Next Article in Journal
Development of Efficient and Accurate Parallel Computation Algorithm Using Moving Overset Grids on Background Multi-Domains for Complex Two-Phase Flows
Previous Article in Journal
Establishing an ANN-Based Risk Model for Ground Subsidence Along Railways
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

EntangleNet: Theoretical Reestablishment of Entanglement in Quantum Networks

by
Mihai-Zicu Mina
and
Pantelimon George Popescu
*,‡
Computer Science and Engineering Department, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, 060042 Bucharest, Romania
*
Author to whom correspondence should be addressed.
To Octavian Stănășilă on his 80th birthday.
These authors contributed equally to this work.
Appl. Sci. 2018, 8(10), 1935; https://doi.org/10.3390/app8101935
Submission received: 6 September 2018 / Revised: 4 October 2018 / Accepted: 14 October 2018 / Published: 16 October 2018
(This article belongs to the Section Quantum Science and Technology)

Abstract

:
In the practical context of quantum networks, the most reliable method of transmitting quantum information is via teleportation because quantum states are highly sensitive. However, teleportation consumes a shared maximally entangled state. Two parties Alice and Bob located at separate nodes that wish to reestablish their shared entanglement will not send entangled qubits directly to achieve this goal, but rather employ a more efficient mechanism that ensures minimal time resources. In this paper, we present a quantum routing scheme that exploits entanglement swapping to reestablish consumed entanglement. It improves and generalizes previous work on the subject and reduces the entanglement distribution time by a factor of 4 k in an arbitrary scale quantum network, where N = 4 k - 1 is a required number of quantum nodes located between source and destination. In addition, k is the greatest positive integer considered by Alice or Bob, such that afterwards they choose N quantum switches.

1. Introduction

Quantum teleportation is a communication protocol introduced by Bennett et al. [1] and represents a major result in the field of quantum information. It allows perfect transmission of an unknown qubit between two spatially separated parties (whom we shall call Alice and Bob), provided that classical information is exchanged and a previously shared maximally entangled pair of particles exists between them [1,2,3]. Quantum entanglement is one of the most peculiar aspects exhibited by nature and an essential resource for teleportation. Shared maximal entanglement is required to achieve faithful teleportation; however, an inherent limitation is that this highly valuable resource is lost afterwards. In such context, shared entanglement as an informational resource is expressed in a quantitative manner as one entanglement bit or 1 ebit [2,4]. The teleportation scheme is part of a paradigm known as local operations and classical communication (LOCC), with additional shared entanglement allowed. This means that Alice and Bob share an entangled pair of particles, can manipulate their own qubits at will (LO) and can only exchange classical bits of information (CC). An important drawback of the protocol is closely related to properties of entanglement under LOCC; specifically, one shared ebit is necessary for faithful teleportation and the amount of shared entanglement cannot be increased by local operations and classical communication [2,4,5,6,7,8]. A consequence of these constraints is the consumption of one shared ebit when teleporting one qubit, thus entanglement between Alice and Bob is lost.
Alice and Bob are thought to be part of an extended quantum network infrastructure, with quantum channels providing communication links between adjacent nodes. Physical transmission of particles through these inherently noisy channels will definitely alter the encoded quantum information they wish to exchange. Teleportation proves to solve this problem by accurately transmitting a qubit from one place to another, regardless of distance and without any physical transport. However, it requires a maximally entangled pair of particles to be shared between source and destination; therefore, a crucial aspect of a future large scale quantum network is the task of reliably distributing entanglement to any two nodes in need of exchanging quantum information via teleportation.
We have chosen to devise a theoretical entanglement distribution protocol based on quantum routing that manages to resupply any two nodes Alice and Bob in a quantum network with shared entanglement. Our result is a generalization of [9] that reduces the entanglement distribution time by a factor of 4 k relative to direct transmission of entangled qubits, considering a number of 4 k - 1 specifically chosen quantum nodes between source and destination, as detailed in Section 2.2.
This paper is organized according to the following structure. In Section 2, we explore the process of entanglement distribution in quantum networks and discuss already established results. Then, we present our idea that improves and generalizes previous results, along with a resource analysis regarding the time needed to supply the end nodes with a maximally entangled pair of qubits. In Section 3, we provide an algorithmic description of the protocol and in Section 4 we conclude with final remarks and discuss future work.

2. The Idea of Restoring Entanglement

2.1. General Context

In a general case of entanglement distribution, Alice and Bob usually have quantum channels connecting them to Charlie, another node in the network. We refer to Charlie as a third party, who might actually represent a laboratory that generates maximally entangled pairs and then sends each particle to Alice and Bob, thus having successfully provided them with shared entanglement. Nevertheless, problems arise when considering practical situations of entanglement distribution. Although one ebit constitutes a perfect, noiseless transmission channel for Alice and Bob [10], the entangled pair is still distributed via noisy quantum channels, hence its purity is altered and our parties will eventually share a non-maximally entangled state (less than 1 ebit). By executing the teleportation protocol with such a resource, perfect reconstruction of the original qubit cannot be accomplished.
A major result that overcomes these limitations is the process of entanglement purification [2,10], which is possible via local operations. The purpose of purification protocols is to concentrate the entanglement of a certain number of entangled pairs to obtain a higher amount of entanglement for a smaller number of pairs. Given sufficient partially-entangled pairs shared by Alice and Bob, under LOCC, they can obtain a pair with entanglement close to 1 ebit in order to teleport a qubit with satisfactory fidelity. Entanglement concentration using nonlinear optics is presented in [11].
Even though entanglement can be concentrated, this process is successful under a minimum fidelity condition for the initial pairs, which cannot be met beyond certain distances [10,12]. It is reasonable to assume that distances between such arbitrary nodes as those represented by Alice and Bob are significant enough to make this process rather infeasible. This led to the emergence of quantum repeaters [12], devices that use entanglement swapping [13,14,15] and purification in order to propagate entanglement in shorter segments (node to node), until source and destination are linked by an almost maximally entangled pair. Thus, quantum repeaters are key elements in the framework of a quantum network and they have been considered in various entanglement distribution schemes. The phenomenon of entanglement swapping for continuous variables is discussed in [16]. A quantum key distribution scheme involving entanglement swapping is proposed in [17], while a quantum conferencing scheme for secure communication between several users is developed in [18].
An entanglement distribution scheme was recently proposed as an optimal routing protocol that ensures the greatest entanglement distribution rate between two arbitrary nodes in a quantum network [19]. It operates on a graph model of the network, while taking into account physical challenges such as the stochastic nature of entanglement generation, imperfect Bell measurement and short coherence time T ch of memories in quantum repeaters. Given multiple possible routes between two nodes, the protocol finds the optimal one according to a route metric. The optimality of the path provides the highest average number of successfully established entangled pairs between two nodes in unit time, considering the coherence time interval T ch . Through numerical simulations, the underlying algorithm of the protocol was proven to outperform classical graph algorithms (Dijkstra, Bellman–Ford) used in conventional routing.
Two other previously proposed routing schemes are referred to as quantum relay and EPR-pair bridging [20] (maximally entangled pairs of particles are also called EPR-pairs). Considering Alice and Bob do not share entangled pairs with each other, but rather each of them does with another node Charlie, then a quantum relay method achieves teleportation of a qubit from Alice to Bob in two steps: Alice teleports first to Charlie, followed by him teleporting to Bob. By extension, an arbitrary number of intermediate nodes can exist between Alice and Bob, with entangled pairs set up between adjacent stations. This hop-by-hop “forwarding” mechanism exhibits an obvious lack of security and privacy [20], as the initial quantum information passes through all the nodes before finally reaching its intended destination. EPR-pair bridging addresses this problem by implementing a swapping scheme that provides Alice and Bob with a shared entangled pair. A Bell measurement performed by Charlie on his qubits and a subsequent transmission of classical information will establish entanglement as a particular Bell state between qubits held by Alice and Bob. Using this method based on entanglement swapping, direct teleportation is realized between source and destination. A quantum routing protocol was considered as a combination of quantum relay and EPR-pair bridging mechanisms, without necessary time synchronization between nodes, as a faster completion of operations at source or at the intermediate nodes would degenerate into the former or the latter scheme, respectively [20].
Entanglement swapping is a phenomenon of paramount importance for the entanglement distribution process between two distant nodes. In a most elementary scenario, we consider that there is a node O halfway between Alice (A) and Bob (B) that can generate entangled pairs of particles and then distribute them accordingly. This distribution scheme can be improved, as proposed in [9]. It was demonstrated that a significant speedup is exhibited when further nodes are introduced on the routes A - O and O - B . Considering Alice and Bob are separated by a distance L and assuming entangled qubits travel at a speed v, the time required for our parties to receive their qubits generated at O is no less than t 1 = L / 2 v . By placing distribution nodes C and D halfway on paths A - O and O - B , they generate entangled pairs and simultaneously send a qubit to O and the other one to A and B, respectively. The time generated qubits require to arrive at their destination nodes is reduced to L / 4 v . Following a Bell measurement performed at O that takes t m to complete, Alice and Bob finally share entanglement. Without accounting for the time necessary for classical information associated with the measurement to be received, then A and B are supplied after an interval of t 2 = L / 4 v + t m , which is less than t 1 , provided t m < L / 4 v .
Having analyzed the framework of the problem and several existing protocols, we now continue with presenting our approach to how entanglement can be restored between Alice and Bob in a practical quantum network scenario, improving and generalizing previous results.

2.2. Our Proposal

Given the already existing network infrastructure and taking into account financial costs, a future large scale quantum network would most likely be mapped onto it. Therefore, optical fiber links will represent quantum channels and most nodes will likely use quantum equipment to achieve various tasks. Our solution is formulated in such a context and has at the very basis the idea described in [9], which we improve and generalize. We now define our general model of the network and the elements that are part of our scheme.
We consider a hybrid network (having both classical and quantum nodes) with a graph-like topology. Each component node is identified by an address (as an IP address), it is linked by a quantum channel to at least one other node and has a particular status, i.e., it is tasked with accomplishing a certain operation. An important class of nodes we consider is represented by quantum switches (QS), devices that are able to execute quantum routing protocols, generate entangled pairs of particles and perform various types of measurements on qubits. Our parties Alice and Bob are two nodes separated by an arbitrary distance that frequently exchange quantum information via teleportation. Thus, shared entanglement is a key resource they require to achieve their task. After each completed teleportation, their entangled pair is destroyed and another teleportation is not possible. Considering arbitrary distances between end nodes, they cannot afford to locally create entangled pairs of particles and send half of each to their partner. The idea we investigate is how they can be efficiently supplied with another entangled resource. Before discussing it, we present the assumptions based on which the scheme operates.
Assumptions:
  • entanglement generation, Bell measurement (BSM) and other local quantum operations are performed perfectly in a negligible amount of time;
  • transmission of entangled qubits between adjacent nodes is realized with high fidelity and does not require purification mechanisms.
These quantum operations are treated as theoretical processes that are abstract. We are not concerned with their physical nature; otherwise, we would not be able to model them as perfect and instantaneous in our scheme. Travel time between nodes can be neglected as well; however, that is not the most important aspect for our analysis. We discuss the time efficiency of the protocol in Section 2.2.2 by considering through how many hops entangled particles must pass until shared entanglement is achieved between the two parties.
We consider that Alice and Bob initially share several entangled pairs of particles described, for example, by Bell state | β 00 = ( | 00 + | 11 ) / 2 . After the last teleportation is performed, Alice and Bob acknowledge their resupply need and synchronize with each other in order to send an appropriate classical message to each other at the same time. We label this special message msg_NE_XY, where “NE” stands for “Need entanglement”, “X” is the sender and “Y” is the receiver. These two messages may reach their destination by different routes, as depicted in Figure 1. We denote the route taken by each message by the set of nodes it passes through:
  • Alice to Bob: { S A i i = 1 : m }
    A msg_NE_AB S A 1 S A m msg _ NE _ AB B ,
  • Bob to Alice: { S B j j = 1 : n }
    B msg _ NE _ BA S B 1 S B n msg _ NE _ BA A .
These sets of nodes may coincide; however, this particular circumstance will rarely occur when considering that a continuous level of network activity would make some routes congested, therefore requiring a different route to be found.
Among each set of nodes, there is a subset consisting entirely of quantum switches.
{ a 1 , a 2 , , a p } { A 1 , A 2 , , A m } , such that
S a = { S a i i = 1 : p } are QS , p m ,
{ b 1 , b 2 , , b q } { B 1 , B 2 , , B n } , such that
S b = { S b j j = 1 : q } are QS , q n .
Each quantum switch is able to interpret the special message msg_NE_XY and subsequently make itself visible to sender X by confirming its status as a quantum node through a classical message sent back to source, msg_ACK_X:
S a i msg _ ACK _ A A , S b j msg _ ACK _ B B .
Upon receiving confirmation from each quantum switch, Alice and Bob have their own list of IP addresses that describes a route between them consisting exclusively of quantum nodes:
  • Route from Alice to Bob (known by Alice):
    A S a 1 S a 2 S a p B ,
  • Route from Bob to Alice (known by Bob):
    B S b 1 S b 2 S b q A .
To begin the distribution process, Alice and Bob each send an encoded classical message, as seen in Table 1, to every node S a i and S b j , respectively and also to their partner in order to instruct them on how to act further. This classical information is labeled msg_ACT_A and msg_ACT_B to suggest who it is sent from, Alice or Bob:
A msg _ ACT _ A { S a i , B } , B msg _ ACT _ B { S b j , A } .
Our designed scheme operates by isolating the number of active quantum switches (AQS) on a route between source and destination to N = 4 k - 1 , for k 1 . The protocol is symmetric; therefore, we will discuss here the case regarding Alice’s perspective.
Considering that N p , we may label the selected subset of AQS as S ˜ a S a , with | S ˜ a |   =   N . Quantum switches that are not part of this subset will be referred to as being inactive (IQS). An important aspect must be clarified here. IQS are designated by Alice or Bob in order to restrict the number of quantum switches that actively participate during the protocol to N = 4 k - 1 p . This is how our scheme is devised and it operates on this symmetry argument given by the number N of AQS. There can be at most three IQS and they will be sent an instruction message that makes them operate as classical switches (CS).
For now, we consider that S ˜ a = S a for brevity in notation (the case when S ˜ a S a means that S a differs from S ˜ a by three maximum IQS, which can be considered as classical ones operating just for qubit routing).
According to the choice of N, there will be an odd number of such AQS. Following the labeling convention in Equations (1) and (2) and considering the common notation (see [9]), we will refer to the node situated halfway in the set S a as O A S a 2 k . There are N 2 = 2 k - 1 quantum switches on each of the segments A - O A and O A - B . Considering A S a 0 and B S a 4 k , halfway on the list of quantum switches found on paths A - O A and O A - B are nodes S a k A and S a 3 k B , respectively. Taking into account both paths relative to the position of O A , the nodes will act in the following manner:
  • each node from S a \ { A , B } generates a pair of particles ( e , e ) in Bell state | β 00 ; Alice and Bob may agree on any Bell state β i j , i j { 0 , 1 } 2 to be shared after the completion of the protocol. To accomplish this task, they would need to exchange classical information encoding the identity of the Bell state (for example, i j ), followed by Alice’s instructions sent to every quantum switch she discovered to prepare the appropriate state. The distribution process will then continue as before, making sure that after each BSM the necessary classical information is transmitted between nodes to reconstruct | β i j each time, so that Alice and Bob share this state in the end.
  • particle e is kept and e is sent to an adjacent node, according to the following rules:
  • Path A - O A :
    A towards A
    A e 0 S a 1 , S a i e i S a i + 1 , 1 i k - 1 ,
    O A towards A
    S a 2 k - 1 e 2 k O A , S a i - 1 e i S a i , k + 1 i 2 k - 1 ,
  • Path O A - B :
    O A towards B
    O A e 2 k S a 2 k + 1 , S a i e i S a i + 1 , 3 k - 1 i 2 k + 1 ,
    B towards B
    S a 4 k - 1 e 4 k B , S a i - 1 e i S a i , 3 k + 1 i 4 k - 1 .
We make an important remark here. According to the particle flow previously represented, Alice sends one particle of her EPR pair to her nearest node, which is a quantum one. Halfway node O A and Bob’s nearest node S N are also quantum nodes. This choice makes the notation consistent, although that node might as well be a classical switch, in which case it would just forward the qubit until it reaches a quantum switch. IQS and CS are not explicitly present in these representations, but they assist in the dynamics of the scheme.
A distribution of entanglement performed in a manner that does not imply swapping is depicted in Figure 2. Alice initially prepares her entangled pair of qubits and then sends one particle to her nearest node, which in turn forwards it to its neighbor and so on. There are N + 1 = 4 k hops required during this process for Bob to receive the particle. Assuming each hop is realized in one unit of time, then Alice and Bob will share entanglement after t 0 4 k units of time.
Based on these distribution rules, there are four path segments from A to B as the following sets:
  • R 1 = { 1 , , k - 1 } ,
  • R 2 = { k + 1 , , 2 k - 1 } ,
  • R 3 = { 2 k + 1 , , 3 k - 1 } ,
  • R 4 = { 3 k + 1 , , 4 k - 1 } .
Then, as expressed in (3)–(6), R F R 1 R 3 and R B R 2 R 4 contain indices that identify active quantum switches on forward and backward distribution routes, respectively, as shown in Figure 3.
Considering that a classical switch cannot execute quantum-specific operations, it will not require a particular instruction message, since it can only route the received qubit further until it reaches a quantum switch.
The main goal of the protocol is to ensure particles reach nodes A and B via both upstream (from A and B towards O A ) and downstream (from O A towards A and B) routes. Considering each intermediate quantum switch, i.e., each node from S a \ { A , O A , B } has successfully received the qubit from its nearest node and has itself sent one from its generated pair, then it performs a BSM on the two qubits from different pairs to accomplish entanglement swapping, thus propagating the entanglement towards middle nodes A and B . Additional classical information resulting from the measurement is required to be provided to the destination node in order to preserve the original Bell state | β 00 . This step is completed by applying an appropriate corrective operation U { I , σ x , σ z , σ z σ x } to the received qubit. These two nodes A and B will be the last ones to possess two qubits received from upstream and downstream. A subsequent BSM performed by both of them on their qubits will then establish entanglement between Alice and Bob, therefore achieving the original task. We remark that a total of N - 1 = 4 k - 2 Bell measurements are performed during the entire process, along with the same number of classical messages sent to assist in adjusting the received state to be the correct one. A visual representation of the the distribution process is shown in Figure 4.
As previously mentioned, the scheme we have presented takes advantage of a configuration of N = 4 k - 1 quantum switches between Alice and Bob. Thus, p - N quantum switches will not participate in the protocol. Since each active quantum switch must receive a qubit, be able to generate an entangled pair and then send one qubit to the next quantum switch, the inactive p - N ones will act as classical switches and only route the qubit further, until another AQS is reached. Under these circumstances, there will be at most three IQS on the route from Alice to Bob:
●  p = 4 k - 1 = N all QS are AQS,
●  p = 4 k p - N = 1 IQS,
●  p = 4 k + 1 p - N = 2 IQS,
●  p = 4 k + 2 p - N = 3 IQS,
●  p = 4 k + 3 = 4 ( k + 1 ) - 1 = 4 k - 1 = N .
Figure 5 depicts a scenario that involves two IQS between two AQS.
After receiving Alice’s request message msg_NE_A, each QS sends an acknowledgment message back to Alice, revealing its address to her. When there is a non-zero difference between the number of QS (p) and the number of AQS (N), Alice makes a decision regarding which switches will participate in the protocol. Those p - N excluded will be sent a classical message msg_ACT_A = 0 to assist those AQS just by forwarding the qubits received from them. She identifies nodes A , O A and B in order to properly instruct the remaining ones about the distribution rules. Bob (B) will receive an instruction msg_ACT_A = 1 (the corresponding operation is also performed by Alice), while O A will receive msg_ACT_A = 2. Nodes A and B will receive from Alice msg_ACT_A = 3 to denote their BSM operation. The remaining AQS must generate entangled pairs and then perform a BSM, an operation which is communicated as msg_ACT_A = 4.
Alice generates her entangled pair and sends one particle to the nearest node; then, she waits for the protocol to execute and finally receives two bits of information from A after its measurement, in order to recover the accurate Bell state. On Bob’s segment, B also provides him with this classical information. After these last two measurements, Alice and Bob share an entangled pair in Bell state | β 00 to be used in yet another teleportation they wish to perform.

2.2.1. Exemplification

A representation of the protocol for the first and second particular cases is depicted in Figure 6 and Figure 7, respectively. It should be noted that CS and IQS are not pictured explicitly; however, their actions contribute to the functionality of the scheme. In Figure 6, we consider k = 1 , so there are three AQS between Alice and Bob. Nodes A , O A , B distribute generated entangled qubits directly to A and B , which then perform a BSM and provide Alice and Bob with entanglement. In Figure 7, we consider k = 2 ; therefore, seven AQS are present on the path from Alice to Bob. This time the distribution of particles propagates towards A and B by intermediate Bell measurements performed by the other AQS. Finally, A and B are the last ones to perform a BSM, which entangles the qubits kept by Alice and Bob.

2.2.2. Efficiency

We continue with emphasizing a feature of our proposal based on a time efficiency analysis. The general scenario involves the existence of these N = 4 k - 1 active quantum switches between Alice and Bob. As depicted in Figure 2, the straightforward approach of Alice preparing an entangled pair and sending the other particle to Bob is done in 4 k units of time, an interval we label as t 0 . When the quantum switch O A between A and B is employed in the protocol, it prepares its entangled pair and sends each particle to them. Thus, the time required for each qubit to reach its destination is reduced to t 1 = t 0 / 2 , assuming the intermediate node is located halfway on the route from Alice to Bob and qubits travel at the same speed.
The first particular case of our protocol is k = 1 , for which there are N = 4 k - 1 = 3 nodes between Alice and Bob that participate in the distribution, i.e., one additional quantum switch found halfway on the segments A - O A and O A - B . According to the steps of the scheme, qubits must arrive at A = S a 1 and B = S a 3 . A BSM is then performed at these stations, followed by N - 1 = 2 (two) transmissions of classical information as part of entanglement swapping. Considering this classical information takes a time t c i to reach its destination and the transmissions occur in parallel, we observe that Alice and Bob will have their desired pair in an interval of t N = t 3 = t 0 / 4 + t c i .
As the number of quantum switches N increases, we derive the general relation that describes the time resources needed to supply Alice and Bob with entanglement,
t N = t 0 N + 1 + t c i = t 0 4 k + t c i , k 1 .
As N becomes larger, the distance between quantum switches will be short enough to consider t c i negligible. Therefore, the protocol reduces the distribution time by a factor of N + 1 = 4 k relative to direct transmission of qubits from Alice to Bob,
t N = t 0 N + 1 = t 0 4 k , k 1 .
We make some important remarks here. Once all AQS receive Alice’s instruction messages, they begin executing their specific actions in parallel. For the overall distribution time, we do not account for the time it takes for AQS to receive their instructions. Given that entanglement swapping is the key principle of operation, the order in which it happens is not important because the entanglement propagates between nodes until it eventually reaches Alice and Bob. Therefore, Alice’s particle from her EPR pair must only go through one hop, unlike standard distribution which requires 4 k hops.
The series of operations we have presented so far are related to the route from Alice to Bob. The protocol is symmetric, i.e., the analogous operations are performed from Bob’s perspective. Hence, Alice and Bob are actually supplied with two ebits in the time interval t N , one ebit from each route.

3. EntangleNet Protocol

Following the detailed description of its functionality in the previous section, we now present an algorithmic implementation of our protocol. The EntangleNet distribution scheme is presented in Algorithm 1 and it uses functions defined in Algorithms 2 and 3.
Algorithm 1 EntangleNet protocol on route X to Y.
1: procedure EntangleNet( X , Y )
2:  X sends msg_NE_XY to Y
3:   i 1
4:   p 0 ▹ number of QS from X to Y
5:   S x ▹ set of QS
6:  while S X i Y do▹ until destination is reached
7:     if S X i is a QS then
8:       S X i sends msg _ ACK _ X to X
9:       p p + 1
10:     S x p S X i ▹ identify node as QS
11:     S x S x S x p ▹ append to set of QS
12:   end if
13:    i i + 1
14:  end while
15:   iqs ( p + 1 ) mod 4 ▹ number of IQS
16:   N p - iqs ▹ number of AQS
17:   k ( N + 1 ) / 4
18:   S ˜ x S x ▹ set of AQS
19:  if N < p then
20:    S ˜ x SelectAQS ( S x , iqs ) ▹ subset of AQS
21:  end if
22:   O X S ˜ x 2 k ▹ halfway node on route X to Y
23:   X S ˜ x k ▹ halfway on segment X - O X
24:   Y S ˜ x 3 k ▹ halfway on segment O X - Y
25:   R F { 1 , , k - 1 } { 2 k + 1 , , 3 k - 1 } ▹ forward distribution route
26:  SendActMsg ( X , X , 3 )
27:  SendActMsg ( X , Y , 3 )
28:  SendActMsg ( X , O X , 2 )
29:  SendActMsg ( X , Y , 1 )
30:  X generates entangled pair ( e 0 , e 0 )
31:  X sends particle e 0 to S ˜ x 1
32:   O X generates entangled pair ( e 2 k , e 2 k )
33:   O X sends particles to S ˜ x 2 k - 1 and S ˜ x 2 k + 1
34:  Y generates entangled pair ( e 4 k , e 4 k )
35:  Y sends particle e 4 k to S x 4 k - 1
36:  for S x i S ˜ x , i = 1 : p do▹ node is IQS
37:    SendActMsg ( X , S x i , 0 )
38:     S x i forwards received qubit to adjacent node
39:  end for
40:  for S ˜ x i S ˜ x \ { X , O X , Y } , i = 1 : N do
41:    SendActMsg ( X , S ˜ x i , 4 )
42:     S ˜ x i generates entangled pair ( e i , e i )
43:    if i R F then
44:      S ˜ x i sends qubit e i to S x i + 1
45:     BsmOtCo ( S ˜ x i , e i - 1 , e i , S x i + 1 )
46:    else▹ backward route
47:      S ˜ x i sends qubit e i to S x i - 1
48:     BsmOtCo ( S ˜ x i , e i + 1 , e i , S x i - 1 )
49:    end if
50:  end for
51:  BsmOtCo ( X , e k - 1 , e k + 1 , X )
52:  BsmOtCo ( Y , e 3 k - 1 , e 3 k + 1 , Y )
53:  X and Y share entangled pair ( e 0 , e 4 k )
54: end procedure
Algorithm 2 Instruction messages to QS and destination.
1:
procedure SendActMsg( X , S , v )
2:
  X sends instruction message msg _ ACT _ X = v to S
3:
end procedure
Algorithm 3 Bell measurement, transmission of outcome and correction.
1:
procedure BsmOtCo( S 1 , e 1 , e 2 , S 2 )
2:
   S 1 performs BSM on qubits e 1 and e 2
3:
   S 1 sends classical outcome to S 2
4:
   S 2 applies corrective operation to his qubit
5:
end procedure
The main procedure of the protocol is described in a general manner that is applicable to any nodes X and Y. Function SelectAQS ( S x , iqs ) is an abstract representation of the decision made by X to extract a subset of quantum switches that will be actively involved in pair generation and measurements. The execution of the protocol for our parties Alice and Bob is given in Algorithm 4.
Algorithm 4 Supply Alice and Bob with two ebits via EntangleNet
  • procedure RestoreEntanglement( A , B )
  •   EntangleNet ( A , B )
  •   EntangleNet ( B , A )
  • end procedure

4. Conclusions

In this paper, we have presented a theoretical approach to a routing protocol that reestablishes the entangled resource between two arbitrary nodes A and B in a quantum network in order to be used further in teleportation. When compared to [9] and to the direct transmission of qubits from A to B, our proposal benefits from a speedup in time given by a factor of 4 k , increasing with the number of N = 4 k - 1 active quantum switches between the end nodes.
The protocol operates by transmission of classical instruction messages issued by Alice or Bob, distribution of entangled particles to adjacent nodes and specific operations executed at each node. The scheme takes advantage of nodes we refer to as active quantum switches, inactive quantum switches and classical switches. The first type employs entanglement swapping, while the other two mediate the flow of qubits by forwarding them to adjacent nodes, until an active quantum switch is reached. Entanglement swapping performed at each AQS eventually propagates entanglement towards Alice and Bob, who, after the completion of the protocol, get to share two ebits, one from each execution route, Alice to Bob and vice versa.
As a future development, we propose the physical implementation of this prototype of the protocol with our academic partners.
References

Author Contributions

Conceptualization, M.-Z.M. and P.G.P.; Methodology, P.G.P.; Formal Analysis, P.G.P.; Investigation, M.-Z.M. and P.G.P.; Writing—Original Draft Preparation, M.-Z.M.; Writing—Review & Editing, M.-Z.M. and P.G.P.; Supervision, P.G.P.

Funding

This research received no external funding

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Bennett, C.H.; Brassard, G.; Crépeau, C.; Jozsa, R.; Peres, A.; Wootters, W.K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993, 70, 1895–1899. [Google Scholar] [CrossRef] [PubMed]
  2. Bennett, C.H.; Bernstein, H.J.; Popescu, S.; Schumacher, B. Concentrating partial entanglement by local operations. Phys. Rev. A 1996, 53, 2046–2052. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Lo, H.K.; Popescu, S. Classical Communication Cost of Entanglement Manipulation: Is Entanglement an Interconvertible Resource? Phys. Rev. Lett. 1999, 83, 1459–1462. [Google Scholar] [CrossRef] [Green Version]
  4. Bennett, C.H.; DiVincenzo, D.P.; Smolin, J.A.; Wootters, W.K. Mixed-state entanglement and quantum error correction. Phys. Rev. A 1996, 54, 3824–3851. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Popescu, S.; Rohrlich, D. Thermodynamics and the measure of entanglement. Phys. Rev. A 1997, 56, R3319–R3321. [Google Scholar] [CrossRef]
  6. Vedral, V.; Plenio, M.B.; Rippin, M.A.; Knight, P.L. Quantifying Entanglement. Phys. Rev. Lett. 1997, 78, 2275–2279. [Google Scholar] [CrossRef] [Green Version]
  7. Plenio, M.B.; Vedral, V. Teleportation, entanglement and thermodynamics in the quantum world. Contemp. Phys. 1998, 39, 431–446. [Google Scholar] [CrossRef] [Green Version]
  8. Bennett, C.H.; Popescu, S.; Rohrlich, D.; Smolin, J.A.; Thapliyal, A.V. Exact and asymptotic measures of multipartite pure-state entanglement. Phys. Rev. A 2000, 63, 012307. [Google Scholar] [CrossRef]
  9. Bose, S.; Vedral, V.; Knight, P.L. Multiparticle generalization of entanglement swapping. Phys. Rev. A 1998, 57, 822–829. [Google Scholar] [CrossRef] [Green Version]
  10. Bennett, C.H.; Brassard, G.; Popescu, S.; Schumacher, B.; Smolin, J.A.; Wootters, W.K. Purification of Noisy Entanglement and Faithful Teleportation via Noisy Channels. Phys. Rev. Lett. 1996, 76, 722–725. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  11. Sheng, Y.B.; Zhou, L. Quantum Entanglement Concentration Based on Nonlinear Optics for Quantum Communications. Entropy 2013, 15, 1776–1820. [Google Scholar] [CrossRef] [Green Version]
  12. Briegel, H.J.; Dür, W.; Cirac, J.I.; Zoller, P. Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication. Phys. Rev. Lett. 1998, 81, 5932–5935. [Google Scholar] [CrossRef]
  13. Yurke, B.; Stoler, D. Einstein-Podolsky-Rosen effects from independent particle sources. Phys. Rev. Lett. 1992, 68, 1251–1254. [Google Scholar] [CrossRef] [PubMed]
  14. Żukowski, M.; Zeilinger, A.; Horne, M.A.; Ekert, A.K. “Event-ready-detectors” Bell experiment via entanglement swapping. Phys. Rev. Lett. 1993, 71, 4287–4290. [Google Scholar] [CrossRef] [PubMed]
  15. Pan, J.W.; Bouwmeester, D.; Weinfurter, H.; Zeilinger, A. Experimental Entanglement Swapping: Entangling Photons That Never Interacted. Phys. Rev. Lett. 1998, 80, 3891–3894. [Google Scholar] [CrossRef]
  16. Marshall, K.; Weedbrook, C. Continuous-Variable Entanglement Swapping. Entropy 2015, 17, 3152–3159. [Google Scholar] [CrossRef] [Green Version]
  17. Zhang, Y.; Li, Z.; Weedbrook, C.; Marshall, K.; Pirandola, S.; Yu, S.; Guo, H. Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution. Entropy 2015, 17, 4547–4562. [Google Scholar] [CrossRef] [Green Version]
  18. Zhang, Z.; Shi, R.; Guo, Y. Multipartite Continuous Variable Quantum Conferencing Network with Entanglement in the Middle. Appl. Sci. 2018, 8, 1312. [Google Scholar] [CrossRef]
  19. Caleffi, M. Optimal Routing for Quantum Networks. IEEE Access 2017, 5, 22299–22312. [Google Scholar] [CrossRef]
  20. Cheng, S.T.; Wang, C.Y.; Tao, M.H. Quantum communication for wireless wide-area networks. IEEE J. Sel. Areas Commun. 2005, 23, 1424–1432. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Two possible routes connecting Alice (A) and Bob (B). Circular and rectangular nodes represent quantum and classical switches, respectively.
Figure 1. Two possible routes connecting Alice (A) and Bob (B). Circular and rectangular nodes represent quantum and classical switches, respectively.
Applsci 08 01935 g001
Figure 2. Tree-like illustration of a configuration of N = 4 k - 1 active quantum switches on route from A to B (tilde notation dropped to avoid cluttering). Dotted black lines connect entangled particles, as it is initially seen at Alice. A sequential distribution of entanglement from Alice to Bob implies that one particle of Alice’s entangled pair goes through 4 k nodes to eventually reach Bob. This process would take t 0 = 4 k units of time.
Figure 2. Tree-like illustration of a configuration of N = 4 k - 1 active quantum switches on route from A to B (tilde notation dropped to avoid cluttering). Dotted black lines connect entangled particles, as it is initially seen at Alice. A sequential distribution of entanglement from Alice to Bob implies that one particle of Alice’s entangled pair goes through 4 k nodes to eventually reach Bob. This process would take t 0 = 4 k units of time.
Applsci 08 01935 g002
Figure 3. Creation of entangled pairs at each node from the subset of N active quantum switches. Depending on the position relative to middle stations A and B , a qubit is received from downstream or upstream, while one qubit of the generated pair is further sent to another node. Bell measurements (dotted ellipse around particles) will eventually be performed on qubits from different entangled pairs.
Figure 3. Creation of entangled pairs at each node from the subset of N active quantum switches. Depending on the position relative to middle stations A and B , a qubit is received from downstream or upstream, while one qubit of the generated pair is further sent to another node. Bell measurements (dotted ellipse around particles) will eventually be performed on qubits from different entangled pairs.
Applsci 08 01935 g003
Figure 4. The distribution process of our scheme converges to A and B , where the last Bell measurements are performed, as indicated by blue arrows and blue colored entangled qubits that arrive there.
Figure 4. The distribution process of our scheme converges to A and B , where the last Bell measurements are performed, as indicated by blue arrows and blue colored entangled qubits that arrive there.
Applsci 08 01935 g004
Figure 5. A scenario that involves two inactive quantum switches (concentric circles) between two active ones (circular shapes) on a forward distribution segment. Active quantum switch S a i follows the protocol and sends qubit e i to next node S a i + 1 . The receiver is not part of the chosen subset to create entangled pairs or measure qubits, thus it forwards the particle to S a i + 2 . The particle is again routed to node S a i + 3 , which is active and can therefore perform a Bell measurement on its qubits.
Figure 5. A scenario that involves two inactive quantum switches (concentric circles) between two active ones (circular shapes) on a forward distribution segment. Active quantum switch S a i follows the protocol and sends qubit e i to next node S a i + 1 . The receiver is not part of the chosen subset to create entangled pairs or measure qubits, thus it forwards the particle to S a i + 2 . The particle is again routed to node S a i + 3 , which is active and can therefore perform a Bell measurement on its qubits.
Applsci 08 01935 g005
Figure 6. An illustration of the protocol for k = 1 . Nodes A ,   O A and B locally prepare entangled pairs of qubits. Nodes A and B each receive two qubits (from A and O A and from O A and B, respectively). A Bell measurement can then be performed on the qubits from different entangled pairs, regardless of the order, followed by classical communication of outcome (not pictured). For example, A is the first to perform a Bell measurement, followed by B . After these steps, entanglement has propagated via swapping towards Alice and Bob, who finally share one ebit as entangled pair ( e 0 , e 4 ) .
Figure 6. An illustration of the protocol for k = 1 . Nodes A ,   O A and B locally prepare entangled pairs of qubits. Nodes A and B each receive two qubits (from A and O A and from O A and B, respectively). A Bell measurement can then be performed on the qubits from different entangled pairs, regardless of the order, followed by classical communication of outcome (not pictured). For example, A is the first to perform a Bell measurement, followed by B . After these steps, entanglement has propagated via swapping towards Alice and Bob, who finally share one ebit as entangled pair ( e 0 , e 4 ) .
Applsci 08 01935 g006
Figure 7. Example for k = 2 . Nodes A and B can no longer be reached directly by A , B or O A . Links of entangled pairs are established according to the instructions received by each node. Without needing to be synchronized, Bell measurements are performed at each station on the four segments of the path (1). Middle nodes A and B can execute the same task after receiving the qubits from their adjacent nodes (2), thus providing A and B with entangled pair of particles e 0 and e 8 (3).
Figure 7. Example for k = 2 . Nodes A and B can no longer be reached directly by A , B or O A . Links of entangled pairs are established according to the instructions received by each node. Without needing to be synchronized, Bell measurements are performed at each station on the four segments of the path (1). Middle nodes A and B can execute the same task after receiving the qubits from their adjacent nodes (2), thus providing A and B with entangled pair of particles e 0 and e 8 (3).
Applsci 08 01935 g007
Table 1. Classical instruction messages sent by Alice to her known quantum switches and to Bob.
Table 1. Classical instruction messages sent by Alice to her known quantum switches and to Bob.
EncodingSignificance
msg_ACT_A = 0Do nothing, i.e., route qubit to next node.
msg_ACT_A = 1Generate entangled pair and send one particle to adjacent node.
msg_ACT_A = 2Generate entangled pair and send each particle to the adjacent nodes.
msg_ACT_A = 3Perform Bell measurement on qubits and communicate classical information to adjacent node.
msg_ACT_A = 4Generate entangled pair and distribute one particle to adjacent node; perform Bell measurement on the other particle and the previously received one; communicate classical outcome to the same node the particle was sent to.

Share and Cite

MDPI and ACS Style

Mina, M.-Z.; Popescu, P.G. EntangleNet: Theoretical Reestablishment of Entanglement in Quantum Networks . Appl. Sci. 2018, 8, 1935. https://doi.org/10.3390/app8101935

AMA Style

Mina M-Z, Popescu PG. EntangleNet: Theoretical Reestablishment of Entanglement in Quantum Networks . Applied Sciences. 2018; 8(10):1935. https://doi.org/10.3390/app8101935

Chicago/Turabian Style

Mina, Mihai-Zicu, and Pantelimon George Popescu. 2018. "EntangleNet: Theoretical Reestablishment of Entanglement in Quantum Networks " Applied Sciences 8, no. 10: 1935. https://doi.org/10.3390/app8101935

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop