Abstract
In this paper, two conclusive three-party cyclic assisted cloning protocols in amplitude damping (AD) channel are put forward that, respectively clone three arbitrary unknown single-qubit states and single-qutrit states with the help of a state preparer. Each of our protocols includes three consecutive stages: quantum channel preparation, cyclic quantum teleportation (CQT), and multi-party assisted cloning. The first stage of each protocol proposes the detailed processes of sharing a pure entangled quantum state as a component of a quantum channel in AD channel via entanglement compensation. In second stage, a three-party CQT is presented where three unknown single-qubit states (or single-qutrit states) are reconstructed simultaneously in three different places, respectively, by introducing auxiliary qubits and performing appropriate operations. In the third stage, the state preparer Victor performs one multi-qubit measurement (or one unitary transformation and one multi-qutrit measurement) and informs the three communicators of his outcome, three distinct unknown single-qubit states or their orthogonal complement states (or single-qutrit states) are cloned simultaneously and with probability at three separate locations,respectively. Furthermore, we extend the above protocols from two aspects: (i) the extension to the case of participants; (ii) extension to the case of d-dimensional unknown single-qudit state cycle-assisted cloning.
1 Introduction
The fundamental principles of quantum mechanics, such as quantum parallelism, quantum state superposition, quantum entanglement, and quantum coherence—features with no classical counterparts—demonstrate revolutionary advantages in computing and communication. With shared quantum entanglement and local operation as well as classical communication, in 1993 Bennett et al. [1] first proposed the concept of quantum teleportation (QT), a clever application of quantum mechanics in the field of information, which has attracted great attention because it provides unconditional security in the communication process. Since the seminal work of Bennett et al. [1] was reported, the vast majority of quantum communication branches have developed rapidly, such as quantum key distribution (QKD) [2,3], quantum secure direct communication (QSDC) [4,5], quantum dialogue (QD) [6,7], QT [8–10], quantum secret sharing (QSS) [11,12], remote state preparation (RSP) [13–16], remote implementation of quantum operation (RIQO) [17,18], and so on.
The no-cloning theorem, as another important principle of quantum mechanics, states that it is impossible to perfectly replicate any unknown quantum state in quantum mechanics. This conclusion is proven through the linear superposition property of quantum states using proof by contradiction, and it has profoundly influenced the development of quantum information science [19]. The theoretical breakthroughs and technological innovations addressing this limitation have always been one of the core topics in quantum information science: Bužek and Hillery, by constructing a theoretical model for a universal quantum cloning machine [20–22] first systematically explained the inevitability of errors in the approximate cloning of non-orthogonal states and their quantification, laying the key theoretical foundation for subsequent research. Within this framework, Gisin and Massar [23] and Bruß et al. [24] proposed optimal state-dependent cloning schemes and established theoretical limits on the cloning fidelity of specific quantum state families. Later, Duan and Guo pioneered the probabilistic cloning paradigm [25,26], introducing a measurement-feedback mechanism that successfully enabled the limited-probability exact replication of non-orthogonal quantum states. This breakthrough redefined the impossibility of cloning operations from the deterministic to the probabilistic domain, providing a new methodology for quantum state manipulation. As the theoretical system improved, researchers expanded the application boundaries of cloning protocols from multiple dimensions. In 1999, Murao et al. [27] combined quantum teleportation with the optimal cloning framework to construct a remote cloning protocol with one input and multiple outputs. This work led to the design of specialized quantum cloning machines for different physical constraints [28–31]. In 2000, Pati proposed a state preparer-assisted cloning scheme [32] that uses a two-stage protocol to probabilistically generate both the original state and its orthogonal complement copies(OCC). The core idea was later extended by Zhan [33] to the cloning of two-particle entangled states. Han’s team [34] further improved the protocol’s efficiency by employing generalized quantum measurements, and the robustness of the scheme based on cluster states [35,36] and GHZ-class states [37] provided new ideas for cloning operations in noisy environments. In terms of system dimension expansion, research has progressed from single qubits to multi-particle entangled states [38]and high-dimensional quantum dit systems [39–41]. The works of Chen et al. [40] and the Xue-Jiang team [41] have systematically established a universal framework for cloning multi-qudit states. The current frontier of research focuses on the design of practical cloning protocols under noisy channels. Recent progress includes Maihemuti et al.’s [42] proposal of a controlled cloning scheme for multi-qubit states and Zhai’s team’s [43] single-quantum dit state assisted cloning framework. These achievements present three major development trends: optimizing resource consumption through measurement strategies, expanding system dimensions to higher degrees of freedom, and adaptive designs to address decoherence effects. It is worth noting that although the existing theoretical frameworks have verified the feasibility of cloning protocols under ideal conditions, the dynamic evolution characteristics in practical noisy channels (such as the AD channel) have not been fully revealed. This presents a key innovative entry point for this study’s development of cyclic-assisted cloning mechanisms. The entanglement resource optimization methods [35–37] and measurement feedback techniques [25,26,34] developed in prior work provide the necessary technological foundation for exploring robust cloning protocols in noisy environments.
However, almost all the existing quantum assisted cloning schemes are unidirectional (i.e., the copy or OCC of original unknown state appears only at the sender’s location), and they only focus on the case of an ideal environment . Until now,there has been a lack of a multi-directional cloning scheme in a noisy environment, i.e., a scheme that is valid for open systems and simultaneously clones different unknown states at the positions of multiple participants, separately. Recent innovations in quantum communication protocol architectures have shown a significant trend of multidirectional expansion. Researchers are continuously breaking the performance boundaries of traditional schemes by optimizing entanglement resources and measurement strategies. Yang et al. [44] constructed a bidirectional quantum teleportation protocol for three-particle GHZ states based on controlled-NOT(CNOT) operations and single-qubit projective measurements, and extended it to multi-qubit GHZ states. Notably, they effectively suppressed the deterioration of teleportation fidelity caused by quantum noise using weak measurements and their inverse operations, providing an important example for managing entanglement resources in noisy channels. In the field of state preparation, Ref. [45] established a bidirectional RSP framework for two arbitrary single-particle states in an ideal environment, further extending it to multi-particle states and verifying the enhancement mechanism of weak measurement techniques for fidelity in noisy environments. In response to complex quantum operation transmission requirements, Ref. [46] designed a remote implementation (RI) protocol for unknown operations with multiple controllers, successfully achieving distributed collaborative execution of multiple partially unknown operations (PUOs). Notably, a series of breakthroughs have been made in the construction of cyclic quantum communication architectures: the Sun-Zhang team [47] implemented a four-node controlled CQT (CCQT) protocol using multi-particle partially entangled states, and their design concept, which can be extended to N-node quantum networks, provides a key architectural reference for future distributed quantum systems. The Peng and Lei scheme [48] built a cyclic remote state preparation protocol using a six-particle entangled channel and achieved bidirectional cyclic operations for N communication nodes through channel reconstruction. Refs. [49,50] proposed bidirectional quantum communication protocols based on a thirteen-particle entangled channel and achieved collaborative architectures for cyclic quantum state transmission and remote execution of PUOs under controlled conditions. In the area of noise adaptability, Ref. [51] innovatively constructed a multiparty quantum state sharing protocol under AD channels, achieving controllable distribution of single-qubit and single-qutrit states, and the noise compensation strategy it employed provides a new methodology for the design of open quantum system communication protocols. These advances collectively highlight the enhancement of channel robustness through the introduction of noise suppression technologies such as weak measurement, the scalability of protocols utilizing high-dimensional entanglement resources [47–49], and the development of collaborative cyclic operation architectures with multiple participants [47–50]. However, existing cyclic communication protocols largely focus on the basic functions of state transmission and operation execution, while the collaborative mechanism for cyclic-assisted cloning in noisy channels remains to be solved. This provides a key innovative idea for this study to construct a cyclic-assisted cloning protocol for arbitrary single-particle states under AD channels, with the weak measurement compensation techniques, multi-particle entanglement channel optimization methods, and noise-adaptive architectures developed in prior work laying the necessary technical foundation for the protocol design in this paper.
Based on the theoretical foundation and technical insights from the multi-party cyclic communication architecture [47–51], this study investigates the controlled cyclic cloning of arbitrary unknown single-particle states with the assistance of a state preparer in the AD channel.In order to achieve this, we first propose two conclusive three-party cyclic schemes, respectively cloning three different unknown single-qubit and single-qutrit states with the help of a state preparer. The entire procedure mainly consists of three stages, in order: first, sharing a pure entangled state (PES) among the three communicators via entanglement compensation; second, performing three-party CQT;third, requiring an assisted cloning with three outputs. We then generalize these schemes in two aspects: first, extending them to the case of an arbitrary multi-party cyclic scenario; and second, extending them to the case of cyclic cloning of arbitrary high-dimensional quantum states.
The structure of this article is organized as follows. In Sect 2, we provide a brief review of the concepts closely related to this study. Sect 3 presents a three-party cyclic protocol for the assisted cloning of three different single-particle states in an AD channel and extends it to the case of N-party (N>3) cyclic assisted cloning. In Sects 4 and 5, we focus on the three-party cyclic schemes in the AD channel, where the cloning of arbitrary unknown three-dimensional quantum states and d-dimensional quantum states, respectively. Finally, Sect 6 offers a brief discussion, followed by the conclusions.
2 Preliminaries
This section systematically outlines the foundational knowledge relied upon in the quantum state cyclic-assisted cloning protocol. In a two-level quantum system, any single-qubit state can be expressed as a linear superposition of the computational basis vectors and , which can be written as:
| (1) |
where the complex numbers α and β satisfy , and its orthogonal complement state is .
The foundational operations of quantum computing are built upon the strict mathematical representation of quantum basis vectors and unitary transformations. The computational basis for a single-qubit, is called the Z-basis, while the X-basis is . In the context of entangled state operations, the complete measurement basis for a two-qubit system is usually the Bell basis
| (2) |
where the modulo 2 addition ensures the orthonormality of the basis vectors.
The core operation set for single-qubit unitary transformations includes the parameterized Pauli operators
| (3) |
Special instances of these operators include: the identity operator , the bit-flip operator , the joint phase-bit-flip operator , and the phase-flip operator .
Basis vector transformation operations are implemented through the Hadamard gate
| (4) |
which maps the Z-basis to the X-basis, thereby constructing the quantum state superposition property.
At the level of two-qubit operations, the CNOT gate , which is defined as follows
| (5) |
serves as the standard implementation of a conditional logic gate, where particle u is the control particle and particle v is the target particle. This operation provides the foundational support for entanglement state preparation by establishing correlations between quantum bits.
Similarly, quantum trit (qutrit) in a a three-level quantum system is a superposition state of states , and :
| (6) |
where all real numbers y0, y1 and y2 satisfy , and θ1, θ2 are arbitrary real numbers.
The orthogonal bases and are two mutually unbiased measurement bases in a three-level quantum system, where are also called the Z-basis and X-basis of this quantum system, respectively. A special class of maximally entangled states composed of two qutrits is collectively referred to as generalized Bell states, which are defined as [51]:
| (7) |
The important unitary transformation in a three-level quantum system called a generalized CNOT (GCNOT) gate is defined as [51]:
| (8) |
and the inverse GCNOT (IGCNOT) gate is expressed as:
| (9) |
here, the first qutrit acts as the control, and the second as the target. and the expressions ‘’ and ‘’ represent the addition operation of module 3 and subtraction of modulo 3, respectively.
An arbitrary single-qudit state in a d-dimensional quantum system can be written as , where the real numbers , , satisfy , while and is arbitrary real number for any . The d-Bell states of d-dimensional system is represented as [52]
| (10) |
where index the orthogonal Bell stats. The computational basis is the standard orthonormal basis, and the states , and are eigenvectors of Zd . In addition to the computational basis, we can define the complementary Fourier basis ,whose eigenvectors are given by:
| (11) |
where . These bases are related by the condition ,meaning they are unbiased.This formulation highlights the essential properties of the computational and Fourier bases, and their use in the construction of the Bell states, ensuring the fidelity of quantum information transmission.
In 2002, Karimipour and Bahraminasab [52] proposed a GCNOT gate tailored for d-dimensional quantum systems,given by:
| (12) |
and the inverse DCNOT (IDCNOT) gate can be expressed as:
| (13) |
where the first qudit and the second qudit are the control qudit and the target qudit respectively.This family of operations provides fundamental tools for the preparation of high-dimensional entangled states, and their modular arithmetic properties are directly related to the phase synchronization mechanism in cyclic cloning protocols.
In practical quantum systems, noise interference is inevitably present, with AD noise being a typical non-unitary disturbance source that can effectively model energy dissipation, spontaneous photon emission, and other processes in quantum computing [52]. Under the Born-Markov approximation, the Kraus operators for single-qubit AD noise are represented as
| (14) |
where () is the noise strength parameter. It is worth noting that the extension of this noise model to d-dimensional systems introduces more complex dissipation paths, posing special challenges for the fidelity analysis of high-dimensional cyclic cloning protocols. Similarly, the corresponding Kraus operators of AD noise about the single qutrit [54] can be expressed as:
| (15) |
In Ref. [52], a high-dimensional generalization of AD noise was established, and the corresponding Kraus operators can be expressed as:
| (16) |
and
| (17) |
This noise can be interpreted as follows: when a d-level quantum system is coupled to its environment, particles in the excited states () undergo non-radiative transitions with probability , leading to a collective relaxation process where the system transitions from the excited state levels to the ground state . Specifically, the operator E0 represents the probability amplitude for the system to either remain in its original state or undergo partial dissipation, while Ej describes the complete de-excitation process from the j-th excited state to the ground state .
3 Cyclic assisted cloning of arbitrary unknown single-qubit states in amplitude damping channel
In this section, we explore the conclusive results of cyclic assisted cloning in a two-dimensional quantum system, specifically focusing on the cloning of arbitrary unknown single-qubit states within the AD channel. To simplify our analysis, we assume that all qubits transmitted through the quantum channel experience the same independent AD strength. Meanwhile, the qubits that remain local are unaffected by this process. This setup allows us to isolate the effects of the AD channel on the transmitted qubits, while maintaining the integrity of those qubits that are kept in a controlled local environment.
3.1 Three-party cyclic assisted cloning in amplitude damping channel
In this scenario, four legitimate participants are considered: Alice, Bob, Charlie, and Victor. Victor is a state preparer who has prepared three pure quantum states, denoted as , , and , for Alice, Bob, and Charlie, respectively. These states can be written as
| (18) |
where , a, and x are real numbers, while , b, and y are complex numbers. These coefficients satisfy the normalization conditions , , and . Victor knows these coefficients, but they remain unknown to the other participants. Once Victor sends the particles , , and to Alice, Bob, and Charlie respectively, they each use the received states as their respective input states. Importantly, except for Victor, the other participants are unaware of the nature of these input states. The objective for Alice, Bob, and Charlie is to sequentially teleport their individual input states to the next participant in the sequence: Alice aims to teleport her state to Bob, Bob to Charlie, and Charlie to Alice. With Victor’s assistance, the participants aim to generate copies or OCC of their respective input states at their respective locations.To better illustrate the process, we have provided S1 Fig, which shows the relationships among the four legitimate participants—Alice, Bob, Charlie, and Victor. The diagram clearly depicts the quantum state interactions among the participants, making the overall workflow more intuitive and significantly enhancing the readability of the content. This scheme consists of three stages: preparation of quantum channels, cyclic quantum teleportation, and assisted cloning, with a total of ten steps, which are described as:
Stage 1 Preparation of quantum channels.
(a1) To begin the process, Alice prepares a Bell state . She then sends qubit A1 to Bob through an AD channel.
(a2) Upon receiving qubit A1, Bob introduces an ancillary qubit B initialized to . He then performs a CNOT operation on the qubit pair (A1,B), with qubit A1 as the control and qubit B as the target. Afterward, Bob sends qubit A1 back to Alice through an AD channel.
(a3) Once Alice receives qubit A1, she applies another CNOT transformation on the qubit pair (A,A1), where qubit A serves as the control qubit and qubit A1 as the target. She then performs a single-qubit projective measurement on A1 in the computational basis . If the outcome is , the process continues to Stage 2, step (b1); otherwise, the process is aborted and restarted until Alice obtains a successful outcome of .
It is important to note that, when Alice successfully obtains the outcome in step (a3), the two qubits (A,B) are transformed into a PES:
| (19) |
which detailed proof is given in S1 Appendix . That is, Alice and Bob successfully share this PES.
Similar to the above approach, Bob and Charlie can successfully share the PES
| (20) |
and Charlie and Alice can also successfully share the PES
| (21) |
Therefore, the composite system of the states , and as well as the input states , and is
| (22) |
Stage 2 Cyclic quantum teleportation (CQT).
(b1)Alice and Bob each perform a Bell state measurement on the particle pairs and , respectively. Meanwhile, Charlie carries out a Bell state measurement on the particle pair . After completing these measurements, Alice, Bob, and Charlie share their results through classical communication channels. Using these Bell states, the state of the composite system can be rewritten as
| (23) |
From Eq (23) it is straightforward to calculate the probability of Alice’s outcome , which is . The probability of Bob or Charlie’s measurement is similar. In general, if the measurement results for Alice, Bob, and Charlie are , and , respectively. Then the state of the qubits B, C and A2 collapses into
| (24) |
(b2) According to measurement information, Alice, Bob and Charlie perform Pauli gates , and on A2, B and C, respectively. Therefore, the state as represented in Eq (24), is modified to
| (25) |
(b3) Bob prepares an auxiliary qubit B2 initialized in the state , and subsequently applies a unitary operation UB on the joint system comprising qubits B and B2. In the computational basis , the operation UB can be represented by the following unitary matrix:
| (26) |
After Bob’s unitary transformation UB, the state of qubits B and B2 is transformed into
| (27) |
Subsequently, Bob measures the auxiliary qubit B2 in Z-basis. If his measurement result is , Bob gets the state , and then Bob applies Pauli gate to his qubit B:
which means that Bob successfully recovers Alice’s original state on his qubit B when the outcome of the auxiliary qubit B2 is . However, if the measurement result of B2 is , the scheme fails.
According to Eq (27), the probability that Bob obtains the result is given by . Form the above derivation, assuming Alice’s measurement result is , it follows that the probability for Bob to successfully reconstruct Alice’s original state equals .
Similar to what Bob did in (b3),as indicated by Eq (25) that Charlie can recover Bob’s state on qubit C with probability , and Alice can also reconstruct Charlie’s state on her qubit A2 with probability . Therefore, the probability that Alice, Bob, and Charlie can successfully reconstruct the original states , and when the measurement results , and occur simultaneously is i.e., for a fixed joint measurement outcome , the success probability of the cyclic QT is . From the former analysis, , that is, Alice, Bob and Charlie each have 4 measurement outcomes. It means that the joint measurement outcomes they constitute have a total of 64, so the total probability of our scheme is .
Note that when the noise strength of AD channel is zero (i.e., , there is no noise), then the states as shown in Eqs (19), (20), and (21) are all the same Bell state , and the probability of our scheme is . In this case our scheme is the standard cyclic QT. In other words, the cyclic QT here is a generalization of the standard cyclic QT.
Stage 3 Assisted cloning.
(c1) In the third phase of the protocol, if Alice, Bob, and Charlie each intend to obtain either a replica or an orthogonal complement of an unknown single-qubit state—denoted as , , and , respectively—they must rely on the assistance of a state preparer, Victor. At first glance, this may appear infeasible due to the well-known no-cloning theorem in quantum mechanics, which forbids the duplication of arbitrary unknown quantum states. In particular, the application of Bell-state measurements could be thought to disturb the quantum correlations between the entangled pairs , , and . However, from the perspective of quantum measurement theory, performing bipartite projective measurements—such as Bell-state projections—does not inherently violate the no-cloning principle. In physical implementations, such as those involving photons, Bell-state analysis typically constitutes a non-degenerate measurement, meaning that the process does not necessarily destroy the original quantum information [17].Therefore, the Bell-state measurements , , and can be performed without disturbing the original quantum states.
(c2) To accomplish the cloning operation, each of the three parties sends one particle from their entangled pair to Victor. Specifically, Alice sends particle to Victor while retaining particle A; Bob transfers to Victor and keeps B1; Charlie transmits to Victor and retains C1. A central question arises: given that the input states are unknown, can Victor assist the three parties in simultaneously reconstructing their respective original quantum states or their orthogonal complements? We will demonstrate that this is theoretically achievable. Suppose Alice, Bob, and Charlie each apply the projection operator on the entangled state (see Eq (23)); then the six-particle system comprising collapses to the state , forming three pairs of perfect entanglement.
(c3) Since Victor has complete prior knowledge of the input states , , and , he can perform a joint measurement on the three-particle system using an orthonormal and complete basis . These measurement basis states are related to the computational basis of three qubits via the following transformation:
| (28) |
where
| (29) |
It is evident that the vectors defined in Eqs (28) and (29) constitute a complete and mutually orthogonal basis in the 8-dimensional Hilbert space. Once Victor performs a projective measurement on qubits , , and , he communicates the result to Alice, Bob, and Charlie through classical channels.
Now writing the state of qubits and in the basis yields
| (30) |
According to Eq (30), it is clear that each measurement basis vector is associated with its corresponding collapsed state. This indicates that, upon receiving Victor’s measurement outcome, Alice, Bob, and Charlie can each infer the precise quantum state of their respective particle based on Victor’s announcement.
(c4)After receiving Victor’s measurement result, Alice, Bob, and Charlie can each apply suitable Pauli operations to recover their respective target quantum states. To better visualize this process, the entangled state can be expanded as
| (31) |
From Eq (31), it is apparent that Victor’s projective measurement on qubits , , and causes the remaining system, comprising A, B1, and C1, to collapse into a product state. Each of these resulting states corresponds to a single-qubit clone of the original input or its orthogonal complement, modified by the rotation .
Remarkably, irrespective of the measurement outcome, if Alice, Bob, and Charlie each apply the same local operation to their qubits, they can individually and concurrently obtain clones of either their original state or its orthogonal complement. Specifically: If Victor measures , all three parties receive copies of their respective orthogonal complement states. For outcome , Alice and Bob obtain orthogonal complements, while Charlie recovers his original state. If the result is , Alice and Charlie receive orthogonal complements, and Bob retrieves his initial state. In the case of , Bob and Charlie obtain their original states, while Alice gets her orthogonal complement. With , Alice receives her original state, while Bob and Charlie obtain orthogonal complements. If the measurement yields , Alice and Charlie reconstruct their original states, and Bob retrieves his orthogonal complement. For , Alice and Bob obtain their original states, and Charlie gets the orthogonal complement. Finally, if the outcome is , all three parties retrieve exact copies of their original unknown quantum states.
Extending this analysis to other 63 product Bell states listed in Eq (23), a similar conclusion holds. Regardless of which product Bell basis is observed, the same procedure allows each party to acquire either an exact replica or the orthogonal counterpart of their target state with perfect fidelity.
Remark: The transformation matrix in Eq (29) can be decomposed as the tensor product of three matrices
| (32) |
This implies that Victor utilizes the basis for simultaneous measurements on qubits , , and . This is equivalent to measuring each qubit separately with the bases for , for , and for .
3.2 Multiparty cyclic assisted cloning of arbitrary unknown single-qubit states in amplitude damping channel
The previous section presented a three-party cyclic-assisted cloning protocol, supported by a designated state preparer. In this section, we extend the framework to a generalized scenario involving an N-party loop. Suppose there are authorized participants distributed across different spatial locations: Victor, Bob, and Alice1 through AliceN. As the state preparer, Victor generates N arbitrary single-qubit states given by
| (33) |
where , with each being a real number and a complex number satisfying the normalization condition . These coefficients are completely known to Victor but entirely hidden from the remaining participants. Victor then distributes each qubit Aj to the corresponding Alicej, who treats it as her input state. Thus, apart from Victor, all other parties handle quantum states whose details are unknown to them. Each Alicej aims to obtain either a faithful clone or an OCC of her input state, with Victor’s assistance. S2 Fig illustrates the cyclic assisted cloning relationship established among N Alices with the assistance of the quantum state preparer, Victor. The diagram clearly presents the complete workflow, significantly enhancing the readability and comprehensibility of the content.
Similar to Stage 1 of Sect 3.1, Alicej shares a pure entangled state with , , where and . The composite system of the states , and the input states () can be written as
| (34) |
The protocol proceeds in two main phases: cyclic quantum teleportation and assisted cloning. In the first phase, each Alicej performs a sequence of operations:
Step 1 Each Alicej () performs a Bell-state measurement on her local qubit pair .This measurement projects the global system into a new entangled configuration, and as a result, the overall system collapses into a corresponding post-measurement state
| (35) |
where . From Eq (35) that the probability of Alicej’s measurement result is . After completing their respective measurements, each Alicej broadcasts her result via classical communication channels. Suppose, in general, that Alicej obtains the Bell state as her outcome for every . Under the influence of these measurement outcomes,the collapsed state of the remaining particles is
| (36) |
Step 2 According to the Alicej’s measurement outcome, () performs the Pauli operation (sj = 0,1) on her qubit , which changes the state into
| (37) |
Step 3 For each Alicej (), an auxiliary qubit is introduced in the initial state , followed by the application of the unitary operation to the qubits and . Under the basis , , , , the unitary transformation can be expressed as the following matrix:
| (38) |
After Alicej’s unitary transformation , the state of qubits and is transformed into
| (39) |
After that, Alicej measures the auxiliary qubit in the computational basis. If the outcome of his measurement is , Alicej obtains the state , and then Alicej perform Pauli gate to his qubit :
which means that Alicej has already successfully reconstructed the Alicej−1’s original state on her qubit , where and . While Alicej’s result is , the scheme is failed.
After all the Alices have performed the above series of operations, we have
| (40) |
which means that for joint measurement result come from Alice1, ALice2, , AliceN, cyclic quantum teleportation is completed.
According to Eq (39), we can compute the probability of Alicej obtaining the result ,which is given by . From this analysis, assuming Alice j’s result is , it can be concluded that the success probability for Alice j to reconstruct Alice j−1’s original state is . From the former analysis, and , so the total probability of our scheme is
| (41) |
Obviously, when , the cyclic QT scheme here is also a generalization of the standard cyclic QT scheme [36].
Now, we turn to the discussion of the last stage of our scheme, i.e., the assisted cloning stage. To create a copies for each of the unknown single-qubit states, all the Alices require assistance from the state preparer Victor. According to the projection postulate of quantum mechanics, if each Alice applies Bell state measurement onto the as shown in Eq (34), the state of qubit pairs , , , will collapse into some product states of Bell states. Without loss of generality, we only consider the collapsed state . Each Alicej sends her qubit Aj to Victor and keeps qubit in her possession, where .
To accomplish the assisted cloning task, we begin by defining the fundamental mutually orthogonal basis vectors wN−1,N as follows:
| (42) |
and then the general basis vector Wn can be expressed as
| (43) |
where
| (44) |
Then, the set of mutually orthogonal basis vectors can be written as
| (45) |
where represents the standard orthogonal basis of the -dimensional Hilbert space,and is its transpose.Accordingly, the state can be rewritten in the basis as
| (46) |
Because Victor knows the quantum states as shown in Eq (33) completely, he is capable of performing a projective measurement on the qubits using a set of mutually orthogonal basis vectors denoted by . As evident from Eq (46), each basis vector corresponds uniquely to a specific collapsed quantum state. This implies that, once Victor announces his measurement outcome via classical communication, each participant Alicej can independently determine the resulting state of her own qubit.
Based on Victor’s broadcasted outcome, every Alicej can apply an appropriate Pauli operator to reconstruct her target state. To illustrate this process more clearly, we can rewrite the entangled state in the following form:
| (47) |
As shown in Eq (47), once Victor projects the joint system of all qubit pairs onto a specific measurement basis, the resulting state is a tensor product of the output states across qubits , where each output corresponds to a transformed version—either a perfect clone or an orthogonal complement—of the original unknown state. Notably, regardless of which basis vector is observed, if all Alicej parties apply the same Pauli operator to their respective qubits, they can simultaneously generate the corresponding states. For example, if Victor’s measurement result is , each Alicej will obtain the OCC of her unknown input state. If the outcome is , then the first N–1 Alices receive OCCs of their respective states, while the last Alice recovers an exact replica of her initial unknown state. This pattern continues: if Victor observes , then the first N–1 Alices obtain perfect clones, while the final Alice gets the OCC; in the case of , all Alices receive exact copies of their original unknown states.
Using an analogous approach, in the process of CCQT, if the measurement outcomes of all Alicej correspond to any of the remaining –1 product Bell states defined in Eq (35), then following the same reasoning, each Alicej is still able to reconstruct either an exact replica or the orthogonal complement of her initial unknown single-qubit state.
4 Cyclic assisted cloning of arbitrary unknown single-qutrit states in amplitude damping channel
In this section, we present a multiparty cyclic-assisted cloning scheme for arbitrary unknown single-qutrit states in an AD channel, using a similar approach. We assume that the transmitted qutrits are affected by identical and independent AD noise, whereas the qutrits held locally remain unaffected by any noise.
We begin by focusing on a three-party cyclic-assisted cloning protocol involving four legitimate participants: Alice, Bob, Charlie, and Victor. In this setup, Victor acts as the state preparer and initially prepares three unknown pure qutrit states , and ,as follows:
| (48) |
where , and ()are real numbers that satisfy the normalization conditions , and .The phase parameters , , ()are arbitrary real numbers. It is important to note that all of these parameters are known only to Victor and remain unknown to the other participants. After preparing the three qutrits, Victor sends qutrits A, B and C to Alice, Bob, and Charlie respectively. Each participant regards the received qutrit as their own input state. However, since the state parameters are hidden from them, they cannot determine the exact form of their respective quantum states. The primary objective of Alice, Bob, and Charlie is to teleport their unknown input states in a cyclic order—Alice to Bob, Bob to Charlie, and Charlie to Alice. With Victor’s assistance, they aim to generate either perfect clones or OCC of their original quantum states at their own locations.The schematic diagram of the cyclic assisted cloning scheme for arbitrary unknown single-qutrit states in the amplitude damping channel is very similar to that of the scheme in Sect 3. The main difference lies in the quantum states being transmitted. However, since the cyclic transmission method and Victor’s assistance mechanism remain unchanged, we will not add additional diagrammatic explanations here to ensure clarity and avoid redundancy. This scheme mainly includes three stages: preparation of quantum channels, cyclic quantum teleportation and assisted cloning, with a total of ten steps, which are described as follows:
Stage 1 Preparation of quantum channels.
(1) To begin, Alice generates a Bell state .She then transmits the qutrit to Bob through the AD channel.
(2) Upon reception of qutrit , Bob initializes an ancillary qutrit B1 in the state . He applies a GCNOT operation on the qutrit pair , where acts as the control and B1 as the target. After completing this operation, Bob sends the qutrit back to Alice via the AD channel.
(3) Once Alice receives , she first carries out IGCNOT transformation on qutrit pair , with acting as the control and as the target . Subsequently, she implements a single-qutrit projective measurement in computational basis on qutrit . If the measurement outcome is , then the scheme continues to (1) in Stage 2; If not, the process restarts from the beginning until Alice successfully obtains the measurement outcome .
Noticing that in above (3) when Alice gets the outcome successfully, two qutrits is transformed into a PES:
| (49) |
which detailed proof is given in S2 Appendix. That is, Alice and Bob successfully share this PES.
Similar to the above approach, Bob and Charlie can successfully share the PES
| (50) |
and Charlie and Alice can also successfully share the pure ent state
| (51) |
Therefore, the composite system consisting of the states , and ,along with the input states , and is
| (52) |
Stage 2 Circularly teleport quantum states
(1) Alice and Bob each perform measurements on their respective qutrit pairs and using the generalized Bell-state basis (as shown in Eq (7)). Simultaneously, Charlie conducts a generalized Bell-state measurement on the qutrit pair . After completing the measurements, Alice, Bob, and Charlie each communicate their outcomes via classical channels, sending the results to Bob, Charlie, and Alice, respectively. Based on these generalized Bell-state projections, the overall state of the composite system can be expressed as:
| (53) |
where and .
As observed from Eq (53), the probability that Alice obtains the outcome can be written as . Bob and Charlie’s measurement probabilities take on a similar form. Once all the measurements are performed, Alice, Bob, and Charlie share their individual results through classical communication. For generality, suppose the outcomes are given by , and , corresponding to Alice, Bob, and Charlie, respectively. Then the state of the qutrits B1, C1 and A1 collapses into
| (54) |
(2) After hearing the measurement information, Alice, Bob and Charlie perform unitary operations UA, Ub and qutrits UC on A1, B1 and C1, respectively, which are given by
| (55) |
Then the state as shown in Eq (54) changed to
| (56) |
(3) To proceed, Bob initializes an auxiliary qutrit B2 in the state . He then applies a unitary operation to the joint system composed of qutrit B1 and the auxiliary qutrit B2. When expressed in the computational basis , , , , , , the unitary operator corresponds to a matrix. In the specific case where t = 0, the matrix form of is given by:
| (57) |
if t = 1,
| (58) |
if t = 2,
| (59) |
After Bob’s unitary transformation , the state of qutrits B1 and B2 is transformed into
| (60) |
or
| (61) |
or
| (62) |
Subsequently, Bob performs a projective measurement on the auxiliary qutrit B2 in Z-basis. If the outcome is , it indicates that the CQT is successful, and Bob’s qutrit B1 collapses to Alice’s original unknown state . On the other hand, if the measurement result is , the cyclic QT is failed.
Based on Eqs (60), (61) and (62), we can determine the probability of Bob obtaining the outcome as . Based on this, when Alice’s result is , the probability that Bob successfully reconstructs Alice’s original state can be expressed as .
Similar to what Bob did in (3), it is easy to see form Eq (54) that Charlie can reconstruct Bob’s original state on his qubit C1 with probability , and Alice can also reconstruct Charlie’s state on her qubit A1 with probability . Therefore, the probability that Alice, Bob, and Charlie can successfully reconstruct the original states , and when the measurement results , and occur simultaneously is i.e., for a fixed joint measurement outcome , the success probability of the cyclic QT is . From the former analysis, , that is, Alice, Bob and Charlie each have 9 measurement outcomes. It means that the joint measurement outcomes they constitute have a total of 729, so the total probability of our CQT is .
Note that when the noise strength of AD channel is zero (i.e., , there is no noise), then the states as shown in Eqs (49), (50) and (51) are all the same generalized Bell state , and the probability of our scheme is . It means that our scheme is the standard cyclic QT in three-dimensional quantum systems. In this sense, our CQT here is a generalization of the standard CQT.
Stage 3 Clone unknown quantum states.
(1) In the third stage, Alice, Bob, and Charlie aim to independently create copies of arbitrary unknown single-qutrit states , and , respectively. To achieve this, they all require the assistance of the state preparer Victor.According to the projection assumption in quantum mechanics,if Alice, Bob and Charlie apply the generalized Bell-state measurement into as shown in Eq (46), the state of qutrit pair , and will collapse into some Bell states. For simplicity, we consider the collapsed state , and . Following this collapse, each party sends one qutrit to Victor while retaining the other: Alice sends qutrit A to Victor and keeps ; Bob delivers B and retains ; and Charlie transmits C while keeping . Given this setup, a natural question arises: can Victor, without any prior knowledge of the original input states, perform operations in the third stage that enable Alice, Bob, and Charlie to simultaneously recover copies of their respective unknown single-qutrit states? In what follows, we provide a detailed argument that such a process is indeed theoretically feasible.
(2) Notice that Victor completely knows the quantum state , and , so he can introduce three auxiliary qutrits and V2, which are initially in the states , and , respectively. Then, the composite system consisting of qutrits , and V2 is
| (63) |
Then he executes three unitary transformations and U2, which are based on the bases , , , , , , , , , , , and , , , , , , respectively, and have the following forms
| (64) |
| (65) |
| (66) |
After these unitary transformations, the state becomes
| (67) |
Now, Victor performs projective measurements on the auxiliary qutrits and V2, respectively, under the basis . If the joint result is with the probability of 1/9, the state of the system composed of qutrits and collapses into
| (68) |
Otherwise it fail.
(3) Let us introduce the following notations:
| (69) |
Obviously, the vectors in each group in Eq (69) form a complete orthogonal basis within a 3-dimensional Hilbert space.
Given that Victor has full knowledge of the unknown states , and ,he performs a measurement on qutrits A, B, and C using a specially constructed basis denoted by .This measurement basis is related to the standard three-qutrit computational basis through the following transformation:
| (70) |
Generally, if Victor’s measurement outcome is , the collapsed state of qutrits , and is
| (71) |
After conducting a projective measurement on qutrits A,B and C, Victor subsequently communicates the measurement outcome to Alice, Bob, and Charlie through classical communication channels.
(4) Upon receiving the measurement information from Victor, each of Alice, Bob, and Charlie is able to apply a corresponding local unitary transformation to recover their respective target states. Specifically, for the above general measurement result , Alice, Bob and Charlie perform unitary transformations and on their respective qutrits, which given as follows
| (72) |
i.e.,
| (73) |
completing the cloning task.
By combining the method presented in Sect 3.2 with the three-party cyclic-assisted cloning scheme proposed in this section, we can further extend the protocol to accommodate N-party cyclic-assisted cloning, where N>3.
5 Cyclic assisted cloning of arbitrary unknown single-qudit states in amplitude damping channel
In this section, we extend the schemes from the previous two sections to the problem of cyclic-assisted cloning of high-dimensional unknown single-particle states in the AD channel. Firstly, we still consider the three-party assisted cloning: suppose that there are four participants, Alice, Bob, Charlie, and Victor, spatially separated. The state preparer Victor has prepared three single-qudit states , and , as follows
| (74) |
where , and () are real numbers with , and , while , , are arbitrary real numbers for any and . All the parameters of the states in Eq (74) are completely known to Victor and completely unknown to the other participants. Victor distributes the quantum states A, B, and C to Alice, Bob, and Charlie, respectively. Upon receiving these states, each of them treats the received state as their own input. Importantly, none of the participants,except for Victor,has any knowledge of these input states. The goal of Alice, Bob, and Charlie is to sequentially teleport their individual input states to Bob, Charlie, and Alice, respectively. With assistance from Victor, they aim to reproduce the original input states at their own locations, thereby generating copies of these states.The schematic diagram of the scheme presented in this section is highly similar to that of the scheme in Sect 3. The protocol in Sect 3 involves the cyclic assisted cloning of arbitrary unknown single-qubit states in an amplitude damping channel, while this section explores the cyclic assisted cloning of arbitrary unknown single-qudit states in the same channel. This represents an extension of the protocol in Sect 3 to the scenario of cyclic assisted cloning for d-dimensional unknown quantum states. The main difference lies in the type of quantum states being transmitted (single-qubit states vs. single-qudit states), while the cyclic transmission method and Victor’s assistance mechanism remain unchanged. To avoid redundancy, no additional diagrams are included here to enhance the clarity of the content. This scheme mainly includes three stages: preparation of quantum channels, CQT and assisted cloning.
In the preparation stage of the quantum channels, in a similar method to that in Sects 3.1 and 4, Alice and Bob share a d-dimensional two-particle PES
| (75) |
Bob and Charlie share a two-qudit PES
| (76) |
and Charlie and Alice share a two-qudit PES
| (77) |
Therefore, the state of the composite system of qudits and C1 is
| (78) |
Now consider the cyclic QT: Alice, Bob and Charlie perform d-dimensional Bell measurements on qudit pairs , ,and , and communicate the results , and to Bob, Charlie and Alice in order via the classical channels. After these measurements, the state of and A1 will collapse into
| (79) |
According to the measurement information, Bob, Charlie and Alice apply the local unitary operations , and on qudits and A1, respectively, which are given by
| (80) |
These local unitary operations change the state into
| (81) |
To proceed, Alice prepares an auxiliary qubit A2 initialized in the state . She then applies a unitary transformation, denoted as , which operates in the basis , which is given by
| (82) |
and when ,
| (83) |
where E represents the identity matrix, and
| (84) |
for any . Then,it is straightforward to deduce that
| (85) |
for any . Now Alice performs a projective measurement on the auxiliary qubit A2 in the basis . If theresult of Alice’s measurement is , she successfully retrieves Charlie’s state on her qudit A1. Otherwise, the teleportation fails.
Clearly, the probability of obtaining the measurement result is given by
Form the above analysis, on condition that Charlie’s result is with the probability of , it can be observed that the probability of Alice successfully recovering Charlie’s original state is given by .
Similar to Alice’s approach, Bob and Charlie independently reconstruct the original states of Alice and Bob, respectively, with the probability of . Since , the overall success probability of the cyclic quantum teleportation is .
In the assisted cloning stage, based on the projection postulate of quantum mechanics, if Alice, Bob and Charlie apply the d-dimensional Bell state measurements onto the combined state , the state of qudit pairs pair , pair and pair will collapse into some d-dimensional Bell states. Without loss of generality, we consider the following three collapsed Bell states , and . Alice transmits qudit A to Victor while retaining qudit herself; similarly, Bob sends qudit B to Victor and keeps qudit in his possession; likewise, Charlie forwards qudit C to Victor and holds onto qudit .
Since Victor knows exactly the three quantum states indicated in Eq (74), he introduces three auxiliary qubits and in initial states and , respectively. Then, the composite system consisting of qudits , and is
| (86) |
and then, he performs three unitary transformations and , which are based on the bases , , , and , , respectively,and are expressed as follows
| (87) |
where
| (88) |
After these unitary transformations, the state becomes
| (89) |
Subsequently, Victor respectively measures the auxiliary qubits and in the computational basis . If the collective measurement outcome is , then the state of qudits and collapses accordingly into
| (90) |
Let us introduces the Matrix notation
| (91) |
Since Victor has complete knowledge of the states , , and , he performs a measurement on qudits A, B, and C using the basis .The correspondence between this measurement basis and the standard computational basis of the three-qudit system is defined as follows
| (92) |
In general, if Victor’s measurement results in the outcome , the corresponding post-measurement state of qutrits , , and is given by the following expression
| (93) |
Following a projective measurement performed by Victor on the qutrits A, B, and C, he communicates the measurement result to Alice, Bob, and Charlie through classical communication channels. Based on the information received from Victor, each of them can apply a suitable local unitary operation to retrieve their respective intended quantum states. Specifically,for the above general measurement result , Alice, Bob, and Charlie apply the unitary operators , , and to their corresponding qudits. These operations are defined as follows:
| (94) |
i.e.,
| (95) |
This means that arbitrary unknown single-qudit states , and are perfectly copied at the locations where Alice, Bob, and Charlie are, respectively, with the assistance of the state preparer Victor, completing the cloning task.
By integrating the concept introduced in Sect 3.2 with the cyclic-assisted cloning strategy involving three participants presented in this section, the proposed scheme can be naturally extended to accommodate a cyclic-assisted cloning protocol among N parties, where N>3.
6 Discussion and conclusion
It is clear that each of the proposed schemes can be divided into three distinct phases:preparing quantum channels, QT and the process of assisted quantum cloning. In our schemes, quantum channels prepared by entanglement compensation in AD noise are all PESs.In CQT, all participants, except for the state preparer, act as both transmitters and receivers of quantum information. During the cloning phase, however, these participants function solely as recipients of the replicated states. This structure ensures that the entire process follows a cyclical and synchronized pattern. Previous studies have found that: the fidelity and probability of quantum communication in a noisy environment are both less than 1 and decrease with the increase in noise. However, each of the protocols that we present in this paper demonstrates that the fidelity remains a constant 1, regardless of how the noise intensity of AD changes. Note that the success probabilities of the CQTs in the three-party schemes in Sects 3, 4 and 5 have the following relation:
| (96) |
This means that the probability of success for the cyclic QT decreases as the dimensionality of the transmitted quantum states increases. Moreover, it can be known from the probability of CQT in Sect 3.1 and the probability of CQT in Sect 3.2 that the more people involved in the communication, the smaller the probability of success of the CQT.
Introducing ancillary particles, implementing special unitary transformations, and performing single-particle Z-basis measurements in the CQTs of Sects 2, 4 and 5. A natural question is: Can positive-operator-valued measurement (POVM) be adopted? The answer is yes. To illustrate the problem we take the re-examination of Sect 3.1 (b3) as an example of applying the POVM method. For convenience of expression, let us define . Then the state . After Bob introduces an auxiliary qubit B2 in initial state , he executes a CNOT gate
| (97) |
where , , and .
In order to identify the states and , Bob is required to perform a positive POVM on the auxiliary qubit B2. The corresponding POVM elements are constructed in the following form:
| (98) |
here, the states are defined as and , where the normalization factor is given by . I denotes the identity operator. Additionally, the real parameter υ, which depends on γ, must be appropriately chosen to ensure that P3 is a positive operator.
In order to determine υ, we can rewrite and P3 in the following matrix form
| (99) |
In order for P3 to be a positive operator, the parameter υ must satisfy the condition . Upon performing the POVM, Bob can obtain the measurement outcomes corresponding to P1 and P2 with the following probability:
| (100) |
and can infer the state of qubit B2 based on the POVM outcome.However, Bob is able to obtain the measurement outcome corresponding to the operator P3 with probability , in which case he is unable to determine the specific state of the auxiliary particle B2. Conversely, if Bob successfully identifies that B2 is in the state or , this implies that he knows the state of particle B is or , respectively. Accordingly, he can apply the unitary operation or on qubit B to reconstruct the target state on qubit B with a maximum success probability of . Obviously, both Charlie and Alice can reach the same conclusion.
A natural and critical question is whether similar probabilistic exact cloning protocols (with fidelity equal to 1) can be constructed under different noise environments, such as bit-flip or depolarizing noise. Here, we must emphasize that the protocol proposed in this paper is specifically designed for the AD noise model. The irreversible nature of AD noise, where the system spontaneously decays to its ground state, leads to directional evolution in quantum systems. This characteristic is crucial because the Kraus operator structure of AD noise enables selective measurement of the quantum system and post-projection onto the cloneable subspace. Based on this physical mechanism, our probabilistic post-selection cloning strategy is theorized, allowing us to construct a probabilistic cloning scheme with fidelity equal to 1. However, for most other types of noise models, such as bit-flip noise, the method proposed in this paper is not applicable, and the fidelity usually cannot reach 1. Similarly, in depolarizing noise environments, it is also difficult to achieve exact cloning. To determine whether our method is still feasible under a certain noise model, we provide a systematic verification method in the appendix. Specifically, the appendix presents the proof processes of two theorems, serving as the basis for judging different dimensional systems: Theorem 1 is designed for low-dimensional systems (such as single-qubit cases), and Theorem 2 extends to higher-dimensional systems (such as multi-level quantum systems). These theorems not only provide sufficient conditions for achieving perfect cloning but also offer a practical method to verify whether a specific noise model supports our protocol. Particularly, in the case of AD noise, both theorems are fully satisfied, thus proving the feasibility of our method in this environment. However, for most other models, these conditions are usually not met, rendering our method inapplicable. Future work could explore improved protocols for other noise channels.
Security is always a crucial consideration when choosing communication protocols. Below, we briefly discuss the security of the proposed scheme. In fact, the security of our scheme mainly depends on whether the quantum state, as a quantum communication channel, is securely shared by legitimate participants beforehand. In other words, the key is whether the entanglement is maintained securely during the distribution process. By employing existing, mature, and widely used entanglement detection methods [53,54] to preprocess the quantum entanglement distribution required in our scheme, we can effectively identify and defend against malicious attacks from external sources and fraudulent behaviors from internal sources. The specific detection process will not be elaborated on in this paper. This indicates that the safety of our scheme can be effectively guaranteed. Furthermore, the inclusion of a controller in the scheme enhances the overall security, ensuring that the proposed protocol is both secure and controllable.In conclusion, the proposed scheme is controllable and secure.
In summary, this paper explores the issue of conclusive cyclic assisted cloning of arbitrary unknown single-particle states within an AD channel, leveraging the technologies of QT and RSP. We focus on the scenario where the particles transmitted through the quantum channel experience the same independent AD strength, while the particles remaining locally are unaffected. The main contributions are as follows.
(i) The detailed process of sharing pure entangled single-qubit (single-qutrit) state among three communicators in AD channel is provided via CNOT gates (GCNOT gates). The method of sharing is easy generalize to the case of sharing an arbitrary d-dimensional pure single-qudit state.
(ii) Utilizing these shared pure single-particle states as the components of quantum channels, we present two three-party cyclic-assisted cloning protocols.Each protocol requires standard CQT and multi-output assisted cloning. In its CQT, the sender Alice teleports an arbitrary unknown single-qubit state (single-qutrit state) to Bob, Bob transmits an unknown single-qubit (single-qutrit) state to Charlie, and at the same time, Charlie also transmits an unknown single-qubit (single-qutrit) state to Alice. The probabilistic reconstruction of each of the three unknown quantum states is achieved by introducing an auxiliary qubit and performing suitable quantum operations. The success rate of this process depends solely on the smaller modulus of the coefficients that describe a particular shared PES. In the multi-output assisted cloning, after the special multi-particle measurement (unitary transformation and multi-particle equatorial state measurement) by the state preparer, the three original unknown are simultaneously cloned at three different locations with respective probabilities.
(iii) In the above two three-party cyclic-assisted cloning protocols, the analytical expressions of the operations of the participants we provided are as general as possible. This not only reveals the general rules more clearly and simplifies the cumbersome expressions, but also are easy to generalize to more general complex communication scenarios.
(iv) We have made general extensions of the above two three-party protocols from the two perspectives: the number of people participating in the circular communication and the dimension of the quantum system, which will be greatly beneficial to the future high-capacity quantum network communication.
(v) Although our scheme is based on the AD environment, its fidelities are all equal to 1, whereas almost all existing protocols cannot achieve such fidelity. Furthermore, a careful analysis of the scheme shows that in our protocols, complex multi-particle unitary matrices can be decomposed into simple matrices, and that multi-particle measurements can be decomposed into single-particle projection measurements. Therefore, our protocol is closer to real life and has the potential to be experimentally realized as technology advances.
Supporting information
(EPS)
(EPS)
(PDF)
(PDF)
Data Availability
All relevant data are within the manuscript.
Funding Statement
This study was supported by the Kashi University Flexible Introduction Research Initiation Fund (No. 022024077), the Kashi University School-level Research Project (Nos. (2023)1835 and (2024)2923), the Natural Science Foundation of Xinjiang Uygur Autonomous Region (No. 2024D01A10), and the Scientific Research Project of the Fundamental Research Funds for Higher Education Institutions in Xinjiang Uygur Autonomous Region (No. XJEDU2025P076).
References
- 1.Bennett C, Brassard G, Crépeau C, Jozsa R, Peres A, Wootters W. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys Rev Lett. 1993;70(13):1895–9. doi: 10.1103/PhysRevLett.70.1895 [DOI] [PubMed] [Google Scholar]
- 2.Liu B, Xia S, Xiao D, Huang W, Xu B, Li Y. Decoy-state method for quantum-key-distribution-based quantum private query. Sci China Phys Mech Astron. 2022;65(4):240312.doi: 10.1007/s11433-021-1843-7 [DOI] [Google Scholar]
- 3.Gokul A, Natarajan H, Raghunathan V. Fiber-based higher dimensional quantum key distribution implementation using time-bin qudits. In: Quantum Computing, Communication, and Simulation IV. 2024. p. 112–9.
- 4.Zhou L, Sheng Y-B. One-step device-independent quantum secure direct communication. Sci China Phys Mech Astron. 2022;65(5). doi: 10.1007/s11433-021-1863-9 [DOI] [Google Scholar]
- 5.Li X-H. Quantum secure direct communication. Acta Phys Sin. 2015;64(16):160307. doi: 10.7498/aps.64.160307 [DOI] [Google Scholar]
- 6.Shi G-F. Measurement-device-independent quantum dialogue. Chinese Phys B. 2021;30(10):100303. doi: 10.1088/1674-1056/ac140a [DOI] [Google Scholar]
- 7.Zhang C, Zhou L, Zhong W, Du M-M, Sheng Y-B. Measurement-device-independent quantum dialogue based on entanglement swapping and phase encoding. Quantum Inf Process. 2024;23(2):52.doi: 10.1007/s11128-024-04260-w [DOI] [Google Scholar]
- 8.Peng J, Maihemuti N, Aisan Y, Yang Z. Quantum teleportation of shared high-dimensional quantum secret. Phys Scr. 2024;99(8):085125. doi: 10.1088/1402-4896/ad623d [DOI] [Google Scholar]
- 9.Liu M, Maihemuti N, Peng J, Aisan Y, Tang J. Hierarchical quantum communication of a single-qubit state with multiple users. Laser Phys. 2025;35(4):045202. doi: 10.1088/1555-6611/adbad1 [DOI] [Google Scholar]
- 10.Peng J, Liu M, Yang Z, Tang L, Tang J. Double-direction cyclic controlled quantum communication of single-particle states. Physica A: Statistical Mechanics and its Applications. 2023;632:129343. doi: 10.1016/j.physa.2023.129343 [DOI] [Google Scholar]
- 11.Tang J, Maihemuti N, Peng J. Conclusive high-dimensional multiparty quantum state sharing in amplitude-damping channel. Int J Theor Phys. 2025;64(2):47.doi: 10.1007/s10773-025-05906-w [DOI] [Google Scholar]
- 12.Peng J-Y, Tang L, Yang Z. Deterministic hierarchical quantum operation sharing with five-qubit partially entangled states. Quantum Inf Process. 2023;22(7). doi: 10.1007/s11128-023-03963-w [DOI] [Google Scholar]
- 13.Sun S, Zhang H. Double-direction quantum cyclic controlled remote state preparation of two-qubit states. Quantum Inf Process. 2021;20(6). doi: 10.1007/s11128-021-03149-2 [DOI] [Google Scholar]
- 14.Peng J-Y, Xiang Y. Multiparty-controlled remote state preparation of multiple qubit-string information. Int J Mod Phys B. 2023;38(14). doi: 10.1142/s0217979224501674 [DOI] [Google Scholar]
- 15.Xin X, He S, Li C. Deterministic hierarchical joint remote state preparation via a non-maximally entangled state. Quantum Inf Process. 2024;23(4):121.doi: 10.1007/s11128-024-04329-6 [DOI] [Google Scholar]
- 16.Maihemuti N, Chen Z, Peng J, Aisan Y, Tang J. Controlled double-direction cyclic quantum communication of arbitrary two-particle states. Entropy (Basel). 2025;27(3):292. doi: 10.3390/e27030292 [DOI] [PMC free article] [PubMed] [Google Scholar]
- 17.Liu M, Maihemuti N, Peng J. Controlled bidirectional remote implementations of partially unknown quantum operations. Phys Scr. 2024;99(4):045109. doi: 10.1088/1402-4896/ad2d9d [DOI] [Google Scholar]
- 18.Zhang Z, Deng L, Zhang L, Zhuge B, Ye B. Efficient tripartite quantum operation sharing with five-qubit absolutely maximally entangled state. Int J Theor Phys. 2021;60(7):2583–91. doi: 10.1007/s10773-020-04684-x [DOI] [Google Scholar]
- 19.Wootters WK, Zurek WH. A single quantum cannot be cloned. Nature. 1982;299(5886):802–3. doi: 10.1038/299802a0 [DOI] [Google Scholar]
- 20.Bužek V, Hillery M. Quantum copying: beyond the no-cloning theorem. Physical Review A. 1996;54(3):1844. [DOI] [PubMed] [Google Scholar]
- 21.Hillery M, Bužek V. Quantum copying: fundamental inequalities. Phys Rev A. 1997;56(2):1212–6. doi: 10.1103/physreva.56.1212 [DOI] [Google Scholar]
- 22.Bužek V, Braunstein SL, Hillery M, Bruß D. Quantum copying: a network. Phys Rev A. 1997;56(5):3446–52. doi: 10.1103/physreva.56.3446 [DOI] [Google Scholar]
- 23.Gisin N, Massar S. Optimal quantum cloning machines. Phys Rev Lett. 1997;79(11):2153–6. doi: 10.1103/physrevlett.79.2153 [DOI] [Google Scholar]
- 24.Bruß D, DiVincenzo DP, Ekert A, Fuchs CA, Macchiavello C, Smolin JA. Optimal universal and state-dependent quantum cloning. Phys Rev A. 1998;57(4):2368–78. doi: 10.1103/physreva.57.2368 [DOI] [Google Scholar]
- 25.Duan L-M, Guo G-C. A probabilistic cloning machine for replicating two non-orthogonal states. Physics Letters A. 1998;243(5–6):261–4. doi: 10.1016/s0375-9601(98)00287-4 [DOI] [Google Scholar]
- 26.Duan L-M, Guo G-C. Probabilistic cloning and identification of linearly independent quantum states. Phys Rev Lett. 1998;80(22):4999–5002. doi: 10.1103/physrevlett.80.4999 [DOI] [Google Scholar]
- 27.Murao M, Jonathan D, Plenio MB, Vedral V. Quantum telecloning and multiparticle entanglement. Phys Rev A. 1999;59(1):156–61. doi: 10.1103/physreva.59.156 [DOI] [Google Scholar]
- 28.Bruß D, Cinchetti M, Mauro D, Ariano G. Phase covariant quantum cloning. Physical Review A. 2000;62(1):012302. [Google Scholar]
- 29.Werner RF. Optimal cloning of pure states. Physical Review A. 1998;58(3):1827. [Google Scholar]
- 30.Fan H. Quantum cloning of mixed states in symmetric subspace. Physical Review A. 2003;68(5):054301. [Google Scholar]
- 31.Zou XB, Pahlke K, Mathis W. Scheme for the implementation of a universal quantum cloning machine via cavity-assisted atomic collisions in cavity QED. Physical Review A. 2003;67:024304. [Google Scholar]
- 32.Pati AK. Assisted cloning and orthogonal complementing of an unknown state. Physical Review A. 2000;61(2):022308. [Google Scholar]
- 33.Zhan Y-B. Assisted cloning of an unknown two-particle entangled state. Physics Letters A. 2005;336(4–5):317–23. doi: 10.1016/j.physleta.2004.12.073 [DOI] [Google Scholar]
- 34.Han LF, Yuan H, Yang M, Cao ZL. Assisted cloning of an arbitrary unknown two-qubit state via a genuine four-qubit entangled state and positive operator-valued measure. Indian Journal of Pure & Applied Physics. 2014;52:563–70. [Google Scholar]
- 35.Hou K, Shi SH. Scheme for cloning an unknown entangled state with assistance via non-maximally entangled cluster states. International Journal of Theoretical Physics. 2009, 48(1): 167–77. [Google Scholar]
- 36.Briegel HJ, Raussendorf R. Persistent entanglement in arrays of interacting particles. Phys Rev Lett. 2001;86(5):910–3. doi: 10.1103/PhysRevLett.86.910 [DOI] [PubMed] [Google Scholar]
- 37.Zhan Y. A scheme for assisted cloning of a two-particle entangled state via GHZ class states. Chin Opt Lett. 2005;3(101):S286–9. [Google Scholar]
- 38.Ming F, Yi-Min L, Jun L, Shou-Hua S, Zhan-Jun Z. Assisted cloning and orthogonal complementing of an arbitrary unknown two-qubit entangled state. Commun Theor Phys. 2006;46(5):849–52. doi: 10.1088/0253-6102/46/5/016 [DOI] [Google Scholar]
- 39.Peng-Cheng M, You-Bang Z. Scheme for implementing assisted cloning of an unknown d-dimension equatorial quantum state by remote state preparation. Commun Theor Phys. 2009;51(1):57–9. doi: 10.1088/0253-6102/51/1/11 [DOI] [Google Scholar]
- 40.Chen XB, Ma SY, Pang B, Yang YX, Wen QY. An economical scheme for cloning an unknown M-qudit equatorial-like state with assistance. Communications in Theoretical Physics. 2010;53(6):1067–71. [Google Scholar]
- 41.Lipeng Xue, Min Jiang. Assisted cloning of arbitrary unknown multi-qudit state. In: 2015 10th Asian Control Conference (ASCC). 2015. p. 1–5. 10.1109/ascc.2015.7244542 [DOI]
- 42.Maihemuti N, Peng J, Yang Z, Zhai D, Tang J. Controlled and assisted cloning of an arbitrary unknown states via maximal slice states. Int J Theor Phys. 2024;63(1). doi: 10.1007/s10773-023-05536-0 [DOI] [Google Scholar]
- 43.Zhai D, Peng J, Maihemuti N, Tang J. Assisted cloning of an arbitrary unknown d-dimension state. Int J Theor Phys. 2024;63(6). doi: 10.1007/s10773-024-05694-9 [DOI] [Google Scholar]
- 44.Yang G, Lian B-W, Nie M, Jin J. Bidirectional multi-qubit quantum teleportation in noisy channel aided with weak measurement. Chinese Phys B. 2017;26(4):040305. doi: 10.1088/1674-1056/26/4/040305 [DOI] [Google Scholar]
- 45.Peng J-Y, Xiang Y. Bidirectional remote state preparation in noisy environment assisted by weak measurement. Optics Communications. 2021;499:127285. doi: 10.1016/j.optcom.2021.127285 [DOI] [Google Scholar]
- 46.Peng J-Y, Tang L, Yang Z, Lei H, Bai M-Q. Many-party controlled remote implementations of multiple partially unknown quantum operations. Quantum Inf Process. 2022;22(1). doi: 10.1007/s11128-022-03750-z [DOI] [Google Scholar]
- 47.Sun S, Zhang H. Deterministic quantum cyclic controlled teleportation of arbitrary multi-qubit states using multi-qubit partially entangled channel. Mod Phys Lett A. 2020;35(25):2050204. doi: 10.1142/s0217732320502041 [DOI] [Google Scholar]
- 48.Jia-yin P, Hong-xuan L. Cyclic remote state preparation. Int J Theor Phys. 2021;60(4):1593–602. doi: 10.1007/s10773-021-04782-4 [DOI] [Google Scholar]
- 49.Sun S, Zhang H. Quantum double-direction cyclic controlled communication via a thirteen-qubit entangled state. Quantum Inf Process. 2020;19(4):1–18.doi: 10.1007/s11128-020-2619-5 [DOI] [Google Scholar]
- 50.Peng J, Yang Z, Tang L, Peng J. Double-direction cyclic controlled remote implementation of partially known quantum operations. Int J Theor Phys. 2022;61(10). doi: 10.1007/s10773-022-05213-8 [DOI] [Google Scholar]
- 51.Hu WW, Zhou R-G, Luo GF. Conclusive multiparty quantum state sharing in amplitude-damping channel. Quantum Inf Process. 2021;21(1). doi: 10.1007/s11128-021-03333-4 [DOI] [Google Scholar]
- 52.Fonseca A. High-dimensional quantum teleportation under noisy environments. Physical Review A. 2019;100(6):062311. [Google Scholar]
- 53.Deng FG, Li XH, Zhou HY, et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack. Physical Review A 2005;72:044302. [Google Scholar]
- 54.Zhang ZJ, Yang J, Man ZX, Li Y. Multiparty secret sharing of quantum information using and identifying Bell states. Eur Phys J D. 2005;33(1):133–6. doi: 10.1140/epjd/e2005-00029-5 [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Supplementary Materials
(EPS)
(EPS)
(PDF)
(PDF)
Data Availability Statement
All relevant data are within the manuscript.
