Back to News
quantum-computing

Quantum Computing Gets Its First Real Backup System - ScienceBlog.com

Google News – Quantum Computing
Loading...
4 min read
0 likes
⚡ Quantum Brief
University of Waterloo researchers Achim Kempf and Koji Yamaguchi developed the first quantum backup system, circumventing the no-cloning theorem by creating encrypted copies of quantum states that remain inaccessible until decrypted. The method produces "encrypted clones"—scrambled, noise-like copies of quantum information that require a one-time-use entanglement key to reconstruct the original state, ensuring no usable duplicates exist simultaneously. Decryption destroys the key, preventing reuse and complying with quantum physics laws, while allowing scalable backup creation with minimal additional computational overhead for multiple copies. Applications extend to quantum networks, radar, and distributed cloud systems, enabling redundancy in noisy environments where only one intact copy is needed for full recovery. The theoretical breakthrough challenges the assumption of quantum fragility, though hardware implementation awaits advances in quantum control and error correction.
Quantum Computing Gets Its First Real Backup System - ScienceBlog.com

Summarize this article with:

Data loss is frustrating on a laptop. On a quantum computer, it has always been considered physics-enforced and permanent. Researchers at the University of Waterloo have now developed a method that finally allows quantum information to be backed up without violating the fundamental laws that govern the quantum world. The advance, published in Physical Review Letters, centers on a decades-old problem: the no-cloning theorem. This rule states that you cannot make a perfect copy of an unknown quantum state. Any attempt to duplicate a qubit inevitably destroys the original. Classical computers sidestep this easily, copying files millions of times per second. Quantum systems have had no such luxury, forcing engineers to accept that if a qubit fails, the information vanishes.Discover moreScientist Networking PlatformScience Topic GuidesOnline science coursesScience News SubscriptionScience museum membershipsScience News AppMicroscopesBlogging Platform ScienceQuantum computing booksScience writing workshops Physicists Achim Kempf and Koji Yamaguchi approached the constraint from an unexpected angle. Rather than trying to copy quantum information directly, they asked whether it could be distributed in encrypted fragments that only become meaningful when reassembled. The answer turned out to be yes, but with a critical limitation: the decryption process consumes itself. Scrambled copies that work exactly once The technique creates what the researchers call encrypted clones. Each clone contains a complete imprint of the original quantum state, but in a maximally scrambled form. To anyone examining them, these copies look like meaningless noise. The actual information is locked. The key lives in a separate set of auxiliary qubits that remain entangled with the encrypted copies. When a user needs to recover the data, they combine one encrypted copy with this key. The original quantum state emerges perfectly intact. However, the key is destroyed in the process and cannot unlock another copy. This one-time-use feature is what allows the method to respect the no-cloning theorem. At no point does usable quantum information exist in multiple places simultaneously. The copies are genuine duplicates, but they remain inaccessible until the moment one is decrypted, which renders the others permanently unusable.Discover moreScience Content MarketingSciencesScience Blog NetworkDaily Science NewsletterScientist Directory ServiceEducational Science ResourcesMathematics Problem SolverScience Career CoachingBrain training appsScientific journal access “It turns out that if we encrypt the quantum information as we copy it, we can make as many copies as we like. This method is able to bypass the no-cloning theorem because after one picks and decrypts one of the encrypted copies, the decryption key automatically expires, that is the decryption key is a one-time-use key.” – Dr. Koji Yamaguchi, Research Assistant Professor Kempf and Yamaguchi demonstrated that their protocol scales efficiently. Creating ten encrypted copies requires only marginally more quantum gate operations than creating two, making it practical for large-scale quantum infrastructure. The encrypted copies can be stored on different servers, even in separate geographic locations. If one server fails, the owner still holds the master key that can unlock any surviving copy. Infrastructure that was previously impossible The implications extend beyond simple backups. Quantum networks could distribute encrypted copies across noisy channels, knowing that only one needs to arrive intact for full recovery. Quantum radar systems might use the technique to send signal photons into the field while keeping noise qubits at home, helping identify returning signals with greater precision. The method also suggests a path toward distributed quantum clouds. In classical computing, redundancy is trivial. Quantum systems have operated under the assumption that fragility is unavoidable. This work shows that assumption was incomplete. Quantum information does not have to live on a single thread. With the right kind of encryption, it can finally have a safety net.Discover moreQuantum computing booksScience themed apparelScience experiment kitsTechnology Ethics ConsultingBlogging Platform ScienceScience magazines subscriptionsSpace exploration merchandiseScientist Networking PlatformScience Career CoachingScientific journal access For now, the work remains theoretical. Building hardware capable of implementing encrypted cloning at scale will require significant advances in quantum control and error correction. But the result changes what is considered possible. Quantum information is still delicate, but it no longer has to be irreplaceable.

Physical Review Letters: 10.1103/PhysRevLett.134.010201 There's no paywall here If our reporting has informed or inspired you, please consider making a donation. Every contribution, no matter the size, empowers us to continue delivering accurate, engaging, and trustworthy science and medical news. Independent journalism requires time, effort, and resources—your support ensures we can keep uncovering the stories that matter most to you. Join us in making knowledge accessible and impactful. Thank you for standing with us!

Read Original

Tags

quantum-computing
quantum-hardware

Source Information

Source: Google News – Quantum Computing