Table of contents |

2 Consequences 3 Imperfect Cloning |

Suppose the state of a quantum system A is a qubit, which we wish to copy. The state can be written (see bra-ket notation) as

- .

- .

- .

The no cloning theorem prevents us from using classical error correction techniques on quantum states. For example, we cannot create backup copies of a state in the middle of a quantum computation, and use them to correct subsequent errors. Error correction is vital for practical quantum computing, and for some time this was thought to be a fatal limitation. In 1995, Shor and Steane revived the prospects of quantum computing by independently devising the first quantum error correcting codes, which circumvent the no cloning theorem.

In contrast, the no cloning theorem is a vital ingredient in quantum cryptography, as it forbids eavesdroppers from creating copies of a transmitted quantum cryptographic key.

More fundamentally, the no cloning theorem prevents superluminal communication via quantum entanglement. Consider the EPR thought experiment, and suppose quantum states could be cloned. Alice could send bits to Bob in the following way:

If Alice wishes to transmit a '0', she measures the spin of her electron in the **z** direction, collapsing Bob's state to either |**z**+>_{B} or |**z**->_{B}. If Alice wishes to transmit a '1', she measures the spin of her electron in the **x** direction, collapsing Bob's state to either |**x**+>_{B} or |**x**->_{B}. Bob creates many copies of his electron's state, and measures the spin of each copy in the **z** direction. If Alice transmitted a '0', all his measurements will produce the same result; otherwise, his measurements will be split evenly between +1/2 and -1/2. This would allow Alice and Bob to communicate across space-like separations, potentially violating causality.

Even though it is impossible to make perfect copies of an unknown quantum state, it is possible to produce imperfect copies. This can be done by coupling a larger auxiliary system to the system that is to be cloned, and applying a unitary transformation to the combined system. If the unitary transformation is chosen correctly, several components of the combined system will evolve into approximate copies of the original system. Imperfect cloning can be used as an eavesdropping attack on quantum cryptography protocols, among other uses in quantum information science. Imperfect cloning is further discussed in the article quantum error correction.

**References**

- Wootters, W.K. and Zurek, W.H.:
*A Single Quantum Cannot be Clone*. Nature 299 (1982), pp. 802-803 - Dieks, D.:
*Communication by EPR devices*. Physics Letters A, vol 92(6) (1982), pp. 271-272 - Buzek, V. and Hillery, M. : "Quantum cloning". Physics World 14 (11) (2001), pp. 25-29