Next Article in Journal
An Outer Approximation Method for Scheduling Elective Surgeries with Sequence Dependent Setup Times to Multiple Operating Rooms
Previous Article in Journal
Key Factors for a Successful OBM Transformation with DEMATEL–ANP
Previous Article in Special Issue
Tighter Monogamy Relations for Concurrence and Negativity in Multiqubit Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Correlations in Quantum Network Topologies Created with Cloning

1
Independent Researcher, Eden Au Lac Apartment, Indiranagar, Bangalore 560038, India
2
Department of Mathematical Sciences, Zhejiang Sci-Tech University, Hangzhou 310018, China
3
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology-Hyderabad, Gachibowli, Telangana 500032, India
4
Center for Quantum Science and Technology, International Institute of Information Technology-Hyderabad, Gachibowli, Telangana 500032, India
5
School of Mathematical Sciences, Zhejiang University, Hangzhou 310027, China
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(11), 2440; https://doi.org/10.3390/math11112440
Submission received: 19 December 2022 / Revised: 13 May 2023 / Accepted: 17 May 2023 / Published: 25 May 2023
(This article belongs to the Special Issue Quantum Algorithms and Relative Problems)

Abstract

:
With progress in quantum technologies, the field of quantum networks has emerged as an important area of research. In the last few years, there has been substantial progress in understanding the correlations present in quantum networks. In this article, we study cloning as a prospective method to generate three party quantum networks which will help us to create larger networks. We analyze various quantum network topologies that can be created using cloning transformations. This would be useful in situations wherever the availability of entangled pairs is limited. In addition to that, we focus on the problem of distinguishing networks created by cloning from those that are created by distributing independently generated entangled pairs. We find that there are several states that cannot be distinguished using the Finner inequalities in the standard way. For such states, we propose an extension to the existing Finner inequality for triangle networks by further increasing the number of observers from three to four or six depending on the network topology. This takes into account the additional correlations that exist in the case of cloned networks. In the last part of the article, we use tripartite mutual information to distinguish cloned networks from networks created by independent sources and further use squashed entanglement as a measure to quantify the amount of dependence in the cloned networks.

1. Introduction

Quantum correlations have never failed to amaze researchers and have remained an important aspect of quantum information theory [1,2,3,4]. In recent years, several studies were conducted to further enhance our understanding about the nature of quantum correlations and other quantum resources. In particular, a resource theoretic framework was constructed to understand the role of these resources [5,6,7,8,9] in different information processing tasks. In addition, efforts have been made to extend the idea of quantum correlations and other quantum resources to three or more parties [10,11]. The idea is not only about quantum correlations in a multi-party scenario, but the reach also extends to quantum networks and internet [12,13,14,15,16,17,18,19,20]. These networks are in principle created by the distribution of entanglement to distant parties by one or multiple independent sources and the application of local unitaries to establish strong correlations in the entire network. In such scenarios, distant parties can establish direct correlation through intermediate nodes by repeater technology [21,22,23]. Whenever we talk about multi-party entanglement, monogamy plays a central role. In the case of quantum networks, since they can be created by distributing independently created entangled pairs, monogamy is not as applicable. Bell inequalities for such networks have also been studied in detail [24,25,26,27] and even enhanced in the way that they can be input-independent [25,28]. These ideas have further pushed our understanding towards real world quantum networks [18,19]. However, the study of correlations in quantum networks is still not complete, and in recent years, we have seen tremendous theoretical and experimental progress in terms of the establishment of quantum networks [20]. Most of these studies are restricted to simple network topologies like bi-local and triangle networks, which are created using an independent source that prepares and distributes entangled qubits to distant observers [15].
Quantum resources [1,6,7,9] on one hand give us a significant advantage in accomplishing various information processing tasks [5,21,23,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45] over their classical counterparts, while on the other hand, they impose strict restrictions on certain kind of operations [46,47,48,49,50,51]. Among these restrictions, the No-cloning theorem prohibits us from perfectly cloning an arbitrary unknown quantum state [46]. However, it does not rule out the possibility of cloning states approximately (i.e., with fidelity of less than unity) [46,52,53,54,55,56,57,58] or with a certain probability of success. Approximate quantum cloning machines (QCMs) can further be classified into two types, namely (a) state-dependent [46,52,55,59,60] and (b) state-independent [52,54] cloners. Another kind of classification that can be made in the context of these cloning machines is based on the kind of output they produce. If all the cloning outputs are the same, then the cloning machine is called symmetric; otherwise, it is referred to as an asymmetric cloning machine [61,62].
For a quantum network to be functional, it is not necessary to have a network with a maximally entangled state, at least in the context of information processing tasks such as the sending of data qubits (teleportation) and cbits (super dense coding). As an example, we can take the context of teleportation, where if the fully entangled fraction f of the resource state ρ is greater than 1 / 2 (teleportation fidelity F m a x is greater than 2 / 3 ), then we can always have quantum advantage. Similarly, in the case of super dense coding, if the quantum conditional entropy of the resource state is negative S ( A | B ) ( ρ ) < 0 , the state is useful for super dense coding. In addition, it is not necessary that the channel has to be pure state. There are many mixed states for which such an advantage will be possible. In this article, we talk about the tripartite network that is obtained as an output of the cloning process.
To start with, we make another assumption that the source has a single maximally entangled state and wants to create a tripartite quantum network. We also study the process of establishing a network without the need for an independent source. We have considered the set of symmetric cloners that produce outputs with equal fidelity [55]. We use such cloners to create various types of quantum networks and made an effort to understand the limits of networks that are created by the process of cloning. One significant difference between networks created by cloning and by distributing independently created entangled states is the condition of statistical independence of resources, which relaxes the monogamy constraint and also makes the relevant Bell inequalities become non-linear in the latter case [20]. We show that by choosing specific initial states and cloning machine parameters, we can create networks that cannot be distinguished from those networks that are created by distributing independent entangled pairs. We thoroughly analyze such tripartite networks along with various topologies that are created and study how these networks can be distinguished from the ones that are created by distributing independent entangled pairs. We find several instances where these cannot be distinguished. We also try to quantify the amount of dependence on the initial source in networks with the help of an entanglement quantifier.
In Section 2, we first introduce and discuss various types of cloning techniques that have been used to create different three party quantum networks. These include local and non-local cloning operations, with the option of creating either two copies or three copies. In Section 3, we briefly describe all types of tripartite networks and also the Finner inequality to understand the limit it poses on network topology. We also introduce our extension to the Finner inequality to understand these limits more. In Section 4, we try to create tripartite network topologies with cloning by taking inspiration from [63]. Specifically, we create three kinds of network topologies for three distant observers, namely tripartite networks, bi-local, and genuine triangle networks. We study the problem of distinguishing these networks from traditional networks. We also study the constraints on such networks arising due to the quantum Finner inequalities [63]. In Section 5, we use a network witness created using tripartite mutual information to distinguish cloned networks from others since cloned networks are created using a single source. We also propose a method to quantify the statistical dependence on the initial single source present in the entire network. The objective of the study is to identify alternate ways of creating quantum networks so that in practice, whenever there is a limitation on the number of entangled states created, we can take the alternative approach of cloning and create large networks.

2. Approximate Quantum Cloning Machines

From the breakthrough paper from Wooters and Zurek, we know that perfect cloning is not possible according to the No-cloning theorem [46]. However, it does not rule out the possibility of cloning a quantum state approximately with a fidelity F less than unity [52]. The fidelity F can be expressed as
F = Ψ | ρ o u t | Ψ ,
where Ψ refers to the state to be cloned at the input port of the cloner and ρ o u t is the state obtained at its output port after applying the cloning transformation. In our study of networks, we use similar symmetric approximate cloning machines. The base version of all the cloning machines used in this work is the Buzek–Hillery cloning machine.
Here, we have used four variants of the Buzek–Hillery cloning machine to create three kinds of networks. The first cloning transformation is local 1 2 cloning ( Q C L 1 2 ), where we apply two unitary transformations at the two ends of a spatially separated entangled pair to produce another copy of the local states. It is given by the following transformation [54]:
U b h Ψ i a 0 Σ a 1 X x c Ψ i a Ψ i b X i i x + d j i M Ψ i a Ψ j b + Ψ j a Ψ i b Y i j x .
It is an M-dimensional quantum copying transformation acting on a state Ψ i a 0 (where i ∈ {1, …, M}). This state is to be copied on a blank state Σ a 1 . Initially, the cloning machine was prepared in state X x . After the cloning transformation, this is transformed into another set of state vectors X i i x and Y i j x (where i , j ∈ {1, …, M}). Here, Ψ = i = 1 M α i Ψ i , where Ψ i are the basis vectors of the m qubit system with dimensions M = 2 m , and α i represents the probability amplitude, hence i = 0 M α i 2 = 1 . The modes a 0 , a 1 , and x represent the input, blank, and machine qubits, respectively. In this case, these transformed machine state vectors X i i , Y i j are elements of the orthonormal basis set in the M-dimensional space. Here, i , j are two indices that run from 1 to M. The coefficients c and d are the probability amplitudes which take real values. The relation between c and d can easily be obtained from the unitarity condition of cloning transformation—this relation is given by c 2 = 1 2 ( m 1 ) d 2 . When we want to make use of state-independent versions of the cloner, we can calculate the specific value of the machine parameter d for which the coning outcome is not dependent on input states.
The second cloning transformation is 1 3 ( Q C L 1 3 ) cloning on a single qubit. Here, we create three copies of a single qubit and distribute it to three parties to create a three-party network. This 1 3 cloning transformation applied on a single qubit is given by
U b h Ψ i a 0 Σ a 1 Σ a 2 X x c Ψ i a Ψ i b Ψ i c X i i x + d j , k i M ( Ψ i a Ψ j b Ψ k c + Ψ i a Ψ k b Ψ j c + Ψ j a Ψ i b Ψ k c + Ψ j a Ψ k b Ψ i c + Ψ k a Ψ i b Ψ j c + Ψ k a Ψ j b Ψ i c ) Y i j k x .
The third transformation is non-local 1 2 cloning transformation ( Q C N L 1 2 ), applied together on an entangled pair to create another copy of it. We follow this mechanism of cloning when we want to create bi-local networks [63], which is explained in the following sections. The cloning transformation is same as given in Equation (2) where M = 4 . To create a triangle network, we use the 1 3 non-local cloning transformation ( Q C N L 1 3 ). We use this kind of cloning transformation to create genuine triangle networks [63]. In this case, the cloning transformation is the same as given in Equation (3), with M = 64 .

3. Three-Party Quantum Networks and Bounds and the Quantum Finner Inequalities

In this section, we give a brief overview of three-party networks. We begin by considering a quantum network with three observers A, B, and C. The network is created by one or more sources by sending quantum states to the different observers. Each of these parties carries out a measurement on the obtained quantum systems, with measurements outputs as a, b, and c. For the purpose of simplicity, we are free to choose a , b , c from the binary values 0 and 1.
Three Inequivalent Networks:
  • For three observers, we can have three inequivalent networks. The first of the kind, shown in Figure 1a, is of a single common source communicating a quantum state to each of these three observers. We can see that any possible distribution P ( a b c ) can be obtained in this case. In fact, it is enough to restrict ourselves to classical sources here. The set of possible attainable distributions P ( a b c ) is nothing but the whole probability simplex with the normalization condition a b c P ( a b c ) = 1 .
  • Next, we consider the case when the triangle network is created by two independent sources, as in Figure 1b. One of the sources distributes a common state to the parties A and B while the other gives it to B and C. This is called a bi-local network. The interesting part of this network is that observers A and C are initially independent; however, they can be made to be correlated to each other through B. If we remove the node B from the network, these two become completely independent. To test the independence, we have the following condition [63]:
    b P ( a b c ) = P ( a ) P ( c ) .
  • Lastly, we have the most interesting and challenging three party network which is the triangle network [see Figure 1c]. This can be obtained from bilocal network by adding a source connecting A and C. Because of this additional source, there is no need for the independence condition as it no longer holds.
Quantum Finner Inequality: Quantum versions of the Finner inequalities as proposed by Renou et al. [63] put fundamental limits on network topologies that can be generated using independent sources of entangled pairs. This inequality is mathematically expressed as
P ( a b c ) P ( a ) P ( b ) P ( c ) ,
where P ( a b c ) is the probability of observing a b c on combined system, and P ( a ) stands for the probability of getting a (the same for b and c) as a measurement outcome in the subsystem A, similarly for subsystems B and C, respectively.
If in a network topology we observe the violation of the quantum Finner inequality, we can surely say that the network is created using a single dependent source. However, in the case where there is no violation, we cannot say that these network topologies are created by using independent sources [63]. The network topologies we have in this article are all generated using the process of quantum cloning. We see several instances of such networks that cannot be distinguished (that it was the network created by independent source distributing entangled pairs or was it created by cloning a single source) by the quantum Finner inequalities. Since quantum cloning is a unitary transformation acting on the state to be cloned along with auxiliary blank states, any state that we derive as an outcome of cloning is physical. If the state obtained exhibits entanglement, we can use them to create a quantum network. All these networks are created by the physical process of quantum cloning, that is, by the application of unitary transformations on initial entangled or non-entangled states, so there is no such physical restriction in the terms of achieving these topologies, which was the case when the networks were created using independent sources. However, in this case, the restrictions arise in terms of the resource fullness of the networks created by cloning.
Modified Finner Inequality: We slightly modify the conditions given by the quantum Finner inequalities for bi-local networks, and we observe that they become more efficient in distinguishing the cloned networks. The modification is to make observer B perform two measurements, one on qubit 2 and another on qubit 4, instead of combined measurement on 24. The corresponding Finner inequalities become [63]
P ( a b b c ) P ( a ) P ( b ) P ( b ) P ( c ) ,
where b is the observed outcome for qubit 2, and b is the observation outcome of qubit 4. The main reason why the extension performs better than the original inequality is that in the cloned bi-local network, we have additional correlations as in ρ 14 and ρ 23 . It is more like a four-party network, but one of the observers holds two shares.

4. Three Party Networks by Cloning

A typical quantum network consists of independent sources distributing entangled states to spatially separated nodes, which can then perform some operations on their part of the network. In this work, we partially relax the condition of having an independent source that distributes entangled pairs. We rather start with a single source and use cloning to create similar network topologies. Several tripartite network topologies are possible to create using quantum cloning. In the following subsections, we elaborate techniques to generate various quantum networks for three parties.

4.1. Three Copies of Single Qubit

The first and the most basic method used to generate a three-party network is by creating three copies of a single qubit and distributing it to three parties. We add the restrictions that the two-qubit states ρ a b = ρ b c = ρ c a (equality holds only in the case of symmetric cloning) must be entangled. In such a scenario, the Finner inequalities do not impose any restrictions, and the entire probability simplex P ( a b c ) is possible.
In Figure 2, we have shown the process of creating this type of network using cloning transformation, as given in Equation (3) for M = 2 . Ψ a b is the initial single-qubit state, Σ is the blank state, and U represents the cloning unitary. This is not actually a network, rather a multipartite correlation in triangle topology.

4.2. Local Cloning of Entangled Pair: Bi-Local Network

The first method we use here to create a bi-local network is by two local cloning operations. We start initially with two spatially separated parties A and B, which share an entangled pair Ψ a b = α 2 | 00 + 1 α 2 | 11 . Parties A and B apply a local cloning transformation of the form given in Equation (2) on their share of the entangled pair. The transformation on the entangled pair can be given by U a U b . After the cloning and tracing of the machine states, the complete output state is given by ρ 1234 , where qubits 1 and 3 are with observer A and qubits 2 and 4 are with observer B. It is important to note that the sub-states represented by qubits ρ 12 , ρ 14 , ρ 23 , and ρ 34 are the same in case of symmetric cloning transformation which we have selected. In addition, the sub-states ρ 13 and ρ 24 are the same. We have shown this process in Figure 3.
We observe that under certain conditions on the initial entangled state, we can simultaneously make ρ 12 (also ρ 14 , ρ 34 , ρ 23 ) entangled and ρ 13 (also ρ 24 ) separable. To generate a bi-local network from such a configuration, A can send one of the qubits, say 3 to C; hence, we obtain a network in which A and C are not directly entangled but are entangled through B. It is interesting to note that whenever the qubit represented by ρ 13 is separable, the inequality given in Equation (4) is obeyed.
Another important aspect of the problem is distinguishability by the Finner inequalities—we see that there are several states that are created by local cloning and can be distinguished as being created by a single source using the Finner inequalities. This is represented in Figure 4. Here, the overlapping region of all three colors (brown, light, and dark green) represents those output states created by local cloning, which are entangled. Since we are using symmetric cloning, this means that all the outputs, namely ρ 12 , ρ 14 , ρ 23 , ρ 14 , are entangled; also, ρ 13 and ρ 24 are simultaneously separable. The dark green region in Figure 4 represents those bi-local cloned networks that can be distinguished by the application of the Finner Inequalities. The lighter green region shows additional bi-local cloned network states that can be distinguished as created by a single source using the modified Finner inequalities as given in Equation (6).

4.3. Bi-Local Network: Non Local Cloning

Similar to the case of local cloning, we can also prepare a bi-local network using non-local cloning. The difference here is that a single common source prepares the individual sources by the application of non-local cloning (unitary) transformation and then distributes qubits to the three parties involved to create a network. In this case, an independent third party has an entangled pair of particles; it applies a global unitary transformation U a b and creates a copy of the entangled pair. In this case as well, we find that ρ 12 , ρ 14 , ρ 23 , and ρ 34 are equal and ρ 13 is equal to ρ 24 . It is important to note here that the correlations are better copied in the case of non-local cloning, so we might actually be able to create a bi-local network with a wider range of input states (Figure 5).
The source after performing the cloning transformation sends the qubit 1 to observer A, qubit 3 to C, and qubits 2 and 4 to B. It is important to note that under certain selected input state parameters and machine state parameters, we can obtain the condition where qubits 1 and 3 are separable; also, qubits 2 and 4 are separable. In some overlapping range of input state parameters and machine states, we can also have entanglement between 1 , 2 and 1 , 4 and also among 2 , 3 and 3 , 4 . Hence, we establish the condition of bi-locality.
Now, we focus on the distinguishability of these networks using the Finner inequalities. We see that there are networks that cannot be distinguished as created by single-source using cloning or an independent source distributing entangled pairs. These networks are represented in Figure 6. The complete shaded region shows all states where the cloning outputs are entangled and can be used for creating a network, and the dark green region represents those bi-local cloned networks that can be distinguished by application of the Finner Inequalities. The lighter green region shows additional bi-local cloned network states that can be distinguished as created by single source using the modified Finner inequalities as given in Equation (6).

4.4. Triangle Network: Non Local Cloning

The last network topology we consider is the extended triangle network. The extension is in terms of additional internal correlations that exist among the qubits held by the observers A, B, and C. Here, we start with an independent entangled pair with a third party and apply a cloning transformation of the type given in Equation (3) with M = 4 to obtain three copies of the entangled pairs. In this case, other than the intended entanglement between ρ 12 , ρ 34 and ρ 56 , we also have ρ 14 = ρ 23 = ρ 16 = ρ 25 = ρ 36 = ρ 45 , which are entangled for some specific machine state parameter and input states. On the other hand, ρ 13 = ρ 15 = ρ 35 = ρ 24 = ρ 26 = ρ 46 remain largely separable.
The network created by following this strategy is not a genuine triangle network, because it has other entangled states as well. The method of preparing such a network is shown in Figure 7. The solid lines represent entangled states, and the red color and the black color are used to demarcate two different types of states. It would be interesting to see if we can obtain the genuine triangle networks by finding a condition on the machine state parameter and the input states that can make ρ 14 (also ρ 23 , ρ 16 , ρ 25 , ρ 36 , and ρ 45 ) separable and keep ρ 12 ( ρ 34 and ρ 56 ) entangled.
Now, we focus on the distinguishability of these networks using the Finner inequalities. We see that there are networks that cannot be distinguished as created by a single source using cloning from independent sources distributing entangled pairs. These networks are represented in Figure 8. The parameter α 2 on the x-axis represents the input state parameter and d on the y-axis represents the machine state parameter. The complete shaded region shows the states that are entangled in a triangle cloned network, the darker green region represents the states that can be distinguished by the original Finner inequalities, and the light green region represents the additional states that can be distinguished by the modified Finner inequality.

5. Witnessing Entanglement in Triangle Networks

In this section, we investigate quantum correlations in networks from the point of view of tripartite mutual information. We also use the notion of the network-based entanglement witness as defined in [64] to check if the networks created by cloning belong to Δ i , where Δ i represents the quantum networks created by distributing entangled pairs created by independent sources. We use this witness to quantify the amount of violation and hence quantify the amount of dependence a source has in the case of networks generated with cloning. For this study, we restrict ourselves to only a genuine triangle network topology—the extension to other typologies that we have considered above is straightforward.
In the study by Kraft et al. [64], several observations are shared that can be used to detect if a state ρ belongs to Δ i , which are as follows:
  • I 3 ( A : B : C ) = 0 for any ρ Δ i . Here, I represents tripartite mutual information given by
    I 3 ( A : B : C ) = S ( A B C ) + S ( A ) + S ( B ) + S ( C ) S ( A B ) S ( A C ) S ( B C ) .
    Intuitively, this means that there is no shared classical mutual information within the subsets of the quantum states owned by the parties A, B, and C, respectively.
  • Let E [ ρ ] be an entanglement measure that is additive on tensor products and monogamous. For any ρ Δ i , we have that E X | Y Z [ ρ ] = E X | Y [ t r Z ρ ] + E X | Z [ t r Y ρ ] holds for all the bi-partitions A | B C , B | A C , and C | A B . The intuition here is that the entanglement on the bi-partition A | B C should be equal to the sum of the entanglement in the reduced states, i.e., A | B and A | C .
We have used squashed entanglement E [65] as a measure to quantify entanglement. Squashed entanglement guarantees additivity and monogamy properties. It is defined as
E s q ( ρ A B ) : = i n f { 1 2 I ( A ; B | E ) : ρ A B E   e x t e n s i o n   o f   ρ A B } .
Here, the minimum is taken over all extensions of ρ A B given by ρ A B E , such that ρ A B = T r E [ ρ A B E ] . I ( A ; B | E ) =   S ( A E ) + S ( B E ) S ( A B E ) S ( E ) is the quantum conditional mutual information of ρ A B E [66].
We have considered cloned triangle networks for the analysis of observations 1 and 2. We first consider the observation 1 and test if the cloned triangle network ρ A B C falls into Δ i , i.e., the set of triangle networks created by independent sources, and then we use observation 2 for the cases where ρ A B C Δ i to quantify the amount of dependence that each entangle pair has in such a network.
In Figure 9, we have shown the values for tripartite mutual information for various states ρ A B C obtained after cloning (creating two copies) a non-maximally entangled state, ψ = α 00 + 1 α 2 11 . Here, d represents the machine state parameter for the cloning machine. We see that both positive and negative values for the T M I are obtained. If T M I < 0 , mutual information is monogamous, like entanglement measures. We see that there are no such states where T M I is exactly zero; hence, all cloned triangle networks can be verified as not being part of Δ i .
We define the amount of dependence in cloned triangle networks as
D [ ρ A B C ] = | E A | B C [ ρ A B C ] E A | B [ t r C ρ A B C ] E A | C [ t r B ρ A B C ] | .
Using this, we now have a quantitative measure of how much dependency on the initial variable α 2 , which was used by the source to create the non-maximally state, is left in the cloned triangle networks. In Figure 10, we have shown the dependence values present in non maximally entangled states as a function of state parameter α . Here, for simplicity, the machine state parameter is set to 0.1. To generate this, we have calculated squashed entanglement in state ρ 123456 which represents the cloned triangle network given in Figure 7; this reduces to the calculation of
D [ ρ 123456 ] = | E A | B C [ ρ 123456 ] E A | B [ ρ 1456 ] E A | C [ ρ 1236 ] | .

6. Conclusions

In this work, we identify quantum cloning as an alternate approach to create quantum networks that can be used whenever there is a limitation on the available number of maximally entangled states. We also study how to identify if a quantum network has been created by cloning or by using independently generated entangled states. Identification can further help us to estimate the capabilities and limitations of the network, which is part of the future extension of the study. We have created various tripartite network topologies with the help of cloning a bipartite two-qubit state. We have used several cloning techniques such as local and non-local with two copies and three copies to create various types of cloned networks. The creation of quantum networks is of importance because in all those situations where the entanglement cannot be generated, we can use the cloning process to obtain a larger network of correlated qubits. We explore the Finner inequalities to check if the obtained cloned networks can be distinguished from networks created by independent sources distributing entangled pairs. We note that some cloned networks cannot be distinguished. We further explore the tripartite mutual information and squashed entanglement to quantify this dependence for triangle networks.

Author Contributions

Methodology, I.C. and J.W.; Formal analysis, M.H.; Investigation, M.K.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by National Natural Science Foundation of China under Grant No. 61877054, 12031004,12271474, 11901526 and 11571307, and the Fundamental Research Foundation for the Central Universities, No. K20210337.

Data Availability Statement

Not applicable.

Acknowledgments

I. Chakrabarty and M. Shukla thank Zhejiang University for supporting their visits.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Einstein, A.; Podolsky, B.; Rosen, N. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? Phys. Rev. 1935, 47, 777. [Google Scholar] [CrossRef]
  2. Heisenberg, W. Über den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik. Z. Phys. 1927, 43, 172. [Google Scholar] [CrossRef]
  3. Nielsen, M.A.; Chuang, I.L. Quantum computation and quantum information. Phys. Today 2001, 54, 60. [Google Scholar]
  4. Bell, J.S. On the einstein podolsky rosen paradox. Phys. Phys. Fiz. 1964, 1, 195. [Google Scholar] [CrossRef]
  5. Horodecki, R.; Horodecki, P.; Horodecki, M.; Horodecki, K. Quantum entanglement. Rev. Mod. Phys. 2009, 81, 865. [Google Scholar] [CrossRef]
  6. Henderson, L.; Vedral, V. Classical, quantum and total correlations. J. Phys. Math. Gen. 2001, 34, 6899. [Google Scholar] [CrossRef]
  7. Ollivier, H.; Zurek, W.H. Quantum discord: A measure of the quantumness of correlations. Phys. Rev. Lett. 2001, 88, 017901. [Google Scholar] [CrossRef] [PubMed]
  8. Bera, A.; Das, T.; Sadhukhan, D.; Roy, S.S.; De Sen, A.; Sen, U. Quantum discord and its allies: A review of recent progress. Rep. Prog. Phys. 2017, 81, 024001. [Google Scholar] [CrossRef]
  9. Baumgratz, T.; Cramer, M.; Plenio, M.B. Quantifying coherence. Phys. Rev. Lett. 2014, 113, 140401. [Google Scholar] [CrossRef]
  10. Greenberger, D.M.; Horne, M.A.; Zeilinger, A. Going beyond Bell’s theorem. In Bell’s Theorem, Quantum Theory and Conceptions of the Universe; Springer: Berlin/Heidelberg, Germany, 1989; pp. 69–72. [Google Scholar]
  11. Chakrabarty, I.; Agrawal, P.; Pati, A.K. Quantum dissension: Generalizing quantum discord for three-qubit states. Eur. Phys. J. 2011, 65, 605–612. [Google Scholar] [CrossRef]
  12. Wehner, S.; Elkouss, D.; Hanson, R. Quantum internet: A vision for the road ahead. Science 2018, 362. [Google Scholar] [CrossRef] [PubMed]
  13. Biamonte, J.; Faccin, M.; De Domenico, M. Complex networks from classical to quantum. Commun. Phys. 2019, 2, 1–10. [Google Scholar] [CrossRef]
  14. Chiribella, G.; D’Ariano, G.M.; Perinotti, P. Theoretical framework for quantum networks. Phys. Rev. A 2009, 80, 022339. [Google Scholar] [CrossRef]
  15. Perseguers, S.; Lewenstein, M.; Acín, A.; Cirac, J.I. Quantum random networks. Nat. Phys. 2010, 6, 539–543. [Google Scholar] [CrossRef]
  16. Kozlowski, W.; Wehner, S. Towards large-scale quantum networks. In Proceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication, Dublin, Ireland, 25–27 September 2019; pp. 1–7. [Google Scholar]
  17. Perseguers, S.; Lapeyre, G., Jr.; Cavalcanti, D.; Lewenstein, M.; Acín, A. Distribution of entanglement in large-scale quantum networks. Rep. Prog. Phys. 2013, 76, 096001. [Google Scholar] [CrossRef]
  18. Kimble, H.J. The quantum internet. Nature 2008, 453, 1023. [Google Scholar] [CrossRef]
  19. Simon, C. Towards a global quantum network. Nat. Photonics 2017, 11, 678. [Google Scholar] [CrossRef]
  20. Renou, M.O.; Bäumer, E.; Boreiri, S.; Brunner, N.; Gisin, N.; Beigi, S. Genuine quantum nonlocality in the triangle network. Phys. Rev. Lett. 2019, 123, 140401. [Google Scholar] [CrossRef]
  21. Sazim, S.; Chakrabarty, I. A study of teleportation and super dense coding capacity in remote entanglement distribution. Eur. Phys. J. D 2013, 67, 174. [Google Scholar] [CrossRef]
  22. Li, C.; Li, T.; Liu, Y.X.; Cappellaro, P. Effective routing design for remote entanglement generation on quantum networks. arXiv 2020, arXiv:2001.02204. [Google Scholar] [CrossRef]
  23. Zukowski, M.; Zeilinger, A.; Horne, M.A.; Ekert, A.K. “Event-ready-detectors” Bell experiment via entanglement swapping. Phys. Rev. Lett. 1993, 71, 4287–4290. [Google Scholar] [CrossRef] [PubMed]
  24. Branciard, C.; Gisin, N.; Pironio, S. Characterizing the nonlocal correlations created via entanglement swapping. Phys. Rev. Lett. 2010, 104, 170401. [Google Scholar] [CrossRef] [PubMed]
  25. Branciard, C.; Rosset, D.; Gisin, N.; Pironio, S. Bilocal versus nonbilocal correlations in entanglement-swapping experiments. Phys. Rev. A 2012, 85, 032119. [Google Scholar] [CrossRef]
  26. Chaves, R.; Fritz, T. Entropic approach to local realism and noncontextuality. Phys. Rev. A 2012, 85, 032113. [Google Scholar] [CrossRef]
  27. Tavakoli, A.; Skrzypczyk, P.; Cavalcanti, D.; Acín, A. Nonlocal correlations in the star-network configuration. Phys. Rev. A 2014, 90, 062109. [Google Scholar] [CrossRef]
  28. Fritz, T. Beyond Bell’s theorem: Correlation scenarios. New J. Phys. 2012, 14, 103001. [Google Scholar] [CrossRef]
  29. Bennett, C.H.; Brassard, G. Quantum crytography. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
  30. Shor, P.W.; Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 2000, 85, 441. [Google Scholar] [CrossRef]
  31. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661. [Google Scholar] [CrossRef]
  32. Hillery, M.; Bužek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829. [Google Scholar] [CrossRef]
  33. Sazim, S.; Chiranjeevi, V.; Chakrabarty, I.; Srinathan, K. Retrieving and routing quantum information in a quantum network. Quant. Inf. Proc. 2015, 14, 4651–4664. [Google Scholar] [CrossRef]
  34. Adhikari, S.; Chakrabarty, I.; Agrawal, P. Probabilistic secret sharing through noisy quantum channels. arXiv 2010, arXiv:1012.5570. [Google Scholar]
  35. Ray, M.; Chatterjee, S.; Chakrabarty, I. Sequential quantum secret sharing in a noisy environment aided with weak measurements. Eur. Phys. J. D 2016, 70, 114. [Google Scholar] [CrossRef]
  36. Bennett, C.H.; Brassard, G.; Crépeau, C.; Jozsa, R.; Peres, A.; Wootters, W.K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993, 70, 1895. [Google Scholar] [CrossRef] [PubMed]
  37. Horodecki, R.; Horodecki, M.; Horodecki, P. Teleportation, Bell’s inequalities and inseparability. Phys. Lett. A 1996, 222, 21–25. [Google Scholar] [CrossRef]
  38. Bennett, C.H.; Wiesner, S.J. Communication via one-and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 1992, 69, 2881. [Google Scholar] [CrossRef]
  39. Nepal, R.; Prabhu, R.; Sen De, A.; Sen, U. Maximally-dense-coding-capable quantum states. Phys. Rev. A 2013, 87, 032336. [Google Scholar] [CrossRef]
  40. Bose, S.; Vedral, V.; Knight, P.L. Multiparticle generalization of entanglement swapping. Phys. Rev. A 1998, 57, 822. [Google Scholar] [CrossRef]
  41. Chatterjee, S.; Sazim, S.; Chakrabarty, I. Broadcasting of quantum correlations: Possibilities and impossibilities. Phys. Rev. A 2016, 93, 042309. [Google Scholar] [CrossRef]
  42. Sharma, U.K.; Chakrabarty, I.; Shukla, M.K. Broadcasting quantum coherence via cloning. Phys. Rev. A 2017, 96, 052319. [Google Scholar] [CrossRef]
  43. Jain, A.; Chakrabarty, I.; Chatterjee, S. Asymmetric broadcasting of quantum correlations. Phys. Rev. A 2019, 99, 022315. [Google Scholar] [CrossRef]
  44. Mundra, R.; Patel, D.; Chakrabarty, I.; Ganguly, N.; Chatterjee, S. Broadcasting of quantum correlations in qubit-qudit systems. Phys. Rev. A 2019, 100, 042319. [Google Scholar] [CrossRef]
  45. Deutsch, D.; Ekert, A.; Jozsa, R.; Macchiavello, C.; Popescu, S.; Sanpera, A. Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett. 1996, 77, 2818. [Google Scholar] [CrossRef]
  46. Wootters, W.K.; Zurek, W.H. A single quantum cannot be cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
  47. Pati, A.K.; Braunstein, S.L. Impossibility of deleting an unknown quantum state. Nature 2000, 404, 164. [Google Scholar] [CrossRef] [PubMed]
  48. Patel, D.; Patro, S.; Vanarasa, C.; Chakrabarty, I.; Pati, A.K. Impossibility of cloning of quantum coherence. arXiv 2018, arXiv:1806.05706. [Google Scholar] [CrossRef]
  49. Chakrabarty, I. Impossibility of partial swapping of Quantum Information. Int. J. Quant. Inf. 2007, 5, 605–609. [Google Scholar] [CrossRef]
  50. Pati, A.K.; Sanders, B.C. No-partial erasure of quantum information. Phys. Lett. A 2006, 359, 31–36. [Google Scholar] [CrossRef]
  51. Modi, K.; Pati, A.K.; Sen, A.; Sen, U. Masking quantum information is impossible. Phys. Rev. Lett. 2018, 120, 230501. [Google Scholar] [CrossRef]
  52. Bužek, V.; Hillery, M. Quantum copying: Beyond the no-cloning theorem. Phys. Rev. A 1996, 54, 1844. [Google Scholar] [CrossRef]
  53. Gisin, N.; Massar, S. Optimal quantum cloning machines. Phys. Rev. Lett. 1997, 79, 2153. [Google Scholar] [CrossRef]
  54. Bužek, V.; Hillery, M. Universal optimal cloning of arbitrary quantum states: From qubits to quantum registers. Phys. Rev. Lett. 1998, 81, 5003. [Google Scholar] [CrossRef]
  55. Bruß, D.; DiVincenzo, D.P.; Ekert, A.; Fuchs, C.A.; Macchiavello, C.; Smolin, J.A. Optimal universal and state-dependent quantum cloning. Phys. Rev. A 1998, 57, 2368. [Google Scholar] [CrossRef]
  56. Cerf, N.J. Pauli cloning of a quantum bit. Phys. Rev. Lett. 2000, 84, 4497. [Google Scholar] [CrossRef] [PubMed]
  57. Cerf, N.J. Asymmetric quantum cloning in any dimension. J. Mod. Opt. 2000, 47, 187. [Google Scholar] [CrossRef]
  58. Scarani, V.; Iblisdir, S.; Gisin, N.; Acin, A. Quantum cloning. Rev. Mod. Phys. 2005, 77, 1225. [Google Scholar] [CrossRef]
  59. Adhikari, S.; Choudhury, B.S.; Chakrabarty, I. Broadcasting of inseparability. J. Phys. A 2006, 39, 8439. [Google Scholar] [CrossRef]
  60. Shukla, M.K.; Chakrabarty, I.; Chatterjee, S. Broadcasting of correlations via orthogonal & non-orthogonal state dependent cloners. arXiv 2019, arXiv:1904.12899. [Google Scholar]
  61. Cerf, N.J.; Bourennane, M.; Karlsson, A.; Gisin, N. Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 2002, 88, 127902. [Google Scholar] [CrossRef]
  62. Ghiu, I. Asymmetric quantum telecloning of d-level systems and broadcasting of entanglement to different locations using the “many-to-many” communication protocol. Phys. Rev. A 2003, 67, 012323. [Google Scholar] [CrossRef]
  63. Renou, M.O.; Wang, Y.; Boreiri, S.; Beigi, S.; Gisin, N.; Brunner, N. Limits on correlations in networks for quantum and no-signaling resources. Phys. Rev. Lett. 2019, 123, 070403. [Google Scholar] [CrossRef]
  64. Kraft, T.; Designolle, S.; Ritz, C.; Brunner, N.; Gühne, O.; Huber, M. Quantum entanglement in the triangle network. arXiv 2020, arXiv:2002.03970. [Google Scholar] [CrossRef]
  65. Christandl, M.; Winter, A. “Squashed entanglement”: An additive entanglement measure. J. Math. Phys. 2004, 45, 829–840. [Google Scholar] [CrossRef]
  66. Cerf, N.J.; Adami, C. Negative entropy and information in quantum mechanics. Phys. Rev. Lett. 1997, 79, 5194. [Google Scholar] [CrossRef]
Figure 1. Three Party Quantum Networks. In this figure A, B and C represent three distant parties who wish to extablish a quantum network, in sub figures (ac) we have shown types of network correlations possible to generate different network topologies.
Figure 1. Three Party Quantum Networks. In this figure A, B and C represent three distant parties who wish to extablish a quantum network, in sub figures (ac) we have shown types of network correlations possible to generate different network topologies.
Mathematics 11 02440 g001
Figure 2. The figure shows the cloning process to create three copies of an unknown quantum state | ψ along with the result of cloning. ∑ represents the blank state and U represents the unitary transformation for the cloning process. A, B and C are three distant parties trying to establish a quantum network.
Figure 2. The figure shows the cloning process to create three copies of an unknown quantum state | ψ along with the result of cloning. ∑ represents the blank state and U represents the unitary transformation for the cloning process. A, B and C are three distant parties trying to establish a quantum network.
Mathematics 11 02440 g002
Figure 3. Here, we have shown the process of creating a network analogous to a bi-local network using the local cloning of the initial entangled state ψ a b . To create a three-party network, we send the cloned output 3 to party C. B keeps 2 qubits, namely 2 and 4. A, B and C are three distant parties trying to establish a quantum network. 1–4 represent various qubits.
Figure 3. Here, we have shown the process of creating a network analogous to a bi-local network using the local cloning of the initial entangled state ψ a b . To create a three-party network, we send the cloned output 3 to party C. B keeps 2 qubits, namely 2 and 4. A, B and C are three distant parties trying to establish a quantum network. 1–4 represent various qubits.
Mathematics 11 02440 g003
Figure 4. The figure shows the states tgat can be distinguished in a cloned bi-local network by the Finner inequality to be created by process of applying a unitary on a single input source. The parameter α 2 on the x axis represents the input state parameter, and d on the y-axis represents the machine state parameter. The complete shaded region shows the states that are entangled in a bi-local cloned network, the darker green region represents the states that can be distinguished by the original Finner inequalities, and the light green region represents additional states that can be distinguished by the modified Finner inequality. The figure is generated by considering 2000 data points.
Figure 4. The figure shows the states tgat can be distinguished in a cloned bi-local network by the Finner inequality to be created by process of applying a unitary on a single input source. The parameter α 2 on the x axis represents the input state parameter, and d on the y-axis represents the machine state parameter. The complete shaded region shows the states that are entangled in a bi-local cloned network, the darker green region represents the states that can be distinguished by the original Finner inequalities, and the light green region represents additional states that can be distinguished by the modified Finner inequality. The figure is generated by considering 2000 data points.
Mathematics 11 02440 g004
Figure 5. Here, we have shown the process of creating a bi-local network using the non-local cloning of an initial entangled state ψ a b . To create a three-party network, we send the cloned output 1 to party A and output 3 to party C. A, B and C are three distant parties trying to establish a quantum network. 1–4 represent various qubits.
Figure 5. Here, we have shown the process of creating a bi-local network using the non-local cloning of an initial entangled state ψ a b . To create a three-party network, we send the cloned output 1 to party A and output 3 to party C. A, B and C are three distant parties trying to establish a quantum network. 1–4 represent various qubits.
Mathematics 11 02440 g005
Figure 6. The figure shows the states that can be distinguished as being created by a single source in a cloned bi-local network by the Finner inequality. The parameter α 2 on the x axis represents the input state parameter of the state to be cloned, and d on the y-axis represents the cloning machine state parameter. The completely brown region shows the states that are entangled in a bi-local cloned network, the dark green region represents the states that can be distinguished by the original Finner inequalities, and the larger dark and light green regions combined represent the states that can be distinguished by the modified Finner inequality. The figure is generated by considering 2000 data points.
Figure 6. The figure shows the states that can be distinguished as being created by a single source in a cloned bi-local network by the Finner inequality. The parameter α 2 on the x axis represents the input state parameter of the state to be cloned, and d on the y-axis represents the cloning machine state parameter. The completely brown region shows the states that are entangled in a bi-local cloned network, the dark green region represents the states that can be distinguished by the original Finner inequalities, and the larger dark and light green regions combined represent the states that can be distinguished by the modified Finner inequality. The figure is generated by considering 2000 data points.
Mathematics 11 02440 g006
Figure 7. Here, we have shown the process of the creation of a network analogous to the triangle network using non-local cloning, creating two additional copies of an initial entangled state ψ a b . To create a three-party network, we send the cloned output 1 , 6 to party A and output 2 , 3 to party C. The red color lines represent the additional correlations present in cloned networks that are not in the originally described triangle networks. A, B and C are three distant parties trying to establish a quantum network. 1–6 represent various qubits.
Figure 7. Here, we have shown the process of the creation of a network analogous to the triangle network using non-local cloning, creating two additional copies of an initial entangled state ψ a b . To create a three-party network, we send the cloned output 1 , 6 to party A and output 2 , 3 to party C. The red color lines represent the additional correlations present in cloned networks that are not in the originally described triangle networks. A, B and C are three distant parties trying to establish a quantum network. 1–6 represent various qubits.
Mathematics 11 02440 g007
Figure 8. The figure shows the states that can be distinguished in a cloned triangle network by the Finner inequality to be created by a single source. The parameter α 2 on the x-axis represents the input state parameter, and d on the y-axis represents the machine state parameter. The complete shaded region shows the states that are entangled in a bi-local cloned network, the darker green region represents the states that can be distinguished by the original Finner inequalities, and the light green region represents the states that can be distinguished by the modified Finner inequality. The figure is generated by considering 2000 data points.
Figure 8. The figure shows the states that can be distinguished in a cloned triangle network by the Finner inequality to be created by a single source. The parameter α 2 on the x-axis represents the input state parameter, and d on the y-axis represents the machine state parameter. The complete shaded region shows the states that are entangled in a bi-local cloned network, the darker green region represents the states that can be distinguished by the original Finner inequalities, and the light green region represents the states that can be distinguished by the modified Finner inequality. The figure is generated by considering 2000 data points.
Mathematics 11 02440 g008
Figure 9. Here, we have shown the values of tripartite mutual information (TMI) of various cloned triangle networks given by input state parameter α and machine state parameter d. We note that both positive and negative values of TMI are obtained. The figure is generated by considering 2000 data points.
Figure 9. Here, we have shown the values of tripartite mutual information (TMI) of various cloned triangle networks given by input state parameter α and machine state parameter d. We note that both positive and negative values of TMI are obtained. The figure is generated by considering 2000 data points.
Mathematics 11 02440 g009
Figure 10. The figure shows the amount of statistical dependence on the initial state which prepares the network through cloning. The parameter on the x-axis ( α ) represents the input state parameter for non-maximally entangles states, and on the y-axis, the dependence values are marked. Here, the machine cloning machine parameter d is set equal to 0.1.
Figure 10. The figure shows the amount of statistical dependence on the initial state which prepares the network through cloning. The parameter on the x-axis ( α ) represents the input state parameter for non-maximally entangles states, and on the y-axis, the dependence values are marked. Here, the machine cloning machine parameter d is set equal to 0.1.
Mathematics 11 02440 g010
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shukla, M.K.; Huang, M.; Chakrabarty, I.; Wu, J. Correlations in Quantum Network Topologies Created with Cloning. Mathematics 2023, 11, 2440. https://doi.org/10.3390/math11112440

AMA Style

Shukla MK, Huang M, Chakrabarty I, Wu J. Correlations in Quantum Network Topologies Created with Cloning. Mathematics. 2023; 11(11):2440. https://doi.org/10.3390/math11112440

Chicago/Turabian Style

Shukla, Manish Kumar, Minyi Huang, Indranil Chakrabarty, and Junde Wu. 2023. "Correlations in Quantum Network Topologies Created with Cloning" Mathematics 11, no. 11: 2440. https://doi.org/10.3390/math11112440

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop