Phase Co-variant Cloning: Difference between revisions

From Quantum Protocol Zoo
Jump to navigation Jump to search
 
Line 48: Line 48:
<math>U_{pca} = F_A \mathbb{I}_{ABM} + (1-F_A)\sigma_z \otimes \sigma_z \otimes \mathbb{I} + \sqrt{F_A(1-F_A)}(\sigma_x \otimes \sigma_x + \sigma_y \otimes \sigma_y)\otimes \mathbb{I}</math>
<math>U_{pca} = F_A \mathbb{I}_{ABM} + (1-F_A)\sigma_z \otimes \sigma_z \otimes \mathbb{I} + \sqrt{F_A(1-F_A)}(\sigma_x \otimes \sigma_x + \sigma_y \otimes \sigma_y)\otimes \mathbb{I}</math>


==Pseudocode==
==Protocol Description==
===General Information===
===General Information===
*The to-be-cloned states of the phase-covariant cloner are equatorial states of the form:</br>
*The to-be-cloned states of the phase-covariant cloner are equatorial states of the form:</br>

Latest revision as of 13:01, 12 July 2019

This protocol achieves the functionality of Quantum Cloning Machine (QCM). Phase-covariant cloning describes is a special state-dependent cloning which is able to make copies of a specific class of input states which satisfy a certain condition. For qubits, a phase-covariant cloner is a machine which is able to clone equatorial states ( states whose vector lies in the equator plane of the Bloch sphere). There are different phase-covariant cloning protocols for qubits. It can be done with or without an extra ancilla state and also asymmetric or symmetric. Generally, the state-dependent cloning protocol is asymmetric, meaning that copies have different fidelity (different qualities compared to the original state) and the symmetric protocol is only a special case of the asymmetric protocol.


Tags: Non-Universal Cloning, State Dependent N-M Cloning, Building Blocks, Quantum Cloning, Non-Universal Cloning, copying quantum states, Quantum Functionality, Specific Task, Optimal or Symmetric Cloning, Probabilistic Cloning

Assumptions[edit]

  • We assume that this state-dependent QCM can only copy equatorial states effectively.
  • We assume that the transformation is a unitary transformation acting on the Hilbert space of 2 (or 3 for the with ancilla case) qubits.

Outline[edit]

Phase Variant cloner can act effectively only on states lying on the equator of Bloch sphere. These states can be described by an angle factor such as and aim of this protocol is to produce optimal copies of these states such that the fidelity of the copies in independent of . This task can be done with two types of protocol: without any ancilla (test states) and with ancilla. Both methods produce copies with same optimal fidelity.

Phase-covariant cloning without ancilla[edit]

In this case a unitary transformation acts on two input states (the original state and a blank state) and produces a two-qubit state where the subsystem of each of the copies can be extracted from it. The unitary transformation depends on the shrinking factor but not on the phase. This unitary in general acts asymmetrically but it becomes a symmetric case when shrinking factor is equal to .

Phase-covariant cloning with ancilla[edit]

In this case, the transformation acts on three qubits (the original state and a 2-quit ancilla). The protocol is done in three steps:

  1. Prepare a Bell state
  2. Perform a 3-qubit unitary
  3. Discard the extra state

The fidelity of this protocol is the same as the previous protocol. However, the output states (reduced density matrices of copies) are different.

Notation[edit]

  • Input equatorial state
  • The general map for all the phase-covariant QCMs
  • The shrinking factor, showing how the density matrix of the copies has been changed after the cloning process
  • The unitary transformation of the phase-covariant QCM without ancilla
  • The unitary transformation of the phase-covariant QCM with ancilla
  • The reduced density matrix describing the state of subsystem after the cloning process
  • The Bell state. One of the maximally entangled states for 2 qubits
  • The identity operation (matrix)
  • Pauli Operators X,Y,Z
  • The fidelity of the subsystem showing how the first(second) copy is close to the original state. In the symmetric case, fidelity of A and B are equal and the copies are identical.

Properties[edit]

  • Fidelity Claims
  1. Fidelity of the asymmetric case without ancilla case:

  1. Fidelity of the symmetric case without ancilla case: The special case of the asymmetric phase-covariant cloning with . This fidelity is larger than the fidelity of the Universal QCM:


  1. Fidelity of the general case with ancilla case: The same as the without ancilla case:

  • Case 1 (without ancilla): The state of each copy which is a subsystem of this two-qubit system is described with a density matrix which can be obtained as below




The symmetric case occurs when

  • Case 2 (with ancilla case): The unitary transformation can also be described in terms of the fidelity of one of the copies and Pauli operators:

Protocol Description[edit]

General Information[edit]

  • The to-be-cloned states of the phase-covariant cloner are equatorial states of the form:


  • Equatorial states could be written in density matrix representation as:


where and are Pauli Operators.

  • The action of a general phase-covariant QCM is described by a map $T$ acting as follows:


where is the shrinking factor. This relation holds for all , which guarantees that the cloning machine to act equally well on all the equatorial states. Now we investigate different types of the protocol:

Phase-covariant cloning without ancilla[edit]

Input: Output:

  1. Perform a unitary transformation described as follows:



Phase-covariant cloning with ancilla[edit]

Stage 1 Cloner state preparation

  1. Prepare a Bell state

Stage 2 Cloner transformation
Input:
Output:

  1. Perform the unitary transformation described as follows:






Stage 3 Discarding ancillary state

  1. Discard the extra state. mathematically, trace out the ancilla

Further Information[edit]

The phase-covariant QCM has a remarkable application in quantum cryptography since it is used for some of the eavesdropping strategies on the BB84 QKD. This is due to the fact that states which are being used as BB84 states, are equatorial states and these are the only states that the eavesdropper is interested in. Both protocols mentioned in Pseudo Code can be used for this analysis.

*contributed by Mina Doosti