<<

QuNet: Cost vector analysis & multi-path entanglement routing in quantum networks

Hudson Leone,1, 2, ∗ Nathaniel R. Miller,3 Deepesh Singh,4 Nathan K. Langford,1, 2 and Peter P. Rohde2, 3, † 1School of Mathematical and Physical Sciences, University of Technology Sydney, Ultimo, NSW 2007, Australia 2Centre for Quantum Software & Information (UTS:QSI), University of Technology Sydney, Ultimo, NSW 2007, Australia 3Hearne Institute for Theoretical Physics, Department of Physics & Astronomy, Louisiana State University, Baton Rouge LA, United States 4Centre for Quantum Computation & Communication Technology, School of Mathematics and Physics, The University of Queensland, St Lucia, Queensland 4072, Australia

Entanglement distribution will form the backbone of many future distributed quantum technologies, especially the quantum internet. The act of purifying multiple noisy entan- gled states into a single one of higher quality has no analogue in classical networking and as such, this transforms the way in which we will consider future for routing entanglement. We outline the differences that arise because of this, demonstrate some elementary formalisms for ‘multi-path entanglement routing’, and discuss the philosophi- cal differences that arise when comparing this regime to conventional digital network theory. We also present a software package, QuNet, that uses novel ‘quantum cost-vector analysis’ to simulate and benchmark routing in multi-user entanglement networks in a way that is is highly scalable in network size and the number of competing users. Our software accommodates both ground- and space-based networks, and implements efficient multi-user time-optimisation for mitigating congestion when quantum memories are available.

CONTENTS A. Shortest-path routing8 B. Multi-path routing8 I. Introduction2 C. Analytic area laws8 D. Greedy multi-path routing9 II. Entanglement distribution networks3 E. Multi-user routing9 A. Bell pairs — A resource for quantum networking3 B. Quantum channels3 V. The philosophy of quantum vs. classical networking9 1. Loss channels3 2. Dephasing channels3 VI. QuNet: A package for simulating quantum networks 10 3. Depolarising channels3 A. Related work and motivation 10 4. General quantum channels3 B. Design principles 11 5. State fidelity4 C. Simulating quantum memories with temporal arXiv:2105.00418v1 [quant-ph] 2 May 2021 C. Entanglement swapping4 meta-graphs 12 D. Entanglement purification4 E. Commutativity of quantum channels5 VII. Advanced route optimisation in entanglement distribution F. Costs as distance metrics5 networks using QuNet 12 A. Fidelity vs. trade-offs in multi-path III. Graph reduction6 routing 12 A. Purification trees6 B. Multi-user, multi-path routing 13 B. Entanglement networks as abelian groups6 C. Channel percolation effects 14 C. General reduction strategies7 D. Network scaling effects 15 E. Quantum memory 16 IV. Entanglement routing strategies8 F. Memory percolation effects 17 G. Temporal compression 17

VIII. Further applications 17 A. Quantum key distribution 18 ∗ [email protected] B. Distributed quantum computation 18 † [email protected]; https://peterrohde.github.io/QuNet C. Space-based quantum networks 19 2

IX. Conclusion 21 Shortest-path Multi-path A Acknowledgements 22 A

A. Efficient multi-user temporal routing 22 1 1 1 B. Average L1-distance between random user-pairs on a 1 square lattice 23 2 2 C. Derivation of analytic heat map curves 23

References 24 2 1 2 1

I. INTRODUCTION B B In classical networking, communication is carried out Figure 1: In shortest-path routing, as is often employed in via direct transmission of classical information along com- classical networking protocols, we wish to find the route be- munication channels, and errors are mitigated through tween two nodes that minimises the sum of their edge distances. This notion could similarly be employed in entanglement rout- repeat-until-success strategies that transmit redundant ing, where the edge weights represent a dephasing metric. information. In quantum networking, the no-cloning the- In multi-path routing, we do not employ just a single shortest- orem prevents arbitrary copying of unknown quantum path, but simultaneously communicating Bell pairs across information, so direct transmission of quantum informa- multiple available routes, which are subsequently purified, tion is limited in quality and success by the thereby yielding a single Bell pair with greater fidelity than intrinsic noise characteristics of the communication chan- the shortest-path route would have enabled. nel. However, these no-cloning limitations can be circum- vented if quantum information is distributed in the form a single Bell pair of higher fidelity than allowed by any of of known entangled states, which can be used to com- the available constituent paths, as per Fig.1. municate arbitrary quantum information using repeat- until-success entanglement transmission and quantum We present a high-performance software package QuNet, teleportation (Bennett et al., 1993). which implements these ideas, allowing for efficient bench- When combined, in addition, with entanglement swap- marking of large-scale multi-user quantum networks, acco- ping and entanglement purification, quantum communi- modating for both static (e.g ground based) and dynamic cation links can be extended to arbitrary length with (e.g space-based) networks, as well as temporal routing arbitrarily high transmission quality, effectively bypass- and optimisation when quantum memories are available. ing the inevitable transmission noise limitations of the A range of different technologies have been proposed for quantum channel. information distribution and storage in quantum networks Due to these desirable properties, entanglement distri- approaches based on photonic information distribution bution will be arguably the most essential requirement in including polarisation, time-bin, and spatial mode encod- a future quantum internet (Rohde, 2022), with significant ing. potential economic benefits facilitating many essential future quantum technologies (Nielsen and Chuang, 2000) Our graph-based network simulation software can be such as quantum key distribution (QKD) (Bennett and applied in any of these contexts, and extended to include Brassard, 1984; Ekert, 1991) (see Sec. VIII.A), quantum specific details of each (e.g. relevant error mechanisms and state teleportation (Bennett et al., 1993), and most impor- network structure properties). So far, our simulations have tantly distributed quantum (see Sec. VIII.B). focused on the context of photonic qubit distribution, but Here we present some formalisms, insights, and algo- are agnostic to the specific details of information encoding rithmic approaches for how future multi-user quantum during distribution and storage within the nodes. entanglement distribution networks might operate, and It seems inevitable that by mere virtue of photons being highlight the significant conceptual differences between ‘flying qubits’ (which propagate at the speed of light), that how multi-user quantum and digital networks operate, the future quantum internet will be optically mediated by some of which are highly counterintuitive to those coming quantum states of light (Gerry and Knight, 2005). Here from classical networking backgrounds. there are a multitude of possible mechanisms for encoding One of the primary distinctions between quantum and quantum information into optical states. For the purposes classical networks is that entanglement purification en- of our presentation we will primarily refer to examples ables multi-path routing, whereby rather than using a based upon polarisation-encoded single photons, however single shortest path for routing we employ multiple re- the formalism is indeed generally applicable to all manner dundant paths which are subsequently purified down into of quantum communications networks beyond this. 3

II. ENTANGLEMENT DISTRIBUTION NETWORKS 1. Loss channels

In this section, we introduce some basic theoretical tools For a single-qubit state ρˆ, the loss channel is defined we will need to describe scalable entanglement distribution as, networks. We want to describe such networks as generally as possible, so our goal is to use generic tools that apply Eloss(ˆρ) = pρˆ + (1 − p) |vacihvac| , (2.3) comprehensively across different varieties and instances of networks. We therefore take a graph theoretic approach for where |vaci denotes the vacuum state where no qubit representing networks. Specifically, we model our network exists. as a graph of nodes and communication channels, G = (V,E). (2.1) 2. Dephasing channels Here, the graph vertices V represent local nodes, defining The dephasing channel is defined as (Nielsen and end-users, or devices that implement quantum operations Chuang, 2000), (such as entanglement sources, swappers or routers), and E edges between vertices represent quantum communica- Edeph(ˆρ) = pρˆ + (1 − p)ZˆρˆZˆ tion channels. = (2p − 1)ˆρ + (1 − p)(ZˆρˆZˆ +ρ ˆ). (2.4)

A. Bell pairs — A resource for quantum networking Note that in the second line we have algebraically re- arranged the expression to comprise an ideal noiseless In entanglement distribution networks, entangled states component, mixed with some completely dephased com- represent the fundamental underlying resource we wish to ponent. The latter algebraic form turns out to be far more utilise. For qubit-based networks, the archetypal entangled useful when attempting to express such channels in an states are the maximally entangled Bell states between a additive metric form, as we will shortly see. pair of qubits, 1 |Φ±i = √ (|0i |1i ± |1i |0i ), (2.2) 3. Depolarising channels A,B 2 A B A B ± 1 Similarly, a more general form of decoherence is the |Ψ i = √ (|0i |0i ± |1i |1i ). A,B 2 A B A B depolarising channel, These become the basic resource for all operations in the ˆI network. The four states are equivalent as entanglement Edepol(ˆρ) = pρˆ + (1 − p) . (2.5) resources and provide the same utility for elementary 2 network operations. As a known resource state, these It is clear upon inspection that under repeated applica- Bell pairs are not subject to the no-cloning limitation. tions of the depolarising channel, a state evolves towards In addition, due to symmetries in the state, the effect the completely depolarised state. of simple qubit errors (Pauli errors) does not depend on which qubit they act upon, up to a global phase. At each point in time we assume that each graph edge 4. General quantum channels is capable of communicating a single Bell pair between its two end-points. Note that in the above channel types, the channel in Kraus form is decomposed into an unaffected component (with perfect fidelity), and a component which is the B. Quantum channels steady state of the channel. For example, (ˆρ + ZˆρˆZˆ)/2 is the steady state of the dephasing process, since it is In describing our quantum channels, we take a new invariant under Zˆ. Similarly, the completely mixed state approach that naturally adapts the cost-vector analysis of ˆI/2 is the steady-state of the depolarising channel, and classical networking to the regime of quantum networks. |vacihvac| of the loss channel. Specifically, our channels are weighted with vectors of This leads us to a general form for quantum channels additive costs that characterise the accumulation of noise which can be represented in this form, as qubits traverse network paths. We focus on two types of especially important costs: E(ˆρ) = pρˆ + (1 − p)ˆρss, (2.6) decoherence and loss. Although these are the most com- mon forms of noise, the formalism we present can easily where ρˆss is the steady-state of the channel, satisfying, be extended to other arbitrary cost metrics, including non-physical ones such as monetary cost. E(ˆρss) =ρ ˆss. (2.7) 4

Another obvious candidate following this observation is the amplitude damping channel, + Edamp(ˆρ) = pρˆ + (1 − p) |0ih0| , (2.8) |Ψ ⟩ which doesn’t naturally lend itself to modelling photonic channels, but does to atomic or atomic ensemble qubits where an excited state represents the logical ‘1’, and the Bell |Ψ+⟩ ground state the logical ‘0’,

|gi ≡ |0iL , |ei ≡ | i . 1 L (2.9) |Ψ+⟩ Although such qubits are not ‘flying qubits’, they might be employed for intermediate storage in quantum memories and therefore still very relevant for applications in future quantum networks, e.g within the temporal meta-graph Figure 2: Entanglement swapping of two Bell-pairs, using construction presented in Sec. VI.C. a Bell measurement between one half of each, to project the remaining two qubits, which were not previously entangled, into a Bell-pair. 5. State fidelity

A figure of interest in quantifying the quality of commu- 2006) that mode-mismatch at PBS’s naturally results in nicated quantum states is their fidelity, which measures a dephasing error process. the overlap between the expected and actual states, Additionally, the entanglement swapping operation has the effect of accumulating both the success and decoher- F = hψ| E(|ψihψ|) |ψi . (2.10) ence of the two involved Bell pairs into the single resultant one, which arises because Pauli errors com- In practise we may wish to separate measures of state mute across the Bell pair. Thus, when an entanglement degredation into components associated with decoherence swapper is physically implemented, it can be interpreted and loss. Then we can define the fidelity conditional upon in the graph-theoretic formalism as removing the swap- no loss, and the probability of no loss as, ping node, merging its associated edges, and accumulating hψ| E(|ψihψ|) |ψi their edge distance metrics together. Equivalently, costs F 0 = , P 0 simply accumulate addititively as they route across swap- P 0 = 1 − hvac| E(|ψihψ|) |vaci . (2.11) pers.

C. Entanglement swapping D. Entanglement purification Perhaps the most important operation that nodes can implement is entanglement swapping, whereby a Bell mea- The second key ingredient in entanglement distribution surement is performed on two qubits, each taken from networks is entanglement purification, whereby two low- one half of two distinct Bell pairs, thereby projecting the fidelity Bell pairs are reduced into a single higher-fidelity remaining two qubits, which never physically interacted, one. This process can be applied recursively so as to onto a longer-range Bell state. This operation allows short- in principle achieve arbitrarily high fidelities. However, range entanglement distribution links to be unified into given that each application of the protocol reduces two Bell-pairs to one, the number of Bell-pair resource states the preparation of long-range entanglement, shown in n Fig.2. Importantly, a chain of entanglement swapping required to apply n rounds of purification scales as 2 . needn’t be performed sequentially in series, but can be As with entanglement swapping, entanglement purifica- parallelised, thereby reducing quantum memory require- tion can be implemented using CNOT gates, as shown in ments. Fig.3, or optically using polarizing beamsplitters (PBSs), Entanglement swapping can be performed deterministi- as shown in Fig.4, which comes at the cost of non- cally using a CNOT gate, or non-deterministically in the deterministic operations similar to PBS-based Bell mea- photonic context using a polarising beamsplitter (PBS), surements. which implements a partial Bell measurement and is only The photonic implementation shown in Fig.4, when able to resolve two of the four Bell states (Pan et al., applied to a dephasing channel, exhibits the following 1998). In this case, it was shown by (Rohde and Ralph, identities in the fidelity transformation, and its success 5

1.0

0.8

0.6

Figure 3: Entanglement purification of two noisy Bell-pairs out under dephasing channels, using two CNOT gates. F 0.4

Bell pair 0.2 D1 D2 0.0 0.0 0.2 0.4 0.6 0.8 1.0

PBS Fin

Figure 5: Input versus output fidelities for the entanglement Alice Bob purification protocol shown in Fig.4, where both input Bell states are assumed to be identical with fidelity Fin. So long as 1 Figure 4: Entanglement purification of two noisy Bell-pairs Fin > 2 , the protocol increases the output fidelity, Fout > Fin. under dephasing channels, using two polarising beamsplitters (PBS), which implement partial Bell-state projections. graph edges are weighted by costs that obey additivity, such that summing weight along a path through a graph rate, yields an equivalent net cost. Clearly, the probabilities p in

0 F1F2 our dephasing or depolarising channels do not exhibit this F = , property. To overcome this, we recognise that probabilities F1F2 + (1 − F1)(1 − F2) 0 behave multiplicatively, and therefore by converting them P = P1P2[F1F2 + (1 − F1)(1 − F2)]. (2.12) to logarithmic form they become additive. For example, where Fi and Pi denote the fidelity and probability of the taking the example of the dephasing channel from before, two input Bell-pairs, where i ∈ {1, 2}. This relationship we have, is shown in Fig.5. The protocol has the property that so Y 1 pnet = (2pi − 1), long as both input Bell-pairs satisfy F > 2 , the fidelity i of the output Bell-pair will be greater than that of both X input pairs, log(pnet) = log(2pi − 1), (2.14) i 0 1 F > F1,F2 ∀ F1,F2 > . (2.13) 2 whereby now if edges are weighted by the distance param- eters,

di = log(2pi − 1), (2.15) E. Commutativity of quantum channels they accumulate additively. Note that applying single-qubit Pauli errors has an iden- Similarly, loss rates, typically expressed as the proba- tical effect on the resultant two-qubit state, up to global bility of a photon successfully traversing a channel, can phase, regardless which qubit they are applied to. Thus, be converted to logarithmic (e.g decibel, dB) form in an Pauli channels (including the dephasing and depolarising equivalent manner. If the probability of transmission of a channels discussed in Sec. II.B) effectively commute across photon through a channel is given by η, then we obtain the qubits, and similarly to the Bell measurements utilised an additive metric via, in entanglement swapping operations (Sec. II.C). This property is of importance when we introduce cost vectors Y ηnet = ηi, in Sec. II.F, whereby the effect of multiple path segments i characterised by such channels may be accumulated into X log(ηnet) = log(ηi), (2.16) a single net cost for the respective path. i

and as before, the distance parameters, F. Costs as distance metrics

di = − log(ηi), (2.17) We are aiming towards a quantum equivalent of the familiar classical concept of cost vector analysis, whereby behave additively. 6

vi state ρˆ0 is, 0 G ρˆ =ρ ˆ1 ∗ ρˆ2

=ρ ˆ2 ∗ ρˆ1. (3.1) ei,j = (P, F) Given that this operation is non-linear (as seen in Fig.5), the resultant fidelity may depend on the order in vj which purifications are applied. Any such ordering can be represented with a binary tree, where states on branches are purified into their intersecting node. Consider for example the Dür and Deutsch protocols acting on 4 distinct input states ρˆi, Figure 6: Graph representation for an entanglement distribu- ρ ρ ∗ ρ ∗ ρ ∗ ρ , tion network, where a graph G, specified by a set of vertices ˆDür = (ˆ1 ˆ2) (ˆ3 ˆ4) vi, and edges ei,j . Edges represent the communication of noisy ρˆDeutsch =ρ ˆ1 ∗ (ˆρ2 ∗ (ˆρ3 ∗ ρˆ4)), (3.2) Bell pairs (one pair per edge), each characterised by both their own preparation probability P and fidelity F . where the corresponding binary trees are shown in Fig.7. Generally, the total number of purification orderings for n states corresponds to the number of n-leaf binary trees, Using these additive metrics for channels’ decoherence (2n − 3)!!. (3.3) and loss, we weight all graph edges by a tuple of the two (see Fig.6), Clearly, a naïve search for the optimal purification tree is computationally inefficient. However in Sec. III.B, e = (P,F ), (2.18) we demonstrate that for commutative operations (e.g purifications along a common Pauli axis) the resultant where P and F denote a channel’s success probability purified state is independent of ordering. In the more and fidelity in metric form. This tuple, referred to as general case, however, this does not hold and outcomes a cost vector, could of course be expanded to include will be highly order-dependent in general. other foreseeable costs, such as the monetary cost of utilising channels in future large-scale networks when infrastructure cost is of importance. B. Entanglement networks as abelian groups

Let us now consider a simple noise model in which only III. GRAPH REDUCTION Pauli dephasing channels are applied (i.e there is no noise along other Pauli axes). Then we find that the following Given a large network graph it can be useful to reduce algebraic rules hold for our system. Take F (f1, f2) to the overall complexity of the graph topology using graph be the the fidelity after purification for two states with reduction rules that arise from the graph transformations fidelity f1, f2 as given in Eq. 2.12. Then, implemented by elementary operations such as swappers F (f1, f2) = F (f2, f1), and purification. For example, a linear chain of entanglement swappers F (F (f1, f2), f3) = F (f1,F (f2, f3)), has the effect of reducing that chain to a single end- 1 F (f1, ) = f1, to-end entanglement link, and purification operations 2 collapse cyclic subgraphs. These graph reductions can 1 F (f1, 1 − f1) = , (3.4) then be implemented via simple substitution rules applied 2 to subgraphs with the respective topology, as per Fig.8 which in the the domain of [0, 1] allows purification to and Alg.1. form an abelian group. In this section we discuss some of these observations Furthermore, by considering the properties of the en- and how they may be applied. tanglement swapping operation S, we find that,

S(f1,S(f2, f3)) = S(S(f1, f2), f3),

A. Purification trees S(f1, 1) = f1,

S(f1, f2) = S(f2, f1), The purification of an arbitrary number of Bell pairs   2f1 − 4 can be described in terms of an operation that maps two S f1, = 1, (3.5) f − Bell states to one. Given states ρˆ1 and ρˆ2, the purified 2 1 1 7 F F F1 F2 3 4 input : graph G, threshold . output : reduced graph H. begin H = G F(F1, F2) F(F3, F4) repeat H0 = H H = reduce_cycles(H) H = reduce_linear(H) Dur for e ∈ E do if d(e) >  then H = H \ e F(F(F1, F2), F(F3, F4)) until H = H0 F F1 F2 3 F4 return H Algorithm 1: Pseudo-code for entanglement distribution network graph reduction. F(F3, F4) of this result ultimately stems from the commutativity of the errors through the underlying processes, which need F(F2, F(F3, F4)) not hold in general for general error models. For example, Deutsch in the case of general Pauli channels, the need for twirling prevents the fidelity functions from being associative (Dür et al., 1999). F(F1, F(F2, F(F3, F4))) Figure 7: Phylogenetic purification trees for the Dür and Deutsch protocols, representing the ordering in which multiple Bell pairs are purified into a single one. Lines represent noisy C. General reduction strategies Bell pairs, and forks denote purification protocols, where time runs from top to bottom. More generally, the combined effect of an arbitrary sequence of elementary operations and orderings can be reduced to a single cost-vector. In the instances above which is an abelian group under swapping in the domain we were able to derive these analytically owing to their , \ 1 [0 1] 2 . commutative behaviour and determinism in their ordering. Now, considering success probability, we can define, In a more general scenario where operations might not commute and randomisation (e.g via twirling operations) P (p1, p2) = P (p2, p1), is involved, sampling techniques could be applied to find P P p , p , p P p ,P p , p , ( ( 1 2) 3) = ( 1 ( 2 3)) their average case behaviour and hence equivalent cost- P (p1, 1) = p1, (3.6) vector. The greedy multi-path routing algorithm (Alg.2) is an This forms an abelian monoid, example of a graph reduction algorithm that reduces a

ρˆ1 ∗ ρˆ2 =ρ ˆ2 ∗ ρˆ1, sub-graph to an effective end-to-end cost vector. In the future, we anticipate more sophisticated techniques will (ˆρ1 ∗ ρˆ2) ∗ ρˆ3 =ρ ˆ1 ∗ (ˆρ2 ∗ ρˆ3). (3.7) be developed based on the application of graph reduction These properties also hold for the success probabilities identities, which would be applied on the network in ad- as well. In the case of purification for a multi-edge graph, vance to simplify the complexity of subsequent routing there exists a unique reduction, which implies that, algorithms. Alg.1 shows a computationally efficient algo- rithm for graph reduction based upon iterative application ρˆDür =ρ ˆDeutsch. (3.8) of such identities. This approach needn’t be optimal in general since the outcome is dependent on the ordering This unique reduction is of the substitutions, and a full optimisation would in- Qn volve investigating combinations of these. Despite being i=1 Fi F = Qn Qn , (3.9) sub-optimal, applying Alg.1 prior to subsequent rout- Fi + (1 − Fi) i=1 i=1 ing algorithms (e.g greedy shortest-path, as per Alg.2) for the case of fidelity. would allow for better utilisation of the graph regions It is important to note that for more general error mod- and therefore better entanglement resources between the els this relationship no longer holds. The abelian nature end-users. 8

Swapping Purification A

...... k ... Depth k ...... Figure 8: Two graph reduction primitives emerge from our elementary physical devices. Entanglement swapping as a physical primitive, yields reduction rules for mapping linear B sub-graphs to a single pair. Entanglement purification allows a 2-cycle sub-graph to similarly reduce to a single pair.

Breadth IV. ENTANGLEMENT ROUTING STRATEGIES Figure 9: A graph with a regular structure (such as a lat- We now discuss entanglement routing strategies, which tice), or with certain statistical properties (such as random are the ultimate application in graph reduction, where for or percolation graphs), will exhibit area laws, relating their geometry to quality of a final Bell-pair that can be prepared some number of arbitrary user-pairs, we wish to collapse across it. the entire network graph down to the effective cost vec- tors between them. We begin by discussing conventional shortest-path routing, before moving onto multi-path rout- B. Multi-path routing ing, a uniquely quantum routing technique. Ordinary routing problems involve finding the shortest paths between end-users of a network. With quantum A. Shortest-path routing networks however, we are more interested in finding opti- mal path-sets between end-users. This is because paths A graph optimisation algorithm we make heavy use in the represent entanglement links, of, due to its inherent efficiency, is Dijkstra’s shortest- and with purification, we can make use of multiple paths path algorithm (Dijkstra, 1959). For single source and simultaneously to generate high-quality entangled states. destination, A → B, this exhibits worst-case runtime, This more general objective of finding the best sets of paths is known as multi-path routing (Proctor et al., 2018; 2 O(|V | ), (4.1) Sidhu and Kok, 2020), and its goal is to make use of as much of the network as possible. for |V | vertices, which can be reduced to, This motivates the development of analytic laws that characterise how different network areas relate to the costs O(|E| + |V | log |V |), (4.2) associated with routing and purifying entangled states across said areas. for sparse graphs (Fredman and Tarjan, 1984). This generalises to the Vehicle Scheduling Problem for n pairs of sources and destinations, C. Analytic area laws

{Ai → Bi}, i = 1 . . . n, (4.3) Consider the case where we have a strand of vertices of depth d where between each pair of vertices there are b that must be simultaneously minimised. Unlike Dijkstra’s edges, defining a region of the graph as per Fig.9. algorithm, this problem does not scale efficiently with n, Then the log-fidelity between two vertices is given by, and is known to be NP-hard in general. Thus, as a greedy approximation heuristic, multiple applications of single- Qb ! 2 Fi user Dijkstra may be employed instead of performing the log(F ) = log i=1 − 1 . (4.4) Qb F Qb − F full multi-user optimisation. i=1 i + i=1(1 i) 9

input : graph G, source A, destination B, threshold . output : Bell pair ρˆA,B . begin pairs = ∅ repeat g = shortest_path(GA→B ) if d(g) ≤  then ρˆ0 = reduce(g) pairs = pairs ∪ ρˆ0 G = G \ g until d(g) >  ρˆA,B = purify(pairs) return ρˆA,B Algorithm 2: Pseudo-code for the greedy shortest-path-removal algorithm for multi-path entanglement routing.

For depth d, the log-fidelity then becomes,

∞ b b !d−n X n Y Y log(F ) = (−1) log Fi − (1 − Fi) n=0 i=1 i=1 Figure 10: Example execution of the greedy multi-user, multi- b b !n path routing algorithm for 3 user-pairs on a 10 × 10 lattice. Y Y Colour coding denotes which channels are allocated to which · log Fi + (1 − Fi) (4.5) user-pairs by the algorithm. For each user-pair, resultant paths i=1 i=1 are finally purified together, yielding end-to-end entangle- It is clear that the fidelity of the established entangle- ment links of higher fidelity than the individual shortest-paths. ment link scales with depth and width as O(bd). In the Fig. 19 provides a similar example for multi-user temporal case of success probability we can establish a correspond- routing. ing result. The probability of success for swapping down d a chain of length d is Ps where Ps is the swapper success probability. Then the overall success rate scales as, E. Multi-user routing bd Ptot = P , (4.6) Given that multi-path routing reduces a sub-graph of G to an entanglement link between end-users, the multi-user for breadth b. Thus, the failure rate grows exponentially case is equivalent to a graph partitioning problem. in the area of the circuit. Let us assign Gi to each pair of users Ai → Bi. These sub-graphs partition the entire graph, such that, D. Greedy multi-path routing [ G = Gi, Since determining optimal graph regions to allocate to i users is in general computationally hard, we define an al- Gi ∩ Gj = ∅ (i =6 j), (4.7) gorithm based on multiple applications of Dijkstra, which although not optimal in general, provides a highly efficient illustrated in Fig. 11. This yields an algorithmic gener- approximation, whose complexity scales only linearly with alisation of Alg.2 to the multi-user case, provided in the number of users, described in Alg.2. Alg.3. Conceptually, this algorithm iteratively eliminates shortest paths between end-points up to a cutoff thresh- V. THE PHILOSOPHY OF QUANTUM VS. CLASSICAL old. These paths all parse into a purification protocol to NETWORKING reduce the traversed region into a single entanglement link. From our theoretical framework, there emerge a number This is trivially generalised to the multi-user context of distinct conceptual and philosophical principles that with an additional inner loop over the end-user pairs, pro- distinguish multi-path entanglement routing networks viding a computational overhead only linear in the number from conventional digital networks: of users. An example application of the greedy multi-user, multi-path routing algorithm to a lattice network is shown • In classical networks we conceptually desire to use in Fig. 10. the shortest available path within a graph to form a 10

communication link (e.g using a Dijkstra-type short- est path algorithm) whereas in the quantum case G1 G 2 we desire to exploit the optimal subgraph between two points — the subgraph that upon reduction A2 provides the optimal best possible end-to-end cost vector. A1 • Equivalently, in the classical case we wish to min- imise use of the network graph, whereas in the B2 quantum case we want to exploit all of it. • In the multi-user scenario, both multi-user shortest- B path algorithms (in the classical case), and opti- B1 3 mal graph partitioning algorithms (in the quantum case), are NP-hard in general to perform optimally. However, heuristic approximation methods for these have been well studied (and obviously our current classical internet relies heavily on such sub-optimal G A3 3 approximation techniques). G = G ∪ G ∪ G • Multi-path entanglement routing can be considered 1 2 3 conceptually similar to the classical notion of load Figure 11: For multi-user networks, we associate a sub-graph balancing, whereby instead of maximising bandwidth Gi to each pair of users Ai → Bi. These sub-graphs partition by distributing data-packets via redundant routes, the entire graph, and a metric is associated with each sub- we are engaging in decoherence balancing by dis- graph, specifying its quality (e.g effective fidelity). A graph- partitioning algorithm is to employed to find an optimal (or tributing entanglement via redundant routes and approximation thereof) partitioning that satisfies constraints subsequently purifying them into one. imposed on the metric associated with each sub-graph. Shown above is an example for a 3-user network. • Because entanglement purification consumes Bell pairs in order to increase fidelity, it induces a direct trade-off between bandwidth (i.e the rate of Bell- pair distribution) and fidelity, since it necessarily consumes Bell-pairs in the process. ~ ~ input : graph G, sources A, destinations B, threshold • Much like classical resistance networks, adding re- . output : Bell pairs {ρˆ }. sources to a quantum network cannot decrease net- A,~ B~ work performance. Redundant pathways in quantum begin networks are in fact highly desirable since they imply pairs = ∅ additional possibilities for graph reduction/routing. repeat

~g = multi_user_shortest_path(GA~→B~ ) if d(gi) ≤  ∀ i then ρˆ0 = reduce(~g) VI. QUNET: A PACKAGE FOR SIMULATING pairs = pairs ∪ ρˆ0 QUANTUM NETWORKS G = G \ ~g QuNet is open-source software for simulating entangle- until d(g ) >  ∀ i i ment networks and benchmarking entanglement routing ρˆ~ ~ = purify(pairs) A,B algorithms, available at https://peterrohde.github. return ρˆ~ ~ A,B io/QuNet, including source code, documentation, and the Algorithm 3: Pseudo-code for the multi-user demonstration files used to generate the results presented implementation of the iterative shortest-path here. removal algorithm for multi-path entanglement routing. Note that this relies on a multi-user shortest-path subroutine, which are NP-hard in A. Related work and motivation general. However efficient approximations such via sucessive applications of Dijkstra could be Several quantum internet simulators currently exist, employed instead. the most established of which are (in no particular order) NetSquid (https://www.netsquid.org)(Coop- mans et al., 2020), QuNetSim (DiAdamo et al., 2020), 11

SQUANCH (Bartlett, 2018), QuISP (Matsuo, 2019) and reduction, yielding equivalent cost vectors for estab- SimulaQron (Dahlberg and Wehner, 2018). Although lished entanglement links. these packages differ in their methodology, they share the following similarities to some degree: 2. Efficient cost vector analysis algorithms are per- formed on the graph to find optimal routing strate- • Network agents (end-users) hold registers of qubits. gies for establishing these entanglement links in response to end-user requests. • There exists a scheme for relating the local registers in such a way to describe entangled states that are The principle advantage of QuNet’s cost vector approach shared between end-users. is that it does not require direct tracking of quantum states, thereby bypassing some quantum complexity issues, • The evolution of the underlying quantum states of and ensuring compatibility with existing graph theoretic the network is simulated under some combination techniques. of local operations and measurements, usually by QuNet is based on the following design considerations, interfacing the software with an existing quantum and structured as shown in Fig. 12: circuit simulator. 1. QuNet is written in Julia (https://www.julialang. • Noise effects, which are often time sensitive, and or org), a high level language that compiles to high- event broadcasting are implemented with the use of performance native code, interfaces with Python a discrete-time event engine. and C/C++, and can be embedded into interactive • The goal is to test end-user applications, the scope Jupyter (https://www.jupyter.org) notebooks. of which is predominantly low-level communication 2. We ensure scalability for large networks by utilising protocols, or towards the development of a quantum only computationally efficient routines and avoiding protocol stack. complex combinatoric optimisation. Most notably, The primary distinction of QuNet is that it considers a we rely heavily on Dijkstra’s shortest path algorithm, subset of error channels that are expressible in terms of which is highly efficient in graph size. additive cost metrics. This allows us to represent complex 3. Graph independence: although the current quantum networks with a simple set of weighted graphs implementation relies on the Julia LightGraphs (one graph for each cost). QuNet therefore operates at a package (https://www.juliagraphs.org), this is high level of abstraction as opposed to a low-level link designed to be easily interchangeable for any graph layer where the control sequences of individual network library implementing the necessary primitives. A components are implemented. current limitation is that LightGraphs does not In using this approach we are able to exploit existing provide support for multi-graphs. graph theoretic routing algorithms, which are computa- tionally efficient and well-studied. Furthermore, we are 4. Users interface with QuNet using only a QNetwork able to extend these techniques to accommodate for quan- object and its constituent QNode and QChannel ob- tum memories using temporal meta-graphs, described in jects, which are graph library agnostic. Sec. VI.C. A limitation of this approach is that it doesn’t lend itself to modeling arbitrary channels, in particular 5. Dynamic simulations: nodes may not be stationary, non-commutative ones that cannot be expressed as addi- as is the case for satellite nodes, in which case the tive metrics. cost vectors of associated channels dynamically up- date accordingly. QuNet accommodates for different channel types, including free-space and optical fibre B. Design principles links, with their respective decay characteristics.

The goal of QuNet is to perform cost vector analysis 6. Network abstraction: QuNet’s QNode and QChannel in quantum networks, based on user demand, to make types can take arbitrary form, independent of the un- optimal routing decisions. Because QuNet is highly algo- derlying technological implementation. Cost vectors rithmically efficient, it could be employed for overseeing needn’t be restricted to representing device-level quantum networks and making real-time routing decisions properties, but could abstractly represent entire for the purposes of classical control of the network in the device sequences by reducing them to their equiv- response to live user demand. QuNet employs the following alent cost vector. For example, an entire quantum methodology: repeater sequence (Gisin and Thew, 2007; Munro et al., 2008, 2015; Sangouard et al., 2011, 2007) 1. Given a graph with a number of end users, we apply comprising complex control over swapping and pu- sequences of elementary physical operations (no- rification operations could be reduced to a single tably purification and swapping) to perform graph abstract QChannel representing its net effective cost 12

entanglement sources and swapper nodes. This is shown QNetwork in Fig. 14. The reason for this bidirectionality is that entanglement swapping is not a time sensitive operation. QNode QChannel A sequence of swaps needn’t be performed in a specific chronological order. In a similar but unrelated vein, asynchronous links can be manipulated for different timing requirements. For LightGraphs example, if Alice strictly requires that she receive her qubit at a given time(s), then every one of her incoming Figure 12: Users interact with the QuNet package via asynchronous edges that do not satisfy her time condition QNetwork objects, comprising any number of QNode and can be removed. Similarly, if Bob wishes to send a qubit at QChannel objects. QuNet interfaces with the LightGraphs pack- a given time(s), then all his outgoing asynchronous edges age to implement core functionality, which is interchangeable that fail his condition can be removed. The asynchronous for other graph libraries, and which users do not interact with edges chosen by a temporal routing algorithm specifies a directly. routing queue for users.

vector. Similarly a large SneakerNet (Devitt et al., VII. ADVANCED ROUTE OPTIMISATION IN 2016) channel, in which entanglement is physically ENTANGLEMENT DISTRIBUTION NETWORKS USING transported under heavy error correction, can be QUNET represented by a single QChannel representative of overall state decay under that mode of communica- We now showcase the capabilities of QuNet by bench- tion, independent of its internal operation. Thus, a marking our multi-path algorithm against a large selection QNetwork object can represent an entire network at of relevant parameters. For the sake of consistency, we any level of abstraction, ranging down from the de- limit ourselves to the study of square lattice networks, vice level up to high level abstractions of constituent however the methods we use here are readily adaptable sub-networks, backbones, or regions of interest. for arbitrary network topologies and routing strategies. Here, we present investigations on:

• The trade-off between efficiency and fidelity against C. Simulating quantum memories with temporal the maximum number of path purifications. meta-graphs • Competition and congestion effects versus the num- A major problem facing multi-user networks is conges- ber of competing end-users. tion as the number of competing users increases. Obvi- ously, the availability of quantum memories (Gouët and • Percolation effects under random channel failure. Moiseev, 2012; Lvovsky et al., 2009) can easily overcome • Scaling effects in network size. congestion by enabling qubits to wait until channels be- come available for their use. Many conventional multi-user • Temporal routing in the presence of quantum mem- graph optimisation techniques are highly inefficient as the ories. number of users increases, since combinatoric optimisa- tion must be employed. To overcome this, we developed We apply these in the context of square lattice networks a temporal optimisation algorithm based on Dijkstra’s using the greedy multi-path routing algorithm, however algorithm that is highly efficient and bypasses any combi- these are readily applicable to the investigation of other natoric optimisation. network toplogies of routing algorithm variants, making The algorithm and its computational complexity are them highly adaptable for quantum network engineers. described in detail in App.A. The concept of the algo- rithm, based on so-called temporal meta-graphs is shown A. Fidelity vs. bandwidth trade-offs in multi-path routing in Fig. 13. The overall computational complexity of multi-user In Fig. 15 we demonstrate how multi-user network route-finding using temporal meta-graphs scales as, performance varies with network size in terms of average O(M 3V 2), (6.1) cost vectors for different maximum allowed path-usage between end-users. We consider an n × n square lattice where there are M user-pairs in a V -node graph. for n ∈ [10, 30] with randomly chosen user locations. A natural expectation is that temporal links are all fixed We observe that when more paths are used, there is in the same direction. Surprisingly however, temporal links an improvement in average state fidelity but with dimin- could be bidirectional for system comprised of alternating ishing returns. For example, we see a slight increase in 13

G(t=1)

G(t=2) ε ε

asynchronous 2ε 2ε time asynchronous source sink 3ε 3ε memory channels

G(t=3)

Figure 13: A temporal meta-graph is constructed by layering instances of the underlying graph over some number of time-steps, T . Nodes possessing quantum memories have vertical directed edges connecting the node to itself at the next time-step, representing a delay. To find a route from A to B, we construct dummy asynchronous nodes for each. The asynchronous source for A connects outwardly to all nodes A for each time-step. Similarly, the asynchronous sink for B connects inwardly to all nodes B for each time-step. Thus, the asynchronous nodes allow the route-finding algorithm to discover all nodes associated with A and B throughout the entire temporal meta-graph. The incremental weights  guide route-finding to prioritise the earliest available time-slots for a given user. Thus by increasing the overall graph by a factor of T , we remain fully compatible with existing route-finding algorithms based on shortest-path removal, and retain their associated efficiency, without the need for any temporal . Fig. 19 shows an actual example from a QuNet simulation, demonstrating channel allocation to multiple user-pairs under multi-path temporal routing.

fidelity from F2 to F3 (subscript denotes number of paths) The quantity PP is the probability of purification being whereas the efficiency from η2 to η3 effectively goes to zero. employed between end-users, conditional on at least one This behaviour is contextualised by the analytic area laws path being found. Explicitly, this is given by, developed in Sec. IV.C, whereby the fidelity scales with the width and depth of the lattice as O(bd) while efficiency bd scales in terms of success probability Ptot = P . P n≥2 Pn PP = . (7.1) 1 − P0

B. Multi-user, multi-path routing Fig. 16 (bottom) shows the average number of paths Competition between users in a multi-user setting is consumed per user-pair against the number of user-pairs. inevitable in any shared network. As such, understanding how user demand affects overall network performance is For small numbers of users, we see in Fig. 16 (top) extremely useful. that efficiency is low and fidelity is high since many paths Here, we consider a 10 × 10 grid lattice with some are available on average for entanglement purification. number of randomly located user-pairs. Fig. 16 illustrates We note also that efficiency and fidelity flatten at 10 network performance metrics against the number of user- users. This behaviour is explained by noting that the pairs. conditional purification rate PP in the middle figure also Fig. 16 (top) shows how the costs of the greedy multi- flattens at the same point. At this point the probability path algorithm vary with the number of user-pairs in of purification taking place does not change. Hence the terms of average Bell state fidelity (F ), efficiency (η), average costs between successful end-users will not change and end-to-end failure rate (P ). Fig. 16 (middle) shows beyond this threshold despite still-increasing levels of the rates at which end-users find paths between them. competition. 14

Source Source

A Swapper B

A Router

Router Router B

Figure 14: Two examples of entanglement routing between users A and B, where time flows downwards. (top) An alter- nating sequence of entanglement sources and swappers. Here the path between A and B is allowed to route backwards in time since entanglement swapping is time-independent. (bot- tom) A simple sequence of qubit routers, which cannot route backwards in time.

Figure 15: Single-user network performance using greedy multi-path routing against the size of a grid lattice in terms of average Bell state fidelity (F ) and efficiency (η). The subscripts refer to the maximum number of edge-disjoint paths each user pair was allowed to use. Each channel in the network has unit costs. Each data point is averaged over 104 trials.

Figure 16: (top) Multi-user network performance using C. Channel percolation effects greedy multi-path routing against the number of competing user-pairs in terms of average Bell state fidelity (F ) and effi- ciency (η). (middle) Rate of utilisation (Pi) of different path Real-world networks inevitably sometimes fail when numbers i, where P0 is the end-to-end failure rate. PP is the nodes or channels malfunction or over-congest. This leads rate of purification among end-users conditional on at least to the notion of percolation theory in networks (Bollobás one path being found. (bottom) Average number of paths and Riordan, 2006; Kesten, 1982; Stauffer and Aharony, used for each user-pair versus the number of user-pairs. Each 3 1992), whereby communication remains robust provided data point was collected using 5 × 10 samples on 10 × 10 grid failure rates lie below some percolation threshold asso- lattices where all channels have unit costs. The maximum number of paths allowed for each purification is 4. ciated with the topology. Although this is something well-understood in classical networks, the dynamics may vary in quantum networks whereby multi-path routing can be utilised. Fig. 17 (top) shows how the costs of the greedy multi- 15

Figure 17: (top) Multi-user network performance using Figure 18: (top) Multi-user network performance using greedy multi-path routing versus the probability of remov- greedy multi-path routing versus the size of a grid network ing a given channel in terms of average Bell state fidelity (F ) in terms of average Bell state fidelity (F ) and efficiency (η). and efficiency (η). Each data point was collected using 5 × 103 The number of competing end-users is 50. Each channel in samples of 10 × 10 grid lattices where 1 end-user was randomly the network has unit costs. The maximum number of paths chosen, and where each channel has unit costs. The maximum allowed between each user pair is 4. Each data point was number of paths allowed between each end-user is 4. (bottom) collected from 500 trials. (bottom) Average number of paths Average number of paths used between the end-user versus used for each user pair versus the size of the grid network. the probability of edge removal.

D. Network scaling effects

Here we investigate how the performance of our greedy path algorithm vary with the percolation rate in terms routing algorithm varies with network size for a fixed of average Bell state fidelity (F ) and efficiency (η) for number of users. We consider n × n grid lattices where a 10 × 10 lattice topology. Fig. 17 (bottom) shows the n ∈ [10, 150]. associated average number of paths consumed per user- We fix the number of user-pairs at 50, with randomly pair against percolation rate. chosen locations such that the network begins in a fully saturated state of competition allowing us to best observe In the top plot, we observe the fidelity decreasing with how performance improves as the lattice expands and increasing percolation rate as fewer paths become avail- competition for channels decreases. able for purification. Correspondingly, the efficiency in- Fig. 18 (top) shows how costs vary with network size creases as fewer non-deterministic purifications are per- in terms of average Bell state fidelity (F ), and efficiency formed. For high percolation rates (p ≥ 0.5), there is a (η). The bottom plot shows the corresponding average sudden upturn in average fidelity and efficiency. This can number of paths used between end-users. be attributed to post-selection bias upon shorter path We observe that efficiency and fidelity decrease with lengths. Consider that for large percolation rates, paths lattice size. Here there are two competing effects taking between end-users are more likely to exist when they are place: an increase in the average L1-distance between in close proximity. end-users (App.B); and a decrease in congestion due to 16

Figure 19: Example of multi-user, multi-path temporal rout- ing with 3 temporal steps (stacked). Utilised channels are colour coded according to which user-pair they serve. greater path availability, as indicated by the monotonic increase of P2, and to a lesser extent, P3 and P4 in Fig. 18 (bottom). The former effect ultimately dominates, and Figure 20: (top) Multi-user network performance using we see the efficiency and fidelity tend to their minimal greedy multi-path routing versus the maximum depth of a values with increasing grid size. We also see in the bottom temporal meta-graph in terms of the average Bell state fidelity figure that there is a monotonic decrease in the end-to-end (F ), efficiency (η), and end-to-end failure rate (P ). The net- work considered is a 10 × 10 grid lattice with 50 randomly failure rate against lattice size. selected end-user pairs. All network channels have unit costs, and all asynchronous edges have weight T corresponding to their time layer. Each data point was collected using 103 trials. E. Quantum memory The maximum number of paths allowed for each purification is 4. (bottom) Path usage rate versus temporal depth, where Next we repeat the multi-user simulation from the Pn is the probability that n paths are used by the multi-path routing algorithm for a given end-user previous section, but allow users to route through time, where temporal links correspond to holding qubits in quantum memory, as per the temporal meta-graph for- mulation (Sec. VI.C). Fig. 19 illustrates an example of a of non-deterministic purification, with a corresponding such temporal routing. increase in fidelity. We consider a 10 × 10 lattice topology with 50 ran- The two horizontal lines shown in the top figure rep- domly chosen user pairs. Every node is equipped with a resent the asymptotic behaviour of routing costs under quantum memory such that unit costs are incurred for the assumption that as the number of temporal layers holding a state in a single time step. For the asynchronous T → ∞, each end-user effectively faces no competition links we set  = 1. Fig. 20 shows how the average costs when routing. vary with maximum temporal depth. Fig. 20 (bottom) demonstrates that the average end- We observe a spike in average efficiency as maximum to-end failure rate, P0, decreases rapidly with increasing time depth increases. This behaviour is contextualised by time steps. In this example, only T = 4 layers are required the data in the bottom figure: as the maximum depth to virtually eliminate the possibility that users are unable increases from 1, the rate of single path usage between end- to communicate. This implies that only a small number users increases and the average efficiency increases. Later, of layers (T  M) are needed in general to massively as the rates for multi-path usage begin to dominate, aver- increase the combinatoric availability of paths, allowing age efficiency decreases due to the increasing likelihood end-users to bypass congestion. 17

Note that there are multiple avenues in this scenario by which temporal routing can succeed in bypassing con- gestion:

• Routing can take place through quantum memories via temporal channels.

• In the absence of quantum memories, users can wait upon the availability of a temporal layer conducive to routing.

F. Memory percolation effects Figure 21: Temporal compression ratio, Rc, versus the pro- portion of nodes with quantum memory on a 10 × 10 grid In Sec. VII.C, we evaluated the performance of our lattice with 50 randomly chosen user-pairs over T = 8 tempo- multi-path routing algorithm for quantum networks where ral layers, with 103 samples per data-point. random channels were removed. This is closely related to results from edge percolation theory in classical network- ing. Alternately, we can consider temporal percolation G. Temporal compression effects where with some probability quantum memories fail. Recall that in the temporal meta-graph formalism, Next we repeat the simulation from the previous section quantum memories are one-directional channels connect- but make two key changes when calculating Rc. First, ing nodes to themselves at the subsequent time. We con- the two networks in question will have fixed memory sider the case where if a quantum memory fails, it fails percolation rates of p = 0 and p = 1 (all on or all off), for the entire time span of the simulation. A memory with varying numbers of users. Second, for the network percolation therefore corresponds to the elimination of an with p = 1, we will fix half of the end-users in the first entire vertical linear path in Fig. 13. Understanding these temporal plane. The effect of this is that temporal routing effects is important since quantum memories are tech- in this network must necessarily take place in the memory nically difficult and expensive to implement. Naturally, channels. This is in contrast to the previous section where network engineers would like to minimise their use. there was ambiguity about whether a user could route in We consider two networks of identical topology that are time with quantum memories or asynchronous links. T extended in time by = 8 temporal layers (large enough As before, we determine the Rc by considering two net- to guarantee that a fully competitive network can route works of identical topology (10 × 10 lattices) with T = 8 without end-to-end failures). These networks differ in that temporal layers, and 50 user-pairs. Fig. 22 shows the one has no quantum memories while the other has memo- compression ratio against memory percolation rate. ries with some associated temporal percolation rate. For Fig. 22 indicates a positive correlation between the each we consider the maximum temporal depth required number of end-users and Rc. This implies the algorithm for full routing, from which the temporal compression routes users in a smaller time on average for the network ratio, Rc (Eq. A10), is calculated. Fig. 21 shows this ratio with memories compared to the network without memo- against the memory percolation probability. ries. In the saturation limit where the number of end-users A more nuanced description of this is that the perco- is 50, we have Rc = 3.5. This is in stark contrast to the lation probability sweeps between the two extreme cases maximum Rc = 1.1 of Fig. 22. This discrepancy likely corresponding to Eq. A1 (for p = 0) to Eq. A2 (for p = 1) arises in this scenario because memories are guaranteed from App.A respectively. to be used over asynchronous channels, and therefore the Fig. 21 demonstrates a clear positive trend between greedy algorithm is less likely to choose long paths. the proportion of nodes with quantum memory and Rc. This indicates that networks with some proportion of quantum memories are able to route more efficiently than VIII. FURTHER APPLICATIONS those without, quantifying the improvement associated with having memories. From p = 0 to p = 1 we see a Beyond mere characterisation and benchmarking of roughly 10% increase in Rc, meaning that the maximum quantum networks, data provided by QuNet can be ap- time depth required to implement routing is around 10% plied directly to real-world applications for entanglement longer for the network with no memories as opposed to distribution. Here we discuss two such examples — em- the network with full memory availability. ploying QuNet to determine secret key rates for quantum 18

1.0 0.60 0.40 0.50 3000

0.9 0.30 2500 0.20

0.8 2000

0.10 1500 Fidelity 0.7 0.05

1000

0.6 0.01 500

0.5 0 Figure 22: Temporal compression ratio, Rc, provided by the 0.0 0.2 0.4 0.6 0.8 1.0 temporal routing algorithm where all nodes have memory. Efficiency Here we enforce the convention that Alice’s node always starts at the first time layer, while Bob’s time is determined via Figure 23: Density heatmap in fidelity/efficiency space of asynchronous nodes. The primitive network structure is a randomly chosen user-pairs in a 100 × 100 grid network, sam- 10 × 10 grid lattice with 50 randomly chosen end-user pairs, pled over 5000 instances of 50 competing user-pairs. A single where each channel has unit costs. Each data point presented user-pair contributes a single point in the plane, represent- consists of 5 × 103 trials. ing its end-to-end fidelity and efficiency. Superimposed is the tradeoff curve for QKD given by Eq. 8.3, where contour labels denote the secret key rate per user, C. key distribution (QKD), and determining the bandwidth of above-threshold Bell pairs for fault-tolerant distributed where, quantum computation.

Additionally, we demonstrate how QuNet could be used H(x) = −x log2 x − (1 − x) log2(1 − x), (8.4) as a framework for simulating entanglement distribu- tion satellite networks. Our proof of concept is a cost- is the binary entropy, and the error rate ε = 1 − F . Thus evaluation for a simple time-dependent satellite network. for a given secret key rate we can establish a trade-off curve between the required fidelity and efficiency. We can visualise the routing costs for a quantum net- A. Quantum key distribution work as a density plot and overlay a contour of curves for different secret key rates, shown in Fig. 23. Each point in The raw mean Bell pair distribution rate for a single the plot represents the fidelity and efficiency achieved by user within the network is given by, a single user-pair, where the intensity of the point is the relative outcome rate. For a large sample of user-pairs (1 − P0)hηi over many trials, such a plot fully captures the scope of Ru = , (8.1) τ the cost-vector distribution of the network. Visualising network routing costs in the form of a and the net mean Bell pair rate for the entire network heatmap additionally provides insights into cost trade- across all users is, offs across all user-pair configurations in the network. In Fig. 23 we see two dominant curves corresponding to Rn = MRu single- and two-path routing. In Fig. 24 we overlay the M(1 − P0)hηi = , (8.2) scatterplot of this data with analytic curves representing τ competition-free multi-path routing costs for up to four paths. The derivation for these is provided in App.C. where M is the number of user-pairs, P0 is the probability Fig. 25 provides deeper insight into the relationship be- of no paths being found, hηi is the average efficiency, and tween path utilisation and fidelity/efficiency tradeoffs in τ the number of time-steps required to route all users (i.e a multi-user setting. the utilised depth of the temporal meta-graph). For QKD, the secret key rate (C) is related to the fidelity (F ) and raw qubit-rate (R) via, (Nemoto et al., B. Distributed quantum computation 2016), A more exciting future application for the quantum in- C = R · [1 − H(ε)], (8.3) ternet is distributed quantum computation (DQC). The in- 19

1.0 in its qubit resources. This concept is shown in Fig. 26. 3 10 More precisely, we can quantify this as follows. Let fsc(n) denote a computational scaling function (Rohde, 0.9 2022), characterising the net computational power associ- ated with physical computational resources n (measured 102 in say bits, qubits, cores or nodes). Let ni be the compu- 0.8 tational resources held by the ith of N nodes. Then the computational advantage provided by networked compu- Fidelity 0.7 tational nodes relative to unnetworked nodes is,

101 PN  fsc i=1 ni λ = . (8.5) 0.6 PN i=1 fsc(ni) Considering the case where all nodes have identical re- 0.5 100 sources at their disposal this simplifies to, 0.0 0.2 0.4 0.6 0.8 1.0 Efficiency fsc(Nn) λ = . (8.6) Figure 24: Scatterplot of fidelity/efficiency tradeoffs analo- N · fsc(n) gous to Fig. 23, superimposed with the analytic curves (red) derived in App.C. The four red curves show ideal congestion- In the classical case, where fsc = n, we have λ = 1, free tradeoff curves for different numbers of paths utilised in whereas in the best case quantum scenario we have multi-path routing. The blue dots correspond to simulated λ = O(exp(N)). This ratio λ directly relates to the eco- data points, which deviate from these curves as a result of nomic incentive to unify remote computational resources, congestion effects. self-evidently far greater in the quantum computational context. In the context of DQC our requirements are quite dif- centive for unifying geographically disjoint quantum com- ferent than for QKD, and we might instead consider the puters is far greater than that for conventional classical in- rate of pairs above a required fault-tolerance threshold frastructure given the superlinear scaling in their computa- (Fth), tional return upon unification. Furthermore, the prospects of such cloud-based are strengthened Rth = R · P(F ≥ Fth). (8.7) by the possibility of information-theoretically secure ho- This is a quantity which, given a data set for the routed momorphic encryption (Ouyang et al., 2020; Tan et al., costs, is easy to infer by simply counting the data-points 2016) and blind quantum computing (Broadbent et al., that meet or exceed the required fidelity. 2009), which are either impractical (in the former case) or impossible (in the latter case) in the classical context. For n unified classical computing nodes we expect an C. Space-based quantum networks ∼ n-fold gain in their unified computational power. How- ever the computational return on monetary investment QuNet accommodates for dynamic nodes and channels is roughly invariant under unification given that n nodes and, in principle, could be used as a high-level tool for also cost n times as much. simulating and benchmarking entanglement distribution This observation changes in the quantum regime. Con- satellite networks. (Yin et al., 2020) In this section, we sidering a quantum algorithm with exponential scaling model a basic satellite network and demonstrate how the as an example: When operating independently we make costs of distributing entanglement between an end-user the same observation as before, however when unified the pair vary in time. This network is shown in Fig. 27. It factor of n shifts into the exponent creating a superlinear consists of two ground nodes and a satellite node that return on investment. However this can only be realised tracks overhead at constant velocity. when the underlying network is also quantum. Channels S ↔ A and S ↔ B are atmospheric free- space links. We employ a simple model for efficiency and A simple model for realising this is in the measurement fidelity through atmospheric channels, beginning with a based model using graph states (Raussendorf and Briegel, model for effective atmospheric depth, 2001; Raussendorf et al., 2003). Where n nodes each   to hold a lattice graph state, shared Bell pairs (which h − h0 ρ(h) = ρ0 · exp − , (8.8) are equivalently 2-qubit graph states themselves) can be H utilised to mediate fusing them together in a patchwork manner. Now rather than n instances of smaller quantum where ρ(h) is the atmospheric density at altitude h, and computers, we have a single one with an n-fold increase ρ0 and H characterise density at ground level and the 20

1 user pairs, 1 max paths 1 user pairs, 2 max paths 1 user pairs, 4 max paths 1.0 1.0 1.0

0.9 0.9 0.9

0.8 0.8 0.8 Fidelity Fidelity Fidelity 0.7 0.7 0.7

0.6 0.6 0.6

102

0.5 0.5 0.5 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 Efficiency Efficiency Efficiency

500 user pairs, 1 max paths 500 user pairs, 2 max paths 500 user pairs, 4 max paths 1.0 1.0 1.0

0.9 0.9 0.9

0.8 0.8 0.8 Fidelity Fidelity Fidelity 0.7 0.7 0.7

101 0.6 0.6 0.6

0.5 0.5 0.5 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 Efficiency Efficiency Efficiency

2500 user pairs, 1 max paths 2500 user pairs, 2 max paths 2500 user pairs, 4 max paths 1.0 1.0 1.0

0.9 0.9 0.9

0.8 0.8 0.8

Fidelity Fidelity Fidelity 100 0.7 0.7 0.7

0.6 0.6 0.6

0.5 0.5 0.5 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 Efficiency Efficiency Efficiency

Figure 25: Fidelity/efficiency tradeoff curves for multi-user, multi-path routing. From left to right the subplots correspond to different numbers of maximum allowed paths. From top to bottom we increase the number of competing user pairs. attenuation with altitude. Since the atmospheric density density, is variable with height, we perform a numerical integral to L d 1 Z establish an effective distance with respect to a standard d = ρ(x sin θ) dx, (8.9) ρ0 0 where L is the Euclidean distance between the ground 21

Bell pairs

Node 1 Node 2 =

Unified graph state

Figure 26: Toy model for distributed quantum computing Figure 28: An evolution of the various costs of the distribu- using graph states. (top) Two geographically separated nodes tion methods between end users A and B in Fig. 27. The best with local lattice graph states. Distributed Bell pairs (cyan) available single path in terms of fidelity is given by the black are equivalently 2-qubit graph states, which may be locally dotted line. fused onto each of the separated lattices using CZ gates (red). (bottom) The equivalent distributed graph state following entanglement distribution and local fusing operations. These distributed unified graph states have greater computational where d0 is a focal length such that η|d=0 = 1. power than the two individual nodes operating independently, For the network in Fig. 28, there are three possible ways or networked via only classical channels. for the end users A and B to distribute entanglement:

• Via the static channel. S • Via the free-space channel.

• Using entanglement purification across both (Sec. II.D).

These are shown in Fig. 28 as the satellite follows its trajectory over time. As expected from the plot, we see the costs from the A B free-space channels are minimised when the satellite is directly overhead at t = 5. Notice also that the fidelity of Figure 27: A schematic of the toy satellite network evaluated the purified route outperforms both of its constituents, in Fig. 28. Nodes A and B are fixed communication pairs but at the expense of higher loss via the non-determinism with a static channel between them. A satellite capable of of the purification protocol. That is, there is a direct trade- transmitting entanglement between A and B moves overhead off between fidelity (quality) and efficiency (quantity or with constant velocity. bandwidth). Though this example is more illustrative than practical, it can be readily extended to larger scale node and satellite, and θ is the azimuth from ground node networks, in particular towards the objective of simulating to satellite. quantum satellite constellations. With dephasing, we assume an exponential decay in the state fidelity with respect to effective distance, param- eterised such that as d → ∞ the state fidelity approaches IX. CONCLUSION 1 2 , In this paper we developed a formalism for entangle- −βd 1 + e ment distribution quantum networks with Bell pairs as F = . (8.10) 2 the entanglement resource. We introduced a novel method For loss, we assume a similar exponential decay as- for quantifying the effects of noisy channels on states with sociated with atmospheric attenuation, in addition to a additive cost-metrics thereby making the framework com- quadratic dispersion term, patible with existing highly optimised shortest-path algo- rithms. We designed an efficient multi-user, multi-path d2 −βd 0 routing algorithm using greedy iterations of series and η = e · 2 , (8.11) (d + d0) parallel graph reductions via entanglement purification 22 and swapping respectively. We also examined the trade- Appendix A: Efficient multi-user temporal routing algorithm offs between the fidelity and bandwidth that emerge from multi-path routing techniques. Finally to demonstrate Referring to Fig. 13, the temporal meta-graph H can our theory, we developed a software package QuNet that be conceptualised as the direct sum of the planar graphs allows users to simulate time-dependent entanglement G representing underlying network, with directed edges networks and benchmark multi-user routing algorithms between corresponding nodes in the temporal direction. over an extensive range of applications. In the case where all nodes have memory this is equiva- There are many options for further research. In this lent to the Cartesian product of the network graph G and paper we predominantly considered grid-lattice networks, a path graph representing forward time evolution, PT , but one could develop graph topologies that are more optimal for achieving end-user demands. Additional one H = G × PT , (A1) could study more advanced graph reduction and multi- G path routing techniques and benchmark them against the for a time-independent graph . simple greedy case. QuNet can also be used as a tool to Alternately, if no nodes have memory there are no evaluate infrastructure costs. For example, a quantum temporal links and we are left with a direct sum of the satellite constellation could form the backbone for a global graphs, quantum network by distributing entanglement between T M far away ground stations. By simulating such a network H˜ = G. (A2) with respect to the anticipated demand, one could then t=1 put a dollar cost value on the implementation. “The day science begins to study non-physical phenom- Following this, user-pair endpoints are fused to create ena, it will make more progress in one decade than in all asynchronous nodes. the previous centuries of its existence.” – Nikola Tesla. The shortest path algorithm is applied to this 3D struc- ture, in which routes can weave both across the planar degrees of freedom and over forward time-steps. So long as a route Ai → Bi exists in Gi for all i the algorithm is guaranteed to find simultaneous routes for all user- pairs in H, but in general will find more optimal ones than by restricting user-pair i to Gi alone. In the worst case, each user-pair utilises a distinct layer, thus T = M. The incrementing multiples of  associated with the edge weights of asynchronous nodes guides the algorithm to prioritise earlier routes, effectively compacting routes in the temporal degree of freedom. Thus, in general T < M. The number of vertices in the temporal meta-graph with asynchronous nodes is given by,

V˜ = TV + 2M, (A3)

where TV denotes the number of vertices in the T slices of the temporal meta-graph, 2M accommodates for the asynchronous nodes, and V denotes the number of vertices in the original (static) graph. Edge weights of the directed vertical temporal channels specify the cost of waiting a ACKNOWLEDGEMENTS single discrete time-step. Thus, the construction allows conflicts between users to be resolved by the shortest path We thank Darcy Morgan, Alexis Shaw, Marika Kiefer- algorithm rather than relying on combinatorics. ova, Zixin Huang, Louis Tessler, Yuval Sanders, Jasmin- The worst-case complexity of performing a single in- der Sidhu, Simon Devitt & Jon Dowling for conversation stance of Dijkstra’s algorithm on the temporal meta-graph (both helpful, unhelpful, meaningless, derogatory, and di- is, atribe). Deepesh Singh was supported by the Australian Research Council Centre of Excellence for Quantum O((TV + 2M)2). (A4) Computation and Communication Technology (project CE110001027). Peter Rohde and Nathan Langford are Note that the worst-case scenario for ensuring conflict- funded by ARC Future Fellowships (projects FT160100397 free routings between all user-pairs is when each user-pair and FT170100399, respectively). is forced into a distinct layer of the temporal meta-graph. 23

Thus, T is upper-bounded by M, and Eq. A4 simplifies theoretical lower bound on this is B = 1, corresponding to, to each user-pair being allocated to a distinct time-step, τ = M. And the theoretical upper bound is B = M, when 2 2 O(M V ). (A5) all successfully communicate in a single-shot, τ = 1. The ratio, And to route all M user-pairs via successive applications of Dijkstra’s algorithm, the net time-complexity is, B(H˜ ) Rc = , (A10) B(H) O(M 3V 2). (A6) between the bandwidths with full memory connectivity Thus the multi-user shortest-path temporal routing (Eq. A1) and none (Eq. A2), effectively defines a compres- algorithm incurs an M 3 overhead on top of Dijkstra’s sion ratio for how much additional bandwidth is enabled algorithm and remains a deterministic polynomial-time by temporal routing through memory channels. algorithm. This technique avoids the exponential overhead associ- Appendix B: Average L -distance between random ated with naïvely performing combinatoric optimisation 1 user-pairs on a square lattice over the distinct time-slots designated to each user-pair, for which T 2M permutations exist, exponential in the Consider two points on an n × n lattice. Then, number of users. It appears that this algorithm is a slightly modified re- ∆x = |x1 − x2|, discovery of the shortest-path temporal routing algorithm ∆y = |y1 − y2|, presented by (Kim and Tanchoco, 1991). L1 = ∆x + ∆y. (B1) This variant has the benefit that the incremental weight- ing of asynchronous node edges guides the underlying Let ∆ = ∆+ + ∆− (for either x or y) represent the shortest-path algorithm to preferentially seek the earliest sum of all distances, where ∆+ contains the terms where − available routing, and the integer multipliers of  specify x2 < x1, and ∆ the ones where x1 < x2. Via symmetry, the time-ordering for each user-pair, implicitly providing ∆+ = ∆−. Then, the routing queue as an output. Note that  is chosen to n−1 n be smaller than the smallest edge weight in the graph, + X X ∆ = (x2 − x1) x =1 x =x +1   min(w(G)), (A7) 1 2 1 n(n2 − 1) = , such that they preferentially guide the algorithm towards 6 n the earliest available time-slots without corrupting the X identification of which path is shortest (identified shortest ∆ = |x1 − x2| path lengths must subsequently be discounted by the x1,x2=1 appropriate multiples of ). = ∆+ + ∆− The maximum index of the traversed nodes provides n(n2 − 1) = . (B2) the worst-case experienced by users, 3 $ % The sum of all available path lengths applies in both max(V~trav) τ = , (A8) x y V and directions, and the sum of these normalised by the number of contributing terms gives the average L1- distance, where V~trav is the set of traversed nodes within the tem- poral graph (not including asynchronous nodes), and V is 2∆ hL1i = the number of nodes in the original non-temporal graph. 2n2 − 1 This not only acts as an indicator of latency and con- 2 n(n2 − 1) = · , (B3) gestion in the network, but also provides a useful guide 3 2n2 − 1 for optimising execution time. Specifically, if τ < T this where the 2n2 − 1 in the denominator discounts the single implies the remaining T −L time-slices are algorithmically term where both points are identical, since we assume redundant for the current problem instance. distinct start and end points. The ratio, M B = , (A9) Appendix C: Derivation of analytic heat map curves τ represents net network bandwidth measured in end-to-end In Fig. 24 of Sec. VIII.A, we visualised the routing costs Bell pairs per time-step across the whole network. The for competing end-users in the form of a heatmap, overlaid 24 with analytic fidelity/efficiency curves for competition- Devitt, Simon J, Andrew D. Greentree, Ashley M. Stephens, free routing. Here we provide the derivation of these, and Rodney Van Meter (2016), “High-speed quan- each corresponding to multipath routing utilising a given tum networking by ship,” Scientific Reports 6, 36163, arXiv:1410.3224. number of paths. DiAdamo, Stephen, Benjamin Zanger Janis Nötzel, and Considering a square lattice network with identical Mehmet Mert Bese (2020), “Qunetsim: A software frame- channel costs for both dephasing and efficiency, the effi- work for quantum networks,” arXiv:2003.06397. ciency and fidelity are related via, Dijkstra, Edsger W (1959), “A note on two problems in con- nexion with graphs,” Numerische Mathematik 1, 269. 1 Dür, W, H.-J. Briegel, J. I. Cirac, and P. Zoller (1999), “Quan- F1 = (E1 + 1). (C1) 2 tum repeaters based on entanglement purification,” Physical Review A 59, 169, arXiv:quant-ph/9808065. The notation (E1,F1) denotes the efficiency and fidelity Ekert, Artur K (1991), “Quantum based on associated with single path routing. Referring to Eq. 2.12 bell’s theorem,” Physical Review Letters 67, 661. describing the efficiency and fidelity of a purified state, Fredman, Michael Lawrence, and Robert E. Tarjan (1984), we use the following recursion relations to establish lower “Fibonacci heaps and their uses in improved network opti- bounds for (Ei,Fi) curves where 1 < i ≤ 4 denotes the mization algorithms,” in IEEE 25th Annual Symposium on number of utilised paths, Foundations of , p. 338. Gerry, Christopher C, and Peter L. Knight (2005), Introductory FiF1 quantum optics (Cambridge University Press). Fi+1 = , F F − F − F Gisin, N, and R. Thew (2007), “Quantum communication,” i 1 + (1 i)(1 1) Nature Photonics 1, 165, arXiv:quant-ph/0703255. Ei+1 = E1Ei(F1Fi + (1 − F1)(1 − Fi)). (C2) Gouët, Jean-Louis Le, and Sergey Moiseev (2012), “Quantum memory,” Journal of Physics B 45, 120201. Note that these approximate relationships neglect path Kesten, Harry (1982), Percolation Theory for Mathematicians competition resulting from multi-path routing (as opposed (Springer). to competion from other users) and assume all utilised Kim, Chang W, and J. M. A. Tanchoco (1991), “Conflict- paths are identical. In reality path competition arising free shortest-time bidirectional agv routeing,” International Journal of Production Research 29, 2377. from multi-path routing will necessarily extend the length Lvovsky, A, B. Sanders, and W. Tittel (2009), “Optical quan- of some paths. Hence these result provide only a lower tum memory,” Nature Photonics 3, 706, arXiv:1002.4659. bound on net cost following purification. Matsuo, Takaaki (2019), “Simulation of a dynamic, ruleset- based quantum network,” arXiv:1908.10758 [quant-ph]. Munro, W J, R. Van Meter, S. G. R. Louis, and K. Nemoto REFERENCES (2008), “High-bandwidth hybrid quantum repeater,” Physi- cal Review Letters 101, 040502, arXiv:0808.0307. Bartlett, Ben (2018), “A distributed simulation framework for Munro, William J, Koji Azuma, Kiyoshi Tamaki, and Kae quantum networks and channels,” arXiv:1808.07047 [quant- Nemoto (2015), “Inside quantum repeaters,” IEEE Journal ph]. of Selected Topics in Quantum 21, 6400813. Bennett, C H, and G. Brassard (1984), “Quantum cryptogra- Nemoto, Kae, Michael Trupke, Simon J. Devitt, Burkhard phy: Public key distribution and coin tossing,” Proceedings Scharfenberger, Kathrin Buczak, Jörg Schmiedmayer, and of the IEEE 1, 175, arXiv:2003.06557. William J. Munro (2016), “Photonic quantum networks Bennett, Charles H, Gilles Brassard, Claude Crépeau, Richard formed from nv-centers,” Scientific Reports 6, 26284, Jozsa, Asher Peres, and William K. Wootters (1993), “Tele- arXiv:1412.5950. porting an unknown quantum state via dual classical and Nielsen, M A, and I. L. Chuang (2000), Quantum Computation einstein-podolsky-rosen channels,” Physical Review Letters and Quantum Information (Cambridge University Press). 70, 1895. Ouyang, Yingkai, Joseph Fitzsimons Si-Hui Tan, and Peter P. Bollobás, Béla, and Oliver Riordan (2006), “Sharp thresh- Rohde (2020), “Homomorphic encryption of linear optics olds and percolation in the plane,” Random Structures & quantum computation on almost arbitrary states of light Algorithms 29, 524. with asymptotically perfect security,” Physical Review Re- Broadbent, A, J. Fitzsimons, and E. Kashefi (2009), “Universal search 2, 013332, arXiv:1902.10972. blind quantum computation,” in 2009 50th Annual IEEE Pan, Jian-Wei, Dik Bouwmeester, Harald Weinfurter, and An- Symposium on Foundations of Computer Science, Vol. 50, ton Zeilinger (1998), “Experimental entanglement swapping: p. 517, arXiv:0807.4154. Entangling photons that never interacted,” Physical Review Coopmans, Tim, Robert Knegjens, Axel Dahlberg, David Letters 80, 3891. Maier, Loek Nijsten, Julio Oliveira, Martijn Papendrecht, Proctor, Timothy J, Paul A. Knott, and Jacob A. Dun- Julian Rabbie, Filip Rozpędek, Matthew Skrzypczyk, Leon ningham (2018), “Multiparameter estimation in networked Wubben, Walter de Jong, Damian Podareanu, Ariana Tor- quantum sensors,” Physical Review Letters 120, 080501, res Knoop, David Elkouss, and Stephanie Wehner (2020), arXiv:1707.06252. “Netsquid, a discrete-event simulation platform for quantum Raussendorf, Robert, and Hans J. Briegel (2001), “A one-way networks,” arXiv:2010.12535. quantum computer,” Physical Review Letters 86, 5188. Dahlberg, Axel, and Stephanie Wehner (2018), “Simulaqron – a Raussendorf, Robert, Daniel E. Browne, and Hans J. Briegel simulator for developing quantum internet software,” Quan- (2003), “Measurement-based quantum computation on tum Science & Technology 4, 015001, arXiv:1712.08032. cluster states,” Physical Review A 68, 10.1103/phys- 25

reva.68.022312, arXiv:quant-ph/0301052. Science 2, 014701, arXiv:1907.06628. Rohde, Peter P (2022), The Quantum Internet (Cambridge Stauffer, D, and A. Aharony (1992), Introduction To Percola- University Press). tion Theory (Taylor & Francis). Rohde, Peter P, and Timothy C. Ralph (2006), “Error models Tan, Si-Hui, Joshua A. Kettlewell, Yingkai Ouyang, Lin Chen, for mode mismatch in linear optics quantum computing,” and Joseph F. Fitzsimons (2016), “A quantum approach Physical Review A 73, 062312, arXiv:quant-ph/0602004. to homomorphic encryption,” Scientific Reports 6, 33467, Sangouard, Nicolas, Christoph Simon, Hugues De Riedmatten, arXiv:1411.5254. and Nicolas Gisin (2011), “Quantum repeaters based on Yin, Juan, Yu-Huai Li, Sheng-Kai Liao, Meng Yang, Yuan atomic ensembles and linear optics,” Reviews in Modern Cao, Liang Zhang, Ji-Gang Ren, Wen-Qi Cai, Wei-Yue Physics 83, 33, arXiv:0906.2699. Liu, Shuang-Lin Li, Rong Shu, Yong-Mei Huang, Lei Deng, Sangouard, Nicolas, Christoph Simon, Jiří Minář, Hugo Li Li, Qiang Zhang, Nai-Le Liu, Yu-Ao Chen, Chao-Yang Lu, Zbinden, Hugues De Riedmatten, and Nicolas Gisin (2007), Xiang-Bin Wang, Feihu Xu, Jian-Yu Wang, Cheng-Zhi Peng, “Long-distance entanglement distribution with single-photon Artur K. Ekert, and Jian-Wei Pan (2020), “Entanglement- sources,” Physical Review A 76, 050301, arXiv:0706.1924. based secure quantum cryptography over 1,120 kilometres,” Sidhu, Jasminder S, and Pieter Kok (2020), “Geometric per- Nature 582, 501. spective on quantum parameter estimation,” AVS Quantum