Editing State Dependent N-M Cloning

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:


This protocol achieves the functionality of [[Quantum Cloning]]. A state-dependent cloner is a Quantum Cloning Machine (QCM) which is dependent on the input states. The main purpose of a state-dependent cloner is to design a QCM which produces better copies (compared to the universal QCMs) by having some partial information about the input states. We investigate the general $N \rightarrow M$ approximate state-dependent cloner which transforms two set of non-orthogonal states (consisting of N states) to M identical clones with a special constraint on the inner product of the final states. For the special case of $1 \rightarrow 2$ cloner, it is shown that, in general, this machine acts much better than the [[Quantum Cloning#Protocols|universal cloning]] protocol for two special set of states.
This [[example protocol]] achieves the functionality of [[Quantum Cloning]]. A state-dependent cloner is a Quantum Cloning Machine (QCM) which is dependent on the input states. The main purpose of a state-dependent cloner is to design a QCM which produces better copies (compared to the universal QCMs) by having some partial information about the input states. We investigate the general $N \rightarrow M$ approximate state-dependent cloner which transforms two set of non-orthogonal states (consisting of N states) to M identical clones with a special constraint on the inner product of the final states. For the special case of $1 \rightarrow 2$ cloner, it is shown that, in general, this machine acts much better than the [[Quantum Cloning#Protocols|universal cloning]] protocol for two special set of states.




'''Tags:''' [[Quantum Cloning#Protocols|Non-Universal Cloning]], [[Phase Variant Cloning]], [[Category: Building Blocks]] [[:Category: Building Blocks|Building Blocks]], [[Quantum Cloning]], [[Quantum Cloning|Non-Universal Cloning]], copying quantum states, [[:Category: Quantum Functionality|Quantum Functionality]][[Category: Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]],symmetric or [[Optimal Universal N-M Cloning|Optimal or Symmetric Cloning]], [[Probabilistic Cloning]]  
'''Tags:''' [[Quantum Cloning#Protocols|Non-Universal Cloning]], State-Dependent Cloning, [[Category: Building Blocks]] [[:Category: Building Blocks|Building Blocks]], [[Quantum Cloning]], Universal Cloning, asymmetric cloning, copying quantum states, [[:Category: Quantum Functionality|Quantum Functionality]][[Category: Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]],symmetric or [[Optimal Universal N-M Cloning|Optimal or Symmetric Cloning]], [[Probabilistic Cloning]]  
==Assumptions==
==Assumptions==
* We assume that no [[ancillary states]] (test qubits) are not needed for this state-dependent protocol.
* We assume that no [[ancillary states]] (test qubits) are not needed for this state-dependent protocol.
* We assume that this state-dependent QCM is symmetric.
* We assume that this state-dependent QCM is [[symmetric]].
* We assume that the transformation is [[unitary]], acting on the Hilbert space of <math>M</math> qubits and thus, the following relation holds between the inner product of input and output states:</br>
* We assume that the transformation is [[unitary]], acting on the Hilbert space of <math>M</math> qubits and thus, the following relation holds between the inner product of input and output states:</br>
<math>\langle\alpha_{NM}|\beta_{NM}\rangle = (\langle a|b \rangle)^N = S^N</math>
<math>\langle\alpha_{NM}|\beta_{NM}\rangle = (\langle a|b \rangle)^N = S^N</math>
* We assume that protocol is optimal on the input states meaning that it will give the maximum possible [[fidelity]] value on average for a given set of states.
* We assume that protocol is optimal on the input states meaning that it will give the maximum possible [[fidelity]] value on average for a given set of states.
==Outline==
==Outline==
This state-dependent QCM can only act effectively on two sets of states. These states are non-orthogonal (orthogonal case is trivial). For a state-dependent cloner, the only thing that we need is to perform a transformation which takes N identical input states and <math>M-N</math> blank states, to M copies such that it yields the best copies for the given special input states. It is important to note that this transformation is useful when we have a prior information about the input states.
This state-dependent QCM can only act effectively on two sets of states. These states are non-orthogonal ([[orthogonal case is trivial]]). For a state-dependent cloner, the only thing that we need is to perform a transformation which takes N identical input states and <math>M-N</math> blank states, to M copies such that it yields the best copies for the given special input states. It is important to note that this transformation is useful when we have a prior information about the input states.
==Notation==
==Notations Used==
*<math>|a\rangle, |b\rangle:</math> Two nonorthogonal input states
*<math>|a\rangle, |b\rangle:</math> Two nonorthogonal input states
*<math>S:</math> The inner (scalar) product of two input states <math>|a\rangle</math> and <math>|b\rangle</math>
*<math>S:</math> The inner (scalar) product of two input states <math>|a\rangle</math> and <math>|b\rangle</math>
Line 35: Line 35:
A and B are presented in the [[State Dependent N-M Cloning#Pseudo Code|Pseudo Code]] section.
A and B are presented in the [[State Dependent N-M Cloning#Pseudo Code|Pseudo Code]] section.


==Protocol Description==
==Pseudo Code==
'''Input:''' <math>|a\rangle^{\otimes N} \otimes |0\rangle^{\otimes M-N}</math> or <math>|b\rangle^{\otimes N} \otimes |0\rangle^{\otimes M-N}</math></br>
'''Input:''' <math>|a\rangle^{\otimes N} \otimes |0\rangle^{\otimes M-N}</math> or <math>|b\rangle^{\otimes N} \otimes |0\rangle^{\otimes M-N}</math></br>
'''Output:''' <math>|\alpha_{NM}\rangle = (A + B)|a^M\rangle + (A - B)|b^M\rangle</math> or <math>|\beta_{NM}\rangle = (A - B)|a^M\rangle + (A + B)|b^M\rangle</math>
'''Output:''' <math>|\alpha_{NM}\rangle = (A + B)|a^M\rangle + (A - B)|b^M\rangle</math> or <math>|\beta_{NM}\rangle = (A - B)|a^M\rangle + (A + B)|b^M\rangle</math>
#Perform a unitary on N input states of the form <math>|x\rangle^{\otimes N}</math>, with <math>x = a, b</math> and also on <math>(M-N)</math> blank states, which its action is discribed by:</br>
#Perform a unitary on N input states of the form <math>|x\rangle^{\otimes N}</math>, with <math>x = a, b</math> and also on <math>(M-N)</math> blank states, which its action is discribed by:</br>
<math>|\alpha_{NM}\rangle = U_{NM} (|a\rangle^{\otimes N} \otimes |0\rangle^{\otimes M-N}) = (A + B)|a^M\rangle + (A - B)|b^M\rangle</math>,</br>
<math>|\alpha_{NM}\rangle = U_{NM} (|a\rangle^{\otimes N} \otimes |0\rangle^{\otimes M-N}) = (A + B)|a^M\rangle + (A - B)|b^M\rangle</math>,</br>
<math>|\beta_{NM}\rangle = U_{NM} (|b\rangle^{\otimes N} \otimes |0\rangle^{\otimes M-N}) = (A - B)|a^M\rangle + (A + B)|b^M\rangle</math>, </br></br>
<math>|\beta_{NM}\rangle = U_{NM} (|b\rangle^{\otimes N} \otimes |0\rangle^{\otimes M-N}) = (A - B)|a^M\rangle + (A + B)|b^M\rangle</math>, </br>
where,</br>
where</br>
<math>A = \frac{1}{2}\sqrt{\frac{1 + S^N}{1 + S^M}}, \quad B = \frac{1}{2}\sqrt{\frac{1 - S^N}{1 - S^M}}</math>
<math>A = \frac{1}{2}\sqrt{\frac{1 + S^N}{1 + S^M}}, \quad B = \frac{1}{2}\sqrt{\frac{1 - S^N}{1 - S^M}}</math>


==Further Information==
==Further Information==
One of the most important applications of quantum cloning is to analyze the security of [[Quantum Key Distribution]] (QKD) protocols. Usually, an eavesdropper is supposed in QKD protocols os assumed to be able to perform any attacks, including copying of states used by parties involved in the protocol. Special states which are being used in different QKD protocols will lead to different state-dependent cloners for analyzing cloning attacks.
One of the most important applications of quantum cloning is to analyze the security of [[Quantum Key Distribution]] (QKD) protocols. Usually, an eavesdropper is supposed in QKD protocols os assumed to be able to perform any attacks, including copying of states used by parties involved in the protocol. Special states which are being used in different QKD protocols will lead to different state-dependent cloners for analyzing cloning attacks.
<div style='text-align: right;'>''*contributed by Mina Doosti''</div>
Please note that all contributions to Quantum Protocol Zoo may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Quantum Protocol Zoo:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)