Submitted:
01 July 2025
Posted:
02 July 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Theoretical Background
2.1. The CHSH Inequality
2.2. Functional Reinterpretation
3. Methodology
3.1. Simulation Framework
- Hidden variable generator: Produces random values according to specified distributions
- Alice’s and Bob’s functions: Deterministic or probabilistic functions that map measurement settings and hidden variables to outcomes
- Correlation evaluator: Calculates expectation values and the CHSH expression over multiple trials
3.2. Function Classes
- Independent functions: No shared information ( unused)
- Shared randomness: Common access to but no other coupling
- Non-local influence: Functions that depend on both local and remote measurement settings
- Hybrid models: Combinations of the above with varying degrees of information sharing
3.3. Experimental Protocol
- Generate N instances of the hidden variable
- For each measurement setting combination , compute outcomes
- Calculate expectation values
- Evaluate the CHSH expression S
4. Results
4.1. Classical Correlations
- Independent functions: Yield , reflecting the absence of correlations
- Shared randomness with local determinism: Produce , consistent with classical bounds
4.2. Quantum-Like Violations
- Information leakage: When Bob’s function has access to Alice’s measurement setting
- Non-local coupling: Functions that explicitly depend on both measurement settings
- Adaptive strategies: Functions that modify their behavior based on shared state
4.3. Retro-Analysis of Function Structure
5. Discussion
5.1. Computational Insights
- The boundary between classical and quantum-like behavior can be precisely characterized in terms of information flow between functions
- Minimal violations of locality can be achieved with surprisingly simple computational structures
- The functional perspective naturally connects to communication complexity theory [4]
5.2. Pedagogical Applications
- Providing an intuitive computational model for understanding Bell inequalities
- Allowing students to experiment with different correlation structures
- Bridging the gap between abstract quantum mechanics and concrete programming concepts
5.3. Theoretical Implications
- Understanding the computational resources required for quantum advantage
- Exploring the relationship between information theory and quantum mechanics
- Developing new protocols for quantum communication and cryptography
6. Future Work
6.1. Formal Classification
6.2. Minimal Information Protocols
6.3. Extended Bell Scenarios
6.4. Connection to Pseudotelepathy
7. Conclusions
Acknowledgments
Appendix H Sample Implementation
References
- J.S. Bell, “On the Einstein-Podolsky-Rosen Paradox,” Physics 1, 195-200 (1964).
- J.F. Clauser, M.A. Horne, A. Shimony, and R.A. Holt, “Proposed experiment to test local hidden-variable theories,” Phys. Rev. Lett. 23, 880-884 (1969).
- G. Brassard, A. Broadbent, and A. Tapp, “Quantum pseudo-telepathy,” Found. Phys. 35, 1877-1907 (2005).
- B.F. Toner and D. Bacon, “Communication cost of simulating Bell correlations,” Phys. Rev. Lett. 91, 187904 (2003).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).