Researchers discover loophole enabling encrypted quantum cloning

Scientists have identified a method to create multiple copies of quantum information by encrypting them with a one-time decryption key, sidestepping the no-cloning theorem. This approach, developed by Achim Kempf and colleagues at the University of Waterloo, was tested on an IBM quantum processor. The technique could enhance redundancy in quantum computing and storage systems.

The no-cloning theorem, established in the 1980s, holds that quantum states cannot be duplicated without destroying their properties, a principle foundational to quantum encryption and security protocols.

Achim Kempf at the University of Waterloo in Canada, along with his team, has demonstrated a workaround: cloning quantum systems by encrypting the information and pairing it with a single-use decryption key. "You can make a lot of copies and generate redundancy in this way, but you have to encrypt the copies, and the decryption key can only be used once," Kempf explained. This ensures compatibility with the theorem, as only one unencrypted, readable copy exists at a time.

The idea emerged from research into quantum Wi-Fi or radio systems, where multiple receivers would otherwise violate the theorem by receiving identical quantum data. The team found that quantum noise effectively encrypts the information, which can be intentionally leveraged and reversed. After theoretical proof, they implemented the protocol on an IBM Heron 156-qubit quantum processor, producing hundreds of encrypted qubit clones. "In fact, we ran out of real estate on the IBM processor. It holds only 156 qubits but we estimated that we can do more than 1000 encrypted clones before the [errors] make us stop," Kempf noted. The method shows resilience to noise and errors common in current quantum hardware.

Potential applications include quantum cloud storage, akin to classical systems like Dropbox, which replicate data across multiple sites for reliability. "If you send a file to Dropbox, it will save your data at least three times in three different computers that are geographically separated, so that if one is hit by fire, the other one by a flood, there’s a fair chance the third one survives," Kempf said. "It used to be thought you can’t do that with quantum information, because you can’t clone it. But what we showed is that you can do it."

Aleks Kissinger at the University of Oxford described it as "an interesting quantum cryptographic protocol" useful for redundancy in quantum communication. He clarified, "It’s not so much cloning as a kind of spreading the [quantum] state to lots of other parties, in such a way that any one of those parties could later get it back." Kempf concurred: "It’s not cloning. It’s encrypted cloning. That’s just a refinement of the no-cloning theorem."

The findings appear in Physical Review Letters (DOI: 10.1103/y4y1-1ll6) and arXiv (arXiv:2602.10695).

Related Articles

Physicist Pan Jianwei and his team have demonstrated device-independent quantum key distribution over 100 kilometers using single atoms, helping to close the gap between lab experiments and real-world applications. The breakthrough enhances security through the quantum-mechanical behavior of entangled atoms, protecting quantum communication systems from real-world vulnerabilities even if devices are flawed or tampered with.

Reported by AI

Researchers have used quantum superposition to help qubits violate a fundamental quantum limit, allowing them to maintain information five times longer. This breakthrough involves a three-qubit system that demonstrates extreme correlations over time. The finding could enhance quantum computing and metrology applications.

Researchers at RPTU University of Kaiserslautern-Landau have simulated a Josephson junction using ultracold atoms, revealing key quantum effects previously hidden in superconductors. By separating Bose-Einstein condensates with a moving laser barrier, they observed Shapiro steps, confirming the phenomenon's universality. The findings, published in Science, bridge atomic and electronic quantum systems.

Reported by AI

Researchers have mathematically shown that a quantum neural network could help measure hard-to-access properties of quantum objects, potentially cheating the Heisenberg uncertainty principle. By injecting randomness into the network, scientists might determine multiple incompatible properties more precisely. This approach could speed up applications in quantum computing and chemistry.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline