Realizing probabilistic identification and cloning of quantum states via universal quantum logic gates

Similar documents
Probabilistic quantum cloning via Greenberger-Horne-Zeilinger states

Flocks of Quantum Clones: Multiple Copying of Qubits

arxiv:quant-ph/ v5 6 Apr 2005

Probabilistic exact cloning and probabilistic no-signalling. Abstract

A Hamiltonian for Quantum Copying. Dima Mozyrsky, Vladimir Privman. Department of Physics, Clarkson University, Potsdam, NY 13699, USA.

No-cloning of nonorthogonal states does not require inner product preserving

On PPT States in C K C M C N Composite Quantum Systems

Unambiguous Discrimination Between Linearly Dependent States With Multiple Copies

arxiv: v2 [quant-ph] 7 Apr 2014

arxiv:quant-ph/ v1 28 May 1998

arxiv:quant-ph/ v2 23 Aug 2003

Quantum error correction in the presence of spontaneous emission

Perfect quantum-error-correction coding in 24 laser pulses

Multipartite entangled coherent states

Efficient and Exact Quantum Compression

Optimal copying of entangled two-qubit states

Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

Unambiguous Quantum State Discrimination

UNIVERSAL HYBRID QUANTUM PROCESSORS

arxiv:quant-ph/ v1 16 Nov 1995

Optimal Realizations of Controlled Unitary Gates

Information-geometric reconstruction of quantum theory

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

A Systematic Algorithm for Quantum Boolean Circuits Construction

Quantum Entanglement and Error Correction

TELEBROADCASTING OF ENTANGLED TWO-SPIN-1/2 STATES

arxiv:quant-ph/ v2 3 Oct 2000

arxiv: v1 [quant-ph] 17 Nov 2014

CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/2 PARTICLES

Two-mode excited entangled coherent states and their entanglement properties

Quantum Information & Quantum Computing

Extended Superposed Quantum State Initialization Using Disjoint Prime Implicants

Quantum algorithms for testing Boolean functions

ON THE ROLE OF THE BASIS OF MEASUREMENT IN QUANTUM GATE TELEPORTATION. F. V. Mendes, R. V. Ramos

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector

APPLYING QUANTUM COMPUTER FOR THE REALIZATION OF SPSA ALGORITHM Oleg Granichin, Alexey Wladimirovich

Mixed-state sensitivity of several quantum-information benchmarks

Teleportation of an n-bit one-photon and vacuum entangled GHZ cavity-field state

Imitating quantum mechanics: Qubit-based model for simulation

Quantum secret sharing based on quantum error-correcting codes

On balance of information in bipartite quantum communication systems: entanglement-energy analogy

arxiv:quant-ph/ v1 4 Mar 2005

arxiv:quant-ph/ v2 17 Jun 1996

arxiv: v2 [quant-ph] 5 Dec 2013

arxiv:quant-ph/ v3 11 Mar 2004

arxiv:quant-ph/ v2 24 Nov 2004

arxiv: v2 [quant-ph] 11 Jul 2017

Entanglement concentration for multi-atom GHZ class state via cavity QED

arxiv:quant-ph/ v2 18 Jan 2006

Theorem A.1. If A is any nonzero m x n matrix, then A is equivalent to a partitioned matrix of the form. k k n-k. m-k k m-k n-k

Bipartite and Tripartite Entanglement in a Three-Qubit Heisenberg Model

Lecture 4: Postulates of quantum mechanics

Scheme for implementing perfect quantum teleportation with four-qubit entangled states in cavity quantum electrodynamics

PHY305: Notes on Entanglement and the Density Matrix

arxiv:quant-ph/ v1 24 Mar 1995

A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo

Quantum-controlled measurement device for quantum-state discrimination

FINDING DECOMPOSITIONS OF A CLASS OF SEPARABLE STATES

arxiv:quant-ph/ v1 8 Oct 2002

arxiv:quant-ph/ v1 12 Nov 1999

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick

Phys 201. Matrices and Determinants

A scheme for protecting one-qubit information against erasure. error. Abstract

Transmitting and Hiding Quantum Information

Matrices. Chapter What is a Matrix? We review the basic matrix operations. An array of numbers a a 1n A = a m1...

arxiv: v3 [quant-ph] 12 Jun 2018

Quantum Circuits and Algorithms

ENTANGLED STATES ARISING FROM INDECOMPOSABLE POSITIVE LINEAR MAPS. 1. Introduction

Basics on quantum information

Optimal probabilistic cloning and purification of quantum states

Investigating the Complexity of Various Quantum Incrementer Circuits. Presented by: Carlos Manuel Torres Jr. Mentor: Dr.

1 Multiply Eq. E i by λ 0: (λe i ) (E i ) 2 Multiply Eq. E j by λ and add to Eq. E i : (E i + λe j ) (E i )

An Analog Analogue of a Digital Quantum Computation

MATH 423 Linear Algebra II Lecture 33: Diagonalization of normal operators.

Lecture 3: Hilbert spaces, tensor products

Quantum Cloning WOOTTERS-ZUREK CLONER

Realization of Two-Qutrit Quantum Gates with Control Pulses

ROM-BASED COMPUTATION: QUANTUM VERSUS CLASSICAL

Simple scheme for efficient linear optics quantum gates

MAT 2037 LINEAR ALGEBRA I web:

Unitary Dynamics and Quantum Circuits

arxiv:quant-ph/ v1 16 Jan 2006

Grover Algorithm Applied to Four Qubits System

Equal Superposition Transformations and Quantum Random Walks

Diagonalization by a unitary similarity transformation

Matrix Arithmetic. j=1

arxiv:quant-ph/ v1 1 Jun 2000

arxiv:quant-ph/ v1 24 Aug 2006

arxiv: v1 [quant-ph] 17 Dec 2007

arxiv: v3 [quant-ph] 30 Oct 2017

Quantum key distribution with 2-bit quantum codes

Theory of Quantum Entanglement

Chapter 2 The Density Matrix

A simple quantum channel having superadditivity of channel capacity

. =. a i1 x 1 + a i2 x 2 + a in x n = b i. a 11 a 12 a 1n a 21 a 22 a 1n. i1 a i2 a in

Chapter 2. Linear Algebra. rather simple and learning them will eventually allow us to explain the strange results of

Math113: Linear Algebra. Beifang Chen

Quantum Gates, Circuits & Teleportation

Errata list, Nielsen & Chuang. rrata/errata.html

Transcription:

Realizing probabilistic identification and cloning of quantum states via universal quantum logic gates Chuan-Wei Zhang, Zi-Yang Wang, Chuan-Feng Li,* and Guang-Can Guo Laboratory of Quantum Communication and Quantum Computation and Department of Physics, University of Science and Technology of China, Hefei 3006, People s Republic of China Received 18 June 1999; revised manuscript received 7 September 1999; published 16 May 000 Probabilistic quantum cloning and identifying machines can be constructed via unitary-reduction processes Duan and Guo, Phys. Rev. Lett. 80, 4999 1998. Given the cloning identifying probabilities, we derive an explicit representation of the unitary evolution and corresponding Hamiltonian to realize probabilistic cloning identification. The logic networks are obtained by decomposing the unitary representation into universal quantum logic operations. The robustness of the networks is also discussed. Our method is suitable for a k-partite system, such as quantum computer, and may be generalized to general state-dependent cloning and identification. PACS numbers: 03.67.a, 03.65.Bz, 89.70.c PHYSICAL REVIEW A, VOLUME 61, 06310 I. INTRODUCTION Quantum no-cloning theorem 1, which asserts that unknown pure states cannot be reproduced exactly by any physical means, is one of the most astonishing features of quantum mechanics. Wootters and Zurek 1 have shown that the cloning machine violates the quantum superposition principle. Yuen and D Ariano,3 showed that a violation of unitarity makes the cloning of two nonorthogonal states impossible. Barnum et al. 4 have extended such results to the case of mixed states and shown that two noncommuting mixed states cannot be broadcast. Furthermore, Koashi and Imoto 5 generalized the standard no-cloning theorem to the entangled states. The similar problem exists in the situation of identifying an arbitrary unknown state 6. Since perfect quantum cloning and identification are impossible, the inaccurate cloning and identification of quantum states have attracted much attention with the development of quantum information theory 7. The inaccurate cloning and identification may be divided into two main categories: deterministic and probabilistic. The deterministic quantum cloning machine generates approximate copies and further we get two subcategories: universal and state-dependent. Universal quantum cloning machines, first addressed by Bužek and Hillery 8, act on any unknown quantum state and produce approximate copies equally well. The Bužek-Hillery cloning machine has been optimized and generalized in Refs. 9 13. Massar and Popescu 14 and Derka et al. 15 have also considered the problem of universal states estimation, given M independent realizations. The deterministic state-dependent cloning machine, proposed originally by Hillery and Bužek 16, isdesigned to generate approximate clones of states belonging to a finite set. Optimal results for two-state cloning have been obtained by Bruß et al. 10 and Chelfes and Barnett 17. Deterministic exact cloning violates the no-cloning theorem, thus faithful cloning must be probabilistic. The probabilistic *Electronic address: cfli@ustc.edu.cn Electronic address: gcguo@ustc.edu.cn cloning machine was first considered by Duan and Guo 18,19 using a general unitary-reduction operation with a postselection of the measurement results. They showed that a set of nonorthogonal but linear-independent pure states can be faithfully cloned with optimal success probability. Recently, Chelfes and Barnett 17 presented the idea of hybrid cloning, which interpolates between deterministic and probabilistic cloning of a two-state system. In addition, we 0 have provided general identifying strategies for statedependent system. Clearly, it is important to obtain a physical means to carry out this cloning and identification. Quantum networks for universal cloning have been proposed by Bužek et al. 1. Chelfes and Barnett 17 have constructed the cloning machine in a two-state system. In this paper we provide a method to realize probabilistic identification and cloning for an n-state system. The method is also applicable to general cloning and identification of state-dependent systems. As any unitary evolution can be accomplished via universal quantum logic gates,3, the key to realizing probabilistic identification and cloning is to obtain the unitary representation or the Hamiltonian of the evolution in the machines. We derive the explicit unitary representation and the Hamiltonian which are determined by the probabilities of cloning or identification. Furthermore, we obtain the logic networks of probabilistic cloning and identification by decomposing the unitary representation into universal quantum logic operations. The robustness of the networks is also discussed. The plan of the paper is the following. In Sec. II we derive the unitary representation matrix and Hamiltonian for quantum identification provided with one copy and generalize this method to M N quantum cloning and identification with M initial copies. For the special case of a quantum computer, we should be concerned with the system which includes k partites, each of them being an arbitrary two-state quantum system qubit. The identification and cloning in such k-partite quantum systems have more prospective applications, which include normal qubits and multipartite entangled states. In Sec. III, we provide the networks of probabilistic cloning and identification of k-partite systems and discuss their stability properties. 1050-947/000/616/063109/$15.00 61 06310-1 000 The American Physical Society

ZHANG, WANG, LI, AND GUO PHYSICAL REVIEW A 61 06310 II. UNITARY EVOLUTIONS AND HAMILTONIANS FOR IDENTIFICATION AND CLONE Any operation in quantum mechanics can be represented by a unitary evolution together with a measurement. Considering the states secretly chosen from the set S i,i 1,,...,n which span an n-dimensional Hilbert space, Duan and Guo 19 have shown that these states can be probabilistically cloned by a general unitary-reduction operation if and only if 1,,..., n are linearindependent. By introducing a probe P in an n P -dimensional Hilbert space, where n P n1, the unitary evolution Û in the M N probabilistic cloning machine can be written as follows: Û i M 1 (NM) P 0 i i N P i j C ij j 1 (NM) P 0,.1 where P 0 and P i are normalized states of the probe system not generally orthogonal, but each of P i is orthogonal to P 0 ), and i M i 1 i i M ( i k is the kth copy of state i ). The n-dimensional Hilbert spaces spanned by state sets i, i M,or i N P i are denoted by H, H M, and H N, respectively, and i, i, and i are the orthogonal bases of each space. The probe P is measured after the evolution. With probability i, the cloning attempt succeeds and the output state is i N if and only if the measurement result of the probe is P i. The nn inter-inner products of Eq..1 yield the matrix equation X (M) X P (N) CC,. where the nn matrices are CC ij, X (M) i j M, and X P (N) i j N P i P j. The diagonal efficiency matrix is defined as diag( 1,,..., n ). Since CC 0 (CC is positive semidefinite, Eq.. yields X (M) X P (N) 0..3 This inequality determines the optimal cloning efficiencies. For example, when n, we get 17 1 1 1 M max 1 1 N P 1 P 1 M 1 1 1. N P i.4 In the limit as N, the M N probabilistic clone has a close connection with the problem of identification of a set of states. That is, Eq..1 is applicable to describe the probabilistic identification evolution, since i, i 1,,...,n are the orthogonal bases of n -dimension Hilbert space. Inequality.3 turns into X (M) 0, and inequality.4 results in ( 1 )/1 1 M, which is the maximum identification probability when n, with M initial copies. In fact, there is a trade-off between identification and cloning. When the probe states P i are orthogonal to each other, we can identify and clone the input states simultaneously. When P i are the same for all the to-becloned states, we obtain no information about the input states and the probabilities of successful clone approach the maximum. For a normal situation interpolating between the cloning and identification, where states P i P j exist, we can identify them with no-zero probability and get some information about the input, which means the cloning probabilities must decrease. Now that the existence of probabilistic cloning and identifying machines has been demonstrated, the next step is to determine the representations of the unitary evolution Û for the cloning and identifying machines with the given probability matrix. To simplify the deduction, we start with probabilistic identification of one initial copy. A unitary evolution Û is utilized to identify i, Û i P 0 i i P 1 j C ij j P 0,.5 where P 0 and P 1 are the orthogonal bases of the probe system. If a postselective measurement of probe P results in P 0, the identification fails. Otherwise we make a further measurement of the to-be-identified system and if k is detected, the input state should be identified as k. The inter-inner products of Eq..5 yield the matrix equation XCC. Denoting matrix A i j nn, we get XA A..6.7 Obviously A is reversible. Since i P 0 n m P 0 m i, Eq..5 can be rewritten as m1 Û 1 P 0,..., n P 0 ) 1 P 1,..., n P 1 )A 1 1 P 0,..., n P 0 )C A 1. On the orthogonal bases i P j,i1,,...,n, j0,1 in Hilbert space H AP H H P, Û can be represented as U C A 1 M A 1,.8 N where M,N are nn matrices. In Appendix A, we derive the expressions of the four submatrices in Eq..8 and get UṼSṼ, where Ṽdiag(V,V), S F E E F.9 06310-

REALIZING PROBABILISTIC IDENTIFICATION AND... PHYSICAL REVIEW A 61 06310 with Ediag(m 1,...,m n ), and F diag(1m 1,...,1m n ). V and m i are determined by I n C X 1 CV diagm 1,...,m n V..10 Since the coefficient matrix C can be deduced from Eq..6, the parameters V and m i,i1,...,n are determined by the probabilities i,i1,...,n. Hence, the representation U is obtained from the given probabilities. The expressions of E and F require 0m i 1, i1,,...,n. In Appendix A we show a more strict limitation 0m i 1. Equation.9 is fundamental in obtaining the Hamiltonian and realizing a quantum probabilistic identifying machine. Based on this representation, we use the following method to derive the corresponding Hamiltonian. We adopt the approach in the quantum computation literature of assuming that a constant Hamiltonian H acts during a short time interval t. Here we only consider evolution from t to tt. The time interval is then related to the strength of couplings in H, which are of the order /t. Under this condition we deduce H with Ue iht/..11 The unitary representation U in Eq..9 can be diagnolized by interchanging the columns and rows of the matrix refer to Appendix B as UO diage i 1,e i 1,...,e i n,e i no,.1 where O is a unitary matrix and j, j1,...,n are determined by e i j1m j im j 0 j..13 Comparing Eq..1 with Eq..11, the eigenvalues E k of the Hamiltonians should be E k k t N k,.14 t where N k are arbitrary integers. H can be represented as HO diage 1,E 1,...,E n,e n O..15 Now we have successfully derived the diagonalized representation and Hamiltonian of the evolution described by Eq..5, which are essential to realizing the identification via universal quantum logic gates. We will extend the result to M-initial-copy identification and M N cloning in a similar way. In the situation of probabilistic identification with M initial copies, we generalize Eq..5 to Û i M P 0 i ip 1 j C ij j P 0,.16 where i,i1,,...,n is a set of orthogonal states in n M -dimensional Hilbert space H M. With the method mentioned above, we can prove that U has the same representation as that in Eq..9 on different orthogonal bases i P 0, jp 1,i, j1,,...,n, where the definitions of V, m i, E, and F are also the same as that of Eq..9. However, they are different in fact because the determining condition Eq..10 turns into I n C X (M) 1 CV diagm 1,...,m n V..17 As to M N probabilistic cloning, the unitary evolution equation is Eq..1. Under the same condition of Eq..17 but different orthogonal bases i 1 (NM) P 0, i,i1,,...,n, U may still be represented as that in Eq..9. We notice that in different situations for probabilistic identification and cloning, the unitary representation and Hamiltonian are of the same form. However, since the determining conditions are different, the values of V, m i, i, and E k are different as well. The unitary representations and Hamiltonians of different identifications and clones are based on different bases. All these show that these Û or Ĥ are actually different. In this section, we choose appropriate orthogonal bases and represent the n N -dimensional unitary evolution as Eq..9 inan-dimensional subspace. In the subspace orthogonal to such n-dimensional subspace, UI. III. NETWORKS OF PROBABILISTIC CLONING AND IDENTIFICATION IN A k-partite SYSTEM So far we have derived the explicit representation of the unitary evolutions for quantum probabilistic cloning and identification. The next problem is how to realize these cloning and identifying transformations by physical means. The fundamental unit of quantum information transmission is the quantum bit qubit, i.e., a two-state quantum system, which is capable of existing in a superposition of Boolean states and of being entangled with one another. Just as classical bit strings can represent the discrete states of arbitrary finite dimensionality, a string of k qubits can be used to represent quantum states in any k -dimensional Hilbert space. Obviously there exist k linear-independent states in such a k-partite system. In this section we apply the method provided in Sec. II to this special system and realize probabilistic cloning and identification of an arbitrary state secretly chosen from a linear-independent state set via universal logic gates. This solution may be essential to the realization of a quantum computer. 06310-3

ZHANG, WANG, LI, AND GUO PHYSICAL REVIEW A 61 06310 A. Some basic ideas and notations Quantum logic gates have the same number of input and output qubits and a k -qubit gate carries out a unitary operation of the group U( k ), i.e., a generalized rotation in a k -dimensional Hilbert space. The formalism we use for quantum computation, which is called a quantum gate array, was introduced by Deutsch, who showed that a simple generalization of the Toffoli gate is sufficient as a universal gate for quantum computation. We introduce this gate as follows. For any unitary matrix U u 00 u 01 u 10 u 11 and m0,1,,..., the matrix corresponding to the (m 1) -bit operation is m (U)diag(I m,u), where the bases are lexicographically ordered, i.e., 000,001,...,111. For a general U, m (U) can be regarded as a generalization of the Toffoli gate, which, on the m1 input bits, applies U to the (m1)th bit if and only if the other m bits are all on state 1. Barenco et al. 3 have further demonstrated that arbitrary m (U) can be executed by the combination of a set of one-bit quantum gates U() and two-bit Controlled- NOT C-NOT gate that maps Boolean values (x,y) to (x,x y)]. We first introduce a lemma which shows how to decompose a general unitary matrix to the product of the matrices m (U). Lemma 1. Any unitary matrix Uu ij nn can be decomposed into n1 U t1 n n A lt1 tl B k1 k, 3.1 where A tl a (tl) ij nn P t,n1 P l,n Â(û tl )P l,n P t,n1, B k P k,n Bˆ exp(i k ) P k,n, Â(û tl )diag(1,1,...,1,û tl ), û tl is a unitary matrix, Bˆ exp(i k ) diag 1,1,...,1,exp(i k ), P ij left-multiplying a matrix interchanges the ith and jth row of the matrix, and similarly P ij right-multiplying a matrix interchanges columns. On the lexicographically ordered orthogonal bases, the representations of operators P ij and P ij are identical. When n m1, obviously Â(û tl ) m (û tl ), and Bˆ exp(i k ) m (diag 1, exp(i k ) ). The meaning of this decomposition in mathematics is that some unitary matrices, namely A tl, left-multiply U to transfer it to a upper triangular matrix. Since U is unitary, it should be diagonal and can be decomposed into the product of matrices B k. Thus unitary matrix U is decomposed into the form of Eq. 3.1. We show how to transfer the operation P ij to operation m ( x ) via C-NOT operations. In fact P ij x i k x j k x j k x i k li, j x l k x l k, where x t k x t 1, x t t,..., x m1 with x t k 0,1, k1,,...,m1. These C-NOT operations transfer the subspace spanned by x i k and x j k to the subspace spanned by 11 11 and 11 10. For i j, there must exist k satisfying x i k x j k. i Denote the minimum value of k by k 0 and assume x k0 1, j x k0 0. For an integer s, k 0 sn, ifx i s x j s, we execute C-NOT operation the k 0 th bit controls the sth bit. Then for 1hn, x i h x j h 0, we execute h x on the hth bit. At last we interchange the input sequence of the k 0 th bit and the (m1)th bit. With the lemma above, a unitary evolution can be expressed as the product of some controlled unitary operations. The representations of the input states are another important problem. As to two linear-independent states 1, of one qubit system, we set them symmetric, 1, cos 0 A sin 1 A, 3. where 0/4 and A represents the system for identification and cloning. This simplification is reasonable because arbitrary states 1, can be transformed to Eq. 3. via unitary rotation. In the case of a two-partite system, the orthogonal bases are i 1, 00 1,,01 1,,10 1,,11 1, and the input states are i 1,, i1,,3,4, each of which may be expressed as i 1, j1 t ij j 1, with j1 t ij 1. How- 4 4 ever, they cannot be converted to symmetric forms as those in Eq. 3.. Define Tt ij 44 ; the determinant of T should be nonzero since i 1, are linear-independent. Lemma. For any four states i 1,, i1,,3,4 in Hilbert space H two-partite system, there exists a unitary operator U 0, where U 0 1 1,, 1,, 3 1,, 4 1, ) 1 1,, 1,, 3 1,, 4 1, )T, 3.3 (1) ei cos (1) e T 1 i (1) 3 cos (1) () 3 cos 3 e i (1) 4 cos (1) 4 cos () (3) 4 cos 4 (1) 0 sin e i () 3 cos (1) () 3 sin 3 e i () 4 cos (1) 4 cos () (3) 4 sin 4 (1) 0 0 sin 3 e i (3) 4 cos (1) () 4 sin 4 (1) 0 0 0 sin 4 with 0 i 1, 0 i ( j), 0 i j. 06310-4

REALIZING PROBABILISTIC IDENTIFICATION AND... PHYSICAL REVIEW A 61 06310 The operations D K, by pairwise interactions, compress all the information to partite 1. D( 1, ) may be decomposed into universal operations 17, i.e., local unitary LU operations on a single qubit and C-NOT operations. Here we directly use the results obtained by Chelfes and Barnett 17 and illustrate the D gate in Fig. 1. Operation D K that is suitable for a one-partite system can be generalized to a k-partite system. In the previous part of this subsection we have discussed the special representations of input states in a k-partite system and we will adopt them below. Consider a two-partite system. Define i ( j), i ( j),i4, 1 ji1 to represent the parameters in matrix T in lemma. We generalize the D-gate to two-partite system, which acts as FIG. 1. The networks of of D gate 17. and denote the controller and target bit of a C-NOT operation, respectively. If i 1, are linear-independent, then i (1) 0. The unitarity of U 0 yields T TT T. 3.4 Lemma can be generalized to a k-partite system. According to this lemma, we may concentrate on probabilistic cloning and identification of states i 1, U 0 i 1,, i 1,,3,4. All unitary representations have physical meaning only when the orthogonal bases have been set. To represent the bases i and i, we adopt the distinguishability transfer gate (D-gate operation introduced in Ref. 17 and generalize it to a k-partite system. This operation compresses all the information of the M input copies into one qubit and acts as follows: D 1, 1 3 0. The unitarity of operation D( 1, ) requires cos 3 cos 1 cos. 3.5 3.6 This condition, together with 0 j /4, suffices to determine 3 uniquely. Since D( 1, ) is Hermitian 17, itcan also transfer state ( 3 )0 back to ( 1 ) ( ). This accomplishes the process of information decompression. Both the compression and decompression will be useful in implementing the cloning and identification. The D-gate operation can be used as an element in a network for M N cloning. Define D K D 1 ( 1, K1 )D ( 1, K ) D K1 ( 1, 1 ), where the operation D j ( 1, K j ) compresses the information of partites j, j1 to partite j, and angles j are uniquely determined by cos j1 cos 1 cos j (0 j /4). D K acts as D K 1 K K 1 0 (K1). 3.7 D, i A i B i A 00 B, 3.8 where and have a definition similar to. The unitarity of operation D(, ) yields X, T T, 3.9 where X(, ) A i( ) j( ) AB i( ) j( ) B 44. The upper triangular representation of T ( ) determines uniquely through Eq. 3.9. To obtain an explicit expression for the operation D(, ), we must specify how it transforms states in the subspace orthogonal to that spanned by i( ) A i( ) B. Equation 3.8 may be rewritten as D 1, i A 00 B, i1,,3,4 i A j B, i, j1,,3,4gt 1, 3.10 where G 164 is the matrix representation of states i( ) A i( ) B on the bases i A j B, which are lexicographically ordered, i.e., 0000,0001,...,1111 in Hilbert space H H. We denote GT 1 ( ) ( 1, 5, 9, 13 ). States i are orthogonal in the space spanned by i( ) A i( ) B. Denote G 1 ( 1,,..., 16 ), where states j,1 j 16, j1,5,9,13 are selected in the subspace orthogonal to that spanned by i, i1,5,9,13. With Eq. 3.10, we let D 1, i A j B i A j B G 1. 3.11 Thus we represent D(, ) as matrix G on the orthogonal bases i A j B. Similar to Eq. 3.7, define D K D 1 (, K1 )D (, K ) D K1 (, ) ( 1), where D j (, ) compresses the information of partite systems A j,a j1 to A j, and j1 is uniquely determined by X(, j)t ( j1 )T ( j1 ). D K acts as follows: D K i K i K A1 00 (K1). 3.1 We can also define the similar operation D K (, ) that compresses the information of K input copies into one for a k-partite system, where ( i ( j), i ( j),i,3,..., k ; j 1,,...,i1). With lemma 1 we can realize D K via universal logic gates. For operation D K, we may introduce a new gate called the Controlled-D K gate, which can transfer the complicated orthogonal bases to lexicographically ordered ones of a multipartite system. In the information compression process, we perform a Controlled-D K gate on the controlled partites with 06310-5

ZHANG, WANG, LI, AND GUO PHYSICAL REVIEW A 61 06310 P as the controller. In the information decompression process, a Controlled-D K gate is needed. With all these operations and controlled operations, we can express the orthogonal bases and transfer them to those suitable for the realization of quantum cloning and identification via universal quantum logic gates. B. Representation of unitary evolution and realization via universal gates Suppose that k i,i1,,..., k are the bases which are lexicographically ordered in Hilbert space H k. For the given probability matrix, with a D K gate, we can represent the orthogonal bases i P 0, jp 1, i, j 1,,..., k of Eq..16 for probabilistic identification and i 1 (NM) P 0, j,i, j1,,..., k of Eq..1 for probabilistic cloning as D M 1 i 1 (M1) P 0, j 1 (M1) P 1, i, j1,,..., k, 3.13 D M 1 i 1 (N1) P 0,D N 1 j 1 (N1) P 1, i, j1,,..., k, where the first expression is for identification and the second is for cloning. With a controlled-d M gate and a controlled- D N gate, we can transfer these orthogonal bases into i A1 P 0, j A1 P 1,i, j1,,..., k (K1) 1 A,A 3,...,A, 3.14 K where KM is for identification and KN is for cloning. On these new orthogonal bases, the evolution Û is a unitary controlled operation on a composite system of A 1 and probe P with the composite system of subsystem A,A 3,...,A K as the controller. If the controller is in state (K1) 1 A,A 3,...,A, we perform operation Û on the composite K system of A 1 P. Otherwise we make no operation. Denote P 0 0 P, P 1 1 P, on the bases i A1 0 P, j A1 1 P, i, j1,,..., k ; U can be represented as UṼSṼ Eq..9. Ṽ corresponds to the operation Vˆ A1 Î P 1 (K1) (K1) 1 Ĵ, 3.15 where Ĵ i j 1 (K1)Î A 1 P i j i j with i j i1 i ik1, KM is for identification, and K N for cloning. The matrix corresponding to the operation Vˆ A1 on the bases i A1 is V. Î P represents unit operation of a probe system. On the new orthogonal bases i A1 P 0, i A1 P 1, i1,,..., k, we express S F E E F FIG.. The networks of probabilistic identification for a onepartite system. () Ai are to-be-identified states and P 0 is the probe. as Sdiag(K 1,K,...,K k), where K i 1m i m i So we obtain Ŝ i1 m i 1m i. k P i,k1p i1,k11 k A 1 P Ki P i1, k1 1P i, k1 1 (K1)(K1) 1 Ĵ, 3.16 where KM is for identification and KN is for cloning. We have shown in lemma 1 that the unitary operations U 0, P i1, k1 1, P i, k1, and Vˆ A1 can be decomposed into the product of basis operations such as C-NOT and k (û). The decomposition of k (û) has been completed by Barenco et al. 3. Thus we complete the decomposition of the unitary evolution via universal quantum logic gates, so as to realize probabilistic cloning and identification of a k -partite system. In the following we will give some examples. First we shall be concerned with quantum probabilistic identification of a one-partite system, provided with M initial copies. With the given maximum probability 1 1cos M, weobtain where K Ṽ 1 IA i A y I P R A y I P, m 1 1, m 1cosM 1cos M, K 1 0 1 1 0, cosm 1cos M 1cosM 1cos M 1cosM 1cos M, cosm 1cos M 06310-6

REALIZING PROBABILISTIC IDENTIFICATION AND... PHYSICAL REVIEW A 61 06310 FIG. 3. The networks of an S gate for a one-partite system. R y cos sin sin cos. The network of quantum probabilistic identification for a one-partite system via universal logic gates is shown in Fig. (M). The S gate in Fig. is illustrated in Fig. 3. For a two-partite system, with the given maximum probability matrix which satisfies the inequality X (M) 0, we obtain Ŝ x 1 x K 1 x x 1 x 1 K x 1 x K 3 x K 4 00 (M1) (M1) 00Ĵ. K cosmcosn 1cos N 1cos M 1cosN 1cos M 1cos N 1cos M FIG. 5. The networks of an S gate for a two-partite system. The network of quantum probabilistic identification for a two-partite system is shown in Fig. 4 (M). The S gate in Fig. 4 is illustrated in Fig. 5 As to probabilistic cloning, we also begin with a onepartite system. With inequality.4, we give the maximum probability max (1cos M )/(1cos N ). Then Ṽ 1 IA A 1i 1 y 0 A A 0I P R A y 0 A A 0I P, K 1 0 1, 1 0, 1cosN 1cos M 1cos N 1cos M. cosmcosn 1cos N 1cos M The network of quantum probabilistic clone for a one-partite system is shown in Fig. 6 (M, N3). For a two-partite system, with the given maximum probability matrix satisfying X (M) X (N) 0, we obtain Ŝ x 1 x K 1 x x 1 x 1 K x 1 x K 3 x K 4 00 (N1) (N1) 00Ĵ. The network of quantum probabilistic cloning for a twopartite system is shown in Fig. 7 where M, N3). So far we have realized quantum probabilistic identification and cloning in a k -partite system via universal quantum logic gates, which have important applications in quantum cryptography 4,5, quantum programming 6, and quantum state preparation 7. C. Robustness of the quantum networks The robustness properties of the cloning and identifying machines may prove to be crucial in practice. In this subsection, we show whether any errors occur in the input target systems A M1, A M,...,A N, we can detect them without FIG. 4. The networks of probabilistic identification for a twopartite system. i A j are to-be-identified states. FIG. 6. The networks of probabilistic cloning of a one-partite system. The S gate has been illustrated in Fig. 3. () Ai are to-be-cloned states and 0 A3 is the input target state. 06310-7

ZHANG, WANG, LI, AND GUO PHYSICAL REVIEW A 61 06310 If the errors are caused by state preparation, after the evolution of the system, the output target system corresponding to 0 P is the superposition of two different terms. We measure the output target states, and if they result in 1 (NM), the clone really fails. Otherwise, the errors work and the to-be-cloned state remains undestroyed. To the two error situations mentioned above, we can reinput the to-be-cloned system to the cloning machines at the location immediately behind the Controlled-D K gate the first operation of the cloning machine and clone again. FIG. 7. The networks of probabilistic cloning for a twopartite system. The S gate has been illustrated in Fig. 5. i A j are to-becloned states and 00 A3 is the input target state. destroying the to-be-cloned states in systems A 1, A,...,A M, and the to-be-cloned states can be recycled. The input target state with errors may be generally expressed as AM1,A M,...,A N k (NM) 1 1 1 1 1 i i i i, where k i i 1 and 1 is the error rate, or AM1,A M,...,A N k (NM) 1 1 i i i, 3.17 3.18 where k i i 1 and is the error rate. Equation 3.17 expresses the errors caused by the decoherence due to the environment. Equation 3.18 represents the errors in state preparation. The errors occur in the (NM) input target systems for cloning with the approximate rate (N M) 1 (NM), which cannot be omitted in practice when N is relatively large. After the cloning process, if measurement of probe P results in 0 P, the cloning attempt should be regarded as a failure in a normal sense. However, it may be caused by errors. If errors caused by the decoherence occur in any input target systems, at least one system occupies state i, i 1. According to Eqs. 3.15 and 3.16, the controlled operations Vˆ A1, Ŝ, and Controlled-D K gate in the information decompression, function as unit evolutions, in other words, only Controlled-D K gate in the information compression works. Thus the to-be-cloned state remains undestroyed. According to Eq..1 and the above discussion, the input target states remain unchanged if probe P is in 0 P, whenever the clone fails or errors occur. These two cases can be checked out by measuring the output target states. IV. CONCLUSIONS In summary, we have considered the realization of quantum probabilistic identifying and cloning machines by physical means. We showed that the unitary representation and the Hamiltonian of probabilistic cloning and identifying machines are determined by the probabilities of success. The logic networks have been obtained by decomposing the unitary representation into universal quantum logic operations. We have discussed the robustness of the networks and found that if error occurs in the input target system, we can detect it and the to-be-cloned states can be recycled. Our method is suitable for a k-partite system, such as a quantum computer, and may be generalized to general state-dependent cloning and identification. ACKNOWLEDGMENTS We thank Dr. L.-M. Duan for helpful discussion. This work was supported by the National Natural Science Foundation of China. APPENDIX A In this appendix, we determine M and N and derive the representation of U. U is a unitary matrix, that is, UU U UI n. A1 Equation A1 can be proved equivalent to the following two equations: N 1 CM, MM I n C X 1 C. A A3 It is obvious that I n C X 1 C is a symmetric matrix. According to Eq..6, we yield I n C X 1 CI n C 1 C 1. A4 For positive definite, C 1 C is semipositive definite. Thus I n C 1 C is positive definite and its reversed matrix I n C X 1 C is also positive definite. I n C X 1 C can be represented as the following: I n C X 1 CV diagm 1,...,m n V, A5 where V is unitary. Together with Eq. A3, M is determined by 06310-8

REALIZING PROBABILISTIC IDENTIFICATION AND... PHYSICAL REVIEW A 61 06310 MV diagm 1,...,m n V. A6 Furthermore, we can also prove several useful conclusions to replace the submatrices of U in Eq..8, C A 1 V diag1m 1,...,1m n V, A 1 V diagm 1,...,m n V, A7 A8 N 1 CMV1m 1,...,1m n V. A9 Hence, we get U V 0 V 0 E V 0 E F 0 V, A10 where Ediag(m 1,...,m n ), Fdiag(1m 1,..., 1m n ). According to Eq. A5 and I n C X 1 C0, we yield m i 0, i1,,...,n. On the other hand, Eq. A5 can be rewritten as C X 1 CV diag1m 1,...,1m n V. For X positive definite, C X 1 C is semipositive definite. So 1m i 0, that is, m i 1, i1,...,n. Combining the results above, we get the range of m i as 0m i 1, i1,,...,n. A11 Here we diagonalize Û. S can be rewritten as APPENDIX B STKT, where Kdiag(K 1,K,...,K n ), K i 1m i m i m i 1m i, B1 T is a unitary matrix which interchanges the rows of K, and T interchanges the columns. Denoting L j 1 1 i, i 1 j1,,...,n, L diag(l 1,L,...,L n ), we have KL diage i 1,e i 1,...,e i n,e i nl, where j, and j1,,...,n is determined by B e i j1m j im j, 0 j. B3 According to Eqs..9, B1, and B, U is completely diagonalized as the following: where OṼTL. UO diage i 1,e i 1,...,e i n,e i no, B4 1 W. K. Wootters and W. H. Zurek, Nature London 99, 80 198. H. P. Yuen, Phys. Lett. A 113, 405 1986. 3 G. M. D Ariano and H. P. Yuen, Phys. Rev. Lett. 76, 83 1996. 4 H. Barnum, C. M. Caves, C. A. Fuchs, R. Jozsa, and B. Schumacher, Phys. Rev. Lett. 76, 818 1996. 5 M. Koashi and N. Imoto, Phys. Rev. Lett. 81, 464 1998. 6 D. Dieks, Phys. Lett. 9A, 71 198; Phys. Lett. A 16, 303 1987. 7 C. H. Bennett, Phys. Today 48 10, 41995. 8 V. Buz ek and M. Hillery, Phys. Rev. A 54, 1844 1996. 9 N. Gisin and S. Massar, Phys. Rev. Lett. 79, 153 1997. 10 D. Bruß, D. P. DiVincenzo, A. Ekert, C. A. Fuchs, C. Macchiavello, and J. A. Smolin, Phys. Rev. A 57, 368 1998. 11 D. Bruss, A. Ekert, and C. Macchiavello, Phys. Rev. Lett. 81, 598 1998. 1 R. F. Werner, Phys. Rev. A 58, 187 1998. 13 M. Keyl and R. F. Werner, J. Math. Phys. 40, 383 1999. 14 S. Massar and S. Popescu, Phys. Rev. Lett. 74, 159 1995. 15 R. Derka, V. Bužek, and A. Ekert, Phys. Rev. Lett. 80, 1571 1998. 16 M. Hillery and V. Buz ek, Phys. Rev. A 56, 11 1997. 17 A. Chefles and S. M. Barnett, Phys. Rev. A 60, 136 1999. 18 L.-M. Duan and G.-C. Guo, Phys. Lett. A 43, 61 1998. 19 L.-M. Duan and G.-C. Guo, Phys. Rev. Lett. 80, 4999 1998. 0 C.-W. Zhang, C.-F. Li, and G.-C. Guo, Phys. Lett. A 61, 5 1999. 1 V. Bužek, S. L. Braunstein, M. Hillery, and D. Bruß, Phys. Rev. A 56, 3446 1997. D. Deutsch, Proc. R. Soc. London, Ser. A 400, 971985; 45, 73 1989. 3 A. Barenco, C. H. Bennett, R. Cleve, D. P. DiVincenzo, N. Margolus, P. Shor, T. Sleator, J. A. Smolin, and H. Weinfurter, Phys. Rev. A 5, 3457 1995. 4 C. H. Bennett, G. Brassard, and N. D. Mermin, Phys. Rev. Lett. 68, 557 199. 5 S. M. Barnett and S. J. D. Phoenix, Phys. Rev. A 48, R5 1993. 6 M. A. Nielsen and I. L. Chuang, Phys. Rev. Lett. 79, 31 1997. 7 M. Brune, S. Haroche, J. M. Raimond, L. Davidovich, and N. Zagury, Phys. Rev. A 45, 5193 199. 06310-9