Skip to main content
Erschienen in: Quantum Information Processing 8/2020

Open Access 01.08.2020

Entanglement concentration service for the quantum Internet

verfasst von: Laszlo Gyongyosi, Sandor Imre

Erschienen in: Quantum Information Processing | Ausgabe 8/2020

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Here, we define the entanglement concentration service for the quantum Internet. The aim of the entanglement concentration service is to provide reliable, high-quality entanglement for a dedicated set of strongly connected quantum nodes in the quantum Internet. The objectives of the service are to simultaneously maximize the entanglement throughput of all entangled connections and to minimize the hop distance between the high-priority quantum nodes. We propose a method for the resolution of the entanglement concentration problem and provide a performance analysis.
Hinweise
Parts of this work were presented in conference proceedings [1].

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

1 Introduction

A fundamental aim of the quantum Internet [213] is to provide the standard network functions of the traditional Internet with an unconditional security for the users as quantum computers [1429] become available. A basic concept of the quantum Internet is the entangled quantum network structure established via quantum entanglement [2, 4, 5, 10, 3069]. The primary function of quantum Internet is to generate quantum entanglement [11, 42, 43, 7074] between a distant sender and receiver quantum node through several intermediate repeater quantum nodes [3, 7589]. The process of entanglement sharing consists of several steps of entanglement transmission and entanglement swapping (extension) between the quantum nodes [6, 7, 9, 90100]. The entanglement throughput of an entangled connection quantifies the number of transmittable entangled states per sec at a particular fidelity over that quantum connection [11, 43, 44]. Entangled connections can be characterized by a cost function, which is practically the inverse of the entanglement throughput of a given connection [11, 42, 43]. Therefore, it is important to find the shortest entangled path (a set of entangled connections) in an entangled quantum network with respect to the particular cost function [8, 80, 81, 101106]. A given quantum node of an entangled network could store several entangled systems in the local quantum memory, which can then be utilized for the entanglement distribution [1113, 4244, 7783]. In our current modeling environment, the entangled states of a given quantum node are referred to as entangled ports; therefore, the aim is to find the shortest path between the entangled ports of the entangled network. The entanglement switching operation is therefore analogous to the problem of assignment of an entanglement switcher port. The entanglement switcher port models a quantum switcher node that switches between entangled connections and also applies entanglement swapping on selected entangled connections. The field of VLSI (very-large-scale integration) design [107110], the automatic generation of integrated circuits (IC) and the tools of electronic design automation (EDA) [107110] also address similar problems; however, the subject and final goal of our quantum networking setting are different. There are some fundamental ideas that can open a path between the field of EDA and the open problems of entangled quantum networks. As we have found, this path does not only exist, but also allowed us to merge the tools of EDA and the most recent results of quantum Shannon theory [11, 41] to derive valuable results for the quantum Internet.
Here, we define the entanglement concentration service for the quantum Internet. The entanglement concentration service aims to provide entangled connections between a strongly connected subset of high-priority quantum nodes such that an entangled connection exists between each pair of nodes. The primary requirements of the service are as follows: (1) the entanglement throughput between all connected nodes is maximized, and (2) the hop distance (number of spanned quantum nodes, which depends on the entanglement level of the connection) between the quantum nodes is minimized. The importance of the primary requirements is as follows. The maximization of the entanglement throughput of the links aims to provide a seamless and efficient quantum communication for high-priority users. The minimization of the hop distance aims to reduce the noise added from the physical environment (link loss, losses in the nodes) and to reduce the delay connected to the procedures of quantum transmission and entanglement distribution. We approach the problem of entanglement concentration through the entangled states that are available in the quantum nodes, which are referred to as entangled ports.
To handle the several different constraints, such as the entanglement throughput of the entangled connections or the hop distance, we organize the entangled ports of the quantum nodes into a base graph. The base graph contains the maps of the entangled ports in a square base lattice, which allows us to find the shortest path in the entangled network in a multiconstrained network setting. The base graph is also extended into a multilayer structure with a different set of entangled ports in each level. In the multilayer structure, each layer is classified by the supported maximally available entanglement throughput of the given entangled connection. The shortest path in the multilayer structure of base graphs identifies the shortest entangled path between a source and target node at multiple parallel constraints on the entanglement throughput of the entangled connections of the path. Since the entanglement concentration formulates a multiconstraint, multiobjective problem, we propose an algorithmic framework for an efficient tool problem solution and optimization. We also prove the complexity of the proposed framework.
The novel contributions of our manuscript are as follows:
  • We conceive the entanglement concentration for the quantum Internet. The entanglement concentration service provides entangled connections for a subset of high-priority quantum nodes in the entangled quantum network.
  • We define a multiobjective optimization that covers the maximization of entanglement throughput between all entangled connections of the strongly connected subset of quantum nodes, and the minimization of the hop distance between the quantum nodes to maximize the reliability.
  • We prove the computational complexity of the service.
This paper is organized as follows. Section 2 summarizes the related works and preliminaries. Section 3 presents the problem statement and system model. Section 4 defines a method for optimal entanglement swapping. Section 5 provides a solution for the problem of entanglement concentration. Finally, Sect. 6 concludes with the results. Supplemental information is included in “Appendix”.
Quantum communication networks can be classified into two main classes [11, 42, 43]: unentangled and entangled quantum networks. In an unentangled quantum network, the connections between the quantum nodes are formulated via unentangled quantum states. In an entangled quantum network, the connections between the quantum nodes are formulated via entangled states. The entangled states are stored within the internal quantum memories of the quantum nodes, such that the entangled connections span several hops and are established over long distances. The characteristics and aims of the two types of quantum network models are fundamentally different. While the main purpose in an unentangled quantum network is to implement a standard (unentangled) QKD (quantum key distribution) protocol [11, 42, 43] between the nodes in a point-by-point manner to ensure the security of the quantum communication, the main task in an entangled quantum network is to distribute quantum entanglement over long distances. The services of unentangled and entangled quantum networks can be used as supplemental services for the tasks of traditional networks (to ensure stronger encryption and security services via QKD—such as IPSec with QKD [11] or TLS with QKD [11], to reduce the dependency on public key methods and on one-way functions, and to reduce the computational complexities of cryptographic methods, authentications, and privacy services). On the other hand, while unentangled quantum networks can provide only these supplemental services for traditional networks in short distances due to the point-by-point QKD-based quantum communication, the structure of entangled quantum networks allows us to construct a more complex network—called the quantum Internet. In a quantum Internet scenario, the core network is an entangled quantum network, and the main aim is to provide a general network structure for quantum computers (legal users) to establish reliable and secure long-distance quantum communications. A fundamental of the quantum Internet concept is therefore quantum entanglement and quantum repeaters. Quantum repeaters serve as intermediate transmitter quantum nodes between a sender quantum node (Alice) and a receiver quantum node (Bob) in the entanglement distribution process. By utilizing quantum entanglement, communication distances can be extended to long distances (unlimited, by theory) via the entanglement distribution process.
The entangled connections of entangled quantum networks span multiple nodes (i.e., these connections are multihop connections). An entangled connection is created via the entanglement distribution process, that is, via many physical links. A given physical link (i.e., optical fiber, wireless optical link) serves only temporarily in the distribution process because a physical link can create entanglement only over short distances. This is the reason the entanglement distribution process is realized in a step-by-step manner via many physical links and by many short-distance entangled states. The end of the entanglement distribution process is an end-to-end entangled state between the distant sender and receiver. The end-to-end entangled state spans over the intermediate nodes and physical links used in the distribution process between the sender and the receiver.
In an unentangled quantum network, the achievable communication distances are limited because of the requirement of (primarily) point-by-point QKD between the quantum nodes. In an entangled quantum network, the entanglement distribution procedure eliminates the requirement of point-by-point quantum communications and extends it to a multihop quantum communication.
Entangled quantum networks allow us to utilize all quantum protocols, such as QKD, and other quantum cryptographic primitives similar to untangled networks, but with the additional exploitation of the improved network structure, higher transmission reliability and transmission rates, and significantly longer achievable communication distances. As long-distance end-to-end entangled states are available, the entangled quantum network can be utilized as a quantum LAN (local area network), a quantum MAN (metropolitan area network), a quantum WAN (wide area network), or a global quantum Internet network.
The main uses of the quantum Internet include the field of distributed computations [70] (quantum secret sharing [11], blind quantum computation [11, 70], client–server quantum communications [11, 70], system-area networks [11, 70]), distributed cryptographic functions (Byzantine agreement [73], leader election [11, 70], QKD [11, 70]), and the field of sensor technology [11] (interferometry, clocks, reference frames).
Since an entangled network architecture represents a core of the quantum Internet, our network model is also based on the entangled quantum network model.

2.2 Preliminaries

A d-dimensional superposed quantum system \({\left| \psi \right\rangle } \) is a d-level system, \(| \psi \rangle ={{\alpha }_{1}}| {{B}_{1}}\rangle +\cdots +{{\alpha }_{d}}| {{B}_{d}} \rangle \), where the \(\alpha _{i} \)-s are complex numbers, \(\left| \alpha _{1} \right| ^{2} +\cdots +\left| \alpha _{d} \right| ^{2} =1\), while \({\left| B_{i} \right\rangle } \) is the ith basis state, \(i=1,\ldots ,d\) [11, 41, 42]. For a qubit system, the dimension is \(d=2\), and a superposed \({\left| \psi \right\rangle } \) can be written as \({\left| \psi \right\rangle } =\alpha _{1} {\left| 0 \right\rangle } +\alpha _{2} {\left| 1 \right\rangle } \), with \(\left| \alpha _{1} \right| ^{2} +\left| \alpha _{2} \right| ^{2} =1\). A two-qubit system formulates quantum state
$$\begin{aligned} {\left| \psi \right\rangle } =\alpha _{1} {\left| 00 \right\rangle } +\alpha _{2} {\left| 01 \right\rangle } +\alpha _{3} {\left| 10 \right\rangle } +\alpha _{4} {\left| 11 \right\rangle }, \end{aligned}$$
(1)
where \(\sum \left| \alpha _{i} \right| ^{2} =1\). A separable two-qubit system \({\left| \psi \right\rangle } _{s} \) can be decomposed into a tensor product form as \({\left| \psi \right\rangle } _{s} ={\left| \phi \right\rangle } \otimes {\left| \varphi \right\rangle } \), where \({\left| \phi \right\rangle } \) and \({\left| \varphi \right\rangle } \) are one-qubit systems, while \(\otimes \) is the tensor product. An example for a \({\left| \psi \right\rangle } _{s} \) system is obtained at \(\alpha _{1} =\alpha _{2} =\alpha _{3} =\alpha _{4} ={\textstyle \frac{1}{2}} \) in (1). On the other hand, if \(\alpha _{1} =\alpha _{4} ={\textstyle \frac{1}{\sqrt{2} }} \) and \(\alpha _{2} =\alpha _{3} =0\), the two-qubit system \({\left| \psi \right\rangle } \) in (1) cannot be decomposed, \({\left| \psi \right\rangle } \ne {\left| \phi \right\rangle } \otimes {\left| \varphi \right\rangle } \), and the qubits formulate an entangled system.
In an entangled system, operations performed on one half of the state affect the other, and the probabilities of the entangled qubits are not independent. The \(d=2\)-dimensional two-partite maximally entangled states are the Bell states [11, 41, 42] (or EPR states, named after Einstein, Podolsky and Rosen [11, 41, 42]). The Bell states are \({\left| \beta _{00} \right\rangle } ={\textstyle \frac{1}{\sqrt{2} }} \left( {\left| 00 \right\rangle } +{\left| 11 \right\rangle } \right) ,{\left| \beta _{01} \right\rangle } ={\textstyle \frac{1}{\sqrt{2} }} \left( {\left| 01 \right\rangle } +{\left| 10 \right\rangle } \right) ,{\left| \beta _{10} \right\rangle } ={\textstyle \frac{1}{\sqrt{2} }} \left( {\left| 00 \right\rangle } -{\left| 11 \right\rangle } \right) \) and \({\left| \beta _{11} \right\rangle } ={\textstyle \frac{1}{\sqrt{2} }} \left( {\left| 01 \right\rangle } -{\left| 10 \right\rangle } \right) \). In the entanglement distribution process, we assume the use of the \(| \beta _{00} \rangle \) state.
A quantum system \({\left| \psi \right\rangle } \) can also be represented via a density matrix \(\rho \). For an n-length, d-dimensional system, \(\rho \) is a \(d^{n} \times d^{n} \) size matrix, as \(\rho ={\left| \psi \right\rangle } {\left\langle \psi \right| } \), such that \(\mathrm{Tr}\left( \rho \right) =1\) for a general state, and for pure states \(\mathrm{Tr}\left( \rho ^{2} \right) =1\). The density of \({\left| \beta _{00} \right\rangle } \) is \(\rho ={\textstyle \frac{1}{2}} {\left| 00 \right\rangle } {\left\langle 00 \right| } +{\textstyle \frac{1}{2}} {\left| 00 \right\rangle } {\left\langle 11 \right| } +{\textstyle \frac{1}{2}} {\left| 11 \right\rangle } {\left\langle 00 \right| } +{\textstyle \frac{1}{2}} {\left| 11 \right\rangle } {\left\langle 11 \right| } \).
The fidelity [41, 42] for two pure quantum states \({\left| \psi \right\rangle } \) and \({\left| \varphi \right\rangle } \) is defined as \(F\left( {\left| \varphi \right\rangle } ,{\left| \psi \right\rangle } \right) =\left| {\left\langle \varphi \mathrel {\left| \right. } \psi \right\rangle } \right| ^{2}\). The fidelity for a pure quantum system \({\left| \psi \right\rangle } \) and a mixed quantum system \(\sigma =\sum _{i=0}^{n-1}p_{i} \rho _{i} =\sum _{i=0}^{n-1}p_{i} {\left| \psi _{i} \right\rangle } {\left\langle \psi _{i} \right| }\) is as \(F\left( {\left| \psi \right\rangle } ,\sigma \right) =\left\langle \psi | \left. \sigma \right| \psi \right\rangle =\sum _{i=0}^{n-1}p_{i} \left| {\left\langle \psi \mathrel {\left| \right. } \psi _{i} \right\rangle } \right| ^{2}\). Fidelity can also be defined for mixed states \(\sigma \) and \(\rho \), as \(F\left( \rho ,\sigma \right) =\sum _{i}p_{i} \left[ \text {Tr}\left( \sqrt{\sqrt{\sigma _{i} } \rho _{i} \sqrt{\sigma _{i} } } \right) \right] ^{2}\).

2.3 Operations in the quantum Internet

In a quantum Internet scenario, quantum repeaters aim to create high-fidelity entangled systems over long distances. For practical reasons, let us assume that we are operating on \(d=2\)-dimensional quantum systems. At a given target Bell state \({\left| \beta _{00} \right\rangle } \) subject to be created at the end of the entanglement distribution procedure, the entanglement fidelity at an actually created noisy quantum system \(\sigma \) is therefore evaluated as \(F\left( \sigma \right) =\langle {{\beta }_{00}} | \sigma |{{\beta }_{00}} \rangle \). In particular, F is a value between 0 and 1, with \(F=1\) for a perfect Bell state and \(F<1\) for an imperfect state.
The entangled system between two distant points A and B is distributed in a step-by-step manner through a set of intermediate quantum repeater nodes. In the first step, the neighboring quantum nodes create entanglement between each other. In the next step, particular quantum nodes apply a special operation called entanglement swapping [11, 42, 43] to double the number of spanned quantum nodes. The entanglement swapping operation splices two short-distance Bell states into a longer-distance Bell pair via operations applied in the quantum node and via classical side information (i.e., a similar mechanism to quantum teleportation [11, 42, 43]). This type of entanglement distribution mechanism is referred to as doubling architecture [11].
An important problem connected to the entanglement distribution is the handling of the noise on the entangled states. Considering the noisy physical links and other effects of the environment, the received quantum states are noisy. Particularly, the fidelity of the actually created entangled system \(\sigma \) is far from the target fidelity F. To handle the situation, the noisy states should be purified—this process is called entanglement purification [11, 42, 43]. The entanglement purification process takes two imperfect systems \(\sigma _{1} \) and \(\sigma _{2} \) with \(F_0<1\), and outputs a higher-fidelity system \(\rho \) such that \(F\left( \rho \right) >F_0\). The purification is a high-cost procedure since it requires a huge amount of resources (quantum systems, transmissions, and internal procedures in the nodes), causes delay in the transmission, and is probabilistic.
As follows, a network optimization is essential for a quantum Internet setting to reduce the purification steps. The problem is handled via our modeling scheme by determining optimal paths and via the application of entanglement switching nodes to switch between the entangled connections without the requirement of high-cost steps.

2.4 Network and service management in the quantum Internet

The quantum Internet requires the utilization of advanced network and service management. The main task in the physical layer of the quantum Internet is the reliable transmission of quantum states and the faithful internal storage of the received quantum systems in the quantum memories of the quantum nodes. The quantum transmission and quantum storage processes in the physical layer of the quantum Internet require a collaboration with network and service management services in a higher, logical layer. The logical layer utilizes classical side information available from the quantum network through traditional communication channels to provide feedback and adaption mechanism for the physical layer of the quantum network. The logical layer contains controlling and post-processing tasks, such as error correction, dynamic monitoring of the quantum links and quantum memories, controlling of the internal storage and error correction mechanisms of the quantum nodes, network optimization, and advanced service management processes.
The field of the quantum Internet dynamically improves and also challenges with several open questions. Since the structure and the processes of the quantum Internet are fundamentally different from the mechanisms of the traditional Internet, it requires the development of novel and advanced services. The main challenge regarding these services is to provide an optimal solution for the transmission of entangled systems, for the optimization of the network architecture, and for the development of the networking services connected to the entanglement distribution. The networking procedures of the quantum Internet should consider the fundamentals of quantum mechanics (such as superposition, quantum entanglement, and no-cloning theorem) that require a significantly different network and service management compared with the networking services of the traditional Internet.
This work defines a novel service for the quantum Internet. The service considers the physical attributes of quantum transmission and the procedures of entanglement distribution. The proposed service utilizes the fundamental architectural attributes of the quantum Internet, establishes advanced service management for the processes of entanglement distribution, and develops a network optimization by controlling the physical layer.

2.5 Experimental implementation

The entanglement concentration service can be implemented via the standard optical and physical devices of quantum networking. In practical applications, the preparation of long-distance entangled connections requires the utilization of high-fidelity quantum channels in the physical layer. On the aspects of entanglement transmission and repeater-assisted quantum communications in a practical quantum Internet, we suggest [3, 4]. On the bounds for multiend communication over experimental quantum networks, see [4]. For further reading on the feasibility of the quantum networks from experimental aspects, we suggest [69]. On the problem of entanglement routing in the quantum Internet, see [4648, 96, 97, 101, 103]. For the different aspects of entanglement distribution problem in a quantum Internet setting, see [8588, 111]. On the utilization of quantum channels in heterogeneous experimental networking environments, we suggest [11, 41].
The problem of entanglement localization in practical quantum networking scenarios is studied in [51]. In [52], a quantum network stack and protocols are defined for reliable entanglement-based experimental networks. On the problem of practical entanglement distillation, see [55]. The method of deterministic delivery of entanglement in an experimental quantum network is discussed in [56]. Satellite-to-ground quantum communications and quantum teleportation in experimental quantum networking scenarios are studied in [57, 58, 61]. The description of modular entanglement of atomic qubits using photons and phonons and its experimental quantum networking aspects can be found in [60]. For a review on quantum repeaters units based on atomic ensembles and linear optics, see [62]. On some aspects of network coding in experimental quantum networking, we suggest [6466]
On current research topics and directions in the experimental quantum Internet, we suggest the descriptions of the Quantum Internet Research Group (QIRG) [112].

3 Problem statement and system model

3.1 Problem statement

The entanglement concentration problem is defined via Problems 1 and 2.
Problem 1
Determine a set of entangled connections for a set of high-priority unconnected quantum nodes such that the hop distance for all entangled connections is minimal and the entanglement throughput for all entangled connections is maximal.
Problem 2
(Strong connectivity property) Assure that all sets of high-priority quantum nodes selected for the entanglement concentration service are interconnected.

3.2 System model

3.2.1 Basic terms

The quantum Internet scenario is modeled through the concept of entangled overlay quantum network. The entangled overlay quantum network represents a logical layer over the physical-layer quantum repeater network. The overlay quantum network \(N=\left( V,E \right) \) is defined via a set V of quantum nodes, and via a set E of entangled connections (edges). Set V consists the \(U_{i}^{A}\in V\) source and \(U_{i}^{B}\in V\) receiver nodes of \({{U}_{i}}\) legal users, \(i=1,\ldots ,K\), where K is the number of transmit and receiver users, and quantum repeater nodes \(R_i\in V\), \(i=1, \ldots ,q\), with \(E=\left\{ E_j\right\} \), \(j=1, \ldots ,m\) edges between the nodes of V. Each \(E_j\) identifies an l-level entanglement,1\(l=1, \ldots ,r\), between quantum nodes \(x_j\) and \(y_j\) of edge \(E_j\), respectively.
In the quantum Internet, an \(N=\left( V,E\right) \) entangled overlay quantum network integrates single-hop and multihop entangled nodes. The single-hop entangled nodes are directly connected through an \(l=1\) level entanglement, while the multihop entangled nodes are connected through \(l>1\) level entanglement.
An entangled overlay quantum network N in a quantum Internet setting is depicted in Fig. 1. The network model consists of a set of legal users and intermediate quantum repeaters in V, with a set E of different level l of entangled connections. The model assumes a doubling architecture in the physical layer.
Let us assume that there are m source nodes in the entangled quantum network and n receiver nodes. Let \(E_{{l} } \left( A_{i} ,B_{j} \right) \), \(i=0,\ldots ,m-1\), \(j=0,\ldots ,n-1\), be an l -level entangled connection between source node \(A_{i} \) and receiver node \(B_{j} \), and let \(B_{F} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) \) refer to the entanglement throughput of a given l -level entangled connection \(E_{{l} } \left( A_{i} ,B_{j} \right) \) between nodes \(\left( A_{i} ,B_{j} \right) \) as measured in the number of d-dimensional entangled states per sec at a particular fidelity F [4143].
Without loss of generality, for an l -level entangled connection \(E_{{l} } \left( A_{i} ,B_{j} \right) \), the hop distance \(d\left( A_{i} ,B_{j} \right) _{{l} } \) refers to the number of spanned nodes. In a doubling architecture [11, 4244], the number of spanned nodes is doubled on each entanglement level l, and \(d\left( A_{i} ,B_{j} \right) _{{l} } \) is expressed as \(d\left( A_{i} ,B_{j} \right) _{{l} } =2^{l-1} \).
To distinguish between the source and target nodes for a particular connection \(E_{{l} } \left( A_{i} ,B_{j} \right) \), let \(B_{F} \left( A_{i} \right) \), \(B_{F} \left( A_{i} \right) \ge 0\) refer to the number of generated entangled states per sec of a particular fidelity in node \(A_{i} \), and let \(B_{F} \left( B_{j} \right) \) be the number of received entangled states per sec of a particular fidelity in node \(B_{j} \), where \(B_{F} \left( B_{j} \right) \le 0\). Therefore, in function of \(B_{F} \left( A_{i} \right) \) and \(B_{F} \left( B_{j} \right) \), an upper bound \({\tilde{B}}_{F} \) on \(B_{F} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) \) can be defined for the entangled connection \(E_{{l} } \left( A_{i} ,B_{j} \right) \) as
$$\begin{aligned} {\tilde{B}}_{F} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) =\min \left( \max (B_{F}(A_{i})), \max (|B_{F}(B_{j})|)\right) , \end{aligned}$$
(2)
which corresponds to the maximum entanglement throughput that can be assigned to the entangled connection \(E_{{l} } \left( A_{i} ,B_{j} \right) \).
Therefore, at m source and n receivers, the problem of entanglement concentration formulates a minimization via objective function \(\Phi \) as
$$\begin{aligned} \Phi =\min \sum _{i=1}^{m}\sum _{j=1}^{n}d\left( A_{i} ,B_{j} \right) _{{l} } (\max (B_{F}(A_{i})), \max (|B_{F}(B_{j})|)). \end{aligned}$$
(3)
Assuming an entangled connection \(E_{{l} } \left( A_{i} ,B_{j} \right) \) with an actual entanglement throughput \(B_{F} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) \le {\tilde{B}}_{F} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) \) between \(A_{i} \) and \(B_{j} \), the quantity \(\Delta {B_{F}^{*}}\left( {{E}_{l}}\left( {{A}_{i}},{{B}_{j}} \right) \right) \) of maximal residual entanglement throughput for the direction from \(A_{i} \) to \(B_{j} \) is defined as
$$\begin{aligned} \Delta {B_{F}^{*}} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) ={\tilde{B}}_{F} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) -B_{F} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) . \end{aligned}$$
(4)
The result in (4) indicates that for a given entangled connection \(E_{l} \left( A_{i} ,B_{j} \right) \) with a current entanglement throughput \(B_{F} \left( E_{l} \left( A_{i} ,B_{j} \right) \right) \), it is not possible to inject more entanglement throughput than \(\Delta {B_{F}^{*}} \left( E_{l} \left( A_{i} ,B_{j} \right) \right) \). Let \(\Delta d\left( A_{i} ,B_{j} \right) _{{l} } \) refer to the residual hop distance function, as
$$\begin{aligned} \Delta d\left( A_{i} ,B_{j} \right) _{{l} } =d\left( A_{i} ,B_{j} \right) _{{l} } , \end{aligned}$$
(5)
and let \(B_{F} \left( E_{{l} } \left( B_{j} ,A_{i} \right) \right) \) refer to the entanglement throughput from \(B_{j} \) to \(A_{i} \), with maximal residual entanglement throughput \(\Delta {B_{F}^{*}} \left( E_{{l} } \left( B_{j} ,A_{i} \right) \right) \) as
$$\begin{aligned} \Delta {B_{F}^{*}} \left( E_{{l} } \left( B_{j} ,A_{i} \right) \right) =-B_{F} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) , \end{aligned}$$
(6)
and negative residual hop distance function as
$$\begin{aligned} \Delta d\left( B_{j} ,A_{i} \right) _{{l} } =-d\left( A_{i} ,B_{j} \right) _{{l} } . \end{aligned}$$
(7)
For a particular entangled connection \(E_{l} \left( A_{i} ,B_{j} \right) \), we define a forward residual edge, \(e_{l} \left( A_{i} ,B_{j} \right) \), and a backward residual edge, \(e_{l} \left( A_{j} ,B_{i} \right) \). The forward and backward residual edges are used for the increment and decrement of an actual entanglement throughput \(B_{F} \left( E_{l} \left( A_{i} ,B_{j} \right) \right) \) over a particular entangled connection \(E_{l} \left( A_{i} ,B_{j} \right) \). An \(e_{l} \left( A_{i} ,B_{j} \right) \) forward direction residual edge is associated with a particular \(\Delta B_{F} \left( E_{l} \left( A_{i} ,B_{j} \right) \right) \le {B_{F}^{*}}\left( E_{l} \left( A_{i} ,B_{j} \right) \right) \), and it is maximized as given in (4).
An \(e_{l} \left( A_{j} ,B_{i} \right) \) backward direction residual edge is associated with the quantity \(\Delta B_{F} \left( E_{l} \left( A_{j} ,B_{i} \right) \right) \ge \Delta {B_{F}^{*}} \left( E_{l} \left( A_{j} ,B_{i} \right) \right) \) that describes the amount of entanglement throughput that can be removed from the entangled connection \(E_{l} \left( A_{i} ,B_{j} \right) \), and it is maximized as given in (6). As follows at most \(\Delta B_{F} \left( E_{l} \left( A_{j} ,B_{i} \right) \right) \) entanglement throughput can be removed from the entangled connection \(E_{l} \left( A_{i} ,B_{j} \right) \).
Then, for a particular \(A_{i} \) and \(B_{j} \) with entangled connection \(E_{l} \left( A_{i} ,B_{j} \right) \), the maximum allowed entanglement throughput that can be injected is \(\eta \left( E_{l} \left( A_{i} ,B_{j} \right) \right) \), defined via (4) and (6) as
$$\begin{aligned} \eta \left( E_{l} \left( A_{i} ,B_{j} \right) \right) = \min ({\Delta B_{F} \left( E_{l} \left( A_{i}, B_{j} \right) \right) , \left| \Delta B_{F} \left( E_{l} \left( A_{j}, B_{i} \right) \right) \right| )}. \end{aligned}$$
(8)
Note that if negative cycles occur in the graph, some basic algorithmic solutions (e.g., Bellman–Ford algorithm [107]) can be straightforwardly applied to remove it.
Practically, an \(E_{l} \left( x,y\right) \) entangled connection is implemented via an optical fiber \({{{\mathcal {N}}}}\) (or a wireless optical link, etc.) in the physical layer. The \(E_{l} \left( x,y\right) \) link is associated with a particular link loss \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \) measured in dB, and with a transmittance coefficient \(T\left( E_{l} \left( x,y\right) \right) \in \left[ 0,1\right] \) that characterizes the ratio of successfully transmitted photons. The link loss and transmittance values determine the achievable \({\tilde{B}}_{F} \) at a particular F over \(E_{l} \left( x,y\right) \).

3.2.2 Evolutionary model

The motivation behind the utilization of an evolutionary model in the entanglement concentration problem is as follows. The modeled networking scenario assumes a quantum Internet environment with dynamically changing link and node attributes. The characteristic of the entangled links depends not just on the attributes of the physical link (entanglement throughput, link loss, link transmittance) used for the transmission of the entangled states, but also on the internal attributes of the quantum nodes (quantum memory status, error corrections, entanglement purification, etc.). These conditions overall result in a highly diverse networking environment. As a corollary, the path-finding algorithms and other related procedures should consider the diverse and dynamic conditions and should be able to adapt and modify their working mechanism according to a current situation. Another constraint is that the possible solutions should be explored simultaneously in the search space, with a parallel optimization in the overlay network. These conditions require the elimination of the need of deterministic procedures, and the solutions should be determined in an evolutionary manner. The utilization of the evolutionary model therefore eliminates the requirement of high-cost reiterations, redesigning, and rerouting steps and results overall in an optimal approach for the problems of entanglement concentration service in a quantum Internet scenario.

3.2.3 Base graph

The quantum nodes are approached through their available entangled states, which are referred to as entangled ports. We define the multiport multinode (MP/MN) [107110] base graph and the multilayer MP/MN structure for the selection of entangled connections in the entanglement concentration service. The algorithm for the selection of the optimal entangled state \(B_{j}^{c*} \) (referred to as optimal entangled port) in a target node \(B_{j} \), where
$$\begin{aligned} B_{j} =\left\{ B_{j}^{c_{1} } ,\ldots ,B_{j}^{c_{k} } \right\} , \end{aligned}$$
(9)
where \(B_{j}^{c_{i} } \) is the ith entangled port available in target node \(B_{j} \) while c identifies an actual cycle in the base graph; requires the determination of an optimal multilayer path \({{{\mathcal {P}}}}^{*} \) and the definition of a particular cost function. The problem of constructing a multiport multimode base graph is therefore analogous to the problem of MP/MN signal nets [107110].
Assuming a set of k entangled ports \(P_{j} =\left\{ P_{j}^{c_{1} } ,\ldots ,P_{j}^{c_{k} } \right\} \) for a given quantum node j, each set corresponds to a different quantum node. For an overlay quantum network \(N=\left( V,{{{\mathcal {S}}}}\right) \) with \(\left| V\right| \) nodes, we defined a d-dimensional square lattice multiport multinode base graph \(G^{d} \) (\(d=2\)) that contains the sets \(P_{j} \), \(j=1,\ldots ,\left| V\right| \).
Figure 2 depicts a \(G^{2} \) two-dimensional square lattice base graph of entangled overlay quantum network N. The \(d\left( P_{i}^{c_{k} } ,P_{j}^{c_{h} } \right) _{{l} } \) hop distance between l -level entangled ports \(P_{i}^{c_{k} } \) and \(P_{j}^{c_{h} } \) is identified by \(\mathrm{l1}\) distance function in \(G^{2} \) (intermediate entangled ports are depicted by empty dots).

3.2.4 Strong connectivity

The aim of the topology construction method is to ensure strong connectivity between the entangled ports of the quantum nodes.
Procedure \({{{\mathcal {M}}}}_{S} \) of connection topology construction outputs a minimum spanning tree to ensure strong connectivity between the entangled ports of the subset \(\Gamma \) of selected nodes. The steps of \({{{\mathcal {M}}}}_{S} \) are given in Procedure 1.
Note that in Step 5 of Procedure 1, the basic Kruskal algorithm [113] can be applied straightforwardly to compute the minimum spanning tree. The minimum spanning tree ensures strong connectivity and minimizes the number of required entangled connections. The resulting connection topologies can then be used as inputs for a shortest path-finding algorithm.

3.2.5 Multilayer structure

Each layer of the \(G_\mathrm{ep} \) multilayer grid consists of a d-dimensional square lattice \(G^{d} \) base graph that contains the maps of the quantum ports of the entangled overlay quantum network N. Assume that the network consists of n entangled ports. Depending on the maximal entanglement throughput available at the ports, the entangled ports of the graph are organized into a \(G_\mathrm{ep} \) multilayer grid structure.
In \(G_\mathrm{ep} \), a given Li, \(i=0,\ldots ,q\) layer is a \(d=2\)-dimensional square lattice base graph \(G^{d=2} \). The availability of the entangled ports in Li depends on the supported entanglement throughput of the ports. As the layer index i increases, the available entanglement throughput supported by the entangled ports of the layer also increases. Let \({\tilde{B}}_{F}^{\left( Li\right) } \) be the maximal supported entanglement throughput of layer Li. Then, the corresponding relation for the maximal entanglement throughput of the layers is
$$\begin{aligned} {\tilde{B}}_{F}^{\left( L0\right) }<{\tilde{B}}_{F}^{\left( L1\right) } \cdots <{\tilde{B}}_{F}^{\left( L\mathrm{q}\right) } . \end{aligned}$$
(10)
The steps for finding a shortest path in the multilayer base graph are summarized in Procedure 2.
Note in Step 2, an \(A^{*} \) search2 [107] can be applied to expand all possible routes in parallel.
Figure 3 depicts the multilayer structure. The entangled ports of the quantum network are organized into a four-layer structure with layers \(L0-L3\). Each layer is a square lattice base graph with the map of the entangled ports of the entangled overlay quantum network. The entangled ports are extended to all layers and depicted by dots. A blue dot refers to the availability of a given entangled port in a given layer and a gray dot means that a current port is unavailable in the current layer. The white dots refer to intermediate ports that are not the ports of the target node. The source node is represented by \(A_{i} \), and the target node is represented by \(B_{j} \).
In Fig. 3a, target node \(B_{j} \) has four entangled ports: \(B_{j} =\left\{ B_{j}^{c_{1} } ,B_{j}^{c_{2} } ,B_{j}^{c_{3} } ,B_{j}^{c_{4} } \right\} \). All ports are depicted in all layers and colored according to their actual availability. The source node targets the four L2-layer entangled ports (dashed line and green area), since these support the actual entanglement throughput requirements of the source node (target level is L2). In the current target level, only two entangled ports are available in \(B_{j} \).
Figure 3b shows the determination of the shortest path in the multilayer structure between \(A_{i} \) and an available port \(B_{j}^{c*} \) of \(B_{j} \). The vertical line between the layers has a virtual cost \(\kappa \).

4 Network optimization

The constrained assignment for entanglement swapping covers the problem of optimal assignment of an entanglement switcher port (an entangled port for entanglement switching and swapping), which is constrained by the supported maximal entanglement throughput of the ports. The aim of the optimal constrained assignment of the entangled port is to minimize the path cost between a source quantum node A and target quantum nodes \(B_{j} \), \(j=1,\ldots ,t\). The assignment procedure is established in the multilayer grid structure of base graphs.

4.1 Optimization method

Minimization yields a minimal cost path for which the overall cost is minimal. If two or more paths have the same cost, the path is selected for which the overlapped length cost \(\zeta _{A\rightarrow S} \) between a source node A and an entanglement switcher port S is maximal. The switcher port is selected from a set of entangled ports of a quantum node, which is referred to as the quantum switcher node.
The method for assigning a quantum switcher port in a \(G_\mathrm{ep} \) multilayer grid structure is summarized in Procedure 3.
Note that in Step 2, an \(A^{*} \) search [107] can straightforwardly be applied.
Let \(\kappa \) be a cost function defined between the layers in the multilayer structure. Figure 4 depicts the procedure for assigning an entanglement switcher port S in the multilayer structure. The assignment problem is depicted in Fig. 4a, b. When the cost \(\kappa \) associated with the vertical lines (depicted by blue) between the layers is \(\kappa <1\), the optimal assignment of the switcher port is as depicted in Fig. 4c. If \(\kappa \ge 1\), the optimal solution is as depicted in Fig. 4d, since the overlapped length is \(\zeta _{A\rightarrow S} =9\). In Fig. 4e, the overlapped length is \(\zeta _{A\rightarrow S} =7\) for a same path length \(c_{A\rightarrow B} =c_{A\rightarrow B_{1} } +c_{A\rightarrow B_{2} } =15\) between source node A and target ports \(B_{1} \) and \(B_{2} \).

4.2 Entanglement throughput symmetry axis

The aim of the extraction of the entanglement throughput symmetry axis is to inject symmetry attributes to the connection of entangled ports and to the selection of entanglement switcher ports.
The entanglement throughput symmetry axis is extracted as follows. Let \(\left( I,J\right) \) be an entangled port pair, where I is a source entangled port and J is a target entangled port with same maximal entangled throughputs \({{{\tilde{B}}}_{F}}\left( I \right) =\max \left( {{B}_{F}}\left( I \right) \right) \) and \({{{\tilde{B}}}_{F}}\left( J \right) =\max \left( \left| {{B}_{F}}\left( J \right) \right| \right) \). These entangled ports formulate a symmetry pair (SP) [107] as
$$\begin{aligned} {\mathrm{SP}}({\tilde{B}}_{F} (I),{\tilde{B}}_{F} (J)). \end{aligned}$$
(11)
For SP pair \(\mathrm{SP}({\tilde{B}}_{F} (I),{\tilde{B}}_{F} (J))\), the \(\Delta {\tilde{B}}_{F} (\mathrm{SP}({\tilde{B}}_{F} (I),{\tilde{B}}_{F} (J)))\) difference of entanglement throughput of the ports is negligible, thus
$$\begin{aligned} \Delta {\tilde{B}}_{F} (\mathrm{SP}({\tilde{B}}_{F} (I),{\tilde{B}}_{F} (J)))=\left| {\tilde{B}}_{F} \left( I\right) -{\tilde{B}}_{F} \left( J\right) \right| \rightarrow 0. \end{aligned}$$
(12)
Ordering the SP pairs of entangled ports in descending order with respect to their maximally supported entanglement throughput level defines a symmetry axis. We refer to this axis as the entanglement throughput symmetry axis. This vertical axis separates the entangled ports of the sender and receiver. Since an entanglement switcher port S is placed on this axis, the switcher port is referred to as self-symmetric (SS) [107] and denoted by \(\mathrm{SS}\left( S\right) \).
Ordering the SP pairs at distance \(l_{S,j} \) with respect to their entanglement throughput between the switcher port and an entangled port j of a given SP pair allows us to rewrite the minimization problem of (3) as
$$\begin{aligned} \Phi \left( S,\mathrm{SP}m\right) =\min \sum _{j=1}^{m}l_{S,\mathrm{SP}j} \left( {\tilde{B}}_{F} \left( \mathrm{SP}j\right) \right) , \end{aligned}$$
(13)
where m is the total number of SP pairs and \({\tilde{B}}_{F} \left( \mathrm{SP}j\right) \) quantifies the maximal entanglement throughput of the jth SP pair \(\mathrm{SP}j\), where \(l_{S,\mathrm{SP}j} \) is the distance function in the grid structure evaluated as
$$\begin{aligned} l_{S,\mathrm{SP}j} =\left| x_{S} -x_{\mathrm{SP}j} \right| +\left| y_{S} -y_{\mathrm{SP}j} \right| +\left| z_{S} -z_{\mathrm{SP}j} \right| \kappa , \end{aligned}$$
(14)
where \(\kappa \) is the cost associated to the vertical lines and \(\left\{ x_{\mathrm{SP}j} ,y_{\mathrm{SP}j} ,z_{\mathrm{SP}j} \right\} \) identifies a given port from the jth SP pair in the multilayer grid \(G_\mathrm{ep} \).
Figure 5 illustrates the entanglement symmetry axis. The SP pairs are ordered with respect to their entanglement throughput \(B_{F} \). To manage the connection rules between the switcher port S and the entangled ports, we define heuristics \({{{\mathcal {H}}}}1,{{{\mathcal {H}}}}2\) and \({{{\mathcal {H}}}}3\).
The first rule, \({{{\mathcal {H}}}}1\), assumes no switcher port and allows entangled connections only between SP ports from two different side of the symmetry axis; thus, a connection is not allowed between two sender or two receiver ports.
$$\begin{aligned} \begin{aligned}&{\mathcal {H}}1:\\&\lnot \text {SS}\left\{ S \right\} \wedge \\&\lnot \left( \text {C}\left\{ I,P \right\} \wedge \text {C}\left\{ J,Q \right\} \right) \wedge \lnot \left( \text {C}\left\{ I,E \right\} \wedge \text {C}\left\{ J,F \right\} \right) \wedge \\&\left( \text {C}\left\{ E,P \right\} \wedge \text {C}\left\{ Q,F \right\} \right) \wedge \\&\text {SP}\left( {{{{\tilde{B}}}}_{F}}\left( I \right) ,{{{{\tilde{B}}}}_{F}}\left( J \right) \right) \wedge \\&\text {SP}\left( {{{{\tilde{B}}}}_{F}}\left( P \right) ,{{{{\tilde{B}}}}_{F}}\left( Q \right) \right) \wedge \text {SP}\left( {{{{\tilde{B}}}}_{F}}\left( E \right) ,{{{{\tilde{B}}}}_{F}}\left( F \right) \right) . \end{aligned} \end{aligned}$$
(15)
The second rule, \({{{\mathcal {H}}}}2\), assumes no switcher port and allows no connection between entangled ports with different entanglement throughput capabilities.
$$\begin{aligned} \begin{aligned}&{\mathcal {H}}2:\\&\lnot \text {SS}\left\{ S \right\} \wedge \\&\lnot \left( \text {C}\left\{ J,P \right\} \wedge \text {C}\left\{ I,Q \right\} \wedge \text {C}\left\{ J,E \right\} \wedge \text {C}\left\{ I,F \right\} \right) \wedge \\&\left( \text {C}\left\{ I,J \right\} \wedge \text {C}\left\{ P,Q \right\} \right) \wedge \text {C}\left\{ E,F \right\} \wedge \text {C}\left\{ E,Q \right\} \wedge \text {C}\left\{ P,F \right\} \wedge \\&\text {SP}\left( {{{{\tilde{B}}}}_{F}}\left( I \right) ,{{{{\tilde{B}}}}_{F}}\left( J \right) \right) \wedge \\&\text {SP}\left( {{{{\tilde{B}}}}_{F}}\left( P \right) ,{{{{\tilde{B}}}}_{F}}\left( Q \right) \right) \wedge \text {SP}\left( {{{{\tilde{B}}}}_{F}}\left( E \right) ,{{{{\tilde{B}}}}_{F}}\left( F \right) \right) . \end{aligned} \end{aligned}$$
(16)
The third rule, \({{{\mathcal {H}}}}3\), assumes a switcher port. It defines the valid connections between a switcher port S and the entangled ports of the SP pairs separated by the entanglement throughput axis. Valid connections are allowed only between the SP symmetry pairs, which assures that the source and target ports support the same level of entanglement throughput to optimize performance.
$$\begin{aligned} \begin{aligned}&{\mathcal {H}}3:\\&\text {SS}\left\{ S \right\} \wedge \\&\left( \text {C}\left\{ I,S \right\} \wedge \text {C}\left\{ J,S \right\} \right) \wedge \\&\left( \text {C}\left\{ P,S \right\} \wedge \text {C}\left\{ Q,S \right\} \right) \wedge \left( \text {C}\left\{ E,S \right\} \wedge \text {C}\left\{ F,S \right\} \right) \wedge \\&\text {SP}\left( {{{{\tilde{B}}}}_{F}}\left( I \right) ,{{{{\tilde{B}}}}_{F}}\left( J \right) \right) \wedge \\&\text {SP}\left( {{{{\tilde{B}}}}_{F}}\left( P \right) ,{{{{\tilde{B}}}}_{F}}\left( Q \right) \right) \wedge \text {SP}\left( {{{{\tilde{B}}}}_{F}}\left( E \right) ,{{{{\tilde{B}}}}_{F}}\left( F \right) \right) . \end{aligned} \end{aligned}$$
(17)

5 Entanglement concentration service

The problem of entanglement concentration can be viewed as a multiobjective optimization problem [107110, 114116] with the previously discussed constraints (Sects. 34). Therefore, it is convenient to use a multiconstraint, multiobjective algorithmic framework to solve the optimization problem. We therefore propose a straightforward exploitation of a modified and re-constrained evolutionary approach [108].
Let x be a vector of \(\mathrm{H} \) optimization variables, let \(g_{j} \left( x\right) \) refer to the jth constraint of the multiobjective optimization problem and let \(f_{m} \left( x\right) \) be the mth objective function. The problem is therefore to find an x that minimizes \(f_{m} \left( x\right) \), \(m=1,\ldots ,M\), subject to \(g_{j} \left( x\right) =0\), \(j=1,\ldots ,J\).
Assume that the number of subnets is \(\mathrm{H} \), \(l_{i} \) is the number of entangled connections in subnet i, K is the fixed number of segments in entangled connection j, \(c_{ijk} \) is the length of a segment k of entangled connection j of net i, \(r_{ijk} \) is the number of layers of a segment k of entangled connection j of net i, and \(\left| S_{i} \right| \) is the number of switcher ports in subnet i [107110]. Therefore, the D dimension of the search space is
$$\begin{aligned} \begin{aligned}&D\\ =&\sum _{i=1}^{\mathrm{H} }\left( \sum _{j=1}^{l_{i} }\sum _{k=1}^{K}\left( \left( c_{ijk} +r_{ijk} \right) +\left| A\right| +\left| B\right| \right) +\sum _{j=1}^{\left| S_{i} \right| }\left( x_{j} +y_{j} \right) \right) {}, \end{aligned} \end{aligned}$$
(18)
where \(\left| A\right| \) is the number of source ports and \(\left| B\right| \) is the number of target ports with respect to entangled connection j of net i.
A multiobjective evolutionary algorithm \({{{\mathcal {A}}}}_{G} \) can be straightforwardly applied to solve the problem. Algorithm \({{{\mathcal {A}}}}_{G} \) is summarized in Algorithm 1.

5.1 Discussion

For a detailed description of the subprocedures of Step 0 of \({{{\mathcal {A}}}}_{G} \), see [108].

5.2 Computational complexity

The computational complexity of the \({{{\mathcal {A}}}}_{G} \) algorithm is
$$\begin{aligned} {{{\mathcal {O}}}}\left( MW^{2} \right) , \end{aligned}$$
(19)
where M is the number of objectives and W is the size of population. Since the complexity of subprocedure \({{{\mathcal {A}}}}^{\prime }_\mathrm{nds} \) is \({{{\mathcal {O}}}}\left( M\left( 2W\right) ^{2} \right) \) [108], the complexity of \({{{\mathcal {A}}}}^{\prime }_\mathrm{assign.} \) is \({{{\mathcal {O}}}}\left( M\left( 2W\right) \log \left( 2W\right) \right) \) [108] and the complexity of subprocedure \({{{\mathcal {A}}}}^{\prime }_\mathrm{sorting} \) is \({{{\mathcal {O}}}}\left( 2W\log \left( 2W\right) \right) \) [108].

5.3 Numerical evidence

We study the entanglement concentration problem in a practical scenario, at a set \({{{\mathcal {S}}}}_{f} \) of objective functions \({{{\mathcal {S}}}}_{f} =\left\{ f_{1} ,f_{2} ,f_{3} ,f_{4} \right\} \), where \(f_{1} ={\tilde{B}}_{F} \), \(f_{2} =d_{l} \), \(f_{3} ={\tilde{F}}\) and \(f_{4} =\Phi \). Objective function \(f_{1} \) identifies the maximal entanglement throughput at a target fidelity \(F\ge 0.98\), \(f_{2} \) is the hop distance function at an l-level entangled connection \(E_{l} \), \(f_{3} \) is associated with the \({\tilde{F}}\) maximal achievable fidelity of entanglement, while \(f_{4} \) is the objective function defined in (3).
The numerical evidences consider a realistic quantum network setting with optical fiber link \({{{\mathcal {N}}}}\) between nodes x and y, with a particular link loss \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \), and transmittance \(T\left( E_{l} \left( x,y\right) \right) \). The link loss is measured in dB, while the transmittance is the ratio of photons (a value between 0 and 1) successfully transmitted through the physical link.

5.3.1 Entangled connections

First, we study the achievable \({\tilde{B}}_{F} \) (Bell pairs per second at a fidelity condition \(F\ge 0.98\)) values in function of the hop distance \(d_{l} \). The analysis considers \(\left| A\right| =\left| B\right| =5\) for the number of source and target entangled ports in x and y.
In Fig. 6a the effects of \(d_{l} \) on \({\tilde{B}}_{F} \) are depicted. The system model assumes that the initial link loss at \(l=1\) is \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) =3.2\,\mathrm{dB}\), and \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \) increases 0.1 dB per a unit increase of l. The network setting in Fig. 6b considers the situation if \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \) increases 0.2 dB per a unit increase of l. The results reveal the characteristic of the decrement of maximal entanglement throughput at improved link loss values.
The analysis in Fig. 6c reveals the connection between the achievable \({\tilde{B}}_{F} \) values and the \(T\left( E_{l} \left( x,y\right) \right) \) transmittance, at \(T\left( E_{l} \left( x,y\right) \right) \in \left[ 0.2,0.6\right] \), \(l=1\). An increment of \(T\left( E_{l} \left( x,y\right) \right) \) from \(T\left( E_{l} \left( x,y\right) \right) =0.4273\) to \(T\left( E_{l} \left( x,y\right) \right) =0.46\) doubles the \({\tilde{B}}_{F} \) values, because at these \(T\left( E_{l} \left( x,y\right) \right) \) values the resulting link loss decreases from \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \approx 3.7\,\mathrm{dB}\) to \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \approx 3.3\,\mathrm{dB}\).
The \({\tilde{F}}\) maximal achievable entanglement fidelity in function of the \(d_{l} \) hop distance is depicted in Fig. 6d. The initial link loss at \(l=1\) is \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) =3.2\,\mathrm{dB}\), and \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \) increases 0.1 dB per a unit increase of l. The analysis considers \(\left| A\right| =\left| B\right| =5\) for the number of source and target ports in x and y. The \({\tilde{F}}\) values varies random due to the probabilistic nature of the entanglement purification procedure. Due to link loss characteristic, the \({\tilde{F}}\) values remain in the target range \(\left[ 0.98,1\right] \) for \(l\le 3\). As \(l>3\), \({\tilde{F}}\) varies more significantly and picks up values from outside of the target range, due to the increased link loss. (The lower bound of the target fidelity range is depicted by the dashed line.)

5.3.2 Objective function

The results in Fig. 7 reveal the impacts of link loss \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \) (dB) on the objective function value \(\Phi \) (see (3)) for a particular node pair \(\left\{ x,y\right\} \) with an entangled connection \(E_{l} \left( x,y\right) \), \(l=1\). Assuming a practical optical fiber for the transmission of the entangled systems, the range of the \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \) loss of the \(E_{l} \left( x,y\right) \) entangled connection is considered in the range of \({{{\mathcal {L}}}}\left( E_{l} \left( x,y\right) \right) \in \left[ 3.2\,\mathrm{dB},4.4\,\mathrm{dB}\right] \). The evaluation assumes target fidelity \(F\ge 0.98\). As the link loss increases above 3.5 dB, the \(\Phi \) objective function decreases significantly, because the \({\tilde{B}}_{F} \) values start to converge to 0.

6 Conclusions

Entanglement concentration service is a complex problem in the quantum Internet aimed at providing reliable, high-quality entanglement for a dedicated set of strongly connected quantum nodes. Distribution of entanglement in the strongly connected subset is related to the problem of the optimal switching and swapping of entangled connections. In the problem solving, we integrated the fundamentals of VLSI design and analysis and evolutionary computations with the recent results of the quantum Internet.

Acknowledgements

Open access funding provided by Budapest University of Technology and Economics (BME). The research reported in this paper has been supported by the Hungarian Academy of Sciences (MTA Premium Postdoctoral Research Program 2019), by the National Research, Development and Innovation Fund (TUDFO/51757/2019-ITM, Thematic Excellence Program), by the National Research Development and Innovation Office of Hungary (Project No. 2017-1.2.1-NKP-2017-00001), by the Hungarian Scientific Research Fund - OTKA K-112125, and in part by the BME Artificial Intelligence FIKP Grant of EMMI (Budapest University of Technology, BME FIKP-MI/SC).

Compliance with ethical standards

Conflict of interest

We have no competing interests.
Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Anhänge

Appendix

Abbreviations

EDA
Electronic design automation
IC
Integrated circuit
MP/MN
Multiport multinode
QKD
Quantum key distribution
SP
Symmetry pair
SS
Self-symmetric
VLSI
Very-large-scale integration

Notations

The notations of the manuscript are summarized in Table 1.
Table 1
Summary of notations
Notation
Description
l
Level of entanglement
\({\mathrm{l1}}\)
L1 metric
F
Fidelity of entanglement
N
Entangled quantum network (entangled overlay quantum network), \(N=\left( V,{{{\mathcal {S}}}}\right) \), where V is a set of nodes, \({{{\mathcal {S}}}}\) is a set of entangled connections
l
An l-level entangled connection. For an l link, the hop distance is \(2^{l-1} \)
\(d\left( x,y\right) _{{l} } \)
Hop distance of an l-level entangled connection between nodes x and y
\(E_{{l} } \left( x,y\right) \)
Entangled connection \(E_{{l} } \left( x,y\right) \) between nodes x and y
S
Switcher node
\(B_{F} \left( E_{{l} } \left( x,y\right) \right) \)
Entanglement throughput of a given l -level entangled connection \(E_{{l} } \left( x,y\right) \) between nodes \(\left( x,y\right) \)
\({\tilde{B}}_{F} \)
An upper bound on \(B_{F} \)
\(R_{i} \)
An i-th quantum repeater node
m
Number of source nodes in the quantum network
n
Number of receiver nodes in the quantum network
\(\Phi \)
Objective function
\(\Delta B_{F} \left( E_{{l} } \left( A_{i} ,B_{j} \right) \right) \)
Residual entanglement throughput for direction from \(A_{i} \) to \(B_{j} \) through entangled connection \(E_{{l} } \left( A_{i} ,B_{j} \right) \)
\(\Delta d\left( A_{i} ,B_{j} \right) _{{l} } \)
Residual hop distance function
c
A cycle in a graph
\(B_{j}^{c*} \)
An optimal entangled state \(B_{j}^{c*} \) (also referred to as optimal entangled port) in a target node \(B_{j} \)
\(B_{j}^{c_{l} } \)
An lth entangled port available in target node \(B_{j} \)
\({{\mathcal {P}}}^{*} \)
An optimal multilayer path
\(P_{j} \)
A set of k entangled ports \(P_{j} =\left\{ P_{j}^{c_{1} } ,\ldots ,P_{j}^{c_{k} } \right\} \) for a given quantum node j
\(G^{d} \)
A d-dimensional square lattice multiport multinode (MP/MN) base graph. It contains the sets \(P_{j} \), \(j=1,\ldots ,\left| V\right| \)
\({{\mathcal {M}}}_{S} \)
A method of connection topology construction
\(\Gamma \)
A subset of selected nodes
\(G_\mathrm{ep} \)
A multilayer grid, consist of q (d-dimensional) square lattice base graphs. Each layer contain the maps of the quantum ports of the overlay quantum network N
Li
An ith layer of \(G_\mathrm{ep} \), \(i=0,\ldots ,q\)
\({\tilde{B}}_{F}^{\left( Li\right) } \)
An upper bound on the entanglement throughput of layer Li in \(G_\mathrm{ep} \)
\(\zeta _{A\rightarrow S} \)
Overlapped length cost between a source node A and an entanglement switcher port S
\(\kappa \)
A cost function, defined between the layers
\(c_{A\rightarrow B} \)
Path length between source node A and target ports B
\({\mathrm{SP}}({\tilde{B}}_{F} (I),{\tilde{B}}_{F} (J))\)
Symmetry pair. For a SP pair \(\mathrm{SP}({\tilde{B}}_{F} (I),{\tilde{B}}_{F} (J))\), \(\Delta {\tilde{B}}_{F} (\mathrm{SP}({\tilde{B}}_{F} (I),{\tilde{B}}_{F} (J)))\rightarrow 0\)
\({\mathrm{SP}}j\)
A jth symmetry pair
\({\mathrm{SS}}\left( \cdot \right) \)
A self-symmetric port
\(l_{S,{\mathrm{SP}}j} \)
Distance function in the grid structure between switcher S and a jth SP pair
\({{\mathcal {H}}}\)
A heuristic (rule), to manage the connection rules between the switcher port S and the entangled ports
x
A vector of n optimization variables
\(g_{j} \left( x\right) \)
An jth constraint of the multiobjective optimization problem
\(f_{m} \left( x\right) \)
An mth objective function
D
Dimension of the search space
\(\left| A\right| \)
Number of source ports with respect to entangled connection j of net i
\(\left| B\right| \)
The number of target ports with respect to entangled connection j of net i
\(R_{t} =P_{t} \bigcup Q_{t} \)
A combined population, where \(P_{t} \) is the tth parent population, \(Q_{t} \) is the tth offspring population
\(R_{t+1} \)
New population of size \(\mathrm{H} \)
\(Q_{t+1} \)
New population of size W
\({{\mathcal {A}}}^{\prime }_\mathrm{nds} \)
Subalgorithm for non-dominated sorting
\({{\mathcal {A}}}^{\prime }_\mathrm{assign.} \)
Subalgorithm for crowding-distance assignment
\({{\mathcal {A}}}^{\prime }_\mathrm{sorting} \)
Subalgorithm for crowding-distance sorting
\({{\mathcal {F}}}_{i} \)
An ith solution set, where \({{{\mathcal {F}}}}_{1} \) refers to the best non-dominated set that contains the best solutions in the combined population \(R_{t} \)
\(\angle \)
Crowded-comparison operator
\(\zeta _{i} \)
Observed network information
\(\psi _{i} \)
An acceptable limit on \(\zeta _{i} \)
Fußnoten
1
For an l-level entangled connection \(E_{{l} } (x,y)\), the hop distance between quantum nodes x and y is \(2^{l-1}\). In the network graph N, an entangled connection \({{E}_{l}}\left( x,y \right) \) is represented via edge \({{E}_{j}}\in E\), \(j=1,\ldots ,m\).
 
2
Best-first search, to find a path between a source and target node with a smallest path cost function. In particular, the algorithm selects the path \({\mathcal {P}}\) that minimizes cost function \(f(n)=g(n)+h(n)\), where n is the next node on the path, g(n) is the cost of the path from the source node to n, and h(n) is a heuristic function to estimate the cost of the cheapest path from n to the target [75].
 
Literatur
2.
Zurück zum Zitat Pirandola, S., Braunstein, S.L.: Unite to build a quantum internet. Nature 532, 169–171 (2016)ADS Pirandola, S., Braunstein, S.L.: Unite to build a quantum internet. Nature 532, 169–171 (2016)ADS
3.
Zurück zum Zitat Pirandola, S.: End-to-end capacities of a quantum communication network. Commun. Phys. 2, 51 (2019) Pirandola, S.: End-to-end capacities of a quantum communication network. Commun. Phys. 2, 51 (2019)
4.
Zurück zum Zitat Pirandola, S.: Bounds for multi-end communication over quantum networks. Quantum Sci. Technol. 4, 045006 (2019)ADS Pirandola, S.: Bounds for multi-end communication over quantum networks. Quantum Sci. Technol. 4, 045006 (2019)ADS
7.
Zurück zum Zitat Pirandola, S., Braunstein, S.L., Laurenza, R., Ottaviani, C., Cope, T.P.W., Spedalieri, G., Banchi, L.: Theory of channel simulation and bounds for private communication. Quantum Sci. Technol. 3, 035009 (2018)ADS Pirandola, S., Braunstein, S.L., Laurenza, R., Ottaviani, C., Cope, T.P.W., Spedalieri, G., Banchi, L.: Theory of channel simulation and bounds for private communication. Quantum Sci. Technol. 3, 035009 (2018)ADS
9.
Zurück zum Zitat Laurenza, R., Pirandola, S.: General bounds for sender-receiver capacities in multipoint quantum communications. Phys. Rev. A 96, 032318 (2017)ADS Laurenza, R., Pirandola, S.: General bounds for sender-receiver capacities in multipoint quantum communications. Phys. Rev. A 96, 032318 (2017)ADS
10.
Zurück zum Zitat Wehner, S., Elkouss, D., Hanson, R.: Quantum internet: a vision for the road ahead. Science 362, 6412 (2018)MathSciNetMATH Wehner, S., Elkouss, D., Hanson, R.: Quantum internet: a vision for the road ahead. Science 362, 6412 (2018)MathSciNetMATH
11.
Zurück zum Zitat Van Meter, R.: Quantum Networking. Wiley, London. ISBN 1118648927, 9781118648926 (2014) Van Meter, R.: Quantum Networking. Wiley, London. ISBN 1118648927, 9781118648926 (2014)
12.
Zurück zum Zitat Lloyd, S., Shapiro, J.H., Wong, F.N.C., Kumar, P., Shahriar, S.M., Yuen, H.P.: Infrastructure for the quantum Internet. ACM SIGCOMM Comput. Commun. Rev. 34, 9–20 (2004) Lloyd, S., Shapiro, J.H., Wong, F.N.C., Kumar, P., Shahriar, S.M., Yuen, H.P.: Infrastructure for the quantum Internet. ACM SIGCOMM Comput. Commun. Rev. 34, 9–20 (2004)
13.
Zurück zum Zitat Kimble, H.J.: The quantum Internet. Nature 453, 1023–1030 (2008)ADS Kimble, H.J.: The quantum Internet. Nature 453, 1023–1030 (2008)ADS
14.
Zurück zum Zitat Preskill, J.: Quantum Computing in the NISQ era and beyond. Quantum 2, 79 (2018) Preskill, J.: Quantum Computing in the NISQ era and beyond. Quantum 2, 79 (2018)
16.
Zurück zum Zitat Harrow, A.W., Montanaro, A.: Quantum computational supremacy. Nature 549, 203–209 (2017)ADS Harrow, A.W., Montanaro, A.: Quantum computational supremacy. Nature 549, 203–209 (2017)ADS
17.
Zurück zum Zitat Aaronson, S., Chen, L.: Complexity-theoretic foundations of quantum supremacy experiments. In: Proceedings of the 32nd Computational Complexity Conference, CCC ’17, pp. 22:1–22:67 (2017) Aaronson, S., Chen, L.: Complexity-theoretic foundations of quantum supremacy experiments. In: Proceedings of the 32nd Computational Complexity Conference, CCC ’17, pp. 22:1–22:67 (2017)
21.
22.
Zurück zum Zitat Foxen, B., et al.: Demonstrating a continuous set of two-qubit gates for near-term quantum algorithms. arXiv:2001.08343 (2020) Foxen, B., et al.: Demonstrating a continuous set of two-qubit gates for near-term quantum algorithms. arXiv:​2001.​08343 (2020)
23.
Zurück zum Zitat Ajagekar, A., Humble, T., You, F.: Quantum computing based hybrid solution strategies for large-scale discrete-continuous optimization problems. Comput. Chem. Eng. 132, 106630 (2020) Ajagekar, A., Humble, T., You, F.: Quantum computing based hybrid solution strategies for large-scale discrete-continuous optimization problems. Comput. Chem. Eng. 132, 106630 (2020)
24.
Zurück zum Zitat Ajagekar, A., You, F.: Quantum computing for energy systems optimization: challenges and opportunities. Energy 179, 76–89 (2019) Ajagekar, A., You, F.: Quantum computing for energy systems optimization: challenges and opportunities. Energy 179, 76–89 (2019)
25.
Zurück zum Zitat Harrigan, M. et al.: Quantum approximate optimization of non-planar graph problems on a planar superconducting processor. arXiv:2004.04197v1 (2020) Harrigan, M. et al.: Quantum approximate optimization of non-planar graph problems on a planar superconducting processor. arXiv:​2004.​04197v1 (2020)
27.
Zurück zum Zitat Farhi, E., Gamarnik, D., Gutmann, S.: The quantum approximate optimization algorithm needs to see the whole graph: a typical case. arXiv:2004.09002v1 (2020) Farhi, E., Gamarnik, D., Gutmann, S.: The quantum approximate optimization algorithm needs to see the whole graph: a typical case. arXiv:​2004.​09002v1 (2020)
28.
Zurück zum Zitat Brown, K.A., Roser, T.: Towards storage rings as quantum computers. Phys. Rev. Accel. Beams 23, 054701 (2020)ADS Brown, K.A., Roser, T.: Towards storage rings as quantum computers. Phys. Rev. Accel. Beams 23, 054701 (2020)ADS
33.
Zurück zum Zitat Shannon, K., Towe, E., Tonguz, O.: On the use of quantum entanglement in secure communications: a survey. arXiv:2003.07907 (2020) Shannon, K., Towe, E., Tonguz, O.: On the use of quantum entanglement in secure communications: a survey. arXiv:​2003.​07907 (2020)
39.
Zurück zum Zitat Gyongyosi, L.: Services for the quantum internet. DSc Dissertation, Hungarian Academy of Sciences (MTA) (2020) Gyongyosi, L.: Services for the quantum internet. DSc Dissertation, Hungarian Academy of Sciences (MTA) (2020)
40.
Zurück zum Zitat Gyongyosi, L., Bacsardi, L., Imre, S.: A survey on quantum key distribution. Infocom. J. XI 2, 14–21 (2019) Gyongyosi, L., Bacsardi, L., Imre, S.: A survey on quantum key distribution. Infocom. J. XI 2, 14–21 (2019)
42.
Zurück zum Zitat Imre, S., Gyongyosi, L.: Advanced Quantum Communications–An Engineering Approach. Wiley-IEEE Press, New Jersey (2012)MATH Imre, S., Gyongyosi, L.: Advanced Quantum Communications–An Engineering Approach. Wiley-IEEE Press, New Jersey (2012)MATH
43.
Zurück zum Zitat Van Meter, R., Satoh, T., Ladd, T.D., Munro, W.J., Nemoto, K.: Path selection for quantum repeater networks. Netw. Sci. 3(1–4), 82–95 (2013) Van Meter, R., Satoh, T., Ladd, T.D., Munro, W.J., Nemoto, K.: Path selection for quantum repeater networks. Netw. Sci. 3(1–4), 82–95 (2013)
44.
Zurück zum Zitat Van Meter, R., Ladd, T.D., Munro, W.J., Nemoto, K.: System design for a long-line quantum repeater. IEEE/ACM Trans. Netw. 17, 1002–1013 (2009) Van Meter, R., Ladd, T.D., Munro, W.J., Nemoto, K.: System design for a long-line quantum repeater. IEEE/ACM Trans. Netw. 17, 1002–1013 (2009)
46.
47.
Zurück zum Zitat Khatri, S., Matyas, C.T., Siddiqui, A.U., Dowling, J.P.: Practical figures of merit and thresholds for entanglement distribution in quantum networks. Phys. Rev. Res. 1, 023032 (2019) Khatri, S., Matyas, C.T., Siddiqui, A.U., Dowling, J.P.: Practical figures of merit and thresholds for entanglement distribution in quantum networks. Phys. Rev. Res. 1, 023032 (2019)
48.
Zurück zum Zitat Kozlowski, W., Wehner, S.: Towards large-scale quantum networks. In: Proceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication, Dublin, Ireland. arXiv:1909.08396 (2019) Kozlowski, W., Wehner, S.: Towards large-scale quantum networks. In: Proceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication, Dublin, Ireland. arXiv:​1909.​08396 (2019)
49.
Zurück zum Zitat Pathumsoot, P., Matsuo, T., Satoh, T., Hajdusek, M., Suwanna, S., Van Meter, R.: Modeling of measurement-based quantum network coding on IBMQ devices. Phys. Rev. A 101, 052301 (2020)ADS Pathumsoot, P., Matsuo, T., Satoh, T., Hajdusek, M., Suwanna, S., Van Meter, R.: Modeling of measurement-based quantum network coding on IBMQ devices. Phys. Rev. A 101, 052301 (2020)ADS
50.
Zurück zum Zitat Pal, S., Batra, P., Paterek, T., Mahesh, T.S.: Experimental localisation of quantum entanglement through monitored classical mediator. arXiv:1909.11030v1 (2019) Pal, S., Batra, P., Paterek, T., Mahesh, T.S.: Experimental localisation of quantum entanglement through monitored classical mediator. arXiv:​1909.​11030v1 (2019)
53.
Zurück zum Zitat Tanjung, K., et al.: Probing quantum features of photosynthetic organisms. NPJ Quantum Inf. 4, 2056–6387 (2018) Tanjung, K., et al.: Probing quantum features of photosynthetic organisms. NPJ Quantum Inf. 4, 2056–6387 (2018)
54.
Zurück zum Zitat Tanjung, K., et al.: Revealing nonclassicality of inaccessible objects. Phys. Rev. Lett. 119(12), 1079–7114 (2017) Tanjung, K., et al.: Revealing nonclassicality of inaccessible objects. Phys. Rev. Lett. 119(12), 1079–7114 (2017)
55.
Zurück zum Zitat Rozpedek, F., Schiet, T., Thinh, L., Elkouss, D., Doherty, A., Wehner, S.: Optimizing practical entanglement distillation. Phys. Rev. A 97, 062333 (2018)ADS Rozpedek, F., Schiet, T., Thinh, L., Elkouss, D., Doherty, A., Wehner, S.: Optimizing practical entanglement distillation. Phys. Rev. A 97, 062333 (2018)ADS
56.
Zurück zum Zitat Humphreys, P., et al.: Deterministic delivery of remote entanglement on a quantum network. Nature 558, 268–273 (2018)ADS Humphreys, P., et al.: Deterministic delivery of remote entanglement on a quantum network. Nature 558, 268–273 (2018)ADS
57.
Zurück zum Zitat Liao, S.-K., et al.: Satellite-to-ground quantum key distribution. Nature 549, 43–47 (2017)ADS Liao, S.-K., et al.: Satellite-to-ground quantum key distribution. Nature 549, 43–47 (2017)ADS
58.
Zurück zum Zitat Ren, J.-G., et al.: Ground-to-satellite quantum teleportation. Nature 549, 70–73 (2017)ADS Ren, J.-G., et al.: Ground-to-satellite quantum teleportation. Nature 549, 70–73 (2017)ADS
59.
Zurück zum Zitat Hensen, B., et al.: Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature 526, 682–686 (2015) Hensen, B., et al.: Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature 526, 682–686 (2015)
60.
Zurück zum Zitat Hucul, D., et al.: Modular entanglement of atomic qubits using photons and phonons. Nat. Phys. 11(1), 37 (2015) Hucul, D., et al.: Modular entanglement of atomic qubits using photons and phonons. Nat. Phys. 11(1), 37 (2015)
61.
Zurück zum Zitat Noelleke, C., et al.: Efficient teleportation between remote single-atom quantum memories. Phys. Rev. Lett. 110, 140403 (2013)ADS Noelleke, C., et al.: Efficient teleportation between remote single-atom quantum memories. Phys. Rev. Lett. 110, 140403 (2013)ADS
62.
Zurück zum Zitat Sangouard, N., et al.: Quantum repeaters based on atomic ensembles and linear optics. Rev. Mod. Phys. 83, 33 (2011)ADS Sangouard, N., et al.: Quantum repeaters based on atomic ensembles and linear optics. Rev. Mod. Phys. 83, 33 (2011)ADS
63.
Zurück zum Zitat Yuan, Z., Chen, Y., Zhao, B., Chen, S., Schmiedmayer, J., Pan, J.W.: Experimental demonstration of a BDCZ quantum repeater node. Nature 454, 1098–1101 (2008)ADS Yuan, Z., Chen, Y., Zhao, B., Chen, S., Schmiedmayer, J., Pan, J.W.: Experimental demonstration of a BDCZ quantum repeater node. Nature 454, 1098–1101 (2008)ADS
64.
Zurück zum Zitat Kobayashi, H., Le Gall, F., Nishimura, H., Rotteler, M.: General scheme for perfect quantum network coding with free classical communication, Lecture Notes in Computer Science (Automata, Languages and Programming SE-52, vol. 5555). Springer, Berlin, pp 622–633 (2009) Kobayashi, H., Le Gall, F., Nishimura, H., Rotteler, M.: General scheme for perfect quantum network coding with free classical communication, Lecture Notes in Computer Science (Automata, Languages and Programming SE-52, vol. 5555). Springer, Berlin, pp 622–633 (2009)
65.
Zurück zum Zitat Hayashi, M.: Prior entanglement between senders enables perfect quantum network coding with modification. Phys. Rev. A 76, 040301(R) (2007)MathSciNetADS Hayashi, M.: Prior entanglement between senders enables perfect quantum network coding with modification. Phys. Rev. A 76, 040301(R) (2007)MathSciNetADS
66.
Zurück zum Zitat Hayashi, M., Iwama, K., Nishimura, H., Raymond, R., Yamashita, S.: Quantum network coding. In: Thomas, W., Weil, P. (eds.) Lecture Notes in Computer Science (STACS 2007 SE52, vol. 4393). Springer, Heidelberg (2007) Hayashi, M., Iwama, K., Nishimura, H., Raymond, R., Yamashita, S.: Quantum network coding. In: Thomas, W., Weil, P. (eds.) Lecture Notes in Computer Science (STACS 2007 SE52, vol. 4393). Springer, Heidelberg (2007)
70.
Zurück zum Zitat Van Meter, R., Devitt, S.J.: Local and distributed quantum computation. IEEE Comput. 49(9), 31–42 (2016) Van Meter, R., Devitt, S.J.: Local and distributed quantum computation. IEEE Comput. 49(9), 31–42 (2016)
71.
Zurück zum Zitat Van Meter, R., Satoh, T., Nagayama, S., Matsuo, T., Suzuki, S.: Optimizing timing of high-success-probability quantum repeaters. arXiv:1701.04586 (2017) Van Meter, R., Satoh, T., Nagayama, S., Matsuo, T., Suzuki, S.: Optimizing timing of high-success-probability quantum repeaters. arXiv:​1701.​04586 (2017)
72.
Zurück zum Zitat Matsuo, T., Satoh, T., Nagayama, S., Van Meter, R.: Analysis of measurement-based quantum network coding over repeater networks under noisy conditions. Phys. Rev. A 97, 062328 (2018)ADS Matsuo, T., Satoh, T., Nagayama, S., Van Meter, R.: Analysis of measurement-based quantum network coding over repeater networks under noisy conditions. Phys. Rev. A 97, 062328 (2018)ADS
73.
Zurück zum Zitat Taherkhani, M.A., Navi, K., Van Meter, R.: Resource-aware system architecture model for implementation of quantum aided byzantine agreement on quantum repeater networks. arXiv:1701.04588 (2017) Taherkhani, M.A., Navi, K., Van Meter, R.: Resource-aware system architecture model for implementation of quantum aided byzantine agreement on quantum repeater networks. arXiv:​1701.​04588 (2017)
74.
Zurück zum Zitat Briegel, H.-J., Dur, W., Cirac, J.I., Zoller, P.: Quantum repeaters for communication. Phys. Rev. Lett. 81, 5932 (1998)MATHADS Briegel, H.-J., Dur, W., Cirac, J.I., Zoller, P.: Quantum repeaters for communication. Phys. Rev. Lett. 81, 5932 (1998)MATHADS
75.
Zurück zum Zitat Hart, P., Nilsson, N., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. IEEE Trans. Syst. Sci. Cybern. 4(2), 100–107 (1968) Hart, P., Nilsson, N., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. IEEE Trans. Syst. Sci. Cybern. 4(2), 100–107 (1968)
76.
Zurück zum Zitat Yuan, Z., Chen, Y., Zhao, B., Chen, S., Schmiedmayer, J., Pan, J.-W.: Experimental demonstration of a BDCZ quantum repeater node. Nature 454, 1098–1101 (2008)ADS Yuan, Z., Chen, Y., Zhao, B., Chen, S., Schmiedmayer, J., Pan, J.-W.: Experimental demonstration of a BDCZ quantum repeater node. Nature 454, 1098–1101 (2008)ADS
77.
Zurück zum Zitat Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum principal component analysis. Nat. Phys. 10, 631 (2014) Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum principal component analysis. Nat. Phys. 10, 631 (2014)
78.
79.
Zurück zum Zitat Biamonte, J., et al.: Quantum machine learning. Nature 549, 195–202 (2017)ADS Biamonte, J., et al.: Quantum machine learning. Nature 549, 195–202 (2017)ADS
80.
Zurück zum Zitat Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum algorithms for supervised and unsupervised machine learning. arXiv:1307.0411 (2013) Lloyd, S., Mohseni, M., Rebentrost, P.: Quantum algorithms for supervised and unsupervised machine learning. arXiv:​1307.​0411 (2013)
81.
Zurück zum Zitat Chou, C., Laurat, J., Deng, H., Choi, K.S., de Riedmatten, H., Felinto, D., Kimble, H.J.: Functional quantum nodes for entanglement distribution over scalable quantum networks. Science 316(5829), 1316–1320 (2007)ADS Chou, C., Laurat, J., Deng, H., Choi, K.S., de Riedmatten, H., Felinto, D., Kimble, H.J.: Functional quantum nodes for entanglement distribution over scalable quantum networks. Science 316(5829), 1316–1320 (2007)ADS
82.
Zurück zum Zitat Kok, P., Munro, W.J., Nemoto, K., Ralph, T.C., Dowling, J.P., Milburn, G.J.: Linear optical quantum computing with photonic qubits. Rev. Mod. Phys. 79, 135–174 (2007)ADS Kok, P., Munro, W.J., Nemoto, K., Ralph, T.C., Dowling, J.P., Milburn, G.J.: Linear optical quantum computing with photonic qubits. Rev. Mod. Phys. 79, 135–174 (2007)ADS
90.
Zurück zum Zitat Muralidharan, S., Kim, J., Lutkenhaus, N., Lukin, M.D., Jiang, L.: Ultrafast and fault-tolerant quantum communication across long distances. Phys. Rev. Lett. 112, 250501 (2014)ADS Muralidharan, S., Kim, J., Lutkenhaus, N., Lukin, M.D., Jiang, L.: Ultrafast and fault-tolerant quantum communication across long distances. Phys. Rev. Lett. 112, 250501 (2014)ADS
91.
Zurück zum Zitat Lloyd, S.: The universe as quantum computer, a computable universe. In: Zenil H. (ed.) Understanding and Exploring Nature as Computation. World Scientific, Singapore. arXiv:1312.4455v1 (2013) Lloyd, S.: The universe as quantum computer, a computable universe. In: Zenil H. (ed.) Understanding and Exploring Nature as Computation. World Scientific, Singapore. arXiv:​1312.​4455v1 (2013)
92.
Zurück zum Zitat Vedral, V., Plenio, M.B., Rippin, M.A., Knight, P.L.: Quantifying entanglement. Phys. Rev. Lett. 78, 2275–2279 (1997)MathSciNetMATHADS Vedral, V., Plenio, M.B., Rippin, M.A., Knight, P.L.: Quantifying entanglement. Phys. Rev. Lett. 78, 2275–2279 (1997)MathSciNetMATHADS
93.
Zurück zum Zitat Vedral, V.: The role of relative entropy in quantum information theory. Rev. Mod. Phys. 74, 197–234 (2002)MathSciNetMATHADS Vedral, V.: The role of relative entropy in quantum information theory. Rev. Mod. Phys. 74, 197–234 (2002)MathSciNetMATHADS
94.
Zurück zum Zitat Petz, D.: Quantum Information Theory and Quantum Statistics. Springer, Heidelberg (2008)MATH Petz, D.: Quantum Information Theory and Quantum Statistics. Springer, Heidelberg (2008)MATH
95.
Zurück zum Zitat Bacsardi, L.: On the way to quantum-based satellite communication. IEEE Commun. Mag. 51(08), 50–55 (2013) Bacsardi, L.: On the way to quantum-based satellite communication. IEEE Commun. Mag. 51(08), 50–55 (2013)
98.
Zurück zum Zitat Caleffi, M., Cacciapuoti, A. S., Bianchi, G.: Quantum Internet: from communication to distributed computing. arXiv:1805.04360 (2018) Caleffi, M., Cacciapuoti, A. S., Bianchi, G.: Quantum Internet: from communication to distributed computing. arXiv:​1805.​04360 (2018)
99.
Zurück zum Zitat Cacciapuoti, A.S., Caleffi, M., Tafuri, F., Cataliotti, F.S., Gherardini, S., Bianchi, G.: Quantum Internet: networking challenges in distributed quantum computing. arXiv:1810.08421 (2018) Cacciapuoti, A.S., Caleffi, M., Tafuri, F., Cataliotti, F.S., Gherardini, S., Bianchi, G.: Quantum Internet: networking challenges in distributed quantum computing. arXiv:​1810.​08421 (2018)
102.
Zurück zum Zitat Gyongyosi, L., Imre, S.: Multilayer optimization for the quantum Internet. Sci. Rep, Nat (2018)MATH Gyongyosi, L., Imre, S.: Multilayer optimization for the quantum Internet. Sci. Rep, Nat (2018)MATH
103.
Zurück zum Zitat Gyongyosi, L., Imre, S.: decentralized base-graph routing for the quantum Internet. Am. Phys. Soc. Phys. Rev. A (2018) Gyongyosi, L., Imre, S.: decentralized base-graph routing for the quantum Internet. Am. Phys. Soc. Phys. Rev. A (2018)
104.
Zurück zum Zitat Gisin, N., Thew, R.: Quantum communication. Nat. Photon. 1, 165–171 (2007) Gisin, N., Thew, R.: Quantum communication. Nat. Photon. 1, 165–171 (2007)
105.
Zurück zum Zitat Shor, P.W.: Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A 52, R2493–R2496 (1995)ADS Shor, P.W.: Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A 52, R2493–R2496 (1995)ADS
106.
Zurück zum Zitat Sheng, Y.B., Zhou, L.: Distributed secure quantum machine learning. Sci. Bull. 62, 1025–2019 (2017) Sheng, Y.B., Zhou, L.: Distributed secure quantum machine learning. Sci. Bull. 62, 1025–2019 (2017)
107.
Zurück zum Zitat Martins, R., Lourenço, N., Horta, N.: Analog Integrated Circuit Design Automation. Springer, Berlin. ISBN 978-3-319-34059-3, ISBN 978-3-319-34060-9 (2017) Martins, R., Lourenço, N., Horta, N.: Analog Integrated Circuit Design Automation. Springer, Berlin. ISBN 978-3-319-34059-3, ISBN 978-3-319-34060-9 (2017)
108.
Zurück zum Zitat Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6, 182–197 (2002) Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6, 182–197 (2002)
109.
Zurück zum Zitat Jiang, I., Chang, H.-Y., Chang, C.-L.: WiT: optimal wiring topology for electromigration avoidance. IEEE Trans. Very Large Scale Integr. Syst. 20, 581–592 (2012) Jiang, I., Chang, H.-Y., Chang, C.-L.: WiT: optimal wiring topology for electromigration avoidance. IEEE Trans. Very Large Scale Integr. Syst. 20, 581–592 (2012)
110.
Zurück zum Zitat Rocha, F.A.E., Martins, R.M.F., Lourenco, N.C.C., Horta, N.C.G.: Electronic Design Automation of Analog ICs. Springer, Combining Gradient Models with Multi-Objective Evolutionary Algorithms (2014) Rocha, F.A.E., Martins, R.M.F., Lourenco, N.C.C., Horta, N.C.G.: Electronic Design Automation of Analog ICs. Springer, Combining Gradient Models with Multi-Objective Evolutionary Algorithms (2014)
113.
Zurück zum Zitat Kruskal, J.B.: On the shortest spanning subtree of a graph and the traveling salesman problem. Proc. Am. Math. Soc. 7, 48–50 (1956)MathSciNetMATH Kruskal, J.B.: On the shortest spanning subtree of a graph and the traveling salesman problem. Proc. Am. Math. Soc. 7, 48–50 (1956)MathSciNetMATH
114.
Zurück zum Zitat Jie, Y., Kamal, A.E.: Multi-objective multicast routing optimization in cognitive radio networks. In: IEEE Wireless Communications and Networking Conference (IEEE WCNC) (2014) Jie, Y., Kamal, A.E.: Multi-objective multicast routing optimization in cognitive radio networks. In: IEEE Wireless Communications and Networking Conference (IEEE WCNC) (2014)
115.
Zurück zum Zitat Pinto, D., Baran, B.: Solving multiobjective multicast routing problem with a new ant colony optimization approach. In: Proceedings of ACM, International IFIP/ACM Latin American Conference on Networking (2005) Pinto, D., Baran, B.: Solving multiobjective multicast routing problem with a new ant colony optimization approach. In: Proceedings of ACM, International IFIP/ACM Latin American Conference on Networking (2005)
116.
Zurück zum Zitat Wang, W. et al.: Efficient interference-aware TDMA link scheduling for static wireless networks. In: Proceedings of ACM, International Conference on Mobile Computing and Networking (2006) Wang, W. et al.: Efficient interference-aware TDMA link scheduling for static wireless networks. In: Proceedings of ACM, International Conference on Mobile Computing and Networking (2006)
Metadaten
Titel
Entanglement concentration service for the quantum Internet
verfasst von
Laszlo Gyongyosi
Sandor Imre
Publikationsdatum
01.08.2020
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 8/2020
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-020-02716-3

Weitere Artikel der Ausgabe 8/2020

Quantum Information Processing 8/2020 Zur Ausgabe

Neuer Inhalt