y, z, c, Ξ»3)P(a|x, z, c, Ξ»3). (H2)

Observe that in the first term, Bob’s output b and Charlie’s output c depend upon Alice’s input and output x, a, in the case whereAlice has broadcast these, and similarly for the other two terms. The following lemma makes a connection between broadcastcorrelations and relativistic causal (RC) correlations, under the constraint that some of the observables are jointly measurable.

Lemma 1. Any RC tripartite probability distribution can be realized by a broadcast model with the additional condition thatall the observables, measured by one party who does not signal PTR, are co-measurable

Proof. Like in Sec. II of the main text, we consider the tripartite spacetime measurement configuration in Fig. 3 where Bobsignals PTR (i.e., to the correlations between A and C) so that the RC constraints are given by the set of equationsβˆ‘

a

P(a, b, c | x, y, z) =βˆ‘

a

P(a, b, c | xβ€², y, z) βˆ€ x, xβ€², y, z, b, c, (H3)

βˆ‘c

P(a, b, c | x, y, z) =βˆ‘

c

P(a, b, c | x, y, zβ€²) βˆ€ z, zβ€², x, y, a, b, (H4)

βˆ‘b,c

P(a, b, c | x, y, z) =βˆ‘b,c

P(a, b, c | x, yβ€², zβ€²) βˆ€ y, yβ€², z, zβ€², x, a, (H5)

βˆ‘a,b

P(a, b, c | x, y, z) =βˆ‘a,b

P(a, b, c | xβ€², yβ€², z) βˆ€ x, xβ€², y, yβ€², z, c. (H6)

From the first two conditions, we also clearly have,βˆ‘a,c

P(a, b, c|x, y, z) =βˆ‘a,c

P(a, b, c|xβ€², y, zβ€²). (H7)

This implies that P(b|x, y, z) = P(b|y) is independent of x, z. Now, any RC tripartite probability distribution can be written as

P(a, b, c|x, y, z) = P(a, c|x, y, z, b)P(b|x, y, z) = P(a, c|x, y, z, b)P(b|y). (H8)

Without loss of generality let us say that all the observables x measured by Alice are co-measurable. Also, let us remember someuseful concepts: a commutation graph is a graph with vertices representing observables, edges connecting observables that arejointly measurable, and a chordal graph is a graph in which all cycles of four or more vertices have a chord going through them.

In our case we can define a commutation graph of all the observables measured by Alice and Charlie conditioned on aparticular pair of Bob’s observable and outcome y, b. In the commutation graph, all pairs x, xβ€² and x, z are connected, so thatthis commutation graph is chordal. For chordal graphs of measurements there corresponds an expression for which a jointprobability distribution exists and which is hence classical [43]. Therefore there exists an overall joint probability distribution of

033146-16

Page 17: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

B A

C

D

AB

C

Dt

x2

x1

x2

x1

FIG. 4. Two perspectives of four parties A, B,C, D in a (2+1)-dimensional spacetime. The four parties make a simultaneous measurementin the particular reference frame of the picture. The measurement events of parties A, B,C form a triangle and party D is in some locationinside the region defined by line BC and line AC (Dave’s region). The correlations then satisfy a tight monogamy relation for any broadcast

inequality, for instance Svetlichny’s inequality [41]: γ€ˆISve〉ACD + γ€ˆISve〉BCD

RCοΏ½ 8.

all x, z conditioned on y, b. By Fine’s theorem [44] we conclude that P(a, c|x, y, z, b) = P(a|x, y, b)P(c|y, z, b). Thus,

P(a, b, c|x, y, z) = P(a|x, y, b)P(c|y, z, b)P(b|y), (H9)

which is a particular form of the broadcast correlations given in (H2) in which q(Ξ»1) = q(Ξ»3) = 0 and Ξ»2 is unique. οΏ½Second, we consider the Bell scenario involving four spatially separated parties Alice (A), Bob (B), Charlie (C), and Dave (D).

Consider any broadcasting inequality γ€ˆI〉ACD between Alice, Charlie, and Dave in which Alice has two measurement settingsx = 0, 1. Assume now that x = 0, 1 are co-measurable; then by Lemma 2,

γ€ˆI〉ACD = γ€ˆI〉a0ACD + γ€ˆI〉a1

ACD οΏ½ B, (H10)

where B is the upper bound on broadcasting correlations (H2), and γ€ˆI〉a0ACD, γ€ˆI〉a1

ACD are the expressions corresponding to x = 0, 1respectively.

Proposition 3. In the four-party scenario if the following two conditions hold,(1) A and B do not signal PTR, and(2) any observable measured by A and any observables measured by B are nondisturbing (or alternatively no party signals

PTR such that it affects the correlations between A and B),then the monogamy relation,

γ€ˆI〉ACD + γ€ˆI〉BCD οΏ½ 2B, (H11)

is satisfied in all theories obeying relativistic causality.Proof. The expression of interest can be written as

γ€ˆI〉ACD + γ€ˆI〉BCD = (γ€ˆI〉a0ACD + γ€ˆI〉b1

BCD

) + (γ€ˆI〉b0BCD + γ€ˆI〉a1

ACD

). (H12)

The terms within each bracket can be interpreted as the same inequality I in which the first party measures x = 0, y = 1 and thesecond measures x = 1, y = 0. Now, any two observables measured by Alice and Bob are nondisturbing and jointly measurablesince no other party signals PTR to influence the correlations between them. Moreover, both the parties do not signal PTR toaffect the correlation of others. Thus, from the above Lemma 2, one concludes that each of the two terms is bounded by itsbroadcasting value within theories obeying relativistic causality, that is, B. Hence, the whole expression is bounded by 2B. οΏ½

An example of a measurement configuration given by the spacetime location of four parties’ measurement events is shownin Fig. 4 where the two conditions given in Proposition 3 hold. This example shows that if eavesdroppers are constrained tospacetime positions like those allowed to Dave, their correlations are bounded by broadcast correlations, which are known to beweaker than quantum correlations [42]. This limitation introduced by the restriction on spacetime positionsβ€”to Dave’s region,for instanceβ€”sets aside the attack of eavesdroppers since the reliable parties (Alice, Bob, and Charlie in the example) couldperform an experiment with quantum correlations they could not reproduce.

033146-17

Page 18: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

Class Probability Condition for RC extremal boxes beyond no-signaling polytope

1 1 abc(1 βŠ• x)(1 βŠ• z) == 112 b(cx βŠ• (a βŠ• xy)z) == 1

2 1 abc(1 βŠ• x)y(1 βŠ• z) == 112 a(c βŠ• cy βŠ• bz) βŠ• bx(c βŠ• z βŠ• yz) == 1

3 14 (1 βŠ• c)xy βŠ• b(c βŠ• y βŠ• yz βŠ• xyz) βŠ• a(c βŠ• y βŠ• z βŠ• bz βŠ• yz βŠ• bcxyz) == 134 abcxyz == 112 ab(1 βŠ• c βŠ• y βŠ• z βŠ• yz βŠ• cxyz) == 1

4 13 ay(c βŠ• z) βŠ• b(1 βŠ• a βŠ• ac βŠ• cx βŠ• xy βŠ• yz βŠ• xyz) == 123 bc((1 βŠ• x)yz βŠ• a(yz βŠ• x(1 βŠ• y βŠ• yz))) == 1

5 15 x βŠ• cx βŠ• y βŠ• cy βŠ• yz βŠ• xyz βŠ• b(c βŠ• x βŠ• cx βŠ• y βŠ• z βŠ• xyz) βŠ• a(1 βŠ• c βŠ• yz βŠ• b(1 βŠ• cy βŠ• z)) == 145 abc(1 βŠ• x)y(1 βŠ• z) == 125 by(cx βŠ• az) == 135 abc(1 βŠ• y) == 1

6 13 (1 βŠ• c)xy βŠ• a(1 βŠ• c βŠ• bc βŠ• bz) βŠ• b(c βŠ• y βŠ• yz βŠ• xyz) == 123 abcxyz == 1

7 14 x(c βŠ• y) βŠ• b(c βŠ• y βŠ• z βŠ• xz) βŠ• a(c βŠ• y βŠ• bz βŠ• bcxyz) == 134 abcxyz == 112 ab(1 βŠ• c βŠ• y βŠ• z βŠ• yz βŠ• cxyz) == 1

8 14 cx βŠ• y βŠ• cy βŠ• xy βŠ• xz βŠ• xyz βŠ• b(c βŠ• y βŠ• xz) βŠ• a(y βŠ• z βŠ• bz βŠ• yz βŠ• c(1 βŠ• b(x βŠ• y)z)) == 134 abc(x βŠ• y)z == 112 ab(1 βŠ• c βŠ• y βŠ• z βŠ• cxz βŠ• yz βŠ• cyz) == 1

9 13 xy(c βŠ• z) βŠ• b(c βŠ• x βŠ• xy βŠ• z βŠ• yz βŠ• xyz) βŠ• a(b(1 βŠ• c) βŠ• y(c βŠ• z)) == 123 abc(x βŠ• xy βŠ• z βŠ• yz βŠ• xyz) == 1

10 13 x(c βŠ• y βŠ• z) βŠ• a(b βŠ• c βŠ• bc βŠ• y βŠ• z) βŠ• b(c βŠ• yz βŠ• x(y βŠ• z βŠ• yz)) == 123 abcx(y βŠ• z) == 1

11 13 cxy βŠ• a(y βŠ• z) βŠ• b(1 βŠ• a βŠ• c βŠ• ac βŠ• y βŠ• z βŠ• xyz) == 123 a(1 βŠ• b)c(1 βŠ• y βŠ• z βŠ• xyz) == 1

12 14 (a βŠ• x)y(c βŠ• z) βŠ• b(1 βŠ• a βŠ• cx βŠ• y βŠ• xz βŠ• acxyz) == 134 abcxyz == 112 bc(1 βŠ• x)y βŠ• ac(1 βŠ• b βŠ• y βŠ• bxyz) == 1

13 13 cx(1 βŠ• y) βŠ• a(c βŠ• yz) βŠ• b(1 βŠ• a(1 βŠ• c) βŠ• yz βŠ• x(1 βŠ• y)(1 βŠ• z)) == 123 (1 βŠ• a)bcyz == 1

14 13 xy(c βŠ• z) βŠ• a(b βŠ• c βŠ• bc βŠ• yz) βŠ• b(c βŠ• x βŠ• xy βŠ• z βŠ• yz βŠ• xyz) == 123 abcxyz == 1

15 13 y βŠ• cy βŠ• b(c βŠ• y βŠ• xz βŠ• xyz) βŠ• a(1 βŠ• c βŠ• b(1 βŠ• c βŠ• z)) == 123 abcy(1 βŠ• z) == 1

16 14 (a βŠ• x)y(c βŠ• z) βŠ• b(1 βŠ• a βŠ• y βŠ• acxyz βŠ• x(1 βŠ• c βŠ• y βŠ• yz)) == 134 abcxyz == 112 bc(1 βŠ• x)y βŠ• ac(1 βŠ• b βŠ• y βŠ• bxyz) == 1

17 15 b(c βŠ• x βŠ• cx βŠ• y βŠ• z βŠ• xyz βŠ• a(1 βŠ• cy βŠ• z)) == 145 a(1 βŠ• b)c(1 βŠ• x)y(1 βŠ• z) == 125 ayz βŠ• b(ay βŠ• (1 βŠ• a)x(1 βŠ• y))z βŠ• cx((1 βŠ• a)bz βŠ• y(1 βŠ• b βŠ• bz βŠ• abz)) == 135 a(1 βŠ• b)c(1 βŠ• y) == 1

18 13 (1 βŠ• c)xy βŠ• a(1 βŠ• c βŠ• bc βŠ• z βŠ• bz βŠ• yz) βŠ• b(c βŠ• y βŠ• yz βŠ• xyz) == 123 abcxyz == 1

19 35 (1 βŠ• a)bc(1 βŠ• y) == 125 (1 βŠ• b)y(1 βŠ• c βŠ• z) βŠ• a(1 βŠ• c βŠ• yz βŠ• b(1 βŠ• c βŠ• cxy βŠ• yz βŠ• cxyz)) == 115 y((b βŠ• x)(c βŠ• z) βŠ• a(c βŠ• bc βŠ• z)) == 1

033146-18

Page 19: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

(Continued.)

Class Probability Condition for RC extremal boxes beyond no-signaling polytope

20 12 (bc βŠ• a(1 βŠ• b βŠ• c))(1 βŠ• y) == 114 y(a βŠ• b βŠ• x(c βŠ• z)) == 1

21 12 (ac βŠ• b(1 βŠ• a βŠ• c))(1 βŠ• y) == 114 y(a βŠ• b βŠ• cx βŠ• bxz) == 1

22 12 b(c βŠ• cy βŠ• xyz βŠ• cxyz) βŠ• a(1 βŠ• c βŠ• y βŠ• cy βŠ• cxyz βŠ• b(1 βŠ• y βŠ• xyz)) == 114 y(a βŠ• b βŠ• c βŠ• cx βŠ• az βŠ• bxz) == 1

23 12 b(1 βŠ• c)xy βŠ• a(cxy(1 βŠ• z) βŠ• b(1 βŠ• c βŠ• cxy βŠ• cxyz)) == 114 c(x βŠ• y) βŠ• b(c βŠ• cx βŠ• z βŠ• yz) βŠ• a(c(1 βŠ• y) βŠ• (b βŠ• y)z) == 1

24 12 (1 βŠ• b)(1 βŠ• c)xy βŠ• a(1 βŠ• c βŠ• b(1 βŠ• c βŠ• cxy βŠ• cxyz)) == 114 cx(1 βŠ• y) βŠ• a(c βŠ• cy βŠ• bz) βŠ• b(c βŠ• cx βŠ• z βŠ• yz) == 1

25 12 xy βŠ• cxy βŠ• bx(c βŠ• y βŠ• cz βŠ• cyz) βŠ• a(1 βŠ• c βŠ• b(1 βŠ• c βŠ• cx βŠ• cxz)) == 114 b(c(1 βŠ• x) βŠ• (a βŠ• x βŠ• y)z) == 1

26 14 cxy βŠ• b(1 βŠ• c βŠ• y βŠ• a(1 βŠ• c βŠ• cy)) βŠ• ay(1 βŠ• z) == 134 a(1 βŠ• b)c(1 βŠ• y) == 112 acy((1 βŠ• x)z βŠ• b(x βŠ• z)) == 1

27 13 xy(c βŠ• z) βŠ• a(b βŠ• c βŠ• bc βŠ• z) βŠ• b(c βŠ• y(1 βŠ• x βŠ• z)) == 123 abcxyz == 1

28 14 y βŠ• cy βŠ• a(1 βŠ• c βŠ• bz βŠ• bcxyz) βŠ• b(yz βŠ• x(1 βŠ• c βŠ• z)) == 134 abcxyz == 112 bc(1 βŠ• a βŠ• x βŠ• y βŠ• xy βŠ• axyz) == 1

29 13 a(1 βŠ• b βŠ• c βŠ• bc βŠ• y) βŠ• y(b βŠ• cx βŠ• bxz) == 123 (1 βŠ• a)bc(1 βŠ• y) == 1

30 13 xy(c βŠ• z) βŠ• a(b βŠ• c βŠ• bc βŠ• z) βŠ• b(c βŠ• x βŠ• y βŠ• xz βŠ• yz βŠ• xyz) == 123 abcxyz == 1

31 14 c βŠ• bx βŠ• bcx βŠ• y βŠ• bxy βŠ• z βŠ• bz βŠ• a(1 βŠ• c βŠ• y βŠ• z βŠ• bz βŠ• bcxyz) == 034 abcxyz == 112 a(by(1 βŠ• z) βŠ• c(1 βŠ• b βŠ• y βŠ• bxyz)) == 1

32 13 cx(1 βŠ• y) βŠ• b(c βŠ• y) βŠ• a(b βŠ• c βŠ• bc βŠ• cy) == 123 a(1 βŠ• b)cy == 1

33 13 cx(1 βŠ• y) βŠ• a(c βŠ• yz) βŠ• b(1 βŠ• a βŠ• ac βŠ• yz) == 123 (1 βŠ• a)bcyz == 1

34 35 a(1 βŠ• b)y(c βŠ• z) == 125 bx(c βŠ• cy βŠ• z βŠ• yz βŠ• cyz) βŠ• a(b(1 βŠ• y)z βŠ• c(1 βŠ• y βŠ• bxyz)) == 115 b(1 βŠ• c βŠ• x βŠ• cx βŠ• y βŠ• xyz βŠ• a(1 βŠ• c βŠ• cy βŠ• yz)) == 1

35 12 b(1 βŠ• x)(c βŠ• y βŠ• yz βŠ• cyz) βŠ• a(cy βŠ• b(1 βŠ• z βŠ• cz βŠ• x(1 βŠ• c βŠ• z βŠ• cyz))) == 114 b((a βŠ• y)z βŠ• x(1 βŠ• c βŠ• acz βŠ• acyz)) == 134 abcx(1 βŠ• y)z == 1

36 12 (1 βŠ• a)cy βŠ• b((1 βŠ• a βŠ• y βŠ• axy)z βŠ• c(1 βŠ• a βŠ• ayz βŠ• axyz)) == 114 bxy βŠ• cx(1 βŠ• b βŠ• y) βŠ• a(b βŠ• c βŠ• cy βŠ• bz) == 1

37 12 b(1 βŠ• x)(y βŠ• c(1 βŠ• z βŠ• yz)) βŠ• a((1 βŠ• c)(1 βŠ• y) βŠ• b(1 βŠ• xyz βŠ• c(y βŠ• z βŠ• yz βŠ• x(1 βŠ• y βŠ• z)))) == 114 c(a βŠ• x)y βŠ• b((1 βŠ• a βŠ• y βŠ• axy)z βŠ• c(x βŠ• axyz)) == 134 ab(1 βŠ• c)xyz == 1

38 12 bcx(y βŠ• z) βŠ• a((1 βŠ• b βŠ• y βŠ• bxy)z βŠ• c(1 βŠ• b βŠ• y βŠ• bxz)) == 114 a(b βŠ• cy βŠ• bz) βŠ• b(c βŠ• x βŠ• cx βŠ• y βŠ• xz βŠ• yz βŠ• xyz) == 1

39 12 bx(c βŠ• y)z βŠ• a((1 βŠ• b βŠ• y)z βŠ• c(1 βŠ• b βŠ• y βŠ• bxy βŠ• bxz)) == 114 a(b βŠ• cy βŠ• bz) βŠ• b(c(1 βŠ• x) βŠ• (x βŠ• y βŠ• xy)(1 βŠ• z)) == 1

40 12 c(a βŠ• x)y βŠ• b((a βŠ• x βŠ• ay βŠ• xy βŠ• axy)z βŠ• c(a(y βŠ• z βŠ• yz) βŠ• x(1 βŠ• a(1 βŠ• y βŠ• z)))) == 114 a(b βŠ• c βŠ• cy βŠ• bz) βŠ• b(1 βŠ• x)(c βŠ• yz) == 1

033146-19

Page 20: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

(Continued.)

Class Probability Condition for RC extremal boxes beyond no-signaling polytope

41 12 b(1 βŠ• x)(c βŠ• y βŠ• yz) βŠ• a(c(1 βŠ• x)y(1 βŠ• z) βŠ• b(1 βŠ• z βŠ• c(x βŠ• z βŠ• xyz))) == 114 cxy βŠ• ayz βŠ• b((a βŠ• x βŠ• xy)z βŠ• cx(1 βŠ• a(1 βŠ• y)z)) == 134 abcx(1 βŠ• y)z == 1

42 12 b(1 βŠ• c)x(1 βŠ• y)z βŠ• a(b(x βŠ• y βŠ• xy)z βŠ• c(1 βŠ• b βŠ• y βŠ• bxy βŠ• bxz)) == 114 cxy βŠ• a(b βŠ• cy βŠ• bz) βŠ• b(c βŠ• x βŠ• cx βŠ• y βŠ• z βŠ• xyz) == 1

43 12 b(1 βŠ• x)(c βŠ• y βŠ• yz βŠ• cyz) βŠ• a(cy βŠ• b((1 βŠ• xy)(1 βŠ• z) βŠ• c(x βŠ• z βŠ• xyz))) == 114 b((a βŠ• y)z βŠ• x(y βŠ• z βŠ• yz) βŠ• cx(1 βŠ• a(1 βŠ• y)z)) == 134 abcx(1 βŠ• y)z == 1

44 13 cx βŠ• y βŠ• cy βŠ• xy βŠ• xz βŠ• yz βŠ• a(b βŠ• c βŠ• bc βŠ• y βŠ• z) βŠ• b(c βŠ• xz βŠ• y(1 βŠ• x βŠ• z)) == 123 abc(xz βŠ• y(1 βŠ• x βŠ• z)) == 1

45 13 xy(c βŠ• z) βŠ• a(1 βŠ• b βŠ• c βŠ• bc βŠ• y βŠ• z) βŠ• b(c βŠ• y(1 βŠ• x βŠ• z)) == 123 abcxyz == 1

46 13 y(c βŠ• z) βŠ• a(c βŠ• yz) βŠ• b(1 βŠ• a βŠ• ac βŠ• cx βŠ• y βŠ• xz βŠ• yz βŠ• xyz) == 123 abcxyz == 1

47 12 bcxyz βŠ• a(y(c βŠ• z) βŠ• b(yz βŠ• c(1 βŠ• z βŠ• yz βŠ• x(1 βŠ• y βŠ• z)))) == 114 c(1 βŠ• b βŠ• bx βŠ• y) βŠ• a(1 βŠ• b βŠ• y βŠ• bz) βŠ• x(by βŠ• z βŠ• yz βŠ• byz) == 1

48 12 b(1 βŠ• c)x(1 βŠ• y)z βŠ• a(bx(1 βŠ• y)z βŠ• c(1 βŠ• yz βŠ• xy(1 βŠ• z) βŠ• b(1 βŠ• yz βŠ• x(y βŠ• z)))) == 114 cxy βŠ• a(b βŠ• bz βŠ• yz) βŠ• b(c βŠ• x βŠ• cx βŠ• y βŠ• z βŠ• xyz) == 1

49 12 ac(xz βŠ• y(1 βŠ• x βŠ• z)) βŠ• b(acxz βŠ• y((1 βŠ• x)(1 βŠ• c βŠ• z) βŠ• a(1 βŠ• z βŠ• c(x βŠ• z)))) == 114 c(1 βŠ• x βŠ• bx βŠ• y) βŠ• bx(1 βŠ• y)z βŠ• a(1 βŠ• y βŠ• z βŠ• bz) == 1

50 12 bc(1 βŠ• x)yz βŠ• a(y(c βŠ• z) βŠ• b(yz βŠ• c(x βŠ• y βŠ• xy βŠ• xz βŠ• yz))) == 114 by βŠ• bxy βŠ• c(1 βŠ• bx βŠ• y) βŠ• bz βŠ• xz βŠ• xyz βŠ• bxyz βŠ• a(1 βŠ• b βŠ• y βŠ• bz) == 1

51 12 bcxy βŠ• a((1 βŠ• c)xyz βŠ• b(xyz βŠ• c(1 βŠ• z βŠ• yz βŠ• x(1 βŠ• y βŠ• z)))) == 114 c(1 βŠ• b βŠ• bx βŠ• xy) βŠ• (1 βŠ• b βŠ• x βŠ• bxy)z βŠ• a(1 βŠ• b βŠ• bz βŠ• yz) == 1

52 12 bcx(1 βŠ• y)z βŠ• a((1 βŠ• b)(1 βŠ• y)z βŠ• c(1 βŠ• y βŠ• b(1 βŠ• yz βŠ• x(y βŠ• z)))) == 114 y βŠ• cy βŠ• xyz βŠ• a(b βŠ• y βŠ• bz) βŠ• b(c(1 βŠ• x) βŠ• y βŠ• x(1 βŠ• y)(1 βŠ• z)) == 1

53 13 (1 βŠ• c)xy βŠ• a(1 βŠ• c βŠ• b(1 βŠ• c βŠ• z)) βŠ• b(c βŠ• yz βŠ• x(y βŠ• z)) == 123 abcxy(1 βŠ• z) == 1

54 23 ac(1 βŠ• y βŠ• b(1 βŠ• y βŠ• yz βŠ• xyz)) == 113 bx(1 βŠ• c βŠ• y) βŠ• a(b(1 βŠ• c) βŠ• y(c βŠ• z)) == 1

55 23 ac(1 βŠ• y βŠ• b(1 βŠ• y βŠ• xyz)) == 113 (a βŠ• x)y(c βŠ• z) βŠ• b(1 βŠ• a βŠ• c βŠ• ac βŠ• y βŠ• xyz) == 1

56 12 c(1 βŠ• x)y βŠ• a(b βŠ• cy) βŠ• b(c βŠ• xy) == 1

57 12 bx(c βŠ• y) βŠ• a(b βŠ• cy) == 1

58 12 b(c βŠ• yz) βŠ• a(1 βŠ• b βŠ• c βŠ• yz) == 1

59 12 bx(1 βŠ• c βŠ• y) βŠ• a(b βŠ• c βŠ• y) == 1

60 13 xy(c βŠ• z) βŠ• a(b βŠ• c βŠ• bc βŠ• yz) βŠ• b(c βŠ• xyz) == 123 abcxyz == 1

61 13 ay(c βŠ• z) βŠ• b(1 βŠ• a βŠ• ac βŠ• cx βŠ• xy βŠ• z βŠ• xz) == 123 bc((1 βŠ• x)z βŠ• a(z βŠ• x(1 βŠ• y βŠ• z))) == 1

62 13 x(1 βŠ• y)(c βŠ• z) βŠ• a(b(1 βŠ• c) βŠ• (1 βŠ• y)(c βŠ• z)) βŠ• b(c βŠ• yz βŠ• x(y βŠ• z)) == 123 abc(yz βŠ• x(y βŠ• z)) == 1

63 13 (1 βŠ• c)xy βŠ• a(1 βŠ• c βŠ• bc βŠ• z βŠ• bz βŠ• yz) βŠ• b(c βŠ• y βŠ• xz βŠ• yz) == 123 abcxyz == 1

64 13 xy(c βŠ• z) βŠ• a(b βŠ• c βŠ• bc βŠ• yz) βŠ• b(c βŠ• x βŠ• xy βŠ• z βŠ• xz βŠ• yz) == 123 abcxyz == 1

65 13 (a βŠ• x)y(c βŠ• z) βŠ• b(1 βŠ• a βŠ• c βŠ• ac βŠ• y βŠ• xyz) == 123 abc(1 βŠ• y βŠ• xyz) == 1

033146-20

Page 21: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

(Continued.)

Class Probability Condition for RC extremal boxes beyond no-signaling polytope

66 13 xy(c βŠ• z) βŠ• a(b βŠ• c βŠ• bc βŠ• yz) βŠ• b(c βŠ• x(1 βŠ• y βŠ• z)) == 123 abcxyz == 1

67 13 (a βŠ• x)y(c βŠ• z) βŠ• b(1 βŠ• a βŠ• c βŠ• ac βŠ• y βŠ• xz) == 123 abc(1 βŠ• y βŠ• xz) == 1

68 13 xy(c βŠ• z) βŠ• b(1 βŠ• a βŠ• c βŠ• ac βŠ• y βŠ• xz) βŠ• a(c βŠ• yz) == 123 abcxyz == 1

69 13 (1 βŠ• c)xy βŠ• a(1 βŠ• c βŠ• bc βŠ• z βŠ• bz βŠ• yz) βŠ• b(c βŠ• x βŠ• y βŠ• xy βŠ• xz βŠ• yz) == 123 abcxyz == 1

70 12 a(b βŠ• c βŠ• cy) βŠ• bx(1 βŠ• c βŠ• yz) == 1

71 12 bx(1 βŠ• c βŠ• yz) βŠ• a(b βŠ• c βŠ• yz) == 1

72 12 bx(c βŠ• yz) βŠ• a(c βŠ• (1 βŠ• b βŠ• y)z) == 1

73 12 cy βŠ• a(b βŠ• cy) βŠ• b(c βŠ• x(1 βŠ• y)z) == 1

74 12 a(b βŠ• cy) βŠ• b(c βŠ• y βŠ• xz βŠ• xyz) == 1

75 12 ac(1 βŠ• y) βŠ• b(1 βŠ• a βŠ• c βŠ• xy βŠ• yz) == 1

76 12 xy(c βŠ• z) βŠ• a(c βŠ• yz) βŠ• b(1 βŠ• a βŠ• c βŠ• xy βŠ• yz) == 1

77 12 b(c βŠ• y) βŠ• a(1 βŠ• b βŠ• c βŠ• y) == 1

78 12 b(c βŠ• y) βŠ• a(b βŠ• cy) == 1

79 12 a(cxyz βŠ• b(1 βŠ• y βŠ• xyz)) βŠ• b(x(1 βŠ• y βŠ• z) βŠ• c(1 βŠ• y βŠ• xyz)) == 114 y(a βŠ• b βŠ• c βŠ• cx βŠ• az βŠ• bxz) == 1

80 12 b(c βŠ• cy βŠ• xz βŠ• cxyz) βŠ• a(cxyz βŠ• b(1 βŠ• y βŠ• xyz)) == 114 y(a βŠ• b βŠ• c βŠ• cx βŠ• az βŠ• bxz) == 1

81 12 b(c βŠ• cy βŠ• xyz βŠ• cxyz) βŠ• a(cxyz βŠ• b(1 βŠ• y βŠ• xyz)) == 114 y(a βŠ• b βŠ• c βŠ• cx βŠ• az βŠ• bxz) == 1

82 13 bx(1 βŠ• c βŠ• y) βŠ• a(b(1 βŠ• c) βŠ• y(c βŠ• z)) == 123 abc(1 βŠ• y(1 βŠ• z βŠ• xz)) == 1

83 12 b(a βŠ• c βŠ• y(x βŠ• z)) == 1

84 12 b(a βŠ• c βŠ• y βŠ• xyz) == 1

85 12 b(a βŠ• c βŠ• xy βŠ• xz βŠ• yz) == 1

86 12 b(a βŠ• c βŠ• (x βŠ• y)z) == 1

87 12 b(a βŠ• c βŠ• yz) == 1

88 12 b(a βŠ• c βŠ• y βŠ• xz) == 1

89 12 b(a βŠ• c βŠ• y) == 1

90 12 b(a βŠ• c βŠ• xyz) == 1

91 23 ab(1 βŠ• c)(1 βŠ• y) == 113 ay(c βŠ• z) βŠ• b(c βŠ• ac βŠ• y βŠ• xyz) == 1

92 23 abcy == 113 cx(1 βŠ• y) βŠ• b(c βŠ• y) βŠ• a(b βŠ• c βŠ• bc βŠ• cy) == 1

93 12 b(a βŠ• x(c βŠ• yz)) == 1

94 12 b(a βŠ• x(c βŠ• y)) == 1

95 12 b(1 βŠ• y)(a βŠ• c βŠ• xz) == 114 y(a βŠ• b βŠ• cx βŠ• bxz) == 1

96 12 b(1 βŠ• y)(a βŠ• c βŠ• xz) == 114 y(a βŠ• b βŠ• c βŠ• az) == 1

97 12 b(1 βŠ• y)(a βŠ• c βŠ• xz) == 114 y(1 βŠ• b βŠ• c βŠ• az βŠ• bxz) == 1

98 12 b(1 βŠ• y)(a βŠ• c βŠ• xz) == 114 (a βŠ• b βŠ• cx)y == 1

033146-21

Page 22: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

(Continued.)

Class Probability Condition for RC extremal boxes beyond no-signaling polytope

99 23 abcy(x βŠ• z βŠ• xz) == 113 b(c βŠ• x βŠ• xz βŠ• yz) βŠ• a(b(1 βŠ• c) βŠ• (1 βŠ• y)(c βŠ• z)) == 1

100 23 abcy(1 βŠ• xz) == 113 a(b(1 βŠ• c) βŠ• (1 βŠ• y)(c βŠ• z)) βŠ• b(c βŠ• y βŠ• x(1 βŠ• y βŠ• z)) == 1

101 12 b(a βŠ• c)(1 βŠ• y) == 114 y(b βŠ• c βŠ• (a βŠ• x)z) == 1

102 12 b(a βŠ• c)(1 βŠ• y) == 114 y(a βŠ• b βŠ• x βŠ• cx βŠ• bxz) == 1

103 23 abcy(1 βŠ• xz) == 113 b(c βŠ• y βŠ• xz) βŠ• a(b(1 βŠ• c) βŠ• (1 βŠ• y)(1 βŠ• c βŠ• z)) == 1

104 34 abc(1 βŠ• y) == 114 c(1 βŠ• x)y βŠ• b(1 βŠ• c βŠ• y βŠ• a(1 βŠ• c βŠ• cy)) βŠ• ayz == 112 acy(bz βŠ• x(1 βŠ• b βŠ• z)) == 1

105 23 abcy(1 βŠ• xz) == 113 cx(1 βŠ• y) βŠ• a(b βŠ• c βŠ• bc βŠ• cy) βŠ• b(c βŠ• y βŠ• xyz) == 1

106 35 ab(1 βŠ• c)(1 βŠ• y) == 125 ac(1 βŠ• x)yz βŠ• b((1 βŠ• a βŠ• x)y βŠ• c(1 βŠ• a βŠ• xy βŠ• ayz βŠ• axyz)) == 115 xy(1 βŠ• b βŠ• c βŠ• z) βŠ• ay(1 βŠ• b βŠ• bc βŠ• z) == 1

107 23 abcy(1 βŠ• xz) == 113 cx(1 βŠ• y) βŠ• a(1 βŠ• b βŠ• bc βŠ• y) βŠ• b(c βŠ• y βŠ• xyz) == 1

108 23 abc(1 βŠ• y)(1 βŠ• xz) == 113 c(a βŠ• x)y βŠ• b(1 βŠ• a βŠ• c βŠ• ac βŠ• xy βŠ• xz βŠ• yz) == 1

109 13 a(1 βŠ• c βŠ• bc βŠ• yz) βŠ• b(c βŠ• z βŠ• x(y βŠ• z)) == 1

110 13 a(1 βŠ• c βŠ• bc βŠ• yz) βŠ• b(c βŠ• yz βŠ• x(y βŠ• z)) == 1

111 13 a(1 βŠ• c βŠ• bc βŠ• yz) βŠ• b(c βŠ• x βŠ• xz βŠ• yz) == 1

112 13 a(b βŠ• c βŠ• bc) βŠ• cxy βŠ• b(c βŠ• (x βŠ• y)z) == 1

113 13 a(b βŠ• c βŠ• bc βŠ• y βŠ• yz) βŠ• b(c βŠ• (x βŠ• y)z) == 1

114 13 b(c βŠ• y βŠ• xz) βŠ• a(1 βŠ• c βŠ• bc βŠ• y βŠ• yz) == 1

115 13 a(b βŠ• c βŠ• bc) βŠ• cxy βŠ• b(c βŠ• yz βŠ• x(1 βŠ• y βŠ• z)) == 1

116 13 b(c βŠ• x βŠ• xy) βŠ• a(b βŠ• c βŠ• bc βŠ• yz) == 1

117 13 a(1 βŠ• c βŠ• bc βŠ• yz) βŠ• b(c βŠ• x βŠ• y βŠ• xyz) == 1

118 13 a(1 βŠ• c βŠ• bc βŠ• y βŠ• yz) βŠ• b(c βŠ• y βŠ• z βŠ• xyz) == 1

119 13 a(1 βŠ• c βŠ• bc βŠ• y βŠ• yz) βŠ• b(c βŠ• y βŠ• xz βŠ• xyz) == 1

120 13 a(1 βŠ• c βŠ• bc βŠ• yz) βŠ• b(c βŠ• y βŠ• xz βŠ• xyz) == 1

121 13 a(b βŠ• c βŠ• bc βŠ• z βŠ• yz) βŠ• b(c βŠ• y(x βŠ• z)) == 1

122 13 a(b βŠ• c βŠ• bc) βŠ• cxy βŠ• b(c βŠ• x βŠ• y βŠ• z βŠ• xyz) == 1

123 12 b(1 βŠ• c)(a βŠ• xy) == 114 cx(1 βŠ• y) βŠ• b(c βŠ• cx βŠ• z βŠ• yz) βŠ• a(c βŠ• (b βŠ• y)z) == 1

124 12 b(1 βŠ• a βŠ• x)(c βŠ• yz) == 114 bx(c βŠ• y βŠ• z) βŠ• a(1 βŠ• b βŠ• c βŠ• y βŠ• bz) == 1

125 13 a(b βŠ• c βŠ• bc) βŠ• cx(1 βŠ• y) βŠ• b(c βŠ• xyz) == 1

126 13 a(b βŠ• c βŠ• bc βŠ• y βŠ• yz) βŠ• b(c βŠ• x(1 βŠ• y)z) == 1

127 13 a(b βŠ• c βŠ• bc) βŠ• cxy βŠ• b(c βŠ• (1 βŠ• x)yz) == 1

128 12 bc(1 βŠ• a βŠ• xy) == 114 xy(b βŠ• c βŠ• z) βŠ• a(b βŠ• c βŠ• yz) == 1

129 12 b(1 βŠ• c βŠ• y βŠ• cyz βŠ• a(1 βŠ• xy βŠ• c(1 βŠ• y(1 βŠ• x βŠ• z)))) == 114 b(y(x βŠ• z) βŠ• c(x βŠ• xyz)) βŠ• a((1 βŠ• b βŠ• y βŠ• bxy)z βŠ• c(1 βŠ• y βŠ• bxyz)) == 134 (1 βŠ• a)b(1 βŠ• c)xyz == 1

033146-22

Page 23: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

(Continued.)

Class Probability Condition for RC extremal boxes beyond no-signaling polytope

130 12 b((1 βŠ• a)(1 βŠ• x)yz βŠ• c(1 βŠ• a βŠ• x βŠ• axy βŠ• ayz)) == 114 bx(c βŠ• y βŠ• z βŠ• yz) βŠ• a((1 βŠ• c)(1 βŠ• y) βŠ• b(1 βŠ• cxy)(1 βŠ• z)) == 134 abcxy(1 βŠ• z) == 1

131 12 b((1 βŠ• a βŠ• x)yz βŠ• c(1 βŠ• a βŠ• x βŠ• axy βŠ• ayz)) == 114 bx(c βŠ• y βŠ• z) βŠ• a((1 βŠ• c)(1 βŠ• y) βŠ• b(1 βŠ• cxy)(1 βŠ• z)) == 134 abcxy(1 βŠ• z) == 1

132 12 bc(1 βŠ• a βŠ• x βŠ• y βŠ• ay βŠ• xy βŠ• axyz) == 114 a(1 βŠ• c βŠ• cy βŠ• bz) βŠ• y(c βŠ• z βŠ• xz) βŠ• b(y βŠ• x(1 βŠ• c βŠ• z βŠ• yz)) == 1

133 12 (1 βŠ• a)bc(1 βŠ• y βŠ• xyz) == 114 y(c βŠ• x βŠ• xz) βŠ• a(1 βŠ• c βŠ• cy βŠ• z βŠ• bz βŠ• yz) βŠ• b(x βŠ• cx βŠ• y βŠ• yz βŠ• xyz) == 1

134 12 ab((x βŠ• y βŠ• xy)z βŠ• c(y βŠ• xz βŠ• xyz)) == 114 a βŠ• c βŠ• bcx βŠ• y βŠ• acy βŠ• bxy βŠ• bz βŠ• abz βŠ• xz βŠ• xyz βŠ• bxyz == 1

135 12 abc(y βŠ• xz βŠ• xyz) == 114 a βŠ• c βŠ• bcx βŠ• y βŠ• acy βŠ• bxy βŠ• abz βŠ• xz βŠ• bxz βŠ• yz βŠ• ayz βŠ• byz βŠ• xyz βŠ• bxyz == 1

136 13 cxy βŠ• a(b βŠ• bc βŠ• cy) βŠ• b(c βŠ• x βŠ• y βŠ• yz βŠ• xyz) == 123 abcx(1 βŠ• y) == 1

137 13 a(1 βŠ• c βŠ• bc βŠ• y βŠ• bz) βŠ• b(c βŠ• y βŠ• xyz) == 1

138 13 (1 βŠ• c)xy βŠ• a(1 βŠ• c(1 βŠ• b βŠ• y) βŠ• bz) βŠ• b(c βŠ• y βŠ• yz βŠ• xyz) == 1

139 13 b(c βŠ• x βŠ• y βŠ• yz βŠ• xyz) βŠ• a(b(1 βŠ• c) βŠ• y(c βŠ• z)) == 123 abcx(1 βŠ• y) == 1

140 14 a(c βŠ• cy βŠ• bz) βŠ• b(c βŠ• y βŠ• z βŠ• xyz) == 112 a(y(c βŠ• z) βŠ• b(1 βŠ• c βŠ• y βŠ• yz)) == 1

141 13 b(c βŠ• xy) βŠ• a(b(1 βŠ• c) βŠ• (1 βŠ• y)(c βŠ• z)) == 123 abcxy == 1

142 14 b(c βŠ• x βŠ• cx βŠ• y βŠ• z βŠ• xz) βŠ• a(b βŠ• y(c βŠ• z)) == 112 bcxy βŠ• ac(1 βŠ• b βŠ• y) == 1

143 13 b(c βŠ• x βŠ• y βŠ• z βŠ• xyz) βŠ• a(b(1 βŠ• c) βŠ• y(c βŠ• z)) == 123 abc(1 βŠ• y)(x βŠ• z) == 1

144 14 b(a βŠ• c βŠ• x βŠ• cx βŠ• y βŠ• z βŠ• xz) == 112 (1 βŠ• b)c(a βŠ• xy) == 1

145 14 b(a βŠ• c βŠ• x βŠ• cx βŠ• y βŠ• yz βŠ• xyz) == 112 (1 βŠ• b)c(a βŠ• xy) == 1

146 13 c(1 βŠ• x)y βŠ• b(c βŠ• xy) βŠ• a(b βŠ• c βŠ• bc βŠ• z βŠ• yz) == 1

147 12 b(1 βŠ• c)(xy βŠ• a(1 βŠ• (1 βŠ• x)yz)) == 114 cx(1 βŠ• y) βŠ• b(c βŠ• cx βŠ• z βŠ• xyz) βŠ• a(c βŠ• (b βŠ• y)z) == 1

148 12 bc(a βŠ• x βŠ• xy βŠ• ayz βŠ• axyz) == 114 xy(c βŠ• z) βŠ• a(1 βŠ• b βŠ• c βŠ• y βŠ• bz βŠ• yz) βŠ• b(c βŠ• cx βŠ• y βŠ• z βŠ• xz βŠ• xyz) == 1

149 12 bc(a βŠ• x βŠ• xy βŠ• axyz) == 114 xy(c βŠ• z) βŠ• a(1 βŠ• b βŠ• c βŠ• y βŠ• bz βŠ• yz) βŠ• b(c βŠ• cx βŠ• y βŠ• z βŠ• xz βŠ• yz βŠ• xyz) == 1

150 12 b(1 βŠ• c)(a βŠ• axyz βŠ• xy(1 βŠ• z)) == 114 cx(1 βŠ• y) βŠ• b(c βŠ• cx βŠ• z βŠ• yz βŠ• xyz) βŠ• a(c βŠ• (b βŠ• y)z) == 1

151 12 bc(1 βŠ• a βŠ• y βŠ• xy βŠ• ayz βŠ• axyz) == 114 y(1 βŠ• c βŠ• z) βŠ• a(1 βŠ• c βŠ• z βŠ• bz) βŠ• bx(1 βŠ• c βŠ• yz) == 1

152 12 bc(1 βŠ• a βŠ• x βŠ• y βŠ• ay βŠ• xy βŠ• axyz) == 114 a(1 βŠ• c βŠ• cy βŠ• bz) βŠ• y(1 βŠ• c βŠ• z βŠ• xz) βŠ• bx(1 βŠ• c βŠ• z βŠ• yz) == 1

153 12 b((1 βŠ• a βŠ• x)yz βŠ• c(1 βŠ• a βŠ• x βŠ• axy βŠ• axyz)) == 114 a(1 βŠ• b βŠ• c βŠ• y βŠ• bz) βŠ• bx(c βŠ• z βŠ• yz) == 1

033146-23

Page 24: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

(Continued.)

Class Probability Condition for RC extremal boxes beyond no-signaling polytope

154 12 bc((1 βŠ• x)(1 βŠ• y) βŠ• a(1 βŠ• y βŠ• xy βŠ• xyz)) == 114 cy βŠ• xyz βŠ• a(1 βŠ• b βŠ• c βŠ• cy βŠ• bz) βŠ• b(cx βŠ• (x βŠ• y βŠ• xy)z) == 1

155 12 ab(1 βŠ• c βŠ• y βŠ• cxy βŠ• yz βŠ• cxyz) == 114 x(c βŠ• y) βŠ• a(c βŠ• y βŠ• bz) βŠ• b(c βŠ• cx βŠ• y βŠ• z βŠ• xyz) == 1

156 12 bc(1 βŠ• a βŠ• x βŠ• y βŠ• ay βŠ• xy βŠ• axyz) == 114 cy βŠ• xyz βŠ• a(1 βŠ• c βŠ• cy βŠ• bz) βŠ• b(y(1 βŠ• z) βŠ• x(1 βŠ• c βŠ• z βŠ• yz)) == 1

157 12 ac(bxz βŠ• y(1 βŠ• b βŠ• bxz)) == 114 a βŠ• c βŠ• x βŠ• bx βŠ• bcx βŠ• y βŠ• acy βŠ• cxy βŠ• abz βŠ• xz βŠ• bxz βŠ• byz βŠ• xyz βŠ• bxyz == 1

158 13 cxy βŠ• a(b βŠ• c βŠ• bc βŠ• z βŠ• yz) βŠ• b(c βŠ• yz βŠ• x(1 βŠ• y βŠ• z)) == 1

159 13 c(a βŠ• y) βŠ• b(1 βŠ• a βŠ• ac βŠ• cx βŠ• xy βŠ• xz βŠ• yz) == 1

160 12 bc(1 βŠ• a βŠ• y βŠ• axy βŠ• xyz βŠ• axyz) == 114 y(b βŠ• c βŠ• cx βŠ• bxz) βŠ• a(b βŠ• c βŠ• z βŠ• yz) == 1

161 12 bc(1 βŠ• a βŠ• y βŠ• xy βŠ• xyz βŠ• axyz) == 114 y(b βŠ• c βŠ• bx βŠ• cx βŠ• bxz) βŠ• a(b βŠ• c βŠ• z βŠ• yz) == 1

162 12 bc(1 βŠ• a βŠ• xy βŠ• axy βŠ• axyz) == 114 xy(c βŠ• bz) βŠ• a(b βŠ• c βŠ• z βŠ• yz) == 1

163 12 bc(1 βŠ• a βŠ• xy βŠ• axyz) == 114 xy(b βŠ• c βŠ• bz) βŠ• a(b βŠ• c βŠ• z βŠ• yz) == 1

164 12 ab(1 βŠ• c βŠ• y βŠ• yz βŠ• xyz βŠ• cxyz) == 114 x(c βŠ• y) βŠ• a(c βŠ• y βŠ• bz) βŠ• b(c βŠ• cx βŠ• y βŠ• xy βŠ• z βŠ• xyz) == 1

165 12 ab(1 βŠ• c βŠ• cxy βŠ• z βŠ• cyz) βŠ• bx(1 βŠ• c βŠ• y βŠ• z βŠ• yz βŠ• cyz) == 114 b(c βŠ• cx βŠ• yz) βŠ• a((1 βŠ• b βŠ• y)z βŠ• c(1 βŠ• y βŠ• byz βŠ• bxyz)) == 134 abc(1 βŠ• x)yz == 1

166 35 bc(a βŠ• x)(1 βŠ• y) == 115 a(1 βŠ• b βŠ• c βŠ• y βŠ• cy βŠ• bcy βŠ• bz) βŠ• b(c βŠ• cx βŠ• y βŠ• cxy βŠ• z βŠ• xz βŠ• xyz) == 125 bxy(c βŠ• z) βŠ• ay(c βŠ• bz) == 1

167 35 abc(1 βŠ• y) == 115 (1 βŠ• c)x(1 βŠ• y) βŠ• a(1 βŠ• b βŠ• c βŠ• y βŠ• cy βŠ• bcy βŠ• bz) βŠ• b(c βŠ• x βŠ• cx βŠ• y βŠ• z βŠ• xyz) == 125 bcxy βŠ• ay(c βŠ• z βŠ• bz) == 1

168 25 ay(1 βŠ• c βŠ• z) βŠ• b((1 βŠ• y)(1 βŠ• xz) βŠ• c(1 βŠ• yz βŠ• xy(1 βŠ• z)) βŠ• a(1 βŠ• yz βŠ• c(1 βŠ• xz βŠ• y(1 βŠ• x βŠ• z)))) == 115 y(cx βŠ• (b βŠ• x)z) βŠ• a(yz βŠ• c(y βŠ• by βŠ• bxz βŠ• bxyz)) == 135 abc(1 βŠ• y)(1 βŠ• xz) == 1

169 25 (1 βŠ• a)cxy(1 βŠ• z) βŠ• b((1 βŠ• y)(1 βŠ• xz) βŠ• a(1 βŠ• c βŠ• cxy βŠ• cxz βŠ• yz) βŠ• c(1 βŠ• y βŠ• xy βŠ• xyz)) == 115 (a βŠ• b βŠ• x)yz βŠ• c(abxz βŠ• y(1 βŠ• ab βŠ• x βŠ• abxz)) == 135 abc(1 βŠ• y)(1 βŠ• xz) == 1

170 25 c(a βŠ• x)y βŠ• b(1 βŠ• c βŠ• y βŠ• cy βŠ• cxy βŠ• xz βŠ• xyz βŠ• a(1 βŠ• c βŠ• y βŠ• xy βŠ• cxy βŠ• cxz βŠ• xyz)) == 115 (1 βŠ• a βŠ• x)y(c βŠ• z) βŠ• b(acxz βŠ• y(1 βŠ• ac βŠ• x βŠ• acxz)) == 135 abc(1 βŠ• y)(1 βŠ• xz) == 1

171 25 a(1 βŠ• c)xyz βŠ• b(1 βŠ• c βŠ• y βŠ• cy βŠ• cxy βŠ• xz βŠ• xyz βŠ• a(1 βŠ• c βŠ• y βŠ• cxz βŠ• xyz)) == 115 (1 βŠ• x)y(b βŠ• c βŠ• z) βŠ• a(bcxz βŠ• y(1 βŠ• bc βŠ• z βŠ• bcxz)) == 135 abc(1 βŠ• y)(1 βŠ• xz) == 1

172 25 a(b βŠ• y βŠ• cy βŠ• bcy βŠ• bcxyz) βŠ• b(x(1 βŠ• y)z βŠ• c(1 βŠ• y βŠ• xyz)) == 115 y(b βŠ• c βŠ• cx βŠ• bz) βŠ• a(1 βŠ• c βŠ• y βŠ• z βŠ• yz βŠ• b(1 βŠ• c βŠ• z)) == 1

173 25 a(1 βŠ• c)y βŠ• b((1 βŠ• y)(1 βŠ• xz) βŠ• c(1 βŠ• yz βŠ• xy(1 βŠ• z)) βŠ• a(1 βŠ• cy(x βŠ• z βŠ• xz))) == 115 cxy βŠ• byz βŠ• a((1 βŠ• b)c βŠ• (1 βŠ• b βŠ• y)z) == 1

174 25 (1 βŠ• b)(c βŠ• y βŠ• xz βŠ• xyz) βŠ• a(1 βŠ• cy βŠ• b(1 βŠ• cy(1 βŠ• z βŠ• xz))) == 115 bx(1 βŠ• c βŠ• y) βŠ• a(b(1 βŠ• c) βŠ• y(c βŠ• z)) == 1

033146-24

Page 25: No-go theorem for device-independent security in ...

NO-GO THEOREM FOR DEVICE-INDEPENDENT SECURITY … PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

APPENDIX I: LIST OF EXTREMAL BOXES

Class Probability Condition for RC extremal boxes beyond no-signaling polytope

175 25 b(c βŠ• cxy βŠ• (x βŠ• y)z) βŠ• a(c(1 βŠ• x)yz βŠ• b(1 βŠ• y(1 βŠ• c βŠ• z βŠ• cz βŠ• cxz))) == 115 (b βŠ• c)xy βŠ• a(y βŠ• c(1 βŠ• b βŠ• y) βŠ• z βŠ• bz) == 1

176 25 b(x(1 βŠ• y)(1 βŠ• z) βŠ• c(1 βŠ• yz βŠ• xy(1 βŠ• z))) βŠ• a((1 βŠ• c)y βŠ• b(1 βŠ• cy(x βŠ• z βŠ• xz))) == 115 cxy βŠ• byz βŠ• a((1 βŠ• b)c βŠ• (1 βŠ• b βŠ• y)z) == 1

177 25 b(x(1 βŠ• y)z βŠ• c(1 βŠ• yz βŠ• xy(1 βŠ• z))) βŠ• a(y(1 βŠ• c βŠ• z) βŠ• b(1 βŠ• yz βŠ• cy(x βŠ• z βŠ• xz))) == 115 y(cx βŠ• (b βŠ• x)z) βŠ• a(c βŠ• bc βŠ• yz) == 1

178 25 b(x(1 βŠ• y)(1 βŠ• z) βŠ• c(1 βŠ• yz βŠ• xy(1 βŠ• z))) βŠ• a(y(1 βŠ• c βŠ• z) βŠ• b(1 βŠ• yz βŠ• cy(x βŠ• z βŠ• xz))) == 115 y(cx βŠ• (b βŠ• x)z) βŠ• a(c βŠ• bc βŠ• yz) == 1

179 25 cy βŠ• b(c βŠ• x(1 βŠ• y)z) βŠ• a(cy βŠ• b(1 βŠ• (1 βŠ• c)yz βŠ• (1 βŠ• c)xy(1 βŠ• z))) == 115 bxy βŠ• cx(1 βŠ• b βŠ• y) βŠ• a(c βŠ• bc βŠ• yz) == 1

180 12 a(c(1 βŠ• b βŠ• y) βŠ• byz) == 114 cxy βŠ• a(b βŠ• cy βŠ• bz) βŠ• b(c βŠ• y βŠ• xy βŠ• z βŠ• xyz) == 1

181 35 abcy == 115 (1 βŠ• c)(a βŠ• x)y βŠ• b(y βŠ• c(1 βŠ• a βŠ• ay)) == 125 a(1 βŠ• y)(b βŠ• c βŠ• z) == 1

182 12 b(a βŠ• x)(c βŠ• yz) == 114 cy βŠ• b(1 βŠ• a βŠ• c βŠ• y βŠ• az) βŠ• a(c βŠ• z βŠ• yz) == 1

183 12 ab(c βŠ• yz) == 114 cxy βŠ• a(1 βŠ• b βŠ• c βŠ• y βŠ• bz) βŠ• b(c βŠ• y βŠ• xy βŠ• z βŠ• xyz) == 1

184 13 a(b(1 βŠ• c) βŠ• (1 βŠ• y)(c βŠ• z)) βŠ• b(c βŠ• y(x βŠ• z)) == 123 abcy(x βŠ• z) == 1

185 14 y(a βŠ• c βŠ• cx βŠ• az) βŠ• b(1 βŠ• c βŠ• y βŠ• xz βŠ• xyz βŠ• a(1 βŠ• c(1 βŠ• y)(1 βŠ• xz))) == 112 ac(xyz βŠ• b(xz βŠ• (1 βŠ• x)y(1 βŠ• z))) == 134 abc(1 βŠ• y)(1 βŠ• xz) == 1

186 14 cxy βŠ• ay(1 βŠ• z) βŠ• b(1 βŠ• c βŠ• y βŠ• xz βŠ• xyz βŠ• a(1 βŠ• c(1 βŠ• y)(1 βŠ• xz))) == 112 ac((1 βŠ• x)yz βŠ• b(yz βŠ• x(y βŠ• z βŠ• yz))) == 134 abc(1 βŠ• y)(1 βŠ• xz) == 1

187 14 cxy βŠ• ayz βŠ• b(1 βŠ• a βŠ• c βŠ• y βŠ• xz βŠ• xyz) == 112 ac(1 βŠ• b βŠ• xy βŠ• bxy βŠ• yz βŠ• byz βŠ• xyz) == 1

188 14 cxy βŠ• a(b βŠ• y βŠ• yz) βŠ• b(c βŠ• x(1 βŠ• y)z) == 112 ac(1 βŠ• y βŠ• yz βŠ• xyz βŠ• b(1 βŠ• y(1 βŠ• x βŠ• z))) == 1

189 14 cxy βŠ• ayz βŠ• b(a βŠ• c βŠ• (1 βŠ• y)(1 βŠ• z βŠ• xz)) == 112 ac(1 βŠ• b βŠ• xy βŠ• bxy βŠ• yz βŠ• byz βŠ• xyz) == 1

190 14 cxy βŠ• a(b βŠ• yz) βŠ• b(c βŠ• x(1 βŠ• y)z) == 112 ac(1 βŠ• b βŠ• xy βŠ• bxy βŠ• yz βŠ• byz βŠ• xyz) == 1

1 1 abc == 1

2 13 (1 βŠ• x)y(c βŠ• z) βŠ• b(c βŠ• z βŠ• xz) βŠ• a(b βŠ• c βŠ• bc βŠ• yz) == 123 abc(1 βŠ• x)yz == 1

3 12 a(b βŠ• c βŠ• yz) == 1

4 12 b(a βŠ• c βŠ• xz) == 1

5 13 a(b βŠ• c βŠ• bc) βŠ• cxy βŠ• b(c βŠ• z βŠ• xz) == 1

6 13 c(b βŠ• y βŠ• xy) βŠ• a(b βŠ• c βŠ• bc βŠ• z βŠ• yz) == 1

[1] C. H. Bennett and G. Brassard, Quantum cryptography:Public key distribution and coin tossing, in Proceedingsof the IEEE International Conference on Computers, Sys-

tems, and Signal Processing, Bangalore, India, December1984 (IEEE Computer Society Press, New York, 1984),pp. 175–179.

033146-25

Page 26: No-go theorem for device-independent security in ...

R. SALAZAR et al. PHYSICAL REVIEW RESEARCH 3, 033146 (2021)

[2] A. K. Ekert, Quantum Cryptography Based on Bell’s Theorem,Phys. Rev. Lett. 67, 661 (1991).

[3] J. Barrett, L. Hardy, and A. Kent, No Signaling and QuantumKey Distribution, Phys. Rev. Lett. 95, 010503 (2005).

[4] J. Barrett, R. Colbeck, and A. Kent, Unconditionally securedevice-independent quantum key distribution with only twodevices, Phys. Rev. A 86, 062326 (2012).

[5] V. Scarani, N. Gisin, N. Brunner, L. Masanes, S. Pino, and A.Acin, Secrecy extraction from no-signaling correlations, Phys.Rev. A 74, 042339 (2006).

[6] A. Acin, S. Massar, and S. Pironio, Efficient quantum keydistribution secure against no-signaling eavesdroppers, New J.Phys. 8, 126 (2006).

[7] A. Acin, N. Gisin, and L. Masanes, From Bell’s Theorem toSecure Quantum Key Distribution, Phys. Rev. Lett. 97, 120405(2006).

[8] L. Masanes, Universally Composable Privacy Amplificationfrom Causality Constraints, Phys. Rev. Lett. 102, 140501(2009).

[9] E. Hanggi, R. Renner, and S. Wolf, Efficient device-independent quantum key distribution, in EUROCRYPT 2010,Lecture Notes in Computer Science Vol. 6110 (Springer, Berlin,2010), pp. 216–234.

[10] L. Masanes, R. Renner, M. Christandl, A. Winter, and J. Barrett,Full security of quantum key distribution from no-signalingconstraints, IEEE Trans. Inf. Theory 60, 4973 (2014).

[11] R. Arnon-Friedman, F. Dupuis, O. Fawzi, R. Renner, and T.Vidick, Practical device-independent quantum cryptography viaentropy accumulation, Nat. Commun. 9, 459 (2018).

[12] P. Horodecki and R. Ramanathan, The relativistic causalityvs no-signaling paradigm for multi-party correlations, Nat.Commun. 10, 1701 (2019).

[13] J. Grunhaus, S. Popescu, and D. Rohrlich, Jamming nonlocalquantum correlations, Phys. Rev. A 53, 3781 (1996).

[14] R. M. Wald, General Relativity (University of Chicago Press,Chicago, 1984).

[15] M. Eckstein and T. Miller, Causality for nonlocal phenomena,Ann. Henri PoincarΓ© 18, 3049 (2017).

[16] B. Toner, Monogamy of non-local quantum correlations, Proc.R. Soc. A 465, 59 (2009).

[17] M. Pawlowski and C. Brukner, Monogamy of Bell’s Inequal-ity Violations in Nonsignaling Theories, Phys. Rev. Lett. 102,030403 (2009).

[18] C. Pfister et al., A universal test for gravitational decoherence,Nat. Commun. 7, 13022 (2016).

[19] M. Winczewski, T. Das, and K. Horodecki, Upper bounds onsecure key against non-signaling adversary via non-signalingsquashed secrecy monotones, arXiv:1903.12154.

[20] E. Hanggi and R. Renner, Device-independent quantum keydistribution with commuting measurements, arXiv:1009.1833.

[21] E. Gawrilow and M. Joswig, polymake: A framework for an-alyzing convex polytopes, in Polytopes: Combinatorics andComputation (BirkhΓ€user, Basel, 2000), pp. 43–73.

[22] Calculations were carried out at the Academic Computer Centrein Gdansk in 2020.

[23] H. Buhrman, R. Cleve, S. Massar, and R. de Wolf, Possibility,impossibility and cheat-sensitivity of quantum bit string com-mitment, Rev. Mod. Phys. 82, 665 (2010).

[24] See Supplemental Material at http://link.aps.org/supplemental/10.1103/PhysRevResearch.3.033146 for a proof of our mainresults.

[25] R. Chaves, Polynomial Bell Inequalities, Phys. Rev. Lett. 116,010402 (2016).

[26] R. Chaves, R. Kung, J. B. Brask, and D. Gross, UnifyingFramework for Relaxations of the Causal Assumptions in Bell’sTheorem, Phys. Rev. Lett. 114, 140403 (2015).

[27] G. Putz, D. Rosset, T. J. Barnea, Y.-C. Liang, and N. Gisin,Arbitrarily Small Amount of Measurement Independence IsSufficient to Manifest Quantum Nonlocality, Phys. Rev. Lett.113, 190402 (2014).

[28] J. Barrett and N. Gisin, How Much Measurement IndependenceIs Needed to Demonstrate Nonlocality? Phys. Rev. Lett. 106,100406 (2011).

[29] M. J. W. Hall, Relaxed Bell inequalities and Kochen-Speckertheorems, Phys. Rev. A 84, 022102 (2011).

[30] M. J. W. Hall, Local Deterministic Model of Singlet State Cor-relations Based on Relaxing Measurement Independence, Phys.Rev. Lett. 105, 250404 (2010).

[31] R. Chaves, D. Cavalcanti, and L. Aolita, Causal hierarchy ofmultipartite Bell nonlocality, Quantum 1, 23 (2017).

[32] N. Brunner, D. Cavalcanti, S. Pironio, V. Scarani, and S.Wehner, Bell nonlocality, Rev. Mod. Phys. 86, 419 (2014).

[33] M. L. Almeida, J. D. Bancal, N. Brunner, A. Acin, N. Gisin,and S. Pironio, Guess Your Neighbor’s Input: A MultipartiteNonlocal Game with No Quantum Advantage, Phys. Rev. Lett.104, 230404 (2010).

[34] W. van Dam, Nonlocality and communication complexity,Ph.D. thesis, University of Oxford, 2000, https://sites.cs.ucsb.edu/∼vandam/oxford_thesis.pdf.

[35] R. Arnon-Friedman and A. Ta-Shma, Limits of privacy ampli-fication against nonsignaling memory attacks, Phys. Rev. A 86,062333 (2012).

[36] E. Hanggi, Device-independent quantum key distribution, Ph.D.thesis, ETH Zurich, 2010, arXiv:1012.3878.

[37] D. Yang, K. Horodecki, M. Horodecki, P. Horodecki, J.Oppenheim, and W. Song, Squashed entanglement for multi-partite states and entanglement measures based on the mixedconvex roof, IEEE Trans. Inf. Theory 55, 3375 (2009).

[38] U. M. Maurer, Secret key agreement by public discussion fromcommon information, IEEE Trans. Inf. Theory 39, 733 (1993).

[39] I. Csiszar and J. Korner, Broadcast channels with confidentialmessages, IEEE Trans. Inf. Theory 24, 339 (1978).

[40] U. Maurer and S. Wolf, Information-theoretic key agreement:From weak to strong secrecy for free, Lect. Notes Comput. Sci.1807, 351 (2000).

[41] J. D. Bancal, C. Branciard, N. Gisin, and S. Pironio, Quanti-fying Multipartite Nonlocality, Phys. Rev. Lett. 103, 090503(2009).

[42] D. Saha and M. Pawlowski, Structure of quantum and broad-casting nonlocal correlations, Phys. Rev. A 92, 062129 (2015).

[43] R. Ramanathan, A. Soeda, P. Kurzynski, and D. Kaszlikowski,Generalized Monogamy of Contextual Inequalities from theNo-Disturbance Principle, Phys. Rev. Lett. 109, 050404(2012).

[44] A. Fine, Hidden Variables, Joint Probability, and the Bell In-equalities, Phys. Rev. Lett. 48, 291 (1982).

033146-26