In short
Stop thinking of entanglement as a phenomenon. Start thinking of it as currency. The unit is the ebit — one Bell pair |\Phi^+\rangle = \tfrac{1}{\sqrt 2}(|00\rangle + |11\rangle) shared between Alice and Bob. Quantum information tasks have prices in this currency:
- Teleportation: 1 ebit + 2 classical bits (cbits) \longrightarrow 1 qubit transmitted.
- Superdense coding: 1 ebit + 1 qubit transmitted \longrightarrow 2 classical bits.
- Entanglement swapping: 2 ebits \longrightarrow 1 ebit over a longer distance.
Exchange rates run both directions. Entanglement distillation converts n noisy Bell pairs into k < n clean ebits: the yield ratio k/n is the distillable entanglement E_D(\rho). Entanglement dilution runs the reverse, stretching clean ebits into many weakly entangled pairs at rate E_C(\rho), the entanglement cost. These are bounded by the entanglement of formation E_F and von Neumann entropy of entanglement E(|\psi\rangle) = S(\rho_A). Finally, you can verify you have real entanglement — without trusting the lab equipment — by playing the CHSH game: a classical strategy caps at 75% win rate, while Bell-state players reach \cos^2(\pi/8) \approx 85.4\%. This chapter turns all these moves into protocols you can trace step by step.
A cricket match uses runs. A shop sells in rupees. A cryptographic protocol runs on bits. When you zoom into quantum information theory, a fourth kind of unit appears — one that makes teleportation, superdense coding, entanglement swapping, and Bell-inequality violations all fall into a single accounting system. That unit is the ebit.
An ebit is what you have when Alice in Delhi and Bob in Chennai each hold one qubit of a Bell pair |\Phi^+\rangle = \tfrac{1}{\sqrt 2}(|00\rangle + |11\rangle). Nothing is being sent; the pair exists as a correlation that neither side can observe locally. And yet this quiet, distant correlation is the resource that Alice spends when she teleports a qubit to Bob, the resource that lets superdense coding push two classical bits through one quantum channel, and the resource whose correlations beat the best classical strategy in a Bell game.
The resource theory of entanglement treats ebits the way Shannon's information theory treats bits: a currency with exchange rates, a set of operations that can create or destroy them (LOCC — Local Operations and Classical Communication), and an accounting that tells you exactly how much of each task is possible with how much currency. Once you see entanglement this way, the "mystery" evaporates. It is not "spooky action at a distance"; it is a resource with a dollar sign, a supply curve, and a demand curve.
This chapter is the accounting textbook. It derives ebit prices for the standard tasks, treats distillation and dilution as the two-way exchange between noisy and clean entanglement, introduces the entanglement of formation as the resource cost of any quantum state, and closes with the CHSH game — the test that certifies your entanglement is real without trusting the device.
The ebit — quantum currency
The ebit
One ebit (pronounced "ee-bit") is the amount of entanglement present in one shared Bell pair |\Phi^+\rangle = \tfrac{1}{\sqrt 2}(|00\rangle + |11\rangle) between Alice and Bob. Equivalently, it is the amount of entanglement needed to faithfully teleport one qubit from Alice to Bob (along with 2 classical bits of communication). The other three Bell states |\Phi^-\rangle, |\Psi^+\rangle, |\Psi^-\rangle each carry exactly 1 ebit; conversion between Bell states requires only local Pauli operations (free).
Reading the definition. An ebit is an operational quantity: it is defined by what one Bell pair lets you do, not by any intrinsic feature of the state. The formal definition, via the entropy of entanglement, is E(|\psi\rangle_{AB}) = S(\rho_A) where \rho_A = \mathrm{tr}_B |\psi\rangle\langle \psi| is the reduced state on Alice's side; for a Bell pair, \rho_A = I/2 (maximally mixed) and S(I/2) = 1 bit — so one Bell pair is exactly 1 ebit.
LOCC — the free operations
A resource theory needs two things: a resource, and a set of free operations — things you can do without consuming the resource. For entanglement, the free operations are LOCC: Local Operations and Classical Communication. Alice can do anything she wants to her own qubits (unitaries, measurements, mixing in fresh qubits), Bob can do anything to his own, and they can freely exchange classical bits. What they cannot do for free is transport quantum states or create new entanglement — those cost ebits.
The rule: LOCC cannot create or increase entanglement. If Alice and Bob start with a product state |\psi_A\rangle \otimes |\psi_B\rangle, no amount of LOCC turns it into an entangled state. If they start with E ebits of entanglement, LOCC might redistribute or waste it, but never increase it. This is the monotonicity of entanglement under LOCC, and it is the axiom that makes ebits a conserved currency. Any protocol that seems to create entanglement from nowhere must be spending some hidden entanglement or breaking LOCC.
Exchange rates — teleportation and superdense coding
Two tasks fix the core exchange rates between ebits, qubits, and classical bits.
Teleportation: 1 ebit + 2 cbits → 1 qubit
Alice holds an unknown qubit |\psi\rangle in Delhi. Bob needs that exact qubit state in Chennai. No quantum channel is available. Using quantum teleportation, she consumes:
- 1 ebit (one shared Bell pair),
- 2 classical bits (her measurement outcomes, sent over a phone line),
and in exchange, Bob's half of the Bell pair transforms into |\psi\rangle. The exchange rate:
Why the resources are all used: Alice's measurement of her unknown qubit plus her half of the Bell pair is irreversibly random, producing 2 random classical bits. Without sending those 2 bits to Bob, he has a qubit that is maximally mixed — a useless state. The ebit is consumed by the measurement; the 2 cbits are consumed in transit; the qubit materialises on Bob's side as the output of the exchange.
Superdense coding: 1 ebit + 1 qubit → 2 cbits
The reverse direction. Alice has 2 classical bits to send to Bob, and they already share 1 ebit. Using superdense coding:
- 1 ebit (one shared Bell pair),
- 1 qubit transmitted (Alice ships her half of the pair to Bob after local operations),
and in exchange, Bob decodes 2 classical bits. The exchange rate:
Without entanglement, one qubit carries at most 1 classical bit (the Holevo bound). The ebit doubles the classical capacity per qubit transmitted — at the cost of consuming an ebit per transmission.
A cleaner way to see the duality
Write each line with "cost" on the left and "delivery" on the right:
| Protocol | Consumed | Delivered |
|---|---|---|
| Teleportation | 1 ebit + 2 cbits | 1 qubit |
| Superdense coding | 1 ebit + 1 qubit | 2 cbits |
Now "add" the two protocols. On the left: 2 ebits + 2 cbits + 1 qubit. On the right: 1 qubit + 2 cbits. Cancel. What is left: 2 ebits on the left, nothing on the right — so 2 ebits can be generated by running teleportation and superdense coding end-to-end? No — the two protocols' consumed ebits and delivered outputs fit into a single closed accounting where ebits are neither created nor destroyed (they are consumed). The point is that the accounting closes: the exchange rates are consistent, and neither protocol cheats the system. This is why the resource theory works as a theory.
Entanglement swapping: 2 ebits → 1 ebit (at longer range)
A third protocol, entanglement swapping, uses two Bell pairs — one shared between Alice–Charlie and one between Charlie–Bob — to produce a fresh Bell pair between Alice and Bob, without Charlie ever seeing Alice's or Bob's qubit. The accounting:
Two ebits and two classical bits become one ebit at longer range. This is the operational principle behind quantum repeaters — the long-distance quantum network idea pursued by groups at IIT Madras, ISRO, and the international Quantum Internet initiative.
Distillation — noisy pairs to clean ebits
Real-world Bell pairs are noisy. A fibre-optic link from Delhi to Chennai, or a satellite uplink from an ISRO ground station, delivers partially entangled or decohered pairs rather than perfect Bell states. If Alice and Bob have n noisy pairs described by some mixed state \rho^{\otimes n}, can they distill them into a smaller number k < n of clean ebits?
The DEJMPS protocol — distilling in practice
The canonical protocol is DEJMPS (Deutsch, Ekert, Jozsa, Macchiavello, Popescu, Sanpera, 1996) [1]. Given two noisy Bell pairs, it produces one Bell pair with higher fidelity, probabilistically:
- Alice and Bob each hold two qubits. Pair 1: (A_1, B_1). Pair 2: (A_2, B_2).
- Alice applies a CNOT with A_1 controlling A_2. Bob applies a CNOT with B_1 controlling B_2.
- Alice and Bob each measure pair 2 (A_2 and B_2) in the computational basis. They compare outcomes over a classical channel.
- If outcomes match, they keep pair 1, which now has higher Bell-state fidelity. If outcomes differ, they discard both pairs and start over.
The protocol is probabilistic — sometimes it fails and you lose both pairs — but each success trade two noisy pairs for one cleaner pair. Iterating many times, Alice and Bob distill n very-noisy pairs into k nearly-perfect ebits, where the yield k/n is bounded by the state's distillable entanglement E_D(\rho).
Distillable entanglement
Distillable entanglement
The distillable entanglement E_D(\rho) of a bipartite mixed state \rho_{AB} is the best asymptotic yield of clean ebits per copy of \rho, using any LOCC protocol:
For a pure entangled state |\psi\rangle_{AB}, E_D(|\psi\rangle) = E(|\psi\rangle) = S(\rho_A) (the entropy of entanglement). For a mixed state, E_D is typically smaller than the entropy and is hard to compute in general.
Reading the definition. The supremum is over all LOCC protocols — any creative thing Alice and Bob can do locally, plus all the classical talk they like. The output must converge to Rn clean ebits, in the sense that the fidelity to a tensor of Bell states approaches 1 as n \to \infty. The quantity R is measured in ebits per copy of \rho.
For a noisy Werner state \rho_p = p|\Phi^+\rangle\langle\Phi^+| + (1-p)\, I/4 (a mixture of a Bell pair with noise), E_D > 0 only for p > 1/3 — below that threshold, the state is still a correlated mixed state but cannot be distilled into any positive rate of clean ebits. These "bound entangled" states are an active area of research.
Dilution — stretching ebits into many weakly entangled pairs
Run the reverse. Given k clean ebits, what is the maximum number n of weakly entangled pairs |\psi\rangle Alice and Bob can produce via LOCC?
Entanglement cost
The entanglement cost E_C(\rho) of a state \rho_{AB} is the asymptotic ebit consumption rate needed to create \rho by LOCC:
For a pure state, E_C(|\psi\rangle) = E(|\psi\rangle) = S(\rho_A) — the same as distillable entanglement. For a mixed state, E_C \geq E_D (dilution wastes at least as much as distillation produces).
The inequality E_D \leq E_C is sharp for mixed states: there exist states where distillation yields E_D = 0 ebits per copy but synthesis costs E_C > 0 per copy. These are bound entangled states: entangled but not distillable. They can be created only with genuine cost in ebits, yet nothing can be extracted from them.
Entanglement of formation — the cost side in closed form
For pure states, E(|\psi\rangle) = S(\rho_A) is explicit. For mixed states, the entanglement of formation E_F(\rho) is the cleanest operational cost measure:
where the minimum is over all convex decompositions \rho = \sum_i p_i |\psi_i\rangle\langle\psi_i| of \rho into pure states. In words: pick the decomposition that minimises the average entanglement.
For two-qubit states, Wootters (1998) found a closed form. Write the "spin-flipped" state \tilde\rho = (Y \otimes Y) \rho^* (Y \otimes Y) and compute the eigenvalues \lambda_1 \geq \lambda_2 \geq \lambda_3 \geq \lambda_4 of \rho \tilde\rho. Define the concurrence
Then
where h(x) = -x \log_2 x - (1-x) \log_2(1-x) is the binary entropy. A Bell state has C = 1 and E_F = 1 ebit; a separable state has C = 0 and E_F = 0. This is a rare case where a mixed-state entanglement measure has an explicit formula, and it is used constantly in quantum information experiments for benchmarking Bell-pair quality.
Certification — the CHSH game
You have what you think is a Bell pair. How do you verify it? Local measurements cannot reveal entanglement (each side's state is I/2). The answer is the CHSH game, a non-local game whose winning rate is bounded classically but exceeded by quantum strategies.
The game
Alice and Bob each receive a random bit (x, y \in \{0, 1\} independently and uniformly). They each output a bit (a, b \in \{0, 1\}) without communicating. They win if a \oplus b = x \wedge y (XOR of outputs equals AND of inputs).
- Classical strategies. The best classical strategy wins \frac{3}{4} = 75\% of the time, achieved by Alice and Bob both outputting 0 regardless of their inputs (they win in 3 of the 4 input combinations and lose only when x = y = 1).
- Quantum strategies with shared entanglement. Alice and Bob share a Bell pair. They each choose between two measurement bases depending on their received bit. With optimal angles — Alice measures at 0° or 45°, Bob at 22.5° or -22.5° — they win with probability \cos^2(\pi/8) \approx 85.36\%.
The quantum strategy violates the CHSH inequality \langle A_0 B_0 \rangle + \langle A_0 B_1 \rangle + \langle A_1 B_0 \rangle - \langle A_1 B_1 \rangle \leq 2, reaching the Tsirelson bound of 2\sqrt 2. Repeated games give Alice and Bob a statistical certificate that their Bell pair is real — classical correlations cannot produce a win rate above 75\%, so observing 85\% wins is evidence of genuine quantum entanglement. This is the foundation of device-independent quantum cryptography (Mayers-Yao, 1998; and Pironio et al., 2010 at ICTS Bengaluru and IIT Madras collaborations).
Worked examples
Example 1 — resource accounting for a teleportation chain
Setup. Alice (Delhi), Charlie (Nagpur), Bob (Chennai). Alice holds an unknown qubit |\psi\rangle. She needs to send it to Bob, but no quantum channel exists between Delhi and Chennai. She and Charlie share 1 ebit; Charlie and Bob share 1 ebit. No direct Alice-Bob entanglement. Total resources: 2 ebits, pairwise, arranged linearly Delhi → Nagpur → Chennai. Count the classical bits consumed and verify the accounting.
Step 1 — teleport Alice's qubit to Charlie. Alice runs teleportation using her ebit with Charlie: consumes 1 ebit plus 2 cbits sent to Charlie. After this step, Charlie holds |\psi\rangle (after he applies the Pauli correction from Alice's 2 classical bits). Why Charlie applies a correction: teleportation's output is the unknown state up to one of four Pauli operators, determined by Alice's measurement outcomes. Charlie's 2 classical bits tell him which correction to apply. Resources so far: 1 ebit and 2 cbits consumed. The Alice-Charlie ebit is gone.
Step 2 — Charlie now teleports to Bob. Charlie runs teleportation using his ebit with Bob: consumes 1 ebit plus 2 cbits sent to Bob. Bob applies Charlie's Pauli correction and now holds |\psi\rangle. Resources: another 1 ebit plus 2 more cbits. Total: 2 ebits and 4 cbits.
Step 3 — count. Alice's original |\psi\rangle has reached Bob, who is 2300 km away via an intermediate hop in Nagpur. Total resources consumed: 2 ebits, 4 classical bits. The classical bits are routing information — 2 from Alice to Charlie, 2 from Charlie to Bob — and Charlie never sees Alice's state or Bob's state. He sees only his halves of two Bell pairs and some classical bits. The qubit teleports through him without ever being in his lab as a coherent state.
Step 4 — entanglement-swapping alternative. A cleverer approach: Charlie first runs entanglement swapping on his two ebits, producing a direct Alice-Bob ebit plus 2 classical bits to Bob. Cost: 2 ebits \to 1 ebit. Then Alice runs teleportation directly to Bob using the new Alice-Bob ebit: 1 ebit + 2 cbits. Total: 2 ebits and 4 cbits — same accounting as sequential teleportation. Two strategies, same bill. Why the resource cost matches: both routes consume 2 ebits (the two ebits across each hop) and 4 classical bits (either 2+2 for sequential teleport, or 2 for swapping plus 2 for teleport). Resource theory is insensitive to which order you do things, as long as the total budget is the same.
What this shows. Entanglement accounting is additive across links. A chain of n ebits plus classical communication delivers one qubit across n+1 nodes. Resource theory gives you a clean predictive budget: no matter how many clever tricks you use (entanglement swapping, joint measurements, coded teleportation), the total ebit count is conserved. Indian quantum-internet planning uses exactly this calculation to determine how many Bell-pair generation rounds each link needs to support a given communication rate.
Example 2 — distillation yield for Werner states via DEJMPS
Setup. Alice and Bob share a Werner state \rho_F = F |\Phi^+\rangle\langle\Phi^+| + (1-F)\tfrac{I}{4} with fidelity F to a Bell pair. They have n = 1000 such pairs. Using the DEJMPS protocol iteratively, estimate the yield of clean ebits.
Step 1 — single DEJMPS round. Combine two pairs of fidelity F. With probability p(F) = F^2 + \frac{2}{3}F(1-F) + \frac{5}{9}(1-F)^2, the protocol succeeds. On success, the surviving pair has new fidelity
Why these formulas: the CNOT-plus-measurement in DEJMPS is a parity check on Pauli errors. It succeeds when both pairs have matching error syndromes, failing otherwise. The algebra traces each Pauli-error weight through the protocol and sums.
Step 2 — numerical example. Start at F = 0.7. Plug in:
So on average, 2 pairs at F = 0.7 become 1 pair at F \approx 0.735 with probability 0.68. Yield ratio this round: 0.68 \times \tfrac{1}{2} = 0.34 surviving pairs per input pair.
Step 3 — iterate. Feed the F \approx 0.735 pairs back through DEJMPS. Compute p(0.735) \approx 0.72 and F'(0.735) \approx 0.78. Yield this round: 0.72 \times 0.5 = 0.36. After several rounds, F converges toward 1 (pure Bell pairs) and p toward 1, so yields stabilise.
Step 4 — asymptotic yield. The asymptotic yield per input pair, for a Werner state with parameter F, is bounded by the distillable entanglement E_D(\rho_F). For F > 1/2, a rough formula (using the hashing bound of Bennett-DiVincenzo-Smolin-Wootters) gives
where h is binary entropy. For F = 0.7: h(0.7) \approx 0.881 and (1-F)\log_2 3 \approx 0.3 \times 1.585 \approx 0.476, giving E_D \geq 1 - 0.881 - 0.476 \approx -0.357. Negative, meaning the lower bound is not useful at F = 0.7 via hashing alone — more sophisticated protocols (not just DEJMPS) push the yield above zero. At F = 0.85: h(0.85) \approx 0.610 and (1-F)\log_2 3 \approx 0.238, so E_D \geq 1 - 0.610 - 0.238 = 0.152 ebits per input pair. Starting with 1000 Werner pairs at F = 0.85, Alice and Bob can distill roughly 152 clean ebits.
Step 5 — operational check. Suppose Alice and Bob run a Delhi-Chennai quantum link that produces pairs at F = 0.85 at a rate of 10^4 per second (optimistic but within reach of 2025 QKD hardware). Their clean-ebit rate is roughly 152 \times 10 = 1520 ebits per second. If each teleportation consumes 1 ebit and 2 cbits, they can teleport 1520 qubits per second between the two cities, after distillation overhead.
What this shows. Distillation is not a free conversion — it trades many noisy pairs for fewer clean ones, and the trade ratio depends sensitively on the starting fidelity. In a practical ISRO-scale quantum link with fibre losses driving fidelity to 0.85, each kilometre of extra distance costs you distillation yield. This is why quantum repeaters and satellite QKD are the architectures being explored: they sidestep the exponential decay of fibre losses by using entanglement swapping and distillation across shorter, cleaner links.
Common confusions
- "Entanglement enables faster-than-light communication." It does not. The no-communication theorem forbids any LOCC protocol from transferring information faster than classical communication. Entanglement correlates measurement outcomes but does not carry a usable signal. Teleportation requires 2 classical bits of communication, transmitted at most at the speed of light, to complete.
- "An ebit is a qubit." An ebit is half of a Bell pair held by each party; a qubit is a single-system quantum state. You cannot teleport a qubit by sending an ebit — you need the ebit plus 2 classical bits. The resource types are distinct.
- "Distillation creates entanglement." Distillation concentrates entanglement. Alice and Bob start with n E_D ebits of total entanglement spread across n noisy pairs, and end with roughly n E_D ebits concentrated in fewer clean pairs. LOCC never increases entanglement.
- "E_F = E_D for all states." Only for pure states. For mixed states, E_D \leq E_F, and the gap can be large. Bound entangled states have E_D = 0 but E_F > 0 — they cost entanglement to make, yet yield no distillable entanglement.
- "Superdense coding violates the Holevo bound." No. Superdense coding consumes a pre-shared ebit as a separate quantum resource. The Holevo bound applies to the transmitted qubit alone, which carries \leq 1 classical bit. The second bit comes from the ebit. See the Holevo bound chapter for the resource accounting.
- "Entanglement is binary." No. Entanglement is quantified on a continuum by E(|\psi\rangle) = S(\rho_A). A weakly entangled state has E \approx 0 ebits; a maximally entangled Bell pair has exactly 1 ebit; higher-dimensional maximally entangled states can hold more than 1 ebit. Entanglement is a real-valued resource, not an on/off property.
Going deeper
If you understand ebits as currency, the exchange rates for teleportation, superdense coding, and entanglement swapping, and the existence of distillation and dilution rates, you have the essential resource theory. The rest of this section covers the axiomatic framework, the bound-entanglement phenomenon, the asymmetric distillable-vs-cost gap, and the device-independent certification story.
The axiomatic resource theory
Formally, entanglement resource theory specifies:
- States: all bipartite density operators \rho_{AB} on \mathcal{H}_A \otimes \mathcal{H}_B.
- Free states: separable states \rho = \sum_i p_i \sigma_i^A \otimes \tau_i^B.
- Free operations: LOCC maps (or the larger class of "non-entangling" operations).
- Entanglement measures: functions E(\rho) \geq 0 that vanish on separable states and are non-increasing under LOCC (monotones).
Candidate monotones include E_F (entanglement of formation), E_D (distillable entanglement), E_C (entanglement cost), the log-negativity E_N(\rho) = \log_2 \|\rho^{T_B}\|_1, and the squashed entanglement E_{\mathrm{sq}}. They all agree on pure states but split for mixed states. The relative order is E_D \leq E_{\mathrm{sq}} \leq E_C \leq E_F \leq E_N, with gaps possible at each step.
Bound entanglement
A state \rho_{AB} is bound entangled if E_D(\rho) = 0 but \rho is not separable. Bound entangled states are entangled — they fail separability tests and carry nontrivial correlations — but no LOCC protocol distills clean ebits from them at positive rate. Known examples:
- PPT-entangled states: entangled states whose partial transpose is positive (the Peres-Horodecki test fails to detect them). All PPT-entangled states are bound.
- NPT bound entanglement: conjectured to exist (states with non-positive partial transpose and E_D = 0) but not yet proved. Settling this is one of the central open problems in entanglement theory.
Bound entanglement is not useless. It has applications in quantum key distribution (in "locking" classical secret keys that cannot be unlocked without the full quantum state) and in quantum cryptography more broadly.
The gap E_C > E_D: irreversibility of entanglement manipulation
For pure bipartite states, E_C = E_D = E — entanglement manipulation is reversible asymptotically. For mixed states, E_C > E_D strictly for many states: making a mixed entangled state costs more ebits than you can distill from it. This is the irreversibility of entanglement — a genuine asymmetry in the resource theory that has no analogue in classical Shannon theory.
Multi-party entanglement and GHZ resources
Beyond bipartite entanglement, multi-party states like the GHZ state |\mathrm{GHZ}\rangle = \tfrac{1}{\sqrt 2}(|000\rangle + |111\rangle) carry their own resource value, incomparable with bipartite ebits. GHZ states power anonymous voting, quantum secret sharing, and multi-party leader election protocols. In the resource theory sense, |\mathrm{GHZ}\rangle is not 3 ebits of bipartite entanglement — it is a distinct resource measured by its own monotones.
Device-independent certification and the Indian connection
The CHSH game, run on trusted devices, certifies that a Bell pair is present. The deeper move is device-independent quantum key distribution (DIQKD), where Alice and Bob certify security without trusting the quantum hardware — only the observed classical statistics are used. Key steps in this line of work:
- Mayers-Yao (1998): first proposal.
- Acín, Brunner, Gisin, Massar, Pironio, Scarani (2007): full security proof.
- Pironio et al. (2010): randomness certification from Bell violations.
- ICTS Bengaluru and Raman Research Institute have active programmes in Bell-nonlocality research and device-independent cryptography, contributing to the theoretical foundations.
- ISRO's QuEST programme explored Bell-state satellite distribution, laying groundwork for DIQKD at intercontinental range.
DIQKD is the most honest use of the CHSH game: you reject any explanation of the correlations short of genuine entanglement, and you get cryptographic security that holds even if Alice's and Bob's lab devices were built by a hostile adversary. A 15-year-old running a thought experiment with Alice's and Bob's boxes can understand the essence: if the win rate is > 75\% and statistics are followed, entanglement is real, and security is provable.
The hype check
Hype check. You will see claims that "entanglement enables instant communication across the universe." It does not. You will see claims that "entanglement proves the universe is holographic." It does not directly — though holographic toy models like the AdS/CFT correspondence do use entanglement-entropy formulas, the leap from "entanglement matters in quantum gravity" to "the universe is a hologram" is a leap, not a theorem. What entanglement is is a specific, measurable resource that makes specific protocols possible and measurable non-classical correlations observable. That is extraordinary enough — no embellishment needed.
Where this leads next
- Quantum teleportation — the first exchange rate: 1 ebit + 2 cbits = 1 qubit transmitted.
- Superdense coding — the dual: 1 ebit + 1 qubit transmitted = 2 cbits.
- Entanglement swapping — extending ebits to longer range by consuming two shorter-range ebits.
- Quantum repeaters — the engineering of swapping plus distillation for practical long-distance quantum networks.
- Entanglement of formation — the ebit cost of an arbitrary mixed state; Wootters' closed form for two qubits.
- Bell theorem CHSH — the full proof that classical correlations cap at the CHSH bound and quantum correlations violate it.
References
- C. H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. A. Smolin, W. K. Wootters, Purification of Noisy Entanglement and Faithful Teleportation via Noisy Channels (1996) — arXiv:quant-ph/9511027. Entanglement distillation and the DEJMPS protocol.
- W. K. Wootters, Entanglement of Formation of an Arbitrary State of Two Qubits (1998) — arXiv:quant-ph/9709029. Concurrence and the closed-form two-qubit entanglement of formation.
- R. Horodecki, P. Horodecki, M. Horodecki, K. Horodecki, Quantum entanglement — review article (2009) — arXiv:quant-ph/0702225. Comprehensive modern treatment of entanglement measures, distillation, and bound entanglement.
- John Preskill, Lecture Notes on Quantum Computation, Ch. 4 (Quantum entanglement) — theory.caltech.edu/~preskill/ph229. Clean introduction to entanglement as a resource.
- A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, V. Scarani, Device-independent security of quantum cryptography against collective attacks (2007) — arXiv:quant-ph/0702152. CHSH-based device-independent security.
- Wikipedia, Quantum entanglement — summary of formal definitions, Bell inequalities, and resource-theoretic measures.