Quantum networks form an important element of quantum computing and quantum communication systems. Quantum networks facilitate the transmission of information in the form of quantum bits, also called qubits, between physically separated quantum processors. A quantum processor is a small quantum computer being able to perform quantum logic gates on a certain number of qubits.
Quantum networks work in a similar way to classical networks. The main
difference, as will be detailed more in later paragraphs, is that
quantum networking like quantum computing is better at solving certain problems, such as modeling quantum systems.
Basics
Quantum networks for computation
Networked quantum computing or distributed quantum computing
works by linking multiple quantum processors through a quantum network
by sending qubits in-between them. Doing this creates a quantum
computing cluster and therefore creates more computing potential. Less
powerful computers can be linked in this way to create one more powerful
processor. This is analogous to connecting several classical computers
to form a computer cluster
in classical computing. Like classical computing this system is
scale-able by adding more and more quantum computers to the network.
Currently quantum processors are only separated by short distances.
Quantum networks for communication
In the realm of quantum communication, one wants to send qubits from one quantum processor to another over long distances. This way local quantum networks can be intra connected into a quantum internet. A quantum internet supports many applications, which derive their power from the fact that by creating quantum entangled qubits, information can be transmitted between the remote quantum processors. Most applications of a quantum internet require only very modest quantum processors. For most quantum internet protocols, such as quantum key distribution in quantum cryptography, it is sufficient if these processors are capable of preparing and measuring only a single qubit at a time. This is in contrast to quantum computing where interesting applications can only be realized if the (combined) quantum processors can easily simulate more qubits than a classical computer (around 60). Quantum internet applications require only small quantum processors, often just a single qubit, because quantum entanglement can already be realized between just two qubits. A simulation of an entangled quantum system on a classical computer can not simultaneously provide the same security and speed.
Overview of the elements of a quantum network
The basic structure of a quantum network and more generally a quantum internet
is analogous to a classical network. First, we have end nodes on which
applications are ultimately run. These end nodes are quantum processors of at least one qubit. Some applications of a quantum internet require quantum processors of several qubits as well as a quantum memory at the end nodes.
Second, to transport qubits from one node to another, we need communication lines. For the purpose of quantum communication, standard telecom fibers can be used. For networked quantum computing, in which quantum processors are linked at short distances, different wavelengths are chosen depending on the exact hardware platform of the quantum processor.
Third, to make maximum use of communication infrastructure, one requires optical switches capable of delivering qubits to the intended quantum processor. These switches need to preserve quantum coherence, which makes them more challenging to realize than standard optical switches.
Finally, one requires a quantum repeater to transport qubits over long distances. Repeaters appear in-between end nodes. Since qubits cannot be copied, classical signal amplification is not possible. By necessity, a quantum repeater works in a fundamentally different way than a classical repeater.
Elements of a quantum network
End nodes: quantum processors
End nodes can both receive and emit information. Telecommunication lasers and parametric down-conversion combined with photodetectors can be used for quantum key distribution. In this case, the end nodes can in many cases be very simple devices consisting only of beamsplitters and photodetectors.
However, for many protocols more sophisticated end nodes are
desirable. These systems provide advanced processing capabilities and
can also be used as quantum repeaters. Their chief advantage is that
they can store and retransmit quantum information without disrupting the
underlying quantum state.
The quantum state being stored can either be the relative spin of an
electron in a magnetic field or the energy state of an electron. They can also perform quantum logic gates.
One way of realizing such end nodes is by using color centers in diamond, such as the nitrogen-vacancy center. This system forms a small quantum processor featuring several qubits. NV centers can be utilized at room temperatures. Small scale quantum algorithms and quantum error correction has already been demonstrated in this system, as well as the ability to entangle two remote quantum processors, and perform deterministic quantum teleportation.
Another possible platform are quantum processors based on Ion traps, which utilize radio-frequency magnetic fields and lasers. In a multispecies trapped-ion node network, photons entangled with a parent atom are used to entangle different nodes.
Also, cavity quantum electrodynamics (Cavity QED) is one possible
method of doing this. In Cavity QED, photonic quantum states can be
transferred to and from atomic quantum states stored in single atoms
contained in optical cavities. This allows for the transfer of quantum
states between single atoms using optical fiber in addition to the creation of remote entanglement between distant atoms.
Communication lines: physical layer
Over long distances, the primary method of operating quantum networks is to use optical networks and photon-based qubits. This is due to optical networks having a reduced chance of decoherence. Optical networks have the advantage of being able to re-use existing optical fiber.
Alternately, free space networks can be implemented that transmit
quantum information through the atmosphere or through a vacuum.
Fiber optic networks
Optical networks using existing telecommunication fiber
can be implemented using hardware similar to existing telecommunication
equipment. This fiber can be either single-mode or multi-mode, with
multi-mode allowing for more precise communication. At the sender, a single photon source can be created by heavily attenuating a standard telecommunication laser such that the mean number of photons per pulse is less than 1. For receiving, an avalanche photodetector can be used. Various methods of phase or polarization control can be used such as interferometers and beam splitters. In the case of entanglement based protocols, entangled photons can be generated through spontaneous parametric down-conversion. In both cases, the telecom fiber can be multiplexed to send non-quantum timing and control signals.
Free space networks
Free
space quantum networks operate similar to fiber optic networks but rely
on line of sight between the communicating parties instead of using a
fiber optic connection. Free space networks can typically support higher
transmission rates than fiber optic networks and do not have to account
for polarization scrambling caused by optical fiber. However, over long distances, free space communication is subject to an increased chance of environmental disturbance on the photons.
Importantly, free space communication is also possible from a satellite to the ground. A quantum satellite capable of entanglement distribution over a distance of 1,203 km
has been demonstrated. The experimental exchange of single photons from
a global navigation satellite system at a slant distance of 20,000 km
has also been reported. These satellites can play an important role in linking smaller ground-based networks over larger distances.
Repeaters
Long distance communication is hindered by the effects of signal loss and decoherence
inherent to most transport mediums such as optical fiber. In classical
communication, amplifiers can be used to boost the signal during
transmission, but in a quantum network amplifiers cannot be used since qubits cannot be copied – known as the no-cloning theorem. That is, to implement an amplifier, the complete state of the flying qubit would need to be determined, something which is both unwanted and impossible.
Trusted repeaters
An
intermediary step which allows the testing of communication
infrastructure are trusted repeaters. Importantly, a trusted repeater
cannot be used to transmit qubits over long distances. Instead, a trusted repeater can only be used to perform quantum key distribution
with the additional assumption that the repeater is trusted. Consider
two end nodes A and B, and a trusted repeater R in the middle. A and R
now perform quantum key distribution to generate a key . Similarly, R and B run quantum key distribution to generate a key . A and B can now obtain a key between themselves as follows: A sends to R encrypted with the key . R decrypts to obtain . R then re-encrypts using the key and sends it to B. B decrypts to obtain . A and B now share the key . The key is secure from an outside eavesdropper, but clearly the repeater R also knows .
This means that any subsequent communication between A and B does not
provide end to end security, but is only secure as long as A and B trust
the repeater R.
Quantum repeaters
A true quantum repeater allows the end to end generation of quantum entanglement, and thus - by using quantum teleportation - the end to end transmission of qubits. In quantum key distribution
protocols one can test for such entanglement. This means that when
making encryption keys, the sender and receiver are secure even if they
do not trust the quantum repeater. Any other application of a quantum
internet also requires the end to end transmission of qubits, and thus a quantum repeater.
Quantum repeaters allow entanglement and can be established at distant nodes without physically sending an entangled qubit the entire distance.
In this case, the quantum network consists of many short distance
links of perhaps tens or hundreds of kilometers. In the simplest case
of a single repeater, two pairs of entangled qubits are established: and located at the sender and the repeater, and a second pair and located at the repeater and the receiver. These initial entangled qubits can be easily created, for example through parametric down conversion, with one qubit physically transmitted to an adjacent node. At this point, the repeater can perform a bell measurement on the qubits and thus teleporting the quantum state of onto . This has the effect of "swapping" the entanglement such that and
are now entangled at a distance twice that of the initial entangled
pairs. It can be seen that a network of such repeaters can be used
linearly or in a hierarchical fashion to establish entanglement over
great distances.
Hardware platforms suitable as end nodes above can also function
as quantum repeaters. However, there are also hardware platforms
specific only to the task of acting as a repeater, without the capabilities of performing quantum gates.
Error correction
Error correction can be used in quantum repeaters. Due to
technological limitations, however, the applicability is limited to very
short distances as quantum error correction schemes capable of
protecting qubits over long distances would require an extremely large amount of qubits and hence extremely large quantum computers.
Errors in communication can be broadly classified into two types: Loss errors (due to optical fiber/environment) and operation errors (such as depolarization, dephasing etc.). While redundancy can be used to detect and correct classical errors, redundant qubits cannot be created due to the no-cloning theorem. As a result, other types of error correction must be introduced such as the Shor code
or one of a number of more general and efficient codes. All of these
codes work by distributing the quantum information across multiple
entangled qubits so that operation errors as well as loss errors can be corrected.
In addition to quantum error correction, classical error
correction can be employed by quantum networks in special cases such as
quantum key distribution. In these cases, the goal of the quantum
communication is to securely transmit a string of classical bits.
Traditional error correction codes such as Hamming codes can be applied to the bit string before encoding and transmission on the quantum network.
Entanglement purification
Quantum decoherence can occur when one qubit
from a maximally entangled bell state is transmitted across a quantum
network. Entanglement purification allows for the creation of nearly
maximally entangled qubits from a large number of arbitrary weakly entangled qubits, and thus provides additional protection against errors. Entanglement purification (also known as Entanglement distillation) has already been demonstrated in Nitrogen-vacancy centers in diamond.
Applications
A quantum internet supports numerous applications, enabled by quantum entanglement. In general, quantum entanglement is well suited for tasks that require coordination, synchronization or privacy.
Examples of such applications include quantum key distribution, clock synchronization, protocols for distributed system problems such as leader election or byzantine agreement, extending the baseline of telescopes, as well as position verification, secure identification and two-party cryptography in the noisy-storage model. A quantum internet also enables secure access to a quantum computer
in the cloud. Specifically, a quantum internet enables very simple
quantum devices to connect to a remote quantum computer in such a way
that computations can be performed there without the quantum computer
finding out what this computation actually is.
Secure communications
When it comes to communicating in any form the largest issue has always been keeping your communications private.
From when couriers were used to send letters between ancient battle
commanders to secure radio communications that exist today the main
purpose is to ensure that what a sender sends out to the receiver
reaches the receiver unmolested. This is an area in which Quantum
Networks particularly excel. By applying a quantum operator that the
user selects to a system of information the information can then be sent
to the receiver without a chance of an eavesdropper being able to
accurately be able to record the sent information without either the
sender or receiver knowing. This works because if a listener tries to
listen in then they will change the information in an unintended way by
listening thereby tipping their hand to the people on whom they are
attacking. Secondly, without the proper quantum operator to decode the
information they will corrupt the sent information without being able to
use it themselves.
Jamming protection
Quantum networks can also be used to protect against jamming. A user can use a quantum network by using frequency-hopping spread spectrum.
This method is currently used by the United States Army. In this method
the user hops from frequency to frequency many times a second so that
it is hard for an attacker to keep up and successfully attack the user. Direct-sequence spread spectrum
can be used by applying a quantum operator to the system and then
freely transmitting the information over the frequencies because an
attacker cannot read the information without knowing the key (a quantum
operator). These two techniques can be used together to produce a more
secure communications system.
Frequency-hopping spread spectrum
Frequency-hopping spread spectrum (FHSS) is a method of protecting
information transfer that involves the user switching from one frequency
to another frequency hundreds of times a second. For this method to
work one computer is set as the main computer and will regulate when the
other computers will switch frequencies and how often. By switching
frequencies hundreds of times a second a user can be assured that any
would be attacker will have an extremely hard time both trying to read
the data and trying to jam the frequency.
Direct-sequence spread spectrum
Direct-sequence spread spectrum (DSSS) is a method of protecting
information transfer that involves the user applying a predetermined
quantum operator to the information that is being sent so that only the
receiver and the sender can decipher the information using the operator.
This method makes it difficult for a potential listener to eavesdrop
because without the operator they will not be able to determine the
information. At the same time if a listener does try to decode the sent
information by doing so they will change the information which will
immediately tell the receiver that someone is listening to them.
Jamming
When using any computer to communicate with another computer the name
of the game is security. "Attackers", people who want to receive
information that was not intended for them or people who want to stop
the proper receiver of the transmission from receiving their
information. Quantum networks are particularly useful in this area as
there are many different types of jamming techniques that are found in
both classical and quantum systems.
Spot jamming
Spot jamming
is a process wherein an attacker fully attacks one frequency at a time.
For this method to be successful the attacker must send their
transmission with more power than the original sender. By doing this the
attacker will essentially overpower the original sender's message. The
problem with this method is that it takes a tremendous amount of power
to overpower a transmission as stated. Another issue with this method is
that the original sender can easily switch to another frequency and if
the original sender is using frequency-hopping spread spectrum the user will switch frequencies automatically with little hindrance to the original sender.
Sweep jamming
Sweep jamming
is similar to spot jamming except it switches rapidly from one
frequency to another in rapid succession. In this method the attacker is
still attacking by sending a much more powerful message at the same
time as the original sender. The advantage of this method over spot
jamming is that sweep jamming has a much larger chance of disrupting the
sender's frequency and costs the same amount of energy as spot.
Barrage jamming
Barrage jamming
is when an attacker attacks many frequencies at one time, but as the
range grows the ability to jam decreases. By attacking a few frequencies
at a time the attacker increases the change that they might hit one of
the sender's frequencies. The main problem with this method is that the
attacker's power is greatly lessened because they are attacking many
frequencies at once and therefore they decrease their power overall so
it is possible that the attacker could hit the sender's frequency and
not affect it due to the low power of their jamming frequency.
Current status
Quantum internet
At present, there is no network connecting quantum processors, or quantum repeaters deployed outside a lab.
Quantum key distribution networks
Several test networks have been deployed that are tailored to the task of quantum key distribution
either at short distances (but connecting many users), or over larger
distances by relying on trusted repeaters. These networks do not yet
allow for the end to end transmission of qubits or the end to end creation of entanglement between far away nodes.
Quantum network | Start | BB84 | BBM92 | E91 | DPS | COW |
---|---|---|---|---|---|---|
DARPA Quantum Network | 2001 | Yes | No | No | No | No |
SECOCQ QKD network in Vienna | 2003 | Yes | Yes | No | No | Yes |
Tokyo QKD network | 2009 | Yes | Yes | No | Yes | No |
Hierarchical network in Wuhu, China | 2009 | Yes | No | No | No | No |
Geneva area network (SwissQuantum) | 2010 | Yes | No | No | No | Yes |
- DARPA Quantum Network
- Starting in the early 2000s, DARPA began sponsorship of a quantum network development project with the aim of implementing secure communication. The DARPA Quantum Network became operational within the BBN Technologies laboratory in late 2003 and was expanded further in 2004 to include nodes at Harvard and Boston Universities. The network consists of multiple physical layers including fiber optics supporting phase-modulated lasers and entangled photons as well free-space links.
- SECOQC Vienna QKD network
- From 2003 to 2008 the Secure Communication based on Quantum Cryptography (SECOQC) project developed a collaborative network between a number of European institutions. The architecture chosen for the SECOQC project is a trusted repeater architecture which consists of point-to-point quantum links between devices where long distance communication is accomplished through the use of repeaters.
- Chinese hierarchical network
- In May 2009, a hierarchical quantum network was demonstrated in Wuhu, China. The hierarchical network consists of a backbone network of four nodes connecting a number of subnets. The backbone nodes are connected through an optical switching quantum router. Nodes within each subnet are also connected through an optical switch and are connected to the backbone network through a trusted relay.
- Geneva area network (SwissQuantum)
- The SwissQuantum network developed and tested between 2009 and 2011 linked facilities at CERN with the University of Geneva and hepia in Geneva. The SwissQuantum program focused on transitioning the technologies developed in the SECOQC and other research quantum networks into a production environment. In particular the integration with existing telecommunication networks, and its reliability and robustness.
- Tokyo QKD network
- In 2010, a number of organizations from Japan and the European Union setup and tested the Tokyo QKD network. The Tokyo network build upon existing QKD technologies and adopted a SECOQC like network architecture. For the first time, one-time-pad encryption was implemented at high enough data rates to support popular end-user application such as secure voice and video conferencing. Previous large-scale QKD networks typically used classical encryption algorithms such as AES for high-rate data transfer and use the quantum-derived keys for low rate data or for regularly re-keying the classical encryption algorithms.
- Beijing-Shanghai Trunk Line
- In September 2017, a 2000-km quantum key distribution network between Beijing and Shanghai, China, was officially opened. This trunk line will serve as a backbone connecting quantum networks in Beijing, Shanghai, Jinan in Shandong province and Hefei in Anhui province. During the opening ceremony, two employees from the Bank of Communications completed a transaction from Shanghai to Beijing using the network. The State Grid Corporation of China is also developing a managing application for the link. The line uses 32 trusted nodes as repeaters. A quantum telecommunication network has been also put into service in Wuhan, capital of central China's Hubei Province, which will be connected to the trunk. Other similar city quantum networks along the Yangtze River are planned to follow.