Cargando…

High-dimensional quantum cloning and applications to quantum hacking

Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited,...

Descripción completa

Detalles Bibliográficos
Autores principales: Bouchard, Frédéric, Fickler, Robert, Boyd, Robert W., Karimi, Ebrahim
Formato: Online Artículo Texto
Lenguaje:English
Publicado: American Association for the Advancement of Science 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5291699/
https://www.ncbi.nlm.nih.gov/pubmed/28168219
http://dx.doi.org/10.1126/sciadv.1601915
_version_ 1782504822732226560
author Bouchard, Frédéric
Fickler, Robert
Boyd, Robert W.
Karimi, Ebrahim
author_facet Bouchard, Frédéric
Fickler, Robert
Boyd, Robert W.
Karimi, Ebrahim
author_sort Bouchard, Frédéric
collection PubMed
description Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography.
format Online
Article
Text
id pubmed-5291699
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher American Association for the Advancement of Science
record_format MEDLINE/PubMed
spelling pubmed-52916992017-02-06 High-dimensional quantum cloning and applications to quantum hacking Bouchard, Frédéric Fickler, Robert Boyd, Robert W. Karimi, Ebrahim Sci Adv Research Articles Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography. American Association for the Advancement of Science 2017-02-03 /pmc/articles/PMC5291699/ /pubmed/28168219 http://dx.doi.org/10.1126/sciadv.1601915 Text en Copyright © 2017, The Authors http://creativecommons.org/licenses/by-nc/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial license (http://creativecommons.org/licenses/by-nc/4.0/) , which permits use, distribution, and reproduction in any medium, so long as the resultant use is not for commercial advantage and provided the original work is properly cited.
spellingShingle Research Articles
Bouchard, Frédéric
Fickler, Robert
Boyd, Robert W.
Karimi, Ebrahim
High-dimensional quantum cloning and applications to quantum hacking
title High-dimensional quantum cloning and applications to quantum hacking
title_full High-dimensional quantum cloning and applications to quantum hacking
title_fullStr High-dimensional quantum cloning and applications to quantum hacking
title_full_unstemmed High-dimensional quantum cloning and applications to quantum hacking
title_short High-dimensional quantum cloning and applications to quantum hacking
title_sort high-dimensional quantum cloning and applications to quantum hacking
topic Research Articles
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5291699/
https://www.ncbi.nlm.nih.gov/pubmed/28168219
http://dx.doi.org/10.1126/sciadv.1601915
work_keys_str_mv AT bouchardfrederic highdimensionalquantumcloningandapplicationstoquantumhacking
AT ficklerrobert highdimensionalquantumcloningandapplicationstoquantumhacking
AT boydrobertw highdimensionalquantumcloningandapplicationstoquantumhacking
AT karimiebrahim highdimensionalquantumcloningandapplicationstoquantumhacking