You are on page 1of 9

IEEE Transactions on

Quantum Internet uantum Engineering


Received March 31, 2021; revised June 7, 2021 and September 1, 2021; accepted September 10, 2021; date of publication September 14, 2021;
date of current version October 18, 2021.
Digital Object Identifier 10.1109/TQE.2021.3112594

Protocols for Packet Quantum Network


Intercommunication
NENGKUN YU1 , CHING-YI LAI2 (Member, IEEE),
AND LI ZHOU3 (Member, IEEE)
1
Centre for Quantum Software and Information, School of Software, Faculty of Engineering and Information Technology, University
of Technology Sydney, Sydney, NSW 2007, Australia
2
Institute of Communications, National Yang Ming Chiao Tung University, Hsinchu 30010, Taiwan
3
Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China
Corresponding author: Ching-Yi Lai (email: cylai@nycu.edu.tw).
The work of Nengkun Yu was supported by ARC Discovery Early Career Researcher Award under Grant DE180100156 and ARC
Discovery Program under Grant DP210102449. The work of Ching-Yi Lai was supported by the Ministry of Science and Technology
(MOST) in Taiwan, under Grant MOST110-2628-E-A49-007-.

ABSTRACT A quantum network, which involves multiple parties pinging each other with quantum mes-
sages, could revolutionize communication, computing, and basic sciences. The future internet will be a
global system of various packet switching quantum and classical networks, and we call it quantum internet.
To build a quantum Internet, unified protocols that support the distribution of quantum messages within
it are necessary. Intuitively, one would extend classical internet protocols to handle quantum messages.
However, classical network mechanisms, especially those related to error control and reliable connection,
implicitly assume that information can be duplicated, which is not true in the quantum world due to the
no-cloning theorem and monogamy of entanglement. In this article, we investigate and propose protocols
for packet quantum network intercommunication. To handle the packet loss problem in transport, we propose
a quantum retransmission protocol based on the recursive use of a quantum secret sharing scheme. Other
Internet protocols are also discussed. In particular, the creation of logical process-to-process connections is
accomplished by a quantum version of the three-way handshake protocol.

INDEX TERMS Quantum Internet, quantum secret sharing, retransmission, transmission control protocol
(TCP), three-way handshake.

I. INTRODUCTION can be found, e.g., in [11]. Thanks to the rapid experimental


Quantum computing is the next generation of computing progress in recent years, first rudimentary quantum networks
that promises extraordinary computing power. Small-scale are not out of reach anymore. Physicists can control and
quantum processors have been constructed and continuously manipulate quantum signals much better than before [12],
improved. We are expecting a future with functional quantum [13]. Very recently, the design of a quantum internet has
processors around us. With the additional ability to send received much attention from an engineering perspective.
quantum messages from one quantum processor to another, Many challenges are formulated in [14] and [15]. Generally,
several quantum processors can form a quantum computing communication between two nodes in a quantum network is
cluster, and they can together build an entangled quantum achieved by quantum teleportation [16], where shared quan-
system [1]. This is often referred to as networked quantum tum entanglement is necessary. Consequently, efficient and
computing, or distributed quantum computing (see, e.g., [2] reliable protocols for routing entanglement is vital to a quan-
and [3]), which may provide exceptional savings in com- tum network [17]. If two nodes are far from each other, addi-
munication complexity compared with classical distributed tional nodes (called quantum repeaters [18]) serve as relays
computation. Together with connected quantum computers, for quantum teleportation. Basic design principles of such
the quantum network could also provide functionalities, such a quantum repeater network have been discussed in [19].
as secure communication with quantum key distribution [4], Protocols for operations across layers of a quantum network
[5] and delegated quantum computation [6]–[8]. have also been discussed [20]. Recently, Dahlberg et al. pro-
The concept of quantum internet was proposed decades vided a reliable physical and link layer protocol for quantum
ago [9], [10], and a road map for the future quantum internet networks on the nitrogen vacancy hardware platform [21]. A
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/
VOLUME 2, 2021 4103709
IEEE Transactions on
uantum Engineering Yu et al.: PROTOCOLS FOR PACKET QUANTUM NETWORK INTERCOMMUNICATION

concurrent entanglement routing protocol for the the network if there are too many errors beyond the error-correction
layer is proposed in [22]. Several quantum network simula- capability. Herein we propose a quantum retransmission pro-
tors are available (e.g., [23] and [24]), facilitating the study tocol (Protocol 3) by recursively using a (2,3) quantum secret
of quantum networks. Taking the development of the classi- sharing scheme (which is a variant of quantum codes). A
cal internet for reference, the next step toward a future quan- quantum message will be “divided” into three shares and any
tum Internet is to establish reliable qubit transmission be- two shares suffice to recover the message. If a share gets
tween quantum nodes. As quantum decoherence is inevitable lost, then we recover the share if there are two remaining
in a quantum network [25], [26], this motivates us to study the shares or we divide the remaining share into another three
quantum version of reliable transmission control protocol. shares and repeat the process. In this way, one can theoret-
In the classical Internet, transmission control protocol and ically reconstruct the quantum message. One can show that
internet protocol (TCP/IP) [27] are the foundational proto- by calculation only a constant number of shares are required
cols that serve as a methodology of unified, reliable, ordered, to send a quantum message if the packet loss rate is low
and error-checked delivery of classical information stream enough.
between applications in the Internet. One would expect sim- The article is organized as follows. The basics of quantum
ilar quantum analogues that allow quantum computers on mechanics are given in Section II. The model of quantum
different platforms to interconnect. However, the frames of internet is proposed in Section III, including the protocols for
classical TCP/IP cannot be directly applied in the quantum entanglement distribution and router’s action. In Section IV,
network because of the dramatic difference between classical we propose the quantum three-way handshake protocol and
bits and quantum bits (qubits). In particular, retransmission the quantum retransmission protocol. Then, Section V con-
is one of the basic mechanisms used in a packet switched cludes this article.
network for reliable communication. However, retransmis-
sion of quantum messages is generally impossible due to the
II. PRELIMINARIES
no-cloning theorem [28]. Other instances such as checksum,
Here we present the bare-bones of quantum mechanics for
handshake are also difficult.
our purpose. For more details, interested readers are referred
In this article, we describe a future quantum internet model
to [30]. We start with the postulates of quantum mechanics.
and study protocols for packet quantum network intercom-
Then we introduce the effects of quantum teleportation, en-
munication in theory. The quantum internet model under
tanglement swapping, the no-cloning theorem, monogamy of
consideration is the repeater-based model, where quantum
entanglement, and quantum error correction.
communication is done by a serial of teleportations with
quantum repeaters used as intermediate nodes to reach long
distances. Packet switching is a technique for reliably and A. QUANTUM MECHANICS
efficiently transmitting data in network communication, and The state space of a closed quantum system is a complex
we will employ this feature in the quantum internet. There- Hilbert space and a pure quantum state is an arbitrary unit
fore, a quantum message will be divided into packets, which vector in the Hilbert space. In particular, a qubit system has
are then sent to the destination through a network of routers a two-dimensional vector space with an orthonormal basis
and repeaters. Since quantum channels are inevitably noisy, {|0, |1}. The state of a composite system of two subsystems
it is important that the packets are protected by quantum is the tensor product of the state spaces of the two subsys-
error-correcting codes [29]. In particular, the creation of log- tems. Hence an n-qubit system has a 2n -dimensional state
ical process-to-process connections is accomplished by a space with an orthonormal basis {|i1 i2 · · · in }  |i1  ⊗ · · · ⊗
quantum version of the three-way handshake protocol (see |in  : i j ∈ {0, 1}}. Note that ⊗ is the tensor product and will
Section IV). sometimes be omitted with no ambiguity. More generally, a
The most important issue of packet switching is packet quantum state can be represented by a density operator ρ,
loss. EinsteinPodolskyRosen (EPR) pairs shared between which is positive semidefinite and has trace equal to one.
any nodes are constantly generated and distributed. How- For a pure quantum state |ψ, its density operator is |ψψ|.
ever, entanglement can never be 100% reliable, no mat- Quantum mechanics allows a more complicated state: A
ter what accuracy entanglement distillation and distribu- mixed quantum  state, which is a combination of some pure
tion can achieve. There is no perfect quantum memory states ρ = i pi |ψi ψi |, such that pi ≥ 0 and i pi = 1.
as well. If an imperfect EPR pair is used, a packet loss A two-qubit pure state is entangled if it cannot be de-
occurs. Other issues may also lead to packet loss, such scribed by two independent single-qubit states. The state
as quantum decoherence, imperfect operations, nonavail- |+ AB = |0A |0B√+|1A |1B is called a maximally entangled
2
ability of fresh EPRs. Classically one would have the state, or simply EPR pair [31], where the subscript AB means
packet retransmitted but this is forbidden by the no-cloning that it is shared between A and B.
theorem. Naively, one would like to use quantum error- The evolution of a closed quantum system can be de-
correcting codes to protect the quantum message since a scribed by a unitary transformation. An operator U is uni-
packet loss could be considered as an erasure error. How- tary if U †U = UU † = I, where U † is the complex conjugate
ever, quantum codes also cannot protect the information transpose of U, and I is the identity operator. A basis for

4103709 VOLUME 2, 2021


IEEE Transactions on
Yu et al.: PROTOCOLS FOR PACKET QUANTUM NETWORK INTERCOMMUNICATION uantum Engineering

the
 linear
 operators
 on  is the Pauli matrices I2 =
 a qubit C. NO-CLONING THEOREM AND MONOGAMY OF
1 0 0 1 1 0 ENTANGLEMENT
,X = ,Z = , Y = iXZ. A fundamental property of quantum mechanics is that learn-
0 1 1 0 0 −1
A general quantum operation, usually denoted by E, is a ing an unknown quantum state from a given specimen would
completely positive and trace-preserving (CPTP) map on a disturb its state [33]. In particular, the quantum no-cloning
density operator. Consequently, a quantum communication theorem [28], [34] states that an arbitrary unknown quantum
channel is modeled as a quantum CPTP map. In other words, state cannot be cloned. Generally speaking, there is no quan-
if the sender sends ρ through a quantum channel E, the re- tum operation that can transform an unknown quantum state
ceiver would receive E (ρ). |ψ ⊗ |0 into |ψ ⊗ |ψ.
A quantum measurement is a special quantum operation Monogamy of entanglement, one of the most fundamental
described by a collection of measurement operators {Mm }, properties of entanglement, roughly says that the amount
which satisfy m Mm † M = I, and the index m stands for of shared entanglement among multiparties is bounded. For
m
the measurement outcome. If a state |ψ is measured, the example, suppose qubits A and B maximally entangled, and
probability of outcome m is p(m) = ψ|Mm † M |ψ and the then qubit C must be uncorrelated with A or B.
m
M |ψ
postmeasurement state is |ψm  = √ p(m) .
m

D. QUANTUM ERROR CORRECTION


B. QUANTUM TELEPORTATION AND ENTANGLEMENT Qubits are error-prone. A quantum error-correcting code
SWAPPING (QECC), first proposed by Shor [29], can protect quantum
Quantum teleportation [16] is arguably the most famous information against decoherence [30]. Suppose we have a
quantum communication protocol. With the help of pre- noisy quantum channel denoted as a quantum operation N . If
shared entanglement between the sender and the receiver, there exist encoding and decoding operations E and D, such
quantum information can be transmitted from one location that
to another using only classical communication. The telepor-
tation protocol is as follows. Suppose Alice and Bob share (D ◦ N ◦ E )(ρ) ∝ ρ
an EPR pair |+ AB = |0A |0B√+|1A |1B and Alice wants to
2
send to Bob an unknown qubit |ψC = α|0C + β|1C . She for any input state ρ, we say that E and D correct the errors of
performs a Bell measurement {Mi j } on her two qubits AC, N . That is, any quantum information encoded by E can be
where perfectly recovered from the noise process N by applying
the recovering map D.
Mi j = |i j AC i j |AC , |i j   (I2 ⊗ X i Z j )|+  Quantum secret sharing schemes have close connection
for i, j ∈ {0, 1}. Alice then sends Bob her measurement out- to QECCs [35]. A ((k, n)) threshold scheme with n < 2k
come i j ∈ {00, 01, 10, 11}. Interestingly, this two-bit mes- encodes an arbitrary secret quantum state and divides it into
sage contains all the information that Bob needs to recover n shares, such that 1) from any k or more shares the secret can
|ψ on his side. To see this, observe that be recovered and 2) from any k − 1 or fewer shares no infor-
mation about the secret quantum state can be deduced. Note
1   
|C ⊗ |+ AB = |i j AC ⊗ X i Z j |ψ . that the requirement of n < 2k comes from the no-cloning
2 theorem.
i, j∈{0,1}

According to Alice’s measurement outcome i j, Bob’s qubit


will be in the state X i Z j |ψ, and thus, |ψ can be recovered III. QUANTUM INTERNET MODELS
after a Pauli correction X i Z j on Bob’s qubit. Fig. 1 illustrates the concept of a quantum network,
To sum up, with the help of an EPR pair, the transmission where several quantum computers are distributed and con-
of two classical bits is enough to transmit one qubit. Thus, nected along with a classical network. PCs, workstations,
one can send n qubits by transmitting 2n classical bits using web servers, quantum computers, etc., are called hosts or
n preshared EPR pairs. endnodes. Endnodes are connected together by a network of
Next we discuss a variation of quantum teleportation– communication links and routers.
entanglement swapping [32]. Suppose that Alice and Bob In this article, we only discuss the transmission of quan-
share an EPR pair |+ AB1 , and Bob and Charlie share an- tum information through the quantum internet. We further
other EPR pair |+ B2C . It is possible to construct an EPR assume that all the nodes within the quantum internet can
pair shared between Alice and Charlie. The procedure is as exchange classical information, for example, over the clas-
follows: Bob performs a Bell measurement on Bob’s two sical Internet. Since quantum teleportation has distance con-
qubits and sends the two-bit outcome to Charlie, who then straints, quantum repeaters are used as intermediate nodes. It
performs a Pauli correction according to Bob’s measurement is clear that EPRs shared between two neighboring nodes has
outcome. This can also be regarded as Bob teleporting his to be constantly generated through the whole quantum inter-
particle B1 to Charlie by consuming the ERP pair |+ B2C . net. In the following we discuss the repeater-based quantum
In other words, quantum correlations can be teleported. internet and the packet loss error model.

VOLUME 2, 2021 4103709


IEEE Transactions on
uantum Engineering Yu et al.: PROTOCOLS FOR PACKET QUANTUM NETWORK INTERCOMMUNICATION

B. QUANTUM PACKETS AND PACKET LOSS


Classically, whenever one party sends certain data to another
party, it will retain a copy of the data until that the recipient
has acknowledged receipt of the data. A lost packet can be
retransmitted from the sender using the retained copy.
In a quantum network, quantum communication may be
disrupted due to unrecoverable mutation of the data or miss-
ing data. The reasons include quantum decoherence, imper-
fect operations, the network packet loss, and others. End-to-
end restoration procedures are desirable to allow complete
recovery from these conditions.
However, quantum laws prevent us from using certain
classical techniques. For example, assume that a bipartite
FIG. 1. Quantum Internet. state |ψA1 A2 B is shared between A and B, where A1 A2 are
held by A, and A wants to send A2 to B. The following
quantum features prohibit ideas from classical networks.

1) No-Cloning: In general, A cannot make a copy of A2 ,


says A2 while sending A2 through the network.
2) Monogamy: Even if A knows exactly the whole state
|ψA1 A2 B is a pure entangled state, A cannot make
FIG. 2. Repeater-based quantum channel. The gray lines are classical a copy A2 , such that the state of A1 A2 B is exactly
channels. Two entangled nodes are connected by a wavy line.
|ψA1 A2 B while sending A2 through the network. Also,
if A2 is lost, B cannot make a B2 , such that the state of
A1 B2 B is exactly |ψA1 A2 B , even if B knows the exact
A. REPEATER-BASED QUANTUM INTERNET characterization of state |ψA1 A2 B .
A quantum channel between two neighboring quantum de-
vices is required for the transmission of qubits. However, We will imitate the packet switching technique and pro-
quantum channels are inherently lossy and they are not re- pose the quantum analogue for the quantum internet so that
liable for long-distance communication. Consequently, the all quantum data are eventually transferred between each
techniques of quantum repeaters are used as intermediate source-destination pair in the next section.
nodes to reach long distances [36]–[39]. The idea is to do
a sequence of entanglement swapping or teleportation be- IV. TRANSPORT LAYER: QUANTUM TRANSMISSION
tween two consecutive nodes so that quantum communica- CONTROL PROTOCOL
tion between two endnodes can be implemented as shown in Quantum information is fragile through the transmission
Fig. 2. Suppose two neighboring quantum devices A and B over the quantum internet. Using quantum error-correcting
are connected by repeaters R1 , . . . , Rn , each of which has two codes to protect the packets is not enough for recovering
(or more) qubits. EPR pairs are constantly created between the underlying quantum message. To guarantee datagram
repeaters Ri,2 and Ri+1,1 for i = 1, . . . , n − 1, and between delivery, a quantum version of information retransmission is
A and R1,1 , B and Rn,2 . Then each repeater performs a Bell needed regardless the no-cloning theorem. Herein we show
measurement on its two qubits and passes the measurement how information retransmission can be achieved using the
outcomes to B for Pauli correction, using classical channels techniques of quantum secret sharing [35]. This guarantees
(the gray lines in Fig. 2). Thus A and B can share an EPR that the quantum data stream transmitted through quantum
pair.1 TCP (qTCP) will have exactly the same quantum information
A delicate step of a repeater-based quantum channel is that and correlation as the original stream with high probability.
the Pauli correction for teleportation can be deferred. For The qTCP operations may be divided into three phases:
example, suppose that a qubit is to be sent from node A to B Connection establishment, data transfer, and correction ter-
via a router R. Originally, A sends R the binary measurement mination. First, logical process-to-process connections are
outcome m1 and then R does a Pauli correction according to established by a quantum version of the three-way handshake
m1 . Instead, R can perform a Bell measurement on his qubits protocol. Next data streams are transferred; a retransmission
and send the binary outcome m2 , together with m1 , to B for protocol is used to prevent quantum packets from loss. Fi-
Pauli correction. In fact, having m1 + m2 mod 2 is enough nally, a termination protocol closes established virtual cir-
for B to recover the transmitted qubit. cuits and releases all allocated resources. To terminate a con-
nection, we can use the four-way handshake as in classical
1 This may be replaced by a process with deferred measurements, fol- TCP, where each side of the connection is terminated and
lowed by an overall Pauli correction in B [30]. each buffer is released independently.

4103709 VOLUME 2, 2021


IEEE Transactions on
Yu et al.: PROTOCOLS FOR PACKET QUANTUM NETWORK INTERCOMMUNICATION uantum Engineering

Note that each packet will be protected by a quantum


error-correcting code and a quantum message will be split
into several shares (packets) by a quantum secret sharing
scheme. Consequently, the quantum message is protected
by a concatenation of a quantum code and a secret sharing
scheme.
In the following subsections, we discuss the quantum
three-way handshake and retransmission protocols, respec-
tively. We first introduce some tools from quantum error
detection.

A. QUANTUM ERROR CORRECTION


The widely used error detection method, including parity
bits, cyclic redundancy check, and checksum, can be charac- FIG. 3. Quantum three-way handshake. The gray lines are classical
channels. Two entangled nodes are connected by a wavy line.
terized by a check function f : {0, 1}n → {0, 1}k as in the fol-
lowing encoding procedure: A given n-bit string s is encoded
as (s, f (s)) of (n + k) bits. This idea has been generalized to
QECCs [30]. 1) SYN: Host A establishes m local EPR pairs |+ A1 A2 .
Suppose a host wants to send an n-qubit register A through Host A sends SYN to Host B, together with the quan-
the quantum internet, using a check function f . Let |ψA,R be tum state of A2 (stored as B2 by Host B) by a qTCP
a purified state of A for a reference system R. The encoding packet.
is done by first appending k ancilla qubits in |0k S to A, and 2) SYN-ACK: Host B receives the qTCP packet. First,
the state of AS is of the form he applies the Pauli correction to B2 , and then sends
 SYN+1 to Host A, together with the quantum state of
α j | jA |φ j R |0k S . B2 (stored as A2 by A). Host B establishes m local EPR
0≤ j≤2n −1 pairs |+ B3 B4 . Then Host B sends ACK to Host A,
together with the quantum state of B3 (stored as A3 by
Then the host applies a unitary encoder U on AS to obtain A) by a qTCP packet. After verifying SYN+1, Host A
 performs an m-fold Bell measurement on A1 A2 and
α j | j
¯ AS |φ j R checks whether the measurement outcome is 02m .
0≤ j≤2n −1 3) ACK: Host A sends ACK+1, and transfers the quantum
state of A3 to B3 of Host B. After verifying ACK+1,
where | j
¯ AS is the encoded | jA . Upon receiving AS, the Host B performs an m-fold Bell measurement on B3 B4
receiver simply applies a decoding operation to AS so that and check whether the measurement outcome is 02m .
the state becomes
  At this point both hosts have received an acknowledgment
α j Ea,b | jA |φ j R |a, bS of the connection. One can observe that the quantum channel
0≤ j≤2n −1 a,b between the two hosts is noiseless if and only if the distri-
bution of EPRs is noiseless. This protocol can accurately
where a, b denote the error syndrome for Pauli X and Z, and detect channel noises. For illustration, we consider the ex-
Ea,b is a corresponding error operator. If there is no logical treme case that the entanglement is destroyed either during
error, measuring system S in the computational basis would the teleportation from A2 to B2 or from B2 to A2 . Assume
tell us an appropriate recovery operation and we can recover that the state of A1 A2 at the end of step 2) is ρA1 A2 , which is
the original state. It could be the case that some error occurs not entangled (or so-called separable). In other words, there
but the measurement outcome is 0k , which will lead to a exist probability distribution pi and quantum states |ψi A1,i
decoding error. This situation occurs with a small chance if and |ϕi A2,i , such that ρA1 A2 = i pi |ψψ|A1,i ⊗ |ϕϕ|A2,i .
the QECC is chosen appropriately. When we perform an m-fold Bell measurement on it, the
In the following, a packet will be protected by such an probability of obtaining 02m is
error-correcting code. This allows us to justify whether a  + ⊗m  + ⊗m 
packet is valid or not.   ρ  
 
≤ max + |⊗m (|ψi ψi | ⊗ |ϕi ϕi |)|+ ⊗m
i
B. CONNECTION ESTABLISHMENT
Fig. 3 illustrates the idea of quantum three-way handshake = max |+ |⊗m |ψi ⊗ ϕi |2
i
protocol. Host B first establishes a passive open, and then
Host A initiates an active open. To establish a quantum con- 1
≤ m.
nection, Host A and Host B operate as follows. 2

VOLUME 2, 2021 4103709


IEEE Transactions on
uantum Engineering Yu et al.: PROTOCOLS FOR PACKET QUANTUM NETWORK INTERCOMMUNICATION

C. DATA TRANSFER
A reason that the classical TCP works well is because classi-
cal information can be correctly read and copied. To handle
quantum retransmission, we start with a simple question:
How to reliably send a one-qubit state |ψ from Host A to
Host B through a noisy quantum channel?
Usually this question is handled by using a quantum error-
correcting code, which is designed for a certain error model.
Unfortunately, the channel dynamics of a quantum network
varies dramatically. For example, there are many routes con-
necting two endnodes and each node on a route may handle
many packets simultaneously. Since the EPRs are not perfect
all the time, packet loss is inevitable. However, we cannot
afford the loss of a quantum packet without any backup.
This probability gets smaller as the growth of m. If a noise- Herein we consider a retransmission protocol based on a
less quantum connection is established, our protocol reports variant of quantum error-correcting codes—quantum secret
“Successfully connected.” If the connection is noisy, our pro- sharing—so that at the end of the protocol we can be sure
tocol returns “Successfully connected.” with a small proba- that the state is perfectly transmitted.
bility. Our quantum retransmission protocol is given in Proto-
The classical and quantum connections for one direction col 3.
are created by steps 1) and 2) and they are acknowledged. The kernel of the protocol is a recursive use of the (2,3)
The classical and quantum connections for the other direction threshold scheme [35]. Note that as a initial study of this
are created by steps 2) and 3) and they are acknowledged. research direction, we choose the (2,3) threshold scheme
Consequently a full-duplex quantum communication is es- for illustration of quantum retransmission. In fact, the (2,3)
tablished. The detailed operations of hosts A and B in the threshold scheme is qutrit-based (a three level quantum sys-
quantum three-way handshake protocol are summarized in tem); we can simply represent a qutrit by two qubits without
Protocols 1 and 2, respectively. using the fourth level.

4103709 VOLUME 2, 2021


IEEE Transactions on
Yu et al.: PROTOCOLS FOR PACKET QUANTUM NETWORK INTERCOMMUNICATION uantum Engineering

FIG. 4. (Left) Successful quantum transmission. (Right) Unsuccessful Quantum transmission in the second send. Host A has to do one more recursion.

First, a quantum message A is encoded into three shares sharing scheme; the joint state between the sender and re-
A1 A2 A3 and at least two shares are required to recover the ceiver still has its support lie in the code space, such that the
message. Then the shares A2 and A3 are sent sequentially, recovering operation for the packet loss still works.
depending on the acknowledgment of the previous share. Remark: Our retransmission protocol is actually a recon-
If the first share A2 is acknowledged, the share A3 is then struction protocol so that the quantum package can be re-
sent. If A3 is also acknowledged, we are done since A2 A3 is constructed at the receiver by iteratively using the recovery
enough for recovering A. However, if A2 gets lost, A1 has to operation of a secret-sharing scheme.
be sent carefully. For that purpose, A1 is then encoded into Let us estimate the number of shares need to be sent. For
three shares by the (2,3) threshold scheme and the procedure simplicity we assume that the probability that a share gets lost
proceeds recursively. Fig. 4 illustrates these ideas. in transmission is p during a period of time. This can be mod-
After a close scrutiny, one can find that the transmission eled as a simple absorbing Markov chain with three states
succeeds if two consecutive shares are correctly received. {0, 1, 2}, where state i denotes the status of i-consecutive
Otherwise, either the remaining two shares have to be used successful transmission, and a transition matrix
to recover the first share or the remaining one share has to be ⎡ ⎤
encoded into three shares. p 1− p 0
⎢ ⎥
The above argument shows that a packet loss error can ⎣p 0 1 − p⎦ .
be corrected. In reality, other errors can occur. For instance, 0 0 1
each packet can be changed during transmission. We always
assume that such an error can be detected through measure- One can show that the expected number of total shares re-
ments on each packet, and a packet with detected errors will 2− p
quired to send one quantum message is . It can
be discarded. Now we are facing a postselection issue, mean- (1 − p)2
ing that a packet may be measured and collapsed into some be checked that when p < 0.5, no more than ten shares are
unwanted state. In the following, we show that such error can required to send one quantum message. When p gets larger
also be corrected. than 0.8, the required number grows quickly.
Observation 1: Quantum error correction works in a tensor In a less noisy channel, one can guarantee that this scheme
product manner. succeeds within a finite number of steps. However, a poten-
Suppose that the noisy channel N can be corrected tial problem here is that the storage of a receiver for this
through the encoding channel E and decoding channel D. quantum message is not unbounded. Although Host B may
Then, the encoding channel I ⊗ E and decoding channel need an unbounded classical data structure to maintain the
I ⊗ D can correct the noisy channel I ⊗ N . status of transmission, he has only four types of possible
Observation 2: We can always assume that the input state status.
is a pure state by adding ancilla qubits. Then, we observe 1) B is waiting for some A2(i) since the previous A2(i−1) is
that the decoding operator can still correct errors even after not received or valid.
postselection as follows: For any σ , such that Supp(σ ) ⊂ 2) A2(i) is received, and B is waiting for A3(i) .
Supp(N ◦ E (|ψψ|)), we always have
3) A2(i) is received, but the corresponding A3(i) is not valid.
4) A2 and A3 are both validly received.
D(σ ) ∝ |ψψ|.
The Pseudo acknowledgment number and Pseudo Win-
Combining these two observations, we know that the posts- dow of the qTCP packet are used for the acknowledgment
election of a new packet does not effect the quantum secret of the status of Host B.

VOLUME 2, 2021 4103709


IEEE Transactions on
uantum Engineering Yu et al.: PROTOCOLS FOR PACKET QUANTUM NETWORK INTERCOMMUNICATION

We notice that this protocol succeeds if there are two ACKNOWLEDGMENT


consecutive successful transmissions. Therefore, to prevent Nengkun Yu thanks You Wang’s generous help in the prepa-
the packet size from becoming unbounded due to potentially ration of this article and Peter Rohde for helpful communi-
unbounded recursive depth, during data transmission, the cation. Ching-Yi Lai thanks Kai-Min Chung for comments
sender and the receiver are required to synchronize the status that improve the article’s presentation.
of each block of original data, A. For example, assume that
A2 is transmitted successfully but A3 is not. Now the sender
and receiver will notify each other that the quantum message
to be sent is A1 . In other words, they will rename the buffer REFERENCES
of A by the buffer of A1 and the packet. [1] R. Van Meter and S. J. Devitt, “The path to scalable distributed
quantum computing,” Computer vol. 49, no. 9, pp. 31–42, 2016,
doi: 10.1109/MC.2016.291.
[2] R. Raz, “Exponential separation of quantum and classical communication
V. CONCLUSION complexity,” in Proc. 1999 ACM 31st Annu. Symp. Theory Comput., ser.,
We have discussed the interconnection of packet quantum 1999, pp. 358–367, doi: 10.1137/060651835.
[3] O. Regev and B. Klartag, “Quantum one-way communication
network intercommunication for quantum repeater network. can be exponentially stronger than classical communication,” in
In particular, we proposed qTCPs, which provide reliable Proc. ACM 43rd Annu. Symp. Theory Comput., 2011, pp. 31–40,
quantum packet communication. The (2,3) threshold scheme doi: 10.1145/1993636.1993642.
[4] C. Bennett and G. Brassard, “Quantum cryptography: Public key distri-
was used for illustration. One may develop a general quan- bution and coin tossing,” in Proc. IEEE Int. Conf. Comput., Syst., Signal
tum retransmission scheme based on any quantum secret Process., 1984, pp. 175–179, doi: 10.1016/j.tcs.2011.08.039.
sharing scheme and find an optimal scheme with high data [5] C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Ex-
rate. One of the shortcomings of packet-switched quan- perimental quantum cryptography,” J. Cryptol., vol. 5, no. 1, pp. 3–28,
Jan. 1992, doi: 10.1007/BF00191318.
tum networks is that it requires low error rate of trans- [6] A. Broadbent, J. Fitzsimons, and E. Kashefi, “Universal blind quantum
mission, that is, it is more challenging in the hardware. computation,” in Proc. 50th Annu. IEEE Symp. Foundations Comput. Sci.,
This would prevent the implementation of packet-switched 2009, pp. 517–526, doi: 10.1109/FOCS.2009.36.
[7] Y. Dulek, C. Schaffner, and F. Speelman, “Quantum homomorphic en-
quantum networks in the near future. One may consider a cryption for polynomial-sized circuits,” in Advances in Cryptology -
quantum network based on circuit switching for near-term CRYPTO 2016. M. Robshaw and J. Katz, Eds. Berlin, Heidelberg:
devices. Springer, 2016, pp. 3–32, doi: 10.4086/toc.2018.v014a007.
The main cost of our retransmission protocol is the num- [8] U. Mahadev, “Classical verification of quantum computations,” in Proc.
59th IEEE Annu. Symp. Foundations Comput. Sci., Paris, France, 2018,
ber of shares required to send a quantum message or the pp. 259–267, doi: 10.1109/FOCS.2018.00033.
number of secret-sharing recovery operations required. Con- [9] C. Elliott, “Building the quantum network,” New J. Phys., vol. 4,
sequently, we have analyzed the expected number of shares pp. 46–46, Jul. 2002, doi: 10.1088/1367-2630/4/1/346.
[10] S. Lloyd, J. H. Shapiro, F. N. C. Wong, P. Kumar, S. M. Shahriar,
(say M(p)) for a given packet loss rate p. Then the quantum and H. P. Yuen, “Infrastructure for the quantum Internet,” ACM SIG-
hardware has to support a consecutive implementation of at COMM Comput. Commun. Rev., vol. 34, no. 5, pp. 9–20, 2004,
least 2M(p) complete QEC procedures. Thus, the coherent doi: 10.1145/1039111.1039118.
time of a quantum memory should be much larger than the [11] S. Wehner, D. Elkouss, and R. Hanson, “Quantum Internet: A vi-
sion for the road ahead,” Science, vol. 362, 2018, Art. no. 6412,
implementation time of 2M(p) QEC procedures. If a (2,3) doi: 10.1126/science.aam9288.
threshold scheme based on an N-qubit quantum code is used, [12] H. J. Kimble, “The quantum Internet,” Nature, vol. 453, pp. 1023–1030,
roughly 2NM(p) EPR pairs are required. So we can estimate 2008, doi: 10.1038/nature07127.
[13] A. Reiserer and G. Rempe, “Cavity-based quantum networks with single
the size of quantum memory required for each node to be atoms and optical photons,” Rev. Modern Phys., vol. 87, pp. 1379–1418,
2NM(p) per quantum message. These numbers may provide Dec. 2015, doi: 10.1103/RevModPhys.87.1379.
the minimum resource for demonstrating an experiment on [14] M. Caleffi, A. S. Cacciapuoti, and G. Bianchi, “Quantum Inter-
quantum internet, although the scale is still beyond today’s net: From communication to distributed computing,” in Proc. 5th
ACM Int. Conf. Nanoscale Comput. Commun., 2018, Art. no. 3,
technology. doi: 10.1145/3233188.3233224.
The next step is to study techniques for congestion avoid- [15] A. S. Cacciapuoti, M. Caleffi, F. Tafuri, F. S. Cataliotti, S. Gherardini,
ance and control of quantum network protocols. In classi- and G. Bianchi, “Quantum Internet: Networking challenges in distributed
quantum computing,” IEEE Netw., vol. 34, no. 1, pp. 137–143, Jan./Feb.
cal Internet, packet switching introduces new complexities, 2020, doi: 10.1109/MNET.001.1900092.
since the packets must be reordered and reassembled at the [16] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W.
destination. Also, since there are no dedicated circuits, the K. Wootters, “Teleporting an unknown quantum state via dual classi-
cal and Einstein-Podolsky-Rosen channels,” Phys. Rev. Lett., vol. 70,
network links can become congested, potentially resulting pp. 1895–1899, Mar. 1993, doi: 10.1103/PhysRevLett.70.1895.
in lost packets. Quantum effects bring new challenges in [17] M. Pant et al., “Routing entanglement in the quantum Internet,” NPJ
developing congestion control algorithms for qTCPs. Quantum Inform., vol. 5, 2019, Art. no. 25, doi: 10.1038/s41534-019-
Another interesting project is to produce a detailed speci- 0139-x.
[18] H.-J. Briegel, W. Dür, J. I. Cirac, and P. Zoller, “Quantum re-
fication of these protocols and implement a prototype so that peaters: The role of imperfect local operations in quantum com-
some initial simulation, and in the future some experiments, munication,” Phys. Rev. Lett., vol. 81, pp. 5932–5935, Dec. 1998,
with it can be performed. doi: 10.1103/physrevlett.81.5932.

4103709 VOLUME 2, 2021


IEEE Transactions on
Yu et al.: PROTOCOLS FOR PACKET QUANTUM NETWORK INTERCOMMUNICATION uantum Engineering

[19] R. V. Meter and J. Touch, “Designing quantum repeater networks,” [30] M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum
IEEE Commun. Mag., vol. 51, no. 8, pp. 64–71, Aug. 2013, doi: Information: 10th Anniversary Edition, 10th ed. New York, NY, USA:
10.1109/MCOM.2013.6576340. Cambridge Univ. Press, 2011, doi: 10.1017/CBO9780511976667.
[20] A. Pirker and W. Dür, “A quantum network stack and protocols for reliable [31] A. Einstein, B. Podolsky, and N. Rosen, “Can quantum-mechanical de-
entanglement-based networks,” New J. Phys., vol. 21, no. 3, Mar. 2019, scription of physical reality be considered complete?,” Phys. Rev., vol. 47,
Art. no. 033003, doi: 10.1088/1367-2630/ab05f7. pp. 777–780, May 1935, doi: 10.1103/PhysRev.47.777.
[21] A. Dahlberg et al., “A link layer protocol for quantum networks,” [32] M. Żukowski, A. Zeilinger, M. A. Horne, and A. K. Ekert, ““Event-ready-
in Proc. ACM Special Int. Group Data Commun., 2019, pp. 159–173, detectors” bell experiment via entanglement swapping,” Phys. Rev. Lett.,
doi: 10.1145/3341302.3342070. vol. 71, pp. 4287–4290, Dec. 1993, doi: 10.1103/PhysRevLett.71.4287.
[22] S. Shi and C. Qian, “Concurrent entanglement routing for quantum net- [33] C. H. Bennett et al., “Reduction of quantum entropy by reversible
works: Model and designs,” in Proc. Annu. Conf. ACM Special Int. Group extraction of classical information,” J. Modern Opt., vol. 41, no. 12,
Data Commun. Appl., Technol., Architectures, Protoc. Comput. Commun., pp. 2307–2314, 1994, doi: 10.1080/09500349414552161.
2020, pp. 62–75, doi: 10.1145/3387514.3405853. [34] D. Dieks, “Communication by EPR devices,” Phys. Lett. A, vol. 92, no. 6,
[23] T. Coopmans et al., “NetSquid, a NETwork simulator for Quantum infor- pp. 271–272, 1982, doi: 10.1016/0375-9601(82)90084-6.
mation using discrete events,” Commun Phys., vol. 4, 2021, Art. no. 164, [35] R. Cleve, D. Gottesman, and H.-K. Lo, “How to share a quan-
doi: 10.1038/s42005-021-00647-8. tum secret,” Phys. Rev. Lett., vol. 83, pp. 648–651, Jul. 1999, doi:
[24] K. Azuma, S. Bäuml, T. Coopmans, D. Elkouss, and B. Li, “Tools 10.1103/PhysRevLett.83.648.
for quantum network design,” AVS Quantum Sci., vol. 3, no. 1, 2021, [36] L. Jiang, J. M. Taylor, K. Nemoto, W. J. Munro, R. Van Meter, and
Art. no. 014101, doi: 10.1116/5.0024062. M. D. Lukin, “Quantum repeater with encoding,” Phys. Rev. A, vol. 79,
[25] R. V. Meter, “Quantum networking and internetworking,” Mar. 2009, Art. no. 032325, doi: 10.1103/PhysRevA.79.032325.
IEEE Netw., vol. 26, no. 4, pp. 59–64, Jul./Aug. 2012, doi: [37] C. Simon, H. de Riedmatten, M. Afzelius, N. Sangouard, H. Zbinden,
10.1109/MNET.2012.6246754. and N. Gisin, “Quantum repeaters with photon pair sources and multi-
[26] W. Kozlowski, A. Dahlberg, and S. Wehner, “Designing a quantum net- mode memories,” Phys. Rev. Lett., vol. 98, May 2007, Art. no. 190503,
work protocol,” in Proc. 16th Int. Conf. Emerg. Netw. Experiments Tech- doi: 10.1103/PhysRevLett.98.190503.
nol., 2020, pp. 1–16, doi: 10.1145/3386367.3431293. [38] M. William, A. Koji, T. Kiyoshi, and N. Kae, “Inside quantum repeaters,”
[27] C. Vinton and K. Robert, “A protocol for packet network intercommuni- IEEE J. Sel. Topics Quantum Electron., vol. 21, no. 3, pp. 78–90, May/Jun.
cation,” IEEE Trans. Commun., vol. 22, no. 5, pp. 637–648, May 1974, 2015, doi: 10.1109/JSTQE.2015.2392076.
doi: 10.1109/TCOM.1974.1092259. [39] N. Sangouard, C. Simon, H. de Riedmatten, and N. Gisin, “Quantum re-
[28] W. Wootters and W. Zurek, “A single quantum cannot be cloned,” Nature, peaters based on atomic ensembles and linear optics,” Rev. Modern Phys.,
vol. 299, pp. 802–803, 1982, doi: 10.1038/299802a0. vol. 83, pp. 33–80, Mar. 2011, doi: 10.1103/RevModPhys.83.33.
[29] P. W. Shor, “Scheme for reducing decoherence in quantum com-
puter memory,” Phys. Rev. A, vol. 52, pp. R2493–R2496, Oct. 1995,
doi: 10.1103/PhysRevA.52.R2493.

VOLUME 2, 2021 4103709

You might also like