Scalable Authentication and Optimal Flooding in a Quantum Network
Scalable authentication and optimal flooding in a quantum network 1, 2, 3 3 Naomi R. Solomons, ¤ Alasdair I. Fletcher, ¤ Djeylan Aktas, Natarajan Venkatachalam, Sören Wengerowsky,4 Martin Lonˇcari´c,5 Sebastian P. Neumann,6 Bo Liu,7 Željko Samec,5 Mario Stipˇcevi´c,5 Rupert Ursin,6 Stefano Pirandola,2 John G. Rarity,3 and Siddarth Koduru Joshi3,† 1Quantum Engineering Technology Labs & Quantum Engineering Centre for Doctoral Training, Centre for Nanoscience and Quantum Information, University of Bristol, Bristol, United Kingdom 2Department of Computer Science, University of York, York, YO10 5GH United Kingdom 3Quantum Engineering Technology Labs, H. H. Wills Physics Laboratory & Department of Electrical and Electronic Engineering, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB, United Kingdom 4Institute for Quantum Optics and Quantum Information - Vienna (IQOQI) & Vienna Center for Quantum Science and Technology (VCQ), Vienna, Austria & Institut de Ciencies Fotoniques (ICFO), Barcelona Institute of Science and Technology, 08860 Castelldefels, Barcelona, Spain 5Photonics and Quantum Optics Research Unit, Center of Excellence for Advanced Materials and Sensing Devices, Ruder¯ Boškovi´cInstitute, Zagreb, Croatia 6Institute for Quantum Optics and Quantum Information - Vienna (IQOQI) & Vienna Center for Quantum Science and Technology (VCQ), Vienna, Austria 7College of Advanced Interdisciplinary Studies, NUDT, Changsha, 410073, China The global interest in quantum networks stems from the security guaranteed by the laws of physics. De- ploying quantum networks means facing the challenges of scaling up the physical hardware and, more im- portantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network test-bed, and dis- cuss their usefulness with the aid of example use cases.
[Show full text]