pith. machine review for the scientific record. sign in

arxiv: 2604.10155 · v1 · submitted 2026-04-11 · 🪐 quant-ph · cs.CR

Recognition: unknown

Encrypted clones can leak: Classification of informative subsets in Quantum Encrypted Cloning

Corrrado Mio, Ernesto Damiani, Gabriele Gianini, Omar Hasan, Stelvio Cimato

Authors on Pith no claims yet

Pith reviewed 2026-05-10 16:08 UTC · model grok-4.3

classification 🪐 quant-ph cs.CR
keywords quantum cloningencrypted cloningno-cloning theoreminformation leakagesubset classificationparity dependencequantum cryptographyredundant storage
0
0 comments X

The pith

Intermediate non-authorized subsets in quantum encrypted cloning retain restricted residual dependence on the input state in a parity-dependent pattern.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

Encrypted cloning stores multiple copies of an unknown qubit in a register such that only one copy can be recovered with a decryption key, satisfying the no-cloning theorem while providing redundancy. The paper classifies every subset of this register as authorized for full recovery, completely non-informative, or partially informative. It demonstrates that some non-authorized subsets still carry a limited dependence on the original qubit state and determines the exact conditions under which this occurs. The resulting information leakage follows a parity-dependent pattern. This exposes a structural confidentiality shortfall because the encryption step was introduced only to enable the redundancy, not to enforce secrecy by design.

Core claim

In the encrypted cloning protocol the subsets of the storage register fall into authorized sets that recover the full input state with the key, completely non-informative sets that carry no dependence on the input, and partially informative sets whose residual dependence on the input state is restricted and occurs precisely when the subset exhibits a specific parity property, thereby revealing a built-in confidentiality limitation of the scheme.

What carries the argument

Classification of subsets of the encrypted-clone storage register by their information content about the input qubit, with the parity of the subset serving as the selector for whether restricted residual dependence remains.

If this is right

  • Authorized subsets recover the original qubit state upon decryption with the key.
  • Completely non-informative subsets yield no information about the input state.
  • Partially informative subsets exhibit only restricted leakage whose presence is governed by subset parity.
  • The parity-dependent pattern supplies an exact rule for identifying which subsets leak and which do not.
  • The encryption layer therefore cannot be assumed to provide full confidentiality for all possible storage subsets.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Additional cryptographic layers may be required to eliminate the parity-based leakage channel.
  • The classification rule could be checked directly by preparing known input states and measuring information extractable from chosen subsets in a quantum simulator.
  • Similar parity effects might appear in other quantum redundancy schemes that combine encryption with cloning-compatible storage.
  • Protocol designers could test whether redefining the encryption map removes the parity dependence while preserving the no-cloning compatibility.

Load-bearing premise

The encryption is used only to produce cloning-compatible redundancy rather than to guarantee confidentiality, and subset classification rests solely on standard quantum information measures.

What would settle it

A calculation or simulation that measures the mutual information between the input state and a non-authorized subset of given parity and finds either zero dependence or a dependence pattern that does not match the predicted parity rule.

read the original abstract

Encrypted cloning enables the redundant storage of an unknown qubit while remaining compatible with the no-cloning theorem, since only one clone can later be recovered through key-consuming decryption. Because encryption in this protocol is introduced to enable cloning-compatible redundancy rather than to guarantee confidentiality by design, its secrecy properties must be assessed explicitly. Here we classify the subsets of the encrypted-clone storage register into authorized, completely non-informative, and partially informative sets. We show that intermediate non-authorized subsets may retain only a restricted residual dependence on the input state, and we characterize exactly when this dependence occurs. The resulting leakage pattern is parity-dependent, revealing a structural confidentiality limitation of encrypted cloning.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

0 major / 3 minor

Summary. The manuscript analyzes the secrecy properties of an encrypted cloning protocol for an unknown qubit, where encryption is used to enable cloning-compatible redundancy rather than perfect confidentiality. It classifies subsets of the encrypted-clone storage register into authorized, completely non-informative, and partially informative categories. The central result is that certain non-authorized (intermediate) subsets retain only a restricted residual dependence on the input state, which is exactly characterized and shown to follow a parity-dependent leakage pattern, thereby identifying a structural confidentiality limitation of the protocol.

Significance. If the classification and parity-dependent characterization hold under standard quantum information measures, the result is significant because it reveals an inherent limitation in encrypted cloning schemes without invoking additional assumptions about noise, measurement, or specific channels. The structural analysis of the redundancy built into the protocol provides a clear, general insight that could inform the design of quantum cryptographic and storage protocols relying on such cloning-compatible redundancy. The absence of fitted parameters or self-referential definitions in the claims is a strength.

minor comments (3)
  1. Abstract: the claim that subsets 'may retain only a restricted residual dependence' would be strengthened by briefly naming the specific information measure (e.g., mutual information, trace distance, or fidelity) used to quantify this dependence.
  2. The manuscript would benefit from an early, explicit definition of 'authorized' versus 'non-authorized' subsets in terms of the protocol's key structure, to make the classification immediately accessible.
  3. Consider adding a small illustrative example or table showing the parity-dependent leakage for a low-dimensional case (e.g., two or three clones) to aid intuition without altering the formal results.

Simulated Author's Rebuttal

0 responses · 0 unresolved

We thank the referee for the positive assessment of our manuscript and for recommending minor revision. The referee's summary accurately reflects the central contribution: the classification of subsets in the encrypted-clone register and the exact characterization of the parity-dependent residual leakage in intermediate non-authorized subsets. No specific major comments appear in the report.

Circularity Check

0 steps flagged

No significant circularity detected

full rationale

The paper classifies subsets of the encrypted-clone register using standard quantum information measures applied to the protocol's redundancy structure, characterizing parity-dependent residual dependence on the input state. No steps reduce by construction to fitted parameters, self-referential definitions, or load-bearing self-citations; the derivation relies on direct analysis of the protocol without renaming known results or smuggling ansatzes. The claims are self-contained against external quantum information benchmarks.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The central claim rests on the no-cloning theorem and the definition of the encrypted cloning protocol; no free parameters, new entities, or ad-hoc axioms are introduced in the abstract.

axioms (1)
  • standard math The no-cloning theorem prevents perfect copying of unknown quantum states.
    Invoked to justify why encryption is required for redundancy in the protocol.

pith-pipeline@v0.9.0 · 5414 in / 1224 out tokens · 35287 ms · 2026-05-10T16:08:46.965112+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Classification of informative subsets in quantum encrypted cloning on qudits

    quant-ph 2026-05 unverdicted novelty 6.0

    Unauthorized subsets in qudit encrypted cloning are uninformative exactly when a congruence system has only the trivial solution, classified by a greatest-common-divisor condition that extends the qubit parity case.

Reference graph

Works this paper leans on

3 extracted references · 2 canonical work pages · cited by 1 Pith paper · 1 internal anchor

  1. [1]

    Encrypted qubits can be cloned.Physical Review Letters, 136(1):010801, 2026

    Koji Yamaguchi and Achim Kempf. Encrypted qubits can be cloned.Physical Review Letters, 136(1):010801, 2026

  2. [2]

    Experimental demonstration that qubits can be cloned at will, if encrypted with a single-use decryption key.preprint arXiv:2602.10695, 2026

    Koji Yamaguchi, Leon Rullkötter, Ibrahim Shehzad, Sean J Wagner, Christian Tutschku, and Achim Kempf. Experimental demonstration that qubits can be cloned at will, if encrypted with a single-use decryption key.preprint arXiv:2602.10695, 2026

  3. [3]

    Cloning Encrypted Quantum States in Arbitrary Dimensions

    Filip-Ioan Ceara. Cloning encrypted quantum states in arbitrary dimensions.preprint arXiv:2604.04888, 2026