References:
[1] W.K. Wootters, W.H. Zurek, A single quantum
cannot be cloned, Nature, vol. 299, 802-803
(1982).
[2] D. Dieks, Communication by EPR Devices,
Phys. Lett., vol. 92A, 271-272 (November 1982)
[3] HR. Li, MX. Luo, H. Lai, Generalized quantum
no-go theorems of pure states, Quantum
Information Processing 17 (7), 168, p. 18
(2018).
[4] A.E. Rastegin, No-cloning theorem for a single
POVM, Quantum Information and
Computation, vol.10, no.11&12, pp. 0971-0980
(2010).
[5] M. Nielsen, I. Chuang, Quantum Computation
and Quantum Information, 2nd Ed., New York,
Cambridge UP (2001).
[6] E. Strubell, An Introduction to Quantum
Algorithms, Springer, vol. COS498 (2011).
[7] A. Peres, Quantum Theory: Concepts and
Methods, Kluwer Academic Publishers
Dordrecht, The Netherlands (1995).
[8] C.H. Bennett et al., Purification of noisy
entanglement and faithful teleportation via noisy
channels, Phys. Rev. Lett. 76, 722 (1996).
[9] XQ. Xiao, JM. Liu, Scheme for assisted cloning
an unknown arbitrary three-qubit state,
Quantum Information Processing 10, 567–574
(2011)
[10] V. BuzÏek1, M. Hillery, P.L. Knight, Flocks of
quantum clones: Multiple copying of qubits,
Fortschr. Phys. 46, 4-5, 521-533 (1998)
[11] Xi-Jun Ren and H. Fan, Quantum circuits for
asymmetric 1 to quantum cloning, Quantum
Information and Computation, vol. 15, no.
11&12, pp. 0914-0922 (2015).
[12] R. Jozsa, A stronger no-cloning theorem, (2002)
arXiv:quant-ph/0204153v2
[13] V. Buzek, M. Hillery, Quantum copying:
Beyond the no-cloning theorem, Phys. Rev. A
54, 1844 (1996).
[14] L. Duan, G. Guo, A probabilistic cloning
machine for replicating two non-orthogonal
states, Phys. Lett. A 243, 261 (1998).
[15] H. Fan, B. Liu, and K. Shi, Quantum cloning of
identical mixed qubits, Quantum Information
and Computation, vol. 7, no. 5&6, pp. 551-558
(2007).
[16] Kar, G., Rahaman, R.: Local cloning of
multipartite entangled states. Quantum
Information Processing 11, 711–727 (2012).
[17] D. Leermakers and B. Skoric, Qubit-based
unclonable encryption with key recycling,
Quantum Information and Computation, vol. 21,
no.11&12, pp. 901-930 (2021).
[18] C. Bennett, G. Brassard, Quantum
cryptography: Public key distribution and coin
tossing, in Proc. of the IEEE Int. Conf. on
Computers, Systems, and Signal Processing,
Bangalore, 175-179 (1984).
[19] V. Scarani, S. Iblisdir, N. Gisin, Quantum
cloning, (2005) https://arxiv.org/pdf/quant-
ph/0511088.pdf
[20] I.B. Djordjevic, Quantum circuits and quantum
information processing fundamentals, in
Quantum Information Processing and Quantum
Error Correction, 91-117 (2012).
Contribution of individual authors to the creation
of a scientific article (ghostwriting policy)
Artyom Grigoryan: Conceptualization,
Methodology, Circuits and Algorithm, Original
draft preparation.
Sos Agaian: Problem formulation, Methodology,
Original draft preparation and structuring.
'Not applicable'
Conflicts of interest/Competing interests
The author declares no conflicts of interest regarding the
publication of this paper
Creative Commons Attribution License 4.0
(Attribution 4.0 International , CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en
_US
WSEAS TRANSACTIONS on CIRCUITS and SYSTEMS
DOI: 10.37394/23201.2022.21.2
Artyom Grigoryan, Sos Agaian
Sources of Funding for Research Presented in a
Scientific Article or Scientific Article Itself