A single quantum cannot be cloned

From MaRDI portal
Revision as of 01:03, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5354396

DOI10.1038/299802A0zbMath1369.81022OpenAlexW2049471987WikidataQ52990517 ScholiaQ52990517MaRDI QIDQ5354396

William K. Wootters, Wojciech Hubert Zurek

Publication date: 1 September 2017

Published in: Nature (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1038/299802a0






Related Items (only showing first 100 items - show all)

Dispensing of quantum information beyond no-broadcasting theorem—is it possible to broadcast anything genuinely quantum?Evaluation of eavesdropping error-rates in higher-dimensional QKD system implemented using dynamic spatial modesBroadcasting coherence via incoherent operationsEntanglement islands, fire walls and state paradox from quantum teleportation and entanglement swappingQUANTUMNESS OF ENSEMBLE FROM NO-BROADCASTING PRINCIPLEAPPROXIMATE QUANTUM CLONING IN d DIMENSIONAL SPACESCHEME FOR QUANTUM CLONING AND QUANTUM INFORMATION PROCESSING WITH TRAPPED IONSHIERARCHICAL AND PROBABILISTIC QUANTUM STATE SHARING WITH A NONMAXIMALLY FOUR-QUBIT CLUSTER STATEQuantum cloning and teleportation fidelity in the noncommutative phase-spaceWave-particle duality employing quantum coherence in superposition with non-orthogonal pointersArbitrated quantum signature protocol with boson sampling-based random unitary encryptionEXACT REMOTE STATE PREPARATION FOR MULTIPARTIES USING DARK STATESENTANGLEMENT AND FRUSTRATION IN ORDERED SYSTEMSPHYSICS OF SINGULAR POINTS IN QUANTUM MECHANICSA QUANTUM PERCEPTRONCausal inference via string diagram surgeryTrading quantum for classical resources in quantum data compressionQuantum secret sharingQuantum anonymous voting with continuous-variable entanglement in optical frequency combCryptographic properties of the quantum hashing based on expander graphsMathematical etudes on quantum computationQuantum attribute-based encryption: a comprehensive studyOn postselective modifications of quantum observablesUniversal Global Cloning of Continuous Variables EntanglementQuantum‐Memory‐Assisted Entropic Uncertainty RelationsQuantum secret sharing protocol using GHZ state: implementation on IBM qiskitNon-commutative disintegrations: existence and uniqueness in finite dimensionsEntanglement recovery in noisy binary quantum information protocols via three-qubit quantum error correction codesQuantum algorithm for smoothed particle hydrodynamicsSpin‐Spacetime CensorshipSemi-quantum secure direct communication against collective-dephasing noiseOn the construction of new toric quantum codes and quantum burst-error-correcting codesHierarchical quantum information splitting of an arbitrary \(m\)-qudit state with multipartyA secure centralized multi-party quantum key distribution protocol with new encoding modeThe asymmetric quantum cloning regionAnalysis of single-particle nonlocality through the prism of weak measurementsPitowsky’s Epistemic Interpretation of Quantum Mechanics and the PBR TheoremThere Is More Than One Way to Skin a Cat: Quantum Information Principles in a Finite WorldProposing a Novel Method for Increasing Security in the Network CommunicationA quantum key distribution scheme based on tripartite entanglement and violation of CHSH inequalityUnnamed ItemLinear amplification and quantum cloning for non-Gaussian continuous variablesDelocalization power of global unitary operations on quantum informationInteracting quantum observables: categorical algebra and diagrammaticsRedundant information from thermal illumination: quantum Darwinism in scattered photonsAsymptotically optimal quantum channel reversal for qudit ensembles and multimode Gaussian statesA comprehensive design and performance analysis of low Earth orbit satellite quantum communicationDirected quantum communicationBeating no-go theorems by engineering defects in quantum spin modelsRELATING QUANTUM INFORMATION TO CHARGED BLACK HOLESIMPOSSIBILITY OF REVERSING OR COMPLEMENTING AN UNKNOWN QUANTUM STATE AND A GENERAL NO-CLONING PRINCIPLEHigh-dimensional quantum key distribution using polarization-phase encoding: security analysisQuantum remote control: Teleportation of unitary operationsLocal cloning of entangled qubitsCRYPTANALYSIS OF THE QSDC PROTOCOL WITHOUT USING PERFECT QUANTUM CHANNELQUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATIONInteractions and the Consistency of Black Hole ComplementarityA Pedagogical Overview of Quantum DiscordEFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLSClassical Structures Based on UnitariesBases in Diagrammatic Quantum ProtocolsRealizing various approximate quantum cloning with XY-type exchange interactions of flux qubitsQuantum Speedup and Categorical DistributivityQuantum tomography meets dynamical systems and bifurcations theoryA new description of orthogonal basesQuantum statistics of photon cloning machinesProbabilistic exact deletion of copies of two non-orthogonal statesOn a generalized peaceful coexistence of special relativity and quantum mechanicsQuantum Kolmogorov complexityFast quantum key distribution with decoy number statesНелокальное преобразование волновой функции квантовой частицы как отражение трансформации внутренней структуры распределенного в пространстве объектаTeleportation of atomic states via cavity QED for a cavity prepared in a superposition of zero and one Fock statesControlled Remote Information Concentration via GHZ-type StatesENTANGLEMENT SHARING: FROM QUBITS TO GAUSSIAN STATESQuantum image encryption based on phase-shift transform and quantum Haar wavelet packet transformNoisy Interactive Quantum CommunicationTwo efficient measurement device independent quantum dialogue protocolsAnonymous Quantum CommunicationThe compatibility dimension of quantum measurementsFrom the black hole conundrum to the structure of quantum gravityQUANTUM BIT STRING SEALINGOptimal observables for minimum-error state discrimination in general probabilistic theoriesMinimum-error state discrimination constrained by the no-signaling principleDistributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised NetworkExtremal asymmetric universal cloning machinesFinite-key security analysis for multilevel quantum key distributionSpacetime replication of continuous variable quantum informationQuantum-computing with AI & blockchain: modelling, fault tolerance and capacity schedulingOn quantum network codingThe transmission efficiency analysis for quantum secure direct communications over noisy channelsGeneral quantum theory—unification of classical and modal quantum theoriesGeometrical analysis of probabilistic quantum cloning and identification of N statesImpossibility of Distinguishing Two Preparations for a Pure State from No-signalingAtmospheric effects on satellite-mediated continuous-variable quantum key distributionQuantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)Distilling entanglement with noisy operationsThe Physical Meaning of the Holographic PrincipleIncompatibility of observables, channels and instruments in information theoriesOn optimal cloning and incompatibilityProbabilistic cloning of three real states with optimal success probabilities







This page was built for publication: A single quantum cannot be cloned