State Dependent N-M Cloning

From Quantum Protocol Zoo
Revision as of 13:01, 12 July 2019 by Shraddha (talk | contribs) (→‎Pseudocode)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

This protocol achieves the functionality of Quantum Cloning. A state-dependent cloner is a Quantum Cloning Machine (QCM) which is dependent on the input states. The main purpose of a state-dependent cloner is to design a QCM which produces better copies (compared to the universal QCMs) by having some partial information about the input states. We investigate the general $N \rightarrow M$ approximate state-dependent cloner which transforms two set of non-orthogonal states (consisting of N states) to M identical clones with a special constraint on the inner product of the final states. For the special case of $1 \rightarrow 2$ cloner, it is shown that, in general, this machine acts much better than the universal cloning protocol for two special set of states.


Tags: Non-Universal Cloning, Phase Variant Cloning, Building Blocks, Quantum Cloning, Non-Universal Cloning, copying quantum states, Quantum Functionality, Specific Task,symmetric or Optimal or Symmetric Cloning, Probabilistic Cloning

Assumptions[edit]

  • We assume that no ancillary states (test qubits) are not needed for this state-dependent protocol.
  • We assume that this state-dependent QCM is symmetric.
  • We assume that the transformation is unitary, acting on the Hilbert space of qubits and thus, the following relation holds between the inner product of input and output states:

  • We assume that protocol is optimal on the input states meaning that it will give the maximum possible fidelity value on average for a given set of states.

Outline[edit]

This state-dependent QCM can only act effectively on two sets of states. These states are non-orthogonal (orthogonal case is trivial). For a state-dependent cloner, the only thing that we need is to perform a transformation which takes N identical input states and blank states, to M copies such that it yields the best copies for the given special input states. It is important to note that this transformation is useful when we have a prior information about the input states.

Notation[edit]

  • Two nonorthogonal input states
  • The inner (scalar) product of two input states and
  • Output states produced by the state-dependent QCM acting on input states
  • The global optimal fidelity for state-dependent cloning protocol
  • The fidelity of the subsystem for state-dependent cloning protocol

Properties[edit]

  • State-dependent cloning machine only transforms a set of two non-orthogonal input states, parametrized as follows:



where and their scalar product (or inner product) is specified as .

  • The condition that transformation should be unitary adds following constraint on the scalar product of final states:

  • Fidelity Claims
    • Optimal global fidelity: The average global fidelity of the machine for both sets of input states in terms of the inner(scalar) product of the two sets will be:

    • Subsystem fidelity: The fidelity of the density matrix of the subsystem with the original state in terms of the inner product (similar fidelity for the subsystem b):


where the reduced density matrix of the subsystem (The quantum state of a subsystem in density matrix representation) is described as:

A and B are presented in the Pseudo Code section.

Protocol Description[edit]

Input: or
Output: or

  1. Perform a unitary on N input states of the form , with and also on blank states, which its action is discribed by:

,
,

where,

Further Information[edit]

One of the most important applications of quantum cloning is to analyze the security of Quantum Key Distribution (QKD) protocols. Usually, an eavesdropper is supposed in QKD protocols os assumed to be able to perform any attacks, including copying of states used by parties involved in the protocol. Special states which are being used in different QKD protocols will lead to different state-dependent cloners for analyzing cloning attacks.

*contributed by Mina Doosti