Abstract

We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network.

Highlights

  • Quantum information technology applies quantummechanical effects to implement beyond-classical applications

  • Quantum communication that is robust to loss and error can be achieved by using quantum repeaters [7, 14,15,16,17]

  • We focus on designing the communication protocol between two neighboring repeater nodes in order to maximize network performance

Read more

Summary

INTRODUCTION

Quantum information technology applies quantummechanical effects to implement beyond-classical applications. Store, and perform logic on qubits, and these operations allow repeaters to herald successfully transmitted signals and to “distill” purified quantum information states using error correction [16, 18,19,20,21,22,23,24,25,26]. These error-suppression protocols provide robustness against both imperfect transmission and the meddling of an eavesdropper.

PRELIMINARIES
PROTOCOLS FOR DISTRIBUTING ENTANGLEMENT
Meet-In-The-Middle
Sender-Receiver
Midpoint-Source
Further Development of Protocols
SIMULATION OF NETWORK PERFORMANCE
Simulations to Compare Protocols
Hardware-Specific Simulations
Findings
DISCUSSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.