Abstract
An unknown quantum state cannot be copied and broadcast freely due to the no-cloning theorem. Approximate cloning schemes have been proposed to achieve the optimal cloning characterized by the maximal fidelity between the original and its copies. Here, from the perspective of quantum Fisher information (QFI), we investigate the distribution of QFI in asymmetric cloning machines which produce two nonidentical copies. As one might expect, improving the QFI of one copy results in decreasing the QFI of the other copy. It is perhaps also unsurprising that asymmetric phase-covariant cloning outperforms universal cloning in distributing QFI since a priori information of the input state has been utilized. However, interesting results appear when we compare the distributabilities of fidelity (which quantifies the full information of quantum states), and QFI (which only captures the information of relevant parameters) in asymmetric cloning machines. Unlike the results of fidelity, where the distributability of symmetric cloning is always optimal for any d-dimensional cloning, we find that any asymmetric cloning outperforms symmetric cloning on the distribution of QFI for d ≤ 18, whereas some but not all asymmetric cloning strategies could be worse than symmetric ones when d > 18.
Classical information can be replicated perfectly and broadcast without fundamental limitations. However, information encoded in quantum states is subject to several intrinsic restrictions of quantum mechanics, such as Heisenberg's uncertainty relations1 and quantum no-cloning theorem2. The no-cloning theorem tells us that an unknown quantum state cannot be perfectly replicated because of the linearity of the time evolution in quantum physics, which is the essential prerequisite for the absolute security of quantum cryptography3. Nevertheless, it is still possible to clone a quantum state approximately, or instead, clone it perfectly with certain probability4,5. Therefore, various types of quantum cloning machines have been designed for different quantum information tasks, including universal quantum cloning machine (UQCM)6,7, state-dependent cloning machines8 and phase-covariant quantum cloning machine (PQCM)9,10,11,12.
So far, the optimality of the approximate cloning machine is judged generally by whether the obtained fidelity between the cloning output state and the ideal state achieves its optimal bound. Although the fidelity may have qualified the complete information of the quantum states, in most scenarios, only the information of certain parameters which are physically encoded in quantum states is our practical concern. For example, the relative phase estimation is an extremely important issue in the field of quantum metrology13,14. Thus it is not necessary to gain complete information of the whole quantum states themselves, but rather the relevant parameter information. QFI is a natural candidate to quantify the physical information about the involved parameters15. In a recent work16, the authors pointed that the QFI of relevant parameter encoded in quantum states also cannot be cloned perfectly, while it might be broadcast even in some non-commuting quantum states. Furthermore, from the perspective of QFI, Song et al. showed that Wootters-Zurek cloning performs better than universal cloning for the symmetric cloning cases17. In our recent work, the multiple phase estimation problem was investigated in the framework of symmetric quantum cloning machines18.
On the other hand, we note that quantum cloning machines not only provide a good platform for investigating distribution of quantum information, but also have been proved to be very efficient eavesdropping attacks on the quantum key distribution (QKD) protocols19,20,21,22. In this context, asymmetric quantum cloning machines would be of particular interest since the eavesdropper can adjust the trade-off between the information gained from a quantum communication channel and the error rate of information transmitted to the authorized receiver. Motivated by these considerations, we investigate the problem of distributing QFI in asymmetric quantum cloning machines for any dimensionality. We focus on the following four questions: (i) Is it possible to improve the QFI of one copy by decreasing that of the other copy? If YES, what's the trade-off relation between them? (ii) Does asymmetric PQCM always perform better than asymmetric UQCM on the capability of distributing QFI? (iii) Does asymmetric cloning always outperform symmetric cloning in distributing QFI for any dimensionality? (iv) What's the difference between fidelity and QFI on the characterization of distributability in asymmetric cloning? Except for the fourth question need to be clarified in detail, we can briefly answer the first two questions in the affirmative but the third in the negative. Our results shed an alternative light on quantum cloning and may be exploited for quantum phase estimation.
Results
Quantum Fisher information
We start with a brief introduction of QFI and give a useful form of QFI for a special kind of mixed qudit states, which usually represents the output states of qudit cloning. Recall that QFI of parameter θ encoded in d-dimensional quantum state ρθ is generally defined as15,23,24
![]() |
where
is the so-called symmetric logarithmic derivative, which is defined by
with ∂θ = ∂/∂θ. By diagonalizing the matrix as ρθ = Σnλn|ψn〉 〈ψn|, one can rewritten the QFI as25,26
![]() |
where
is the QFI for pure state |ψn〉 with the form
![]() |
Note that equation (2) suggests the QFI of a non-full-rank state is only determined by the subset of {|ψi〉} with nonzero eigenvalues. Physically, the QFI can be divided into three parts26,27. The first term is just the classical Fisher information determined by the probability distribution; The second term is a weighted average over the QFI for all the nonzero eigenstates; The last term stemming from the mixture of pure states reduces the QFI and hence the estimation precision below the pure-state case. Though the equation (2) is powerful, there is no explicit expression for an arbitrary d-dimensional mixed state. However, it is worth noting that the output reduced states of UQCM and PQCM all have a form as
![]() |
which is completely characterized by a parameter independent shrinking factor η and the dimensionality d. Here, |ψ〉in and Id are the input state and d-dimensional identity matrix, respectively. Although ρout has such a simple form, an analytical expression of QFI is still difficult to achieve28. Fortunately, if we restrict our discussions to the special case of input states in the form
![]() |
which are covariant with respect to rotations of the phases, a general form of QFI for any parameter θk could be given by (see methods)
![]() |
The above equation is a key mathematical tool for our analysis of this paper. Although this expression only holds for the combination of equations (4) and (5), it is powerful since the scaling form of ρout is usually satisfied in quantum cloning machines or in the case of a pure state under white noises. On the other hand, the equatorial states are widely employed in the physical implementations of quantum communication ideas (such as BB84 protocol29) as well as in the demonstration of fundamental questions in quantum information processing. After a simple calculation, we find that
is a monotonically increasing function of the shrinking factor η. This is to be expected because the larger η indicates more information the reduced output state ρout contains about the relevant parameter.
Distributability
Before moving to the discussion of distribution, a proper measure that quantify the distributability of cloning machines should be well defined. Note that one can define the distributability in different ways which depends on what is distributed in the procedure. For example, it can be defined from the perspectives of fidelity which quantifies the total information of the state, and QFI which quantifies the information of particular parameters in the state.
It is well known that, unlike the symmetric cloning in which all the copies are the same, the outputs of asymmetric cloning are nonidentical. Hence, the optimality of asymmetric cloning can be judged by maximizing the sum of all copies' fidelities, as discussed in references30,31. Intuitively, when we consider the distribution of quantum states, the distributability of asymmetric cloning can be defined as
![]() |
where Fi is the fidelity between the original and the ith copy. Namely, the larger F indicates the better capability of distribution on the quantum states.
In a seminal work24, the authors pointed that both fidelity and QFI are highly related to the distinguishability of the states, which is measured by Bures distance32. Therefore, from the perspective of QFI, the measure
![]() |
also qualifies the capability of distributing information of relevant parameter encoded in the input state, where
denotes the QFI of parameter θ in the ith copy. In the following discussions, we will use the definitions (7) and (8) to quantify the distributabilities of fidelity and QFI respectively in asymmetric cloning machines.
QFI distribution for 2-dimensional cloning
As we mentioned above, one is particularly interested in the asymmetric cloning machines which produce two copies with different qualities within the framework of quantum cryptography. Two typical asymmetric cloning machines are asymmetric UQCM30, which clones all input states equally well, and asymmetric PQCM9, which works equally well only for equatorial input states with the form of equation (5). We first discuss the 2-dimensional cloning by obtaining the analytical results, and then generalize it to d-dimensional cloning by the assistance of numerical simulations.
Asymmetric 2-dimensional UQCM
The 1 → 1 + 1 optimal asymmetric UQCM was independently proposed by Niu and Griffiths33, Bužek et al34 and Cerf35. Though their formalisms are slightly different, the results are exactly the same. For the sake of convenience, we adopt the quantum circuit approach developed by Bužek. The transformation of asymmetric UQCM can be written in the following form
![]() |
where
and
. The parameters a and b are real, and satisfy the normalization condition a2 + b2 + ab = 1. With the transformation (9) in mind, it is now an easy exercise to verify that the two different copies of the original state
are
![]() |
![]() |
From the point of geometry, the asymmetric UQCM shrinks the original Bloch vector by two different shrinking factors (ηA = 1 − b2, ηB = 1 − a2) regardless of its direction. As special cases, we can see that if ηA = 1, then no information has been transferred from the original system, while, if ηB = 1, then all of the information in system A has been transferred to system B. In addition, if ηA = ηB = 2/3 (i.e.,
), then it reduces to the symmetric UQCM case. Obviously, the two shrinking factors ηA and ηB are related, and should satisfy the no-cloning inequality30,34
![]() |
which is an ellipse in the (ηA, ηB) space. An optimal asymmetric UQCM is characterized by a point (ηA, ηB) which lies on the boundary of this ellipse.
According to equation (6), when d = 2, the QFI of parameter θ is proportional to η2. Immediately, the QFIs are
![]() |
Here and henceforth we omit the subscript θk for brevity since we restrict our discussions to the single-parameter scenario. Remarkably, a trade-off relation exists for the two QFIs: if one QFI is large, correspondingly another QFI will become small. Combining equations (12) and (13), the trade-off relation of QFI is expressed as
![]() |
This trade-off tells us that even we only concern cloning the information of a particular parameter encoded in quantum states, two close-to-perfect copies cannot be achieved simultaneously, imposed by quantum mechanics. An intuitive presentation of this trade-off relation is shown in Fig. 2(b) (dashed line).
Figure 2. Trade-off relations for 2-dimensional asymmetric UQCM and PQCM.

(a) Fidelity (b) QFI. The dotted lines denote the symmetric cases.
In the following, we consider the distribution of QFI in the asymmetric UQCM. As we defined in equation (8). the distributability of QFI is measured by
![]() |
Therefore, the larger
is, the more QFI of the relevant parameter has been distributed to the two copies. We find that the asymmetric UQCM always performs better than symmetric UQCM in distributing QFI, which means
![]() |
This can be proved by the method of Lagrange multiplier. One will find three extreme points: (ηA = 0, ηB = 1), (ηA = ηB = 2/3) and (ηA = 1, ηB = 0). It is easy to verify that
is the minimum value.
In order to show the difference of distributability between QFI and fidelity, we also write the corresponding fidelities defined as FA(B) = 〈ψ|ρA(B)|ψ〉
![]() |
According to equation (7), we adopt F = FA + FB to qualify the capability of asymmetric UQCM in distributing the entire quantum state. Figure 1 shows the results of asymmetric 2-dimensional UQCM. It is remarkable that, from the perspective of QFI, the asymmetric UQCM is always works better than symmetric UQCM, which is a sharp contrast to the result of fidelity31, where the symmetric UQCM is always optimal.
Figure 1. Results of asymmetric 2-dimensional UQCM.

(a) Fidelities as a function of shrinking factor ηA and (b) QFIs as a function of ηA.
Asymmetric 2-dimensional PQCM
In the context of quantum cryptography3, the UQCM studied in the previous subsection might be optimal if the detail setup of QKD protocol is not specified. But it may not be optimal for the quantum states involved in a special QKD protocol. Practically, it is possible that we already know a priori information of the input states. Thus, a state-dependent cloning machine would perform better than UQCM. The best-known example of state-dependent cloning machine is the so-called PQCM. The symmetric PQCM was firstly proposed by Bruß et al for the equatorial qubit state10 and then an asymmetric version was demonstrated by Niu and Griffiths9. Recently, the asymmetric PQCM has been experimentally realized using NMR36 and fiber optics37.
Previous studies suggest that the equatorial qubit state PQCM can be realized by both economic9 and non-economic10,38 transformations. One can check that both economic and non-economic methods achieve the same distributability of QFI. In the text we discuss the non-economic case as it can be directly generalized to d-dimensional PQCM. The transformation of asymmetric PQCM can be written in the following form
![]() |
with i, j = 0, 1 and i ≠ j. a2 + b2 + c2 = 1 is the normalization condition. |Σi〉R is a set of orthogonal normalized ancillary state. For the equatorial qubit-state
, the output states have the form as
![]() |
![]() |
Then, the shrinking factors are ηA = 2ac, ηB = 2bc. Using the normalization condition, the shrinking factors can be simplified as
![]() |
![]() |
As is seen, in the scenario of asymmetric PQCM, there are two free parameters to be optimized. Therefore, an optimal asymmetric PQCM is defined as the following: if we fix the quality of one copy, then the other copy is optimal with the highest quality. From the equations (21) and (22), one can eliminate b and obtain the trade-off relation between ηA and ηB
![]() |
Assuming ηA is constant, the optimal value of
can be found, and the optimal trade-off relation reduces to
![]() |
The corresponding QFIs are
![]() |
In the symmetric case, we have
. Remarkably, according to equation (14), one can immediately find the inequality
![]() |
The meanings of above equation are twofold. On one hand, it indicates that asymmetric PQCM performs better than asymmetric UQCM in distributing QFI by virtue of the known information. This result is essentially in agreement with that of fidelity. To be clear, we plot the trade-off relations between A's fidelity (QFI) and B's fidelity (QFI) for both asymmetric UQCM and PQCM in Fig. 2. It is evident that the lines of asymmetric PQCM are always above those of asymmetric UQCM, except for the start points and end points. On the other hand, it should be noted that, for the 2-dimensional PQCM, the asymmetric case is as good as the symmetric case on the capability of distributing QFI, while the later always performs better than the former with the measure of fidelity. The reason is that the fidelity FB as a function of FA is strictly concave, but the QFI
as a function of
is convex. This results in the sum of two fidelities and QFIs achieving its maximal and minimal value, respectively, in the symmetric case.
QFI distribution for d-dimensional cloning
Until now, we have restricted our discussions to the 2-dimensional cloning. Although all quantum information tasks can be performed by using only two-level systems, it has been recently recognized that higher-dimensional quantum states (i.e., qudits) can offer significant advantages for improving the security of quantum cryptographic protocols39, achieving higher information-density coding40,41 and reducing the required resources for quantum computation and simulation42,43.
Based on these considerations, it would be essential to extend above discussions to d-dimensional cloning. One may think the results will be trivial and analogous conclusions will be obtained as well as the 2-dimensional cloning. However, as we will show below, there are some similarities between them, but more importantly, significant differences will appear with increasing dimensionality d.
Asymmetric d-dimensional UQCM
The optimal asymmetric d-dimensional UQCM was proposed by Cerf30 and Braunstein et al44. For a d-dimensional quantum system, the corresponding asymmetric UQCM can be generalized directly from the transformation (9) with |Φ+〉 and |+〉R instead defined in higher-dimension,
, and
respectively. Hence, the normalization condition now reads a2 + b2 + 2ab/d = 1. The output reduced density matrices are written in the form of equation (4)
![]() |
![]() |
with shrinking factors ηA = 1 − b2 and ηB = 1 − a2. In particular, if a2 = b2 = d/(2d + 2), we recover the results of symmetric UQCM. Similarly, we can obtain a trade-off relation between two shrinking factors ηA and ηB.
![]() |
which corresponds to a set of ellipses in the space of shrinking factors that their eccentricities vary with dimensionality. It should be noted that in the infinite dimensional case, the corresponding ellipse shrinks to the line ηA + ηB = 1.
Now we turn to the calculation of QFI. Assuming the input state is a d-dimensional equatorial state, then the QFIs of output states (27) and (28) are obtained directly by (6).
![]() |
![]() |
The tradeoff relation between
and
can be derived by substituting
![]() |
into (29) with X = A, B, but it is too complicated to present in the text. Nevertheless, there is no doubt that one cannot gain, at the same time, two copies whose QFIs are above values allowed by the trade-off relation.
We are concerned with whether the d-dimensional asymmetric UQCM still performs better than symmetric UQCM in distributing QFI. Against all expectations, the results become subtle with increasing d. Unlike the 2-dimensional case where asymmetric UQCM is always better than symmetric UQCM, the d-dimensional asymmetric UQCM may be worse than symmetric UQCM under certain conditions. As shown in Fig. 3(a), we find the sum of two fidelities still reaches its largest value at the point of ηA = ηB = (d + 2)/(2d + 2), which means, by the measure of fidelity, the symmetric UQCM will optimally copy the state regardless of the dimension31. However, Figure 3(b) shows that the distributability of QFI achieves its smallest value at the point of ηA = ηB when d = 3, 10, while it is interesting to note that the point of ηA = ηB becomes a local maximum point when d = 30. Namely, the asymmetric UQCM is no longer always better than symmetric UQCM with increasing d. The reason is that even though QFI is a monotonically function of the shrinking factor, it is not a linear function of it. This sophisticated relation between
and η reveals above interesting results.
Figure 3. Results of asymmetric d-dimensional UQCM.

(a) Fidelity and (b) QFI as a function of ηA for d = 3, 10, 20, 30, respectively from top to down. The red circles denote the corresponding results of symmetric UQCM, and the insertion is magnified plot of d = 30.
Naturally, we start wondering when the asymmetric UQCM may become worse than symmetric UQCM. The numerical simulation shows that when d ≤ 18, the ηA of global minimal
is equal to the symmetric case. While a bifurcation appears at d = 18, which means ηA = (d + 2)/(2d + 2) is no longer the global point of minimal
, as shown in Fig. 4. Mathematically, we can understand the bifurcation as follows:
as a function of ηA has three extreme points which are physically allowed when d ≤ 18, and ηA = ηB is the point of global minima. When d > 18, it has five extreme points, as seen from the insertion in Fig. 3b. Moreover, ηA = ηB is no longer the global minima but a local maximum point. Thus, the symmetric UQCM may outperform the asymmetric case. However, it is hard to understand why the critical point is d = 18 in physical, we conjecture this critical point is related to the Hilbert space structure of qudits. We leave this as an open question and the further study is underway.
Figure 4. ηA of minimal
as a function of dimensionality d.

Asymmetric d-dimensional PQCM
The generalization of asymmetric PQCM to d-dimensional is much more difficult, and in particular, it is too complicated to present an analytical trade-off relation between two copies. However, with the aid of numerical simulations, we can confirm two main results about the distribution of QFI in asymmetric d-dimensional PQCM: (i) PQCM gains an advantage over UQCM by utilizing the priori information, and (ii) a sudden change of the point of minimum also exists in asymmetric PQCM with increasing d.
The cloning transformation of asymmetric d-dimensional PQCM can be introduced45
![]() |
with the normalization condition (d − 1)(a2 + b2) + c2 = 1. Given the input state in the form of (5), then, the shrinking factors of the output copies read as
![]() |
![]() |
where we have use the normalization condition to eliminate the parameter c. Similar to the 2-dimensional case, here we again need to optimize two free tuning parameters. Therefore, in the same way, an optimal asymmetric PQCM is defined by optimizing ηB as large as possible when ηA is fixed, and vice versa. By eliminating the parameter b, we can obtain the trade-off relation (not the optimal one)
![]() |
The optimal trade-off relation need to be further optimized by choosing a proper value of aoptimal to make the largest ηB. Unfortunately, there is not a closed analytical form of aoptimal for any dimensionality d. However, by simple numerical simulations, we find that asymmetric PQCM indeed always performs better than asymmetric UQCM in distributing QFI as shown in Fig. 5(a). When the dimensionality d is large (e.g., d = 20), it should be noted that the advantage of PQCM over UQCM almost disappears. Moreover, similar to the case of asymmetric d-dimensional UQCM, the asymmetric d-dimensional PQCM is not always better than the symmetric case for any dimensionality d. Figure 5(b) shows that a bifurcation of the point of global minimum also occurs at d = 18. This phenomena stresses that the critical point appearing at d = 18 is not in any sense accidental. The physical reason behind this is worth further study.
Figure 5. Results of asymmetric d-dimensional PQCM.

(a) Trade-off relations between
and
for d-dimensional asymmetric UQCM (dashed lines) and PQCM (solid lines) with d = 3, 10, 20, 30, respectively from top to bottom. The insertion is magnified plot of d = 10. Note that when d = 20 and 30, the two lines overlap so greatly that cannot be resolved. (b) ηA of minimal
as a function of dimensionality d.
Discussions
In this paper, we have investigated the distribution of QFI in asymmetric cloning machines which produce two nonidentical copies. In particular, we have elucidated four questions as we mentioned before. Here, we summarize our results by replying these questions. (i) The answer is YES. It is definite that improving the QFI in one copy results in decreasing the QFI of the other copy, and the trade-off relation can be obtained analytically except for the asymmetric d-dimensional PQCM. (ii) The answer is also YES. Thanks to a priori knowledge of the input states, PQCM always performs better than UQCM in distributing QFI. (iii) The answer is not so straightforward. It should be divided into two categories: for 2-dimensional cloning, asymmetric cloning always outperforms symmetric cloning on the distribution of QFI; While for the d-dimensional cloning case, the above conclusion only holds when d ≤ 18 and becomes invalid when d > 18, i.e., the asymmetric cloning is not always better than symmetric cloning for any dimensionality. (iv) The most significant difference between fidelity and QFI is that fidelity is a linear function of the shrinking factor while QFI is nonlinear. This leads to the counterintuitive result that symmetric cloning is always optimal from the perspective of fidelity, but asymmetric cloning usually works better than symmetric cloning on the distribution of QFI, except for some particular situations (e.g., when d = 30 and ηA = 0.25, see the insertion in Fig. 3b).
In view of these findings, we note that there are some problems in need of further clarifications. The first important issue is to understand why does the critical point appear at d = 18, not other numbers. Secondly, we should realize that we have confined our discussion to the distributability of single parameter in asymmetric cloning machines. However, from both theoretical and practical points of view, it seems to be interesting to examine the problem of multi-parameter distribution in asymmetric quantum cloning. Intuitively, there would be a trade-off relation of the quantum Fisher information matrices between two nonidentical copies. These would be very intriguing topics that need further studies.
Methods
Here, we give the details of the derivation of equation (6) from equations (4) and (5). To be clear, we can rewrite the equation (4) as
![]() |
Note that the eigenvalues of ρ consists of only two categories: λ0 = [(d − 1)η + 1]/d, and λn = (1 − η)/d with 1 ≤ n ≤ d − 1. Obviously, |ψ0〉 = |ψ〉 is an eigenstate of ρ. Thus the problem is converted to construct a complete orthogonal set (containing d − 1 bases) of the operator
which is also orthogonal to |ψ〉 at the same time. The procedure can be divided into three steps: (i) finding d − 1 bases of
which are orthogonal to |ψ〉; (ii) using the Gram-Schmidt procedure to orthogonalize them and (iii) the normalization.
Step (i) Intuitively, the d − 1 bases which are orthogonal to |ψ〉 can be written as
![]() |
where 1 ≤ n ≤ d − 1.
Step (ii) According to the procedure of Gram-Schmidt orthonormalization, one can construct a set of orthogonal but un-normalized bases:
![]() |
Step (iii) Notice that
, we finally obtain the d − 1 orthogonal and normalized bases of the operator
![]() |
which are also orthogonal to |ψ〉.
By this time, we have diagonalized the state (4) in the bases {|ψ〉, |ψ1〉, …, |ψn〉}, and then the QFI can be calculated by equation (2). Note that all the parameters θk is equally weighted due to the symmetry of |ψ〉, thus the QFI of any parameter is the same. Furthermore, we observe that the part of classical Fisher information vanishes since the probability distribution is independent of parameters θk, if measured in this bases. The remaining work is to determine the last two terms in equation (2). After lots of complicated but straightforward calculations, we obtain the QFI of any parameter θk
![]() |
Author Contributions
X.X. and Y.Y. proposed the idea and carried out the calculations under the guidance of X.G.W. L.M.Z. made some numerical simulations and plotted the figures. X.X wrote the paper. All authors discussed the results and commented on the manuscript.
Acknowledgments
The authors are supported by the National Natural Science Foundation of China under Grants No. 11247006, 11025527 and 11475146, the National 973 program under Grants No. 2012CB921602, and the China Postdoctoral Science Foundation under Grant No. 2014M550598.
References
- Heisenberg W. Über den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik. Z. Phys. 43, 172–198 (1927). [Google Scholar]
- Wootters W. K. & Zurek W. H. A single quantum cannot be cloned. Nature 299, 802–803 (1982). [Google Scholar]
- Gisin N., Ribordy G., Tittel W. & Zbinden H. Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002). [Google Scholar]
- Scarani V., Iblisdir S. & Gisin N. Quantum cloning. Rev. Mod. Phys. 77, 1225–1256 (2002). [Google Scholar]
- Fan H. et al. Quantum cloning machines and the applications. Phys. Rep. 544, 241–322 (2014). [Google Scholar]
- Bužek V. & Hillery M. Quantum copying: Beyond the no-cloning theorem. Phys. Rev. A 54, 1844–1852 (1996). [DOI] [PubMed] [Google Scholar]
- Gisin N. & Massar S. Optimal quantum cloning machines. Phys. Rev. Lett. 79, 2153–2156 (1997). [Google Scholar]
- Bruß D. et al. Optimal universal and state-dependent quantum cloning. Phys. Rev. A 57, 2368–2378 (1998). [Google Scholar]
- Niu C. S. & Griffiths R. B. Two-qubit copying machine for economical quantum eavesdropping. Phys. Rev. A 60, 2764–2776 (1999). [Google Scholar]
- Bruß D., Cinchetti M., D'Ariano G. M. & Macchiavello C. Phase-covariant quantum cloning. Phys. Rev. A 62, 012302 (2000). [Google Scholar]
- Fan H., Imai H., Matsumoto K. & Wang X. B. Phase-covariant quantum cloning of qudits. Phys. Rev. A 67, 022317 (2003). [Google Scholar]
- Du J. F. et al. Experimental quantum cloning with prior partial information. Phys. Rev. Lett. 94, 040505 (2005). [DOI] [PubMed] [Google Scholar]
- Giovannetti V., Lloyd S. & Maccone L. Quantum metrology. Phys. Rev. Lett. 96, 010401 (2006). [DOI] [PubMed] [Google Scholar]
- Giovannetti V., Lloyd S. & Maccone L. Advances in quantum metrology. Nature Photon. 5, 222–229 (2011). [Google Scholar]
- Helstrom C. W. Quantum Detection and Estimation Theory (Academic, New York, 1976). [Google Scholar]
- Lu X. M., Sun Z., Wang X., Luo S. & Oh C. H. Broadcasting quantum Fisher information. Phys. Rev. A 87, 050302 (2013). [Google Scholar]
- Song H., Luo S., Li N. & Chang L. Comparing quantum cloning: A Fisher-information perspective. Phys. Rev. A 88, 042121 (2013). [Google Scholar]
- Yao Y., Ge L., Xiao X., Wang X. G. & Sun C. P. Multiple phase estimation in quantum cloning machines. Phys. Rev. A 90, 022327 (2014). [Google Scholar]
- Fuchs C. A., Gisin N., Griffiths R. B., Niu C. S. & Peres A. Optimal eavesdropping in quantum cryptography I. Information bound and optimal strategy. Phys. Rev. A 56, 1163–1172 (1997). [Google Scholar]
- Bruß D. & Macchiavello C. Optimal eavesdropping in cryptography with three-dimensional quantum states. Phys. Rev. Lett. 88, 127901 (2002). [DOI] [PubMed] [Google Scholar]
- Cerf N. J., Bourennane M., Karlsson A. & Gisin N. Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88, 127902 (2002). [DOI] [PubMed] [Google Scholar]
- Xiong Z. X. et al. General quantum key distribution in higher dimension. Phys. Rev. A 85, 012334 (2012). [Google Scholar]
- Holevo A. S. Probabilistic and Statistical Aspects of Quantum Theory (North-Holland, Amsterdam, 1982). [Google Scholar]
- Braunstein S. L. & Caves C. M. Statistical distance and the geometry of quantum states. Phys. Rev. Lett. 72, 3439–3442 (1994). [DOI] [PubMed] [Google Scholar]
- Knysh S., Smelyanskiy V. N. & Durkin G. A. Scaling laws for precision in quantum interferometry and the bifurcation landscape of the optimal state. Phys. Rev. A 83, 021804 (2011). [Google Scholar]
- Liu J., Jing X. & Wang X. Phase-matching condition for enhancement of phase sensitivity in quantum metrology. Phys. Rev. A 88, 042316 (2013). [Google Scholar]
- Zhang Y. M., Li X. W., Yang W. & Jin G. R. Quantum Fisher information of entangled coherent states in the presence of photon loss. Phys. Rev. A 88, 043832 (2013). [Google Scholar]
- Tóth G. Multipartite entanglement and high-precision metrology. Phys. Rev. A 85, 022322 (2012). [Google Scholar]
- Bennett C. H. & Brassard G. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference of Computer, Systems and Signal Processing, Bangalore, India, pp. 175–179 (Dec10–121984). [Google Scholar]
- Cerf N. J. Asymmetric quantum cloning in any dimension. J. Mod. Opt. 47, 187–209 (2000). [Google Scholar]
- Ghiu I. Asymmetric quantum telecloning of d-level systems and broadcasting of entanglement to different locations using the “many-to-many” communication protocol. Phys. Rev. A 67, 012323 (2003). [Google Scholar]
- Bures D. An extension of Kakutani's theorem on infinite product measures to the tensor product of semifinite W*-algebras. Trans. Am. Math. Soc. 135, 199–212 (1969). [Google Scholar]
- Niu C. S. & Griffiths R. B. Optimal copying of one quantum bit. Phys. Rev. A 58, 4377–4393 (1998). [Google Scholar]
- Bužek V., Hillery M. & Bednik R. Controlling the flow of information in quantum cloners. Acta Phys. Slovaca 48, 177 (1998). [Google Scholar]
- Cerf N. J. Pauli cloning of a quantum bit. Phys. Rev. Lett. 84, 4497–4500 (2000). [DOI] [PubMed] [Google Scholar]
- Chen H., Zhou X., Suter D. & Du J. Experimental realization of 1 → 2 asymmetric phase-covariant quantum cloning. Phys. Rev. A 75, 012317 (2007). [Google Scholar]
- Bartušková L. et al. Fiber-optics implementation of an asymmetric phase-covariant quantum cloner. Phys. Rev. Lett. 99, 120505 (2007). [DOI] [PubMed] [Google Scholar]
- Griffiths R. B. & Niu C. S. Optimal eavesdropping in quantum cryptography II. A quantum circuit. Phys. Rev. A 56, 1173–1176 (1997). [Google Scholar]
- Nikolopoulos G. M. & Alber G. Security bound of two-basis quantum-key-distribution protocols using qudits. Phys. Rev. A 72, 032320 (2005). [Google Scholar]
- Durt T., Kaszlikowski D., Chen J. L. & Kwek L. C. Security of quantum key distributions with entangled qudits. Phys. Rev. A 69, 032313 (2004). [Google Scholar]
- Ding D. S., Zhou Z. Y., Shi B. S. & Guo G. C. Single-photon-level quantum image memory based on cold atomic ensembles. Nat. Commun. 4, 2527 (2013). [DOI] [PMC free article] [PubMed] [Google Scholar]
- Lanyon B. P. et al. Simplifying quantum logic using higher-dimensional Hilbert spaces. Nature Phys. 5, 134–140 (2009). [Google Scholar]
- Neeley M. et al. Emulation of a quantum spin with a superconducting phase qudit. Science, 325, 722–725 (2009). [DOI] [PubMed] [Google Scholar]
- Braunstein S. L., Bužek V. & Hillery M. Quantum-information distributors: Quantum network for symmetric and asymmetric cloning in arbitrary dimension and continuous limit. Phys. Rev. A 63, 052313 (2001). [Google Scholar]
- Rezakhani A. T., Siadatnejad S. & Ghaderi A. H. Separability in asymmetric phase-covariant cloning. Phys. Lett. A 336, 278–289 (2005). [Google Scholar]









































