Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints...Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints,notably the no-cloning theorem,which prohibits the exact duplication of unknown quantum states and has profound implications for cryptography,secure communication,and error correction.While existing quantum circuit representations implicitly honor such constraints,they lack formal mechanisms for early-stage verification in software design.Addressing this constraint at the design phase is essential to ensure the correctness and reliability of quantum software.This paper presents a formal metamodeling framework using UML-style notation and and Object Constraint Language(OCL)to systematically capture and enforce the no-cloning theorem within quantum software models.The proposed metamodel formalizes key quantum concepts—such as entanglement and teleportation—and encodes enforceable invariants that reflect core quantum mechanical laws.The framework’s effectiveness is validated by analyzing two critical edge cases—conditional copying with CNOT gates and quantum teleportation—through instance model evaluations.These cases demonstrate that the metamodel can capture nuanced scenarios that are often mistaken as violations of the no-cloning theorem but are proven compliant under formal analysis.Thus,these serve as constructive validations that demonstrate the metamodel’s expressiveness and correctness in representing operations that may appear to challenge the no-cloning theorem but,upon rigorous analysis,are shown to comply with it.The approach supports early detection of conceptual design errors,promoting correctness prior to implementation.The framework’s extensibility is also demonstrated by modeling projective measurement,further reinforcing its applicability to broader quantum software engineering tasks.By integrating the rigor of metamodeling with fundamental quantum mechanical principles,this work provides a structured,model-driven approach that enables traditional software engineers to address quantum computing challenges.It offers practical insights into embedding quantum correctness at the modeling level and advances the development of reliable,error-resilient quantum software systems.展开更多
Quantum two-way time transfer(Q-TWTT)leveraging energy-time entangled biphotons has achieved sub-picosecond stability but faces fundamental distance limitations due to the no-cloning theorem’s restriction on quantum ...Quantum two-way time transfer(Q-TWTT)leveraging energy-time entangled biphotons has achieved sub-picosecond stability but faces fundamental distance limitations due to the no-cloning theorem’s restriction on quantum amplification.To overcome this challenge,we propose a cascaded Q-TWTT architecture employing relay stations that generate and distribute new energy-time entangled biphotons after each transmission segment.Theoretical modeling reveals sublinear standard deviation growth(merely\sqrt{N}\times increase for N×equidistant segments),enabling preservation of sub-picosecond stability over extended distances.We experimentally validate this approach using a three-station cascaded configuration over 2×100 km fiber segments,demonstrating strong agreement with theory.Utilizing independent Rb clocks at end and relay stations with online frequency skew correction,we achieve time stabilities of 3.82 ps at 10 s and 0.39 ps at 5120 s.The consistency in long-term stability between cascaded and single-segment configurations confirms high-precision preservation across modular quantum networks.This work establishes a framework for long-distance quantum time transfer that bypasses the no-cloning barrier,providing a foundation for future quantum-network timing infrastructure.展开更多
A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys...A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.展开更多
A simplified version of the quantum teleportation protocol is presented in here. Its experimental confirmation will have deep implications for a better understanding of Quantum Entanglement with a particular projectio...A simplified version of the quantum teleportation protocol is presented in here. Its experimental confirmation will have deep implications for a better understanding of Quantum Entanglement with a particular projection on Quantum Communications.展开更多
It seems there is a large gap between quantum cloning and classical duplication since quantum mechanics forbid perfect copies of unknown quantum states. In this paper, we prove that a classical duplication process can...It seems there is a large gap between quantum cloning and classical duplication since quantum mechanics forbid perfect copies of unknown quantum states. In this paper, we prove that a classical duplication process can be realized by using a universal quantum cloning machine(QCM). A classical bit is encoded not on a single quantum state, but on a large number of single identical quantum states. Errors are inevitable when copying these identical quantum states due to the quantum no-cloning theorem. When a small part of errors are ignored, i.e., errors as the minority are automatically corrected by the majority, the fidelity of duplicated copies of classical information will approach unity infinitely. In this way, the classical bits can be duplicated precisely with a universal QCM, which presents a natural transition from quantum cloning to classical duplication. The implement of classical duplication by using QCM shines new lights on the universality of quantum mechanics.展开更多
文摘Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems.However,it must also adhere to critical quantum constraints,notably the no-cloning theorem,which prohibits the exact duplication of unknown quantum states and has profound implications for cryptography,secure communication,and error correction.While existing quantum circuit representations implicitly honor such constraints,they lack formal mechanisms for early-stage verification in software design.Addressing this constraint at the design phase is essential to ensure the correctness and reliability of quantum software.This paper presents a formal metamodeling framework using UML-style notation and and Object Constraint Language(OCL)to systematically capture and enforce the no-cloning theorem within quantum software models.The proposed metamodel formalizes key quantum concepts—such as entanglement and teleportation—and encodes enforceable invariants that reflect core quantum mechanical laws.The framework’s effectiveness is validated by analyzing two critical edge cases—conditional copying with CNOT gates and quantum teleportation—through instance model evaluations.These cases demonstrate that the metamodel can capture nuanced scenarios that are often mistaken as violations of the no-cloning theorem but are proven compliant under formal analysis.Thus,these serve as constructive validations that demonstrate the metamodel’s expressiveness and correctness in representing operations that may appear to challenge the no-cloning theorem but,upon rigorous analysis,are shown to comply with it.The approach supports early detection of conceptual design errors,promoting correctness prior to implementation.The framework’s extensibility is also demonstrated by modeling projective measurement,further reinforcing its applicability to broader quantum software engineering tasks.By integrating the rigor of metamodeling with fundamental quantum mechanical principles,this work provides a structured,model-driven approach that enables traditional software engineers to address quantum computing challenges.It offers practical insights into embedding quantum correctness at the modeling level and advances the development of reliable,error-resilient quantum software systems.
基金supported by the National Natural Science Foundation of China(Grant Nos.12033007,12103058,12203058,and 12074309)the Youth Innovation Promotion Association of the Chinese Academy of Sciences(Grant Nos.2021408,2022413,and 2023425)the Innovation Program for Quantum Science and Technology(Grant No.2021ZD0300900).
文摘Quantum two-way time transfer(Q-TWTT)leveraging energy-time entangled biphotons has achieved sub-picosecond stability but faces fundamental distance limitations due to the no-cloning theorem’s restriction on quantum amplification.To overcome this challenge,we propose a cascaded Q-TWTT architecture employing relay stations that generate and distribute new energy-time entangled biphotons after each transmission segment.Theoretical modeling reveals sublinear standard deviation growth(merely\sqrt{N}\times increase for N×equidistant segments),enabling preservation of sub-picosecond stability over extended distances.We experimentally validate this approach using a three-station cascaded configuration over 2×100 km fiber segments,demonstrating strong agreement with theory.Utilizing independent Rb clocks at end and relay stations with online frequency skew correction,we achieve time stabilities of 3.82 ps at 10 s and 0.39 ps at 5120 s.The consistency in long-term stability between cascaded and single-segment configurations confirms high-precision preservation across modular quantum networks.This work establishes a framework for long-distance quantum time transfer that bypasses the no-cloning barrier,providing a foundation for future quantum-network timing infrastructure.
文摘A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.
文摘A simplified version of the quantum teleportation protocol is presented in here. Its experimental confirmation will have deep implications for a better understanding of Quantum Entanglement with a particular projection on Quantum Communications.
基金supported by the National Natural Science Foundation of China(Grant Nos.11725524,and 61471356)
文摘It seems there is a large gap between quantum cloning and classical duplication since quantum mechanics forbid perfect copies of unknown quantum states. In this paper, we prove that a classical duplication process can be realized by using a universal quantum cloning machine(QCM). A classical bit is encoded not on a single quantum state, but on a large number of single identical quantum states. Errors are inevitable when copying these identical quantum states due to the quantum no-cloning theorem. When a small part of errors are ignored, i.e., errors as the minority are automatically corrected by the majority, the fidelity of duplicated copies of classical information will approach unity infinitely. In this way, the classical bits can be duplicated precisely with a universal QCM, which presents a natural transition from quantum cloning to classical duplication. The implement of classical duplication by using QCM shines new lights on the universality of quantum mechanics.