Cargando…
High-dimensional quantum cloning and applications to quantum hacking
Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited,...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
American Association for the Advancement of Science
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5291699/ https://www.ncbi.nlm.nih.gov/pubmed/28168219 http://dx.doi.org/10.1126/sciadv.1601915 |
_version_ | 1782504822732226560 |
---|---|
author | Bouchard, Frédéric Fickler, Robert Boyd, Robert W. Karimi, Ebrahim |
author_facet | Bouchard, Frédéric Fickler, Robert Boyd, Robert W. Karimi, Ebrahim |
author_sort | Bouchard, Frédéric |
collection | PubMed |
description | Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography. |
format | Online Article Text |
id | pubmed-5291699 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | American Association for the Advancement of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-52916992017-02-06 High-dimensional quantum cloning and applications to quantum hacking Bouchard, Frédéric Fickler, Robert Boyd, Robert W. Karimi, Ebrahim Sci Adv Research Articles Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography. American Association for the Advancement of Science 2017-02-03 /pmc/articles/PMC5291699/ /pubmed/28168219 http://dx.doi.org/10.1126/sciadv.1601915 Text en Copyright © 2017, The Authors http://creativecommons.org/licenses/by-nc/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial license (http://creativecommons.org/licenses/by-nc/4.0/) , which permits use, distribution, and reproduction in any medium, so long as the resultant use is not for commercial advantage and provided the original work is properly cited. |
spellingShingle | Research Articles Bouchard, Frédéric Fickler, Robert Boyd, Robert W. Karimi, Ebrahim High-dimensional quantum cloning and applications to quantum hacking |
title | High-dimensional quantum cloning and applications to quantum hacking |
title_full | High-dimensional quantum cloning and applications to quantum hacking |
title_fullStr | High-dimensional quantum cloning and applications to quantum hacking |
title_full_unstemmed | High-dimensional quantum cloning and applications to quantum hacking |
title_short | High-dimensional quantum cloning and applications to quantum hacking |
title_sort | high-dimensional quantum cloning and applications to quantum hacking |
topic | Research Articles |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5291699/ https://www.ncbi.nlm.nih.gov/pubmed/28168219 http://dx.doi.org/10.1126/sciadv.1601915 |
work_keys_str_mv | AT bouchardfrederic highdimensionalquantumcloningandapplicationstoquantumhacking AT ficklerrobert highdimensionalquantumcloningandapplicationstoquantumhacking AT boydrobertw highdimensionalquantumcloningandapplicationstoquantumhacking AT karimiebrahim highdimensionalquantumcloningandapplicationstoquantumhacking |