Featured Research

from universities, journals, and other organizations

Not one, not two, not three, but four clones: First quantum cloning machine to produce four copies

Date:
November 7, 2011
Source:
Springer Science+Business Media
Summary:
Scientists in China have produced a theory for a quantum cloning machine able to produce several copies of the state of a particle at atomic or sub-atomic scale, or quantum state. The advance could have implications for quantum information processing methods used, for example, in message encryption systems.

Xi-Jun Ren and Yang Xiang from Henan Universities in China, in collaboration with Heng Fan at the Institute of Physics of the Chinese Academy of Sciences, have produced a theory for a quantum cloning machine able to produce several copies of the state of a particle at atomic or sub-atomic scale, or quantum state, in an article about to be published in The European Physical Journal D. The advance could have implications for quantum information processing methods used, for example, in message encryption systems.

Quantum cloning is difficult because quantum mechanics laws only allow for an approximate copy—not an exact copy—of an original quantum state to be made, as measuring such a state prior to its cloning would alter it.

In this study, researchers have demonstrated that it is theoretically possible to create four approximate copies of an initial quantum state, in a process called asymmetric cloning. The authors have extended previous work that was limited to quantum cloning providing only two or three copies of the original state. One key challenge was that the quality of the approximate copy decreases as the number of copies increases.

The authors were able to optimise the quality of the cloned copies, thus yielding four good approximations of the initial quantum state. They have also demonstrated that their quantum cloning machine has the advantage of being universal and therefore is able to work with any quantum state, ranging from a photon to an atom.

Assymetric quantum cloning has applications in analysing the security of messages encryption systems, based on shared secret quantum keys. Two people will know whether their communication is secure by analysing the quality of each copy of their secret key. Any third party trying to gain knowledge of that key would be detected as measuring it would disturb the state of that key.


Story Source:

The above story is based on materials provided by Springer Science+Business Media. Note: Materials may be edited for content and length.


Journal Reference:

  1. X. J. Ren, Y. Xiang, H. Fan. Optimal asymmetric 1 → 4 quantum cloning in arbitrary dimension. The European Physical Journal D, 2011; DOI: 10.1140/epjd/e2011-20370-2

Cite This Page:

Springer Science+Business Media. "Not one, not two, not three, but four clones: First quantum cloning machine to produce four copies." ScienceDaily. ScienceDaily, 7 November 2011. <www.sciencedaily.com/releases/2011/11/111106150759.htm>.
Springer Science+Business Media. (2011, November 7). Not one, not two, not three, but four clones: First quantum cloning machine to produce four copies. ScienceDaily. Retrieved July 28, 2014 from www.sciencedaily.com/releases/2011/11/111106150759.htm
Springer Science+Business Media. "Not one, not two, not three, but four clones: First quantum cloning machine to produce four copies." ScienceDaily. www.sciencedaily.com/releases/2011/11/111106150759.htm (accessed July 28, 2014).

Share This




More Computers & Math News

Monday, July 28, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Google's Next Frontier: The Human Body

Google's Next Frontier: The Human Body

Newsy (July 27, 2014) — Google is collecting genetic and molecular information to paint a picture of the perfectly healthy human. Video provided by Newsy
Powered by NewsLook.com
Cellphone Unlocking Bill Clears U.S. House, Heads to Obama

Cellphone Unlocking Bill Clears U.S. House, Heads to Obama

Reuters - US Online Video (July 27, 2014) — Congress gets rid of pesky law that made it illegal to "unlock" mobile phones without permission, giving consumers the option to use the same phone on a competitor's wireless network. Mana Rabiee reports. Video provided by Reuters
Powered by NewsLook.com
Congress OKs Unlocking Phones From Carriers

Congress OKs Unlocking Phones From Carriers

Newsy (July 26, 2014) — A bill legalizing "unlocking," or untethering a phone from its default wireless carrier, has passed Congress and is expected to be signed into law. Video provided by Newsy
Powered by NewsLook.com
Apple Acquires 'Pandora of Books' Service BookLamp

Apple Acquires 'Pandora of Books' Service BookLamp

Newsy (July 26, 2014) — Apple reportedly acquired analytics and recommendation engine BookLamp for between $10 and $15 million. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins