
Pavel Sekatski- University of Innsbruck
Pavel Sekatski
- University of Innsbruck
About
144
Publications
7,592
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,940
Citations
Current institution
Publications
Publications (144)
Transmission loss represents a major obstacle for the demonstration of quantum Bell nonlocality over long distances and applications that rely on it, such as Device-Independent Quantum Key Distribution. In this work, we investigate the recently proposed concept of routed Bell experiments, in which one party can perform measurements either near or f...
We discuss Bell nonlocality in quantum networks with unreliable sources. Our main result is a condition on the observed data which ensures that inconclusive events can be safely discarded, without introducing any loophole. More formally, we characterize the fair-sampling property for measurements in a network. When all measurements are fair-samplin...
We consider the estimation of an unknown parameter θ through a quantum probe at thermal equilibrium. The probe is assumed to be in a Gibbs state according to its Hamiltonian H_{θ}, which is divided in a parameter-encoding term H_{θ}^{P} and an additional, parameter-independent control H^{C}. Given a fixed encoding, we find the maximal quantum Fishe...
We discuss quantum network Bell nonlocality in a setting where the network structure is not fully known. More concretely, an honest user may trust their local network topology, but not the structure of the rest of the network, involving distant (and potentially dishonest) parties. We demonstrate that quantum network nonlocality can still be demonst...
Photon loss represents a major challenge for the implementation of quantum communication protocols with untrusted devices, e.g. in the device-independent (DI) or semi-DI approaches. Determining critical loss thresholds is usually done in case-by-case studies. In the present work, we develop a general framework for characterizing the admissible leve...
We consider the selective sensing of planar waves in the presence of noise. We present different methods to control the sensitivity of a quantum sensor network, which allow one to decouple it from arbitrarily selected waves while retaining sensitivity to the signal. Comparing these methods with classical (non-entangled) sensor networks we demonstra...
We consider the estimation of an unknown parameter $\theta$ via a many-body probe. The probe is initially prepared in a product state and many-body interactions enhance its $\theta$-sensitivity during the dynamics and/or in the steady state. We present bounds on the Quantum Fisher Information, and corresponding optimal interacting Hamiltonians, for...
We consider quantum computer architectures where interactions are mediated between hot qubits that are not in their mechanical ground state. Such situations occur, e.g., when not cooling ideally, or when moving ions or atoms around. We introduce quantum gates between logically encoded systems that consist of multiple physical ones and show how the...
We report on a method to certify a unitary operation with the help of source and measurement apparatuses whose calibration throughout the certification process needs not be trusted. As in the device-independent paradigm our certification method relies on a Bell test and requires no assumption on the underlying Hilbert space dimension, but it remove...
Using quantum systems as sensors or probes has been shown to greatly improve the precision of parameter estimation by exploiting unique quantum features such as entanglement. A major task in quantum sensing is to design the optimal protocol, i.e., the most precise one. It has been solved for some specific instances of the problem, but in general ev...
We discuss quantum network Bell nonlocality in a setting where the network structure is not fully known. More concretely, an honest user may trust their local network topology, but not the structure of the rest of the network, involving distant (and potentially dishonest) parties. We demonstrate that quantum network nonlocality can still be demonst...
Bell inequalities play a key role in certifying quantum properties for device-independent quantum information protocols. It is still a major challenge, however, to devise Bell inequalities tailored for an arbitrary given quantum state. Existing approaches based on sums of squares provide results in this direction, but they are restricted by the nec...
It is well known that when two or more quantum measurements suffer from imperfections they may lose their incompatibility. For a quantum system of finite dimension d we study the incompatibility of all projective measurements subjected to white noise and loss. We derive a necessary and sufficient condition for this set of measurements to become com...
Quantum memories represent one of the main ingredients of future quantum communication networks. Their certification is therefore a key challenge. Here we develop efficient certification methods for quantum memories. Considering a device-independent approach, where no a priori characterization of sources or measurement devices is required, we devel...
This work explores the asymmetry of quantum steering in a setup using high-dimensional entanglement. We construct entangled states with the following properties: (i) one party (Bob) can never steer the state of the other party (Alice), considering the most general measurements, and (ii) Alice can strongly steer the state of Bob, in the sense of dem...
Quantum nonlocality can be demonstrated without inputs (i.e., each party using a fixed measurement setting) in a network with independent sources. Here we consider this effect on ring networks, and show that the underlying quantum strategy can be partially characterized, or self-tested, from observed correlations. Applying these results to the tria...
Bell inequalities play a key role in certifying quantum properties for device-independent quantum information protocols. It is still a major challenge, however, to devise Bell inequalities tailored for an arbitrary given quantum state. Existing approaches based on sums of squares provide results in this direction, but they are restricted by the nec...
The network scenario offers interesting new perspectives on the phenomenon of quantum nonlocality. Notably, when considering networks with independent sources, it is possible to demonstrate quantum nonlocality without the need for measurement inputs, i.e., with all parties performing a fixed quantum measurement. Here we aim to find minimal examples...
Device-independent quantum key distribution (DIQKD) reduces the vulnerability to side-channel attacks of standard quantum key distribution protocols by removing the need for characterized quantum devices. The higher security guarantees come, however, at the price of a challenging implementation. Here, we tackle the question of the conception of an...
We consider the task of multiple parameter estimation in the presence of strong correlated noise with a network of distributed sensors. We study how to find and improve noise-insensitive strategies. We show that sequentially probing GHZ states is optimal up to a factor of at most 4. This allows us to connect the problem to single parameter estimati...
The effect of quantum steering arises from the judicious combination of an entangled state with a set of incompatible measurements. Recently, it was shown that this form of quantum correlations can be quantified in terms of a dimension, leading to the notion of genuine high-dimensional steering. While this naturally connects to the dimensionality o...
Quantum memories represent one of the main ingredients of future quantum communication networks. Their certification is therefore a key challenge. Here we develop efficient certification methods for quantum memories. Considering a device-independent approach, where no a priori characterisation of sources or measurement devices is required, we devel...
We report on a method to certify a unitary operation with the help of source and measurement apparatuses whose calibration throughout the certification process needs not be trusted. As in the device-independent paradigm our certification method relies on a Bell test, but it removes the need for high detection efficiencies by including the single ad...
This work explores the asymmetry of quantum steering in a setup using high-dimensional entanglement. We construct entangled states with the following properties: $(i)$ one party (Alice) can never steer the state of the other party (Bob), considering the most general measurements, and $(ii)$ Bob can strongly steer the state of Alice, demonstrating g...
In a digital quantum simulator, basic two-qubit interactions are manipulated by means of fast local control operations to establish a desired target Hamiltonian. Here we consider a quantum simulator based on logical systems, i.e. where several physical qubits are used to represent a single logical two-level system to obtain enhanced and simple cont...
We report on an elementary quantum network of two atomic ions separated by 230 m. The ions are trapped in different buildings and connected with 520(2) m of optical fiber. At each network node, the electronic state of an ion is entangled with the polarization state of a single cavity photon; subsequent to interference of the photons at a beam split...
We consider a system of multiple qubits without any quantum control. We show that one can mediate entanglement between different subsystems in a controlled way by adding a (locally) controlled auxiliary system of the same size that couples via an always-on, distant dependent interaction to the system qubits. Solely by changing the internal state of...
One-sided confidence intervals are presented for the average of non-identical Bernoulli parameters. These confidence intervals are expressed as analytical functions of the total number of Bernoulli games won, the number of rounds and the confidence level. Tightness of these bounds in the sense of Buehler, i.e. as the strictest possible monotonic in...
The security of finite-length keys is essential for the implementation of device-independent quantum key distribution (DIQKD). Presently, there are several finite-size DIQKD security proofs, but they are mostly focused on standard DIQKD protocols and do not directly apply to the recent improved DIQKD protocols based on noisy preprocessing, random k...
Here we argue that the probability that a given source produces exactly a single photon is a natural quantity to benchmark single-photon sources as it certifies the absence of multi-photon components and quantifies the efficiency simultaneously. Moreover, this probability can be bounded simply from an auto-correlation measurement — a balanced beam...
What is the minimum time required to take a temperature? In this paper, we solve this question for a large class of processes where temperature is inferred by measuring a probe (the thermometer) weakly coupled to the sample of interest, so that the probe's evolution is well described by a quantum Markovian master equation. Considering the most gene...
We investigate the compression of quantum information with respect to a given set M of high-dimensional measurements. This leads to a notion of simulability, where we demand that the statistics obtained from M and an arbitrary quantum state ρ are recovered exactly by first compressing ρ into a lower-dimensional space, followed by some quantum measu...
Genuine multipartite entanglement represents the strongest type of entanglement, which is an essential resource for quantum information processing. Standard methods to detect genuine multipartite entanglement, e.g., entanglement witnesses, state tomography, or quantum state verification, require full knowledge of the Hilbert space dimension and pre...
Quantum nonlocality can be demonstrated without inputs (i.e. each party using a fixed measurement setting) in a network with independent sources. Here we consider this effect on ring networks, and show that the underlying quantum strategy can be partially characterized, or self-tested, from observed correlations. Applying these results to the trian...
We report on an elementary quantum network of two atomic ions separated by 230 m. The ions are trapped in different buildings and connected with 520(2) m of optical fiber. At each network node, the electronic state of an ion is entangled with the polarization state of a single cavity photon; subsequent to interference of the photons at a beamsplitt...
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization1 to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett–Brassard scheme2 provide information-theoretic security against such attacks, a much stronger form of...
The network scenario offers interesting new perspectives on the phenomenon of quantum nonlocality. Notably, when considering networks with independent sources, it is possible to demonstrate quantum nonlocality without the need for measurements inputs, i.e. with all parties performing a fixed quantum measurement. Here we aim to find minimal examples...
In a digital quantum simulator, basic two-qubit interactions are manipulated by means of fast local control operations to establish a desired target Hamiltonian. Here we consider a quantum simulator based on logical systems, i.e. where several physical qubits are used to represent a single logical two-level system to obtain enhanced and simple cont...
The effect of quantum steering arises from the judicious combination of an entangled state with a set of incompatible measurements. Recently, it was shown that this form of quantum correlations can be quantified in terms of a dimension, leading to the notion of genuine high-dimensional steering. While this naturally connects to the dimensionality o...
We consider a system of multiple qubits without any quantum control. We show that one can mediate entanglement between different subsystems in a controlled way by adding a (locally) controlled auxiliary system of the same size that couples via an always-on, distant dependent interaction to the system qubits. Solely by changing the internal state of...
We consider a receiver-device-independent (RDI) approach to quantum key distribution. Specifically, we discuss protocols for a prepare-and-measure scenario and present a detailed security analysis. The sender's (Alice's) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared quantum states. The receive...
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, b...
How can a multipartite single-photon path-entangled state be certified efficiently by means of local measurements? We address this question by constructing an entanglement witness based on local photon detections preceded by displacement operations to reveal genuine multipartite entanglement. Our witness is defined as a sum of three observables tha...
We investigate the compression of quantum information with respect to a given set $\mathcal{M}$ of high-dimensional measurements. This leads to a notion of simulability, where we demand that the statistics obtained from $\mathcal{M}$ and an arbitrary quantum state $\rho$ are recovered exactly by first compressing $\rho$ into a lower dimensional spa...
Device-independent certification, also known as self-testing, aims at guaranteeing the proper functioning of untrusted and uncharacterized devices. For example, the quality of an unknown source expected to produce two-qubit maximally entangled states can be evaluated in a bipartite scenario, each party using two binary measurements. The most robust...
We consider the sensing of scalar valued fields with specific spatial dependence using a network of sensors, e.g. multiple atoms located at different positions within a trap. We show how to harness the spatial correlations to sense only a specific signal, and be insensitive to others at different positions or with unequal spatial dependence by cons...
Here we argue that the probability that a given source produces exactly a single photon is a natural quantity to benchmark single-photon sources as it certifies the no production of multi-photon states and quantifies the efficiency simultaneously. Moreover, this probability can be bounded simply from an auto-correlation measurement -- a balanced be...
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorisation to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols like the one proposed by Bennett and Brassard provide information-theoretic security against such attacks, a much stronger...
Genuine multipartite entanglement represents the strongest type of entanglement, which is an essential resource for quantum information processing. Standard methods to detect genuine multipartite entanglement, e.g., entanglement witnesses, state tomography, or quantum state verification, require full knowledge of the Hilbert space dimension and pre...
The efficient generation of high-fidelity entangled states is the key element for long-distance quantum communication, quantum computation, and other quantum technologies, and at the same time the most resource-consuming part in many schemes. We present a class of entanglement-assisted entanglement purification protocols that can generate high-fide...
We consider entanglement purification protocols for multiple copies of qubit states. We use high-dimensional auxiliary entangled systems to learn about the number and positions of errors in the noisy ensemble in an explicit and controlled way, thereby reducing the amount of noise in the ensemble and purifying the remaining states. This allows us to...
What is the minimum time required to take the temperature? In this paper, we solve this question for any process where temperature is inferred by measuring a probe (the thermometer) weakly coupled to the sample of interest, so that the probe's evolution is well described by a quantum Markovian master equation. Considering the most general control s...
We consider the sensing of scalar valued fields with specific spatial dependence using a network of sensors, e.g. multiple atoms located at different positions within a trap. We show how to harness the spatial correlations to sense only a specific signal, and be insensitive to others at different positions or with unequal spatial dependence by cons...
We investigate a class of partially device-independent quantum key distribution protocols based on a prepare-and-measure setup which simplifies their implementation. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, but no explicit bound on the Hilbert space dimension is required. The proto...
Device-independent quantum key distribution aims at providing security guarantees even when using largely uncharacterised devices. In the simplest scenario, these guarantees are derived from the CHSH score, which is a simple linear combination of four correlation functions. We here derive a security proof from a generalisation of the CHSH score, wh...
How can a multipartite single-photon path-entangled state be certified efficiently by means of local measurements? We address this question by constructing an entanglement witness based on local photon detections preceded by displacement operations to reveal genuine multipartite entanglement. Our witness is defined as a sum of two observables that...
Self-testing is a method to certify devices from the result of a Bell test. Although examples of noise tolerant self-testing are known, it is not clear how to deal efficiently with a finite number of experimental trials to certify the average quality of a device without assuming that it behaves identically at each run. As a result, existing self-te...
The security of finite-length keys is essential for the implementation of device-independent quantum key distribution (DIQKD). Presently, there are several finite-size DIQKD security proofs, but they are mostly focused on standard DIQKD protocols and do not directly apply to the recent improved DIQKD protocols based on noisy preprocessing, random k...
Trapped atomic ions embedded in optical cavities are a promising platform to enable long-distance quantum networks and their most far-reaching applications. Here we achieve and analyze photon indistinguishability in a telecom-converted ion-cavity system. First, two-photon interference of cavity photons at their ion-resonant wavelength is observed a...
We consider entanglement purification protocols for multiple copies of qubit states. We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble in an explicit and controlled way, thereby reducing the amount of noise in the ensemble and purifying the remaining states. This allows us to des...
The efficient generation of high-fidelity entangled states is the key element for long-distance quantum communication, quantum computation and other quantum technologies, and at the same time the most resource-consuming part in many schemes. We present a new class of entanglement-assisted entanglement purification protocols that can generate high-f...
Device-independent certification, also known as self-testing, aims at guaranteeing the proper functioning of untrusted and uncharacterized devices. For example, the quality of an unknown source expected to produce two-qubit maximally entangled states can be evaluated in a bi-partite scenario, each party using two binary measurements. The most robus...
Finding optical setups producing measurement results with a targeted probability distribution is hard, as a priori the number of possible experimental implementations grows exponentially with the number of modes and the number of devices. To tackle this complexity, we introduce a method combining reinforcement learning and simulated annealing enabl...
We report the experimental realization of heralded distribution of single-photon path entanglement at telecommunication wavelengths in a repeater-like architecture. The entanglement is established upon detection of a single photon, originating from one of two spontaneous parametric down-conversion photon pair sources, after erasing the photon's whi...
Device-independent quantum key distribution aims at providing security guarantees even when using largely uncharacterised devices. In the simplest scenario, these guarantees are derived from the CHSH score, which is a simple linear combination of four correlation functions. We here derive a security proof from a generalisation of the CHSH score, wh...
We consider non-local sensing of scalar signals with specific spatial dependence in the Bayesian regime. We design schemes that allow one to achieve optimal scaling and are immune to noise sources with a different spatial dependence than the signal. This is achieved by using a sensor array of spatially separated sensors and constructing a multi-dim...
Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i....
Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i....
Finding optical setups producing measurement results with a targeted probability distribution is hard as a priori the number of possible experimental implementations grows exponentially with the number of modes and the number of devices. To tackle this complexity, we introduce a method combining reinforcement learning and simulated annealing enabli...
We report the experimental realization of heralded distribution of single-photon path entanglement at telecommunication wavelengths in a repeater-like architecture. The entanglement is established upon detection of a single photon, originating from one of two spontaneous parametric down conversion photon pair sources, after erasing the photon's whi...
We consider distributed sensing of nonlocal quantities. We introduce quantum enhanced protocols to directly measure any (scalar) field with a specific spatial dependence by placing sensors at appropriate positions and preparing a spatially distributed entangled quantum state. Our scheme has optimal Heisenberg scaling and filters out noise with diff...
A quantum state can be characterized from the violation of a Bell inequality. The well-known CHSH inequality for example can be used to quantify the fidelity (up to local isometries) of the measured state with respect to the singlet state. In this work, we look for the minimum CHSH violation leading to a non-trivial fidelity. In particular, we prov...
Among certification techniques, those based on the violation of Bell inequalities are appealing because they do not require assumptions on the underlying Hilbert space dimension and on the accuracy of calibration methods. Such device-independent techniques have been proposed to certify the quality of entangled states, unitary operations, projective...
We consider non-local sensing of scalar signals with specific spatial dependence in the Bayesian regime. We design schemes that allow one to achieve optimal scaling and are immune to noise sources with a different spatial dependence than the signal. This is achieved by using a sensor array of spatially separated sensors and constructing a multi-dim...
Device-independent certifications employ Bell tests to guarantee the proper functioning of an apparatus from the sole knowledge of observed measurement statistics, i.e. without assumptions on the internal functioning of the devices. When these Bell tests are implemented with devices having too low efficiency, one has to post-select the events that...
Trapped atomic ions embedded in optical cavities are a promising platform to enable long-distance quantum networks and their most far-reaching applications. Here we achieve and analyze photon indistinguishability in a telecom-converted ion-cavity system. First, two-photon interference of cavity photons at their ion-resonant wavelength is observed a...
Trapped atomic ions embedded in optical cavities are a promising platform to enable long-distance quantum networks and their most far-reaching applications. Here we achieve and analyze photon in-distinguishability in a telecom-converted ion-cavity system. First, two-photon interference of cavity photons at their ion-resonant wavelength is observed...
Trapped atomic ions embedded in optical cavities are a promising platform to enable long-distance quantum networks and their most far-reaching applications. Here we achieve and analyze photon in-distinguishability in a telecom-converted ion-cavity system. First, two-photon interference of cavity photons at their ion-resonant wavelength is observed...
The strong-coupling regime of cavity quantum electrodynamics (cavity QED) represents the light–matter interaction at the fully quantum level. Adding a single photon shifts the resonance frequencies, a profound nonlinearity. Cavity QED is a test bed of quantum optics and the basis of photon–photon and atom–atom entangling gates. At microwave frequen...
A quantum state can be characterized from the violation of a Bell inequality. The well-known CHSH inequality for example can be used to quantify the fidelity (up to local isometries) of the measured state with respect to the singlet state. In this work, we look for the minimum CHSH violation leading to a non-trivial fidelity. In particular, we prov...
Device-independent certifications employ Bell tests to guarantee the proper functioning of an apparatus from the sole knowledge of observed measurement statistics, i.e. without assumptions on the internal functioning of the devices. When these Bell tests are implemented with lossy devices, one has to post-select the events that lead to successful d...
We consider distributed sensing of non-local quantities. We introduce quantum enhanced protocols to directly measure any (scalar) field with a specific spatial dependence by placing sensors at appropriate positions and preparing a spatially distributed entangled quantum state. Our scheme has optimal Heisenberg scaling and is completely unaffected b...
We show that genuine multipartite entanglement of all multipartite pure states in arbitrary finite dimension can be detected in a device-independent way by employing bipartite Bell inequalities on states that are deterministically generated from the initial state via local operations. This leads to an efficient scheme for large classes of multipart...
We study the effect of local decoherence on arbitrary quantum states. Adapting techniques developed in quantum metrology, we show that the action of generic local noise processes --though arbitrarily small-- always yields a state whose Quantum Fisher Information (QFI) with respect to local observables is linear in system size N , independent of the...
Device-independent certification refers to the characterization of an apparatus without reference to the internal description of other devices. It is a trustworthy certification method, free of assumption on the underlying Hilbert space dimension and on calibration methods. We show how it can be used to quantify the quality of a Bell-state measurem...
Device-independent characterization, also known as self-testing, provides a certification of devices from the result of a Bell test that is suitable for a wide range of applications. We here show that self-testing can be used in an elementary link of a quantum network to certify the successful distribution of a Bell state over 398 meters. Being bas...
The strong-coupling regime of cavity-quantum-electrodynamics (cQED) represents light-matter interaction at the fully quantum level. Adding a single photon shifts the resonance frequencies, a profound nonlinearity. cQED is a test-bed of quantum optics and the basis of photon-photon and atom-atom entangling gates. At microwave frequencies, success in...
Among certification techniques, those based on the violation of Bell inequalities are appealing because they do not require assumptions on the underlying Hilbert space dimension and on the accuracy of calibration methods. Such device-independent techniques have been proposed to certify the quality of entangled states, unitary operations, projective...
We consider a bipartite scenario where two parties hold ensembles of $1/2$-spins which can only be measured collectively. We give numerical arguments supporting the conjecture that in this scenario no Bell inequality can be violated for arbitrary numbers of spins if only first order moment observables are available. We then give a recipe to achieve...
We show that genuine multipartite entanglement of all multipartite pure states in arbitrary finite dimension can be detected in a device-independent way by employing bipartite Bell inequalities on states that are deterministically generated from the initial state via local operations. This leads to an efficient scheme for large classes of multipart...
Device-independent certification refers to the characterization of an apparatus without reference to the internal description of other devices. It is a trustworthy certification method, free of assumption on the underlying Hilbert space dimension and on calibration methods. We show how it can be used to quantify the quality of a Bell state measurem...
We study the effect of local decoherence on arbitrary quantum states. Adapting techniques developed in quantum metrology, we show that the action of generic local noise processes -though arbitrarily small- always yields a state whose Quantum Fisher Information (QFI) with respect to local observables is linear in system size N, independent of the in...
The power of quantum computers relies on the capability of their components to maintain faithfully and process accurately quantum information. Since this property eludes classical certification methods, fundamentally new protocols are required to guarantee that elementary components are suitable for quantum computation. These protocols must be devi...
The power of quantum computers relies on the capability of their components to maintain faithfully and process accurately quantum information. Since this property eludes classical certification methods, fundamentally new protocols are required to guarantee that elementary components are suitable for quantum computation. These protocols must be devi...
Large-scale quantum effects have always played an important role in the foundations of quantum theory. With recent experimental progress and the aspiration for quantum enhanced applications, the interest in macroscopic quantum effects has been reinforced. In this review, we critically analyze and discuss measures aiming to quantify various aspects...
Large-scale quantum effects have always played an important role in the foundations of quantum theory. With recent experimental progress and the aspiration for quantum enhanced applications, the interest in macroscopic quantum effects has been reinforced. In this review, we critically analyze and discuss measures aiming to quantify various aspects...