Abstract

AbstractEinstein–Podolsky–Rosen (EPR) steering allows two parties to verify their entanglement, even if one party’s measurements are untrusted. This concept has not only provided new insights into the nature of non-local spatial correlations in quantum mechanics, but also serves as a resource for one-sided device-independent quantum information tasks. Here, we investigate how EPR steering behaves when one-half of a maximally entangled pair of qudits (multidimensional quantum systems) is cloned by a universal cloning machine. We find that EPR steering, as verified by a criterion based on the mutual information between qudits, can only be found in one of the copy subsystems but not both. We prove that this is also true for the single-system analogue of EPR steering. We find that this restriction, which we term ‘no-cloning of quantum steering’, elucidates the physical reason why steering can be used to secure sources and channels against cloning-based attacks when implementing quantum communication and quantum computation protocols.

Highlights

  • Einstein–Podolsky–Rosen (EPR) steering reveals that one party, Alice, can affect, or steer another remote party (Bob’s) state, by her measurements on one particle of an entangled pair shared between them.[1]

  • We find that EPR steering, as described by a criterion based on the mutual information between two parties, can only be observed in one of the two copy subsystems, but not both

  • We investigated how quantum steering is cloned by a universal cloning machine and shared between two copy subsystems

Read more

Summary

Introduction

Einstein–Podolsky–Rosen (EPR) steering reveals that one party, Alice, can affect, or steer another remote party (Bob’s) state, by her measurements on one particle of an entangled pair shared between them.[1] This concept was originally introduced by Schrödinger in response to the EPR paradox.[2] Recently, it has been reformulated by Wiseman et al.[3] as an information-theoretic task to demonstrate that Alice and Bob can validate shared entanglement even if the measurement devices of Alice are untrusted. Such a universal cloning machine has been shown to be optimal and has been extensively studied in the context of possible alternatives, extensions and use as an eavesdropping attack on the protocols of quantum cryptography.[8]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call