Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Assisted cloning of an unknown shared quantum state

  • Dengxin Zhai ,

    Contributed equally to this work with: Dengxin Zhai, Jiayin Peng

    Roles Writing – original draft, Writing – review & editing

    Affiliation School of Mathematics and Statistics, Kashi University, Kashi, Xinjiang, China

  • Jiayin Peng ,

    Contributed equally to this work with: Dengxin Zhai, Jiayin Peng

    Roles Writing – original draft, Writing – review & editing

    pengjiayin62226@163.com

    Affiliation School of Mathematics and Statistics, Kashi University, Kashi, Xinjiang, China

  • Nueraminaimu Maihemuti ,

    Roles Writing – review & editing

    ‡ NM and JT also contributed equally to this work.

    Affiliation School of Mathematics and Statistics, Kashi University, Kashi, Xinjiang, China

  • Jiangang Tang

    Roles Writing – review & editing

    ‡ NM and JT also contributed equally to this work.

    Affiliation School of Mathematics and Statistics, Kashi University, Kashi, Xinjiang, China

Abstract

We first propose a novel protocol to realize quantum cloning of an arbitrary unknown shared state with assistance offered by a state preparer. The initial phase of this protocol involves the utilization of quantum teleportation (QT), enabling the transfer of quantum information from an arbitrary number of senders to another arbitrary number of receivers through a maximally entangled GHZ-type state serving as a network channel, without centralizing the information at any specific location. In the second stage of this protocol, the state preparer performs a special single-qubit projective measurement and multiple Z-basis measurements and then communicates a number of classical bits corresponding to measurement results, the perfect copy or orthogonal-complementing copy of an unknown shared state can be produced at senders hands. Then, using a non-maximally entangled GHZ-type state instead of the aforementioned quantum channel, we extend the proposed protocol from three perspectives: projective measurement, positive operator-value measurement (POVM), and a single generalized Bell-state measurement. Our schemes can relay quantum information over a network without requiring fully trusted central or intermediate nodes, and none of participants can fully access the information.

1 Introduction

The quantum teleportation (QT) scheme proposed by Bettnett et al. [1] in 1993 pioneered quantum information science which today is a vast research field. Its superior potential for application is undisputed. Especially, it is a crucial task in the implementation of quantum networks for promising applications such as quantum cryptography [2] and distributed quantum computation [3, 4]. Although the original QT scheme teleports quantum information from one place to another [1], incorporation of multiple participants is further worth considering to implement versatile quantum networks. Schemes to share quantum information from one sender to multiple receivers have been presented [58] and experimentally demonstrated [9, 10] via the multipartite entanglement state serve as quantum channel. In these schemes, no single receiver or any subparties of receivers can fully access information unless all other receivers cooperate, which forms the basis for further expanding quantum secret sharings [1114] or controlled teleportations [15, 16]. Besides the aforementioned unidirectional QT, bidirectional QT [17, 18] and cyclic QT [1921] have been studied. Furthermore, there exist other typical quantum communication protocols that can facilitate the establishment of versatile quantum networks [2228].Various quantum cryptography schemes, such as quantum key distribution [22, 23], quantum secure direct communication [24, 25] and remote state preparation (RSP) [26, 27], are capable of establishing a secure communication channel. In these schemes, eavesdropping is impossible without a high probability of interfering with transmission, as eavesdropping will be detected.

Unlike QT which uses pre-shared quantum entangled channel and classical communication to teleport unknown quantum state, RSP is utilized to teleport a known quantum state, which can save communication resources compared to QT [29, 30]. Various RSP schemes have emerged, such as multicast-based multiparty RSP [31], controlled RSP [32, 33], joint RSP [34, 35], controlled joint RSP [36], bidirectional controlled RSP [37, 38], cyclic RSP [39], etc. In 2020, Lee et al. [40] introduced a novel QT scheme enabling the transfer of quantum information from an arbitrary number of senders to another arbitrary number of receivers in an efficient and distributed manner over a network, without the need for fully trusted central or intermediate nodes. Furthermore, this scheme can be extended to include error corrections for photon losses, bit or phase-flip errors, and dishonest parties. This work paves the way for secure distributed quantum communications and computations in quantum networks. In 2022, Li et al. [41] extended Lee’s scheme [40] to the case of non-maximally entangled channel.

To manipulate and extract quantum information, Pati [42] proposed a scheme in 2000 using QT and RSP techniques to generate perfect copies and orthogonal-complement copies of an arbitrary unknown state with minimal assistance from the state preparer. The first stage of this scheme requires the usual teleportation, while in the second stage the preparer carries out a single-qubit measurement and conveys some classical information to different parties so that perfect copies and orthogonal-complement copies are produced in a probabilistic manner. Zhan [43] proposed a scheme of realizing quantum cloning of an unknown two-particle entangled state and its orthogonal complement state with assistance from a state preparer. Han et al. [44] presented a scheme that can clone an arbitrary unknown two-particle state and its orthogonal complement state with the assistance of a state preparer, where a genuine four-particle entangled state is used as the quantum channel and positive operator-valued measurement (POVM) instead of usual projective measurement is employed. In Ref. [45], by using a non-maximally four-particle cluster state as quantum channel, a scheme for cloning unknown two-particle entangled state and its orthogonal complement state with assistance from a state preparer was proposed. Zhan et al. [46] proposed a protocol where one can realize quantum cloning of an unknown two-particle entangled state and its orthogonal complement state with assistance offered by a state preparer. The following year, Fang et al. [47] generalize Zhan’s protocol [46] such that an arbitrary unknown two-qubit entangled state can be treated. Zhan [48] presented a scheme for realizing assisted cloning of an unknown two-atom entangled state via cavity QED. Hou and Shi suggested a protocol for cloning an unknown EPR-type state with assistance by using a one-dimensional non-maximally four-particle cluster state as quantum channel, and then extend it to the case of cloning an arbitrary unknown two-particle entangled state. Hou and Shi [45] suggested a protocol for cloning an unknown EPR-type state with assistance by using a one-dimensional non-maximally four-particle cluster state as quantum channel, and then extend it to the case of cloning an arbitrary unknown two-particle entangled state. Xiao et al. [49] put forward a protocol of assisted cloning and orthogonal complementing of an arbitrary two-qubit state via two partially entangled pairs as quantum channel. Shi et al. [50] proposed a protocol which can realize quantum cloning of an unknown tripartite entangled state and its orthogonal complement state with assistance from a state preparer. Ma et al. [51] present a scheme which can realize quantum cloning of an unknown N-particle entangled state and its orthogonal complement state with assistance offered by a state via N non-maximally entangled particle pairs as quantum channel. Subsequently, they proposed a scheme to produce perfect copy of an unknown d-dimensional equatorial quantum state with assistance offered by a state preparer [52]. Chen et al. [53] and Xue et al. [54] extended the scheme [52] to the cases for auxiliary cloning of an unknown multi-qudit equatorial-like state and an arbitrary unknown multi-qudit state, respectively.

Stimulated by Refs. [4042], in this manuscript, we explore the assisted cloning of shared quantum secret state. We first propose a new scheme for cloning an unknown shared quantum state or its orthogonal complement state with help of a state preparer. This scheme includes two stages: teleportation and assisted cloning. The first stage of the scheme requires quantum teleportation, which uses a maximally entangled GHZ-type state as the network channel to teleport an arbitrary unknown shared quantum state between multiple senders and receivers. In the second state of the scheme, the preparer disentangles the left over entangled states by a single-qubit projective measurement and some Z-basis measurements and informs senders of his or her measurement outcomes so that perfect copies and complement copies of the unknown shared state are producd. In addition, we discuss the assisted cloning problem of shared quantum secret from three perspectives: projective measurement, POVM, and a single generalized Bell-state measurement, by replacing the aforementioned network channel with a non-maximally entangled GHZ-type state. The results show that the obtained cloning schemes are all extensions of the above scheme, and they can achieve unit fidelity, but the cost is that the success probability is less than 1.

Below is the arrangement of this article. In Section 2, by using a maximally entangled GHZ-type state as quantum channel, a new scheme for cloning an arbitrary unknown shared state and its orthogonal complement state with the assistance from a state preparer is presented. In Section 3, by making use of a non-maximally entangled state as network channel, we provide three assisted cloning schemes of shared quantum secret via projective measurement, POVM, and a single generalized Bell-state measurement, respectively, to meet the needs of real environments and the purpose of expanding the scheme in Section 2. Discussion and conclusion are drawn in Section 4.

2 Assisted cloning of shared quantum secret via a maximally entangled GHZ-type state

Suppose that Victor is the preparer of the quantum state |χ〉 = α|0〉 + β|1〉, where α, β are complex numbers with |α|2 + |β|2 = 1. A quantum secret in |S〉 = α|0L〉 + β|1L〉 with logical basis, |0L〉 and |1L〉, is shared by separated n parties {A1, A2, ⋯, An} in quantum network, through a splitting protocol [811], where the the state |S〉 can be rewritten as (1) where qubit sj belongs to sharer Aj (j = 1, 2, ⋯, n). That is to say, state is the result of state |χ〉 being shared by n individuals {A1, A2, ⋯, An} in the network. Our utilization of GHZ-entanglement of photons enables the encoding of network and logical qubits. The senders {A1, A2, ⋯, An}, i.e., a group of n parties, endeavor to transmit the shared secret to the receivers, i.e., another group {B1, B2, ⋯, Bm} of m parties interconnected in the network, and the shared secret state is obtained at the receivers’ hands could be reconstructed as , here qubit rj belongs to receiver Bj (j = 1, 2, ⋯, m), and then wish to clone this shared secret state at the senders’ hands with the assistance from the state preparer Victor. None of the participants are fully trusted, therefore no single sender or receiver, or any subparties, is permitted to access the secret during the entire process.

In order to accomplish this objective, the network channel utilizes an (n + m)-particle GHZ-type state (2) where qubit belongs to sender Al (l = 1, 2, ⋯, n), while the channel particle rj is also owned by receiver Bj (j = 1, 2, ⋯ m). The assisted cloning scheme between multiple parties in a quantum network includes two stages: quantum teleportation and copying of unknown state, and the specific process is presented below.

In the first stage of the scheme, each sender Aj executes the standard Bell-state measurement on her or his two qubits sj and , one from and the other from the network channel . The Bell-states can be represented as (3)

Utilizing the aforementioned Bell-states, the initial composite system can be expressed as follows (4) where (5)

The arrangement of 2n particles is modified from to and we have (for brevity, the subscripts are omitted) (6) in which N[⋅] represents the sum of all possible arrangements, for example, (7) Upon conducting n Bell-state measurements, they communicate the outcomes to the recipients through classical channels. As a priori agrement, define the measurement result of Al as xlyl and let the classical bits 00, 01, 10 and 11 correspond to the Bell-states |ϕ+〉, |ϕ〉, |ψ+〉 and |ψ〉, respectively, and vice vera.

If the measurement outcome is or , at any receiver’s location, he performs the local Pauli operator , where σz = |0〉〈0| − |1〉〈1| and . After the above operations, the state of qubits r1, r2, ⋯, rm−1 and rm becomes (8) which means that the receivers B1, B2, ⋯, Bm successfully reconstruct the shared initial state with unit fidelity. If the measurement result from the senders is either |Ψ+〉 or |Ψ〉, one of the receivers will apply the local Pauli operator , where σx = |0〉〈1| + |1〉〈0| and , while the other receivers respectively carry out the operator . This will result in the state owned by the receivers becoming as shown in Eq (8). That is, the receivers can successfully restore the shared initial state with unit fidelity, completing teleportation.

Now we move on to the second stage of the scheme: creating a copy or an orthogonal-complementing copy of the unknown state with assistance from the state preparer. According to the projection postulate of quantum mechanics, without loss of generality, If the senders’ Bell measurement result is (|ϕ+〉〈ϕ+|)n, the state of qubits and will collapse into the state |ϕ+n, (see Eqs (4), (5) and (6)). Each sender Ai (i = 1, 2, ⋯, n) sends qubit si to the state preparer Victor and keeps qubit in his or her possession. Since Victor knows the state |χ〉 completely, he performs a single-qubit projective measurement on the qubit s1 in a set of mutually orthogonal basis vectors , which is given by (9) Subsequently, he measures each other qubit using the Z-basis {|0〉, |1〉}, and publishes the measurement results to the senders through classical communication.

Using Victor’s measurement bases and {|0〉, |1〉}, |ϕ+n can be written as (10)

Obviously, Eq (9) is a transitional transformation from the old basis {|0〉, |1〉} to the new basis {|ξ0〉, |ξ1〉}.It is worth noting that under this transformation, the normalization and orthogonality relationships between the basis vectors are preserved. Interestingly, we find the basis vector |ξ0〉 = |χ〉 and the basis vector |ξ1〉 = |χ〉, where |χ〉 = α*|1〉 − β*|0〉 is the orthogonal-complement state to |χ〉. However, we keep for Victor just to distinguish the fact that he knows the state.

Generally speaking, if Victor’s measurement results for particle s1 and particle sj (j = 2, 3, ⋯, n) are (t = 0, 1) and (kj = 0, 1), respectively, then the state of qubits will collapse into (11) After hearing Victor’s measurement information, sender A1 needs to performs a unitary operator (−1)t+1iσy on qubit s1. Subsequently, sender A1 and each Aj (j = 2, 3, ⋯, n) jointly implement a unitary transformation on the basis for particles s1 and sj, where U1 and U2 are given by (12)

After executing the above operations by senders A1, A2, ⋯, An, the state |S′〉 shown in Eq (11) becomes (13) Upon observing Victor’s measurement outcome of qubit s1 as (i.e., t = 1) from Eq (13), it can be inferred that senders A1, A2, ⋯, An are able to acquire a flawless replica of the collectively unknown state ; otherwise (i.e., t = 0), they can obtain an orthogonal-complementing copy of the shared unknown state .

Remark (i) Due to the symmetry of qubits s1, s2, ⋯, sn−1 and sn in state |ϕ+n, Victor first measures anyone sj of qubits s1, s2, ⋯, sn−1 and sn with the basis {|ξ0〉, |ξ1〉}, and then measures the other qubits with the Z basis. The senders of the corresponding qubits perform the corresponding transformation in the above scheme, and the conclusion obtained is the same.

(ii) Regarding the issue of accessible information, it can be asserted that during the assisted cloning process, no subset can fully access quantum secrets. Now, let’s take the teleportation process in the first stage of our scheme as an example to illustrate this conclusion. Assume that one sender sk attempts to reconstruct the secret at his or her location based on announced results by the other senders. For simplicity, let m = 1. Following the Bell-state measurement by all senders except sk, the resulting state at sk is either or . Upon tracing out the receiver’s party, the reduced state at their end becomes |α|2|00〉〈00| + |β|2|11〉〈11| or |α|2|01〉〈01| + |β|2|10〉〈10|. This holds true unless the entire channel is under their control, meaning that only amplitude information can be accessed by sj. The same applies to any subparties of senders and receivers.

3 Assisted cloning of shared quantum secret via a non-maximally entangled GHZ-type state

The vulnerability of quantum entanglement and the inevitable impact of environmental noise can lead to the degeneration of a maximally entangled state into a non-maximally entangled state. To deterministically obtain maximally entangled states, one can utilize quantum entanglement concentration and purification schemes [5558], but, to achieve this, it is necessary to consume a large ensemble of non-maximally entangled states. Therefore, it is very meaningful to explore quantum communication problems by directly utilizing non-maximally entangled states as quantum channel.

Instead of sharing a (n + m)-qubit maximally entangled GHZ-type state as shown in Eq (2), the senders and receivers may initially share a non-maximally entangled state in the following form (14) where a and b are real numbers and satisfy a2 + b2 = 1. Without losing generality, assuming |a| = min{|a|, |b|}. Using Bell state measurement bases, the initial composite system can be written as (15) where and are shown in Eqs (5) and (6).

In the teleportation stage, each sender Aj performs the standard Bell-state measurement on her or his two qubits sj and , and publish the measurement results to the receivers via classical communication. After performing n times of Bell-state measurements, the state of qubits r1, r2, ⋯, rm−1 and rm will collapse into one of the following four states (16)

When the measurement outcome is or , each receiver carries out the local Pauli operator (), and the state of the receivers’ particles becomes (17) If the measurement result is or , anyone of receivers executes the local Pauli operator (), and the other receivers respectively carry out the operator , which will make the state owned by the receivers become (18)

3.1 Assisted cloning based on projective measurement

The state corresponding to the measurement result or is , which is not yet the target state to be restored by receivers. In order to reconstruct the initial state with unity fidelity, an auxiliary qubit with the original state |0〉R is introduced. Due to the symmetry of the state , any receiver Bj can hold the auxiliary qubit. Without loss of generality, we can assume that the last receiver Bm holds the auxiliary qubit and then performs a unitary operator (19) under the basis . It will transform the product state to (20) where is shown in Section 2. The receiver rm then performs a Z-basis measurement on the auxiliary qubit R, which constitutes a projective measurement in the basis {|0〉, |1〉}. If the outcome is |0〉R, the teleportation is successfully executed with fidelity 1, whereas if the outcome is |1〉R, the teleportation fails without providing any information about the target state. The optimal probability of successful teleportation is a2, where “optimal” refers to the introduction of an auxiliary qubit.

The measurement result or necessitates the introduction of an auxiliary qubit with the original state |0〉R at the position of the final receiver Bm, the corresponding unitary operator is (21) which will transform the product state to (22) Next, the receiver Bm performs a projective measurement with Z-basis on the auxiliary qubit R′. When the outcome is is |1〉R, the teleportation fails. If the measurement result is |0〉R, the target state can be reconstructed with a probability of a2.

The optimal probability of successful teleportation is obtained by adding both contributions, resulting in 2a2. That is to say, the task of teleporting shared quantum secret in the first stage has been completed with a probability of 2a2.

The cloning of shared quantum secret state in the second stage is completely consistent with the Section 2, we will not repeat it here.

Remark: (i) When , the success probability of our scheme is , and the quantum channel shown in Eq (14) degenerates into the maximally entangled channel shown in Eq (2), which indicates that this scheme is a generalization of that in Section 2.

(ii) Note that the coefficients of quantum channel are all real numbers. More generally, if the quantum channel is in the following form (23) where real numbers a, b, θ1 and θ2 satisfy a2 + b2 = 1 and θ1, θ2 ∈ [0, 3π], then one of the receivers applies a unitary transformation under the computational basis (Z-basis) {|0〉, |1〉} on his or her qubit, i.e. , which converts into . Therefore, applying the method in this subsection, the corresponding assisted cloning task can always be completed with a certain probability.

3.2 Assisted cloning based on positive operator-valued measurement

Let’s only consider Eq (17), as the discussion on Eq (18) yields the same result. After introducing an auxiliary qubit R with the original state |0〉R by the last receiver Bm, he or she performs a controlled-NOT gate on qubits rm and R, where qubit rm works as the control qubit and qubit R as the target qubit, and define as . It will transform the product state to (24) where (25) In order to determine |EB and |GB, the receiver Bm needs to perform an optimal positive operator-value measurement (POVM) on the auxiliary qubit R, which should take the following forms (26) where I is an identity operator, and (27) and the λ related to parameters a and b should ensure that P3 is a semi positive operator. To determine λ, we need to rewrite P1, P2 and P3 in matrix form (28) To make P3 a semi positive operator, the parameter λ should satisfy the condition

After executing POVM, receiver Bm is able to obtain Pj (j = 1, 2) with the following probability (29) where . According to the value of POVM, receiver Bm can infer the state |FjR (j = 1, 2) of auxiliary qubit R. However, based on the value , receiver Bm can obtain U5, but cannot infer the states of qubit R. Once receiver Bm determines the state |FjR (j = 1, 2), it means he or she knows the state |EjB (j = 1, 2), and then the receiver Bm applies the corresponding unitary transformation I or σz to qubit rm.

In this way, the state of qubits r1, r2, ⋯, rm−1 and rm becomes with the probability of , completing quantum teleportation.

In summary, the task in the first phase is completed with a probability of 4/λζ and unit fidelity, because starting from Eq (18), the original state can also be reconstructed with a probability of 2/λζ and unit fidelity.

Similar to Subsection 3.2, the auxiliary cloning of unknown shared quantum state in the second stage is completely consistent with the corresponding part in Section 2.

Remark: When and λ = 1, and the quantum channel shown in Eq (14) changes into the maximally entangled channel shown in Eq (2), and the success probability of quantum teleportation in first stage is which means that the first stage here is standard quantum teleportation of shared secret. Combining with the second stage, our scheme here is a generalization of the scheme in Section 2.

3.3 Assisted cloning based on a single generalized Bell-state measurement

In the two preceding subsections, achieving 100% fidelity in teleporting the original shred state requires the introduction of an auxiliary qubit and subsequent execution of a two-qubit transformation. However, we demonstrate here that it is possible for receivers to restore the target state without an auxiliary qubit, albeit not with unit probability. This can be achieved by replacing n Bell-state measurements with a single generalized Bell-state measurement. To begin, construct the generalized Bell-state basis as follows (30) and use this generalized Bell-state measurement basis to rewrite as follows (31) where , , and are defined by Eq (6). Here, the sender A1 executes a generalized Bell-state measurement on qubit pair . In fact, any sender in the group is capable of conducting the generalized Bell-state measurement due to the symmetry of the original state and the network channel , resulting in identical outcomes. Without loss of generality, let’s assume that the first sender is responsible for this operation, while the remaining senders continue with standard Bell state measurements. It is evident that the outcome remains unaffected by the order in which joint measurements are conducted.

If the measurement outcome is , the state at the receivers’ hands will be , and when the result is , the state will be . In both of these scenarios, the receivers have the capability to restore the target state by implementing appropriate local Pauli operators. Consequently, the probability of successful restoration is denoted as p1 = 2a2, where p1 represents the likelihood of success without the introduction of an auxiliary qubit.

If the measurement results are or , the unnormalized state at the receivers’ hands will be or , respectively. The receivers can obtain the target state similar to the scheme in Subsection 3.1 by introducing an auxiliary state and finding the corresponding general evolution separately through replacing (a, b) with (a2, b2) in Eq (16). As a result, the optimal successful probability is p2 = 2a2, where p2 represents the successful probability when introducing an auxiliary qubit.

Note that the probability of randomly obtaining any one of , , or and is 1/4, therefore the total success probability of quantum teleportation in the first stage is

Now, let’s consider the second stage of the scheme. By replacing state (|ϕ+〉)n in Section 2 with state , the state corresponding to Eq (10) in Section 2 is (32)

After the state preparer Victor and the senders perform the same operations as the second stage of the scheme in Section 2, the state corresponding to Eq (13) in Section 2 is (33) That is to say, the states corresponding to Victor’s measurement results and are the states and , respectively.

Finally, when sender A1 uses the methods described in Subsections 3.1 or 3.2, all senders can obtain a copy or an orthogonal-complementing copy of the unknown shared state with probability a2.

For other measurement results in the process of quantum teleportation (see Eq (31)), applying the same analysis method as above, senders will obtain a copy or an orthogonal-complementing copy of the unknown shared state with a certain probability.

Remark: (i) The construction method of generalized Bell-state basis is not unique. For example, the vectors , , and also form a set of mutually orthogonal generalized Bell-state bases.

(ii) Similar to the discussion in Subsections 3.1 or 3.2, this scheme is still a generalization of the scheme in Section 2.

4 Discussion and conclusion

As the first stage of our scheme, quantum teleportation is different from the design concept in references [59, 68] in which a trusted node plays an important role in connecting participants and transmitting information. Establishing a long-distance quantum communication through distributed nodes is advantageous, as it eliminates the need for any single node to relay complete quantum information. This principle also extends to the storage and retrieval of quantum secrets in spatially separated quantum memory. Verification strategies for multipartite entanglement [5861] are valuable for preparing an entangled network in the presence of untrustworthy parties. The access information in schemes with non-maximally entangled channels can be displayed using the same method as described in Subsection 3.1 of this article. In this way, we still have the conclusion that no subparties can fully access quantum secrets during the process of teleportation.

Note that except for the (n − 1) times of standard Bell-state measurements used in Subsection 3.3, all other schemes used n times of standard Bell-state measurements, which are unnecessary. Actually, only one Bell-state measurement or generalized Bell-state measurement is sufficient for implemening each scheme. Rewrite Eq (6) as (wothout normalized) (34) implying that executing one Bell-state measurement and 2(n − 1) times of X-basis measurements is equivalent to n times of Bell-state measurements (or one generalized Bell-state measurement and (n − 1) times of Bell-state measurements), where the X-basis measurement is a single-qubit projective measurement on the basis . Due to the greater experimental feasibility of executing two single-qubit measurements compared to a joint two-qubit measurement, it appears that the latter option, involving only one Bell-state (generalized Bell-state) measurement, should be chosen. The success probability of identifying the Bell states |ϕ〉 and |ψ〉 is limited to 1/2, as only these two states can be unambiguously distinguished from each other [62, 63]. When performing n Bell-state measurements according to Eq (6), failure occurs only when the measurement result is |ϕ+n or |ψ+n. As a result, the probability of successful discrimination increases to 1 − 2n, indicating that increasing n enhances the likelihood of successfully distinguishing between the logical Bell states.

Of course, our work is not limited to the GHZ-type state encoding. By correcting photon loss, operational errors, and dishonest participants through error coding, it can be further extended to fault tolerance. For instance, a parity state encoding [64] can be used to some extent [65, 66] to correct the effects of photon loss, errors, and dishonesty. In principle, even in the case of loss and error, it can transmit quantum information with any high probability of success [67]. The use of other types of entangled states such as cluster states for encoding is worth further consideration. The success probability of Bell state measurement can be enhanced by utilizing cluster state encoding [68]. The integration of such encoding techniques and secret sharing protocols [11] based on cluster states is of great significance. In addition, there is only one state preparer in our schemes. We can introduce two or more state preparers like in article [69], which can improve the security of our scheme. To achieve this, we need to introduce an appropriate amount of auxiliary particles and use joint RSP technology.

It is worth noting that our scheme has high security. To make it clearer, we give a security check here. Before initiating bidirectional controlled assisted cloning, they should first conduct a security check. Alice prepares one check sequence composed of qudits with the random state {|0〉, |1〉, |+〉, |−〉} and sends it to the remote preparer Victor. When the eavesdropper Eve intercepted this qudit sequence, he will randomly select a set of polarization-based measurements {|0〉, |1〉} or {|+〉, |−〉} to measure the check qudits, and prepares a new qudit sequence to Victor. However, due to Eve’s behavior interfering with quantum states, if he chooses the wrong measurement basis, it will lead to a high error rate. This high error rate will be detected during the process of security check between Alice and Victor. If there is one eavesdropper, it is possible for Alice and Victor to suspend the communication. The same security detection method can be used between Bob and Victor, as well as among Alice, Bob and Charlie. Therefore, the security of our scheme can be guaranteed. On the other hand, due to the introduction of a controller in our scheme, the security of the scheme has been further enhanced.

In summary, we have proposed a new protocol that one can produce perfect copies and orthogonal complement copies of an arbitrary unkonwn shared quantum state via quantum and classical channel, with assistance of a state preparer. This assisted cloing ptotocol needs two stage. The first stage requires teleportation by using a maximally entangled GHZ-type state as quantum channel to teleport an arbitrary unknown shared quantum state between multiple parties in a quantum network. In the second stage, the state preparer executes a special single-qubit projective measurement and a series of single-qubit computational basis measurements on the qubits which seeded by senders. After having received the preparer’s measurement outcomes through classical channel, senders can obtain the input original state and its orthogonal complement state by a series of appropriate unitary operations. In order to meet the needs of the real environment, we have extended the above protocols to the case of non-maximally entangled GHZ-type quantum network channel, and obtained three generalized protocols with unit fidelity a certain probability. In the first generalized protocol, one of the receivers needs to introduce an auxiliary qubit, perform a twoqubit unitary transformation, and make a single-qubit computational basis measurement on the auxiliary qubit. The second generalized protocol requires one of the receivers to perform a controlled-NOT gate transformation and POVM after introducing an auxiliary qubit. The first stage of the third generalized protocol requires one of the senders to perform a generalized Bell state measurement. After other senders perform standard Bell measurements, the receivers either directly recover the input unknown state through appropriate Palui gates, or probabilistically reconstruct the target state using the method of the first or second generalized protocol. In the second stage of this protocol, the senders need to use the receivers’ method in the first or second generalized protocols to complete the cloning task.

References

  1. 1. Bennett C H, Brassard G, Crépeau C, Jozsa R, Peres A, Wootters W K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993, 70: 1895. pmid:10053414
  2. 2. Ekert A K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67(6): 661–663. pmid:10044956
  3. 3. Kimble H J. The quantum internet Nature. 2008, 453: 1023–1030. pmid:18563153
  4. 4. Raussendorf R. Browne D E, Briegel H J. Measurement-based quantum computation on cluster states. Physical Review, A. Atomic, molecular, and optical physics. 2003, 68(2): 022312.
  5. 5. Hillery M., Bužek V., Berthiaume A. Quantum secret sharing. Phys. Rev. A. 1999,59(3): 1829–1834.
  6. 6. Karlsson A, Bourennane M. Quantum teleportation using three-particle entanglement. Physical Review A. 2002, 58(6): 4394–4400.
  7. 7. Peng J Y, Wu F, Tang L. Quantum multicast, multi-output protocols of quantum state sharing and quantum operation sharing via six-particle cluster state. Quantum Information Processing. 2023, 22: 424.
  8. 8. Dou Z, Xu G, Chen X B, Yang Y X. A secure rational quantum state sharing protocol. Science China. 2018, 61(2): 022501.
  9. 9. Zhao Z, Chen Y A, Zhang A N, Yang T, Briegel H J, Pan J W. Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature. 2004, 430 (6995): 54–8. pmid:15229594
  10. 10. Lee J, Kim M S. Entanglement teleportation via Werner states. Phys. Rev. Lett. 2000, 84: 4236–4239. pmid:10990654
  11. 11. Bell B A, Markham D, Herrera-Martí D A, Marin A, Wadsworth W J, Rarity J G, et al. Experimental demonstration of graph-state quantum secret sharing. Nature Communications. 2014, 5: 5480. pmid:25413490
  12. 12. Peng J Y, Bai M Q, Mo Z W. Bidirectional quantum states sharing. Int. J. Theor. Phys. 2016, 55: 2481–2489.
  13. 13. Mishra S, Shukla C, Pathak A,Srikanth R, Venugopalan A. An Integrated Hierarchical Dynamic Quantum Secret Sharing Protocol. International Journal of Theoretical Physics. 2015, 54(9): 1–12.
  14. 14. Kang S Y, Chen X B,Yang Y X. Multi-party quantum state sharing of an arbitrary multi-qubit state via χ-type entangled states. Quantum Inf. Process. 2014, 13: 2081–2098.
  15. 15. Barasiński A, Černoch A, Lemr K. Demonstration of controlled quantum teleportation for discrete variables on linear optical devices. Physical review letters. 2019, 122(17): 170501.1–170501.6. pmid:31107073
  16. 16. Li X H, Ghose S. Analysis of N-qubit perfect controlled teleportation schemes from the controller’s point of view. Physical Review A. 2015, 91(1):.012320.
  17. 17. Wang M, Li H S. Bidirectional quantum teleportation using a five-qubit cluster state as a quantum channel. Quantum Information Processing. 2022, 21(2): 1–11.
  18. 18. Li Y H, Nie L P, Li X L, et al. Asymmetric bidirectional controlled teleportation by using six-qubit cluster state. International Journal of Theoretical Physics. 2016, 55(6): 3008–3016.
  19. 19. Peng J Y, He Y. Annular controlled teleportation. Internal Journal of Theoretical Physics. 2019, 58: 3271–3281.
  20. 20. Sun S, Zhang H.B. Deterministic quantum cyclic controlled teleportation of arbitrary multi-qubit states using multi-qubit partially entangled channel. Modern Physics Letters A. 2020, 35(25): 2050204.
  21. 21. Peng J Y, Tang L, Yang Z, Wu F, Mo Z W, Bai M Q. Cyclic teleportation in noisy channel with nondemolition parity analysis and weak measurement. Quantum Information Precessing. 2022, 21: 114.
  22. 22. Cai C, Sun Y M, Zhang Y R, Zhang P, Niu J N, Ji Y F. Experimental wavelength-space division multiplexing of quantum key distribution with classical optical communication over multicore fiber. Optics Express. 2019, 27(4): 5125–5135. pmid:30876115
  23. 23. Zhou C, Wang X Y, Zhang Z G, et al. Rate compatible reconciliation for continuous-variable quantum key distribution using Raptor-like LDPC codes. Sci. China Phys. Mech. Astron. 2021, 64(6): 9.
  24. 24. Lin S, Liu W J, Guo G D, et al. Cryptanalysis of controlled bidirectional quantum secure direct communication network using classical XOR operation and quantum entanglement. IEEE Communications Letters. 2017, 21(7): 1561–1564.
  25. 25. Wang J, Chen H Q, Zhang Q, Tang C J. Multiparty controlled quantum secure direct communication protocol. Acta Physica Sinica -Chinese Edition-. 2007, 56(2): 673–677.
  26. 26. Peng J Y, Yang Z, Tang L, Bai M Q. Controlled remote state preparation of single-particle state under noisy channels with memory. Quantum Information Precessing. 2023, 22: 145.
  27. 27. Chen N, Yan B, Chen G, Zhang M J, Pei C X. Deterministic hierarchical joint remote state preparation via six-particle partically entangled state. Chin. Phys. B. 2018, 27(9): 090304.
  28. 28. Fonseca A. High-dimensional quantum teleportation under noisy environments. Physical Review A. 2019, 100: 062311.
  29. 29. Pati A K. Minimum classical bit for remote preparation and measurement of a qubit. Phys. Rev. A, 2001, 63: 014302.
  30. 30. Bennett C H, Divincenzo D P, Shor P W, et al. Remote State Preparation. Physical Review Letters. 2001, 87(7): 077902. pmid:11497918
  31. 31. Peng J Y, Yang Z, Tang L, Peng J S. Multicast-based multiparty remote state preparation of complex coefficient two-qubit states. Quantum Information Precessing. 2023, 22: 141.
  32. 32. Ma P C, Chen G B, Li X W, Zhan Y B. Hierarchically controlled remote state preparation of an arbitrary single-qubit state by using a four-qubit |χ〉 entangled state. Quantum Inf. Process. 2018, 17(5): 105
  33. 33. Peng J Y, Yang Z, Tang L, Bai M Q. Controlled remote state preparation of single-particle state under noisy channels with memory. Quantum Information Precessing. 2023, 22: 145.
  34. 34. Shukla C, Thapliyal K, Pathak A. Hierarchical joint remote state preparation in noisy environment. Quantum Inf. Process. 2017, 16: 205.
  35. 35. Peng J Y, Bai M Q, Tang L, Yang Z, Mo Z W. Perfect controlled joint remote state preparation of arbitrary multi-qubit states independent of entanglement degree of the quantum channel. Quantum Information Precessing. 2021, 20: 340.
  36. 36. Lv S X, Zhao Z W, Zhou P. Multiparty-controlled joint remote preparation of an arbitrary m-qubit state with d-dimensional Greenberger-Horne-Zeilinger states. Int. J. Theor. Phys. 2018, 57(1): 148–158.
  37. 37. Peng J Y, Bai M Q, Mo Z W. Bidirectional controlled joint remote state preparation. Quantum Inf. Process. 2015, 14: 4263–4278.
  38. 38. Li Y H, Qiao Y, Sang M H, Nie Y Y. Bidirectional controlled joint remote state preparation of an aibitrary two-qubit state. Int. J. Theor. Phys. 2019, 58(7): 2228–2234.
  39. 39. Peng J Y, Lei H X. Cyclic remote state preparation. Internal Journal of Theoretical Physics. 2021, 60: 1593–1602.
  40. 40. Lee S M, Lee S W, Jeong H, Park H S. Quantum teleportation of shared quantum secret. Physical Review Letters. 2020, 124: 060501. pmid:32109109
  41. 41. Li H J, Li J, Chen X B. Probabilistic quantum teleporttation of shared quantum secret. Chinese Physices B. 2022, 31: 090303.
  42. 42. Pati A K. Assisted cloning and orthogonal complementing of an unknown stat. Physical Review, A. Atomic, molecular, and optical physics. 2000, 61(2): 022308.
  43. 43. Zhan Y B. Assisted cloning of an unknown two-particle entangled state. Physics Letters A. 2005, 336(4-5): 317–323.
  44. 44. Han L F, Yuan H, Yang M, Cao Z L. Assisted cloning of an arbitrary unknown two-qubit state via a genuine four-qubit entangled state and positive operator-valued measure. Indian Journal of Pure & Applied Physics. 2014, 52: 563–570.
  45. 45. Hou K, Shi S H. Scheme for cloning an unknown entangled state with assistance via non-maximally entangled cluster states. International Journal of Theoretical Physics. 2009, 48(1):167–177.
  46. 46. Zhan Y. A scheme for assisted cloning of a two-particle entangled state via GHZ class states. Chinese Optics Letters. 2005, 3(101): S286–S289.
  47. 47. Fang M, Liu Y M, Liu J, Shi S H, Zhang Z J. Assisted cloning and orthogonal complementing of an arbitrary unknown two-qubit entangled state. Communications in Theoretical Physics. 2006, 46(5): 849–852.
  48. 48. Zhan Y B. Scheme for realizing assisted cloning of an unknown two-atom entangled state via cavity QED. Chinese Physics B. 2008, 17(2): 411–414.
  49. 49. Xiao X Q, Liu J M. Assisted cloning and orthogonal complementing of an arbitrary two-qubit state. International Journal of Theoretical Physics. 2011, 50(9): 2864–2870.
  50. 50. Shi J, Zhan Y B. Scheme for implementing assisted cloning of an unknown tripartite entangled state. Int. J. Theor. Phys. 2007, 46(12): 3331–3338.
  51. 51. Ma P C, Zhan Y B. Scheme for quantum cloning of an unknown N-particle entangled state with assistance. International Journal of Quantum Information. 2008, 6(01): 159–165.
  52. 52. Ma P C, Zhan Y B. Scheme for implementing assisted cloning of an unknown d-dimension equatorial quantum state by remote state preparation. Commun. Theor. Phys. 2009, 51: 57–59.
  53. 53. Chen X B, Ma S Y, Pang B, Yang Y X, Wen Q Y. An economical scheme for cloning an unknown M-qudit equatorial-like state with assistance. Commun. Theor. Phys. 2010, 53: 1067–1071.
  54. 54. Xue L, Jiang M. Assisted cloning of arbitrary unknown multi-qudit state. 2015 10th Asian Control Conference (ASCC). IEEE. 2015.
  55. 55. Luo Ming-Xing, Chen Xiu-Bo, Yang Yi-Xian, Qu Zhi-Guo, and Wang Xiaojun. Hyperentanglement concentration for n-photon 2n-qubit systems with linear optics. Journal of the Optical Society of America B. 2014, 31: 000067.
  56. 56. Ren B C, Wang H, Alzahrani F, et al. Hyperentanglement concentration of nonlocal two-photon six-qubit systems with linear optics. Annals of Physics. 2017, 385: 86.
  57. 57. Sheng Y B, Deng F G. Deterministic entanglement purification and complete nonlocal Bell-state analysis with hyperentanglement. Physical Review A. 2009, 81(3): 537–542.
  58. 58. Bose S, Vedral V, Knight P L. Purification via entanglement swapping and conserved entanglement. Physical Review A. 1998, 60(1): 194.
  59. 59. Pant M, Krovi H, Towsley D, et al. Routing entanglement in the quantum internet. Quantum Information. 2019, 5: 25.
  60. 60. Sun Q C, Mao Y L, Chen S J, et al. Quantum teleportation with independent sources and prior entanglement distribution over a network. Nature Photonics. 2016, 10: 671–675.
  61. 61. Li W L, Li C F, Guo G C. Probabilistic teleportation and entanglement matching. Physical Review A. 1999, 61(3): 034301.
  62. 62. Lutkenhaus N, Calsamiglia J, Suominen K A. Bell measurements for teleportation. Physical Review A. 1999, 59(5): 3295–3300.
  63. 63. Calsamiglia J, Ltkenhaus N. Maximum efficiency of a linear-optical Bell-state analyzer. Applied Physics B. 2001, 72(1): 67–71.
  64. 64. Ralph T C, Hayes A J F, Gilchrist A. Loss tolerant optical qubits. Physical review letters. 2005, 95(10): 100501. pmid:16196913
  65. 65. Zhong H S, Li Y, Li W, et al. 12-photon entanglement and scalable scattershot boson sampling with optimal entangled-photon pairs from parametric down-conversion. Physical Review Letters. 2018, 121: 250505. pmid:30608840
  66. 66. Shor P W. Scheme for reducing decoherence in quantum computer memory. Physical Review A. 1995, 52(4): R2493–CR2496. pmid:9912632
  67. 67. Ewert F, Bergmann M, Van Loock P. Ultrafast long-distance quantum communication with static linear optics. Physical Review Letters. 2016, 117(21): 210501. pmid:27911560
  68. 68. Azuma K, Tamaki K, Lo H K. All photonic quantum repeaters. Nature Communications. 2015, 6: 6787. pmid:25873153
  69. 69. Ma P, Chen G, Li X W, et al. Quantum jointly assisted cloning of an unknown three-dimensional equatorial state. Laser Physics. 2018, 28.