This repository has been archived by the owner on Jan 9, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 8
/
draft-irtf-qirg-principles-03.txt
1568 lines (1095 loc) · 66.2 KB
/
draft-irtf-qirg-principles-03.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Quantum Internet Research Group W. Kozlowski
Internet-Draft S. Wehner
Intended status: Informational QuTech
Expires: August 29, 2020 R. Van Meter
Keio University
B. Rijsman
Individual
A. S. Cacciapuoti
M. Caleffi
University of Naples Federico II
February 26, 2019
Architectural Principles for a Quantum Internet
draft-irtf-qirg-principles-03
Abstract
The vision of a quantum internet is to fundamentally enhance Internet
technology by enabling quantum communication between any two points
on Earth. To achieve this goal, a quantum network stack should be
built from the ground up as the physical nature of the communication
is fundamentally different. The first realisations of quantum
networks are imminent, but there is no practical proposal for how to
organise, utilise, and manage such networks. In this memo, we
attempt lay down the framework and introduce some basic architectural
principles for a quantum internet. This is intended for general
guidance and general interest, but also to provide a foundation for
discussion between physicists and network specialists.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 29, 2020.
Kozlowski, et al. Expires August 29, 2020 [Page 1]
Internet-Draft Principles for a Quantum Internet February 2019
Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Quantum information . . . . . . . . . . . . . . . . . . . . . 4
2.1. Qubit . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.2. Multiple qubits . . . . . . . . . . . . . . . . . . . . . 5
3. Entanglement as the fundamental resource . . . . . . . . . . 6
4. Achieving quantum connectivity . . . . . . . . . . . . . . . 8
4.1. Challenges . . . . . . . . . . . . . . . . . . . . . . . 8
4.1.1. The measurement problem . . . . . . . . . . . . . . . 8
4.1.2. No-cloning theorem . . . . . . . . . . . . . . . . . 8
4.1.3. Fidelity . . . . . . . . . . . . . . . . . . . . . . 9
4.2. Direct transmission . . . . . . . . . . . . . . . . . . . 9
4.3. Bell pairs . . . . . . . . . . . . . . . . . . . . . . . 10
4.4. Teleportation . . . . . . . . . . . . . . . . . . . . . . 10
4.5. The life cycle of entanglement . . . . . . . . . . . . . 11
4.5.1. Elementary link generation . . . . . . . . . . . . . 11
4.5.2. Entanglement swapping . . . . . . . . . . . . . . . . 12
4.5.3. Distillation . . . . . . . . . . . . . . . . . . . . 13
4.5.4. Delivery . . . . . . . . . . . . . . . . . . . . . . 14
5. Architecture of a quantum internet . . . . . . . . . . . . . 14
5.1. New challenges . . . . . . . . . . . . . . . . . . . . . 14
5.2. Classical communication . . . . . . . . . . . . . . . . . 15
5.3. Abstract model of the network . . . . . . . . . . . . . . 16
5.3.1. Elements of a quantum network . . . . . . . . . . . . 16
5.3.2. Putting it all together . . . . . . . . . . . . . . . 17
5.4. Network boundaries . . . . . . . . . . . . . . . . . . . 18
5.4.1. Boundaries between different physical architectures . 18
5.4.2. Boundaries between different administrative regions . 18
5.5. Physical constraints . . . . . . . . . . . . . . . . . . 19
5.5.1. Memory lifetimes . . . . . . . . . . . . . . . . . . 19
5.5.2. Rates . . . . . . . . . . . . . . . . . . . . . . . . 19
5.5.3. Communication qubits . . . . . . . . . . . . . . . . 20
Kozlowski, et al. Expires August 29, 2020 [Page 2]
Internet-Draft Principles for a Quantum Internet February 2019
5.5.4. Homogeneity . . . . . . . . . . . . . . . . . . . . . 20
6. Architectural principles . . . . . . . . . . . . . . . . . . 20
6.1. Goals of a quantum internet . . . . . . . . . . . . . . . 20
6.2. The principles of a quantum internet . . . . . . . . . . 23
7. Security Considerations . . . . . . . . . . . . . . . . . . . 25
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 25
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 25
10. Informative References . . . . . . . . . . . . . . . . . . . 25
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 27
1. Introduction
Quantum networks are distributed systems of quantum devices that
utilise fundamental quantum mechanical phenomena such as
superposition, entanglement, and quantum measurement to achieve
capabilities beyond what is possible with classical networks.
Depending on the stage of a quantum network [5] such devices may be
simple photonic devices capable of preparing and measuring only one
quantum bit (qubit) at a time, all the way to large-scale quantum
computers of the future. A quantum network is not meant to replace
classical networks, but rather form an overall hybrid classical
quantum network supporting new capabilities which are otherwise
impossible to realise. This new networking paradigm offers promise
for a range of new applications such as secure communications [1],
distributed quantum computation [2], or quantum sensor networks [3].
The field of quantum communication has been a subject of active
research for many years and the most well-known application of
quantum communication, quantum key distribution (QKD) for secure
communications, has already been deployed at short (roughly 100km)
distances.
Fully quantum networks capable of transmitting and managing entangled
quantum states in order to send, receive, and manipulate distributed
quantum information are now imminent [4] [5]. Whilst a lot of effort
has gone into physically realising and connecting such devices, and
making improvements to their speed and error tolerance there are no
worked out proposals for how to run these networks. To draw an
analogy with a classical network, we are at a stage where we can
start to physically connect our devices and send data, but all
sending, receiving, buffer management, connection synchronisation,
and so on, must be managed by the application itself at what is even
lower than assembly level where no common interfaces yet exist.
Furthermore, whilst physical mechanisms for transmitting quantum
states exist, there are no robust protocols for managing such
transmissions.
Kozlowski, et al. Expires August 29, 2020 [Page 3]
Internet-Draft Principles for a Quantum Internet February 2019
2. Quantum information
In order to understand the framework for quantum networking a basic
understanding of quantum information is necessary. The following
sections aim to introduce the bare minimum necessary to understand
the principles of operation of a quantum network. This exposition
was written with a classical networking audience in mind. It is
assumed that the reader has never before been exposed to any quantum
physics. We refer to e.g. [10] for an in-depth introduction to
quantum information.
2.1. Qubit
The differences between quantum computation and classical computation
begin at the bit-level. A classical computer operates on the binary
alphabet { 0, 1 }. A quantum bit, a qubit, exists over the same
binary space, but unlike the classical bit, it can exist in a so-
called superposition of the two possibilities:
a |0> + b |1>,
where |X> denotes a quantum state, here the binary 0 and 1, and the
coefficients a and b are complex numbers called probability
amplitudes. Physically, such a state can be realised using a variety
of different technologies such as electron spin, photon polarisation,
atomic energy levels, and so on.
Upon measurement, the qubit loses its superposition and irreversibly
collapses into one of the two basis states, either |0> or |1>. Which
of the two states it ends up in is not deterministic, but it can be
determined from the readout of the measurement, a classical bit, 0 or
1 respectively. The probability of measuring the state in the |0>
state is |a|^2 and similarly the probability of measuring the state
in the |1> state is |b|^2, where |a|^2 + |b|^2 = 1. This randomness
is not due to our ignorance of the underlying mechanisms, but rather
it is a fundamental feature of a quantum mechanical system [6].
The superposition property plays an important role in fundamental
gate operations on qubits. Since a qubit can exist in a
superposition of its basis states, the elementary quantum gates are
able to act on all states of the superposition at the same time. For
example, consider the NOT gate:
NOT (a |0> + b |1>) -> a |1> + b |0>.
Kozlowski, et al. Expires August 29, 2020 [Page 4]
Internet-Draft Principles for a Quantum Internet February 2019
2.2. Multiple qubits
When multiple qubits are combined in a single quantum state the space
of possible states grows exponentially and all these states can
coexist in a superposition. For example, the general form of a two-
qubit register is
a |00> + b |01> + c |10> + d |11>
where the coefficients have the same probability amplitude
interpretation as for the single qubit state. Each state represents
a possible outcome of a measurement of the two-qubit register. For
example, |01>, denotes a state in which the first qubit is in the
state |0> and the second is in the state |1>.
Performing single qubit gates affects the relevant qubit in each of
the superposition states. Similarly, two-qubit gates also act on all
the relevant superposition states, but their outcome is far more
interesting.
Consider a two-qubit register where the first qubit is in the
superposed state (|0> + |1>)/sqrt(2) and the other is in the
state |0>. This combined state can be written as:
(|0> + |1>)/sqrt(2) x |0> = (|00> + |10>)/sqrt(2),
where x denotes a tensor product (the mathematical mechanism for
combining quantum states together). Let us now consider the two-
qubit CNOT gate. The CNOT gate takes as input two qubits, a control
and target, and applies the NOT gate to the target if the control
qubit is set. The truth table looks like
+----+-----+
| IN | OUT |
+----+-----+
| 00 | 00 |
| 01 | 01 |
| 10 | 11 |
| 11 | 10 |
+----+-----+
Now, consider performing a CNOT gate on the ensemble with the first
qubit being the control. We apply a two-qubit gate on all the
superposition states:
CNOT (|00> + |10>)/sqrt(2) -> (|00> + |11>)/sqrt(2).
Kozlowski, et al. Expires August 29, 2020 [Page 5]
Internet-Draft Principles for a Quantum Internet February 2019
What is so interesting about this two-qubit gate operation? The
final state is *entangled*. There is no possible way of representing
that quantum state as a product of two individual qubits, they are no
longer independent and their behaviour cannot be fully described
without accounting for the other qubit. The states of the two
individual qubits are now correlated beyond what is possible to
achieve classically. Neither qubit is in a definite |0> or |1>
state, but if we perform a measurement on either one, the outcome of
the partner qubit will *always* yield the exact same outcome. The
final state, whether it's |00> or |11>, is fundamentally random as
before, but the states of the two qubits following a measurement will
always be identical.
Once a measurement is performed, the two qubits are once again
independent. The final state is either |00> or |11> and both of
these states can be trivially decomposed into a product of two
individual qubits. The entanglement has been consumed and if the
same measurement is to be repeated, the entangled state must be
prepared again.
3. Entanglement as the fundamental resource
Entanglement is the fundamental building block of quantum networks.
To see this, consider the state from the previous section:
(|00> + |11>)/sqrt(2).
Neither of the two qubits is in a definite |0> or |1> state and we
need to know the state of the entire register to be able to fully
describe the behaviour of the two qubits.
Entangled qubits have interesting non-local properties. Consider
sending one of the qubits to another device. This device could in
principle be anywhere: on the other side of the room, in a different
country, or even on a different planet. Provided negligible noise
has been introduced, the two qubits will forever remain in the
entangled state until a measurement is performed. The physical
distance does not matter at all for entanglement.
This lies at the heart of quantum networking, because it is possible
to leverage the non-classical correlations provided by entanglement
in order to design completely new types of application protocols that
are not possible to achieve with just classical communication.
Examples of such applications are quantum cryptography, blind quantum
computation, or distributed quantum computation.
Kozlowski, et al. Expires August 29, 2020 [Page 6]
Internet-Draft Principles for a Quantum Internet February 2019
Entanglement has two very special features from which one can derive
some intuition about the types of applications enabled by a quantum
network.
The first stems from the fact that entanglement enables stronger than
classical correlations, leading to opportunities for tasks that
require coordination. As a trivial example consider the problem of
consensus between two nodes who want to agree on the value of a
single bit. They can use the quantum network to prepare the state
(|00> + |11>)/sqrt(2) with each node holding one of the two qubits.
Once any of the two nodes performs a measurement the state of the two
qubits collapses to either |00> or |11> so whilst the outcome is
random and does not exist before measurement, the two nodes will
always measure the same value. We can also build the more general
multi-qubit state (|00...> + |11...>)/sqrt(2) and perform the same
algorithm between an arbitrary number of nodes. These stronger than
classical correlations generalise to more complicated measurement
schemes as well.
The second feature of entanglement is that it cannot be shared, in
the sense that if two qubits are maximally entangled with each other,
than it is physically impossible for any other system to have any
share of this entanglement. Hence, entanglement forms a sort of
private and inherently untappable connection between two nodes once
established.
Entanglement is created through local interactions between two qubits
or as a product of the way the qubits were created (e.g. entangled
photon pairs). To create a distributed entangled state one can then
physically send one of the qubits to a remote node. It is also
possible to directly entangle qubits that are physically separated,
but this still requires local interactions between some other qubits
that the separated qubits are initially entangled with. Therefore,
it is the transmission of qubits that draws the line between a
genuine quantum network and a collection of quantum computers
connected over a classical network.
A quantum network is defined as a collection of nodes that is able to
exchange qubits and distribute entangled states amongst themselves.
A quantum node that is able only to communicate classically with
another quantum node is not a member of a quantum network.
More complex services and applications can be built on top of
entangled states distributed by the network, see e.g. [5]>
Kozlowski, et al. Expires August 29, 2020 [Page 7]
Internet-Draft Principles for a Quantum Internet February 2019
4. Achieving quantum connectivity
This section explains the meaning of quantum connectivity and the
necessary physical processes at an abstract level.
4.1. Challenges
A quantum network cannot be built by simply extrapolating all the
classical models to their quantum analogues. One cannot just send
qubits like one can send bits over a wire. There are several
technological as well as fundamental challenges that make classical
approaches unsuitable in a quantum context.
4.1.1. The measurement problem
In classical computers and networks we can read out the bits stored
in memory at any time. This is helpful for a variety of purposes
such as copying, error detection and correction, and so on. This is
not possible with qubits.
A measurement of a qubit's state will destroy its superposition and
with it any entanglement it may have been part of. Once a qubit is
being processed, it cannot be read out until a suitable point in the
computation, determined by the protocol handling the qubit, has been
reached. Therefore, we cannot use the same methods known from
classical computing for the purposes of error detection and
correction.
4.1.2. No-cloning theorem
Since directly reading the state of a qubit is not possible, one
could ask the question if we can simply copy a qubit without looking
at it. Unfortunately, this is fundamentally not possible in quantum
mechanics.
The no-cloning theorem states that it is impossible to create an
identical copy of an arbitrary unknown quantum state. Therefore, it
is also impossible to use the same mechanisms that worked for
classical networks for signal amplification, retransmission, and so
on as they all rely on the ability to copy the underlying data.
Since any physical channel will always be lossy, connecting nodes
within a quantum network is a challenging endeavour and its
architecture must at its core address this very issue.
Kozlowski, et al. Expires August 29, 2020 [Page 8]
Internet-Draft Principles for a Quantum Internet February 2019
4.1.3. Fidelity
In general, it is expected that a classical packet arrives at its
destination without any errors introduced by hardware noise along the
way. This is verified at various levels through a variety of
checksums. Since we cannot read or copy a quantum state a similar
approach is out of question for quantum networks.
To describe the quality of a quantum state a physical quantity called
fidelity is used. Fidelity takes a value between 0 and 1 -- higher
is better, and less than 0.5 means the state is unusable. It
measures how close a quantum state is to the state we desire it to be
in. It expresses the probability that one state will pass a test to
identify as the other. Fidelity is an important property of a
quantum system that allows us to quantify how much a particular state
has been affected by noise from various sources (gate errors, channel
losses, environment noise).
Interestingly, quantum applications do not need perfect fidelity to
be able to execute -- as long as it is above some application-
specific threshold, they will simply operate at lower rates.
Therefore, rather than trying to ensure that we always deliver
perfect states (a technologically challenging task) applications will
specify a minimum threshold for the fidelity and the network will try
its best to deliver it.
4.2. Direct transmission
Conceptually, the most straightforward way to distribute an entangled
state is to simply transmit one of the qubits directly to the other
end across a series of nodes while performing sufficient forward
quantum error correction to bring losses down to an acceptable level.
Despite the no-cloning theorem and the inability to directly measure
a quantum state, error-correcting mechanisms for quantum
communication exist [7]. However, quantum error correction makes
very high demands on both resources (physical qubits needed) and
their initial fidelity. Implementation is very challenging and
quantum error correction is not expected to be used until later
generations of quantum networks.
An alternative relies on the observation that we do not need to be
able to distribute any arbitrary entangled quantum state. We only
need to be able to distribute any one of what are known as the Bell
pair states[12].
Kozlowski, et al. Expires August 29, 2020 [Page 9]
Internet-Draft Principles for a Quantum Internet February 2019
4.3. Bell pairs
Bell pair states are the entangled two-qubit states:
|00> + |11>,
|00> - |11>,
|01> + |10>,
|01> - |10>,
where the constant 1/sqrt(2) normalisation factor has been ignored
for clarity. Any of the four Bell pair states above will do, as it
is possible to transform any Bell pair into another Bell pair with
local operations performed on only one of the qubits. That is,
either of the nodes that hold the two qubits of the Bell pair can
apply a series of single qubit gates to just their qubit in order to
transform the ensemble between the different variants.
Distributing a Bell pair between two nodes is much easier than
transmitting an arbitrary quantum state over a network. Since the
state is known handling errors becomes easier and small-scale error-
correction (such as entanglement distillation discussed in a later
section) combined with reattempts becomes a valid strategy.
The reason for using Bell pairs specifically as opposed to any other
two-qubit state, is that they are the maximally entangled two-qubit
set of basis states. Maximal entanglement means that these states
have the strongest non-classical correlations of all possible two-
qubit states. Furthermore, since single-qubit local operations can
never increase entanglement, less entangled states would impose some
constraints on distributed quantum algorithms. This makes Bell pairs
particularly useful as a generic building block for distributed
quantum applications.
4.4. Teleportation
The observation that we only need to be able to distribute Bell pairs
relies on the fact that this enables the distribution of any other
arbitrary entangled state. This can be achieved via quantum state
teleportation. Quantum state teleportation consumes an unknown
quantum state that we want to transmit and recreates it at the
desired destination. This does not violate the no-cloning theorem as
the original state is destroyed in the process.
To achieve this, an entangled pair needs to be distributed between
the source and destination before teleportation commences. The
source then entangles the transmission qubit with its end of the pair
and performs a read out on the two qubits (the sum of these
operations is called a Bell state measurement). This consumes the
Kozlowski, et al. Expires August 29, 2020 [Page 10]
Internet-Draft Principles for a Quantum Internet February 2019
Bell pair's entanglement turning the source and destination qubits
into independent states. The measurements yields two classical bits
which the source sends to the destination over a classical channel.
Based on the value of the received two classical bits, the
destination performs one of four possible corrections (called the
Pauli corrections) on its end of the pair which turns it into the
unknown quantum state that we wanted to transmit.
The unknown quantum state that was transmitted was never fed into the
network itself. Therefore, the network needs to only be able to
reliably produce Bell pairs between any two nodes in the network.
4.5. The life cycle of entanglement
Reducing the problem of quantum connectivity to one of generating a
Bell pair has facilitated the problem, but it has not solved it. In
this section we discuss, how these entangled pairs are generated in
the first place, and how its two qubits are delivered to the end-
points.
4.5.1. Elementary link generation
In a quantum network, entanglement is always first generated locally
(at a node or an auxiliary element) followed by a movement of one or
both of the entangled qubits across the link through quantum
channels. In this context, photons (particles of light) are the
natural candidate for entanglement carriers, the so-called flying
qubits. The rationale for this choice is related to the advantages
provided by photons such as moderate interaction with the environment
leading to moderate decoherence, convenient control with standard
optical components, and high-speed low-loss transmissions. However,
since photons cannot be stored, a transducer must transfer the flying
qubit's state to a qubit suitable for information processing and/or
storage (often referred to as a matter qubit).
Since this process may fail, in order to generate and store
entanglement efficiently, we must be able to distinguish successful
attempts from failures. Entanglement generation schemes that are
able to announce successful generation are called heralded
entanglement generation schemes.
There exist three basic schemes for heralded entanglement generation
on a link through coordinated action of the two nodes at the two ends
of the link [13]:
o "At mid-point" scheme: the key idea is that an entangled pair
source sends an entangled photon through a quantum channel to each
of the nodes, where transducers are invoked to transfer the
Kozlowski, et al. Expires August 29, 2020 [Page 11]
Internet-Draft Principles for a Quantum Internet February 2019
entanglement from the flying qubits to the matter qubits. In this
scheme, the transducers know if the transfers succeeded and are
able to herald successful entanglement generation via a message
exchange over the classical channel.
o "At source" scheme: the key idea is that one of the two nodes
sends a flying qubit that is entangled with one of its matter
qubits. A transducer at the other end of the link will transfer
the entanglement from the flying qubit to one of its matter
qubits. Also in this scheme, the transducer knows if its transfer
succeeded and is able to herald successful entanglement generation
with a classical message sent to the other node.
o "At both end-points" scheme: the key idea is that both nodes send
a flying qubit that is entangled with one of their matter qubits.
A detector somewhere in between the nodes performs a joint
measurement on the two qubits, which stochastically projects the
remote matter qubits into an entangled quantum state. In this
scheme, the detector knows if the entanglement succeeded and is
able to herald successful entanglement generation by sending a
message to each node over the classical channel.
The "mid-point" scheme is more robust to photon loss, but in the
other schemes the nodes retain greater control over the entangled
pair generation.
4.5.2. Entanglement swapping
The problem with generating entangled pairs directly across a link is
that its efficiency decreases with its length. Beyond a few 10s of
kms in optical fibre or 1000 kms in free space (via satellite) the
rate is effectively zero and due to the no-cloning theorem we cannot
simply amplify the signal. The solution is entanglement swapping.
A Bell pair between any two nodes in the network can be constructed
by combining the pairs generated along each individual link on the
path between the two end-points. Each node along the path can
consume the two pairs on the two links that it is connected to in
order to produce a new entangled Pair between the two remote ends.
This process is known as entanglement swapping. Pictorially it can
be represented as follows:
+---------+ +---------+ +---------+
| A | | B | | C |
| |------| |------| |
| X1~~~~~~~~~~X2 Y1~~~~~~~~~~Y2 |
+---------+ +---------+ +---------+
Kozlowski, et al. Expires August 29, 2020 [Page 12]
Internet-Draft Principles for a Quantum Internet February 2019
where X1 and X2 are the qubits of the entangled pair X and Y1 and Y2
are the qubits of entangled pair Y. The entanglement is denoted with
~~. In the diagram above nodes A and B share the pair X and nodes B
and C share the pair Y, but we want entanglement between A and C.
To achieve this goal we simply teleport the qubit X2 using the pair
Y. This requires node B to performs a Bell state measurement on the
qubits X2 and Y1 which result in the destruction of the entanglement
between Y1 and Y2. However, X2 is transmitted and recreated in Y2's
place carrying with it its entanglement with X1. The end-result is
shown below:
+---------+ +---------+ +---------+
| A | | B | | C |
| |------| |------| |
| X1~~~~~~~~~~~~~~~~~~~~~~~~~~~X2 |
+---------+ +---------+ +---------+
Depending on the needs of the network and/or application a final
Pauli correction at the recipient node may not be necessary since the
result of this operation is also a Bell pair. However, the two
classical bits that form the read out from the measurement at node B
must still be communicated, because they carry information about
which of the four Bell pairs was actually produced. If a correction
is not performed, the recipient must be informed which Bell pair was
received.
This process of teleporting Bell pairs using other entangled pairs is
called entanglement swapping. Quantum nodes that create long-
distance entangled pairs via entanglement swapping are called quantum
repeaters in academic literature [12] and we will use the same
terminology in this memo.
4.5.3. Distillation
Neither the generation of Bell pairs nor the swapping operations are
noiseless operations. Therefore, with each link and each swap the
fidelity of the state degrades. However, it is possible to create
higher fidelity Bell pair states from two or more lower fidelity
pairs through a process called distillation (sometimes also referred
to as purification).
To distil a quantum state, a second (and sometimes third) quantum
state is used as a "test tool" to test a proposition about the first
state, e.g., "the parity of the first state is even." When the test
succeeds, confidence in the state is improved, and thus the fidelity
is improved. The test tool states are destroyed in the process, so
resource demands increase substantially when distillation is used.
Kozlowski, et al. Expires August 29, 2020 [Page 13]
Internet-Draft Principles for a Quantum Internet February 2019
When the test fails, the tested state must also be discarded.
Distillation makes low demands on fidelity and resources, but
distributed protocols incur round-trip delays [11].
4.5.4. Delivery
Eventually the Bell pairs must be delivered to an application (or
higher layer protocol) at the two end-nodes. A detailed list of such
requirements is beyond the scope of this memo. At minimum, the end-
nodes require information to map a particular Bell pair to the qubit
in their local memory that is part of this entangled pair.
5. Architecture of a quantum internet
It is evident from the previous sections that the fundamental service
provided by a quantum network significantly differs from that of a
classical network. Therefore, it is not surprising that the
architecture of a quantum internet will itself be very different from
that of the classical Internet.
5.1. New challenges
This subsection covers the major fundamental challenges building
quantum networks. Here, we only describe the fundamental
differences, technological limitations are described later.
1. Bell pairs are not equivalent to payload carrying packets.
In most classical networks, including Ethernet, Internet Protocol
(IP), and Multi-Protocol Label Switching (MPLS) networks, user
data is grouped into packets. In addition to the user data each
packet also contains a series of headers which contain the
control information that lets routers and switches forward it
towards its destination. Packets are the fundamental unit in a
classical network.
In a quantum network the entangled pairs of qubits are the basic
unit of networking. These pairs are handled individually -- they
are not grouped into packets and they do not carry any headers.
Therefore, quantum networks will have to send all control
information via separate classical channels which the repeaters
will have to correlate with the qubits stored in their memory.
2. An entangled pair is only useful if the locations of both qubits
are known.
A classical network packet logically exists only at one location
at any point in time. If a packet is modified in some way,
Kozlowski, et al. Expires August 29, 2020 [Page 14]
Internet-Draft Principles for a Quantum Internet February 2019
headers or payload, this information does not need to be conveyed
to anybody else in the network. The packet can be simply
forwarded as before.
In contrast, entanglement is a phenomenon in which two or more
qubits exist in a physically distributed state. Operations on
one of the qubits change the mutual state of the pair. Since the
owner of a particular qubit cannot just read out its state, it
must coordinate all its actions with the owner of the pair's
other qubit. Therefore, the owner of any qubit that is part of
an entangled pair must know the location of its counterpart.
Location, in this context, need not be the explicit spatial
location. A relevant pair identifier, a means of communication
between the pair owners, and an association between the pair ID
and the individual qubits is sufficient.
3. Generating entanglement requires temporary state.
Packet forwarding in a classical network is largely a stateless
operation. When a packet is received, the router looks up its
forwarding table and sends the packet out of the appropriate
output. There is no need to keep any memory of the packet any
more.
A quantum node must be able to make decisions about qubits that
it receives and is holding in its memory. Since qubits do not
carry headers, the receipt of an entangled pair conveys no
control information based on which the repeater can make a
decision. The relevant control information will arrive
separately over a classical channel. This implies that a
repeater must store temporary state as the control information
and the qubit it pertains to will, in general, not arrive at the
same time.
5.2. Classical communication
In this memo we have already covered two different roles that
classical communication must perform:
o communicate classical bits of information as part of distributed
protocols such as entanglement swapping and teleportation,
o communicate control information within a network - this includes
both background protocols such as routing as well as signalling
protocols to set up end-to-end entanglement generation.
Classical communication is a crucial building block of any quantum
network. All nodes in a quantum network are assumed to have
Kozlowski, et al. Expires August 29, 2020 [Page 15]
Internet-Draft Principles for a Quantum Internet February 2019
classical connectivity with each other (within typical administrative
domain limts). Therefore, quantum routers will need to manage two
data planes in parallel, a classical one and a quantum one.
Additionally, it must be able to correlate information between them
so that the control information received on a classical channel can
be applied to the qubits managed by the quantum data plane.
5.3. Abstract model of the network
5.3.1. Elements of a quantum network
We have identified quantum repeaters as the core building block of a
quantum network. However, a quantum repeater will have to do more
than just entanglement swapping in a functional quantum network. Its
key responsibilities will include:
1. Creating link-local entanglement between neighbouring nodes.
2. Extending entanglement from link-local pairs to long-range pairs
through entanglement swapping.
3. Performing distillation to manage the fidelity of the produced
pairs
4. Participate in the management of the network (routing etc.).
Not all quantum repeaters in the network will be the same, here we
break them down further:
o Quantum routers (controllable quantum nodes) - A quantum router is
a quantum repeater with a control plane that participates in the
management of the network and will make decisions about which
qubits to swap to generate the requested end-to-end pairs.
o Automated quantum nodes - An automated quantum node is a data
plane only quantum repeater that does not participate in network
management. Since the no-cloning theorem precludes the use of
amplification long-range links will be established by chaining
multiple such automated nodes together.
o End-nodes - End-nodes in a quantum network must be able to receive
and handle an entangled pair, but they do not need to be able to
perform an entanglement swap (and thus are not necessarily quantum
repeaters). End-nodes are also not required to have any quantum
memory as certain quantum applications can be realised by having
the end-node measure its qubit as soon as it is received.
Kozlowski, et al. Expires August 29, 2020 [Page 16]
Internet-Draft Principles for a Quantum Internet February 2019
o Non-quantum nodes - Not all nodes in a quantum network need to
have a quantum data plane. A non-quantum node is any device that
can handle classical network traffic.
Additionally, we need to identify two kinds of links that will be
used in a quantum network:
o Quantum links - A quantum link is a link which can be used to
generate an entangled pair between two directly connected quantum
repeaters. It may include a dedicated classical channel that is
to be used solely for the purpose of coordinating the entanglement
generation on this quantum link.
o Classical links - A classical link is a link between any node in
the network that is capable of carrying classical network traffic.
5.3.2. Putting it all together
A two-hop path in a generic quantum network can be represented as:
| App |-------------------CC-------------------| App |
|| ||
------ ------ ------
| EN |----QC & CC----| QR |----QC & CC----| EN |
------ ------ ------
App - user-level application
QR - quantum repeater
EN - end-node
QC - quantum channel
CC - classical channel
An application running on two end-nodes attached to a network will at
some point need the network to generate entangled pairs for its use.
This will require negotiation between the end-nodes, because they
must both open a communication end-point (a quantum socket) which the
network can use to identify the two ends of the connection. The two
end-nodes use the classical connectivity available in the network to
achieve this goal.
When the network receives a request to generate end-to-end entangled
pairs it uses the classical communication channels to coordinate and
claim the resources necessary to fulfil this request. This may be
some combination of prior control information (e.g. routing tables)
and signalling protocols, but the details of how this is achieved are
an active research question and thus beyond the scope of this memo.
Kozlowski, et al. Expires August 29, 2020 [Page 17]
Internet-Draft Principles for a Quantum Internet February 2019
During or after the control information is distributed the network
performs the necessary quantum operations such as generating
entangled over individual links, performing entanglement swaps, and
further signalling to transmit the swap outcomes and other control
information. Since none of the entangled pairs carry any user data,
some of these operations can be performed before the request is
received in anticipation of the demand.
The entangled pair is delivered to the application once it is ready,
together with the relevant pair identifier. However, being ready
does not necessarily mean once all link pairs and entanglement swaps
are complete as some applications can start executing on an
incomplete pair. In this case the remaining entanglement swaps will
propagate the actions across the network to the other end.
5.4. Network boundaries
Just like classical network, there will various boundaries will exist
in quantum networks.
5.4.1. Boundaries between different physical architectures
There are many different physical architectures for implementing
quantum repeater technology. The different technologies differ in
how they store and manipulate qubits in memory and how they generate
entanglement across a link with their neighbours. Different
architectures come with different trade-offs and thus a functional
network will likely consist of a mixture of different types of
quantum repeaters.
For example, architectures based on optical elements and atomic
ensembles are very efficient at generating entanglement, but provide
little control over the qubits once the pair is generated. On the
other hand nitrogen-vacancy architectures offer a much greater degree
of control over qubits, but have a harder time generating the
entanglement across a link.
It is an open research question where exactly the boundary will lie.
It could be that a single quantum repeater node provides some
backplane connection between the architectures, but it also could be
that special quantum links delineate the boundary.
5.4.2. Boundaries between different administrative regions