Quantum NETwork: from theory to practice

被引:6
|
作者
Fang, Kun [1 ]
Zhao, Jingtian [1 ]
Li, Xiufan [1 ]
Li, Yifei [1 ]
Duan, Runyao [1 ]
机构
[1] Inst Quantum Comp, Baidu Res, Beijing 100193, Peoples R China
关键词
quantum network; quantum internet; quantum network architecture; quantum network protocol; quantum network simulation; quantum software toolkit; SINGLE-PHOTON SOURCE; LOOPHOLE-FREE TEST; KEY DISTRIBUTION; ENTANGLEMENT DISTRIBUTION; CLOCK SYNCHRONIZATION; EXPERIMENTAL REALIZATION; HERALDED ENTANGLEMENT; NUMBER STATISTICS; ATOMIC ENSEMBLES; ERROR-CORRECTION;
D O I
10.1007/s11432-023-3773-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The quantum internet is envisioned as the ultimate stage of the quantum revolution, which surpasses its classical counterpart in various aspects, such as the efficiency of data transmission, the security of network services, and the capability of information processing. Given its disruptive impact on the national security and the digital economy, a global race to build scalable quantum networks has already begun. With the joint effort of national governments, industrial participants, and research institutes, the development of quantum networks has advanced rapidly in recent years, bringing the first primitive quantum networks within reach. In this work, we aim to provide an up-to-date review of the field of quantum networks from both theoretical and experimental perspectives, contributing to a better understanding of the building blocks required for the establishment of a global quantum internet. We also introduce a newly developed quantum network toolkit to facilitate the exploration and evaluation of innovative ideas. Particularly, it provides dual quantum computing engines, supporting simulations in both the quantum circuit and measurement-based models. It also includes a compilation scheme for mapping quantum network protocols onto quantum circuits, enabling their emulations on real-world quantum hardware devices. We showcase the power of this toolkit with several featured demonstrations, including a simulation of the Micius quantum satellite experiment, a testing of a four-layer quantum network architecture with resource management, and a quantum emulation of the CHSH game. We hope this work can give a better understanding of the state-of-the-art development of quantum networks and provide the necessary tools to make further contributions along the way.
引用
收藏
页数:45
相关论文
共 50 条
  • [1] Quantum NETwork: from theory to practice
    Kun Fang
    Jingtian Zhao
    Xiufan Li
    Yifei Li
    Runyao Duan
    [J]. Science China Information Sciences, 2023, 66
  • [2] Quantum NETwork: from theory to practice
    Kun FANG
    Jingtian ZHAO
    Xiufan LI
    Yifei LI
    Runyao DUAN
    [J]. Science China(Information Sciences), 2023, 66 (08) : 103 - 147
  • [3] A NETWORK TYPOLOGY - FROM THEORY TO PRACTICE
    WENGER, GC
    [J]. JOURNAL OF AGING STUDIES, 1991, 5 (02) : 147 - 162
  • [4] Quantum power flows: from theory to practice
    Liu, Junyu
    Zheng, Han
    Hanada, Masanori
    Setia, Kanav
    Wu, Dan
    [J]. QUANTUM MACHINE INTELLIGENCE, 2024, 6 (02)
  • [5] Network Analysis and Tourism: From Theory to Practice
    Chhetri, Prem
    [J]. TOURISM RECREATION RESEARCH, 2009, 34 (03) : 334 - 335
  • [6] Editorial: Network coverage: From theory to practice
    He, Shibo
    Shin, Dong-Hoon
    Shu, Yuanchao
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (03) : 539 - 540
  • [7] Network Analysis and Tourism: From Theory to Practice
    Pownall, Ian
    [J]. TOURISM ANALYSIS, 2009, 14 (03): : 417 - 419
  • [8] Network analysis and tourism: from theory to practice
    Goulding, Philip
    [J]. JOURNAL OF POLICY RESEARCH IN TOURISM LEISURE AND EVENTS, 2009, 1 (03) : 281 - 282
  • [9] Editorial: Network coverage: From theory to practice
    Shibo He
    Dong-Hoon Shin
    Yuanchao Shu
    [J]. Peer-to-Peer Networking and Applications, 2019, 12 : 539 - 540
  • [10] Virtual network stacks: from theory to practice
    Matos, Alfredo
    Ferreira, Rui
    Sargento, Susana
    Aguiar, Rui L.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (07) : 738 - 751