Encrypted Cloning and the Exact Boundary of the No-Cloning Theorem

Redundancy without replication in quantum information processing

essay
quantum computing
🇬🇧
The No-Cloning Theorem is a foundational constraint of quantum mechanics, prohibiting the deterministic duplication of arbitrary unknown quantum states. This limitation has profound consequences for quantum computing, shaping how information can be stored, transmitted, protected, and recovered. A recent Physical Review Letters paper, Encrypted Qubits Can Be Cloned, introduces a protocol that appears, at first glance, to challenge this constraint by allowing multiple “clones” of a quantum state to exist simultaneously. This article provides a technical commentary on that result, clarifying why encrypted cloning does not violate the No-Cloning Theorem and instead operates precisely at its boundary. The protocol achieves redundancy by producing multiple encrypted representations of a quantum state whose reduced subsystems are information-theoretically opaque, while enforcing one-time recoverability through unitary dynamics and overlapping access structures. At no point do multiple independent plaintext copies become simultaneously accessible. By revisiting the No-Cloning Theorem from first principles and analyzing the protocol through the lens of quantum channel capacity, antidegradability, and multipartite entanglement, this commentary situates encrypted cloning within the broader landscape of quantum information primitives. It argues that encrypted cloning introduces a new systems-level capability—recoverable redundancy without replication—that expands the design space of quantum architectures without weakening any known no-go theorems. The implications for quantum storage, distributed computation, and security are discussed, highlighting how constraints imposed by unitarity can be respected while still enabling novel operational functionality.
Author
Affiliation

Antonio Montano

4M4

Published

January 16, 2026

Modified

January 16, 2026

Keywords

quantum computing, quantum information theory, no-cloning theorem, encrypted cloning, quantum encryption, unitary dynamics, quantum channel capacity, antidegradable channels, multipartite entanglement, one-time decryption, quantum storage, distributed quantum systems, quantum secret sharing, entanglement monogamy, quantum summoning, quantum error correction, quantum cryptography, information-theoretic security, quantum key management, recoverable redundancy, unitarity constraints

Introduction

In classical information theory, replication is an elementary operation. A bit string can be copied arbitrarily many times without altering its informational content or its future usability. This property is not an implementation detail but a structural feature of classical computation, and it underpins redundancy, fault tolerance, checkpointing, and distributed storage.

Quantum information does not share this property. A quantum state is not a passive container of data but a physical object whose evolution is constrained by linear, unitary dynamics. From these constraints follows the No-Cloning Theorem1: there exists no physical operation that can take an arbitrary unknown quantum state and produce two identical, independent copies of that state. This is not a technological limitation but a direct consequence of the mathematical structure of quantum mechanics.

1 See: Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802–803. DOI and Dieks, D. (1982). Communication by EPR devices. Physics Letters A, 92(6), 271–272. DOI

The No-Cloning Theorem has deep and far-reaching consequences for quantum computing. It shapes how error correction must be designed, why quantum teleportation consumes the original state, why quantum cryptography can offer information-theoretic security, and why classical notions such as backups and retries do not directly translate into the quantum domain.

The purpose of this article is to provide a technical commentary on the recent Physical Review Letters paper Encrypted Qubits Can Be Cloned2, which introduces a protocol that, at first sight, appears to challenge this foundational limitation. The paper demonstrates that it is possible to generate multiple encrypted instances of a quantum state, each of which can later be decrypted to recover the original state, but notably, only once.

2 See: Yamaguchi, K., & Kempf, A. (2026). Encrypted qubits can be cloned. Physical Review Letters, 136(1), 010801. DOI

This commentary does not treat the result as a violation or relaxation of the No-Cloning Theorem. Instead, its goal is to clarify why the protocol remains fully consistent with the theorem, to formalize the distinction between cloning states and cloning encrypted representations, and to analyze what this distinction implies for quantum computing as a discipline.

In particular, the article aims to:

  • Revisit the No-Cloning Theorem from first principles, emphasizing precisely what is forbidden and what is not.
  • Explain how the encrypted-cloning protocol avoids contradiction by enforcing one-time recoverability at the physical level.
  • Analyze the conceptual and practical implications of this result for quantum architectures, including storage, fault tolerance, and distributed quantum systems.

By framing the paper as an exploration of what becomes possible because of the no-cloning constraint rather than in spite of it, the commentary positions encrypted cloning as a new primitive that reshapes how redundancy and recovery may be approached in quantum computing, without undermining its foundational limits.

The No-Cloning Theorem revisited: what is actually forbidden

The No-Cloning Theorem is often summarized informally as quantum states cannot be copied. While this statement is directionally correct, it is imprecise in ways that matter for understanding both the theorem itself and the contribution of the encrypted-cloning protocol. To assess what the recent result does and does not change, it is necessary to restate the theorem in its exact operational meaning.

At its core, the No-Cloning Theorem is a statement about the impossibility of a universal physical process that duplicates arbitrary unknown quantum states. Formally, there exists no unitary operation, and more generally no completely positive trace-preserving map, that implements the transformation

|\psi\rangle \otimes |0\rangle \mapsto |\psi\rangle \otimes |\psi\rangle

for all possible input states |\psi\rangle.

This impossibility follows directly from two fundamental properties of quantum mechanics: linearity and the preservation of inner products under physical evolution. If such a universal cloner existed, it would necessarily preserve overlaps between states. However, duplicating states would square those overlaps, producing a contradiction unless all states were mutually orthogonal. Since arbitrary quantum states are not orthogonal in general, universal cloning is ruled out.

Several clarifications follow immediately from this formulation. First, the theorem applies only to arbitrary unknown states. If a state is known classically, it can be re-prepared as many times as desired. This is not cloning in the physical sense prohibited by the theorem, but repeated state preparation using classical information. The No-Cloning Theorem therefore constrains operations on quantum information that has not already been reduced to classical description.

Second, the theorem forbids the creation of multiple independent, simultaneously accessible perfect copies. It does not forbid all forms of correlation, redundancy, or encoding. Quantum error-correcting codes, for example, distribute logical information across many physical qubits through entanglement. None of the physical subsystems individually contains the logical state, and no operation produces two standalone instances of it. Error correction works precisely because it respects the no-cloning constraint rather than circumventing it.

Third, the theorem does not prohibit approximate cloning, probabilistic cloning, or state-dependent cloning. Each of these relaxes at least one of the theorem’s premises. Approximate cloners sacrifice fidelity, probabilistic cloners succeed only with non-unit probability, and state-dependent cloners work only on restricted sets of inputs. These constructions are well understood and do not challenge the fundamental result.

What the theorem categorically forbids is a deterministic, universal process that yields two or more perfect, reusable copies of an unknown quantum state. This distinction is critical when evaluating the claim that encrypted qubits can be cloned. The result does not assert that multiple usable instances of a quantum state are created. Instead, it demonstrates that multiple representations of a state can exist such that each representation is individually information-theoretically opaque, and such that at most one representation can ever be transformed back into the original state.

From the perspective of the No-Cloning Theorem, this is not a loophole but a compliant construction. At no point does the protocol allow two independent systems to simultaneously carry the same unknown quantum state in usable form. The constraint that only one decryption can succeed is not an external rule or software policy. It is enforced by the structure of the quantum correlations and by the unitary dynamics of the protocol itself.

Recasting the No-Cloning Theorem in these precise terms reframes the contribution of the encrypted-cloning protocol. The result does not weaken the theorem. Instead, it exploits the exact boundary of what the theorem forbids to introduce a new operational primitive: redundancy without replicability, and recoverability without reuse. This reframing is essential before turning to the protocol itself. Without it, the result appears paradoxical. With it, the result can be understood as a controlled and principled extension of how quantum information may be distributed and later recovered, fully consistent with the foundational limits of quantum mechanics.

Encrypted cloning as physical encoding, not state duplication

The central contribution of Encrypted Qubits Can Be Cloned is not the duplication of quantum states, but the construction of a unitary encoding that produces multiple encrypted representations of a quantum state, each of which can later be decrypted exactly once. The authors are explicit that what is generated are not multiple simultaneously accessible copies of an unknown quantum state, but rather redundant, indirectly accessible encrypted clones that remain fully consistent with the No-Cloning Theorem.

The protocol begins with a precise physical setup. An unknown qubit A, held by Alice, is the quantum data to be protected. In addition, Alice prepares n pairs of qubits (S_i, N_i), where each pair is initialized in a maximally entangled Bell state. The qubits S_i are designated as signal qubits, while the qubits N_i are designated as noise qubits. This initial entanglement is not a side condition; it is the mechanism that provides information-theoretic masking of the quantum state.

The encrypted cloning step consists of a single unitary operation U^{(n)}_{\mathrm{enc}} acting jointly on the plaintext qubit A and all signal qubits S_1,\dots,S_n. This unitary acts as the identity on all noise qubits N_i. As a result, no gate ever couples the plaintext qubit to the noise qubits directly. The authors stress that the noise qubits are not directly coupled to the plaintext qubit during encoding and do not individually contain accessible information about the state of A. Their role is instead to participate in the correlations that encode the quantum noise introduced by the initial entanglement and that later enable its removal during decryption.

After the encoding operation, the information content of qubit A has been distributed across the signal qubits S_i and the noise qubits through multipartite entanglement. However, each imprint is perfectly masked. The reduced state of every signal qubit is maximally mixed and therefore statistically independent of the original state of A. This property is proven explicitly and reiterated in the conclusion: each encrypted clone is perfectly encrypted in the sense that each individually is in a maximally mixed state.

At this stage, the terminology clone must be interpreted precisely. Each signal qubit is a clone only in the sense that, together with the full set of noise qubits, it contains sufficient information to reconstruct the original state. Taken alone, it contains no usable information whatsoever. There is therefore no violation of the No-Cloning Theorem at the level of accessible quantum states.

Decryption is implemented by a second unitary U^{(n)}_{\mathrm{dec}}, which acts on one chosen signal qubit S_k and all noise qubits N_1,\dots,N_n. The authors provide an explicit construction and prove that this operation recovers the original state of qubit A in qubit S_k with fidelity 1. This establishes that each encrypted clone is individually decryptable, provided the entire noise register is available.

The essential constraint appears immediately after decryption. The decryption operation consumes the recoverability of the plaintext: after decrypting one signal qubit, the joint state of the remaining signal qubits and noise qubits no longer contains recoverable information about Alice’s original state, unless the system is coherently reverted to its encoded configuration. This fact is not asserted informally but derived directly from the unitary structure of the protocol and made explicit in the paper’s discussion of consistency with the No-Cloning Theorem. As the authors state, after decoding, the state of the unused signal qubits and noise qubits is independent of Alice’s information.

This structure explains why the protocol does not permit two successful decryptions. Any attempt to decrypt a second signal qubit without reversing the first decryption would necessarily fail, because the physical correlations required for recovery no longer exist. The limitation is enforced by quantum dynamics, not by external control or measurement-based restrictions.

From a channel-theoretic perspective, the encoding map does not implement \rho \mapsto \rho \otimes \rho. Instead, it implements a map from a single-qubit system into a larger system in which multiple overlapping recovery sets exist. Each recovery set contains one signal qubit and all noise qubits. Because these sets overlap on the full noise register, they cannot be used simultaneously to recover multiple plaintext copies. The authors explicitly connect this overlap structure to consistency with both the No-Cloning Theorem and entanglement monogamy.

The result is therefore best understood as a new form of quantum redundancy without replication. It enables parallel storage, distribution, and deferred choice of recovery location, while preserving the fundamental prohibition against multiple simultaneous plaintext copies. The paper emphasizes that this paradigm enables functionality that is routine in classical systems, such as redundant off-site storage, but that is otherwise forbidden in quantum mechanics.

Why only one decryption is possible

The fact that only one encrypted clone can be decrypted is not an informal property of the protocol. It is a precise consequence of the quantum channel structure induced by the encoding unitary and of well-established results in quantum information theory. In the paper, this constraint is formalized using quantum channel capacity and antidegradability, not merely by appeal to intuition.

After encrypted cloning, Alice’s original qubit A has been mapped into a larger joint system consisting of the signal qubits S_1,\dots,S_n and the noise qubits N_1,\dots,N_n. To analyze recoverability, the authors define a family of quantum channels

\mathcal{N}^{(n)}_{A \to B}(\rho_A) \;\equiv\; \operatorname{Tr}_{\bar{B}} \!\left[ U^{(n)}_{\mathrm{enc}} \left( \rho_A \otimes \bigotimes_{i=1}^{n} \phi_{S_i N_i} \right) U^{(n)\dagger}_{\mathrm{enc}} \right].

where B denotes the subsystem that Bob chooses to access, and \bar{B} denotes its complement.

The first key result is positive: if Bob chooses one signal qubit S_i together with all noise qubits N_1,\dots,N_n, then the channel from A to B = S_i N_1\dots N_n has full quantum capacity:

C_Q\!\left(\mathcal{N}^{(n)}_{A \to S_i N_1 \dots N_n}\right) = 1.

This equality means that the channel is capable of transmitting one qubit of quantum information perfectly. The authors prove this by explicitly constructing the decoding unitary U^{(n)}_{\mathrm{dec}} and showing that it recovers the original state of A with fidelity 1 for arbitrary input states. This is not an asymptotic or approximate statement; it is exact.

The second key result is negative and is where no-cloning consistency enters in a rigorous way. If Bob omits even a single noise qubit, or attempts to recover the state using only a signal qubit, the channel capacity collapses to zero:

C_Q\!\left(\mathcal{N}^{(n)}_{A \to S_i}\right) = 0.

The authors justify this by showing that the channel \mathcal{N}^{(n)}_{A \to S_i} is antidegradable, and therefore has zero quantum capacity. Due to the permutation symmetry among signal qubits, the environment of any single signal qubit contains at least as much information as the signal qubit itself. For antidegradable channels, the quantum capacity vanishes identically. This is a standard result in quantum Shannon theory, and the authors explicitly cite it to ground their conclusion.

This capacity-based argument explains why decryption cannot be repeated. After decrypting one signal qubit, the remaining system consists of (n-1) signal qubits together with the same noise qubits. However, the paper shows that after decoding, the joint state of the unused signal qubits and the noise qubits is independent of Alice’s original information. In other words, the effective channel from A to any remaining subsystem has zero quantum capacity. There is no physical operation that can recover the original state again without reversing the first decryption.

This point deserves emphasis. The impossibility of a second decryption is not enforced by measurement, classical control, or external assumptions about key destruction. It is enforced by the structure of the quantum correlations created by the protocol. The noise qubits function as a one-time resource because their correlations with the signal qubits are reorganized during decryption in such a way that no remaining subsystem retains recoverable quantum information about A.

The authors make this explicit when they note that it would not violate the No-Cloning Theorem if Bob were to reverse the decoding unitary and then decrypt a different signal qubit. In that case, the system is returned to its pre-decryption state, and only one plaintext copy exists at any time. What is forbidden is the simultaneous existence of two independent plaintext copies, and the protocol never allows this configuration to arise.

From a foundational standpoint, this analysis clarifies why encrypted cloning does not weaken the No-Cloning Theorem. The theorem prohibits the existence of a channel that outputs two perfect, independent copies of an unknown state. Encrypted cloning instead creates a family of overlapping recovery channels, each of which individually has full capacity, but whose simultaneous use is impossible because of their shared dependence on the same noise registers.

In this sense, the protocol can be viewed as exploiting a sharp boundary condition imposed by unitarity. The system is enlarged with ancillas, quantum noise is deliberately introduced via maximal entanglement, and that noise is later removable—but only once. The No-Cloning Theorem remains intact, but the operational landscape around it is expanded.

Encrypted cloning in relation to existing quantum primitives

A key strength of Encrypted Qubits Can Be Cloned is that it does not present encrypted cloning as an isolated curiosity, but explicitly situates it within the landscape of known quantum information primitives. The authors carefully demonstrate that encrypted cloning is consistent with, yet operationally distinct from, quantum error correction, quantum secret sharing, entanglement monogamy, and quantum summoning. This positioning is essential to understanding its implications for quantum computing.

Relation to quantum error correction

At a technical level, encrypted cloning shares tools with quantum error correction. Both rely on multipartite entanglement, ancilla systems, and unitary encoding and decoding operations. However, the operational goals are fundamentally different.

Quantum error correction is designed to protect quantum information against noise introduced by the environment. Its success criterion is the ability to correct a specified class of errors repeatedly, allowing a logical qubit to survive indefinitely under fault-tolerant operations.

Encrypted cloning, by contrast, is not designed to protect against computational errors. Instead, it introduces quantum noise deliberately, through maximal entanglement between signal and noise qubits. This noise is not an error to be corrected repeatedly, but an encryption mechanism that can be removed exactly once. The authors explicitly state that encrypted cloning is not meant to replace error correction, but to enable a different functionality: redundancy and recoverability where direct duplication is forbidden.

That said, encrypted cloning can still be interpreted as an error-correcting code in a limited sense. Because the original state can be recovered even if up to n-1 signal qubits are lost, the scheme corrects erasure errors on the complementary system to any authorized recovery set. This connection is not metaphorical; it follows directly from the quantum secret sharing structure discussed below.

Relation to quantum secret sharing

The authors explicitly show that encrypted cloning is consistent with the theory of quantum secret sharing. In secret sharing, one defines an access structure: a collection of authorized sets from which the secret can be recovered, and unauthorized sets from which it cannot.

In encrypted cloning, any subsystem consisting of one signal qubit together with all noise qubits is an authorized set. Any subsystem consisting of fewer resources, such as only signal qubits or only noise qubits, is unauthorized. The authors verify that the two necessary and sufficient conditions for quantum secret sharing hold: the complement of any authorized set is unauthorized, and the access structure is monotonic.

This perspective reinforces why encrypted cloning does not violate the No-Cloning Theorem. Although multiple authorized recovery sets exist, they are not disjoint. All authorized sets overlap on the full noise register. As a result, only one recovery can succeed unless the system is first reverted to its encoded state.

From a systems viewpoint, this overlap property is the formal reason encrypted cloning provides redundancy without replication. It also clarifies why encrypted cloning can tolerate loss of signal qubits but not loss of the full noise register.

Consistency with entanglement monogamy

A potential source of confusion addressed directly by the authors concerns entanglement monogamy. Suppose the original qubit A is maximally entangled with an ancilla \tilde{A}. After encrypted cloning, \tilde{A} appears to be maximally entangled with multiple different recovery sets.

This does not violate monogamy because monogamy constraints apply only to disjoint subsystems. In encrypted cloning, every recovery set overlaps with every other recovery set on the noise qubits. There are no two disjoint subsystems that can simultaneously recover the state. The apparent proliferation of entanglement is therefore an artifact of overlapping access structures, not a violation of fundamental constraints. This observation is important for quantum computing architectures that rely heavily on entanglement accounting. It shows that encrypted cloning introduces no hidden violations of known entanglement bounds.

Consistency with quantum summoning

The authors also relate encrypted cloning to the no-quantum-summoning theorem, which concerns the impossibility of guaranteeing the delivery of an unknown quantum state at spacelike-separated locations.

Encrypted cloning remains consistent with this theorem, but it enables a restricted variant of summoning. By depositing encrypted clones at multiple spacetime locations and carrying the noise qubits as a decryption key, an agent can later choose where to reconstruct the state, even if the candidate locations are spacelike separated. The crucial constraint is that the key must be physically brought to the chosen location, and only one reconstruction can occur.

This reinforces a recurring theme of the paper: encrypted cloning does not evade quantum no-go theorems by weakening them, but by reshaping the operational question so that the forbidden configuration never arises.

Encrypted cloning as a systems primitive for quantum computing

Having established that encrypted cloning is consistent with the No-Cloning Theorem and with existing quantum information frameworks, the paper’s central implication is architectural rather than purely theoretical. Encrypted cloning introduces a new systems primitive for quantum computing: one-time recoverable redundancy.

This primitive sits in a conceptual gap between classical copying and quantum error correction. Classical systems rely on unrestricted replication. Quantum systems, constrained by no-cloning, rely on continuous protection through encoding and syndrome-based correction. Encrypted cloning offers a third option: the ability to create multiple encrypted stand-ins for a quantum state, from which exactly one faithful recovery can later be performed.

Redundancy without replication

The authors emphasize that encrypted cloning provides redundancy in a setting where replication is forbidden. After encoding, the quantum information originally localized in A is distributed across the signal and noise qubits, so retaining A is no longer necessary for recovery. The quantum information it carried is no longer localized but distributed across many signal qubits and a noise-based key. Each signal qubit is independently useless, yet any one of them can later serve as the recovery point.

This form of redundancy is fundamentally different from replication. It does not increase the number of usable copies of the state. Instead, it increases the number of locations from which recovery is possible. In classical terms, it resembles a system with many encrypted backups and a single-use decryption capability.

From a quantum computing perspective, this reframes how resilience can be achieved. Rather than ensuring that a logical qubit survives arbitrary noise indefinitely, encrypted cloning ensures that a quantum state can be recovered once despite losses in storage or transmission, provided that at least one encrypted clone and the full key remain available.

Quantum encrypted multicloud storage

The paper’s primary concrete application is quantum encrypted multicloud storage, and it is worth restating its logic precisely, because it captures the architectural significance of the primitive.

After encrypted cloning, the encrypted clones S_1,\dots,S_n can be distributed across independent quantum storage providers. Each provider stores a qubit whose reduced state is maximally mixed and contains no information about the underlying quantum data. The owner retains the noise qubits locally as a key.

This arrangement satisfies three constraints simultaneously: the data are stored off site, they are stored redundantly, and they are encrypted with a key that never leaves the owner’s possession. Recovery requires physically bringing the key to one chosen storage location, and recovery can succeed only once. The authors stress that this functionality is not achievable by direct quantum copying and does not rely on measurement, classical communication, or probabilistic success.

From an architectural standpoint, this introduces a notion of quantum backup with single restore semantics. This is weaker than classical backups, but significantly stronger than having no viable backup mechanism at all.

One-time recovery as a design constraint

A defining feature of encrypted cloning is that recovery is consumptive. The noise qubits function as a one-time key not by convention but by physics. After decryption, the remaining system no longer contains recoverable information about the original state.

This has direct implications for how such a primitive could be integrated into quantum software and hardware stacks. Encrypted cloning is suitable for scenarios where recovery is expected to be rare, deliberate, and final. It is not suitable for iterative rollback or repeated retries. The paper is explicit on this point by contrasting encrypted cloning with error correction and by emphasizing that decryption consumes the key.

In system design terms, encrypted cloning aligns with checkpoint and abort semantics rather than checkpoint and resume semantics. This distinction is essential for avoiding overinterpretation of the result.

Sensitivity and robustness tradeoffs

The authors also highlight two complementary properties that emerge as the number of encrypted clones increases.

On the one hand, robustness improves. If n encrypted clones are distributed, it suffices that even one survives intact to enable full recovery. This makes the transmission and storage of signal qubits highly tolerant to loss.

On the other hand, sensitivity to interactions with the noise qubits increases. For large n, the ability to recover the original state becomes extremely sensitive to any disturbance of the noise register. This sensitivity is not presented as a flaw, but as a potential feature for applications such as quantum sensing, where small interactions could be amplified into detectable loss of recoverability.

Relationship to classical cryptographic intuition

The authors explicitly draw an analogy between encrypted cloning and the classical one-time pad. Each encrypted clone is perfectly masked, and the noise qubits function as a pad that enables decryption. However, the analogy is deliberately incomplete.

In the classical one-time pad, the key cannot be reused without compromising security. In encrypted cloning, the encryption and decryption operations are unitary, and after decryption the maximally entangled pairs can, in principle, be restored and reused. What cannot be reused is the recovery of the same plaintext without reverting the system. This distinction underscores that the one-time nature of the protocol is enforced by recoverability constraints, not by information leakage.

Encrypted cloning as a pattern for working within unitarity constraints

In its concluding discussion, Encrypted Qubits Can Be Cloned frames encrypted cloning not merely as a new protocol, but as an instance of a broader methodological pattern: evading constraints imposed by unitarity without violating them. This perspective is essential for understanding the paper’s significance beyond its immediate application to storage or redundancy.

The No-Cloning Theorem is a consequence of unitarity and linearity. Encrypted cloning does not weaken these principles. Instead, it enlarges the system by introducing ancillas and deliberately injecting quantum noise through maximal entanglement. This noise masks the information in such a way that the system becomes effectively open, even though the global evolution remains unitary. Later, the noise can be removed—but only under carefully constrained conditions.

This strategy mirrors a well-known phenomenon in quantum physics: quantum linear amplifiers must introduce noise to preserve unitarity. The authors explicitly draw this analogy and suggest that encrypted cloning may inspire new amplifier architectures in which noise is introduced through entangled ancillas, enabling partial or conditional denoising at a later stage.

Beyond storage: potential extensions

While the paper’s main concrete application is quantum encrypted multicloud storage, the authors outline several broader directions where encrypted cloning could play a role.

One such direction is quantum computation on encrypted data. Because encrypted cloning operates entirely unitarily and without measurements, it is compatible with coherent processing. The authors speculate that encrypted cloning may support forms of quantum multicloud parallel homomorphic or blind computation, where encrypted quantum data are processed across distributed systems without revealing the underlying state. This is presented as an open research direction rather than a solved problem.

Another direction is quantum sensing. The authors note that for large numbers of encrypted clones, the ability to recover the original state becomes extremely sensitive to interactions affecting the noise qubits. This sensitivity could be exploited as a sensing mechanism, where small perturbations manifest as a loss of decryptability. Conversely, encrypted cloning also enhances robustness in the transmission of signal qubits, since only one needs to arrive intact to enable recovery.

The paper also draws conceptual parallels with the Hayden–Preskill model of black hole information recovery. In that model, information thrown into a black hole becomes rapidly scrambled and can later be recovered from emitted radiation given sufficient prior entanglement. The authors emphasize that encrypted cloning shares a similar structure: information is imprinted into many degrees of freedom and can be recovered using a specific auxiliary resource. This analogy is not used to claim equivalence, but to situate encrypted cloning within a broader class of scrambling-and-recovery phenomena.

What encrypted cloning does not do

Equally important is what encrypted cloning does not claim to achieve. The protocol does not allow multiple simultaneous recoveries. It does not enable unrestricted copying. It does not replace quantum error correction, nor does it provide ongoing protection against noise. The authors are careful to delimit the scope of their contribution and to avoid overstating its implications.

Encrypted cloning is therefore best understood as a one-time recoverability primitive, not as a general-purpose duplication or resilience mechanism.

Implications for quantum computing as a discipline

From the standpoint of quantum computing, the significance of encrypted cloning lies in how it reshapes design space. Classical computing is built on unrestricted copying. Quantum computing is built on entanglement and error correction under strict no-go theorems. Encrypted cloning introduces an intermediate capability: recoverable redundancy without replicability.

This capability suggests new ways to think about storage, distribution, and lifecycle management of quantum data. It also illustrates a broader lesson: quantum no-go theorems often constrain direct implementations of classical ideas, but they do not necessarily forbid achieving similar operational goals through indirect, carefully structured mechanisms.

The paper’s contribution is therefore twofold. Technically, it provides a concrete, unitary protocol with proven properties. Conceptually, it demonstrates that unitarity-imposed limits such as no-cloning can be respected while still enabling new forms of functionality that were previously thought inaccessible.

Implications for cybersecurity: when quantum data become backupable but not copyable

Encrypted cloning is presented in the paper as a response to a systems problem that classical cybersecurity has already solved many times: how to store sensitive data off site, redundantly, and encrypted, without trusting the storage provider. What is novel here is that the constraint set is quantum mechanical. The plaintext is not a bitstring. It is an unknown quantum state, and direct duplication is forbidden. The protocol therefore creates a new security primitive that is not equivalent to classical encryption, even when it plays a similar architectural role.

The purpose of this section is to translate the protocol’s guarantees into cybersecurity properties that can be reasoned about at the level of threat models, key management, access control, and incident response.

Threat model baseline: what the attacker can physically access

Start from a minimal, falsifiable model. Assume an adversary can compromise one or more quantum cloud providers that store encrypted clones (S_i). The adversary may extract the entire quantum state of those systems, delay measurements, and apply arbitrary quantum operations. Assume also that the owner retains the noise qubits N_1,\dots,N_n locally as the decryption key, as in the paper’s multicloud storage scenario.

In this model, the paper gives an information theoretic security claim: each encrypted clone S_i is individually maximally mixed, hence statistically independent of the plaintext state of A. A compromised cloud holding any number of S_i systems but no access to the full noise register lacks recoverable information about the plaintext. This is stronger than most classical encryption claims, because it does not rest on computational hardness. It is a statement about reduced density matrices. That is the core confidentiality property.

A new key management regime: quantum keys as consumable capabilities

Classical key management assumes keys are classical strings. They can be copied, escrowed, split via threshold schemes, and rotated without physically changing the ciphertext. The encrypted cloning protocol changes that regime because the key is a quantum system N^n that participates unitarily in decryption. Decryption is consumptive in the sense relevant to recoverability: after decrypting one clone, the remaining system state is independent of the plaintext, so the key cannot be reused to decrypt a second clone without first reversing the operation.

Cybersecurity implication: authorization becomes a one-time capability enforced by physics rather than by policy. In classical systems, preventing reuse is a control objective implemented via process and logging. Here, the primitive itself enforces one successful open per encoding episode.

This suggests a novel design for high assurance access to quantum secrets: instead of relying on auditability to prevent illicit duplication, the system can be engineered so that successful access consumes the ability to access again. That is a different security contract than classical decryption.

Confidentiality is information theoretic, but integrity becomes the dominant risk

In classical storage, encryption mostly addresses confidentiality. Integrity is handled by MACs, signatures, and redundancy. In encrypted cloning, confidentiality against a cloud adversary is strong, but integrity risks become comparatively more severe because recoverability depends on coherent quantum correlations.

The paper states that for large n, the ability to recover A can become extremely sensitive to interactions with the noise qubits. In security terms, this means a new denial of service surface: an attacker who cannot learn the plaintext may still be able to prevent recovery by inducing decoherence or perturbation in the key register or in stored clones.

This shifts the risk balance: confidentiality: strong by construction for single clones and generally for unauthorized sets. Availability and integrity of recoverability: fragile unless the key register is protected as a high value quantum asset. For security architecture, that implies the key register must be treated less like a password and more like a hardware protected root of trust. Loss, disturbance, or subtle interaction may be as damaging as theft.

Incident response semantics change: single restore means single rollback

Classical incident response often relies on repeated restore points and iterative rollback. Encrypted cloning enables something closer to single restore semantics. In the multicloud scenario, the owner can choose any one stored clone to decrypt and recover the plaintext. After that, the system no longer supports recovering an additional plaintext instance from the remaining clones without reverting the global state.

Cybersecurity implication: recovery planning must assume that a restore is a one-time action. That affects how you would design business continuity and disaster recovery for quantum workloads. You would treat restore as an irreversible event, closer to key material being burned after use, than to a routine restore operation.

This is novel relative to classical operational security because it merges cryptographic access control with lifecycle constraints on the data itself.

Multi party control and key splitting: opportunity and constraint

The paper shows encrypted cloning is consistent with quantum secret sharing via its access structure, and notes that recovery sets overlap. This immediately invites cybersecurity patterns such as split custody and dual control.

However, unlike classical secret sharing, naively splitting the quantum key is not simply a matter of copying shares. If you distribute parts of (N^n), you introduce transport and storage risks that are physical and coherence dependent. The Appendix also discusses variants where some noise qubits are lost and recovery remains possible with modified authorized sets, but also notes that loss of even one full pair can drop capacity to zero.

Cybersecurity implication: you can design access control structures, but availability becomes a central design variable. In classical schemes, adding more parties can increase robustness if threshold parameters are chosen. In quantum schemes, more distribution can increase the attack surface for decoherence and denial of recovery. Security engineering becomes a tradeoff between insider risk reduction and physical fragility.

New attack classes: rollback and replay at the unitary level

The authors explicitly state that it would not violate no-cloning if, after decrypting one signal qubit, Bob runs the decoding unitary in reverse and then decrypts another signal qubit.

That statement has a cybersecurity reading: if an attacker gains sufficient control of the computation environment to apply unitaries coherently, the system may support a form of state rollback to the pre-decryption state, which restores the ability to choose a different clone to decrypt. This is not cloning, but it is a control surface.

The implication is that security policies cannot be defined solely by which clone gets decrypted. They must also control who can run inverse operations, where those operations can run, and what constitutes an authorized lifecycle transition. In classical terms, this is analogous to restricting privileged operations that can revert secure enclaves to pre-attestation states. Here, the analogue is coherent reversal of the decryption transformation.

Practical security boundary: where the classical world re-enters

All of the above is quantum native. But any real system will interact with classical control planes: authentication, orchestration, scheduling, billing, and monitoring. The most likely security failures will therefore occur at the boundary where classical systems decide when and where to perform the encoding and decoding unitaries, and how the key register is handled operationally.

Encrypted cloning narrows one class of risks (cloud learns plaintext) and widens another (key mishandling, denial of recoverability, unauthorized unitary control). This is a standard tradeoff pattern in security: strengthening confidentiality often increases sensitivity to availability and key custody.

Conclusion

This commentary set out to analyze Encrypted Qubits Can Be Cloned as more than a technical construction, treating it instead as a boundary case that clarifies how far quantum information processing can be pushed without violating unitarity and the No-Cloning Theorem. After working through the protocol, its proofs, and its stated relationships to existing quantum primitives, the result can be summarized with precision.

First, the paper does not weaken the No-Cloning Theorem. On the contrary, it sharpens its operational meaning. What is forbidden is the simultaneous existence of multiple, independently accessible plaintext copies of an unknown quantum state. What is permitted is the creation of multiple encrypted representations whose usefulness is gated by a shared quantum resource and whose recovery paths necessarily overlap. The distinction between copying a state and copying an encrypted encoding is not semantic; it is enforced by channel capacity, antidegradability, and the structure of multipartite entanglement.

Second, encrypted cloning introduces a new quantum systems primitive: one-time recoverable redundancy. This primitive is strictly weaker than classical replication and strictly different from quantum error correction. It enables redundancy across space and infrastructure without enabling replication across time. From a computing perspective, this is a meaningful expansion of design space. It allows quantum data to be backed up, distributed, and deferred in ways that were previously assumed impossible under no-cloning constraints, while still preserving all known no-go theorems.

Third, when viewed through a cybersecurity lens, encrypted cloning implies a shift in the security contract for quantum data. Confidentiality against untrusted storage is information-theoretic for unauthorized subsystems, not computational. Authorization is embodied in a quantum key that behaves like a consumable capability rather than a reusable secret. Availability and integrity of recoverability become the dominant risks, because denial of recovery is easier to induce than unauthorized disclosure. This tradeoff is not accidental; it is a direct consequence of enforcing security through physics rather than policy.

More broadly, the paper exemplifies a recurring pattern in quantum information science: when unitarity forbids a direct analogue of a classical operation, useful functionality can sometimes be recovered by enlarging the system, introducing structured noise via entanglement, and constraining how and when that noise can be removed. The same logic underlies quantum error correction, quantum amplification limits, and several no-programming results. Encrypted cloning adds redundancy and deferred recoverability to that list.

Finally, the contribution of Encrypted Qubits Can Be Cloned should be read neither as a curiosity nor as an immediate blueprint for deployment, but as an existence proof with architectural consequences. It shows that backup without copying is not a contradiction in quantum mechanics, but a well-defined operational regime. Whether this regime becomes practically relevant will depend on advances in coherent control, fault tolerance, and quantum cloud infrastructure. What the paper establishes decisively is that the conceptual barrier was never the No-Cloning Theorem itself, but an overly narrow interpretation of what redundancy must mean in a quantum world.

Appendix A — Encrypted cloning and the exact boundary of quantum secret sharing

Encrypted cloning can be understood most precisely by situating it within the formal framework of quantum secret sharing (QSS). Doing so clarifies why the protocol enables redundancy without violating the No-Cloning Theorem and why its one-time recoverability is not an implementation artifact but a structural consequence of its access structure.

Access structures in quantum secret sharing

A quantum secret sharing scheme is defined by an access structure \mathcal{A}, which is a family of authorized subsets of a multipartite system from which the secret can be reconstructed. Subsets not in \mathcal{A} are unauthorized and must contain no recoverable information about the secret. Two necessary conditions characterize valid QSS schemes:

  1. Monotonicity. If a subset X is authorized, then any superset Y \supseteq X is also authorized.
  2. No-cloning consistency. The complements of authorized sets must be unauthorized. In particular, no two disjoint subsets may both be authorized, as this would permit simultaneous recovery of two independent copies of an unknown quantum state, violating the No-Cloning Theorem.

Encrypted cloning realizes a highly constrained but valid access structure that satisfies both conditions exactly.

Access structure induced by encrypted cloning

After the encoding operation U^{(n)}_{\mathrm{enc}}, the original qubit A is mapped into a joint system consisting of signal qubits S_1,\dots,S_n and noise qubits N_1,\dots,N_n. The authors show that recovery is possible if and only if one signal qubit and the entire noise register are jointly available.

This induces the access structure:

\mathcal{A} ;=; \left{ {S_i} \cup {N_1,\dots,N_n} ;\middle|; i = 1,\dots,n \right}.

Each authorized set consists of exactly one signal qubit together with all noise qubits. Any subset that omits at least one noise qubit, or that contains only signal qubits, is unauthorized and has zero quantum capacity. Monotonicity holds trivially: adding additional systems to an authorized set cannot destroy recoverability.

Maximal overlap and impossibility of simultaneous recovery

The defining property of this access structure is that all authorized sets overlap on the full noise register. For any two distinct indices i \neq j,

\left( {S_i} \cup N^n \right) ;\cap; \left( {S_j} \cup N^n \right) ;=; N^n,

where N^n = {N_1,\dots,N_n}.

This overlap is not incidental. It is the precise mechanism by which encrypted cloning remains consistent with the No-Cloning Theorem. Because no two authorized sets are disjoint, there exists no physical configuration in which two independent recovery operations can be executed simultaneously. Any attempt to recover from one authorized set necessarily disturbs the shared noise register in a way that destroys recoverability for all other sets.

In secret sharing terms, encrypted cloning realizes a maximally overlapping access structure: the number of authorized sets is as large as possible, but their intersection is also as large as possible.

Complementary unauthorized sets and antidegradability

Quantum secret sharing requires that the complement of any authorized set be unauthorized. In encrypted cloning, the complement of an authorized set {S_i} \cup N^n consists of the remaining signal qubits {S_j}_{j \neq i}.

The paper shows that any channel from A to a subsystem consisting only of signal qubits is antidegradable and therefore has zero quantum capacity. This establishes that the complement of each authorized set is not merely unauthorized by definition, but provably incapable of transmitting quantum information. This property reinforces the physical nature of the access structure: unauthorized sets are not excluded by policy or convention, but by the structure of the induced quantum channels.

Encrypted cloning as an extremal QSS construction

Most quantum secret sharing schemes aim to distribute trust among multiple parties using threshold or ramp structures. Encrypted cloning occupies a different corner of the design space. It maximizes spatial redundancy while enforcing temporal exclusivity of recovery.

Formally, encrypted cloning realizes an extremal point in the space of QSS schemes:

  • The number of authorized recovery locations is n.
  • The intersection of all authorized sets is the full noise register.
  • The secret can be recovered exactly once unless the system is coherently reverted.

This construction demonstrates that the No-Cloning Theorem does not prohibit redundancy per se. Instead, it constrains the geometry of access structures: redundancy is permitted only when authorized sets overlap sufficiently to prevent simultaneous recovery.

Implications of the access-structure viewpoint

Viewing encrypted cloning through the lens of quantum secret sharing resolves the apparent paradox in its name. The protocol does not clone quantum states. It constructs multiple authorized recovery paths whose overlap enforces one-time recoverability by physical law.

This perspective also explains why encrypted cloning cannot be strengthened into a threshold scheme with multiple independent recoveries. Any attempt to reduce overlap between authorized sets would immediately violate the no-cloning consistency condition of QSS.

In this sense, encrypted cloning sits exactly at the boundary of what quantum mechanics permits: it realizes maximal redundancy subject to the strictest possible overlap constraints. The No-Cloning Theorem remains intact, but its operational consequences are revealed to be subtler and more permissive than a naive reading might suggest.

Appendix B — Impossibility results implied by encrypted cloning

Encrypted cloning is often read primarily as an enabling construction: it shows that redundancy and deferred recovery of quantum information are possible under carefully constrained conditions. Equally important, however, are the negative results that follow from the same structure. By examining which extensions of the protocol are not possible, encrypted cloning sharpens the boundary of what quantum mechanics permits in distributed recovery, delegation, and access control.

This appendix collects several impossibility results that are not stated explicitly in the paper, but that follow directly from its channel-theoretic and access-structure analysis.

Impossibility of multiple independent decryptions

The most immediate impossibility result is also the most fundamental: encrypted cloning cannot be extended to allow two successful decryptions without coherent reversal.

Suppose, for contradiction, that there existed a physical process that, after encoding, allowed two disjoint subsystems to independently recover the original state of qubit A. Each such recovery would define a channel with nonzero quantum capacity from A to the corresponding subsystem. If the subsystems were disjoint, this would constitute a channel implementing two independent recoveries of an unknown quantum state.

This configuration is forbidden by the No-Cloning Theorem. The paper avoids it by construction: all authorized recovery sets overlap on the full noise register. Any attempt to create two disjoint authorized sets would immediately violate no-cloning consistency.

Thus, encrypted cloning implies a strong impossibility result: there exists no physical extension of the protocol that yields two independent plaintext recoveries without reversing the first recovery.

Impossibility of threshold recovery without overlap

A natural question is whether encrypted cloning can be generalized into a threshold scheme, where any k out of n encrypted clones suffice to recover the state, possibly with different keys. The access-structure analysis in Appendix A already hints that this is impossible without overlap, but encrypted cloning makes the obstruction explicit.

In threshold quantum secret sharing, authorized sets can be disjoint as long as their complements are unauthorized. Encrypted cloning, however, requires that all authorized sets overlap on the noise register to prevent simultaneous recovery. Any threshold construction that permitted two disjoint authorized sets would allow two decryptions to occur in parallel.

Therefore, encrypted cloning implies the following impossibility: there is no threshold variant of encrypted cloning that allows multiple independent recoveries without violating the No-Cloning Theorem. Redundancy is possible only when recoverability is globally exclusive.

Impossibility of key delegation without key custody

In classical cryptography, it is common to delegate decryption capability by distributing keys or key shares. One might ask whether a similar delegation is possible in encrypted cloning: can the owner distribute parts of the noise register so that different parties can independently decrypt different clones?

The answer is negative. The paper shows that omitting even a single noise qubit reduces the quantum capacity of the recovery channel to zero. This implies that full custody of the noise register is required for decryption. Partial access is insufficient.

As a consequence, encrypted cloning enforces an impossibility result that has no classical analogue: decryption capability cannot be delegated without physically transferring the entire quantum key. There is no notion of partial authorization that preserves recoverability. This impossibility is structural, not cryptographic. It follows from antidegradability and channel capacity arguments, not from assumptions about adversaries or computational power.

Impossibility of fair multi-party recovery

Another classical desideratum is fair recovery: the ability for multiple parties to jointly recover a secret such that no party can gain access without the others. In encrypted cloning, such a notion encounters a fundamental obstruction.

Because recovery consumes the recoverability resource, any party that participates in a successful decryption necessarily deprives all other parties of the ability to recover the same plaintext from the remaining system. There is no unitary operation that allows two parties to emerge simultaneously with valid plaintext states, nor even with symmetric partial access.

Encrypted cloning therefore implies the impossibility of fair quantum recovery with exclusivity: when recovery is exclusive by physical law, it cannot be made fair without abandoning determinism or introducing measurements that destroy coherence.

Impossibility of non-destructive auditing of recovery

In classical systems, it is often possible to audit access to encrypted data without consuming the data itself. One might ask whether encrypted cloning permits a similar capability: can one verify that a recovery has occurred without destroying recoverability?

The structure of the protocol rules this out. Recovery corresponds to a unitary transformation that reorganizes correlations between signal and noise qubits. There exists no measurement or unitary that can both certify that recovery has occurred and preserve the correlations required for another recovery.

This yields another impossibility: there is no non-destructive audit of plaintext recovery in encrypted cloning. Observability and recoverability are mutually exclusive.

Impossibility of strengthening encrypted cloning into replication

Finally, encrypted cloning rules out its own overinterpretation. It cannot be strengthened into true replication by adding more ancillas, more entanglement, or more complex unitaries. Any such strengthening would require either:

  • increasing the recoverability monotone beyond one, or
  • creating two disjoint authorized sets with nonzero quantum capacity.

Both are forbidden by unitarity and no-cloning. Encrypted cloning therefore occupies a maximal position: it achieves the strongest possible form of redundancy compatible with quantum mechanics. Any attempt to go beyond it collapses back into impossibility results already known from foundational no-go theorems.

Encrypted cloning as a generator of no-go boundaries

Taken together, these impossibility results show that encrypted cloning is not merely consistent with the No-Cloning Theorem, but actively clarifies its operational consequences. The protocol exposes which classical intuitions fail in the quantum setting and why.

In this sense, encrypted cloning functions as a boundary object: it sits precisely at the edge of what is permitted and makes the surrounding impossibilities sharply visible. By studying not only what the protocol enables, but also what it forbids, one gains a clearer picture of how quantum information can be distributed, protected, and recovered—once, and only once.

Appendix C — Recoverability as a conserved quantum resource

Encrypted cloning is most naturally described in terms of channels, access structures, and unitary encodings. However, an alternative and illuminating perspective is to treat recoverability itself as a conserved resource. From this viewpoint, the protocol does not merely hide information; it redistributes a finite, non-duplicable capability across subsystems.

This appendix formalizes that intuition and shows how it clarifies both the power and the limits of encrypted cloning.

Recoverability versus information content

In classical systems, recoverability is not a meaningful physical quantity. If a plaintext exists and a key exists, recovery can in principle be repeated arbitrarily many times. Recoverability is limited only by policy, not by physics.

In quantum systems, by contrast, recoverability is constrained by unitarity. An unknown quantum state can be recovered only insofar as the correlations encoding it have not been irreversibly transformed or consumed. The encrypted cloning protocol makes this constraint explicit by separating information content from recoverability.

After encoding, the information about the state of qubit A is delocalized across signal and noise qubits. At the same time, the capacity to recover that information exists exactly once. These two notions are not identical:

  • Information content can be redundantly encoded in overlapping ways.
  • Recoverability cannot be duplicated.

Encrypted cloning exploits this asymmetry.

A recoverability monotone

Define a recoverability monotone R for a quantum system with respect to a reference system \tilde{A} that purifies the input state. Informally, R measures whether there exists a subsystem from which the original state can be recovered with unit fidelity.

For the purposes of this appendix, it suffices to note three properties of R that are implicitly satisfied by the protocol:

  1. Initialization. Before encoding, R = 1 for the system containing A, and R = 0 for all other subsystems.

  2. Encoding redistribution. After encoding, R is redistributed across multiple overlapping subsystems. Each authorized recovery set has R = 1, but these sets are not disjoint.

  3. Conservation under unitary evolution. The total recoverability cannot increase under unitary evolution. It can only be redistributed or consumed.

This last point is critical. Although there are many recovery options, the total recoverability budget remains exactly one.

Decryption as recoverability consumption

From this perspective, decryption is not merely an inverse operation. It is a consumptive transformation with respect to recoverability.

When one signal qubit is decrypted using the full noise register, recoverability collapses onto the output qubit. All other subsystems lose their recoverability entirely. Formally, after decryption:

  • The recovered qubit has R = 1.
  • All remaining subsystems have R = 0.

This explains why the remaining encrypted clones become useless without invoking informal notions such as “key destruction”. The key is not destroyed as a physical system; rather, the recoverability resource has been irreversibly concentrated.

Why recoverability cannot be cloned

This resource-based framing makes the no-cloning consistency almost tautological. Cloning would require transforming a state with R = 1 into a state with R = 2. That is impossible under unitary dynamics.

Encrypted cloning succeeds because it never increases R. It merely allows R = 1 to be addressable from multiple overlapping subsystems, with the restriction that only one address can be resolved at a time. This clarifies an important conceptual point: encrypted cloning does not clone states, and it does not clone recoverability. It only clones potential recovery paths that share a common bottleneck.

Relation to quantum capacity

The recoverability monotone aligns closely with the channel-capacity analysis used in the paper. A subsystem has nonzero recoverability if and only if the corresponding channel has nonzero quantum capacity. Antidegradable channels correspond to subsystems with R = 0.

Seen this way, channel capacity is not merely a communication measure, but a diagnostic of recoverability distribution. Encrypted cloning engineers a situation where many channels individually have full capacity, but cannot be used jointly without violating conservation of R.

Why classical intuition fails

Classical backup systems implicitly assume that recoverability is free and duplicable. Encrypted cloning demonstrates that in quantum mechanics, recoverability behaves more like energy or entanglement: it is conserved, redistributable, and consumable.

This explains why classical intuitions about retries, restores, and audits fail when naively ported to quantum systems. The limitation is not technological but structural.

Implications beyond encrypted cloning

Treating recoverability as a conserved resource suggests a broader methodological lesson. Many quantum no-go theorems can be reinterpreted as conservation laws for operational capabilities rather than for information itself.

Encrypted cloning provides a concrete example of this principle in action. It shows that by carefully managing where recoverability resides and how it can flow, one can achieve functionality that appears paradoxical when viewed only through the lens of state duplication.

Back to top

Reuse

Citation

BibTeX citation:
@online{montano2026,
  author = {Montano, Antonio},
  title = {Encrypted {Cloning} and the {Exact} {Boundary} of the
    {No-Cloning} {Theorem}},
  date = {2026-01-16},
  url = {https://antomon.github.io/longforms/encrypted-cloning-and-the-exact-boundary-of-the-no-cloning-theorem/},
  langid = {en}
}
For attribution, please cite this work as:
Montano, Antonio. 2026. “Encrypted Cloning and the Exact Boundary of the No-Cloning Theorem.” January 16, 2026. https://antomon.github.io/longforms/encrypted-cloning-and-the-exact-boundary-of-the-no-cloning-theorem/.