# Quantum cloning of mixed states in symmetric subspaces

@article{Fan2003QuantumCO,
title={Quantum cloning of mixed states in symmetric subspaces},
author={Heng Fan},
journal={Physical Review A},
year={2003},
volume={68},
pages={054301}
}
• H. Fan
• Published 11 August 2003
• Computer Science
• Physical Review A
Quantum-cloning machine for arbitrary mixed states in symmetric subspaces is proposed. This quantum-cloning machine can be used to copy part of the output state of another quantum-cloning machine and is useful in quantum computation and quantum information. The shrinking factor of this quantum cloning achieves the well-known upper bound. When the input is identical pure states, two different fidelities of this cloning machine are optimal.
16 Citations
Quantum Cloning Machines
This Chapter is a review of various quantum cloning machines. The author focuses on several well-studied quantum cloning machines: universal quantum cloning machines, phase-covariant quantum cloning
Assisted Cloning and Orthogonal Complementing of an Arbitrary Unknown Two-Qubit Entangled State
• Physics
• 2006
Based on A.K. Pati's original idea [Phys. Rev. A 61 (2000) 022308] on single-qubit-state-assisted clone, very recently Zhan has proposed two assisted quantum cloning protocols of a special class of
SCHEME FOR QUANTUM CLONING OF AN UNKNOWN N-PARTICLE ENTANGLED STATE WITH ASSISTANCE
• Physics
• 2008
In this paper, we present a scheme which can realize quantum cloning of an unknown N-particle entangled state and its orthogonal complement state with assistance offered by a state preparer. The
Scheme for Implementing Assisted Cloning of an Unknown d-Dimension Equatorial Quantum State by Remote State Preparation
• Mathematics
• 2009
A protocol is proposed that can produce perfect copy of an unknown d-dimensional equatorial quantum state with assistance from a state preparer and the maximally and non-maximally entangled bipartite d- dimensional of states are used as the quantum channels.
Assisted Cloning and Orthogonal Complementing of an Arbitrary Unknown Two-qubit Entangled State via Positive Operator-valued Measure
By using positive operator-valued measure (POVM) instead of the more commonly used collective unitary operation in the quantum teleportation process, Zhan’s scheme (Zhan in Phys. Lett. A 336:317,
SCHEME FOR IMPLEMENTING ASSISTED CLONING OF AN UNKNOWN BIPARTITE THREE-DIMENSION EQUATORIAL ENTANGLED STATE
• Computer Science
• 2007
In this paper, we proposed a protocol which can produce a perfect copy of an unknown bipartite three-dimension equatorial entangled state with assistance from a state preparer. In this protocol, the
SCHEME FOR IMPLEMENTING ASSISTED CLONING OF AN UNKNOWN BIPARTITE D-DIMENSION EQUATORIAL ENTANGLED STATE
• Mathematics
• 2008
In this paper, we proposed a protocol which can produce a perfect copy of an unknown bipartite d-dimension equatorial entangled state with assistance from a state preparer. In this protocol, the
Scheme for Cloning an Unknown Entangled State with Assistance via Non-maximally Entangled Cluster States
• Physics
• 2009
We propose a scheme for cloning unknown two-particle entangled state and its orthogonal complement state with assistance from a state preparer. Two stages were included in this scheme. The first
Partitioned trace distances
New quantum distance is introduced as a half-sum of several singular values of difference between two density operators. This is, up to factor, the metric induced by so-called Ky Fan norm. The

## References

SHOWING 1-10 OF 14 REFERENCES
Pauli cloning of a quantum Bit
• Cerf
• Physics
Physical review letters
• 2000
A family of asymmetric quantum cloning machines is introduced that produce two approximate copies of a single quantum bit, each copy emerging from a Pauli channel. A no-cloning inequality is derived,
UNIVERSAL OPTIMAL CLONING OF ARBITRARY QUANTUM STATES : FROM QUBITS TO QUANTUM REGISTERS
• Physics
• 1998
We present the universal cloning transformation of states in arbitrary-dimensional Hilbert spaces. This unitary transformation attains the optimal fidelity of cloning as specified by Werner [Phys.
Optimal Universal Quantum Cloning and State Estimation
• Physics
• 1998
We derive a tight upper bound for the fidelity of a universal N ! M qubit cloner, valid for any M \$ N, where the output of the cloner is required to be supported on the symmetric subspace. Our proof
Optimal Quantum Cloning Machines
• Computer Science
• 1997
Quantum Cloning Machines (QCM) are universal devices to translate quantum information into classical information and it is proved that the fidelity (quality) of these copies is optimal.
OPTIMAL CLONING OF PURE STATES
We construct the unique optimal quantum device for turning a finite number of d-level quantum systems in the same unknown pure state \sigma into M systems of the same kind, in an approximation of the
Quantum copying: Beyond the no-cloning theorem.
• Physics
Physical review. A, Atomic, molecular, and optical physics
• 1996
It is shown that there exists a ‘‘universal quantum-copying machine’’ ~i.e., transformation! which approximately copies quantum-mechanical states such that the quality of its output does not depend on the input.
Asymmetric quantum cloning in any dimension
Abstract A family of asymmetric cloning machines for N-dimensional quantum states is introduced. These machines produce two imperfect copies of a single state that emerge from non-identical
Security of quantum key distribution using d-level systems.
• Computer Science, Mathematics
Physical review letters
• 2002
The information gained by a potential eavesdropper applying a cloning-based individual attack is derived, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.
A single quantum cannot be cloned
• Physics
Nature
• 1982
If a photon of definite polarization encounters an excited atom, there is typically some nonvanishing probability that the atom will emit a second photon by stimulated emission. Such a photon is
Quantum Computation and Quantum Information
• Physics, Computer Science
• 2000
This chapter discusses quantum information theory, public-key cryptography and the RSA cryptosystem, and the proof of Lieb's theorem.