Professional Documents
Culture Documents
ABSTRACT A quantum network, which involves multiple parties pinging each other with quantum mes-
sages, could revolutionize communication, computing, and basic sciences. The future internet will be a
global system of various packet switching quantum and classical networks, and we call it quantum internet.
To build a quantum Internet, unified protocols that support the distribution of quantum messages within
it are necessary. Intuitively, one would extend classical internet protocols to handle quantum messages.
However, classical network mechanisms, especially those related to error control and reliable connection,
implicitly assume that information can be duplicated, which is not true in the quantum world due to the
no-cloning theorem and monogamy of entanglement. In this article, we investigate and propose protocols
for packet quantum network intercommunication. To handle the packet loss problem in transport, we propose
a quantum retransmission protocol based on the recursive use of a quantum secret sharing scheme. Other
Internet protocols are also discussed. In particular, the creation of logical process-to-process connections is
accomplished by a quantum version of the three-way handshake protocol.
INDEX TERMS Quantum Internet, quantum secret sharing, retransmission, transmission control protocol
(TCP), three-way handshake.
concurrent entanglement routing protocol for the the network if there are too many errors beyond the error-correction
layer is proposed in [22]. Several quantum network simula- capability. Herein we propose a quantum retransmission pro-
tors are available (e.g., [23] and [24]), facilitating the study tocol (Protocol 3) by recursively using a (2,3) quantum secret
of quantum networks. Taking the development of the classi- sharing scheme (which is a variant of quantum codes). A
cal internet for reference, the next step toward a future quan- quantum message will be “divided” into three shares and any
tum Internet is to establish reliable qubit transmission be- two shares suffice to recover the message. If a share gets
tween quantum nodes. As quantum decoherence is inevitable lost, then we recover the share if there are two remaining
in a quantum network [25], [26], this motivates us to study the shares or we divide the remaining share into another three
quantum version of reliable transmission control protocol. shares and repeat the process. In this way, one can theoret-
In the classical Internet, transmission control protocol and ically reconstruct the quantum message. One can show that
internet protocol (TCP/IP) [27] are the foundational proto- by calculation only a constant number of shares are required
cols that serve as a methodology of unified, reliable, ordered, to send a quantum message if the packet loss rate is low
and error-checked delivery of classical information stream enough.
between applications in the Internet. One would expect sim- The article is organized as follows. The basics of quantum
ilar quantum analogues that allow quantum computers on mechanics are given in Section II. The model of quantum
different platforms to interconnect. However, the frames of internet is proposed in Section III, including the protocols for
classical TCP/IP cannot be directly applied in the quantum entanglement distribution and router’s action. In Section IV,
network because of the dramatic difference between classical we propose the quantum three-way handshake protocol and
bits and quantum bits (qubits). In particular, retransmission the quantum retransmission protocol. Then, Section V con-
is one of the basic mechanisms used in a packet switched cludes this article.
network for reliable communication. However, retransmis-
sion of quantum messages is generally impossible due to the
II. PRELIMINARIES
no-cloning theorem [28]. Other instances such as checksum,
Here we present the bare-bones of quantum mechanics for
handshake are also difficult.
our purpose. For more details, interested readers are referred
In this article, we describe a future quantum internet model
to [30]. We start with the postulates of quantum mechanics.
and study protocols for packet quantum network intercom-
Then we introduce the effects of quantum teleportation, en-
munication in theory. The quantum internet model under
tanglement swapping, the no-cloning theorem, monogamy of
consideration is the repeater-based model, where quantum
entanglement, and quantum error correction.
communication is done by a serial of teleportations with
quantum repeaters used as intermediate nodes to reach long
distances. Packet switching is a technique for reliably and A. QUANTUM MECHANICS
efficiently transmitting data in network communication, and The state space of a closed quantum system is a complex
we will employ this feature in the quantum internet. There- Hilbert space and a pure quantum state is an arbitrary unit
fore, a quantum message will be divided into packets, which vector in the Hilbert space. In particular, a qubit system has
are then sent to the destination through a network of routers a two-dimensional vector space with an orthonormal basis
and repeaters. Since quantum channels are inevitably noisy, {|0, |1}. The state of a composite system of two subsystems
it is important that the packets are protected by quantum is the tensor product of the state spaces of the two subsys-
error-correcting codes [29]. In particular, the creation of log- tems. Hence an n-qubit system has a 2n -dimensional state
ical process-to-process connections is accomplished by a space with an orthonormal basis {|i1 i2 · · · in } |i1 ⊗ · · · ⊗
quantum version of the three-way handshake protocol (see |in : i j ∈ {0, 1}}. Note that ⊗ is the tensor product and will
Section IV). sometimes be omitted with no ambiguity. More generally, a
The most important issue of packet switching is packet quantum state can be represented by a density operator ρ,
loss. EinsteinPodolskyRosen (EPR) pairs shared between which is positive semidefinite and has trace equal to one.
any nodes are constantly generated and distributed. How- For a pure quantum state |ψ, its density operator is |ψψ|.
ever, entanglement can never be 100% reliable, no mat- Quantum mechanics allows a more complicated state: A
ter what accuracy entanglement distillation and distribu- mixed quantum state, which is a combination of some pure
tion can achieve. There is no perfect quantum memory states ρ = i pi |ψi ψi |, such that pi ≥ 0 and i pi = 1.
as well. If an imperfect EPR pair is used, a packet loss A two-qubit pure state is entangled if it cannot be de-
occurs. Other issues may also lead to packet loss, such scribed by two independent single-qubit states. The state
as quantum decoherence, imperfect operations, nonavail- |+ AB = |0A |0B√+|1A |1B is called a maximally entangled
2
ability of fresh EPRs. Classically one would have the state, or simply EPR pair [31], where the subscript AB means
packet retransmitted but this is forbidden by the no-cloning that it is shared between A and B.
theorem. Naively, one would like to use quantum error- The evolution of a closed quantum system can be de-
correcting codes to protect the quantum message since a scribed by a unitary transformation. An operator U is uni-
packet loss could be considered as an erasure error. How- tary if U †U = UU † = I, where U † is the complex conjugate
ever, quantum codes also cannot protect the information transpose of U, and I is the identity operator. A basis for
the
linear
operators
on is the Pauli matrices I2 =
a qubit C. NO-CLONING THEOREM AND MONOGAMY OF
1 0 0 1 1 0 ENTANGLEMENT
,X = ,Z = , Y = iXZ. A fundamental property of quantum mechanics is that learn-
0 1 1 0 0 −1
A general quantum operation, usually denoted by E, is a ing an unknown quantum state from a given specimen would
completely positive and trace-preserving (CPTP) map on a disturb its state [33]. In particular, the quantum no-cloning
density operator. Consequently, a quantum communication theorem [28], [34] states that an arbitrary unknown quantum
channel is modeled as a quantum CPTP map. In other words, state cannot be cloned. Generally speaking, there is no quan-
if the sender sends ρ through a quantum channel E, the re- tum operation that can transform an unknown quantum state
ceiver would receive E (ρ). |ψ ⊗ |0 into |ψ ⊗ |ψ.
A quantum measurement is a special quantum operation Monogamy of entanglement, one of the most fundamental
described by a collection of measurement operators {Mm }, properties of entanglement, roughly says that the amount
which satisfy m Mm † M = I, and the index m stands for of shared entanglement among multiparties is bounded. For
m
the measurement outcome. If a state |ψ is measured, the example, suppose qubits A and B maximally entangled, and
probability of outcome m is p(m) = ψ|Mm † M |ψ and the then qubit C must be uncorrelated with A or B.
m
M |ψ
postmeasurement state is |ψm = √ p(m) .
m
C. DATA TRANSFER
A reason that the classical TCP works well is because classi-
cal information can be correctly read and copied. To handle
quantum retransmission, we start with a simple question:
How to reliably send a one-qubit state |ψ from Host A to
Host B through a noisy quantum channel?
Usually this question is handled by using a quantum error-
correcting code, which is designed for a certain error model.
Unfortunately, the channel dynamics of a quantum network
varies dramatically. For example, there are many routes con-
necting two endnodes and each node on a route may handle
many packets simultaneously. Since the EPRs are not perfect
all the time, packet loss is inevitable. However, we cannot
afford the loss of a quantum packet without any backup.
This probability gets smaller as the growth of m. If a noise- Herein we consider a retransmission protocol based on a
less quantum connection is established, our protocol reports variant of quantum error-correcting codes—quantum secret
“Successfully connected.” If the connection is noisy, our pro- sharing—so that at the end of the protocol we can be sure
tocol returns “Successfully connected.” with a small proba- that the state is perfectly transmitted.
bility. Our quantum retransmission protocol is given in Proto-
The classical and quantum connections for one direction col 3.
are created by steps 1) and 2) and they are acknowledged. The kernel of the protocol is a recursive use of the (2,3)
The classical and quantum connections for the other direction threshold scheme [35]. Note that as a initial study of this
are created by steps 2) and 3) and they are acknowledged. research direction, we choose the (2,3) threshold scheme
Consequently a full-duplex quantum communication is es- for illustration of quantum retransmission. In fact, the (2,3)
tablished. The detailed operations of hosts A and B in the threshold scheme is qutrit-based (a three level quantum sys-
quantum three-way handshake protocol are summarized in tem); we can simply represent a qutrit by two qubits without
Protocols 1 and 2, respectively. using the fourth level.
FIG. 4. (Left) Successful quantum transmission. (Right) Unsuccessful Quantum transmission in the second send. Host A has to do one more recursion.
First, a quantum message A is encoded into three shares sharing scheme; the joint state between the sender and re-
A1 A2 A3 and at least two shares are required to recover the ceiver still has its support lie in the code space, such that the
message. Then the shares A2 and A3 are sent sequentially, recovering operation for the packet loss still works.
depending on the acknowledgment of the previous share. Remark: Our retransmission protocol is actually a recon-
If the first share A2 is acknowledged, the share A3 is then struction protocol so that the quantum package can be re-
sent. If A3 is also acknowledged, we are done since A2 A3 is constructed at the receiver by iteratively using the recovery
enough for recovering A. However, if A2 gets lost, A1 has to operation of a secret-sharing scheme.
be sent carefully. For that purpose, A1 is then encoded into Let us estimate the number of shares need to be sent. For
three shares by the (2,3) threshold scheme and the procedure simplicity we assume that the probability that a share gets lost
proceeds recursively. Fig. 4 illustrates these ideas. in transmission is p during a period of time. This can be mod-
After a close scrutiny, one can find that the transmission eled as a simple absorbing Markov chain with three states
succeeds if two consecutive shares are correctly received. {0, 1, 2}, where state i denotes the status of i-consecutive
Otherwise, either the remaining two shares have to be used successful transmission, and a transition matrix
to recover the first share or the remaining one share has to be ⎡ ⎤
encoded into three shares. p 1− p 0
⎢ ⎥
The above argument shows that a packet loss error can ⎣p 0 1 − p⎦ .
be corrected. In reality, other errors can occur. For instance, 0 0 1
each packet can be changed during transmission. We always
assume that such an error can be detected through measure- One can show that the expected number of total shares re-
ments on each packet, and a packet with detected errors will 2− p
quired to send one quantum message is . It can
be discarded. Now we are facing a postselection issue, mean- (1 − p)2
ing that a packet may be measured and collapsed into some be checked that when p < 0.5, no more than ten shares are
unwanted state. In the following, we show that such error can required to send one quantum message. When p gets larger
also be corrected. than 0.8, the required number grows quickly.
Observation 1: Quantum error correction works in a tensor In a less noisy channel, one can guarantee that this scheme
product manner. succeeds within a finite number of steps. However, a poten-
Suppose that the noisy channel N can be corrected tial problem here is that the storage of a receiver for this
through the encoding channel E and decoding channel D. quantum message is not unbounded. Although Host B may
Then, the encoding channel I ⊗ E and decoding channel need an unbounded classical data structure to maintain the
I ⊗ D can correct the noisy channel I ⊗ N . status of transmission, he has only four types of possible
Observation 2: We can always assume that the input state status.
is a pure state by adding ancilla qubits. Then, we observe 1) B is waiting for some A2(i) since the previous A2(i−1) is
that the decoding operator can still correct errors even after not received or valid.
postselection as follows: For any σ , such that Supp(σ ) ⊂ 2) A2(i) is received, and B is waiting for A3(i) .
Supp(N ◦ E (|ψψ|)), we always have
3) A2(i) is received, but the corresponding A3(i) is not valid.
4) A2 and A3 are both validly received.
D(σ ) ∝ |ψψ|.
The Pseudo acknowledgment number and Pseudo Win-
Combining these two observations, we know that the posts- dow of the qTCP packet are used for the acknowledgment
election of a new packet does not effect the quantum secret of the status of Host B.
[19] R. V. Meter and J. Touch, “Designing quantum repeater networks,” [30] M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum
IEEE Commun. Mag., vol. 51, no. 8, pp. 64–71, Aug. 2013, doi: Information: 10th Anniversary Edition, 10th ed. New York, NY, USA:
10.1109/MCOM.2013.6576340. Cambridge Univ. Press, 2011, doi: 10.1017/CBO9780511976667.
[20] A. Pirker and W. Dür, “A quantum network stack and protocols for reliable [31] A. Einstein, B. Podolsky, and N. Rosen, “Can quantum-mechanical de-
entanglement-based networks,” New J. Phys., vol. 21, no. 3, Mar. 2019, scription of physical reality be considered complete?,” Phys. Rev., vol. 47,
Art. no. 033003, doi: 10.1088/1367-2630/ab05f7. pp. 777–780, May 1935, doi: 10.1103/PhysRev.47.777.
[21] A. Dahlberg et al., “A link layer protocol for quantum networks,” [32] M. Żukowski, A. Zeilinger, M. A. Horne, and A. K. Ekert, ““Event-ready-
in Proc. ACM Special Int. Group Data Commun., 2019, pp. 159–173, detectors” bell experiment via entanglement swapping,” Phys. Rev. Lett.,
doi: 10.1145/3341302.3342070. vol. 71, pp. 4287–4290, Dec. 1993, doi: 10.1103/PhysRevLett.71.4287.
[22] S. Shi and C. Qian, “Concurrent entanglement routing for quantum net- [33] C. H. Bennett et al., “Reduction of quantum entropy by reversible
works: Model and designs,” in Proc. Annu. Conf. ACM Special Int. Group extraction of classical information,” J. Modern Opt., vol. 41, no. 12,
Data Commun. Appl., Technol., Architectures, Protoc. Comput. Commun., pp. 2307–2314, 1994, doi: 10.1080/09500349414552161.
2020, pp. 62–75, doi: 10.1145/3387514.3405853. [34] D. Dieks, “Communication by EPR devices,” Phys. Lett. A, vol. 92, no. 6,
[23] T. Coopmans et al., “NetSquid, a NETwork simulator for Quantum infor- pp. 271–272, 1982, doi: 10.1016/0375-9601(82)90084-6.
mation using discrete events,” Commun Phys., vol. 4, 2021, Art. no. 164, [35] R. Cleve, D. Gottesman, and H.-K. Lo, “How to share a quan-
doi: 10.1038/s42005-021-00647-8. tum secret,” Phys. Rev. Lett., vol. 83, pp. 648–651, Jul. 1999, doi:
[24] K. Azuma, S. Bäuml, T. Coopmans, D. Elkouss, and B. Li, “Tools 10.1103/PhysRevLett.83.648.
for quantum network design,” AVS Quantum Sci., vol. 3, no. 1, 2021, [36] L. Jiang, J. M. Taylor, K. Nemoto, W. J. Munro, R. Van Meter, and
Art. no. 014101, doi: 10.1116/5.0024062. M. D. Lukin, “Quantum repeater with encoding,” Phys. Rev. A, vol. 79,
[25] R. V. Meter, “Quantum networking and internetworking,” Mar. 2009, Art. no. 032325, doi: 10.1103/PhysRevA.79.032325.
IEEE Netw., vol. 26, no. 4, pp. 59–64, Jul./Aug. 2012, doi: [37] C. Simon, H. de Riedmatten, M. Afzelius, N. Sangouard, H. Zbinden,
10.1109/MNET.2012.6246754. and N. Gisin, “Quantum repeaters with photon pair sources and multi-
[26] W. Kozlowski, A. Dahlberg, and S. Wehner, “Designing a quantum net- mode memories,” Phys. Rev. Lett., vol. 98, May 2007, Art. no. 190503,
work protocol,” in Proc. 16th Int. Conf. Emerg. Netw. Experiments Tech- doi: 10.1103/PhysRevLett.98.190503.
nol., 2020, pp. 1–16, doi: 10.1145/3386367.3431293. [38] M. William, A. Koji, T. Kiyoshi, and N. Kae, “Inside quantum repeaters,”
[27] C. Vinton and K. Robert, “A protocol for packet network intercommuni- IEEE J. Sel. Topics Quantum Electron., vol. 21, no. 3, pp. 78–90, May/Jun.
cation,” IEEE Trans. Commun., vol. 22, no. 5, pp. 637–648, May 1974, 2015, doi: 10.1109/JSTQE.2015.2392076.
doi: 10.1109/TCOM.1974.1092259. [39] N. Sangouard, C. Simon, H. de Riedmatten, and N. Gisin, “Quantum re-
[28] W. Wootters and W. Zurek, “A single quantum cannot be cloned,” Nature, peaters based on atomic ensembles and linear optics,” Rev. Modern Phys.,
vol. 299, pp. 802–803, 1982, doi: 10.1038/299802a0. vol. 83, pp. 33–80, Mar. 2011, doi: 10.1103/RevModPhys.83.33.
[29] P. W. Shor, “Scheme for reducing decoherence in quantum com-
puter memory,” Phys. Rev. A, vol. 52, pp. R2493–R2496, Oct. 1995,
doi: 10.1103/PhysRevA.52.R2493.