{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:11:06Z","timestamp":1760058666726,"version":"build-2065373602"},"reference-count":29,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:00:00Z","timestamp":1745366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Research, Development","award":["KKP 133827","TKP2021-NVA-04","2022-2.1.1-NL-2022-00004","101081247"],"award-info":[{"award-number":["KKP 133827","TKP2021-NVA-04","2022-2.1.1-NL-2022-00004","101081247"]}]},{"name":"Innovation Office of Hungary","award":["KKP 133827","TKP2021-NVA-04","2022-2.1.1-NL-2022-00004","101081247"],"award-info":[{"award-number":["KKP 133827","TKP2021-NVA-04","2022-2.1.1-NL-2022-00004","101081247"]}]},{"name":"Quantum Information National Laboratory of Hungary","award":["KKP 133827","TKP2021-NVA-04","2022-2.1.1-NL-2022-00004","101081247"],"award-info":[{"award-number":["KKP 133827","TKP2021-NVA-04","2022-2.1.1-NL-2022-00004","101081247"]}]},{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"publisher","award":["KKP 133827","TKP2021-NVA-04","2022-2.1.1-NL-2022-00004","101081247"],"award-info":[{"award-number":["KKP 133827","TKP2021-NVA-04","2022-2.1.1-NL-2022-00004","101081247"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>We present a detailed analysis of the effect of quantum loss and decoherence in the Bell-CHSH scenario. Adopting a device-independent approach, we study the change in the bipartite conditional probability distribution, i.e., the behavior of the realized nonlocal box pair when the elements of the entangled qubit pair subjected to independent noisy quantum channels modeled by completely positive maps. As the verification of Bell inequalities is crucial in device-independent quantum cryptography, our considerations are instructive from the perspective of quantum realizations of nonlocal box pairs. We find that the impact of quantum channels cannot be described by an equivalent classical noise channel.<\/jats:p>","DOI":"10.3390\/cryptography9020025","type":"journal-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T08:26:43Z","timestamp":1745396803000},"page":"25","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bell\u2013Clauser\u2013Horne\u2013Shimony\u2013Holt Behavior Under Quantum Loss and Decoherence"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9415-5219","authenticated-orcid":false,"given":"Ott\u00f3","family":"Hanyecz","sequence":"first","affiliation":[{"name":"HUN-REN Wigner Research Centre or Physics, 1121 Budapest, Hungary"},{"name":"Faculty of Informatics, E\u00f6tv\u00f6s Lor\u00e1nd University, 1117 Budapest, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0972-7252","authenticated-orcid":false,"given":"Andr\u00e1s","family":"Bodor","sequence":"additional","affiliation":[{"name":"HUN-REN Wigner Research Centre or Physics, 1121 Budapest, Hungary"},{"name":"Institute of Mathematics and Informatics, University of P\u00e9cs, 7624 P\u00e9cs, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0660-9549","authenticated-orcid":false,"given":"Peter","family":"Adam","sequence":"additional","affiliation":[{"name":"HUN-REN Wigner Research Centre or Physics, 1121 Budapest, Hungary"},{"name":"Institute of Physics, University of P\u00e9cs, 7624 P\u00e9cs, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2710-493X","authenticated-orcid":false,"given":"M\u00e1ty\u00e1s","family":"Koniorczyk","sequence":"additional","affiliation":[{"name":"HUN-REN Wigner Research Centre or Physics, 1121 Budapest, Hungary"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1103\/RevModPhys.86.419","article-title":"Bell nonlocality","volume":"86","author":"Brunner","year":"2014","journal-title":"Rev. Mod. Phys."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","article-title":"Quantum cryptography based on Bell\u2019s theorem","volume":"67","author":"Ekert","year":"1991","journal-title":"Phys. Rev. Lett."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1103\/PhysRevLett.23.880","article-title":"Proposed Experiment to Test Local Hidden-Variable Theories","volume":"23","author":"Clauser","year":"1969","journal-title":"Phys. Rev. Lett."},{"key":"ref_4","unstructured":"Mayers, D., and Yao, A. (1998, January 8\u201311). Quantum cryptography with imperfect apparatus. Proceedings of the 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280), Palo Alto, CA, USA."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.113.140501","article-title":"Fully Device-Independent Quantum Key Distribution","volume":"113","author":"Vazirani","year":"2014","journal-title":"Phys. Rev. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Grasselli, F. (2021). Device-Independent Quantum Cryptography. Quantum Cryptography: From Key Distribution to Conference Key Agreement, Springer International Publishing.","DOI":"10.1007\/978-3-030-64360-7"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"120405","DOI":"10.1103\/PhysRevLett.97.120405","article-title":"From Bell\u2019s Theorem to Secure Quantum Key Distribution","volume":"97","author":"Gisin","year":"2006","journal-title":"Phys. Rev. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"032116","DOI":"10.1103\/PhysRevA.78.032116","article-title":"Local realism, detection efficiencies, and probability polytopes","volume":"78","author":"Wilms","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1007\/s10946-018-9731-3","article-title":"No-Signaling in Quantum Mechanics","volume":"39","author":"Koniorczyk","year":"2018","journal-title":"J. Russ. Laser Res."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Sauer, A., and Alber, G. (2020). Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming. Cryptography, 4.","DOI":"10.3390\/cryptography4010002"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"4418","DOI":"10.1103\/PhysRevLett.85.4418","article-title":"Violations of Local Realism by Two Entangled N-Dimensional Systems Are Stronger than for Two Qubits","volume":"85","author":"Kaszlikowski","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.65.052325","article-title":"Quantum nonlocality in two three-level systems","volume":"65","author":"Durt","year":"2002","journal-title":"Phys. Rev. A"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s00220-008-0418-4","article-title":"Unbounded Violation of Tripartite Bell Inequalities","volume":"279","author":"Wolf","year":"2008","journal-title":"Commun. Math. Phys."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"170405","DOI":"10.1103\/PhysRevLett.104.170405","article-title":"Operator Space Theory: A Natural Framework for Bell Inequalities","volume":"104","author":"Junge","year":"2010","journal-title":"Phys. Rev. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"032121","DOI":"10.1103\/PhysRevA.65.032121","article-title":"Nonlocality, closing the detection loophole, and communication complexity","volume":"65","author":"Massar","year":"2002","journal-title":"Phys. Rev. A"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"052112","DOI":"10.1103\/PhysRevA.66.052112","article-title":"Bell inequalities resistant to detector inefficiency","volume":"66","author":"Massar","year":"2002","journal-title":"Phys. Rev. A"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"23130","DOI":"10.1103\/PhysRevResearch.3.023130","article-title":"Satellite quantum communications: Fundamental bounds and practical security","volume":"3","author":"Pirandola","year":"2021","journal-title":"Phys. Rev. Res."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1049\/qtc2.12081","article-title":"Quantum BER estimation modelling and analysis for satellite-based quantum key distribution scenarios","volume":"5","author":"Khanna","year":"2023","journal-title":"IET Quantum Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s11128-024-04382-1","article-title":"FSO-QKD protocols under free-space losses and device imperfections: A comparative study","volume":"23","author":"Sisodia","year":"2024","journal-title":"Quantum Inf. Process."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"23835","DOI":"10.1103\/PhysRevA.81.023835","article-title":"Entanglement transfer through the turbulent atmosphere","volume":"81","author":"Semenov","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1142\/S0129055X03001709","article-title":"Entanglement Breaking Channels","volume":"15","author":"Horodecki","year":"2003","journal-title":"Rev. Math. Phys."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1142\/S0129055X03001710","article-title":"Qubit Entanglement Breaking Channels","volume":"15","author":"Ruskai","year":"2003","journal-title":"Rev. Math. Phys."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/s41467-017-02307-4","article-title":"Practical device-independent quantum cryptography via entropy accumulation","volume":"9","author":"Dupuis","year":"2018","journal-title":"Nat. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.aop.2015.02.015","article-title":"On generalized entropies and information-theoretic Bell inequalities under decoherence","volume":"355","author":"Rastegin","year":"2015","journal-title":"Ann. Phys."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2802","DOI":"10.1016\/j.physleta.2015.09.013","article-title":"Quantum correlation versus Bell inequality violation under the amplitude damping channel","volume":"379","author":"Ma","year":"2015","journal-title":"Phys. Lett. A"},{"key":"ref_26","unstructured":"Park, D., Son, J.W., Cha, S.K., and Seo, E.D. (2009). Effect of Decoherence in Ekert-Protocol. arXiv."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1515\/zna-2024-0144","article-title":"Choi representation of completely positive maps in brief","volume":"79","author":"Homa","year":"2024","journal-title":"Z. Naturforschung A"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"4195","DOI":"10.1103\/PhysRevLett.86.4195","article-title":"Quantum Tomography for Measuring Experimentally the Matrix Elements of an Arbitrary Quantum Operation","volume":"86","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2858","DOI":"10.1038\/s41467-023-38332-9","article-title":"Quantum process tomography with unsupervised learning and tensor networks","volume":"14","author":"Torlai","year":"2023","journal-title":"Nat. Commun."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/2\/25\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:20:04Z","timestamp":1760030404000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/2\/25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,23]]},"references-count":29,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["cryptography9020025"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9020025","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2025,4,23]]}}}