Phase Co-variant Cloning: Difference between revisions

From Quantum Protocol Zoo
Jump to navigation Jump to search
 
(12 intermediate revisions by 2 users not shown)
Line 1: Line 1:


This [[example protocol]] achieves the functionality of [[Quantum Cloning]] Machine (QCM). Phase-covariant cloning describes is a special [[State Dependent N-M Cloning|state-dependent cloning]] which is able to make copies of a specific class of input states which satisfy a certain condition. For qubits, a phase-covariant cloner is a machine which is able to clone [[equatorial states]] ( states whose vector lies in the equator <math>(x-y)</math> plane of the [[Bloch sphere]]).  There are different phase-covariant cloning protocols for qubits. It can be done with or without an extra [[ancilla]] state and also asymmetric or symmetric. Generally, the state-dependent cloning protocol is asymmetric, meaning that copies have different [[fidelity]] (different qualities compared to the original state) and the symmetric protocol is only a special case of the asymmetric protocol.
This protocol achieves the functionality of [[Quantum Cloning]] Machine (QCM). Phase-covariant cloning describes is a special [[State Dependent N-M Cloning|state-dependent cloning]] which is able to make copies of a specific class of input states which satisfy a certain condition. For qubits, a phase-covariant cloner is a machine which is able to clone equatorial states ( states whose vector lies in the equator <math>(x-y)</math> plane of the [[Bloch sphere]]).  There are different phase-covariant cloning protocols for qubits. It can be done with or without an extra [[ancilla]] state and also asymmetric or symmetric. Generally, the state-dependent cloning protocol is asymmetric, meaning that copies have different [[fidelity]] (different qualities compared to the original state) and the symmetric protocol is only a special case of the asymmetric protocol.






'''Tags:''' [[Quantum Cloning#Protocols|Non-Universal Cloning]], [[State Dependent N-M Cloning]], [[Category: Building Blocks]] [[:Category: Building Blocks|Building Blocks]], [[Quantum Cloning]], Non-Universal Cloning, copying quantum states, [[:Category: Quantum Functionality|Quantum Functionality]][[Category: Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]],[[Symmetric or Optimal Universal N-M Cloning|Optimal or Symmetric Cloning]], [[Probabilistic Cloning]]  
'''Tags:''' [[Quantum Cloning#Protocols|Non-Universal Cloning]], [[State Dependent N-M Cloning]], [[Category: Building Blocks]] [[:Category: Building Blocks|Building Blocks]], [[Quantum Cloning]], Non-Universal Cloning, copying quantum states, [[:Category: Quantum Functionality|Quantum Functionality]][[Category: Quantum Functionality]], [[:Category:Specific Task|Specific Task]][[Category:Specific Task]], [[Optimal Universal N-M Cloning|Optimal or Symmetric Cloning]], [[Probabilistic Cloning]]  
==Assumptions==
==Assumptions==
* We assume that this state-dependent QCM can only copy equatorial states effectively.
* We assume that this state-dependent QCM can only copy equatorial states effectively.
Line 12: Line 12:
===Phase-covariant cloning without ancilla===
===Phase-covariant cloning without ancilla===
In this case a unitary transformation acts on two input states (the original state and a blank state) and produces a two-qubit state where the subsystem of each of the copies can be extracted from it. The unitary transformation depends on the [[shrinking factor]] but not on the [[phase]]. This unitary in general acts asymmetrically but it becomes a symmetric case when shrinking factor is equal to <math>\pi/4</math>.
In this case a unitary transformation acts on two input states (the original state and a blank state) and produces a two-qubit state where the subsystem of each of the copies can be extracted from it. The unitary transformation depends on the shrinking factor but not on the phase. This unitary in general acts asymmetrically but it becomes a symmetric case when shrinking factor is equal to <math>\pi/4</math>.
===Phase-covariant cloning with ancilla===
===Phase-covariant cloning with ancilla===
In this case, the transformation acts on three qubits (the original state and a 2-quit ancilla). The protocol is done in three steps:
In this case, the transformation acts on three qubits (the original state and a 2-quit ancilla). The protocol is done in three steps:
Line 21: Line 21:
The fidelity of this protocol is the same as the previous protocol. However, the output states (reduced [[density matrices]] of copies) are different.
The fidelity of this protocol is the same as the previous protocol. However, the output states (reduced [[density matrices]] of copies) are different.


==Notations==
==Notation==
*<math>|\psi(\phi)\rangle = \frac{1}{\sqrt{2}} (|0\rangle + e^{i\phi}|1\rangle):</math> Input equatorial state
*<math>|\psi(\phi)\rangle = \frac{1}{\sqrt{2}} (|0\rangle + e^{i\phi}|1\rangle):</math> Input equatorial state
*<math>T:</math> The general map for all the phase-covariant QCMs
*<math>T:</math> The general map for all the phase-covariant QCMs
*<math>\eta:</math> The shrinking factor, showing how the density matrix of the copies has been changed after the cloning process
*<math>\eta:</math> The shrinking factor, showing how the density matrix of the copies has been changed after the cloning process
*<math>U_{pc}:</math> The unitary transformation of the phase-covariant QCM without ancilla
*<math>U_{pc}:</math> The unitary transformation of the phase-covariant QCM without ancilla
*<math>U_{pca}:</math> The unitary transformation of the phase-covariant QCM with ancilla
*<math>U_{pca}:</math> The unitary transformation of the phase-covariant QCM with ancilla
*<math>\rho_A, \rho_B:</math> The reduced density matrix describing the state of subsystem <math>A(B)</math> after the cloning process
*<math>\rho_A, \rho_B:</math> The reduced density matrix describing the state of subsystem <math>A(B)</math> after the cloning process
*<math>|\Phi^+\rangle = \frac{1}{\sqrt{2}}(|00\rangle + |11\rangle):</math> The Bell state. One of the [[maximally entangled]] states for 2 qubits
*<math>|\Phi^+\rangle = \frac{1}{\sqrt{2}}(|00\rangle + |11\rangle):</math> The Bell state. One of the [[maximally entangled]] states for 2 qubits
*<math>\mathbb{I}:</math> The identity operation (matrix)
*<math>\mathbb{I}:</math> The identity operation (matrix)
*<math>\sigma_x, \sigma_y, \sigma_z:</math> [[Pauli Operators]] X,Y,Z  
*<math>\sigma_x, \sigma_y, \sigma_z:</math> [[Pauli Operators]] X,Y,Z  
*<math>F_A, F_B:</math> The fidelity of the subsystem <math>A(B)</math> showing how the first(second) copy is close to the original state. In the symmetric case, these fidelities are equal and the copies are identical.
*<math>F_A, F_B:</math> The fidelity of the subsystem <math>A(B)</math> showing how the first(second) copy is close to the original state. In the symmetric case, fidelity of A and B are equal and the copies are identical.
 
==Properties==
==Properties==
*Fidelity Claims
*Fidelity Claims
Line 47: Line 48:
<math>U_{pca} = F_A \mathbb{I}_{ABM} + (1-F_A)\sigma_z \otimes \sigma_z \otimes \mathbb{I} + \sqrt{F_A(1-F_A)}(\sigma_x \otimes \sigma_x + \sigma_y \otimes \sigma_y)\otimes \mathbb{I}</math>
<math>U_{pca} = F_A \mathbb{I}_{ABM} + (1-F_A)\sigma_z \otimes \sigma_z \otimes \mathbb{I} + \sqrt{F_A(1-F_A)}(\sigma_x \otimes \sigma_x + \sigma_y \otimes \sigma_y)\otimes \mathbb{I}</math>


==Pseudo Code==
==Protocol Description==
===General Information===
===General Information===
*The to-be-cloned states of the phase-covariant cloner are equatorial states of the form:</br>
*The to-be-cloned states of the phase-covariant cloner are equatorial states of the form:</br>
Line 66: Line 67:
'''<u>Stage 1</u>''' Cloner state preparation
'''<u>Stage 1</u>''' Cloner state preparation
# Prepare a Bell state <math>|\Phi^{+}\rangle = \frac{1}{\sqrt{2}}(|00\rangle + |11\rangle)</math>
# Prepare a Bell state <math>|\Phi^{+}\rangle = \frac{1}{\sqrt{2}}(|00\rangle + |11\rangle)</math>
'''<u>stage 2</u>''' Cloner transformation</br>
'''<u>Stage 2</u>''' Cloner transformation</br>
'''Input:''' <math>|\psi(\phi)\rangle_{A}|\Phi^{+}\rangle_{BM}</math></br>
'''Input:''' <math>|\psi(\phi)\rangle_{A}|\Phi^{+}\rangle_{BM}</math></br>
'''Output:''' <math>U_{pca}|\psi(\phi)\rangle_{A}|\Phi^{+}\rangle_{BM}</br>
'''Output:''' <math>U_{pca}|\psi(\phi)\rangle_{A}|\Phi^{+}\rangle_{BM}</math></br>
# Perform the unitary transformation described as follows:</br>
# Perform the unitary transformation described as follows:</br>
<math>U_{pca}|0\rangle|0\rangle|0\rangle = |0\rangle|0\rangle|0\rangle</math></br>
<math>U_{pca}|0\rangle|0\rangle|0\rangle = |0\rangle|0\rangle|0\rangle</math></br>
<math>U_{pca}|1\rangle|0\rangle|0\rangle = (cos\eta|1\rangle|0\rangle + sin\eta|0\rangle|1\rangle)|0\rangle</math></br>
<math>U_{pca}|1\rangle|0\rangle|0\rangle = (cos\eta|1\rangle|0\rangle + sin\eta|0\rangle|1\rangle)|0\rangle</math></br>
<math>U_{pca}|0\rangle|1\rangle|1\rangle = (cos\eta|0\rangle|1\rangle + sin\eta|1\rangle|0\rangle)|1\rangle</math></br>
<math>U_{pca}|0\rangle|1\rangle|1\rangle = (cos\eta|0\rangle|1\rangle + sin\eta|1\rangle|0\rangle)|1\rangle</math></br>
<math>U_{pca}|1\rangle|1\rangle|1\rangle = |1\rangle|1\rangle|1\rangle</math></br>
<math>U_{pca}|1\rangle|1\rangle|1\rangle = |1\rangle|1\rangle|1\rangle</math></br></br>
'''<u>Stage 3</u>''' Discarding ancillary state
'''<u>Stage 3</u>''' Discarding ancillary state
# Discard the extra state. mathematically, trace out the ancilla
# Discard the extra state. mathematically, trace out the ancilla
Line 79: Line 80:
==Further Information==
==Further Information==
The phase-covariant QCM has a remarkable application in quantum cryptography since it is used for some of the eavesdropping strategies on the [[BB84 Quantum Key Distribution|BB84 QKD]]. This is due to the fact that states which are being used as BB84 states, are equatorial states and these are the only states that the eavesdropper is interested in. Both protocols mentioned in [[Phase Variant Cloning#Pseudo Code|Pseudo Code]] can be used for this analysis.
The phase-covariant QCM has a remarkable application in quantum cryptography since it is used for some of the eavesdropping strategies on the [[BB84 Quantum Key Distribution|BB84 QKD]]. This is due to the fact that states which are being used as BB84 states, are equatorial states and these are the only states that the eavesdropper is interested in. Both protocols mentioned in [[Phase Variant Cloning#Pseudo Code|Pseudo Code]] can be used for this analysis.
<div style='text-align: right;'>''*contributed by Mina Doosti''</div>

Latest revision as of 12:01, 12 July 2019

This protocol achieves the functionality of Quantum Cloning Machine (QCM). Phase-covariant cloning describes is a special state-dependent cloning which is able to make copies of a specific class of input states which satisfy a certain condition. For qubits, a phase-covariant cloner is a machine which is able to clone equatorial states ( states whose vector lies in the equator plane of the Bloch sphere). There are different phase-covariant cloning protocols for qubits. It can be done with or without an extra ancilla state and also asymmetric or symmetric. Generally, the state-dependent cloning protocol is asymmetric, meaning that copies have different fidelity (different qualities compared to the original state) and the symmetric protocol is only a special case of the asymmetric protocol.


Tags: Non-Universal Cloning, State Dependent N-M Cloning, Building Blocks, Quantum Cloning, Non-Universal Cloning, copying quantum states, Quantum Functionality, Specific Task, Optimal or Symmetric Cloning, Probabilistic Cloning

Assumptions[edit]

  • We assume that this state-dependent QCM can only copy equatorial states effectively.
  • We assume that the transformation is a unitary transformation acting on the Hilbert space of 2 (or 3 for the with ancilla case) qubits.

Outline[edit]

Phase Variant cloner can act effectively only on states lying on the equator of Bloch sphere. These states can be described by an angle factor such as and aim of this protocol is to produce optimal copies of these states such that the fidelity of the copies in independent of Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \phi} . This task can be done with two types of protocol: without any ancilla (test states) and with ancilla. Both methods produce copies with same optimal fidelity.

Phase-covariant cloning without ancilla[edit]

In this case a unitary transformation acts on two input states (the original state and a blank state) and produces a two-qubit state where the subsystem of each of the copies can be extracted from it. The unitary transformation depends on the shrinking factor but not on the phase. This unitary in general acts asymmetrically but it becomes a symmetric case when shrinking factor is equal to .

Phase-covariant cloning with ancilla[edit]

In this case, the transformation acts on three qubits (the original state and a 2-quit ancilla). The protocol is done in three steps:

  1. Prepare a Bell state
  2. Perform a 3-qubit unitary
  3. Discard the extra state

The fidelity of this protocol is the same as the previous protocol. However, the output states (reduced density matrices of copies) are different.

Notation[edit]

  • Input equatorial state
  • The general map for all the phase-covariant QCMs
  • The shrinking factor, showing how the density matrix of the copies has been changed after the cloning process
  • The unitary transformation of the phase-covariant QCM without ancilla
  • The unitary transformation of the phase-covariant QCM with ancilla
  • The reduced density matrix describing the state of subsystem after the cloning process
  • The Bell state. One of the maximally entangled states for 2 qubits
  • The identity operation (matrix)
  • Pauli Operators X,Y,Z
  • The fidelity of the subsystem showing how the first(second) copy is close to the original state. In the symmetric case, fidelity of A and B are equal and the copies are identical.

Properties[edit]

  • Fidelity Claims
  1. Fidelity of the asymmetric case without ancilla case:

  1. Fidelity of the symmetric case without ancilla case: The special case of the asymmetric phase-covariant cloning with . This fidelity is larger than the fidelity of the Universal QCM:


  1. Fidelity of the general case with ancilla case: The same as the without ancilla case:

  • Case 1 (without ancilla): The state of each copy which is a subsystem of this two-qubit system is described with a density matrix which can be obtained as below




The symmetric case occurs when

  • Case 2 (with ancilla case): The unitary transformation can also be described in terms of the fidelity of one of the copies and Pauli operators:

Protocol Description[edit]

General Information[edit]

  • The to-be-cloned states of the phase-covariant cloner are equatorial states of the form:


  • Equatorial states could be written in density matrix representation as:


where and are Pauli Operators.

  • The action of a general phase-covariant QCM is described by a map $T$ acting as follows:


where is the shrinking factor. This relation holds for all , which guarantees that the cloning machine to act equally well on all the equatorial states. Now we investigate different types of the protocol:

Phase-covariant cloning without ancilla[edit]

Input: Output:

  1. Perform a unitary transformation described as follows:



Phase-covariant cloning with ancilla[edit]

Stage 1 Cloner state preparation

  1. Prepare a Bell state

Stage 2 Cloner transformation
Input:
Output:

  1. Perform the unitary transformation described as follows:






Stage 3 Discarding ancillary state

  1. Discard the extra state. mathematically, trace out the ancilla

Further Information[edit]

The phase-covariant QCM has a remarkable application in quantum cryptography since it is used for some of the eavesdropping strategies on the BB84 QKD. This is due to the fact that states which are being used as BB84 states, are equatorial states and these are the only states that the eavesdropper is interested in. Both protocols mentioned in Pseudo Code can be used for this analysis.

*contributed by Mina Doosti