In quantum physics, the "monogamy" of quantum entanglement refers to the fundamental property that it cannot be freely shared between arbitrarily many parties.
In order for two qubits A and B to be maximally entangled, they must not be entangled with any third qubit C whatsoever. Even if A and B are not maximally entangled, the degree of entanglement between them constrains the degree to which either can be entangled with C. In full generality, for qubits , monogamy is characterized by the Coffman–Kundu–Wootters (CKW) inequality, which states that
where is the density matrix of the substate consisting of qubits and and is the "tangle," a quantification of bipartite entanglement equal to the square of the concurrence.[1][2]
Monogamy, which is closely related to the no-cloning property,[3][4] is purely a feature of quantum correlations, and has no classical analogue. Supposing that two classical random variables X and Y are correlated, we can copy, or "clone," X to create arbitrarily many random variables that all share precisely the same correlation with Y. If we let X and Y be entangled quantum states instead, then X cannot be cloned, and this sort of "polygamous" outcome is impossible.
The monogamy of entanglement has broad implications for applications of quantum mechanics ranging from black hole physics to quantum cryptography, where it plays a pivotal role in the security of quantum key distribution.[5]
^Coffman, Valerie; Kundu, Joydip; Wootters, William (2000). "Distributed entanglement". Physical Review A. 61 (5): 052306. arXiv:quant-ph/9907047. Bibcode:2000PhRvA..61e2306C. doi:10.1103/physreva.61.052306. S2CID 1781516.
^Seevnick, Michael (2010). "Monogamy of correlations versus monogamy of entanglement". Quantum Information Processing. 9 (2): 273–294. arXiv:0908.1867. doi:10.1007/s11128-009-0161-6.
^Pawłowski, Jan Martin (2006). "Quantum dynamics as an analog of conditional probability". Physical Review A. 74 (4): 042310. arXiv:quant-ph/0606022. Bibcode:2006PhRvA..74d2310L. doi:10.1103/PhysRevA.74.042310. S2CID 56054135.
^Leifer, Matthew (2010). "Security proof for cryptographic protocols based only on the monogamy of Bell's inequality violations". Physical Review A. 82 (3): 032313. arXiv:0907.3778. Bibcode:2010PhRvA..82c2313P. doi:10.1103/PhysRevA.82.032313. S2CID 119078270.
and 23 Related for: Monogamy of entanglement information
In quantum physics, the "monogamy" of quantum entanglement refers to the fundamental property that it cannot be freely shared between arbitrarily many...
the initial quantum information is "destroyed" as it becomes part of the entanglement state, the no-cloning theorem is maintained as the information is...
even with infinite rounds of communication. LOCC are the "free operations" in the resource theories ofentanglement: Entanglement cannot be produced from...
Entanglement distillation (also called entanglement purification) is the transformation of N copies of an arbitrary entangled state ρ {\displaystyle \rho...
a physical error rate below a certain threshold can, through application of quantum error correction schemes, suppress the logical error rate to arbitrarily...
allows for the transfer of quantum states between single atoms using optical fiber in addition to the creation of remote entanglement between distant atoms...
subfield of quantum information science that deals with the processing of quantum information. Quantum teleportation, entanglement and the manufacturing of quantum...
exhibition of quantum entanglement. In this case, quantum entanglement is a local or nonlocal property of two or more qubits that allows a set of qubits to...
quantum entanglement (via projective measurements) in the case of cluster states. Another way of thinking of cluster states is as a particular instance of graph...
one photon from the pair. This scheme relies on two properties of quantum entanglement: The entangled states are perfectly correlated which means that...
that black hole complementarity combined with the monogamyofentanglement implies the existence of an AMPS "firewall", where high energy, short wavelength...
qutrits directly might be tricky, and one way to do that is by using an entanglement with a qubit. The quantum logic gates operating on single qutrits are...
specifically quantum superposition and entanglement, using specialized hardware that supports the preparation and manipulation of quantum states. Classical physics...
such as entanglement and teleportation, and are a useful resource for quantum information processing. Light propagating in a restricted volume of space...
quantum entanglement used in more traditional quantum algorithms. Some confirmation of this is found in exactly solvable models. Timeline of ideas related...
quantum, or use some essential feature of quantum computation such as quantum superposition or quantum entanglement. Problems that are undecidable using...
relevant to note here that both of the above bounds on capacities can be broken, with the aid ofentanglement. The entanglement-assisted teleportation scheme...
Crucially, simulators also take advantage of a second quantum property called entanglement, allowing the behavior of even physically well separated particles...
"CNOT") of qubits 0 and 1 // At this point we have a 2-qubit Bell state (|00> + |11>)/sqrt(2) cx q[1], q[2]; // this expands entanglement to the 3rd...
be used as qubits. Quantum entanglement is a physical phenomenon characterized by correlation between the quantum states of two or more physically separate...
quantum bits, and is the quantum analogue of the discrete Fourier transform. The quantum Fourier transform is a part of many quantum algorithms, notably Shor's...
correlation, which is intermediate between Bell nonlocality and quantum entanglement. A state exhibiting Bell nonlocality must also exhibit quantum steering...
consensual non-monogamy with a conscious management of jealousy and reject the view that sexual and relational exclusivity (monogamy) are prerequisite...