In short

Stop thinking of entanglement as a phenomenon. Start thinking of it as currency. The unit is the ebit — one Bell pair |\Phi^+\rangle = \tfrac{1}{\sqrt 2}(|00\rangle + |11\rangle) shared between Alice and Bob. Quantum information tasks have prices in this currency:

  • Teleportation: 1 ebit + 2 classical bits (cbits) \longrightarrow 1 qubit transmitted.
  • Superdense coding: 1 ebit + 1 qubit transmitted \longrightarrow 2 classical bits.
  • Entanglement swapping: 2 ebits \longrightarrow 1 ebit over a longer distance.

Exchange rates run both directions. Entanglement distillation converts n noisy Bell pairs into k < n clean ebits: the yield ratio k/n is the distillable entanglement E_D(\rho). Entanglement dilution runs the reverse, stretching clean ebits into many weakly entangled pairs at rate E_C(\rho), the entanglement cost. These are bounded by the entanglement of formation E_F and von Neumann entropy of entanglement E(|\psi\rangle) = S(\rho_A). Finally, you can verify you have real entanglement — without trusting the lab equipment — by playing the CHSH game: a classical strategy caps at 75% win rate, while Bell-state players reach \cos^2(\pi/8) \approx 85.4\%. This chapter turns all these moves into protocols you can trace step by step.

A cricket match uses runs. A shop sells in rupees. A cryptographic protocol runs on bits. When you zoom into quantum information theory, a fourth kind of unit appears — one that makes teleportation, superdense coding, entanglement swapping, and Bell-inequality violations all fall into a single accounting system. That unit is the ebit.

An ebit is what you have when Alice in Delhi and Bob in Chennai each hold one qubit of a Bell pair |\Phi^+\rangle = \tfrac{1}{\sqrt 2}(|00\rangle + |11\rangle). Nothing is being sent; the pair exists as a correlation that neither side can observe locally. And yet this quiet, distant correlation is the resource that Alice spends when she teleports a qubit to Bob, the resource that lets superdense coding push two classical bits through one quantum channel, and the resource whose correlations beat the best classical strategy in a Bell game.

The resource theory of entanglement treats ebits the way Shannon's information theory treats bits: a currency with exchange rates, a set of operations that can create or destroy them (LOCC — Local Operations and Classical Communication), and an accounting that tells you exactly how much of each task is possible with how much currency. Once you see entanglement this way, the "mystery" evaporates. It is not "spooky action at a distance"; it is a resource with a dollar sign, a supply curve, and a demand curve.

This chapter is the accounting textbook. It derives ebit prices for the standard tasks, treats distillation and dilution as the two-way exchange between noisy and clean entanglement, introduces the entanglement of formation as the resource cost of any quantum state, and closes with the CHSH game — the test that certifies your entanglement is real without trusting the device.

The ebit — quantum currency

The ebit

One ebit (pronounced "ee-bit") is the amount of entanglement present in one shared Bell pair |\Phi^+\rangle = \tfrac{1}{\sqrt 2}(|00\rangle + |11\rangle) between Alice and Bob. Equivalently, it is the amount of entanglement needed to faithfully teleport one qubit from Alice to Bob (along with 2 classical bits of communication). The other three Bell states |\Phi^-\rangle, |\Psi^+\rangle, |\Psi^-\rangle each carry exactly 1 ebit; conversion between Bell states requires only local Pauli operations (free).

Reading the definition. An ebit is an operational quantity: it is defined by what one Bell pair lets you do, not by any intrinsic feature of the state. The formal definition, via the entropy of entanglement, is E(|\psi\rangle_{AB}) = S(\rho_A) where \rho_A = \mathrm{tr}_B |\psi\rangle\langle \psi| is the reduced state on Alice's side; for a Bell pair, \rho_A = I/2 (maximally mixed) and S(I/2) = 1 bit — so one Bell pair is exactly 1 ebit.

Ebit as shared resource between Alice and BobA diagram with Alice on the left and Bob on the right, each holding one qubit drawn as a circle. A wavy line labelled one ebit connects their qubits across a long distance. A box in the middle says 1 Bell pair = 1 ebit and notes that neither Alice nor Bob can locally measure their ebit without destroying it.Alice (Delhi)Aqubit state: I/2Bob (Chennai)Bqubit state: I/21 ebit|Φ⁺⟩ = (|00⟩+|11⟩)/√2invisible locally, convertible globally
The ebit. One Bell pair shared across a distance is 1 ebit of entanglement. Each side's local state is maximally mixed ($I/2$), so neither party can detect the ebit by themselves. The resource only appears when Alice and Bob coordinate — LOCC protocols consume the ebit and deliver a task in return.

LOCC — the free operations

A resource theory needs two things: a resource, and a set of free operations — things you can do without consuming the resource. For entanglement, the free operations are LOCC: Local Operations and Classical Communication. Alice can do anything she wants to her own qubits (unitaries, measurements, mixing in fresh qubits), Bob can do anything to his own, and they can freely exchange classical bits. What they cannot do for free is transport quantum states or create new entanglement — those cost ebits.

The rule: LOCC cannot create or increase entanglement. If Alice and Bob start with a product state |\psi_A\rangle \otimes |\psi_B\rangle, no amount of LOCC turns it into an entangled state. If they start with E ebits of entanglement, LOCC might redistribute or waste it, but never increase it. This is the monotonicity of entanglement under LOCC, and it is the axiom that makes ebits a conserved currency. Any protocol that seems to create entanglement from nowhere must be spending some hidden entanglement or breaking LOCC.

Exchange rates — teleportation and superdense coding

Two tasks fix the core exchange rates between ebits, qubits, and classical bits.

Teleportation: 1 ebit + 2 cbits → 1 qubit

Alice holds an unknown qubit |\psi\rangle in Delhi. Bob needs that exact qubit state in Chennai. No quantum channel is available. Using quantum teleportation, she consumes:

and in exchange, Bob's half of the Bell pair transforms into |\psi\rangle. The exchange rate:

\boxed{1\ \text{ebit} + 2\ \text{cbits} \longrightarrow 1\ \text{qubit transmitted}}

Why the resources are all used: Alice's measurement of her unknown qubit plus her half of the Bell pair is irreversibly random, producing 2 random classical bits. Without sending those 2 bits to Bob, he has a qubit that is maximally mixed — a useless state. The ebit is consumed by the measurement; the 2 cbits are consumed in transit; the qubit materialises on Bob's side as the output of the exchange.

Superdense coding: 1 ebit + 1 qubit → 2 cbits

The reverse direction. Alice has 2 classical bits to send to Bob, and they already share 1 ebit. Using superdense coding:

and in exchange, Bob decodes 2 classical bits. The exchange rate:

\boxed{1\ \text{ebit} + 1\ \text{qubit transmitted} \longrightarrow 2\ \text{cbits}}

Without entanglement, one qubit carries at most 1 classical bit (the Holevo bound). The ebit doubles the classical capacity per qubit transmitted — at the cost of consuming an ebit per transmission.

Teleportation and superdense coding exchange ratesTwo rows showing the exchange rates. Top row: 1 ebit plus 2 classical bits on the left, a double-headed arrow labelled teleportation, and 1 qubit transmitted on the right. Bottom row: 1 ebit plus 1 qubit transmitted on the left, a double-headed arrow labelled superdense coding, and 2 classical bits on the right. Annotations note that these are dual protocols.1 ebit + 2 cbitsshared Bell pair+ phone-call of 2 bitsteleportation19931 qubit transmittedarbitrary |ψ⟩delivered faithfully1 ebit + 1 qubitshared Bell pair+ 1 quantum channel usesuperdense coding19922 classical bitsBob decodes viaBell measurement
The two foundational exchange rates. Teleportation spends ebits and cbits to purchase qubit transmission; superdense coding spends ebits and qubits to purchase classical bits. The two protocols are each other's duals and pin down entanglement as a conserved resource with a clean accounting.

A cleaner way to see the duality

Write each line with "cost" on the left and "delivery" on the right:

Protocol Consumed Delivered
Teleportation 1 ebit + 2 cbits 1 qubit
Superdense coding 1 ebit + 1 qubit 2 cbits

Now "add" the two protocols. On the left: 2 ebits + 2 cbits + 1 qubit. On the right: 1 qubit + 2 cbits. Cancel. What is left: 2 ebits on the left, nothing on the right — so 2 ebits can be generated by running teleportation and superdense coding end-to-end? No — the two protocols' consumed ebits and delivered outputs fit into a single closed accounting where ebits are neither created nor destroyed (they are consumed). The point is that the accounting closes: the exchange rates are consistent, and neither protocol cheats the system. This is why the resource theory works as a theory.

Entanglement swapping: 2 ebits → 1 ebit (at longer range)

A third protocol, entanglement swapping, uses two Bell pairs — one shared between Alice–Charlie and one between Charlie–Bob — to produce a fresh Bell pair between Alice and Bob, without Charlie ever seeing Alice's or Bob's qubit. The accounting:

1\ \text{ebit}_{AC} + 1\ \text{ebit}_{CB} \longrightarrow 1\ \text{ebit}_{AB} + 2\ \text{cbits of Charlie's message}.

Two ebits and two classical bits become one ebit at longer range. This is the operational principle behind quantum repeaters — the long-distance quantum network idea pursued by groups at IIT Madras, ISRO, and the international Quantum Internet initiative.

Distillation — noisy pairs to clean ebits

Real-world Bell pairs are noisy. A fibre-optic link from Delhi to Chennai, or a satellite uplink from an ISRO ground station, delivers partially entangled or decohered pairs rather than perfect Bell states. If Alice and Bob have n noisy pairs described by some mixed state \rho^{\otimes n}, can they distill them into a smaller number k < n of clean ebits?

The DEJMPS protocol — distilling in practice

The canonical protocol is DEJMPS (Deutsch, Ekert, Jozsa, Macchiavello, Popescu, Sanpera, 1996) [1]. Given two noisy Bell pairs, it produces one Bell pair with higher fidelity, probabilistically:

  1. Alice and Bob each hold two qubits. Pair 1: (A_1, B_1). Pair 2: (A_2, B_2).
  2. Alice applies a CNOT with A_1 controlling A_2. Bob applies a CNOT with B_1 controlling B_2.
  3. Alice and Bob each measure pair 2 (A_2 and B_2) in the computational basis. They compare outcomes over a classical channel.
  4. If outcomes match, they keep pair 1, which now has higher Bell-state fidelity. If outcomes differ, they discard both pairs and start over.

The protocol is probabilistic — sometimes it fails and you lose both pairs — but each success trade two noisy pairs for one cleaner pair. Iterating many times, Alice and Bob distill n very-noisy pairs into k nearly-perfect ebits, where the yield k/n is bounded by the state's distillable entanglement E_D(\rho).

DEJMPS distillation protocolA flow diagram showing two noisy Bell pairs entering the DEJMPS protocol on the left. Alice and Bob each apply a CNOT across their pair of qubits. They each measure pair 2, compare outcomes over a classical channel, and on success keep pair 1 — now with higher fidelity. On failure they discard both pairs. The output on the right shows one cleaner pair emerging.input: 2 noisy pairspair 1: A₁–B₁ (fidelity F)pair 2: A₂–B₂ (fidelity F)CNOT₁→₂measure pair 2Alice: gets a ∈ {0,1}Bob: gets b ∈ {0,1}classical compare:a = b?match (success):keep pair 1, F' > Fmismatch (failure):discard, try againIterate: n noisy pairs → k clean ebits. Yield rate k/n bounded by distillable entanglement E_D(ρ).
The DEJMPS distillation protocol in one round. Two noisy Bell pairs enter; a local CNOT on each side then a measurement-and-compare of pair 2 yields either a cleaner pair 1 (success) or requires a retry (failure). Iterated across many rounds, distillation trades quantity for quality.

Distillable entanglement

Distillable entanglement

The distillable entanglement E_D(\rho) of a bipartite mixed state \rho_{AB} is the best asymptotic yield of clean ebits per copy of \rho, using any LOCC protocol:

E_D(\rho) \;=\; \sup\left\{ R : \text{ LOCC takes } \rho^{\otimes n} \to \text{ state close to } (|\Phi^+\rangle\langle\Phi^+|)^{\otimes \lfloor Rn \rfloor} \text{ as } n \to \infty \right\}.

For a pure entangled state |\psi\rangle_{AB}, E_D(|\psi\rangle) = E(|\psi\rangle) = S(\rho_A) (the entropy of entanglement). For a mixed state, E_D is typically smaller than the entropy and is hard to compute in general.

Reading the definition. The supremum is over all LOCC protocols — any creative thing Alice and Bob can do locally, plus all the classical talk they like. The output must converge to Rn clean ebits, in the sense that the fidelity to a tensor of Bell states approaches 1 as n \to \infty. The quantity R is measured in ebits per copy of \rho.

For a noisy Werner state \rho_p = p|\Phi^+\rangle\langle\Phi^+| + (1-p)\, I/4 (a mixture of a Bell pair with noise), E_D > 0 only for p > 1/3 — below that threshold, the state is still a correlated mixed state but cannot be distilled into any positive rate of clean ebits. These "bound entangled" states are an active area of research.

Dilution — stretching ebits into many weakly entangled pairs

Run the reverse. Given k clean ebits, what is the maximum number n of weakly entangled pairs |\psi\rangle Alice and Bob can produce via LOCC?

Entanglement cost

The entanglement cost E_C(\rho) of a state \rho_{AB} is the asymptotic ebit consumption rate needed to create \rho by LOCC:

E_C(\rho) \;=\; \inf\left\{ R : \text{ LOCC takes } (|\Phi^+\rangle\langle\Phi^+|)^{\otimes \lceil Rn \rceil} \to \text{ state close to } \rho^{\otimes n} \text{ as } n \to \infty \right\}.

For a pure state, E_C(|\psi\rangle) = E(|\psi\rangle) = S(\rho_A) — the same as distillable entanglement. For a mixed state, E_C \geq E_D (dilution wastes at least as much as distillation produces).

The inequality E_D \leq E_C is sharp for mixed states: there exist states where distillation yields E_D = 0 ebits per copy but synthesis costs E_C > 0 per copy. These are bound entangled states: entangled but not distillable. They can be created only with genuine cost in ebits, yet nothing can be extracted from them.

Entanglement of formation — the cost side in closed form

For pure states, E(|\psi\rangle) = S(\rho_A) is explicit. For mixed states, the entanglement of formation E_F(\rho) is the cleanest operational cost measure:

E_F(\rho) \;=\; \min_{\{p_i, |\psi_i\rangle\}} \sum_i p_i \, E(|\psi_i\rangle),

where the minimum is over all convex decompositions \rho = \sum_i p_i |\psi_i\rangle\langle\psi_i| of \rho into pure states. In words: pick the decomposition that minimises the average entanglement.

For two-qubit states, Wootters (1998) found a closed form. Write the "spin-flipped" state \tilde\rho = (Y \otimes Y) \rho^* (Y \otimes Y) and compute the eigenvalues \lambda_1 \geq \lambda_2 \geq \lambda_3 \geq \lambda_4 of \rho \tilde\rho. Define the concurrence

C(\rho) \;=\; \max(0, \sqrt{\lambda_1} - \sqrt{\lambda_2} - \sqrt{\lambda_3} - \sqrt{\lambda_4}).

Then

E_F(\rho) \;=\; h\!\left(\tfrac{1 + \sqrt{1 - C(\rho)^2}}{2}\right),

where h(x) = -x \log_2 x - (1-x) \log_2(1-x) is the binary entropy. A Bell state has C = 1 and E_F = 1 ebit; a separable state has C = 0 and E_F = 0. This is a rare case where a mixed-state entanglement measure has an explicit formula, and it is used constantly in quantum information experiments for benchmarking Bell-pair quality.

Certification — the CHSH game

You have what you think is a Bell pair. How do you verify it? Local measurements cannot reveal entanglement (each side's state is I/2). The answer is the CHSH game, a non-local game whose winning rate is bounded classically but exceeded by quantum strategies.

The game

Alice and Bob each receive a random bit (x, y \in \{0, 1\} independently and uniformly). They each output a bit (a, b \in \{0, 1\}) without communicating. They win if a \oplus b = x \wedge y (XOR of outputs equals AND of inputs).

\text{Classical optimum: } 75\%, \qquad \text{Quantum optimum: } \cos^2(\pi/8) \approx 85.36\%.

The quantum strategy violates the CHSH inequality \langle A_0 B_0 \rangle + \langle A_0 B_1 \rangle + \langle A_1 B_0 \rangle - \langle A_1 B_1 \rangle \leq 2, reaching the Tsirelson bound of 2\sqrt 2. Repeated games give Alice and Bob a statistical certificate that their Bell pair is real — classical correlations cannot produce a win rate above 75\%, so observing 85\% wins is evidence of genuine quantum entanglement. This is the foundation of device-independent quantum cryptography (Mayers-Yao, 1998; and Pironio et al., 2010 at ICTS Bengaluru and IIT Madras collaborations).

CHSH game win-rate boundsA horizontal bar chart showing three bars. The first bar labelled classical optimum reaches 75 percent. The second bar labelled quantum optimum reaches 85.36 percent. A third bar labelled no-signalling bound reaches 100 percent, drawn dashed to indicate it is not achievable. Labels mark the key probabilities.50%62.5%75%85.36%100%CHSH game win probabilityclassical75%quantumcos²(π/8) ≈ 85.36%no-signalling100% (impossible in QM)classical ceilingTsirelson
The CHSH game pins three regimes on a single axis. Classical shared-randomness strategies cap at $75\%$; quantum strategies with shared Bell pairs reach the Tsirelson bound of $\cos^2(\pi/8) \approx 85.36\%$; the information-theoretic ceiling of $100\%$ (the Popescu-Rohrlich box) is not achievable by any physical theory consistent with quantum mechanics. Observing $>75\%$ is a certificate of entanglement.

Worked examples

Example 1 — resource accounting for a teleportation chain

Setup. Alice (Delhi), Charlie (Nagpur), Bob (Chennai). Alice holds an unknown qubit |\psi\rangle. She needs to send it to Bob, but no quantum channel exists between Delhi and Chennai. She and Charlie share 1 ebit; Charlie and Bob share 1 ebit. No direct Alice-Bob entanglement. Total resources: 2 ebits, pairwise, arranged linearly Delhi → Nagpur → Chennai. Count the classical bits consumed and verify the accounting.

Step 1 — teleport Alice's qubit to Charlie. Alice runs teleportation using her ebit with Charlie: consumes 1 ebit plus 2 cbits sent to Charlie. After this step, Charlie holds |\psi\rangle (after he applies the Pauli correction from Alice's 2 classical bits). Why Charlie applies a correction: teleportation's output is the unknown state up to one of four Pauli operators, determined by Alice's measurement outcomes. Charlie's 2 classical bits tell him which correction to apply. Resources so far: 1 ebit and 2 cbits consumed. The Alice-Charlie ebit is gone.

Step 2 — Charlie now teleports to Bob. Charlie runs teleportation using his ebit with Bob: consumes 1 ebit plus 2 cbits sent to Bob. Bob applies Charlie's Pauli correction and now holds |\psi\rangle. Resources: another 1 ebit plus 2 more cbits. Total: 2 ebits and 4 cbits.

Step 3 — count. Alice's original |\psi\rangle has reached Bob, who is 2300 km away via an intermediate hop in Nagpur. Total resources consumed: 2 ebits, 4 classical bits. The classical bits are routing information — 2 from Alice to Charlie, 2 from Charlie to Bob — and Charlie never sees Alice's state or Bob's state. He sees only his halves of two Bell pairs and some classical bits. The qubit teleports through him without ever being in his lab as a coherent state.

Step 4 — entanglement-swapping alternative. A cleverer approach: Charlie first runs entanglement swapping on his two ebits, producing a direct Alice-Bob ebit plus 2 classical bits to Bob. Cost: 2 ebits \to 1 ebit. Then Alice runs teleportation directly to Bob using the new Alice-Bob ebit: 1 ebit + 2 cbits. Total: 2 ebits and 4 cbits — same accounting as sequential teleportation. Two strategies, same bill. Why the resource cost matches: both routes consume 2 ebits (the two ebits across each hop) and 4 classical bits (either 2+2 for sequential teleport, or 2 for swapping plus 2 for teleport). Resource theory is insensitive to which order you do things, as long as the total budget is the same.

Teleportation chain Delhi to Chennai via NagpurThree boxes labelled Alice Delhi, Charlie Nagpur, and Bob Chennai along a horizontal line. Wavy lines labelled ebit connect Alice-Charlie and Charlie-Bob. Arrows labelled teleport hop show the unknown qubit moving from Alice to Charlie and then Charlie to Bob, consuming one ebit and two classical bits at each step. A resource total at the bottom reads 2 ebits plus 4 cbits total.Alice (Delhi)holds |ψ⟩Charlie (Nagpur)intermediate hopBob (Chennai)receives |ψ⟩1 ebit1 ebitteleport + 2 cbitsteleport + 2 cbitsTotal resources: 2 ebits + 4 cbits consumed. Alice's qubit reaches Bob, Charlie sees nothing.
A two-hop teleportation chain from Delhi to Chennai via Nagpur. Two ebits and four classical bits are spent; the unknown qubit is relayed without any intermediate party observing it. This is the resource template for a quantum repeater network — the architecture ISRO and IIT Madras are exploring for India's quantum internet.

What this shows. Entanglement accounting is additive across links. A chain of n ebits plus classical communication delivers one qubit across n+1 nodes. Resource theory gives you a clean predictive budget: no matter how many clever tricks you use (entanglement swapping, joint measurements, coded teleportation), the total ebit count is conserved. Indian quantum-internet planning uses exactly this calculation to determine how many Bell-pair generation rounds each link needs to support a given communication rate.

Example 2 — distillation yield for Werner states via DEJMPS

Setup. Alice and Bob share a Werner state \rho_F = F |\Phi^+\rangle\langle\Phi^+| + (1-F)\tfrac{I}{4} with fidelity F to a Bell pair. They have n = 1000 such pairs. Using the DEJMPS protocol iteratively, estimate the yield of clean ebits.

Step 1 — single DEJMPS round. Combine two pairs of fidelity F. With probability p(F) = F^2 + \frac{2}{3}F(1-F) + \frac{5}{9}(1-F)^2, the protocol succeeds. On success, the surviving pair has new fidelity

F'(F) \;=\; \frac{F^2 + \tfrac{1}{9}(1-F)^2}{p(F)}.

Why these formulas: the CNOT-plus-measurement in DEJMPS is a parity check on Pauli errors. It succeeds when both pairs have matching error syndromes, failing otherwise. The algebra traces each Pauli-error weight through the protocol and sums.

Step 2 — numerical example. Start at F = 0.7. Plug in:

p(0.7) \;=\; 0.49 + \tfrac{2}{3}(0.21) + \tfrac{5}{9}(0.09) \;\approx\; 0.49 + 0.14 + 0.05 \;\approx\; 0.68,
F'(0.7) \;=\; \frac{0.49 + \tfrac{1}{9}(0.09)}{0.68} \;\approx\; \frac{0.49 + 0.01}{0.68} \;\approx\; 0.735.

So on average, 2 pairs at F = 0.7 become 1 pair at F \approx 0.735 with probability 0.68. Yield ratio this round: 0.68 \times \tfrac{1}{2} = 0.34 surviving pairs per input pair.

Step 3 — iterate. Feed the F \approx 0.735 pairs back through DEJMPS. Compute p(0.735) \approx 0.72 and F'(0.735) \approx 0.78. Yield this round: 0.72 \times 0.5 = 0.36. After several rounds, F converges toward 1 (pure Bell pairs) and p toward 1, so yields stabilise.

Step 4 — asymptotic yield. The asymptotic yield per input pair, for a Werner state with parameter F, is bounded by the distillable entanglement E_D(\rho_F). For F > 1/2, a rough formula (using the hashing bound of Bennett-DiVincenzo-Smolin-Wootters) gives

E_D(\rho_F) \;\geq\; 1 - h(F) - (1-F) \log_2 3,

where h is binary entropy. For F = 0.7: h(0.7) \approx 0.881 and (1-F)\log_2 3 \approx 0.3 \times 1.585 \approx 0.476, giving E_D \geq 1 - 0.881 - 0.476 \approx -0.357. Negative, meaning the lower bound is not useful at F = 0.7 via hashing alone — more sophisticated protocols (not just DEJMPS) push the yield above zero. At F = 0.85: h(0.85) \approx 0.610 and (1-F)\log_2 3 \approx 0.238, so E_D \geq 1 - 0.610 - 0.238 = 0.152 ebits per input pair. Starting with 1000 Werner pairs at F = 0.85, Alice and Bob can distill roughly 152 clean ebits.

Step 5 — operational check. Suppose Alice and Bob run a Delhi-Chennai quantum link that produces pairs at F = 0.85 at a rate of 10^4 per second (optimistic but within reach of 2025 QKD hardware). Their clean-ebit rate is roughly 152 \times 10 = 1520 ebits per second. If each teleportation consumes 1 ebit and 2 cbits, they can teleport 1520 qubits per second between the two cities, after distillation overhead.

Werner state distillation yield vs fidelityA plot of distillable entanglement lower bound E_D versus fidelity F. The x-axis runs from F equals 0.5 to 1.0; the y-axis runs from 0 to 1 ebit per pair. The curve starts at 0 when F is around 0.5, rises slowly, passes through 0.15 at F equals 0.85, and reaches 1 at F equals 1. The curve is labelled hashing lower bound.0.50.6250.750.8751.000.51.0Werner fidelity FE_D (ebits/pair)F = 0.85: E_D ≈ 0.152F = 1: 1 ebitbound entangled(F ≲ 0.5)
Distillable entanglement lower bound (hashing bound) as a function of Werner fidelity $F$. Below $F \approx 0.5$ the state is bound-entangled — no LOCC protocol distills it at positive rate. Above that threshold, distillable entanglement rises steeply toward $1$ ebit per pair as $F \to 1$. At a realistic fibre-link fidelity of $0.85$, roughly $0.15$ clean ebits are extractable per noisy input pair.

What this shows. Distillation is not a free conversion — it trades many noisy pairs for fewer clean ones, and the trade ratio depends sensitively on the starting fidelity. In a practical ISRO-scale quantum link with fibre losses driving fidelity to 0.85, each kilometre of extra distance costs you distillation yield. This is why quantum repeaters and satellite QKD are the architectures being explored: they sidestep the exponential decay of fibre losses by using entanglement swapping and distillation across shorter, cleaner links.

Common confusions

Going deeper

If you understand ebits as currency, the exchange rates for teleportation, superdense coding, and entanglement swapping, and the existence of distillation and dilution rates, you have the essential resource theory. The rest of this section covers the axiomatic framework, the bound-entanglement phenomenon, the asymmetric distillable-vs-cost gap, and the device-independent certification story.

The axiomatic resource theory

Formally, entanglement resource theory specifies:

Candidate monotones include E_F (entanglement of formation), E_D (distillable entanglement), E_C (entanglement cost), the log-negativity E_N(\rho) = \log_2 \|\rho^{T_B}\|_1, and the squashed entanglement E_{\mathrm{sq}}. They all agree on pure states but split for mixed states. The relative order is E_D \leq E_{\mathrm{sq}} \leq E_C \leq E_F \leq E_N, with gaps possible at each step.

Bound entanglement

A state \rho_{AB} is bound entangled if E_D(\rho) = 0 but \rho is not separable. Bound entangled states are entangled — they fail separability tests and carry nontrivial correlations — but no LOCC protocol distills clean ebits from them at positive rate. Known examples:

Bound entanglement is not useless. It has applications in quantum key distribution (in "locking" classical secret keys that cannot be unlocked without the full quantum state) and in quantum cryptography more broadly.

The gap E_C > E_D: irreversibility of entanglement manipulation

For pure bipartite states, E_C = E_D = E — entanglement manipulation is reversible asymptotically. For mixed states, E_C > E_D strictly for many states: making a mixed entangled state costs more ebits than you can distill from it. This is the irreversibility of entanglement — a genuine asymmetry in the resource theory that has no analogue in classical Shannon theory.

Multi-party entanglement and GHZ resources

Beyond bipartite entanglement, multi-party states like the GHZ state |\mathrm{GHZ}\rangle = \tfrac{1}{\sqrt 2}(|000\rangle + |111\rangle) carry their own resource value, incomparable with bipartite ebits. GHZ states power anonymous voting, quantum secret sharing, and multi-party leader election protocols. In the resource theory sense, |\mathrm{GHZ}\rangle is not 3 ebits of bipartite entanglement — it is a distinct resource measured by its own monotones.

Device-independent certification and the Indian connection

The CHSH game, run on trusted devices, certifies that a Bell pair is present. The deeper move is device-independent quantum key distribution (DIQKD), where Alice and Bob certify security without trusting the quantum hardware — only the observed classical statistics are used. Key steps in this line of work:

DIQKD is the most honest use of the CHSH game: you reject any explanation of the correlations short of genuine entanglement, and you get cryptographic security that holds even if Alice's and Bob's lab devices were built by a hostile adversary. A 15-year-old running a thought experiment with Alice's and Bob's boxes can understand the essence: if the win rate is > 75\% and statistics are followed, entanglement is real, and security is provable.

The hype check

Hype check. You will see claims that "entanglement enables instant communication across the universe." It does not. You will see claims that "entanglement proves the universe is holographic." It does not directly — though holographic toy models like the AdS/CFT correspondence do use entanglement-entropy formulas, the leap from "entanglement matters in quantum gravity" to "the universe is a hologram" is a leap, not a theorem. What entanglement is is a specific, measurable resource that makes specific protocols possible and measurable non-classical correlations observable. That is extraordinary enough — no embellishment needed.

Where this leads next

References

  1. C. H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. A. Smolin, W. K. Wootters, Purification of Noisy Entanglement and Faithful Teleportation via Noisy Channels (1996) — arXiv:quant-ph/9511027. Entanglement distillation and the DEJMPS protocol.
  2. W. K. Wootters, Entanglement of Formation of an Arbitrary State of Two Qubits (1998) — arXiv:quant-ph/9709029. Concurrence and the closed-form two-qubit entanglement of formation.
  3. R. Horodecki, P. Horodecki, M. Horodecki, K. Horodecki, Quantum entanglement — review article (2009) — arXiv:quant-ph/0702225. Comprehensive modern treatment of entanglement measures, distillation, and bound entanglement.
  4. John Preskill, Lecture Notes on Quantum Computation, Ch. 4 (Quantum entanglement) — theory.caltech.edu/~preskill/ph229. Clean introduction to entanglement as a resource.
  5. A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, V. Scarani, Device-independent security of quantum cryptography against collective attacks (2007) — arXiv:quant-ph/0702152. CHSH-based device-independent security.
  6. Wikipedia, Quantum entanglement — summary of formal definitions, Bell inequalities, and resource-theoretic measures.