z-logo
open-access-imgOpen Access
High-Dimensiоnаl Quаntum Сlоning
Author(s) -
Kulsum Khan S. A
Publication year - 2021
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2021.36696
Subject(s) - quantum cloning , bb84 , cloning (programming) , quantum key distribution , quantum , quantum cryptography , quantum state , quantum information science , physics , quantum mechanics , computer science , quantum information , quantum network , quantum entanglement , programming language
Tries at cloning a quantum tool result in the arrival of imperfections in the nation of the copies. this is a outcome of the no-cloning theorem, that is a vital law of quantum physics and the spine of protection for quantum communications. in spite of the reality that ideal copies are prohibited, a quantum country may be copied with maximal accuracy through severa most top notch cloning schemes. maximum beneficial quantum cloning, which lies at the border of the bodily restrict imposed by way of the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally found out for low-dimensional photonic states. however, an growth in the dimension-ality of quantum structures is notably beneficial to quantum computation and communication protocols. despite the reality that, no experimental demonstration of most beneficial cloning machines has hitherto been shown for excessive-dimensional quantum systems. We carry out most proper cloning of excessive-dimensional photonic states thru the symmetrization approach. We display the universality of our technique thru carrying out cloning of numerous arbi-trary enter states and really signify our cloning tool with the useful resource of appearing quantum nation tomography on cloned photons. similarly, a cloning assault on a Bennett and Brassard (BB84) quantum key distribution protocol is ex-perimentally showed to expose the robustness of excessive-dimensional states in quantum cryptography.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here