diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc9340.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc9340.txt')
-rw-r--r-- | doc/rfc/rfc9340.txt | 2173 |
1 files changed, 2173 insertions, 0 deletions
diff --git a/doc/rfc/rfc9340.txt b/doc/rfc/rfc9340.txt new file mode 100644 index 0000000..a413db1 --- /dev/null +++ b/doc/rfc/rfc9340.txt @@ -0,0 +1,2173 @@ + + + + +Internet Research Task Force (IRTF) W. Kozlowski +Request for Comments: 9340 S. Wehner +Category: Informational QuTech +ISSN: 2070-1721 R. Van Meter + Keio University + B. Rijsman + Individual + A. S. Cacciapuoti + M. Caleffi + University of Naples Federico II + S. Nagayama + Mercari, Inc. + March 2023 + + + Architectural Principles for a Quantum Internet + +Abstract + + The vision of a quantum internet is to enhance existing Internet + technology by enabling quantum communication between any two points + on Earth. To achieve this goal, a quantum network stack should be + built from the ground up to account for the fundamentally new + properties of quantum entanglement. The first quantum entanglement + networks have been realised, but there is no practical proposal for + how to organise, utilise, and manage such networks. In this + document, we attempt to lay down the framework and introduce some + basic architectural principles for a quantum internet. This is + intended for general guidance and general interest. It is also + intended to provide a foundation for discussion between physicists + and network specialists. This document is a product of the Quantum + Internet Research Group (QIRG). + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Research Task Force + (IRTF). The IRTF publishes the results of Internet-related research + and development activities. These results might not be suitable for + deployment. This RFC represents the consensus of the Quantum + Internet Research Group of the Internet Research Task Force (IRTF). + Documents approved for publication by the IRSG are not candidates for + any level of Internet Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc9340. + +Copyright Notice + + Copyright (c) 2023 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. + +Table of Contents + + 1. Introduction + 2. Quantum Information + 2.1. Quantum State + 2.2. Qubit + 2.3. Multiple Qubits + 3. Entanglement as the Fundamental Resource + 4. Achieving Quantum Connectivity + 4.1. Challenges + 4.1.1. The Measurement Problem + 4.1.2. No-Cloning Theorem + 4.1.3. Fidelity + 4.1.4. Inadequacy of Direct Transmission + 4.2. Bell Pairs + 4.3. Teleportation + 4.4. The Life Cycle of Entanglement + 4.4.1. Elementary Link Generation + 4.4.2. Entanglement Swapping + 4.4.3. Error Management + 4.4.4. Delivery + 5. Architecture of a Quantum Internet + 5.1. Challenges + 5.2. Classical Communication + 5.3. Abstract Model of the Network + 5.3.1. The Control Plane and the Data Plane + 5.3.2. Elements of a Quantum Network + 5.3.3. Putting It All Together + 5.4. Physical Constraints + 5.4.1. Memory Lifetimes + 5.4.2. Rates + 5.4.3. Communication Qubits + 5.4.4. Homogeneity + 6. Architectural Principles + 6.1. Goals of a Quantum Internet + 6.2. The Principles of a Quantum Internet + 7. A Thought Experiment Inspired by Classical Networks + 8. Security Considerations + 9. IANA Considerations + 10. Informative References + Acknowledgements + Authors' Addresses + +1. Introduction + + Quantum networks are distributed systems of quantum devices that + utilise fundamental quantum mechanical phenomena such as + superposition, entanglement, and quantum measurement to achieve + capabilities beyond what is possible with non-quantum (classical) + networks [Kimble08]. Depending on the stage of a quantum network + [Wehner18], such devices may range from simple photonic devices + capable of preparing and measuring only one quantum bit (qubit) at a + time all the way to large-scale quantum computers of the future. A + quantum network is not meant to replace classical networks but rather + to form an overall hybrid classical-quantum network supporting new + capabilities that are otherwise impossible to realise [VanMeterBook]. + For example, the most well-known application of quantum + communication, Quantum Key Distribution (QKD) [QKD], can create and + distribute a pair of symmetric encryption keys in such a way that the + security of the entire process relies on the laws of physics (and + thus can be mathematically proven to be unbreakable) rather than the + intractability of certain mathematical problems [Bennett14] + [Ekert91]. Small networks capable of QKD have even already been + deployed at short (roughly 100-kilometre) distances [Elliott03] + [Peev09] [Aguado19] [Joshi20]. + + The quantum networking paradigm also offers promise for a range of + new applications beyond quantum cryptography, such as distributed + quantum computation [Cirac99] [Crepeau02]; secure quantum computing + in the cloud [Fitzsimons17]; quantum-enhanced measurement networks + [Giovannetti04]; or higher-precision, long-baseline telescopes + [Gottesman12]. These applications are much more demanding than QKD, + and networks capable of executing them are in their infancy. The + first fully quantum, multinode network capable of sending, receiving, + and manipulating distributed quantum information has only recently + been realised [Pompili21.1]. + + Whilst a lot of effort has gone into physically realising and + connecting such devices, and making improvements to their speed and + error tolerance, no proposals for how to run these networks have been + worked out at the time of this writing. To draw an analogy with a + classical network, we are at a stage where we can start to physically + connect our devices and send data, but all sending, receiving, buffer + management, connection synchronisation, and so on must be managed by + the application directly by using low-level, custom-built, and + hardware-specific interfaces, rather than being managed by a network + stack that exposes a convenient high-level interface, such as + sockets. Only recently was the first-ever attempt at such a network + stack experimentally demonstrated in a laboratory setting + [Pompili21.2]. Furthermore, whilst physical mechanisms for + transmitting quantum information exist, there are no robust protocols + for managing such transmissions. + + This document, produced by the Quantum Internet Research Group + (QIRG), introduces quantum networks and presents general guidelines + for the design and construction of such networks. Overall, it is + intended as an introduction to the subject for network engineers and + researchers. It should not be considered as a conclusive statement + on how quantum networks should or will be implemented. This document + was discussed on the QIRG mailing list and several IETF meetings. It + represents the consensus of the QIRG members, of both experts in the + subject matter (from the quantum and networking domains) and + newcomers who are the target audience. + +2. Quantum Information + + In order to understand the framework for quantum networking, a basic + understanding of quantum information theory is necessary. The + following sections aim to introduce the minimum amount of knowledge + necessary to understand the principles of operation of a quantum + network. This exposition was written with a classical networking + audience in mind. It is assumed that the reader has never before + been exposed to any quantum physics. We refer the reader to + [SutorBook] and [NielsenChuang] for an in-depth introduction to + quantum information systems. + +2.1. Quantum State + + A quantum mechanical system is described by its quantum state. A + quantum state is an abstract object that provides a complete + description of the system at that particular moment. When combined + with the rules of the system's evolution in time, such as a quantum + circuit, it also then provides a complete description of the system + at all times. For the purposes of computing and networking, the + classical equivalent of a quantum state would be a string or stream + of logical bit values. These bits provide a complete description of + what values we can read out from that string at that particular + moment, and when combined with its rules for evolution in time, such + as a logical circuit, we will also know its value at any other time. + + Just like a single classical bit, a quantum mechanical system can be + simple and consist of a single particle, e.g., an atom or a photon of + light. In this case, the quantum state provides the complete + description of that one particle. Similarly, just like a string of + bits consists of multiple bits, a single quantum state can be used to + also describe an ensemble of many particles. However, because + quantum states are governed by the laws of quantum mechanics, their + behaviour is significantly different to that of a string of bits. In + this section, we will summarise the key concepts to understand these + differences. We will then explain their consequences for networking + in the rest of this document. + +2.2. Qubit + + The differences between quantum computation and classical computation + begin at the bit level. A classical computer operates on the binary + alphabet { 0, 1 }. A quantum bit, called a qubit, exists over the + same binary space, but unlike the classical bit, its state can exist + in a superposition of the two possibilities: + + |qubit⟩ = a |0⟩ + b |1⟩, + + where |X⟩ is Dirac's ket notation for a quantum state (the value that + a qubit holds) -- here, the binary 0 and 1 -- and the coefficients a + and b are complex numbers called probability amplitudes. Physically, + such a state can be realised using a variety of different + technologies such as electron spin, photon polarisation, atomic + energy levels, and so on. + + Upon measurement, the qubit loses its superposition and irreversibly + collapses into one of the two basis states, either |0⟩ or |1⟩. Which + of the two states it ends up in may not be deterministic but can be + determined from the readout of the measurement. The measurement + result is a classical bit, 0 or 1, corresponding to |0⟩ and |1⟩, + respectively. The probability of measuring the state in the |0⟩ + state is |a|^2; similarly, the probability of measuring the state in + the |1⟩ state is |b|^2, where |a|^2 + |b|^2 = 1. This randomness is + not due to our ignorance of the underlying mechanisms but rather is a + fundamental feature of a quantum mechanical system [Aspect81]. + + The superposition property plays an important role in fundamental + gate operations on qubits. Since a qubit can exist in a + superposition of its basis states, the elementary quantum gates are + able to act on all states of the superposition at the same time. For + example, consider the NOT gate: + + NOT (a |0⟩ + b |1⟩) → a |1⟩ + b |0⟩. + + It is important to note that "qubit" can have two meanings. In the + first meaning, "qubit" refers to a physical quantum *system* whose + quantum state can be expressed as a superposition of two basis + states, which we often label |0⟩ and |1⟩. Here, "qubit" refers to a + physical implementation akin to what a flip-flop, switch, voltage, or + current would be for a classical bit. In the second meaning, "qubit" + refers to the abstract quantum *state* of a quantum system with such + two basis states. In this case, the meaning of "qubit" is akin to + the logical value of a bit, from classical computing, i.e., "logical + 0" or "logical 1". The two concepts are related, because a physical + "qubit" (first meaning) can be used to store the abstract "qubit" + (second meaning). Both meanings are used interchangeably in + literature, and the meaning is generally clear from the context. + +2.3. Multiple Qubits + + When multiple qubits are combined in a single quantum state, the + space of possible states grows exponentially and all these states can + coexist in a superposition. For example, the general form of a two- + qubit register is + + a |00⟩ + b |01⟩ + c |10⟩ + d |11⟩, + + where the coefficients have the same probability amplitude + interpretation as for the single-qubit state. Each state represents + a possible outcome of a measurement of the two-qubit register. For + example, |01⟩ denotes a state in which the first qubit is in the + state |0⟩ and the second is in the state |1⟩. + + Performing single-qubit gates affects the relevant qubit in each of + the superposition states. Similarly, two-qubit gates also act on all + the relevant superposition states, but their outcome is far more + interesting. + + Consider a two-qubit register where the first qubit is in the + superposed state (|0⟩ + |1⟩)/sqrt(2) and the other is in the + state |0⟩. This combined state can be written as + + (|0⟩ + |1⟩)/sqrt(2) x |0⟩ = (|00⟩ + |10⟩)/sqrt(2), + + where x denotes a tensor product (the mathematical mechanism for + combining quantum states together). + + The constant 1/sqrt(2) is called the normalisation factor and + reflects the fact that the probabilities of measuring either a |0⟩ or + a |1⟩ for the first qubit add up to one. + + Let us now consider the two-qubit Controlled NOT, or CNOT, gate. The + CNOT gate takes as input two qubits -- a control and a target -- and + applies the NOT gate to the target if the control qubit is set. The + truth table looks like + + +====+=====+ + | IN | OUT | + +====+=====+ + | 00 | 00 | + +----+-----+ + | 01 | 01 | + +----+-----+ + | 10 | 11 | + +----+-----+ + | 11 | 10 | + +----+-----+ + + Table 1: CNOT Truth Table + + Now, consider performing a CNOT gate on the state with the first + qubit being the control. We apply a two-qubit gate on all the + superposition states: + + CNOT (|00⟩ + |10⟩)/sqrt(2) → (|00⟩ + |11⟩)/sqrt(2). + + What is so interesting about this two-qubit gate operation? The + final state is *entangled*. There is no possible way of representing + that quantum state as a product of two individual qubits; they are no + longer independent. That is, it is not possible to describe the + quantum state of either of the individual qubits in a way that is + independent of the other qubit. Only the quantum state of the system + that consists of both qubits provides a physically complete + description of the two-qubit system. The states of the two + individual qubits are now correlated beyond what is possible to + achieve classically. Neither qubit is in a definite |0⟩ or |1⟩ + state, but if we perform a measurement on either one, the outcome of + the partner qubit will *always* yield the exact same outcome. The + final state, whether it's |00⟩ or |11⟩, is fundamentally random as + before, but the states of the two qubits following a measurement will + always be identical. One can think of this as flipping two coins, + but both coins always land on "heads" or both land on "tails" + together -- something that we know is impossible classically. + + Once a measurement is performed, the two qubits are once again + independent. The final state is either |00⟩ or |11⟩, and both of + these states can be trivially decomposed into a product of two + individual qubits. The entanglement has been consumed, and the + entangled state must be prepared again. + +3. Entanglement as the Fundamental Resource + + Entanglement is the fundamental building block of quantum networks. + Consider the state from the previous section: + + (|00⟩ + |11⟩)/sqrt(2). + + Neither of the two qubits is in a definite |0⟩ or |1⟩ state, and we + need to know the state of the entire register to be able to fully + describe the behaviour of the two qubits. + + Entangled qubits have interesting non-local properties. Consider + sending one of the qubits to another device. This device could in + principle be anywhere: on the other side of the room, in a different + country, or even on a different planet. Provided negligible noise + has been introduced, the two qubits will forever remain in the + entangled state until a measurement is performed. The physical + distance does not matter at all for entanglement. + + This lies at the heart of quantum networking, because it is possible + to leverage the non-classical correlations provided by entanglement + in order to design completely new types of application protocols that + are not possible to achieve with just classical communication. + Examples of such applications are quantum cryptography [Bennett14] + [Ekert91], blind quantum computation [Fitzsimons17], or distributed + quantum computation [Crepeau02]. + + Entanglement has two very special features from which one can derive + some intuition about the types of applications enabled by a quantum + network. + + The first stems from the fact that entanglement enables stronger- + than-classical correlations, leading to opportunities for tasks that + require coordination. As a trivial example, consider the problem of + consensus between two nodes who want to agree on the value of a + single bit. They can use the quantum network to prepare the state + (|00⟩ + |11⟩)/sqrt(2) with each node holding one of the two qubits. + Once either of the two nodes performs a measurement, the state of the + two qubits collapses to either |00⟩ or |11⟩, so whilst the outcome is + random and does not exist before measurement, the two nodes will + always measure the same value. We can also build the more general + multi-qubit state (|00...⟩ + |11...⟩)/sqrt(2) and perform the same + algorithm between an arbitrary number of nodes. These stronger-than- + classical correlations generalise to measurement schemes that are + more complicated as well. + + The second feature of entanglement is that it cannot be shared, in + the sense that if two qubits are maximally entangled with each other, + then it is physically impossible for these two qubits to also be + entangled with a third qubit [Terhal04]. Hence, entanglement forms a + sort of private and inherently untappable connection between two + nodes once established. + + Entanglement is created through local interactions between two qubits + or as a product of the way the qubits were created (e.g., entangled + photon pairs). To create a distributed entangled state, one can then + physically send one of the qubits to a remote node. It is also + possible to directly entangle qubits that are physically separated, + but this still requires local interactions between some other qubits + that the separated qubits are initially entangled with. Therefore, + it is the transmission of qubits that draws the line between a + genuine quantum network and a collection of quantum computers + connected over a classical network. + + A quantum network is defined as a collection of nodes that is able to + exchange qubits and distribute entangled states amongst themselves. + A quantum node that is able only to communicate classically with + another quantum node is not a member of a quantum network. + + Services and applications that are more complex can be built on top + of entangled states distributed by the network; for example, see + [ZOO]. + +4. Achieving Quantum Connectivity + + This section explains the meaning of quantum connectivity and the + necessary physical processes at an abstract level. + +4.1. Challenges + + A quantum network cannot be built by simply extrapolating all the + classical models to their quantum analogues. Sending qubits over a + wire like we send classical bits is simply not as easy to do. There + are several technological as well as fundamental challenges that make + classical approaches unsuitable in a quantum context. + +4.1.1. The Measurement Problem + + In classical computers and networks, we can read out the bits stored + in memory at any time. This is helpful for a variety of purposes + such as copying, error detection and correction, and so on. This is + not possible with qubits. + + A measurement of a qubit's state will destroy its superposition and + with it any entanglement it may have been part of. Once a qubit is + being processed, it cannot be read out until a suitable point in the + computation, determined by the protocol handling the qubit, has been + reached. Therefore, we cannot use the same methods known from + classical computing for the purposes of error detection and + correction. Nevertheless, quantum error detection and correction + schemes exist that take this problem into account, and how a network + chooses to manage errors will have an impact on its architecture. + +4.1.2. No-Cloning Theorem + + Since directly reading the state of a qubit is not possible, one + could ask if we can simply copy a qubit without looking at it. + Unfortunately, this is fundamentally not possible in quantum + mechanics [Park70] [Wootters82]. + + The no-cloning theorem states that it is impossible to create an + identical copy of an arbitrary, unknown quantum state. Therefore, it + is also impossible to use the same mechanisms that worked for + classical networks for signal amplification, retransmission, and so + on, as they all rely on the ability to copy the underlying data. + Since any physical channel will always be lossy, connecting nodes + within a quantum network is a challenging endeavour, and its + architecture must at its core address this very issue. + +4.1.3. Fidelity + + In general, it is expected that a classical packet arrives at its + destination without any errors introduced by hardware noise along the + way. This is verified at various levels through a variety of error + detection and correction mechanisms. Since we cannot read or copy a + quantum state, error detection and correction are more involved. + + To describe the quality of a quantum state, a physical quantity + called fidelity is used [NielsenChuang]. Fidelity takes a value + between 0 and 1 -- higher is better, and less than 0.5 means the + state is unusable. It measures how close a quantum state is to the + state we have tried to create. It expresses the probability that the + state will behave exactly the same as our desired state. Fidelity is + an important property of a quantum system that allows us to quantify + how much a particular state has been affected by noise from various + sources (gate errors, channel losses, environment noise). + + Interestingly, quantum applications do not need perfect fidelity to + be able to execute -- as long as the fidelity is above some + application-specific threshold, they will simply operate at lower + rates. Therefore, rather than trying to ensure that we always + deliver perfect states (a technologically challenging task), + applications will specify a minimum threshold for the fidelity, and + the network will try its best to deliver it. A higher fidelity can + be achieved by either having hardware produce states of better + fidelity (sometimes one can sacrifice rate for higher fidelity) or + employing quantum error detection and correction mechanisms (see + [Mural16] and Chapter 11 of [VanMeterBook]). + +4.1.4. Inadequacy of Direct Transmission + + Conceptually, the most straightforward way to distribute an entangled + state is to simply transmit one of the qubits directly to the other + end across a series of nodes while performing sufficient forward + Quantum Error Correction (QEC) (Section 4.4.3.2) to bring losses down + to an acceptable level. Despite the no-cloning theorem and the + inability to directly measure a quantum state, error-correcting + mechanisms for quantum communication exist [Jiang09] [Fowler10] + [Devitt13] [Mural16]. However, QEC makes very high demands on both + resources (physical qubits needed) and their initial fidelity. + Implementation is very challenging, and QEC is not expected to be + used until later generations of quantum networks are possible (see + Figure 2 of [Mural16] and Section 4.4.3.3 of this document). Until + then, quantum networks rely on entanglement swapping (Section 4.4.2) + and teleportation (Section 4.3). This alternative relies on the + observation that we do not need to be able to distribute any + arbitrary entangled quantum state. We only need to be able to + distribute any one of what are known as the Bell pair states + [Briegel98]. + +4.2. Bell Pairs + + Bell pair states are the entangled two-qubit states: + + |00⟩ + |11⟩, + |00⟩ - |11⟩, + |01⟩ + |10⟩, + |01⟩ - |10⟩, + + where the constant 1/sqrt(2) normalisation factor has been ignored + for clarity. Any of the four Bell pair states above will do, as it + is possible to transform any Bell pair into another Bell pair with + local operations performed on only one of the qubits. When each + qubit in a Bell pair is held by a separate node, either node can + apply a series of single-qubit gates to their qubit alone in order to + transform the state between the different variants. + + Distributing a Bell pair between two nodes is much easier than + transmitting an arbitrary quantum state over a network. Since the + state is known, handling errors becomes easier, and small-scale error + correction (such as entanglement distillation, as discussed in + Section 4.4.3.1), combined with reattempts, becomes a valid strategy. + + The reason for using Bell pairs specifically as opposed to any other + two-qubit state is that they are the maximally entangled two-qubit + set of basis states. Maximal entanglement means that these states + have the strongest non-classical correlations of all possible two- + qubit states. Furthermore, since single-qubit local operations can + never increase entanglement, states that are less entangled would + impose some constraints on distributed quantum algorithms. This + makes Bell pairs particularly useful as a generic building block for + distributed quantum applications. + +4.3. Teleportation + + The observation that we only need to be able to distribute Bell pairs + relies on the fact that this enables the distribution of any other + arbitrary entangled state. This can be achieved via quantum state + teleportation [Bennett93]. Quantum state teleportation consumes an + unknown qubit state that we want to transmit and recreates it at the + desired destination. This does not violate the no-cloning theorem, + as the original state is destroyed in the process. + + To achieve this, an entangled pair needs to be distributed between + the source and destination before teleportation commences. The + source then entangles the transmission qubit with its end of the pair + and performs a readout of the two qubits (the sum of these operations + is called a Bell state measurement). This consumes the Bell pair's + entanglement, turning the source and destination qubits into + independent states. The measurement yields two classical bits, which + the source sends to the destination over a classical channel. Based + on the value of the received two classical bits, the destination + performs one of four possible corrections (called the Pauli + corrections) on its end of the pair, which turns it into the unknown + qubit state that we wanted to transmit. This requirement to + communicate the measurement readout over a classical channel + unfortunately means that entanglement cannot be used to transmit + information faster than the speed of light. + + The unknown quantum state that was transmitted was never fed into the + network itself. Therefore, the network needs to only be able to + reliably produce Bell pairs between any two nodes in the network. + Thus, a key difference between a classical data plane and a quantum + data plane is that a classical data plane carries user data but a + quantum data plane provides the resources for the user to transmit + user data themselves without further involvement of the network. + +4.4. The Life Cycle of Entanglement + + Reducing the problem of quantum connectivity to one of generating a + Bell pair has reduced the problem to a simpler, more fundamental + case, but it has not solved it. In this section, we discuss how + these entangled pairs are generated in the first place and how their + two qubits are delivered to the end-points. + +4.4.1. Elementary Link Generation + + In a quantum network, entanglement is always first generated locally + (at a node or an auxiliary element), followed by a movement of one or + both of the entangled qubits across the link through quantum + channels. In this context, photons (particles of light) are the + natural candidate for entanglement carriers. Because these photons + carry quantum states from place to place at high speed, we call them + flying qubits. The rationale for this choice is related to the + advantages provided by photons, such as moderate interaction with the + environment leading to moderate decoherence; convenient control with + standard optical components; and high-speed, low-loss transmissions. + However, since photons are hard to store, a transducer must transfer + the flying qubit's state to a qubit suitable for information + processing and/or storage (often referred to as a matter qubit). + + Since this process may fail, in order to generate and store + entanglement efficiently, we must be able to distinguish successful + attempts from failures. Entanglement generation schemes that are + able to announce successful generation are called heralded + entanglement generation schemes. + + There exist three basic schemes for heralded entanglement generation + on a link through coordinated action of the two nodes at the two ends + of the link [Cacciapuoti19]: + + "At mid-point": In this scheme, an entangled photon pair source + sitting midway between the two nodes with matter qubits sends an + entangled photon through a quantum channel to each of the nodes. + There, transducers are invoked to transfer the entanglement from + the flying qubits to the matter qubits. In this scheme, the + transducers know if the transfers succeeded and are able to herald + successful entanglement generation via a message exchange over the + classical channel. + + "At source": In this scheme, one of the two nodes sends a flying + qubit that is entangled with one of its matter qubits. A + transducer at the other end of the link will transfer the + entanglement from the flying qubit to one of its matter qubits. + Just like in the previous scheme, the transducer knows if its + transfer succeeded and is able to herald successful entanglement + generation with a classical message sent to the other node. + + "At both end-points": In this scheme, both nodes send a flying qubit + that is entangled with one of their matter qubits. A detector + somewhere in between the nodes performs a joint measurement on the + flying qubits, which stochastically projects the remote matter + qubits into an entangled quantum state. The detector knows if the + entanglement succeeded and is able to herald successful + entanglement generation by sending a message to each node over the + classical channel. + + The "mid-point source" scheme is more robust to photon loss, but in + the other schemes, the nodes retain greater control over the + entangled pair generation. + + Note that whilst photons travel in a particular direction through the + quantum channel the resulting entangled pair of qubits does not have + a direction associated with it. Physically, there is no upstream or + downstream end of the pair. + +4.4.2. Entanglement Swapping + + The problem with generating entangled pairs directly across a link is + that efficiency decreases with channel length. Beyond a few tens of + kilometres in optical fibre or 1000 kilometres in free space (via + satellite), the rate is effectively zero, and due to the no-cloning + theorem we cannot simply amplify the signal. The solution is + entanglement swapping [Briegel98]. + + A Bell pair between any two nodes in the network can be constructed + by combining the pairs generated along each individual link on a path + between the two end-points. Each node along the path can consume the + two pairs on the two links to which it is connected, in order to + produce a new entangled pair between the two remote ends. This + process is known as entanglement swapping. It can be represented + pictorially as follows: + + +---------+ +---------+ +---------+ + | A | | B | | C | + | |------| |------| | + | X1~~~~~~~~~~X2 Y1~~~~~~~~~~Y2 | + +---------+ +---------+ +---------+ + + where X1 and X2 are the qubits of the entangled pair X and Y1 and Y2 + are the qubits of entangled pair Y. The entanglement is denoted with + ~~. In the diagram above, nodes A and B share the pair X and nodes B + and C share the pair Y, but we want entanglement between A and C. + + To achieve this goal, we simply teleport the qubit X2 using the pair + Y. This requires node B to perform a Bell state measurement on the + qubits X2 and Y1 that results in the destruction of the entanglement + between Y1 and Y2. However, X2 is recreated in Y2's place, carrying + with it its entanglement with X1. The end result is shown below: + + +---------+ +---------+ +---------+ + | A | | B | | C | + | |------| |------| | + | X1~~~~~~~~~~~~~~~~~~~~~~~~~~~X2 | + +---------+ +---------+ +---------+ + + Depending on the needs of the network and/or application, a final + Pauli correction at the recipient node may not be necessary, since + the result of this operation is also a Bell pair. However, the two + classical bits that form the readout from the measurement at node B + must still be communicated, because they carry information about + which of the four Bell pairs was actually produced. If a correction + is not performed, the recipient must be informed which Bell pair was + received. + + This process of teleporting Bell pairs using other entangled pairs is + called entanglement swapping. Quantum nodes that create long- + distance entangled pairs via entanglement swapping are called quantum + repeaters in academic literature [Briegel98]. We will use the same + terminology in this document. + +4.4.3. Error Management + +4.4.3.1. Distillation + + Neither the generation of Bell pairs nor the swapping operations are + noiseless operations. Therefore, with each link and each swap, the + fidelity of the state degrades. However, it is possible to create + higher-fidelity Bell pair states from two or more lower-fidelity + pairs through a process called distillation (sometimes also referred + to as purification) [Dur07]. + + To distil a quantum state, a second (and sometimes third) quantum + state is used as a "test tool" to test a proposition about the first + state, e.g., "the parity of the two qubits in the first state is + even." When the test succeeds, confidence in the state is improved, + and thus the fidelity is improved. The test tool states are + destroyed in the process, so resource demands increase substantially + when distillation is used. When the test fails, the tested state + must also be discarded. Distillation makes low demands on fidelity + and resources compared to QEC, but distributed protocols incur round- + trip delays due to classical communication [Bennett96]. + +4.4.3.2. Quantum Error Correction (QEC) + + Just like classical error correction, QEC encodes logical qubits + using several physical (raw) qubits to protect them from the errors + described in Section 4.1.3 [Jiang09] [Fowler10] [Devitt13] [Mural16]. + Furthermore, similarly to its classical counterpart, QEC can not only + correct state errors but also account for lost qubits. Additionally, + if all physical qubits that encode a logical qubit are located at the + same node, the correction procedure can be executed locally, even if + the logical qubit is entangled with remote qubits. + + Although QEC was originally a scheme proposed to protect a qubit from + noise, QEC can also be applied to entanglement distillation. Such + QEC-applied distillation is cost effective but requires a higher base + fidelity. + +4.4.3.3. Error Management Schemes + + Quantum networks have been categorised into three "generations" based + on the error management scheme they employ [Mural16]. Note that + these "generations" are more like categories; they do not necessarily + imply a time progression and do not obsolete each other, though the + later generations do require technologies that are more advanced. + Which generation is used depends on the hardware platform and network + design choices. + + Table 2 summarises the generations. + + +===========+================+=======================+=============+ + | | First | Second generation | Third | + | | generation | | generation | + +===========+================+=======================+=============+ + | Loss | Heralded | Heralded entanglement | QEC (no | + | tolerance | entanglement | generation | classical | + | | generation | (bidirectional | signalling) | + | | (bidirectional | classical signalling) | | + | | classical | | | + | | signalling) | | | + +-----------+----------------+-----------------------+-------------+ + +-----------+----------------+-----------------------+-------------+ + | Error | Entanglement | Entanglement | QEC (no | + | tolerance | distillation | distillation | classical | + | | (bidirectional | (unidirectional | signalling) | + | | classical | classical signalling) | | + | | signalling) | or QEC (no classical | | + | | | signalling) | | + +-----------+----------------+-----------------------+-------------+ + + Table 2: Classical Signalling and Generations + + Generations are defined by the directions of classical signalling + required in their distributed protocols for loss tolerance and error + tolerance. Classical signalling carries the classical bits, + incurring round-trip delays. As described in Section 4.4.3.1, these + delays affect the performance of quantum networks, especially as the + distance between the communicating nodes increases. + + Loss tolerance is about tolerating qubit transmission losses between + nodes. Heralded entanglement generation, as described in + Section 4.4.1, confirms the receipt of an entangled qubit using a + heralding signal. A pair of directly connected quantum nodes + repeatedly attempt to generate an entangled pair until the heralding + signal is received. As described in Section 4.4.3.2, QEC can be + applied to complement lost qubits, eliminating the need for + reattempts. Furthermore, since the correction procedure is composed + of local operations, it does not require a heralding signal. + However, it is possible only when the photon loss rate from + transmission to measurement is less than 50%. + + Error tolerance is about tolerating quantum state errors. + Entanglement distillation is the easiest mechanism to implement for + improved error tolerance, but it incurs round-trip delays due to the + requirement for bidirectional classical signalling. The alternative, + QEC, is able to correct state errors locally so that it does not need + any classical signalling between the quantum nodes. In between these + two extremes, there is also QEC-applied distillation, which requires + unidirectional classical signalling. + + The three "generations" summarised: + + 1. First-generation quantum networks use heralding for loss + tolerance and entanglement distillation for error tolerance. + These networks can be implemented even with a limited set of + available quantum gates. + + 2. Second-generation quantum networks improve upon the first + generation with QEC codes for error tolerance (but not loss + tolerance). At first, QEC will be applied to entanglement + distillation only, which requires unidirectional classical + signalling. Later, QEC codes will be used to create logical Bell + pairs that no longer require any classical signalling for the + purposes of error tolerance. Heralding is still used to + compensate for transmission losses. + + 3. Third-generation quantum networks directly transmit QEC-encoded + qubits to adjacent nodes, as discussed in Section 4.1.4. + Elementary link Bell pairs can now be created without heralding + or any other classical signalling. Furthermore, this also + enables direct transmission architectures in which qubits are + forwarded end to end like classical packets rather than relying + on Bell pairs and entanglement swapping. + + Despite the fact that there are important distinctions in how errors + will be managed in the different generations, it is unlikely that all + quantum networks will consistently use the same method. This is due + to different hardware requirements of the different generations and + the practical reality of network upgrades. Therefore, it is + unavoidable that eventually boundaries between different error + management schemes start forming. This will affect the content and + semantics of messages that must cross those boundaries -- for both + connection setup and real-time operation [Nagayama16]. + +4.4.4. Delivery + + Eventually, the Bell pairs must be delivered to an application (or + higher-layer protocol) at the two end nodes. A detailed list of such + requirements is beyond the scope of this document. At minimum, the + end nodes require information to map a particular Bell pair to the + qubit in their local memory that is part of this entangled pair. + +5. Architecture of a Quantum Internet + + It is evident from the previous sections that the fundamental service + provided by a quantum network significantly differs from that of a + classical network. Therefore, it is not surprising that the + architecture of a quantum internet will itself be very different from + that of the classical Internet. + +5.1. Challenges + + This subsection covers the major fundamental challenges involved in + building quantum networks. Here, we only describe the fundamental + differences. Technological limitations are described in Section 5.4. + + 1. Bell pairs are not equivalent to packets that carry payload. + + In most classical networks, including Ethernet, Internet Protocol + (IP), and Multi-Protocol Label Switching (MPLS) networks, user + data is grouped into packets. In addition to the user data, each + packet also contains a series of headers that contain the control + information that lets routers and switches forward it towards its + destination. Packets are the fundamental unit in a classical + network. + + In a quantum network, the entangled pairs of qubits are the basic + unit of networking. These qubits themselves do not carry any + headers. Therefore, quantum networks will have to send all + control information via separate classical channels, which the + repeaters will have to correlate with the qubits stored in their + memory. Furthermore, unlike a classical packet, which is located + at a single node, a Bell pair consists of two qubits distributed + across two nodes. This has a fundamental impact on how quantum + networks will be managed and how protocols need to be designed. + To make long-distance Bell pairs, the nodes may have to keep + their qubits in their quantum memories and wait until control + information is exchanged before proceeding with the next + operation. This signalling will result in additional latency, + which will depend on the distance between the nodes holding the + two ends of the Bell pair. Error management, such as + entanglement distillation, is a typical example of such control + information exchange [Nagayama21] (see also Section 4.4.3.3). + + 2. "Store and forward" and "store and swap" quantum networks require + different state management techniques. + + As described in Section 4.4.1, quantum links provide Bell pairs + that are undirected network resources, in contrast to directed + frames of classical networks. This phenomenological distinction + leads to architectural differences between quantum networks and + classical networks. Quantum networks combine multiple elementary + link Bell pairs together to create one end-to-end Bell pair, + whereas classical networks deliver messages from one end to the + other end hop by hop. + + Classical networks receive data on one interface, store it in + local buffers, and then forward the data to another appropriate + interface. Quantum networks store Bell pairs and then execute + entanglement swapping instead of forwarding in the data plane. + Such quantum networks are "store and swap" networks. In "store + and swap" networks, we do not need to care about the order in + which the Bell pairs were generated, since they are undirected. + However, whilst the ordering does not matter, it is very + important that the right entangled pairs get swapped, and that + the intermediate measurement outcomes (see Section 4.4.2) are + signalled to and correlated with the correct qubits at the other + nodes. Otherwise, the final end-to-end entangled pair will not + be created between the expected end-points or will be in a + different quantum state than expected. For example, rather than + Alice receiving a qubit that is entangled with Bob's qubit, her + qubit is entangled with Charlie's qubit. This distinction makes + control algorithms and optimisation of quantum networks different + from those for classical networks, in the sense that swapping is + stateful in contrast to stateless packet-by-packet forwarding. + Note that, as described in Section 4.4.3.3, third-generation + quantum networks will be able to support a "store and forward" + architecture in addition to "store and swap". + + 3. An entangled pair is only useful if the locations of both qubits + are known. + + A classical network packet logically exists only at one location + at any point in time. If a packet is modified in some way, + whether headers or payload, this information does not need to be + conveyed to anybody else in the network. The packet can be + simply forwarded as before. + + In contrast, entanglement is a phenomenon in which two or more + qubits exist in a physically distributed state. Operations on + one of the qubits change the mutual state of the pair. Since the + owner of a particular qubit cannot just read out its state, it + must coordinate all its actions with the owner of the pair's + other qubit. Therefore, the owner of any qubit that is part of + an entangled pair must know the location of its counterpart. + Location, in this context, need not be the explicit spatial + location. A relevant pair identifier, a means of communication + between the pair owners, and an association between the pair ID + and the individual qubits will be sufficient. + + 4. Generating entanglement requires temporary state. + + Packet forwarding in a classical network is largely a stateless + operation. When a packet is received, the router does a lookup + in its forwarding table and sends the packet out of the + appropriate output. There is no need to keep any memory of the + packet any more. + + A quantum node must be able to make decisions about qubits that + it receives and is holding in its memory. Since qubits do not + carry headers, the receipt of an entangled pair conveys no + control information based on which the repeater can make a + decision. The relevant control information will arrive + separately over a classical channel. This implies that a + repeater must store temporary state, as the control information + and the qubit it pertains to will, in general, not arrive at the + same time. + +5.2. Classical Communication + + In this document, we have already covered two different roles that + classical communication must perform the following: + + * Communicate classical bits of information as part of distributed + protocols such as entanglement swapping and teleportation. + + * Communicate control information within a network, including + background protocols such as routing, as well as signalling + protocols to set up end-to-end entanglement generation. + + Classical communication is a crucial building block of any quantum + network. All nodes in a quantum network are assumed to have + classical connectivity with each other (within typical administrative + domain limits). Therefore, quantum nodes will need to manage two + data planes in parallel: a classical data plane and a quantum data + plane. Additionally, a node must be able to correlate information + between the two planes so that the control information received on a + classical channel can be applied to the qubits managed by the quantum + data plane. + +5.3. Abstract Model of the Network + +5.3.1. The Control Plane and the Data Plane + + Control plane protocols for quantum networks will have many + responsibilities similar to their classical counterparts, namely + discovering the network topology, resource management, populating + data plane tables, etc. Most of these protocols do not require the + manipulation of quantum data and can operate simply by exchanging + classical messages only. There may also be some control plane + functionality that does require the handling of quantum data + [QI-Scenarios]. As it is not clear if there is much benefit in + defining a separate quantum control plane given the significant + overlap in responsibilities with its classical counterpart, the + question of whether there should be a separate quantum control plane + is beyond the scope of this document. + + However, the data plane separation is much more distinct, and there + will be two data planes: a classical data plane and a quantum data + plane. The classical data plane processes and forwards classical + packets. The quantum data plane processes and swaps entangled pairs. + Third-generation quantum networks may also forward qubits in addition + to swapping Bell pairs. + + In addition to control plane messages, there will also be control + information messages that operate at the granularity of individual + entangled pairs, such as heralding messages used for elementary link + generation (Section 4.4.1). In terms of functionality, these + messages are closer to classical packet headers than control plane + messages, and thus we consider them to be part of the quantum data + plane. Therefore, a quantum data plane also includes the exchange of + classical control information at the granularity of individual qubits + and entangled pairs. + +5.3.2. Elements of a Quantum Network + + We have identified quantum repeaters as the core building block of a + quantum network. However, a quantum repeater will have to do more + than just entanglement swapping in a functional quantum network. Its + key responsibilities will include the following: + + 1. Creating link-local entanglement between neighbouring nodes. + + 2. Extending entanglement from link-local pairs to long-range pairs + through entanglement swapping. + + 3. Performing distillation to manage the fidelity of the produced + pairs. + + 4. Participating in the management of the network (routing, etc.). + + Not all quantum repeaters in the network will be the same; here, we + break them down further: + + Quantum routers (controllable quantum nodes): A quantum router is a + quantum repeater with a control plane that participates in the + management of the network and will make decisions about which + qubits to swap to generate the requested end-to-end pairs. + + Automated quantum nodes: An automated quantum node is a data-plane- + only quantum repeater that does not participate in the network + control plane. Since the no-cloning theorem precludes the use of + amplification, long-range links will be established by chaining + multiple such automated nodes together. + + End nodes: End nodes in a quantum network must be able to receive + and handle an entangled pair, but they do not need to be able to + perform an entanglement swap (and thus are not necessarily quantum + repeaters). End nodes are also not required to have any quantum + memory, as certain quantum applications can be realised by having + the end node measure its qubit as soon as it is received. + + Non-quantum nodes: Not all nodes in a quantum network need to have a + quantum data plane. A non-quantum node is any device that can + handle classical network traffic. + + Additionally, we need to identify two kinds of links that will be + used in a quantum network: + + Quantum links: A quantum link is a link that can be used to generate + an entangled pair between two directly connected quantum + repeaters. This may include additional mid-point elements as + described in Section 4.4.1. It may also include a dedicated + classical channel that is to be used solely for the purpose of + coordinating the entanglement generation on this quantum link. + + Classical links: A classical link is a link between any node in the + network that is capable of carrying classical network traffic. + + Note that passive elements, such as optical switches, do not destroy + the quantum state. Therefore, it is possible to connect multiple + quantum nodes with each other over an optical network and perform + optical switching rather than routing via entanglement swapping at + quantum routers. This does require coordination with the elementary + link entanglement generation process, and it still requires repeaters + to overcome the short-distance limitations. However, this is a + potentially feasible architecture for local area networks. + +5.3.3. Putting It All Together + + A two-hop path in a generic quantum network can be represented as + follows: + + +-----+ +-----+ + | App |- - - - - - - - - -CC- - - - - - - - - -| App | + +-----+ +------+ +-----+ + | EN |------ CL ------| QR |------ CL ------| EN | + | |------ QL ------| |------ QL ------| | + +-----+ +------+ +-----+ + + App - user-level application + EN - End Node + QL - Quantum Link + CL - Classical Link + CC - Classical Channel (traverses one or more CLs) + QR - Quantum Repeater + + An application (App) running on two End Nodes (ENs) attached to a + network will at some point need the network to generate entangled + pairs for its use. This may require negotiation between the ENs + (possibly ahead of time), because they must both open a communication + end-point that the network can use to identify the two ends of the + connection. The two ENs use a Classical Channel (CC) available in + the network to achieve this goal. + + When the network receives a request to generate end-to-end entangled + pairs, it uses the Classical Links (CLs) to coordinate and claim the + resources necessary to fulfill this request. This may be some + combination of prior control information (e.g., routing tables) and + signalling protocols, but the details of how this is achieved are an + active research question. A thought experiment on what this might + look like be can be found in Section 7. + + During or after the distribution of control information, the network + performs the necessary quantum operations, such as generating + entanglement over individual Quantum Links (QLs), performing + entanglement swaps at Quantum Repeaters (QRs), and further signalling + to transmit the swap outcomes and other control information. Since + Bell pairs do not carry any user data, some of these operations can + be performed before the request is received, in anticipation of the + demand. + + Note that here, "signalling" is used in a very broad sense and covers + many different types of messaging necessary for entanglement + generation control. For example, heralded entanglement generation + requires very precise timing synchronisation between the neighbouring + nodes, and thus the triggering of entanglement generation and + heralding may happen over its own, perhaps physically separate, CL, + as was the case in the network stack demonstration described in + [Pompili21.2]. Higher-level signalling with timing requirements that + are less stringent (e.g., control plane signalling) may then happen + over its own CL. + + The entangled pair is delivered to the application once it is ready, + together with the relevant pair identifier. However, being ready + does not necessarily mean that all link pairs and entanglement swaps + are complete, as some applications can start executing on an + incomplete pair. In this case, the remaining entanglement swaps will + propagate the actions across the network to the other end, sometimes + necessitating fixup operations at the EN. + +5.4. Physical Constraints + + The model above has effectively abstracted away the particulars of + the hardware implementation. However, certain physical constraints + need to be considered in order to build a practical network. Some of + these are fundamental constraints, and no matter how much the + technology improves, they will always need to be addressed. Others + are artifacts of the early stages of a new technology. Here, we + consider a highly abstract scenario and refer to [Wehner18] for + pointers to the physics literature. + +5.4.1. Memory Lifetimes + + In addition to discrete operations being imperfect, storing a qubit + in memory is also highly non-trivial. The main difficulty in + achieving persistent storage is that it is extremely challenging to + isolate a quantum system from the environment. The environment + introduces an uncontrollable source of noise into the system, which + affects the fidelity of the state. This process is known as + decoherence. Eventually, the state has to be discarded once its + fidelity degrades too much. + + The memory lifetime depends on the particular physical setup, but the + highest achievable values in quantum network hardware are, as of + 2020, on the order of seconds [Abobeih18], although a lifetime of a + minute has also been demonstrated for qubits not connected to a + quantum network [Bradley19]. These values have increased + tremendously over the lifetime of the different technologies and are + bound to keep increasing. However, if quantum networks are to be + realised in the near future, they need to be able to handle short + memory lifetimes -- for example, by reducing latency on critical + paths. + +5.4.2. Rates + + Entanglement generation on a link between two connected nodes is not + a very efficient process, and it requires many attempts to succeed + [Hensen15] [Dahlberg19]. For example, the highest achievable rates + of success between nitrogen-vacancy center nodes -- which, in + addition to entanglement generation are also capable of storing and + processing the resulting qubits -- are on the order of 10 Hz. + Combined with short memory lifetimes, this leads to very tight timing + windows to build up network-wide connectivity. + + Other platforms have shown higher entanglement rates, but this + usually comes at the cost of other hardware capabilities, such as no + quantum memory and/or limited processing capabilities [Wei22]. + Nevertheless, the current rates are not sufficient for practical + applications beyond simple experimental proofs of concept. However, + they are expected to improve over time as quantum network technology + evolves [Wei22]. + +5.4.3. Communication Qubits + + Most physical architectures capable of storing qubits are only able + to generate entanglement using only a subset of available qubits + called communication qubits [Dahlberg19]. Once a Bell pair has been + generated using a communication qubit, its state can be transferred + into memory. This may impose additional limitations on the network. + In particular, if a given node has only one communication qubit, it + cannot simultaneously generate Bell pairs over two links. It must + generate entanglement over the links one at a time. + +5.4.4. Homogeneity + + At present, all existing quantum network implementations are + homogeneous, and they do not interface with each other. In general, + it is very challenging to combine different quantum information + processing technologies. + + There are many different physical hardware platforms for implementing + quantum networking hardware. The different technologies differ in + how they store and manipulate qubits in memory and how they generate + entanglement across a link with their neighbours. For example, + hardware based on optical elements and atomic ensembles [Sangouard11] + is very efficient at generating entanglement at high rates but + provides limited processing capabilities once the entanglement is + generated. On the other hand, nitrogen-vacancy-based platforms + [Hensen15] or trapped ion platforms [Moehring07] offer a much greater + degree of control over the qubits but have a harder time generating + entanglement at high rates. + + In order to overcome the weaknesses of the different platforms, + coupling the different technologies will help to build fully + functional networks. For example, end nodes may be implemented using + technology with good qubit processing capabilities to enable complex + applications, but automated quantum nodes that serve only to "repeat" + along a linear chain, where the processing logic is much simpler, can + be implemented with technologies that sacrifice processing + capabilities for higher entanglement rates at long distances + [Askarani21]. + + This point is further exacerbated by the fact that quantum computers + (i.e., end nodes in a quantum network) are often based on different + hardware platforms than quantum repeaters, thus requiring a coupling + (transduction) between the two. This is especially true for quantum + computers based on superconducting technology, which are challenging + to connect to optical networks. However, even trapped ion quantum + computers, which make up a platform that has shown promise for + quantum networking, will still need to connect to other platforms + that are better at creating entanglement at high rates over long + distances (hundreds of kilometres). + +6. Architectural Principles + + Given that the most practical way of realising quantum network + connectivity is using Bell pair and entanglement-swapping repeater + technology, what sort of principles should guide us in assembling + such networks such that they are functional, robust, efficient, and, + most importantly, will work? Furthermore, how do we design networks + so that they work under the constraints imposed by the hardware + available today but do not impose unnecessary burdens on future + technology? + + As quantum networking is a completely new technology that is likely + to see many iterations over its lifetime, this document must not + serve as a definitive set of rules but merely as a general set of + recommended guidelines for the first generations of quantum networks + based on principles and observations made by the community. The + benefit of having a community-built document at this early stage is + that expertise in both quantum information and network architecture + is needed in order to successfully build a quantum internet. + +6.1. Goals of a Quantum Internet + + When outlining any set of principles, we must ask ourselves what + goals we want to achieve, as inevitably trade-offs must be made. So, + what sort of goals should drive a quantum network architecture? The + following list has been inspired by the history of computer + networking, and thus it is inevitably very similar to one that could + be produced for the classical Internet [Clark88]. However, whilst + the goals may be similar, the challenges involved are often + fundamentally different. The list will also most likely evolve with + time and the needs of its users. + + 1. Support distributed quantum applications. + + This goal seems trivially obvious, but it makes a subtle, but + important, point that highlights a key difference between quantum + and classical networks. Ultimately, quantum data transmission is + not the goal of a quantum network -- it is only one possible + component of quantum application protocols that are more advanced + [Wehner18]. Whilst transmission certainly could be used as a + building block for all quantum applications, it is not the most + basic one possible. For example, entanglement-based QKD, the + most well-known quantum application protocol, only relies on the + stronger-than-classical correlations and inherent secrecy of + entangled Bell pairs and does not have to transmit arbitrary + quantum states [Ekert91]. + + The primary purpose of a quantum internet is to support + distributed quantum application protocols, and it is of utmost + importance that they can run well and efficiently. Thus, it is + important to develop performance metrics meaningful to + applications to drive the development of quantum network + protocols. For example, the Bell pair generation rate is + meaningless if one does not also consider their fidelity. It is + generally much easier to generate pairs of lower fidelity, but + quantum applications may have to make multiple reattempts or even + abort if the fidelity is too low. A review of the requirements + for different known quantum applications can be found in + [Wehner18], and an overview of use cases can be found in + [QI-Scenarios]. + + 2. Support tomorrow's distributed quantum applications. + + The only principle of the Internet that should survive + indefinitely is the principle of constant change [RFC1958]. + Technical change is continuous, and the size and capabilities of + the quantum internet will change by orders of magnitude. + Therefore, it is an explicit goal that a quantum internet + architecture be able to embrace this change. We have the benefit + of having been witness to the evolution of the classical Internet + over several decades, and we have seen what worked and what did + not. It is vital for a quantum internet to avoid the need for + flag days (e.g., NCP to TCP/IP) or upgrades that take decades to + roll out (e.g., IPv4 to IPv6). + + Therefore, it is important that any proposed architecture for + general-purpose quantum repeater networks can integrate new + devices and solutions as they become available. The architecture + should not be constrained due to considerations for early-stage + hardware and applications. For example, it is already possible + to run QKD efficiently on metropolitan-scale networks, and such + networks are already commercially available. However, they are + not based on quantum repeaters and thus will not be able to + easily transition to applications that are more sophisticated. + + 3. Support heterogeneity. + + There are multiple proposals for realising practical quantum + repeater hardware, and they all have their advantages and + disadvantages. Some may offer higher Bell pair generation rates + on individual links at the cost of entanglement swap operations + that are more difficult. Other platforms may be good all around + but are more difficult to build. + + In addition to physical boundaries, there may be distinctions in + how errors are managed (Section 4.4.3.3). These differences will + affect the content and semantics of messages that cross these + boundaries -- for both connection setup and real-time operation. + + The optimal network configuration will likely leverage the + advantages of multiple platforms to optimise the provided + service. Therefore, it is an explicit goal to incorporate varied + hardware and technology support from the beginning. + + 4. Ensure security at the network level. + + The question of security in quantum networks is just as critical + as it is in the classical Internet, especially since enhanced + security offered by quantum entanglement is one of the key + driving factors. + + Fortunately, from an application's point of view, as long as the + underlying implementation corresponds to (or sufficiently + approximates) theoretical models of quantum cryptography, quantum + cryptographic protocols do not need the network to provide any + guarantees about the confidentiality or integrity of the + transmitted qubits or the generated entanglement (though they may + impose requirements on the classical channel, e.g., to be + authenticated [Wang21]). Instead, applications will leverage the + classical networks to establish the end-to-end security of the + results obtained from the processing of entangled qubits. + However, it is important to note that whilst classical networks + are necessary to establish these end-to-end guarantees, the + security relies on the properties of quantum entanglement. For + example, QKD uses classical information reconciliation [Tang19] + for error correction and privacy amplification [Elkouss11] for + generating the final secure key, but the raw bits that are fed + into these protocols must come from measuring entangled qubits + [Ekert91]. In another application, secure delegated quantum + computing, the client hides its computation from the server by + sending qubits to the server and then requesting (in a classical + message) that the server measure them in an encoded basis. The + client then decodes the results it receives from the server to + obtain the result of the computation [Broadbent10]. Once again, + whilst a classical network is used to achieve the goal of secure + computation, the remote computation is strictly quantum. + + Nevertheless, whilst applications can ensure their own end-to-end + security, network protocols themselves should be security aware + in order to protect the network itself and limit disruption. + Whilst the applications remain secure, they are not necessarily + operational or as efficient in the presence of an attacker. For + example, if an attacker can measure every qubit between two + parties trying to establish a key using QKD, no secret key can be + generated. Security concerns in quantum networks are described + in more detail in [Satoh17] and [Satoh20]. + + 5. Make them easy to monitor. + + In order to manage, evaluate the performance of, or debug a + network, it is necessary to have the ability to monitor the + network while ensuring that there will be mechanisms in place to + protect the confidentiality and integrity of the devices + connected to it. Quantum networks bring new challenges in this + area, so it should be a goal of a quantum network architecture to + make this task easy. + + The fundamental unit of quantum information, the qubit, cannot be + actively monitored, as any readout irreversibly destroys its + contents. One of the implications of this fact is that measuring + an individual pair's fidelity is impossible. Fidelity is + meaningful only as a statistical quantity that requires constant + monitoring of generated Bell pairs, achieved by sacrificing some + Bell pairs for use in tomography or other methods. + + Furthermore, given one end of an entangled pair, it is impossible + to tell where the other qubit is without any additional classical + metadata. It is impossible to extract this information from the + qubits themselves. This implies that tracking entangled pairs + necessitates some exchange of classical information. This + information might include (i) a reference to the entangled pair + that allows distributed applications to coordinate actions on + qubits of the same pair and (ii) the two bits from each + entanglement swap necessary to identify the final state of the + Bell pair (Section 4.4.2). + + 6. Ensure availability and resilience. + + Any practical and usable network, classical or quantum, must be + able to continue to operate despite losses and failures and be + robust to malicious actors trying to disable connectivity. A + difference between quantum and classical networks is that quantum + networks are composed of two types of data planes (quantum and + classical) and two types of channels (quantum and classical) that + must be considered. Therefore, availability and resilience will + most likely require a more advanced treatment than they do in + classical networks. + + Note that privacy, whilst related to security, is not listed as an + explicit goal, because the privacy benefits will depend on the use + case. For example, QKD only provides increased security for the + distribution of symmetric keys [Bennett14] [Ekert91]. The handling, + manipulation, sharing, encryption, and decryption of data will remain + entirely classical, limiting the benefits to privacy that can be + gained from using a quantum network. On the other hand, there are + applications like blind quantum computation, which provides the user + with the ability to execute a quantum computation on a remote server + without the server knowing what the computation was or its input and + output [Fitzsimons17]. Therefore, privacy must be considered on a + per-application basis. An overview of quantum network use cases can + be found in [QI-Scenarios]. + +6.2. The Principles of a Quantum Internet + + The principles support the goals but are not goals themselves. The + goals define what we want to build, and the principles provide a + guideline for how we might achieve this. The goals will also be the + foundation for defining any metric of success for a network + architecture, whereas the principles in themselves do not distinguish + between success and failure. For more information about design + considerations for quantum networks, see [VanMeter13.1] and + [Dahlberg19]. + + 1. Entanglement is the fundamental service. + + The key service that a quantum network provides is the + distribution of entanglement between the nodes in a network. All + distributed quantum applications are built on top of this key + resource. Applications such as clustered quantum computing, + distributed quantum computing, distributed quantum sensing + networks, and certain kinds of quantum secure networks all + consume quantum entanglement as a resource. Some applications + (e.g., QKD) simply measure the entangled qubits to obtain a + shared secret key [QKD]. Other applications (e.g., distributed + quantum computing) build abstractions and operations that are + more complex on the entangled qubits, e.g., distributed CNOT + gates [DistCNOT] or teleportation of arbitrary qubit states + [Teleportation]. + + A quantum network may also distribute multipartite entangled + states (entangled states of three or more qubits) [Meignant19], + which are useful for applications such as conference key + agreement [Murta20], distributed quantum computing [Cirac99], + secret sharing [Qin17], and clock synchronisation [Komar14], + though it is worth noting that multipartite entangled states can + also be constructed from multiple entangled pairs distributed + between the end nodes. + + 2. Bell pairs are indistinguishable. + + Any two Bell pairs between the same two nodes are + indistinguishable for the purposes of an application, provided + they both satisfy its required fidelity threshold. This + observation is likely to be key in enabling a more optimal + allocation of resources in a network, e.g., for the purposes of + provisioning resources to meet application demand. However, the + qubits that make up the pair themselves are not + indistinguishable, and the two nodes operating on a pair must + coordinate to make sure they are operating on qubits that belong + to the same Bell pair. + + 3. Fidelity is part of the service. + + In addition to being able to deliver Bell pairs to the + communication end-points, the Bell pairs must be of sufficient + fidelity. Unlike in classical networks, where most errors are + effectively eliminated before reaching the application, many + quantum applications only need imperfect entanglement to + function. However, quantum applications will generally have a + threshold for Bell pair fidelity below which they are no longer + able to operate. Different applications will have different + requirements for what fidelity they can work with. It is the + network's responsibility to balance the resource usage with + respect to the applications' requirements. It may be that it is + cheaper for the network to provide lower-fidelity pairs that are + just above the threshold required by the application than it is + to guarantee high-fidelity pairs to all applications regardless + of their requirements. + + 4. Time is an expensive resource. + + Time is not the only resource that is in short supply + (communication qubits and memory are as well), but ultimately it + is the lifetime of quantum memories that imposes some of the most + difficult conditions for operating an extended network of quantum + nodes. Current hardware has low rates of Bell pair generation, + short memory lifetimes, and access to a limited number of + communication qubits. All these factors combined mean that even + a short waiting queue at some node could be enough for a Bell + pair to decohere or result in an end-to-end pair below an + application's fidelity threshold. Therefore, managing the idle + time of qubits holding live quantum states should be done + carefully -- ideally by minimising the idle time, but potentially + also by moving the quantum state for temporary storage to a + quantum memory with a longer lifetime. + + 5. Be flexible with regards to capabilities and limitations. + + This goal encompasses two important points: + + * First, the architecture should be able to function under the + physical constraints imposed by the current-generation + hardware. Near-future hardware will have low entanglement + generation rates, quantum memories able to hold a handful of + qubits at best, and decoherence rates that will render many + generated pairs unusable. + + * Second, the architecture should not make it difficult to run + the network over any hardware that may come along in the + future. The physical capabilities of repeaters will improve, + and redeploying a technology is extremely challenging. + +7. A Thought Experiment Inspired by Classical Networks + + To conclude, we discuss a plausible quantum network architecture + inspired by MPLS. This is not an architecture proposal but rather a + thought experiment to give the reader an idea of what components are + necessary for a functional quantum network. We use classical MPLS as + a basis, as it is well known and understood in the networking + community. + + Creating end-to-end Bell pairs between remote end-points is a + stateful distributed task that requires a lot of a priori + coordination. Therefore, a connection-oriented approach seems the + most natural for quantum networks. In connection-oriented quantum + networks, when two quantum application end-points wish to start + creating end-to-end Bell pairs, they must first create a Quantum + Virtual Circuit (QVC). As an analogy, in MPLS networks, end-points + must establish a Label Switched Path (LSP) before exchanging traffic. + Connection-oriented quantum networks may also support virtual + circuits with multiple end-points for creating multipartite + entanglement. As an analogy, MPLS networks have the concept of + multipoint LSPs for multicast. + + When a quantum application creates a QVC, it can indicate Quality of + Service (QoS) parameters such as the required capacity in end-to-end + Bell Pairs Per Second (BPPS) and the required fidelity of the Bell + pairs. As an analogy, in MPLS networks, applications specify the + required bandwidth in Bits Per Second (BPS) and other constraints + when they create a new LSP. + + Different applications will have different QoS requirements. For + example, applications such as QKD that don't need to process the + entangled qubits, and only need measure them and store the resulting + outcome, may require a large volume of entanglement but will be + tolerant of delay and jitter for individual pairs. On the other + hand, distributed/cloud quantum computing applications may need fewer + entangled pairs but instead may need all of them to be generated in + one go so that they can all be processed together before any of them + decohere. + + Quantum networks need a routing function to compute the optimal path + (i.e., the best sequence of routers and links) for each new QVC. The + routing function may be centralised or distributed. In the latter + case, the quantum network needs a distributed routing protocol. As + an analogy, classical networks use routing protocols such as Open + Shortest Path First (OSPF) and Intermediate System to Intermediate + System (IS-IS). However, note that the definition of "shortest path" + / "least cost" may be different in a quantum network to account for + its non-classical features, such as fidelity [VanMeter13.2]. + + Given the very scarce availability of resources in early quantum + networks, a Traffic Engineering (TE) function is likely to be + beneficial. Without TE, QVCs always use the shortest path. In this + case, the quantum network cannot guarantee that each quantum end- + point will get its Bell pairs at the required rate or fidelity. This + is analogous to "best effort" service in classical networks. + + With TE, QVCs choose a path that is guaranteed to have the requested + resources (e.g., bandwidth in BPPS) available, taking into account + the capacity of the routers and links and also taking into account + the resources already consumed by other virtual circuits. As an + analogy, both OSPF and IS-IS have TE extensions to keep track of used + and available resources and can use Constrained Shortest Path First + (CSPF) to take resource availability and other constraints into + account when computing the optimal path. + + The use of TE implies the use of Call Admission Control (CAC): the + network denies any virtual circuits for which it cannot guarantee the + requested quality of service a priori. Alternatively, the network + preempts lower-priority circuits to make room for a new circuit. + + Quantum networks need a signalling function: once the path for a QVC + has been computed, signalling is used to install the "forwarding + rules" into the data plane of each quantum router on the path. The + signalling may be distributed, analogous to the Resource Reservation + Protocol (RSVP) in MPLS. Or, the signalling may be centralised, + similar to OpenFlow. + + Quantum networks need an abstraction of the hardware for specifying + the forwarding rules. This allows us to decouple the control plane + (routing and signalling) from the data plane (actual creation of Bell + pairs). The forwarding rules are specified using abstract building + blocks such as "creating local Bell pairs", "swapping Bell pairs", or + "distillation of Bell pairs". As an analogy, classical networks use + abstractions that are based on match conditions (e.g., looking up + header fields in tables) and actions (e.g., modifying fields or + forwarding a packet to a specific interface). The data plane + abstractions in quantum networks will be very different from those in + classical networks due to the fundamental differences in technology + and the stateful nature of quantum networks. In fact, choosing the + right abstractions will be one of the biggest challenges when + designing interoperable quantum network protocols. + + In quantum networks, control plane traffic (routing and signalling + messages) is exchanged over a classical channel, whereas data plane + traffic (the actual Bell pair qubits) is exchanged over a separate + quantum channel. This is in contrast to most classical networks, + where control plane traffic and data plane traffic share the same + channel and where a single packet contains both user fields and + header fields. There is, however, a classical analogy to the way + quantum networks work: generalised MPLS (GMPLS) networks use separate + channels for control plane traffic and data plane traffic. + Furthermore, GMPLS networks support data planes where there is no + such thing as data plane headers (e.g., Dense Wavelength Division + Multiplexing (DWDM) or Time-Division Multiplexing (TDM) networks). + +8. Security Considerations + + Security is listed as an explicit goal for the architecture; this + issue is addressed in Section 6.1. However, as this is an + Informational document, it does not propose any concrete mechanisms + to achieve these goals. + +9. IANA Considerations + + This document has no IANA actions. + +10. Informative References + + [Abobeih18] + Abobeih, M.H., Cramer, J., Bakker, M.A., Kalb, N., + Markham, M., Twitchen, D.J., and T.H. Taminiau, "One- + second coherence for a single electron spin coupled to a + multi-qubit nuclear-spin environment", Nature + communications Vol. 9, Iss. 1, pp. 1-8, + DOI 10.1038/s41467-018-04916-z, June 2018, + <https://www.nature.com/articles/s41467-018-04916-z>. + + [Aguado19] Aguado, A., Lopez, V., Lopez, D., Peev, M., Poppe, A., + Pastor, A., Folgueira, J., and V. Martin, "The Engineering + of Software-Defined Quantum Key Distribution Networks", + IEEE Communications Magazine Vol. 57, Iss. 7, pp. 20-26, + DOI 10.1109/MCOM.2019.1800763, July 2019, + <https://ieeexplore.ieee.org/document/8767074>. + + [Askarani21] + Askarani, M.F., Chakraborty, K., and G.C. do Amaral, + "Entanglement distribution in multi-platform buffered- + router-assisted frequency-multiplexed automated repeater + chains", New Journal of Physics Vol. 23, Iss. 6, 063078, + DOI 10.1088/1367-2630/ac0a35, June 2021, + <https://iopscience.iop.org/article/10.1088/1367-2630/ + ac0a35>. + + [Aspect81] Aspect, A., Grangier, P., and G. Roger, "Experimental + Tests of Realistic local Theories via Bell's Theorem", + Physical Review Letters Vol. 47, Iss. 7, pp. 460-463, + DOI 10.1103/PhysRevLett.47.460, August 1981, + <https://journals.aps.org/prl/abstract/10.1103/ + PhysRevLett.47.460>. + + [Bennett14] + Bennett, C.H. and G. Brassard, "Quantum cryptography: + Public key distribution and coin tossing", Theoretical + Computer Science Vol. 560 (Part 1), pp. 7-11, + DOI 10.1016/j.tcs.2014.05.025, December 2014, + <https://www.sciencedirect.com/science/article/pii/ + S0304397514004241?via%3Dihub>. + + [Bennett93] + Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., + Peres, A., and W.K. Wootters, "Teleporting an unknown + quantum state via dual classical and Einstein-Podolsky- + Rosen channels", Physical Review Letters Vol. 70, Iss. 13, + pp. 1895-1899, DOI 10.1103/PhysRevLett.70.1895, March + 1993, <https://journals.aps.org/prl/abstract/10.1103/ + PhysRevLett.70.1895>. + + [Bennett96] + Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., and W.K. + Wootters, "Mixed-state entanglement and quantum error + correction", Physical Review A Vol. 54, Iss. 5, pp. + 3824-3851, DOI 10.1103/PhysRevA.54.3824, November 1996, + <https://journals.aps.org/pra/abstract/10.1103/ + PhysRevA.54.3824>. + + [Bradley19] + Bradley, C.E., Randall, J., Abobeih, M.H., Berrevoets, + R.C., Degen, M.J., Bakker, M.A., Markham, M., Twitchen, + D.J., and T.H. Taminiau, "A Ten-Qubit Solid-State Spin + Register with Quantum Memory up to One Minute", Physical + Review X Vol. 9, Iss. 3, 031045, + DOI 10.1103/PhysRevX.9.031045, September 2019, + <https://journals.aps.org/prx/abstract/10.1103/ + PhysRevX.9.031045>. + + [Briegel98] + Briegel, H.-J., Dür, W., Cirac, J.I., and P. Zoller, + "Quantum Repeaters: The Role of Imperfect Local Operations + in Quantum Communication", Physical Review Letters Vol. + 81, Iss. 26, pp. 5932-5935, + DOI 10.1103/PhysRevLett.81.5932, December 1998, + <https://journals.aps.org/prl/abstract/10.1103/ + PhysRevLett.81.5932>. + + [Broadbent10] + Broadbent, A., Fitzsimons, J., and E. Kashefi, + "Measurement-Based and Universal Blind Quantum + Computation", Springer-Verlag 978-3-642-13678-8, + DOI 10.1007/978-3-642-13678-8_2, June 2010, + <https://link.springer.com/ + chapter/10.1007/978-3-642-13678-8_2>. + + [Cacciapuoti19] + Cacciapuoti, A.S., Caleffi, M., Van Meter, R., and L. + Hanzo, "When Entanglement Meets Classical Communications: + Quantum Teleportation for the Quantum Internet", IEEE + Transactions on Communications Vol. 68, Iss. 6, pp. + 3808-3833, DOI 10.1109/TCOMM.2020.2978071, June 2020, + <https://ieeexplore.ieee.org/document/9023997>. + + [Cirac99] Cirac, J.I., Ekert, A.K., Huelga, S.F., and C. + Macchiavello, "Distributed quantum computation over noisy + channels", Physical Review A Vol. 59, Iss. 6, 4249, + DOI 10.1103/PhysRevA.59.4249, June 1999, + <https://journals.aps.org/pra/abstract/10.1103/ + PhysRevA.59.4249>. + + [Clark88] Clark, D., "The design philosophy of the DARPA internet + protocols", SIGCOMM '88: Symposium proceedings on + Communications architectures and protocols, pp. 106-114, + DOI 10.1145/52324.52336, August 1988, + <https://dl.acm.org/doi/abs/10.1145/52324.52336>. + + [Crepeau02] + Crépeau, C., Gottesman, D., and A. Smith, "Secure multi- + party quantum computation", STOC '02: Proceedings of the + thiry-fourth [sic] annual ACM symposium on Theory of + computing, pp. 643-652, DOI 10.1145/509907.510000, May + 2002, <https://dl.acm.org/doi/10.1145/509907.510000>. + + [Dahlberg19] + Dahlberg, A., Skrzypczyk, M., Coopmans, T., Wubben, L., + Rozpędek, F., Pompili, M., Stolk, A., Pawełczak, P., + Knegjens, R., de Oliveira Filho, J., Hanson, R., and S. + Wehner, "A link layer protocol for quantum networks", + SIGCOMM '19 Proceedings of the ACM Special Interest Group + on Data Communication, pp. 159-173, + DOI 10.1145/3341302.3342070, August 2019, + <https://dl.acm.org/doi/10.1145/3341302.3342070>. + + [Devitt13] Devitt, S.J., Munro, W.J., and K. Nemoto, "Quantum error + correction for beginners", Reports on Progress in Physics + Vol. 76, Iss. 7, 076001, + DOI 10.1088/0034-4885/76/7/076001, June 2013, + <https://iopscience.iop.org/ + article/10.1088/0034-4885/76/7/076001>. + + [DistCNOT] "Distributed CNOT", Quantum Network Explorer by QuTech, + 2023, <https://www.quantum-network.com/applications/7/>. + + [Dur07] Dür, W. and H.J. Briegel, "Entanglement purification and + quantum error correction", Reports on Progress in Physics + Vol. 70, Iss. 8, pp. 1381-1424, + DOI 10.1088/0034-4885/70/8/R03, July 2007, + <https://iopscience.iop.org/article/10.1088/0034- + 4885/70/8/R03>. + + [Ekert91] Ekert, A.K., "Quantum cryptography based on Bell's + theorem", Physical Review Letters Vol. 67, Iss. 6, pp. + 661-663, DOI 10.1103/PhysRevLett.67.661, August 1991, + <https://journals.aps.org/prl/abstract/10.1103/ + PhysRevLett.67.661>. + + [Elkouss11] + Elkouss, D., Martinez-Mateo, J., and V. Martin, + "Information Reconciliation for Quantum Key Distribution", + Quantum Information and Computation Vol. 11, No. 3 and 4, + pp. 0226-0238, DOI 10.48550/arXiv.1007.1616, March 2011, + <https://arxiv.org/abs/1007.1616>. + + [Elliott03] + Elliott, C., Pearson, D., and G. Troxel, "Quantum + cryptography in practice", SIGCOMM 2003: Proceedings of + the 2003 conference on Applications, technologies, + architectures, and protocols for computer communications, + pp. 227-238, DOI 10.1145/863955.863982, August 2003, + <https://dl.acm.org/doi/abs/10.1145/863955.863982>. + + [Fitzsimons17] + Fitzsimons, J.F. and E. Kashefi, "Unconditionally + verifiable blind quantum computation", Physical Review A + Vol. 96, Iss. 1, 012303, DOI 10.1103/PhysRevA.96.012303, + July 2017, <https://journals.aps.org/pra/abstract/10.1103/ + PhysRevA.96.012303>. + + [Fowler10] Fowler, A.G., Wang, D.S., Hill, C.D., Ladd, T.D., Van + Meter, R., and L.C.L. Hollenberg, "Surface Code Quantum + Communication", Physical Review Letters Vol. 104, Iss. 18, + 180503, DOI 10.1103/PhysRevLett.104.180503, May 2010, + <https://journals.aps.org/prl/abstract/10.1103/ + PhysRevLett.104.180503>. + + [Giovannetti04] + Giovannetti, V., Lloyd, S., and L. Maccone, "Quantum- + Enhanced Measurements: Beating the Standard Quantum + Limit", Science Vol. 306, Iss. 5700, pp. 1330-1336, + DOI 10.1126/science.1104149, November 2004, + <https://www.science.org/doi/10.1126/science.1104149>. + + [Gottesman12] + Gottesman, D., Jennewein, T., and S. Croke, "Longer- + Baseline Telescopes Using Quantum Repeaters", Physical + Review Letters Vol. 109, Iss. 7, 070503, + DOI 10.1103/PhysRevLett.109.070503, August 2012, + <https://journals.aps.org/prl/abstract/10.1103/ + PhysRevLett.109.070503>. + + [Hensen15] Hensen, B., Bernien, H., Dréau, A.E., Reiserer, A., Kalb, + N., Blok, M.S., Ruitenberg, J., Vermeulen, R.F.L., + Schouten, R.N., Abellán, C., Amaya, W., Pruneri, V., + Mitchell, M.W., Markham, M., Twitchen, D.J., Elkouss, D., + Wehner, S., Taminiau, T.H., and R. Hanson, "Loophole-free + Bell inequality violation using electron spins separated + by 1.3 kilometres", Nature Vol. 526, pp. 682-686, + DOI 10.1038/nature15759, October 2015, + <https://www.nature.com/articles/nature15759>. + + [Jiang09] Jiang, L., Taylor, J.M., Nemoto, K., Munro, W.J., Van + Meter, R., and M.D. Lukin, "Quantum repeater with + encoding", Physical Review A Vol. 79, Iss. 3, 032325, + DOI 10.1103/PhysRevA.79.032325, March 2009, + <https://journals.aps.org/pra/abstract/10.1103/ + PhysRevA.79.032325>. + + [Joshi20] Joshi, S.K., Aktas, D., Wengerowsky, S., Lončarić, M., + Neumann, S.P., Liu, B., Scheidl, T., Currás-Lorenzo, G., + Samec, Z., Kling, L., Qiu, A., Razavi, M., Stipčević, M., + Rarity, J.G., and R. Ursin, "A trusted node-free eight- + user metropolitan quantum communication network", Science + Advances Vol. 6, no. 36, eaba0959, + DOI 10.1126/sciadv.aba0959, September 2020, + <https://www.science.org/doi/10.1126/sciadv.aba0959>. + + [Kimble08] Kimble, H.J., "The quantum internet", Nature Vol. 453, + Iss. 7198, pp. 1023-1030, DOI 10.1038/nature07127, June + 2008, <https://www.nature.com/articles/nature07127>. + + [Komar14] Kómár, P., Kessler, E.M., Bishof, M., Jiang, L., Sørensen, + A.S., Ye, J., and M.D. Lukin, "A quantum network of + clocks", Nature Physics Vol. 10, Iss. 8, pp. 582-587, + DOI 10.1038/nphys3000, June 2014, + <https://www.nature.com/articles/nphys3000>. + + [Meignant19] + Meignant, C., Markham, D., and F. Grosshans, "Distributing + graph states over arbitrary quantum networks", Physical + Review A Vol. 100, Iss. 5, 052333, + DOI 10.1103/PhysRevA.100.052333, November 2019, + <https://journals.aps.org/pra/abstract/10.1103/ + PhysRevA.100.052333>. + + [Moehring07] + Moehring, D.L., Maunz, P., Olmschenk, S., Younge, K.C., + Matsukevich, D.N., Duan, L.-M., and C. Monroe, + "Entanglement of single-atom quantum bits at a distance", + Nature Vol. 449, Iss. 7158, pp. 68-71, + DOI 10.1038/nature06118, September 2007, + <https://www.nature.com/articles/nature06118>. + + [Mural16] Muralidharan, S., Li, L., Kim, J., Lütkenhaus, N., Lukin, + M.D., and L. Jiang, "Optimal architectures for long + distance quantum communication", Scientific Reports Vol. + 6, pp. 1-10, DOI 10.1038/srep20463, February 2016, + <https://www.nature.com/articles/srep20463>. + + [Murta20] Murta, G., Grasselli, F., Kampermann, H., and D. Bruß, + "Quantum Conference Key Agreement: A Review", Advanced + Quantum Technologies Vol. 3, Iss. 11, 2000025, + DOI 10.1002/qute.202000025, September 2020, + <https://onlinelibrary.wiley.com/doi/10.1002/ + qute.202000025>. + + [Nagayama16] + Nagayama, S., Choi, B.-S., Devitt, S., Suzuki, S., and R. + Van Meter, "Interoperability in encoded quantum repeater + networks", Physical Review A Vol. 93, Iss. 4, 042338, + DOI 10.1103/PhysRevA.93.042338, April 2016, + <https://journals.aps.org/pra/abstract/10.1103/ + PhysRevA.93.042338>. + + [Nagayama21] + Nagayama, S., "Towards End-to-End Error Management for a + Quantum Internet", arXiv 2112.07185, + DOI 10.48550/arXiv.2112.07185, December 2021, + <https://arxiv.org/abs/2112.07185>. + + [NielsenChuang] + Nielsen, M.A. and I.L. Chuang, "Quantum Computation and + Quantum Information", Cambridge University Press, 2010, + <http://mmrc.amss.cas.cn/tlb/201702/ + W020170224608149940643.pdf>. + + [Park70] Park, J.L., "The concept of transition in quantum + mechanics", Foundations of Physics Vol. 1, Iss. 1, pp. + 23-33, DOI 10.1007/BF00708652, March 1970, + <https://link.springer.com/article/10.1007/BF00708652>. + + [Peev09] Peev, M., Pacher, C., Alléaume, R., Barreiro, C., Bouda, + J., Boxleitner, W., Debuisschert, T., Diamanti, E., + Dianati, M., Dynes, J.F., Fasel, S., Fossier, S., Fürst, + M., Gautier, J.-D., Gay, O., Gisin, N., Grangier, P., + Happe, A., Hasani, Y., Hentschel, M., Hübel, H., Humer, + G., Länger, T., Legré, M., Lieger, R., Lodewyck, J., + Lorünser, T., Lütkenhaus, N., Marhold, A., Matyus, T., + Maurhart, O., Monat, L., Nauerth, S., Page, J.-B., Poppe, + A., Querasser, E., Ribordy, G., Robyr, S., Salvail, L., + Sharpe, A.W., Shields, A.J., Stucki, D., Suda, M., Tamas, + C., Themel, T., Thew, R.T., Thoma, Y., Treiber, A., + Trinkler, P., Tualle-Brouri, R., Vannel, F., Walenta, N., + Weier, H., Weinfurter, H., Wimberger, I., Yuan, Z.L., + Zbinden, H., and A. Zeilinger, "The SECOQC quantum key + distribution network in Vienna", New Journal of Physics + Vol. 11, Iss. 7, 075001, + DOI 10.1088/1367-2630/11/7/075001, July 2009, + <https://iopscience.iop.org/ + article/10.1088/1367-2630/11/7/075001>. + + [Pompili21.1] + Pompili, M., Hermans, S.L.N., Baier, S., Beukers, H.K.C., + Humphreys, P.C., Schouten, R.N., Vermeulen, R.F.L., + Tiggelman, M.J., dos Santos Martins, L., Dirkse, B., + Wehner, S., and R. Hanson, "Realization of a multinode + quantum network of remote solid-state qubits", Science + Vol. 372, No. 6539, pp. 259-264, + DOI 10.1126/science.abg1919, April 2021, + <https://www.science.org/doi/10.1126/science.abg1919>. + + [Pompili21.2] + Pompili, M., Delle Donne, C., te Raa, I., van der Vecht, + B., Skrzypczyk, M., Ferreira, G., de Kluijver, L., Stolk, + A.J., Hermans, S.L.N., Pawełczak, P., Kozlowski, W., + Hanson, R., and S. Wehner, "Experimental demonstration of + entanglement delivery using a quantum network stack", npj + Quantum Information Vol. 8, 121, DOI 10.4121/16912522, + October 2022, + <https://www.nature.com/articles/s41534-022-00631-2>. + + [QI-Scenarios] + Wang, C., Rahman, A., Li, R., Aelmans, M., and K. + Chakraborty, "Application Scenarios for the Quantum + Internet", Work in Progress, Internet-Draft, draft-irtf- + qirg-quantum-internet-use-cases-15, 10 March 2023, + <https://datatracker.ietf.org/doc/html/draft-irtf-qirg- + quantum-internet-use-cases-15>. + + [Qin17] Qin, H. and Y. Dai, "Dynamic quantum secret sharing by + using d-dimensional GHZ state", Quantum information + processing Vol. 16, Iss. 3, 64, + DOI 10.1007/s11128-017-1525-y, January 2017, + <https://link.springer.com/article/10.1007/ + s11128-017-1525-y>. + + [QKD] "Quantum Key Distribution", Quantum Network Explorer by + QuTech, 2023, + <https://www.quantum-network.com/applications/5/>. + + [RFC1958] Carpenter, B., Ed., "Architectural Principles of the + Internet", RFC 1958, DOI 10.17487/RFC1958, June 1996, + <https://www.rfc-editor.org/info/rfc1958>. + + [Sangouard11] + Sangouard, N., Simon, C., de Riedmatten, H., and N. Gisin, + "Quantum repeaters based on atomic ensembles and linear + optics", Reviews of Modern Physics Vol. 83, Iss. 1, pp. + 33-80, DOI 10.1103/RevModPhys.83.33, March 2011, + <https://journals.aps.org/rmp/abstract/10.1103/ + RevModPhys.83.33>. + + [Satoh17] Satoh, T., Nagayama, S., Oka, T., and R. Van Meter, "The + network impact of hijacking a quantum repeater", Quantum + Science and Technology Vol. 3, Iss. 3, 034008, + DOI 10.1088/2058-9565/aac11f, May 2018, + <https://iopscience.iop.org/article/10.1088/2058-9565/ + aac11f>. + + [Satoh20] Satoh, T., Nagayama, S., Suzuki, S., Matsuo, T., Hajdušek, + M., and R. Van Meter, "Attacking the Quantum Internet", + IEEE Transactions on Quantum Engineering, vol. 2, pp. + 1-17, DOI 10.1109/TQE.2021.3094983, September 2021, + <https://ieeexplore.ieee.org/document/9477172>. + + [SutorBook] + Sutor, R.S., "Dancing with Qubits", Packt Publishing, + November 2019, <https://www.packtpub.com/product/dancing- + with-qubits/9781838827366>. + + [Tang19] Tang, B.-Y., Liu, B., Zhai, Y.-P., Wu, C.-Q., and W.-R. + Yu, "High-speed and Large-scale Privacy Amplification + Scheme for Quantum Key Distribution", Scientific Reports + Vol. 9, DOI 10.1038/s41598-019-50290-1, October 2019, + <https://www.nature.com/articles/s41598-019-50290-1>. + + [Teleportation] + "State teleportation", Quantum Network Explorer by QuTech, + 2023, <https://www.quantum-network.com/applications/1/>. + + [Terhal04] Terhal, B.M., "Is entanglement monogamous?", IBM Journal + of Research and Development Vol. 48, Iss. 1, pp. 71-78, + DOI 10.1147/rd.481.0071, January 2004, + <https://ieeexplore.ieee.org/document/5388928>. + + [VanMeter13.1] + Van Meter, R. and J. Touch, "Designing quantum repeater + networks", IEEE Communications Magazine Vol. 51, Iss. 8, + pp. 64-71, DOI 10.1109/MCOM.2013.6576340, August 2013, + <https://ieeexplore.ieee.org/document/6576340>. + + [VanMeter13.2] + Van Meter, R., Satoh, T., Ladd, T.D., Munro, W.J., and K. + Nemoto, "Path selection for quantum repeater networks", + Networking Science Vol. 3, Iss. 1-4, pp. 82-95, + DOI 10.1007/s13119-013-0026-2, December 2013, + <https://link.springer.com/article/10.1007/ + s13119-013-0026-2>. + + [VanMeterBook] + Van Meter, R., "Quantum Networking", ISTE Ltd/John Wiley + and Sons. Inc., Print ISBN 978-1-84821-537-5, + DOI 10.1002/9781118648919, April 2014, + <https://onlinelibrary.wiley.com/doi/ + book/10.1002/9781118648919>. + + [Wang21] Wang, L.-J., Zhang, K.-Y., Wang, J.-Y., Cheng, J., Yang, + Y.-H., Tang, S.-B., Yan, D., Tang, Y.-L., Liu, Z., Yu, Y., + Zhang, Q., and J.-W. Pan, "Experimental authentication of + quantum key distribution with post-quantum cryptography", + npj Quantum Information Vol. 7, pp. 1-7, + DOI 10.1038/s41534-021-00400-7, May 2021, + <https://www.nature.com/articles/s41534-021-00400-7>. + + [Wehner18] Wehner, S., Elkouss, D., and R. Hanson, "Quantum internet: + A vision for the road ahead", Science Vol. 362, Iss. 6412, + DOI 10.1126/science.aam9288, October 2018, + <https://www.science.org/doi/full/10.1126/ + science.aam9288>. + + [Wei22] Wei, S.-H., Jing, B., Zhang, X.-Y., Liao, J.-Y., Yuan, C.- + Z., Fan, B.-Y., Lyu, C., Zhou, D.-L., Wang, Y., Deng, G.- + W., Song, H.-Z., Oblak, D., Guo, G.-C., and Q. Zhou, + "Towards Real-World Quantum Networks: A Review", Laser and + Photonics Reviews Vol. 16, 2100219, + DOI 10.1002/lpor.202100219, January 2022, + <https://onlinelibrary.wiley.com/doi/10.1002/ + lpor.202100219>. + + [Wootters82] + Wootters, W.K. and W.H. Zurek, "A single quantum cannot be + cloned", Nature Vol. 299, Iss. 5886, pp. 802-803, + DOI 10.1038/299802a0, October 1982, + <https://www.nature.com/articles/299802a0>. + + [ZOO] "The Quantum Protocol Zoo", November 2019, + <https://wiki.veriqloud.fr/>. + +Acknowledgements + + The authors want to thank Carlo Delle Donne, Matthew Skrzypczyk, Axel + Dahlberg, Mathias van den Bossche, Patrick Gelard, Chonggang Wang, + Scott Fluhrer, Joey Salazar, Joseph Touch, and the rest of the QIRG + community as a whole for their very useful reviews and comments on + this document. + + WK and SW acknowledge funding received from the EU Flagship on + Quantum Technologies, Quantum Internet Alliance (No. 820445). + + rdv acknowledges support by the Air Force Office of Scientific + Research under award number FA2386-19-1-4038. + +Authors' Addresses + + Wojciech Kozlowski + QuTech + Building 22 + Lorentzweg 1 + 2628 CJ Delft + Netherlands + Email: w.kozlowski@tudelft.nl + + + Stephanie Wehner + QuTech + Building 22 + Lorentzweg 1 + 2628 CJ Delft + Netherlands + Email: s.d.c.wehner@tudelft.nl + + + Rodney Van Meter + Keio University + 5322 Endo, Fujisawa, Kanagawa + 252-0882 + Japan + Email: rdv@sfc.wide.ad.jp + + + Bruno Rijsman + Individual + Email: brunorijsman@gmail.com + + + Angela Sara Cacciapuoti + University of Naples Federico II + Department of Electrical Engineering and Information Technologies + Claudio 21 + 80125 Naples + Italy + Email: angelasara.cacciapuoti@unina.it + + + Marcello Caleffi + University of Naples Federico II + Department of Electrical Engineering and Information Technologies + Claudio 21 + 80125 Naples + Italy + Email: marcello.caleffi@unina.it + + + Shota Nagayama + Mercari, Inc. + Roppongi Hills Mori Tower 18F + 6-10-1 Roppongi, Minato-ku, Tokyo + 106-6118 + Japan + Email: shota.nagayama@mercari.com |