diff options
Diffstat (limited to 'doc/rfc/rfc9583.txt')
-rw-r--r-- | doc/rfc/rfc9583.txt | 1534 |
1 files changed, 1534 insertions, 0 deletions
diff --git a/doc/rfc/rfc9583.txt b/doc/rfc/rfc9583.txt new file mode 100644 index 0000000..a452252 --- /dev/null +++ b/doc/rfc/rfc9583.txt @@ -0,0 +1,1534 @@ + + + + +Internet Research Task Force (IRTF) C. Wang +Request for Comments: 9583 InterDigital Communications, LLC +Category: Informational A. Rahman +ISSN: 2070-1721 Ericsson + R. Li + Kanazawa University + M. Aelmans + Juniper Networks + K. Chakraborty + The University of Edinburgh + June 2024 + + + Application Scenarios for the Quantum Internet + +Abstract + + The Quantum Internet has the potential to improve application + functionality by incorporating quantum information technology into + the infrastructure of the overall Internet. This document provides + an overview of some applications expected to be used on the Quantum + Internet and categorizes them. Some general requirements for the + Quantum Internet are also discussed. The intent of this document is + to describe a framework for applications and to describe a few + selected application scenarios for the Quantum Internet. This + document is a product of the Quantum Internet Research Group (QIRG). + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Research Task Force + (IRTF). The IRTF publishes the results of Internet-related research + and development activities. These results might not be suitable for + deployment. This RFC represents the consensus of the QIRG Research + Group of the Internet Research Task Force (IRTF). Documents approved + for publication by the IRSG are not candidates for any level of + Internet Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc9583. + +Copyright Notice + + Copyright (c) 2024 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. + +Table of Contents + + 1. Introduction + 2. Terms and Acronyms List + 3. Quantum Internet Applications + 3.1. Quantum Cryptography Applications + 3.2. Quantum Sensing and Metrology Applications + 3.3. Quantum Computing Applications + 4. Selected Quantum Internet Application Scenarios + 4.1. Secure Communication Setup + 4.2. Blind Quantum Computing + 4.3. Distributed Quantum Computing + 5. General Requirements + 5.1. Operations on Entangled Qubits + 5.2. Entanglement Distribution + 5.3. The Need for Classical Channels + 5.4. Quantum Internet Management + 6. Conclusion + 7. IANA Considerations + 8. Security Considerations + 9. Informative References + Acknowledgments + Authors' Addresses + +1. Introduction + + The Classical, i.e., non-quantum, Internet has been constantly + growing since it first became commercially popular in the early + 1990s. It essentially consists of a large number of end nodes (e.g., + laptops, smart phones, and network servers) connected by routers and + clustered in Autonomous Systems. The end nodes may run applications + that provide service for the end users such as processing and + transmission of voice, video, or data. The connections between the + various nodes in the Internet include backbone links (e.g., fiber + optics) and access links (e.g., fiber optics, Wi-Fi, cellular + wireless, and Digital Subscriber Lines (DSLs)). Bits are transmitted + across the Classical Internet in packets. + + Research and experiments have picked up over the last few years for + developing the Quantum Internet [Wehner]. End nodes will also be a + part of the Quantum Internet; in that case, they are called "quantum + end nodes" and may be connected by quantum repeaters and/or routers. + These quantum end nodes will also run value-added applications, which + will be discussed later. + + The physical layer quantum channels between the various nodes in the + Quantum Internet can be either waveguides, such as optical fibers, or + free space. Photonic channels are particularly useful because light + (photons) is very suitable for physically realizing qubits. The + Quantum Internet will operate according to quantum physical + principles such as quantum superposition and entanglement [RFC9340]. + + The Quantum Internet is not anticipated to replace but rather to + enhance the Classical Internet and/or provide breakthrough + applications. For instance, Quantum Key Distribution can improve the + security of the Classical Internet, and quantum computing can + expedite and optimize computation-intensive tasks in the Classical + Internet. The Quantum Internet will run in conjunction with the + Classical Internet. The process of integrating the Quantum Internet + with the Classical Internet is similar to the process of introducing + any new communication and networking paradigm into the existing + Internet but with more profound implications. + + The intent of this document is to provide a common understanding and + framework of applications and application scenarios for the Quantum + Internet. It is noted that ITU-T SG13-TD158/WP3 [ITUT] briefly + describes four kinds of use cases of quantum networks beyond Quantum + Key Distribution networks: quantum time synchronization use cases, + quantum computing use cases, quantum random number generator use + cases, and quantum communication use cases (e.g., quantum digital + signatures, quantum anonymous transmission, and quantum money). This + document focuses on quantum applications that have more impact on + networking, such as secure communication setup, blind quantum + computing, and distributed quantum computing; although these + applications were mentioned in [ITUT], this document gives more + details and derives some requirements from a networking perspective. + + This document was produced by the Quantum Internet Research Group + (QIRG). It was discussed on the QIRG mailing list and during several + meetings of the research group. It has been reviewed extensively by + the QIRG members with expertise in both quantum physics and Classical + Internet operation. This document represents the consensus of the + QIRG members, of both experts in the subject matter (from the quantum + and networking domains) and newcomers, who are the target audience. + It is not an IETF product and is not a standard. + +2. Terms and Acronyms List + + This document assumes that the reader is familiar with the terms and + concepts that relate to quantum information technology described in + [RFC9340]. In addition, the following terms and acronyms are defined + herein for clarity: + + Bell Pairs: A special type of quantum state that is two qubits. The + two qubits show a correlation that cannot be observed in classical + information theory. We refer to such correlation as quantum + entanglement. Bell pairs exhibit the maximal quantum + entanglement. One example of a Bell pair is + (|00>+|11>)/(Sqrt(2)). The Bell pairs are a fundamental resource + for quantum communication. + + Bit: Binary digit (i.e., fundamental unit of information in + classical communications and classical computing). Bit is used in + the Classical Internet where the state of a bit is deterministic. + In contrast, qubit is used in the Quantum Internet where the state + of a qubit is uncertain before it is measured. + + Classical Internet: The existing, deployed Internet (circa 2020) + where bits are transmitted in packets between nodes to convey + information. The Classical Internet supports applications that + may be enhanced by the Quantum Internet. For example, the end-to- + end security of a Classical Internet application may be improved + by a secure communication setup using a quantum application. + Classical Internet is a network of classical network nodes that do + not support quantum information technology. In contrast, Quantum + Internet consists of quantum nodes based on quantum information + technology. + + Entanglement Swapping: It is a process of sharing an entanglement + between two distant parties via some intermediate nodes. For + example, suppose that there are three parties (A, B, and C) and + that each of the parties (A, B) and (B, C) share Bell pairs. B + can use the qubits it shares with A and C to perform entanglement- + swapping operations, and as a result, A and C share Bell pairs. + Entanglement swapping essentially realizes entanglement + distribution (i.e., two nodes separated in distance can share a + Bell pair). + + Fast Byzantine Negotiation: A quantum-based method for fast + agreement in Byzantine negotiations [Ben-Or] [Taherkhani]. + + Local Operations and Classical Communication (LOCC): A method where + nodes communicate in rounds, in which (1) they can send any + classical information to each other, (2) they can perform local + quantum operations individually, and (3) the actions performed in + each round can depend on the results from previous rounds. + + Noisy Intermediate-Scale Quantum (NISQ): NISQ was defined in + [Preskill] to represent a near-term era in quantum technology. + According to this definition, NISQ computers have two salient + features: (1) the size of NISQ computers range from 50 to a few + hundred physical qubits (i.e., intermediate-scale) and (2) qubits + in NISQ computers have inherent errors and the control over them + is imperfect (i.e., noisy). + + Packet: A self-identified message with in-band addresses or other + information that can be used for forwarding the message. The + message contains an ordered set of bits of determinate number. + The bits contained in a packet are classical bits. + + Prepare and Measure: A set of Quantum Internet scenarios where + quantum nodes only support simple quantum functionalities (i.e., + prepare qubits and measure qubits). For example, BB84 [BB84] is a + prepare-and-measure quantum key distribution protocol. + + Quantum Computer (QC): A quantum end node that also has quantum + memory and quantum computing capabilities is regarded as a full- + fledged quantum computer. + + Quantum End Node: An end node that hosts user applications and + interfaces with the rest of the Internet. Typically, an end node + may serve in a client, server, or peer-to-peer role as part of the + application. A quantum end node must also be able to interface to + the Classical Internet for control purposes and thus be able to + receive, process, and transmit classical bits and/or packets. + + Quantum Internet: A network of quantum networks. The Quantum + Internet is expected to be merged into the Classical Internet. + The Quantum Internet may either improve classical applications or + enable new quantum applications. + + Quantum Key Distribution (QKD): A method that leverages quantum + mechanics such as a no-cloning theorem to let two parties create + the same arbitrary classical key. + + Quantum Network: A new type of network enabled by quantum + information technology where quantum resources, such as qubits and + entanglement, are transferred and utilized between quantum nodes. + The quantum network will use both quantum channels and classical + channels provided by the Classical Internet, referred to as a + "hybrid implementation". + + Quantum Teleportation: A technique for transferring quantum + information via Local Operations and Classical Communication + (LOCC). If two parties share a Bell pair, then by using quantum + teleportation, a sender can transfer a quantum data bit to a + receiver without sending it physically via a quantum channel. + + Qubit: Quantum bit (i.e., fundamental unit of information in quantum + communication and quantum computing). It is similar to a classic + bit in that the state of a qubit is either "0" or "1" after it is + measured and denotes its basis state vector as |0> or |1> using + Dirac's ket notation. However, the qubit is different than a + classic bit in that the qubit can be in a linear combination of + both states before it is measured and termed to be in + superposition. Any of several Degrees of Freedom (DOF) of a + photon (e.g., polarization, time bib, and/or frequency) or an + electron (e.g., spin) can be used to encode a qubit. + + Teleport a Qubit: An operation on two or more carriers in succession + to move a qubit from a sender to a receiver using quantum + teleportation. + + Transfer a Qubit: An operation to move a qubit from a sender to a + receiver without specifying the means of moving the qubit, which + could be "transmit" or "teleport". + + Transmit a Qubit: An operation to encode a qubit into a mobile + carrier (i.e., typically photon) and pass it through a quantum + channel from a sender (a transmitter) to a receiver. + +3. Quantum Internet Applications + + The Quantum Internet is expected to be beneficial for a subset of + existing and new applications. The expected applications for the + Quantum Internet are still being developed as we are in the formative + stages of the Quantum Internet [Castelvecchi] [Wehner]. However, an + initial (and non-exhaustive) list of the applications to be supported + on the Quantum Internet can be identified and classified using two + different schemes. Note that this document does not include quantum + computing applications that are purely local to a given node. + + Applications may be grouped by the usage that they serve. + Specifically, applications may be grouped according to the following + categories: + + Quantum cryptography applications: Refer to the use of quantum + information technology for cryptographic tasks (e.g., Quantum Key + Distribution [Renner]). + + Quantum sensor applications: Refer to the use of quantum information + technology for supporting distributed sensors (e.g., clock + synchronization [Jozsa2000] [Komar] [Guo]). + + Quantum computing applications: Refer to the use of quantum + information technology for supporting remote quantum computing + facilities (e.g., distributed quantum computing [Denchev]). + + This scheme can be easily understood by both a technical and non- + technical audience. The next sections describe the scheme in more + detail. + +3.1. Quantum Cryptography Applications + + Examples of quantum cryptography applications include quantum-based + secure communication setup and fast Byzantine negotiation. + + Secure communication setup: Refers to secure cryptographic key + distribution between two or more end nodes. The most well-known + method is referred to as "Quantum Key Distribution (QKD)" + [Renner]. + + Fast Byzantine negotiation: Refers to a quantum-based method for + fast agreement in Byzantine negotiations [Ben-Or], for example, to + reduce the number of expected communication rounds and, in turn, + to achieve faster agreement, in contrast to classical Byzantine + negotiations. A quantum-aided Byzantine agreement on quantum + repeater networks as proposed in [Taherkhani] includes + optimization techniques to greatly reduce the quantum circuit + depth and the number of qubits in each node. Quantum-based + methods for fast agreement in Byzantine negotiations can be used + for improving consensus protocols such as practical Byzantine + Fault Tolerance (pBFT) as well as other distributed computing + features that use Byzantine negotiations. + + Quantum money: Refers to the main security requirement of money is + unforgeability. A quantum money scheme aims to exploit the no- + cloning property of the unknown quantum states. Though the + original idea of quantum money dates back to 1970, these early + protocols allow only the issuing bank to verify a quantum + banknote. However, the recent protocols such as public key + quantum money [Zhandry] allow anyone to verify the banknotes + locally. + +3.2. Quantum Sensing and Metrology Applications + + The entanglement, superposition, interference, and squeezing of + properties can enhance the sensitivity of the quantum sensors and + eventually can outperform the classical strategies. Examples of + quantum sensor applications include network clock synchronization, + high-sensitivity sensing, etc. These applications mainly leverage a + network of entangled quantum sensors (i.e., quantum sensor networks) + for high-precision, multiparameter estimation [Proctor]. + + Network clock synchronization: Refers to a world wide set of high- + precision clocks connected by the Quantum Internet to achieve an + ultra precise clock signal [Komar] with fundamental precision + limits set by quantum theory. + + High-sensitivity sensing: Refers to applications that leverage + quantum phenomena to achieve reliable nanoscale sensing of + physical magnitudes. For example, [Guo] uses an entangled quantum + network for measuring the average phase shift among multiple + distributed nodes. + + Interferometric telescopes using quantum information: + Refers to interferometric techniques that are used to combine + signals from two or more telescopes to obtain measurements with + higher resolution than what could be obtained with either + telescope individually. It can make measurements of very small + astronomical objects if the telescopes are spread out over a wide + area. However, the phase fluctuations and photon loss introduced + by the communication channel between the telescopes put a + limitation on the baseline lengths of the optical interferometers. + This limitation can potentially be avoided using quantum + teleportation. In general, by sharing Einstein-Podolsky-Rosen + pairs using quantum repeaters, the optical interferometers can + communicate photons over long distances, providing arbitrarily + long baselines [Gottesman2012]. + +3.3. Quantum Computing Applications + + In this section, we include the applications for the quantum + computing. It's anticipated that quantum computers as a cloud + service will become more available in future. Sometimes, to run such + applications in the cloud while preserving the privacy, a client and + a server need to exchange qubits (e.g., in blind quantum computation + [Fitzsimons] as described below). Therefore, such privacy preserving + quantum computing applications require a Quantum Internet to execute. + + Examples of quantum computing include distributed quantum computing + and blind quantum computing, which can enable new types of cloud + computing. + + Distributed quantum computing: Refers to a collection of small- + capacity, remote quantum computers (i.e., each supporting a + relatively small number of qubits) that are connected and work + together in a coordinated fashion so as to simulate a virtual + large capacity quantum computer [Wehner]. + + Blind quantum computing: Refers to private, or blind, quantum + computation, which provides a way for a client to delegate a + computation task to one or more remote quantum computers without + disclosing the source data to be computed [Fitzsimons]. + +4. Selected Quantum Internet Application Scenarios + + The Quantum Internet will support a variety of applications and + deployment configurations. This section details a few key + application scenarios that illustrate the benefits of the Quantum + Internet. In system engineering, an application scenario is + typically made up of a set of possible sequences of interactions + between nodes and users in a particular environment and related to a + particular goal. This will be the definition that we use in this + section. + +4.1. Secure Communication Setup + + In this scenario, two nodes (e.g., quantum node A and quantum node B) + need to have secure communications for transmitting confidential + information (see Figure 1). For this purpose, they first need to + securely share a classic secret cryptographic key (i.e., a sequence + of classical bits), which is triggered by an end user with local + secure interface to quantum node A. This results in a quantum node A + securely establishing a classical secret key with a quantum node B. + This is referred to as a "secure communication setup". Note that + quantum nodes A and B may be either a bare-bone quantum end node or a + full-fledged quantum computer. This application scenario shows that + the Quantum Internet can be leveraged to improve the security of + Classical Internet applications. + + One requirement for this secure communication setup process is that + it should not be vulnerable to any classical or quantum computing + attack. This can be realized using QKD, which is unbreakable in + principle. QKD can securely establish a secret key between two + quantum nodes, using a classical authentication channel and insecure + quantum channel without physically transmitting the key through the + network and thus achieving the required security. However, care must + be taken to ensure that the QKD system is safe against physical side- + channel attacks that can compromise the system. An example of a + physical side-channel attack is to surreptitiously inject additional + light into the optical devices used in QKD to learn side information + about the system such as the polarization. Other specialized + physical attacks against QKD also use a classical authentication + channel and an insecure quantum channel such as the phase-remapping + attack, photon number splitting attack, and decoy state attack + [Zhao2018]. QKD can be used for many other cryptographic + communications, such as IPsec and Transport Layer Security (TLS), + where involved parties need to establish a shared security key, + although it usually introduces a high latency. + + QKD is the most mature feature of quantum information technology and + has been commercially released in small-scale and short-distance + deployments. More QKD use cases are described in the ETSI document + [ETSI-QKD-UseCases]; in addition, interfaces between QKD users and + QKD devices are specified in the ETSI document [ETSI-QKD-Interfaces]. + + In general, the prepare-and-measure QKD protocols (e.g., [BB84]) + without using entanglement work as follows: + + 1. The quantum node A encodes classical bits to qubits. Basically, + the node A generates two random classical bit strings X and Y. + Among them, it uses the bit string X to choose the basis and uses + Y to choose the state corresponding to the chosen basis. For + example, if X=0, then in case of the BB84 protocol, Alice + prepares the state in {|0>, |1>}-basis; otherwise, she prepares + the state in {|+>, |->}-basis. Similarly, if Y=0, then Alice + prepares the qubit as either |0> or |+> (depending on the value + of X); and if Y =1, then Alice prepares the qubit as either |1> + or |->. + + 2. The quantum node A sends qubits to the quantum node B via a + quantum channel. + + 3. The quantum node B receives qubits and measures each of them in + one of the two bases at random. + + 4. The quantum node B informs the quantum node A of its choice of + bases for each qubit. + + 5. The quantum node A informs the quantum node B which random + quantum basis is correct. + + 6. Both nodes discard any measurement bit under different quantum + bases, and the remaining bits could be used as the secret key. + Before generating the final secret key, there is a post- + processing procedure over authenticated classical channels. The + classical post-processing part can be subdivided into three + steps, namely parameter estimation, error correction, and privacy + amplification. In the parameter estimation phase, both Alice and + Bob use some of the bits to estimate the channel error. If it is + larger than some threshold value, they abort the protocol or + otherwise move to the error-correction phase. Basically, if an + eavesdropper tries to intercept and read qubits sent from node A + to node B, the eavesdropper will be detected due to the entropic + uncertainty relation property theorem of quantum mechanics. As a + part of the post-processing procedure, both nodes usually also + perform information reconciliation [Elkouss] for efficient error + correction and/or conduct privacy amplification [Tang] for + generating the final information-theoretical secure keys. + + 7. The post-processing procedure needs to be performed over an + authenticated classical channel. In other words, the quantum + node A and the quantum node B need to authenticate the classical + channel to make sure there is no eavesdroppers or on-path + attacks, according to certain authentication protocols such as + that described in [Kiktenko]. In [Kiktenko], the authenticity of + the classical channel is checked at the very end of the post- + processing procedure instead of doing it for each classical + message exchanged between the quantum node A and the quantum node + B. + + It is worth noting that: + + 1. There are many enhanced QKD protocols based on [BB84]. For + example, a series of loopholes have been identified due to the + imperfections of measurement devices; there are several solutions + to take into account concerning these attacks such as + measurement-device-independent QKD [Zheng2019]. These enhanced + QKD protocols can work differently than the steps of BB84 + protocol [BB84]. + + 2. For large-scale QKD, QKD Networks (QKDNs) are required, which can + be regarded as a subset of a Quantum Internet. A QKDN may + consist of a QKD application layer, a QKD network layer, and a + QKD link layer [Qin]. One or multiple trusted QKD relays + [Zhang2018] may exist between the quantum node A and the quantum + node B, which are connected by a QKDN. Alternatively, a QKDN may + rely on entanglement distribution and entanglement-based QKD + protocols; as a result, quantum repeaters and/or routers instead + of trusted QKD relays are needed for large-scale QKD. + Entanglement swapping can be leveraged to realize entanglement + distribution. + + 3. QKD provides an information-theoretical way to share secret keys + between two parties (i.e., a transmitter and a receiver) in the + presence of an eavesdropper. However, this is true in theory, + and there is a significant gap between theory and practice. By + exploiting the imperfection of the detectors, Eve can gain + information about the shared key [Xu]. To avoid such side- + channel attacks in [Lo], the researchers provide a QKD protocol + called "Measurement Device-Independent (MDI)" QKD that allows two + users (a transmitter "Alice" and a receiver "Bob") to communicate + with perfect security, even if the (measurement) hardware they + are using has been tampered with (e.g., by an eavesdropper) and + thus is not trusted. It is achieved by measuring correlations + between signals from Alice and Bob, rather than the actual + signals themselves. + + 4. QKD protocols based on Continuous Variable QKD (CV-QKD) have + recently seen plenty of interest as they only require + telecommunications equipment that is readily available and is + also in common use industry-wide. This kind of technology is a + potentially high-performance technique for secure key + distribution over limited distances. The recent demonstration of + CV-QKD shows compatibility with classical coherent detection + schemes that are widely used for high-bandwidth classical + communication systems [Grosshans]. Note that we still do not + have a quantum repeater for the continuous variable systems; + hence, these kinds of QKD technologies can be used for the short + distance communications or trusted relay-based QKD networks. + + 5. Secret sharing can be used to distribute a secret key among + multiple nodes by letting each node know a share or a part of the + secret key, while no single node can know the entire secret key. + The secret key can only be reconstructed via collaboration from a + sufficient number of nodes. Quantum Secret Sharing (QSS) + typically refers to the following scenario: the secret key to be + shared is based on quantum states instead of classical bits. QSS + enables splitting and sharing such quantum states among multiple + nodes. + + 6. There are some entanglement-based QKD protocols, such as that + described in [Treiber], [E91], and [BBM92], which work + differently than the above steps. The entanglement-based + schemes, where entangled states are prepared externally to the + quantum node A and the quantum node B, are not normally + considered "prepare and measure" as defined in [Wehner]. Other + entanglement-based schemes, where entanglement is generated + within the source quantum node, can still be considered "prepare + and measure". Send-and-return schemes can still be "prepare and + measure" if the information content, from which keys will be + derived, is prepared within the quantum node A before being sent + to the quantum node B for measurement. + + As a result, the Quantum Internet in Figure 1 contains quantum + channels. And in order to support secure communication setup, + especially in large-scale deployment, it also requires entanglement + generation and entanglement distribution [QUANTUM-CONNECTION], + quantum repeaters and/or routers, and/or trusted QKD relays. + + + +---------------+ + | End User | + +---------------+ + ^ + | Local Secure Interface + | (e.g., the same physical hardware + | or a local secure network) + V + +-----------------+ /--------\ +-----------------+ + | |--->( Quantum )--->| | + | | ( Internet ) | | + | Quantum | \--------/ | Quantum | + | Node A | | Node B | + | | /--------\ | | + | | ( Classical) | | + | |<-->( Internet )<-->| | + +-----------------+ \--------/ +-----------------+ + + Figure 1: Secure Communication Setup + +4.2. Blind Quantum Computing + + Blind quantum computing refers to the following scenario: + + 1. A client node with source data delegates the computation of the + source data to a remote computation node (i.e., a server). + + 2. Furthermore, the client node does not want to disclose any source + data to the remote computation node, which preserves the source + data privacy. + + 3. Note that there is no assumption or guarantee that the remote + computation node is a trusted entity from the source data privacy + perspective. + + As an example illustrated in Figure 2, a terminal node can be a small + quantum computer with limited computation capability compared to a + remote quantum computation node (e.g., a remote mainframe quantum + computer), but the terminal node needs to run a computation-intensive + task (e.g., Shor's factoring algorithm). The terminal node can + create individual qubits and send them to the remote quantum + computation node. Then, the remote quantum computation node can + entangle the qubits, calculate on them, measure them, generate + measurement results in classical bits, and return the measurement + results to the terminal node. It is noted that those measurement + results will look like purely random data to the remote quantum + computation node because the initial states of the qubits were chosen + in a cryptographically secure fashion. + + As a new client and server computation model, Blind Quantum + Computation (BQC) generally enables the following process: + + 1. The client delegates a computation function to the server. + + 2. The client does not send original qubits to the server but does + send transformed qubits to the server. + + 3. The computation function is performed at the server on the + transformed qubits to generate temporary result qubits, which + could be quantum-circuit-based computation or measurement-based + quantum computation. The server sends the temporary result + qubits to the client. + + 4. The client receives the temporary result qubits and transforms + them to the final result qubits. + + During this process, the server cannot figure out the original qubits + from the transformed qubits. Also, it will not take too much effort + on the client side to transform the original qubits to the + transformed qubits or transform the temporary result qubits to the + final result qubits. One of the very first BQC protocols, such as + that described in [Childs], follows this process, although the client + needs some basic quantum features such as quantum memory, qubit + preparation and measurement, and qubit transmission. Measurement- + based quantum computation is out of the scope of this document, and + more details about it can be found in [Jozsa2005]. + + It is worth noting that: + + 1. The BQC protocol in [Childs] is a circuit-based BQC model, where + the client only performs simple quantum circuit for qubit + transformation, while the server performs a sequence of quantum + logic gates. Qubits are transmitted back and forth between the + client and the server. + + 2. Universal BQC (UBQC) in [Broadbent] is a measurement-based BQC + model, which is based on measurement-based quantum computing + leveraging entangled states. The principle in UBQC is based on + the fact that the quantum teleportation plus a rotated Bell + measurement realize a quantum computation, which can be repeated + multiple times to realize a sequence of quantum computation. In + this approach, the client first prepares transformed qubits and + sends them to the server, and the server needs to first prepare + entangled states from all received qubits. Then, multiple + interaction and measurement rounds happen between the client and + the server. For each round: + + i. the client computes and sends new measurement instructions + or measurement adaptations to the server; + + ii. the server performs the measurement according to the + received measurement instructions to generate measurement + results (in qubits or classic bits); and + + iii. then the client receives the measurement results and + transforms them to the final results. + + 3. A hybrid UBQC is proposed in [Zhang2009], where the server + performs both quantum circuits like that demonstrated in [Childs] + and quantum measurements like that demonstrated in [Broadbent] to + reduce the number of required entangled states in [Broadbent]. + Also, the client is much simpler than the client in [Childs]. + This hybrid BQC is a combination of a circuit-based BQC model and + a measurement-based BQC model. + + 4. It is ideal if the client in BQC is a purely classical client, + which only needs to interact with the server using classical + channels and communications. [Huang] demonstrates such an + approach where a classical client leverages two entangled servers + to perform BQC with the assumption that both servers cannot + communicate with each other; otherwise, the blindness or privacy + of the client cannot be guaranteed. The scenario as demonstrated + in [Huang] is essentially an example of BQC with multiple + servers. + + 5. How to verify that the server will perform what the client + requests or expects is an important issue in many BQC protocols, + referred to as "verifiable BQC". [Fitzsimons] discusses this + issue and compares it in various BQC protocols. + + In Figure 2, the Quantum Internet contains quantum channels and + quantum repeaters and/or routers for long-distance qubits + transmission [RFC9340]. + + +----------------+ /--------\ +-------------------+ + | |--->( Quantum )--->| | + | | ( Internet ) | Remote Quantum | + | Terminal | \--------/ | Computation | + | Node | | Node | + | (e.g., a small| /--------\ | (e.g., a remote | + | quantum | ( Classical) | mainframe | + | computer) |<-->( Internet )<-->| quantum computer) | + +----------------+ \--------/ +-------------------+ + + Figure 2: Bind Quantum Computing + +4.3. Distributed Quantum Computing + + There can be two types of distributed quantum computing [Denchev]: + + 1. Leverage quantum mechanics to enhance classical distributed + computing. For example, entangled quantum states can be + exploited to improve leader election in classical distributed + computing by simply measuring the entangled quantum states at + each party (e.g., a node or a device) without introducing any + classical communications among distributed parties [Pal]. + Normally, pre-shared entanglement first needs to be established + among distributed parties, followed by LOCC operations at each + party. And it generally does not need to transfer qubits among + distributed parties. + + 2. Distribute quantum computing functions to distributed quantum + computers. A quantum computing task or function (e.g., quantum + gates) is split and distributed to multiple physically separate + quantum computers. And it may or may not need to transmit qubits + (either inputs or outputs) among those distributed quantum + computers. Entangled states will be needed and actually consumed + to support such distributed quantum computing tasks. It is worth + noting that: + + a. Entangled states can be created beforehand and stored or + buffered; + + b. The rate of entanglement creation will limit the performance + of practical Quantum Internet applications including + distributed quantum computing, although entangled states + could be buffered. + + For example, [Gottesman1999] and [Eisert] have demonstrated that + a Controlled NOT (CNOT) gate can be realized jointly by and + distributed to multiple quantum computers. The rest of this + section focuses on this type of distributed quantum computing. + + As a scenario for the second type of distributed quantum computing, + Noisy Intermediate-Scale Quantum (NISQ) computers distributed in + different locations are available for sharing. According to the + definition in [Preskill], a NISQ computer can only realize a small + number of qubits and has limited quantum error correction. This + scenario is referred to as "distributed quantum computing" [Caleffi] + [Cacciapuoti2020] [Cacciapuoti2019]. This application scenario + reflects the vastly increased computing power that quantum computers + can bring as a part of the Quantum Internet, in contrast to classical + computers in the Classical Internet, in the context of a distributed + quantum computing ecosystem [Cuomo]. According to [Cuomo], quantum + teleportation enables a new communication paradigm, referred to as + "teledata" [VanMeter2006-01], which moves quantum states among qubits + to distributed quantum computers. In addition, distributed quantum + computation also needs the capability of remotely performing quantum + computation on qubits on distributed quantum computers, which can be + enabled by the technique called "telegate" [VanMeter2006-02]. + + As an example, a user can leverage these connected NISQ computers to + solve highly complex scientific computation problems, such as + analysis of chemical interactions for medical drug development [Cao] + (see Figure 3). In this case, qubits will be transmitted among + connected quantum computers via quantum channels, while the user's + execution requests are transmitted to these quantum computers via + classical channels for coordination and control purpose. Another + example of distributed quantum computing is secure Multi-Party + Quantum Computation (MPQC) [Crepeau], which can be regarded as a + quantum version of classical secure Multi-Party Computation (MPC). + In a secure MPQC protocol, multiple participants jointly perform + quantum computation on a set of input quantum states, which are + prepared and provided by different participants. One of the primary + aims of the secure MPQC is to guarantee that each participant will + not know input quantum states provided by other participants. Secure + MPQC relies on verifiable quantum secret sharing [Lipinska]. + + For the example shown in Figure 3, we want to move qubits from one + NISQ computer to another NISQ computer. For this purpose, quantum + teleportation can be leveraged to teleport sensitive data qubits from + one quantum computer (A) to another quantum computer (B). Note that + Figure 3 does not cover measurement-based distributed quantum + computing, where quantum teleportation may not be required. When + quantum teleportation is employed, the following steps happen between + A and B. In fact, LOCC [Chitambar] operations are conducted at the + quantum computers A and B in order to achieve quantum teleportation + as illustrated in Figure 3. + + 1. The quantum computer A locally generates some sensitive data + qubits to be teleported to the quantum computer B. + + 2. A shared entanglement is established between the quantum computer + A and the quantum computer B (i.e., there are two entangled + qubits: q1 at A and q2 at B). For example, the quantum computer + A can generate two entangled qubits (i.e., q1 and q2) and send q2 + to the quantum computer B via quantum communications. + + 3. Then, the quantum computer A performs a Bell measurement of the + entangled qubit q1 and the sensitive data qubit. + + 4. The result from this Bell measurement will be encoded in two + classical bits, which will be physically transmitted via a + classical channel to the quantum computer B. + + 5. Based on the received two classical bits, the quantum computer B + modifies the state of the entangled qubit q2 in the way to + generate a new qubit identical to the sensitive data qubit at the + quantum computer A. + + In Figure 3, the Quantum Internet contains quantum channels and + quantum repeaters and/or routers [RFC9340]. This application + scenario needs to support entanglement generation and entanglement + distribution (or quantum connection) setup [QUANTUM-CONNECTION] in + order to support quantum teleportation. + + +-----------------+ + | End User | + | | + +-----------------+ + ^ + | Local Secure Interface + | (e.g., the same physical hardware + | or a local secure network) + | + +------------------+-------------------+ + | | + | | + V V + +----------------+ /--------\ +----------------+ + | |--->( Quantum )--->| | + | | ( Internet ) | | + | Quantum | \--------/ | Quantum | + | Computer A | | Computer B | + | (e.g., Site #1)| /--------\ | (e.g., Site #2)| + | | ( Classical) | | + | |<-->( Internet )<-->| | + +----------------+ \--------/ +----------------+ + + Figure 3: Distributed Quantum Computing + +5. General Requirements + + Quantum technologies are steadily evolving and improving. Therefore, + it is hard to predict the timeline and future milestones of quantum + technologies as pointed out in [Grumbling] for quantum computing. + Currently, a NISQ computer can achieve fifty to hundreds of qubits + with some given error rate. + + On the network level, six stages of Quantum Internet development are + described in [Wehner] as a Quantum Internet technology roadmap as + follows: + + 1. Trusted repeater networks (Stage-1) + + 2. Prepare-and-measure networks (Stage-2) + + 3. Entanglement distribution networks (Stage-3) + + 4. Quantum memory networks (Stage-4) + + 5. Fault-tolerant few qubit networks (Stage-5) + + 6. Quantum computing networks (Stage-6) + + The first stage is simple trusted repeater networks, while the final + stage is the quantum computing networks where the full-blown Quantum + Internet will be achieved. Each intermediate stage brings with it + new functionality, new applications, and new characteristics. + Table 1 illustrates Quantum Internet application scenarios as + described in Sections 3 and 4 mapped to the Quantum Internet stages + described in [Wehner]. For example, secure communication setup can + be supported in Stage-1, Stage-2, or Stage-3 but with different QKD + solutions. More specifically: + + * In Stage-1, basic QKD is possible and can be leveraged to support + secure communication setup, but trusted nodes are required to + provide end-to-end security. The primary requirement is the + trusted nodes. + + * In Stage-2, the end users can prepare and measure the qubits. In + this stage, the users can verify classical passwords without + revealing them. + + * In Stage-3, end-to-end security can be enabled based on quantum + repeaters and entanglement distribution to support the same secure + communication setup application. The primary requirement is + entanglement distribution to enable long-distance QKD. + + * In Stage-4, the quantum repeaters gain the capability of storing + and manipulating entangled qubits in the quantum memories. Using + these kinds of quantum networks, one can run sophisticated + applications like blind quantum computing, leader election, and + quantum secret sharing. + + * In Stage-5, quantum repeaters can perform error correction; hence, + they can perform fault-tolerant quantum computations on the + received data. With the help of these repeaters, it is possible + to run distributed quantum computing and quantum sensor + applications over a smaller number of qubits. + + * Finally, in Stage-6, distributed quantum computing relying on more + qubits can be supported. + + +================+==========================+=====================+ + | Quantum | Example Quantum Internet | Characteristic | + | Internet Stage | Use Cases | | + +================+==========================+=====================+ + | Stage-1 | Secure communication | Trusted nodes | + | | setup using basic QKD | | + +----------------+--------------------------+---------------------+ + | Stage-2 | Secure communication | Prepare-and-measure | + | | setup using the QKD with | capability | + | | end-to-end security | | + +----------------+--------------------------+---------------------+ + | Stage-3 | Secure communication | Entanglement | + | | setup using | distribution | + | | entanglement-enabled QKD | | + +----------------+--------------------------+---------------------+ + | Stage-4 | Blind quantum computing | Quantum memory | + +----------------+--------------------------+---------------------+ + | Stage-5 | Higher-accuracy clock | Fault tolerance | + | | synchronization | | + +----------------+--------------------------+---------------------+ + | Stage-6 | Distributed quantum | More qubits | + | | computing | | + +----------------+--------------------------+---------------------+ + + Table 1: Example Application Scenarios in Different Quantum + Internet Stages + + Some general and functional requirements on the Quantum Internet from + the networking perspective, based on the above application scenarios + and Quantum Internet technology roadmap [Wehner], are identified and + described in next sections. + +5.1. Operations on Entangled Qubits + + Methods for facilitating quantum applications to interact efficiently + with entangled qubits are necessary in order for them to trigger + distribution of designated entangled qubits to potentially any other + quantum node residing in the Quantum Internet. To accomplish this, + specific operations must be performed on entangled qubits (e.g., + entanglement swapping or entanglement distillation). Quantum nodes + may be quantum end nodes, quantum repeaters and/or routers, and/or + quantum computers. + +5.2. Entanglement Distribution + + Quantum repeaters and/or routers should support robust and efficient + entanglement distribution in order to extend and establish a high- + fidelity entanglement connection between two quantum nodes. For + achieving this, it is required to first generate an entangled pair on + each hop of the path between these two nodes and then perform + entanglement-swapping operations at each of the intermediate nodes. + +5.3. The Need for Classical Channels + + Quantum end nodes must send additional information on classical + channels to aid in transferring and understanding qubits across + quantum repeaters and/or receivers. Examples of such additional + information include qubit measurements in secure communication setup + (Section 4.1) and Bell measurements in distributed quantum computing + (Section 4.3). In addition, qubits are transferred individually and + do not have any associated packet header, which can help in + transferring the qubit. Any extra information to aid in routing, + identification, etc. of the qubit(s) must be sent via classical + channels. + +5.4. Quantum Internet Management + + Methods for managing and controlling the Quantum Internet including + quantum nodes and their quantum resources are necessary. The + resources of a quantum node may include quantum memory, quantum + channels, qubits, established quantum connections, etc. Such + management methods can be used to monitor the network status of the + Quantum Internet, diagnose and identify potential issues (e.g., + quantum connections), and configure quantum nodes with new actions + and/or policies (e.g., to perform a new entanglement-swapping + operation). A new management information model for the Quantum + Internet may need to be developed. + +6. Conclusion + + This document provides an overview of some expected application + categories for the Quantum Internet and then details selected + application scenarios. The applications are first grouped by their + usage, which is an easy-to-understand classification scheme. This + set of applications may, of course, expand over time as the Quantum + Internet matures. Finally, some general requirements for the Quantum + Internet are also provided. + + This document can also serve as an introductory text to readers + interested in learning about the practical uses of the Quantum + Internet. Finally, it is hoped that this document will help guide + further research and development of the Quantum Internet + functionality required to implement the application scenarios + described herein. + +7. IANA Considerations + + This document has no IANA actions. + +8. Security Considerations + + This document does not define an architecture nor a specific protocol + for the Quantum Internet. It focuses instead on detailing + application scenarios and requirements and describing typical Quantum + Internet applications. However, some salient observations can be + made regarding security of the Quantum Internet as follows. + + It has been identified in [NISTIR8240] that, once large-scale quantum + computing becomes reality, it will be able to break many of the + public key (i.e., asymmetric) cryptosystems currently in use. This + is because of the increase in computing ability with quantum + computers for certain classes of problems (e.g., prime factorization + and optimizations). This would negatively affect many of the + security mechanisms currently in use on the Classical Internet that + are based on public key (Diffie-Hellman (DH)) encryption. This has + given strong impetus for starting development of new cryptographic + systems that are secure against quantum computing attacks + [NISTIR8240]. + + Interestingly, development of the Quantum Internet will also mitigate + the threats posed by quantum computing attacks against DH-based + public key cryptosystems. Specifically, the secure communication + setup feature of the Quantum Internet, as described in Section 4.1, + will be strongly resistant to both classical and quantum computing + attacks against Diffie-Hellman based public key cryptosystems. + + A key additional threat consideration for the Quantum Internet is + addressed in [RFC7258], which warns of the dangers of pervasive + monitoring as a widespread attack on privacy. Pervasive monitoring + is defined as a widespread, and usually covert, surveillance through + intrusive gathering of application content or protocol metadata, such + as headers. This can be accomplished through active or passive + wiretaps, through traffic analysis, or by subverting the + cryptographic keys used to secure communications. + + The secure communication setup feature of the Quantum Internet, as + described in Section 4.1, will be strongly resistant to pervasive + monitoring based on directly attacking (Diffie-Hellman) encryption + keys. Also, Section 4.2 describes a method to perform remote quantum + computing while preserving the privacy of the source data. Finally, + the intrinsic property of qubits to decohere if they are observed, + albeit covertly, will theoretically allow detection of unwanted + monitoring in some future solutions. + + Modern networks are implemented with zero trust principles where + classical cryptography is used for confidentiality, integrity + protection, and authentication on many of the logical layers of the + network stack, often all the way from device to software in the cloud + [NISTSP800-207]. The cryptographic solutions in use today are based + on well-understood primitives, provably secure protocols, and state- + of-the-art implementations that are secure against a variety of side- + channel attacks. + + In contrast to conventional cryptography and Post-Quantum + Cryptography (PQC), the security of QKD is inherently tied to the + physical layer, which makes the threat surfaces of QKD and + conventional cryptography quite different. QKD implementations have + already been subjected to publicized attacks [Zhao2008], and the + National Security Agency (NSA) notes that the risk profile of + conventional cryptography is better understood [NSA]. The fact that + conventional cryptography and PQC are implemented at a higher layer + than the physical one means PQC can be used to securely send + protected information through untrusted relays. This is in stark + contrast with QKD, which relies on hop-by-hop security between + intermediate trusted nodes. The PQC approach is better aligned with + the modern technology environment, in which more applications are + moving toward end-to-end security and zero-trust principles. It is + also important to note that, while PQC can be deployed as a software + update, QKD requires new hardware. In addition, the IETF has a + working group on Post-Quantum Use In Protocols (PQUIP) that is + studying PQC transition issues. + + Regarding QKD implementation details, the NSA states that + communication needs and security requirements physically conflict in + QKD and that the engineering required to balance them has extremely + low tolerance for error. While conventional cryptography can be + implemented in hardware in some cases for performance or other + reasons, QKD is inherently tied to hardware. The NSA points out that + this makes QKD less flexible with regard to upgrades or security + patches. As QKD is fundamentally a point-to-point protocol, the NSA + also notes that QKD networks often require the use of trusted relays, + which increases the security risk from insider threats. + + The UK's National Cyber Security Centre cautions against reliance on + QKD, especially in critical national infrastructure sectors, and + suggests that PQC, as standardized by NIST, is a better solution + [NCSC]. Meanwhile, the National Cybersecurity Agency of France has + decided that QKD could be considered as a defense-in-depth measure + complementing conventional cryptography, as long as the cost incurred + does not adversely affect the mitigation of current threats to IT + systems [ANNSI]. + +9. Informative References + + [ANNSI] French Cybersecurity Agency (ANSSI), "Should Quantum Key + Distribution be Used for Secure Communications?", May + 2020, <https://www.ssi.gouv.fr/en/publication/should- + quantum-key-distribution-be-used-for-secure- + communications/>. + + [BB84] Bennett, C. H. and G. Brassard, "Quantum cryptography: + Public key distribution and coin tossing", + DOI 10.1016/j.tcs.2014.05.025, December 2014, + <https://doi.org/10.1016/j.tcs.2014.05.025>. + + [BBM92] Bennett, C. H., Brassard, G., and N. D. Mermin, "Quantum + cryptography without Bell's theorem", Physical Review + Letters, American Physical Society, + DOI 10.1103/PhysRevLett.68.557, February 1992, + <https://link.aps.org/doi/10.1103/PhysRevLett.68.557>. + + [Ben-Or] Ben-Or, M. and A. Hassidim, "Fast quantum byzantine + agreement", STOC '05, Association for Computing Machinery, + DOI 10.1145/1060590.1060662, May 2005, + <https://dl.acm.org/doi/10.1145/1060590.1060662>. + + [Broadbent] + Broadbent, A., Fitzsimons, J., and E. Kashefi, "Universal + Blind Quantum Computation", 50th Annual IEEE Symposium on + Foundations of Computer Science, IEEE, + DOI 10.1109/FOCS.2009.36, December 2009, + <https://arxiv.org/pdf/0807.4154.pdf>. + + [Cacciapuoti2019] + Cacciapuoti, A. S., Caleffi, M., Van Meter, R., and L. + Hanzo, "When Entanglement meets Classical Communications: + Quantum Teleportation for the Quantum Internet (Invited + Paper)", DOI 10.48550/arXiv.1907.06197, July 2019, + <https://arxiv.org/abs/1907.06197>. + + [Cacciapuoti2020] + Cacciapuoti, A. S., Caleffi, M., Tafuri, F., Cataliotti, + F. S., Gherardini, S., and G. Bianchi, "Quantum Internet: + Networking Challenges in Distributed Quantum Computing", + IEEE Network, DOI 10.1109/MNET.001.1900092, February 2020, + <https://ieeexplore.ieee.org/document/8910635>. + + [Caleffi] Caleffi, M., Cacciapuoti, A. S., and G. Bianchi, "Quantum + internet: from communication to distributed computing!", + NANOCOM '18, Association for Computing Machinery, + DOI 10.1145/3233188.3233224, September 2018, + <https://dl.acm.org/doi/10.1145/3233188.3233224>. + + [Cao] Cao, Y., Romero, J., and A. Aspuru-Guzik, "Potential of + quantum computing for drug discovery", IBM Journal of + Research and Development, DOI 10.1147/JRD.2018.2888987, + December 2018, <https://doi.org/10.1147/JRD.2018.2888987>. + + [Castelvecchi] + Castelvecchi, D., "The quantum internet has arrived (and + it hasn't)", Nature 554, 289-292, + DOI 10.1038/d41586-018-01835-3, February 2018, + <https://www.nature.com/articles/d41586-018-01835-3>. + + [Childs] Childs, A. M., "Secure assisted quantum computation", + DOI 10.26421/QIC5.6, July 2005, + <https://arxiv.org/pdf/quant-ph/0111046.pdf>. + + [Chitambar] + Chitambar, E., Leung, D., Mančinska, L., Ozols, M., and A. + Winter, "Everything You Always Wanted to Know About LOCC + (But Were Afraid to Ask)", Communications in Mathematical + Physics, Springer, DOI 10.1007/s00220-014-1953-9, March + 2014, <https://link.springer.com/article/10.1007/ + s00220-014-1953-9>. + + [Crepeau] Crépeau, C., Gottesman, D., and A. Smith, "Secure multi- + party quantum computation", STOC '02, Association for + Computing Machinery, DOI 10.1145/509907.510000, May 2002, + <https://doi.org/10.1145/509907.510000>. + + [Cuomo] Cuomo, D., Caleffi, M., and A. S. Cacciapuoti, "Towards a + distributed quantum computing ecosystem", IET Quantum + Communication, DOI 10.1049/iet-qtc.2020.0002, July 2020, + <http://dx.doi.org/10.1049/iet-qtc.2020.0002>. + + [Denchev] Denchev, V. S. and G. Pandurangan, "Distributed quantum + computing: a new frontier in distributed systems or + science fiction?", ACM SIGACT News, + DOI 10.1145/1412700.1412718, September 2008, + <https://doi.org/10.1145/1412700.1412718>. + + [E91] Ekert, A. K., "Quantum cryptography based on Bell's + theorem", Physical Review Letters, American Physical + Society, DOI 10.1103/PhysRevLett.67.661, August 1991, + <https://link.aps.org/doi/10.1103/PhysRevLett.67.661>. + + [Eisert] Eisert, J., Jacobs, K., Papadopoulos, P., and M. B. + Plenio, "Optimal local implementation of nonlocal quantum + gates", Physical Review A, American Physical Society, + DOI 10.1103/PhysRevA.62.052317, October 2000, + <https://doi.org/10.1103/PhysRevA.62.052317>. + + [Elkouss] Elkouss, D., Martinez-Mateo, J., and V. Martin, + "Information Reconciliation for Quantum Key Distribution", + DOI 10.48550/arXiv.1007.1616, April 2011, + <https://arxiv.org/pdf/1007.1616.pdf>. + + [ETSI-QKD-Interfaces] + ETSI, "Quantum Key Distribution (QKD); Components and + Internal Interfaces", V2.1.1, ETSI GR QKD 003, March 2018, + <https://www.etsi.org/deliver/etsi_gr/ + QKD/001_099/003/02.01.01_60/gr_QKD003v020101p.pdf>. + + [ETSI-QKD-UseCases] + ETSI, "Quantum Key Distribution; Use Cases", V1.1.1, ETSI + GS QKD 002, June 2010, + <https://www.etsi.org/deliver/etsi_gs/ + qkd/001_099/002/01.01.01_60/gs_qkd002v010101p.pdf>. + + [Fitzsimons] + Fitzsimons, J. F., "Private quantum computation: an + introduction to blind quantum computing and related + protocols", DOI 10.1038/s41534-017-0025-3, June 2017, + <https://www.nature.com/articles/s41534-017-0025-3.pdf>. + + [Gottesman1999] + Gottesman, D. and I. Chuang, "Demonstrating the viability + of universal quantum computation using teleportation and + single-qubit operations", Nature 402, 390-393, + DOI 10.1038/46503, November 1999, + <https://doi.org/10.1038/46503>. + + [Gottesman2012] + Gottesman, D., Jennewein, T., and S. Croke, "Longer- + Baseline Telescopes Using Quantum Repeaters", Physical + Review Letters, American Physical Society, + DOI 10.1103/PhysRevLett.109.070503, August 2012, + <https://link.aps.org/doi/10.1103/PhysRevLett.109.070503>. + + [Grosshans] + Grosshans, F. and P. Grangier, "Continuous Variable + Quantum Cryptography Using Coherent States", Physical + Review Letters, American Physical Society, + DOI 10.1103/PhysRevLett.88.057902, January 2002, + <https://doi.org/10.1103/PhysRevLett.88.057902>. + + [Grumbling] + Grumbling, E., Ed. and M. Horowitz, Ed., "Quantum + Computing: Progress and Prospects", National Academies of + Sciences, Engineering, and Medicine, The National + Academies Press, DOI 10.17226/25196, 2019, + <https://doi.org/10.17226/25196>. + + [Guo] Guo, X., Breum, C. R., Borregaard, J., Izumi, S., Larsen, + M. V., Gehring, T., Christandl, M., Neergaard-Nielsen, J. + S., and U. L. Andersen, "Distributed quantum sensing in a + continuous-variable entangled network", Nature Physics, + DOI 10.1038/s41567-019-0743-x, December 20219, + <https://www.nature.com/articles/s41567-019-0743-x>. + + [Huang] Huang, H-L., Zhao, Q., Ma, X., Liu, C., Su, Z-E., Wang, + X-L., Li, L., Liu, N-L., Sanders, B. C., Lu, C-Y., and + J-W. Pan, "Experimental Blind Quantum Computing for a + Classical Client", DOI 10.48550/arXiv.1707.00400, July + 2017, <https://arxiv.org/pdf/1707.00400.pdf>. + + [ITUT] ITU-T, "Draft new Technical Report ITU-T TR.QN-UC: 'Use + cases of quantum networks beyond QKDN'", ITU-T SG 13, + November 2022, + <https://www.itu.int/md/T22-SG13-221125-TD-WP3-0158/en>. + + [Jozsa2000] + Josza, R., Abrams, D. S., Dowling, J. P., and C. P. + Williams, "Quantum Clock Synchronization Based on Shared + Prior Entanglement", Physical Review Letters, American + Physical Society, DOI 10.1103/PhysRevLett.85.2010, August + 2000, + <https://link.aps.org/doi/10.1103/PhysRevLett.85.2010>. + + [Jozsa2005] + Josza, R., "An introduction to measurement based quantum + computation", DOI 10.48550/arXiv.quant-ph/0508124, + September 2005, + <https://arxiv.org/pdf/quant-ph/0508124.pdf>. + + [Kiktenko] Kiktenko, E. O., Malyshev, A. O., Gavreev, M. A., + Bozhedarov, A. A., Pozhar, N. O., Anufriev, M. N., and A. + K. Fedorov, "Lightweight authentication for quantum key + distribution", DOI 10.1109/TIT.2020.2989459, September + 2020, <https://arxiv.org/pdf/1903.10237.pdf>. + + [Komar] Kómár, P., Kessler, E. M., Bishof, M., Jiang, L., + Sørensen, A. S., Ye, J., and M. D. Lukin, "A quantum + network of clocks", DOI 10.1038/nphys3000, October 2013, + <https://arxiv.org/pdf/1310.6045.pdf>. + + [Lipinska] Lipinska, V., Murta, G., Ribeiro, J., and S. Wehner, + "Verifiable hybrid secret sharing with few qubits", + Physical Review A, American Physical Society, + DOI 10.1103/PhysRevA.101.032332, March 2020, + <https://doi.org/10.1103/PhysRevA.101.032332>. + + [Lo] Lo, H-K., Curty, M., and B. Qi, "Measurement-Device- + Independent Quantum Key Distribution", Physical Review + Letters, American Physical Society, + DOI 10.1103/PhysRevLett.108.130503, March 2012, + <https://doi.org/10.1103/PhysRevLett.108.130503>. + + [NCSC] National Cyber Security Centre (NCSC), "Quantum security + technologies", Whitepaper, March 2020, + <https://www.ncsc.gov.uk/whitepaper/quantum-security- + technologies>. + + [NISTIR8240] + Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., + Dang, Q., Liu, Y-K., Miller, C., Moody, D., Peralta, R., + Perlner, R., Robinson, A., and D. Smith-Tone, "Status + Report on the First Round of the NIST Post-Quantum + Cryptography Standardization Process", + DOI 10.6028/NIST.IR.8240, NISTIR 8240, January 2019, + <https://nvlpubs.nist.gov/nistpubs/ir/2019/ + NIST.IR.8240.pdf>. + + [NISTSP800-207] + Rose, S., Borchert, O., Mitchell, S., and S. Connelly, + "Zero Trust Architecture", NIST SP 800-207, + DOI 10.6028/NIST.SP.800-207, August 2020, + <https://doi.org/10.6028/NIST.SP.800-207>. + + [NSA] National Security Agency (NSA), "Post-Quantum + Cybersecurity Resources", + <https://www.nsa.gov/Cybersecurity/Post-Quantum- + Cybersecurity-Resources/>. + + [Pal] Pal, S. P., Singh, S. K., and S. Kumar, "Multi-partite + Quantum Entanglement versus Randomization: Fair and + Unbiased Leader Election in Networks", DOI + 10.48550/arXiv.quant-ph/0306195, June 2003, + <https://arxiv.org/pdf/quant-ph/0306195.pdf>. + + [Preskill] Preskill, J., "Quantum Computing in the NISQ era and + beyond", DOI 10.22331/q-2018-08-06-79, July 2018, + <https://arxiv.org/pdf/1801.00862>. + + [Proctor] Proctor, T. J., Knott, P. A., and J. A. Dunningham, + "Multiparameter Estimation in Networked Quantum Sensors", + Physical Review Letters, American Physical Society, + DOI 10.1103/PhysRevLett.120.080501, February 2018, + <https://journals.aps.org/prl/abstract/10.1103/ + PhysRevLett.120.080501>. + + [Qin] Qin, H., "Towards large-scale quantum key distribution + network and its applications", June 2019, + <https://www.itu.int/en/ITU-T/Workshops-and- + Seminars/2019060507/Documents/Hao_Qin_Presentation.pdf>. + + [QUANTUM-CONNECTION] + Van Meter, R. and T. Matsuo, "Connection Setup in a + Quantum Network", Work in Progress, Internet-Draft, draft- + van-meter-qirg-quantum-connection-setup-01, 11 September + 2019, <https://datatracker.ietf.org/doc/html/draft-van- + meter-qirg-quantum-connection-setup-01>. + + [Renner] Renner, R., "Security of Quantum Key Distribution", DOI + 10.48550/arXiv.quant-ph/0512258, September 2005, + <https://arxiv.org/pdf/quant-ph/0512258.pdf>. + + [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an + Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May + 2014, <https://www.rfc-editor.org/info/rfc7258>. + + [RFC9340] Kozlowski, W., Wehner, S., Van Meter, R., Rijsman, B., + Cacciapuoti, A. S., Caleffi, M., and S. Nagayama, + "Architectural Principles for a Quantum Internet", + RFC 9340, DOI 10.17487/RFC9340, March 2023, + <https://www.rfc-editor.org/info/rfc9340>. + + [Taherkhani] + Taherkhani, M. A., Navi, K., and R. Van Meter, "Resource- + aware System Architecture Model for Implementation of + Quantum aided Byzantine Agreement on Quantum Repeater + Networks", DOI 10.1088/2058-9565/aa9bb1, January 2017, + <https://arxiv.org/abs/1701.04588>. + + [Tang] Tang, B-Y., Liu, B., Zhai, Y-P., Wu, C-Q., and W-R. Yu, + "High-speed and Large-scale Privacy Amplification Scheme + for Quantum Key Distribution", Scientific Reports, + DOI 10.1038/s41598-019-50290-1, October 2019, + <https://doi.org/10.1038/s41598-019-50290-1>. + + [Treiber] Treiber, A., Poppe, A., Hentschel, M., Ferrini, D., + Lorünser, T., Querasser, E., Matyus, T., Hübel, H., and A. + Zeilinger, "A fully automated entanglement-based quantum + cryptography system for telecom fiber networks", New + Journal of Physics 11 045013, + DOI 10.1088/1367-2630/11/4/045013, April 2009, + <https://iopscience.iop.org/ + article/10.1088/1367-2630/11/4/045013>. + + [VanMeter2006-01] + Van Meter, R., Nemoto, K., Munro, W. J., and K. M. Itoh, + "Distributed Arithmetic on a Quantum Multicomputer", 33rd + International Symposium on Computer Architecture (ISCA + '06), DOI 10.1109/ISCA.2006.19, June 2006, + <https://doi.org/10.1109/ISCA.2006.19>. + + [VanMeter2006-02] + Van Meter, R. D., "Architecture of a Quantum Multicomputer + Optimized for Shor's Factoring Algorithm", DOI + 10.48550/arXiv.quant-ph/0607065, February 2008, + <https://arxiv.org/pdf/quant-ph/0607065.pdf>. + + [Wehner] Wehner, S., Elkouss, D., and R. Hanson, "Quantum internet: + A vision for the road ahead", Science 362, + DOI 10.1126/science.aam9288, October 2018, + <http://science.sciencemag.org/content/362/6412/ + eaam9288.full>. + + [Xu] Xu, F., Qi, B., and H-K. Lo, "Experimental demonstration + of phase-remapping attack in a practical quantum key + distribution system", New Journal of Physics 12 113026, + DOI 10.1088/1367-2630/12/11/113026, November 2010, + <https://iopscience.iop.org/ + article/10.1088/1367-2630/12/11/113026>. + + [Zhandry] Zhandry, M., "Quantum Lightning Never Strikes the Same + State Twice", Advances in Cryptology - EUROCRYPT 2019, + DOI 10.1007/978-3-030-17659-4_14, April 2019, + <http://doi.org/10.1007/978-3-030-17659-4_14>. + + [Zhang2009] + Zhang, X., Luo, W., Zeng, G., Weng, J., Yang, Y., Chen, + M., and X. Tan, "A hybrid universal blind quantum + computation", DOI 10.1016/j.ins.2019.05.057, September + 2019, + <https://www.sciencedirect.com/science/article/abs/pii/ + S002002551930458X>. + + [Zhang2018] + Zhang, Q., Xu, F., Chen, Y-A., Peng, C-Z., and J-W. Pan, + "Large scale quantum key distribution: challenges and + solutions [Invited]", Optics Express, + DOI 10.1364/OE.26.024260, August 2018, + <https://doi.org/10.1364/OE.26.024260>. + + [Zhao2008] Zhao, Y., Fred Fung, C-H., Qi, B., Chen, C., and H-K. Lo, + "Quantum hacking: Experimental demonstration of time-shift + attack against practical quantum-key-distribution + systems", Physical Review A, American Physical Society, + DOI 10.1103/PhysRevA.78.042333, October 2008, + <https://link.aps.org/doi/10.1103/PhysRevA.78.042333>. + + [Zhao2018] Zhao, Y., "Development of Quantum Key Distribution and + Attacks against It", Journal of Physics: Conference + Series, DOI 10.1088/1742-6596/1087/4/042028, 2018, + <https://iopscience.iop.org/ + article/10.1088/1742-6596/1087/4/042028>. + + [Zheng2019] + Zheng, X., Zhang, P., Ge, R., Lu, L., He, G., Chen, Q., + Qu, F., Zhang, L., Cai, X., Lu, Y., Zhu, S., Wu, P., and + X-S. Ma, "Heterogeneously integrated, superconducting + silicon-photonic platform for measurement-device- + independent quantum key distribution", + DOI 10.1117/1.AP.3.5.055002, December 2019, + <https://arxiv.org/abs/1912.09642>. + +Acknowledgments + + The authors want to thank Michele Amoretti, Mathias Van Den Bossche, + Xavier de Foy, Patrick Gelard, Álvaro Gómez Iñesta, Mallory Knodel, + Wojciech Kozlowski, John Preuß Mattsson, Rodney Van Meter, Colin + Perkins, Joey Salazar, Joseph Touch, Brian Trammell, and the rest of + the QIRG community as a whole for their very useful reviews and + comments on the document. + +Authors' Addresses + + Chonggang Wang + InterDigital Communications, LLC + 1001 E Hector St + Conshohocken, PA 19428 + United States of America + Email: Chonggang.Wang@InterDigital.com + + + Akbar Rahman + Ericsson + 349 Terry Fox Drive + Ottawa Ontario K2K 2V6 + Canada + Email: Akbar.Rahman@Ericsson.Com + + + Ruidong Li + Kanazawa University + Kakumamachi, Kanazawa, Ishikawa + 920-1192 + Japan + Email: lrd@se.kanazawa-u.ac.jp + + + Melchior Aelmans + Juniper Networks + Boeing Avenue 240 + 1119 PZ Schiphol-Rijk + Netherlands + Email: maelmans@juniper.net + + + Kaushik Chakraborty + The University of Edinburgh + 10 Crichton Street + Edinburgh, Scotland + EH8 9AB + United Kingdom + Email: kaushik.chakraborty9@gmail.com |