End nodes: quantum processors End nodes can both receive and emit information. Telecommunication lasers and
parametric down-conversion combined with photodetectors can be used for
quantum key distribution. In this case, the end nodes can in many cases be very simple devices consisting only of
beamsplitters and photodetectors. However, for many protocols more sophisticated end nodes are desirable. These systems provide advanced processing capabilities and can also be used as quantum repeaters. Their chief advantage is that they can store and retransmit quantum information without disrupting the underlying
quantum state. The quantum state being stored can either be the relative spin of an electron in a magnetic field or the energy state of an electron. has already been demonstrated in this system, as well as the ability to entangle two and three quantum processors, and perform deterministic
quantum teleportation. Another possible platform are quantum processors based on
ion traps, which utilize radio-frequency magnetic fields and lasers. Also, cavity quantum electrodynamics (Cavity QED) is one possible method of doing this. In Cavity QED, photonic quantum states can be transferred to and from atomic quantum states stored in single atoms contained in optical cavities. This allows for the transfer of quantum states between single atoms using
optical fiber in addition to the creation of remote
entanglement between distant atoms.
Communication lines: physical layer Over long distances, the primary method of operating quantum networks is to use optical networks and photon-based
qubits. This is due to optical networks having a reduced chance of
decoherence. Optical networks have the advantage of being able to re-use existing
optical fiber. Alternately, free space networks can be implemented that transmit quantum information through the atmosphere or through a vacuum.
Fiber optic networks Optical networks using existing
telecommunication fiber can be implemented using hardware similar to existing telecommunication equipment. This fiber can be either single-mode or multi-mode, with single-mode allowing for more precise communication.
Free space networks Free space quantum networks operate similar to fiber optic networks but rely on line of sight between the communicating parties instead of using a fiber optic connection. Free space networks can typically support higher transmission rates than fiber optic networks and do not have to account for
polarization scrambling caused by
optical fiber. However, over long distances, free space communication is subject to an increased chance of environmental disturbance on the
photons. has been demonstrated. The experimental exchange of single photons from a global navigation satellite system at a slant distance of 20,000 km has also been reported. These satellites can play an important role in linking smaller ground-based networks over larger distances. In free-space networks, atmospheric conditions such as turbulence, scattering, and absorption present challenges that affect the fidelity of transmitted quantum states. To mitigate these effects, researchers employ adaptive optics, advanced modulation schemes, and error correction techniques. The resilience of QKD protocols against eavesdropping plays a crucial role in ensuring the security of the transmitted data. Specifically, protocols like BB84 and decoy-state schemes have been adapted for free-space environments to improve robustness against potential security vulnerabilities.
Repeaters Long-distance communication is hindered by the effects of signal loss and
decoherence inherent to most transport mediums such as optical fiber. In classical communication, amplifiers can be used to boost the signal during transmission, but in a quantum network amplifiers cannot be used since
qubits cannot be copied – known as the
no-cloning theorem. That is, to implement an amplifier, the complete state of the flying qubit would need to be determined, something which is both unwanted and impossible.
Trusted repeaters An intermediary step which allows the testing of communication infrastructure are trusted repeaters. Importantly, a trusted repeater cannot be used to transmit
qubits over long distances. Instead, a trusted repeater can only be used to perform
quantum key distribution with the additional assumption that the repeater is trusted. Consider two end nodes A and B, and a trusted repeater R in the middle. A and R now perform
quantum key distribution to generate a key k_{AR}. Similarly, R and B run
quantum key distribution to generate a key k_{RB}. A and B can now obtain a key k_{AB} between themselves as follows: A sends k_{AB} to R encrypted with the key k_{AR}. R decrypts to obtain k_{AB}. R then re-encrypts k_{AB} using the key k_{RB} and sends it to B. B decrypts to obtain k_{AB}. A and B now share the key k_{AB}. The key is secure from an outside eavesdropper, but clearly the repeater R also knows k_{AB}. This means that any subsequent communication between A and B does not provide end to end security, but is only secure as long as A and B trust the repeater R.
Quantum repeaters A true quantum repeater allows the end to end generation of quantum entanglement, and thus by using
quantum teleportation the end to end transmission of
qubits. In
quantum key distribution protocols one can test for such entanglement. This means that when making encryption keys, the sender and receiver are secure even if they do not trust the quantum repeater. Any other application of a quantum internet also requires the end to end transmission of qubits, and thus a quantum repeater. Quantum repeaters allow entanglement and can be established at distant nodes without physically sending an entangled qubit the entire distance. to the task of acting as a repeater, without the capabilities of performing quantum gates.
Error correction Error correction can be used in quantum repeaters. Due to technological limitations, however, the applicability is limited to very short distances as quantum error correction schemes capable of protecting
qubits over long distances would require an extremely large amount of qubits and hence extremely large quantum computers. Errors in communication can be broadly classified into two types: Loss errors (due to
optical fiber/environment) and operation errors (such as
depolarization, dephasing etc.). While redundancy can be used to detect and correct classical errors, redundant qubits cannot be created due to the no-cloning theorem. As a result, other types of error correction must be introduced such as the
Shor code or one of a number of more general and efficient codes. All of these codes work by distributing the quantum information across multiple entangled qubits so that operation errors as well as loss errors can be corrected. == Applications ==