The protocol for 𝑛 =2. Qubits whose reduced state is maximally mixed are represented by spheres displaying fluctuations. Credit: Physical Review Letters (2026). DOI: 10.1103/y4y1-1ll6
A team of researchers at the University of Waterloo have made a breakthrough in quantum computing that elegantly bypasses the fundamental "no cloning" problem. The research, "Encrypted Qubits can be Cloned," appears in *Physic…
The protocol for 𝑛 =2. Qubits whose reduced state is maximally mixed are represented by spheres displaying fluctuations. Credit: Physical Review Letters (2026). DOI: 10.1103/y4y1-1ll6
A team of researchers at the University of Waterloo have made a breakthrough in quantum computing that elegantly bypasses the fundamental "no cloning" problem. The research, "Encrypted Qubits can be Cloned," appears in Physical Review Letters.
How quantum computing stores information
Quantum computing is an exciting technological frontier, where information is stored and processed in tiny units—called qubits. Qubits can be stored, for example, in individual electrons, photons (particles of light), atoms, ions or tiny currents.
Universities, industry, and governments around the world are spending billions of dollars to perfect the technology for controlling these qubits so that they can be combined into large, reliable quantum computers. This technology will have powerful applications, including in cybersecurity, materials science, medical research and optimization.
Potential impact and the no-cloning problem
"This breakthrough will enable quantum cloud storage, like a quantum Dropbox, a quantum Google Drive or a quantum STACKIT, that safely and securely stores the same quantum information on multiple servers, as a redundant and encrypted backup," said Dr. Achim Kempf, the Dieter Schwarz Chair for Physics of Information and AI in the Department of Applied Mathematics at Waterloo.
"It’s an important step in enabling the buildup of quantum computing infrastructure.
"Quantum computing has tremendous potential, particularly for solving very hard problems, but it also poses unique challenges. One of the most challenging issues facing quantum computing is called the no-cloning theorem, which states that quantum information cannot be copied, at least not directly. This is because of the delicate way in which quantum information is stored."
Understanding quantum entanglement
Kempf, who is also an associate at the Institute for Quantum Computing at Waterloo and an associate member of the Perimeter Institute, further explains that quantum information works a bit like splitting a password. If you have the first half of the password and a friend has the second half, neither of you can use it alone—but if you put your two halves together, you acquire the valuable password.
In a similar sense, qubits are special because they can share information in a way that grows as you combine them. A single qubit doesn’t hold much on its own, but when qubits are linked together, they can store a huge amount of information that only appears when they’re connected. This unique ability to hold shared information across multiple qubits is called quantum entanglement.
Kempf explains that 100 qubits can share information in 2100 ways simultaneously. This allows them to share so much entangled information that all of today’s classical computers could not store it.
Workaround for the no-cloning theorem
For all the potential of quantum computing, however, the no-cloning theorem limits how it can be applied. This is because, unlike in classical computing, where the copying of information—for sharing and for backups—is a very commonly used tool, there is no simple copy and paste in quantum computing.
"We have found a workaround for the no-cloning theorem of quantum information," explains Dr. Koji Yamaguchi, who co-discovered the new method with Kempf while working as a postdoctoral researcher in Kempf’s lab and who is now a research assistant professor at Kyushu University.
"It turns out that if we encrypt the quantum information as we copy it, we can make as many copies as we like. This method is able to bypass the no-cloning theorem because, after one picks and decrypts one of the encrypted copies, the decryption key automatically expires. That is, the decryption key is a one-time-use key. But even a one-time key enables important applications, such as redundant and encrypted quantum cloud services."
More information: Koji Yamaguchi et al, Encrypted Qubits Can Be Cloned, Physical Review Letters (2026). DOI: 10.1103/y4y1-1ll6
Citation: Solving quantum computing’s longstanding ‘no cloning’ problem with an encryption workaround (2026, January 6) retrieved 6 January 2026 from https://phys.org/news/2026-01-quantum-longstanding-cloning-problem-encryption.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.