Quantum internet is near? Scientists ‘teleport’ data between chips for the first time @ A guide to Harvard Referencing: an introduction by CIM @ Using APA style for references and citations & How to choose Research Topic | Crack the Secret Code @ How to Find the Best Research Paper Topics & Finding online sources for your research paper @ How to Start a Research Paper @ Writing a research thesis proposal & Writing a Winning Research Proposal – Ray Boxman & How to Develop a Good Research Topic @ Developing a Research Question & What is research? @ Introduction to academic research & Intro to Research Methods & Methods and methodology @ Correlation Statistics & ´´Quantum networks form an important element of quantum computing and quantum communication systems. Quantum networks facilitate the transmission of information in the form of quantum bits, also called qubits, between physically separated quantum processors. A quantum processor is a small quantum computer being able to perform quantum logic gates on a certain number of qubits. ´´ @ Videos, images and links

Do the downloads!! Share!! The diffusion of very important information and knowledge is essential for the world progress always!! Thanks!!

  • – – > > Mestrado – Dissertation – Tabelas, Figuras e Gráficos – Tables, Figures and Graphics – ´´My´´ Dissertation #Innovation #Countries #Time #Researches #Reference #Graphics #Ages #Age #Mice #People #Person #Mouse #Genetics #PersonalizedMedicine #Diagnosis #Prognosis #Treatment #Disease #UnknownDiseases #Future #VeryEfficientDrugs #VeryEfficientVaccines #VeryEfficientTherapeuticalSubstances #Tests #Laboratories #Investments #Details #HumanLongevity #DNA #Cell #Memory #Physiology #Nanomedicine #Nanotechnology #Biochemistry #NewMedicalDevices #GeneticEngineering #Internet #History #Science #World

Pathol Res Pract. 2012 Jul 15;208(7):377-81. doi: 10.1016/j.prp.2012.04.006. Epub 2012 Jun 8.

The influence of physical activity in the progression of experimental lung cancer in mice

Renato Batista Paceli 1Rodrigo Nunes CalCarlos Henrique Ferreira dos SantosJosé Antonio CordeiroCassiano Merussi NeivaKazuo Kawano NagaminePatrícia Maluf Cury


GRUPO_AF1 – GROUP AFA1 – Aerobic Physical Activity – Atividade Física Aeróbia – ´´My´´ Dissertation – Faculty of Medicine of Sao Jose do Rio Preto

GRUPO AFAN 1 – GROUP AFAN1 – Anaerobic Physical Activity – Atividade Física Anaeróbia – ´´My´´ Dissertation – Faculty of Medicine of Sao Jose do Rio Preto

GRUPO_AF2 – GROUP AFA2 – Aerobic Physical Activity – Atividade Física Aeróbia – ´´My´´ Dissertation – Faculty of Medicine of Sao Jose do Rio Preto

GRUPO AFAN 2 – GROUP AFAN 2 – Anaerobic Physical Activity – Atividade Física Anaeróbia – ´´My´´ Dissertation – Faculty of Medicine of Sao Jose do Rio Preto

Slides – mestrado – ´´My´´ Dissertation – Faculty of Medicine of Sao Jose do Rio Preto



Avaliação da influência da atividade física aeróbia e anaeróbia na progressão do câncer de pulmão experimental – Summary – Resumo – ´´My´´ Dissertation – Faculty of Medicine of Sao Jose do Rio Preto



Lung cancer is one of the most incident neoplasms in the world, representing the main cause of mortality for cancer. Many epidemiologic studies have suggested that physical activity may reduce the risk of lung cancer, other works evaluate the effectiveness of the use of the physical activity in the suppression, remission and reduction of the recurrence of tumors. The aim of this study was to evaluate the effects of aerobic and anaerobic physical activity in the development and the progression of lung cancer. Lung tumors were induced with a dose of 3mg of urethane/kg, in 67 male Balb – C type mice, divided in three groups: group 1_24 mice treated with urethane and without physical activity; group 2_25 mice with urethane and subjected to aerobic swimming free exercise; group 3_18 mice with urethane, subjected to anaerobic swimming exercise with gradual loading 5-20% of body weight. All the animals were sacrificed after 20 weeks, and lung lesions were analyzed. The median number of lesions (nodules and hyperplasia) was 3.0 for group 1, 2.0 for group 2 and 1.5-3 (p=0.052). When comparing only the presence or absence of lesion, there was a decrease in the number of lesions in group 3 as compared with group 1 (p=0.03) but not in relation to group 2. There were no metastases or other changes in other organs. The anaerobic physical activity, but not aerobic, diminishes the incidence of experimental lung tumors.

´´We propose to change the default P-value threshold for statistical significance from 0.05 to 0.005 for claims of new discoveries.´´ https://www.nature.com/articles/s41562-017-0189-z Published:  Daniel J. Benjamin, James O. Berger, […]Valen E. Johnson Nature Human Behaviour volume 2, pages6–10 (2018)

Um mundo além de p < 0,05 « Sandra Merlo – Fonoaudiologia da Fluência

´´My´´ Monografia – Monograph – Induction of benznidazole resistance in human Trypanosoma cruzi isolates – Indução de resistência ao benzonidazol em isolados humanos de Trypanosoma cruzi – UFTM – Federal University of Triangulo Mineiro – Uberaba 

Avaliação da influência da atividade física aeróbia e anaeróbia na progressão do câncer de pulmão experimental – Summary – Resumo

Article – ´´My´´ dissertation – Faculty of Medicine of Sao Jose do Rio Preto

Feedback positivo de pessoas sobre minha dissertação pelo Messenger – Facebook. Positive feedback of people about my dissertation, blog and YouTube channel by Facebook – Messenger. Year – Ano: 2018


My suggestion of a very important Project…

Apostila – Pubmed

A Psicossomática Psicanalítica – Faculty of Medicine of Sao Jose do Rio Preto

ÁCIDO HIALURÔNICO – HIALURONIC ACID – Faculty of Medicine of Sao Jose do Rio Preto

Slides – Mestrado final – ´´My´´ dissertation – Faculty of Medicine of Sao Jose do Rio Preto

Avaliação da influência da atividade física aeróbia e anaeróbia na progressão do câncer de pulmão experimental – Summary – Resumo

O Homem como Sujeito da Realidade da Saúde – Redação – Faculty of Medicine of Sao Jose do Rio Preto

Aula_Resultados – Results – FAMERP – Faculty of Medicine of Sao Jose do Rio Preto

As credenciais da ciência – The credentials of Science – Faculty of Medicine of Sao Jose do Rio Preto BaixarFrases que digitei – Phrases I typed

Frases que digitei – Tecnologia – Informations about blog I did





aging – animal models

Nanomedicine an evolving research (Opinion article I typed)


Will you embrace AI fast enough

MICROBIOLOGIA – MICROBIOLOGY – Faculty of Medicine of Sao Jose do Rio Preto

Genes e Epilepsia – Genes and epilepsy – Faculty of Medicine of Sao Jose do Rio Preto




p-Value – Valor de p





Download the application RT News  

RT Shop 


HomeWorld News

Quantum internet is near? Scientists ‘teleport’ data between chips for the first time

29 Dec, 2019 05:57 / Updated 2 days agoGet short URL

Quantum internet is near? Scientists ‘teleport’ data between chips for the first time

Conceptual artwork on quantum computing. © Getty Images / VICTOR HABBICK VISIONS

  • 532

Follow RT on


Filling up your computer with cat pictures and memes through the quantum internet is apparently one step closer, as scientists managed to instantly “teleport” data between two chips that are not connected for the very first time.

Quantum computers are the dream of modern physics as they could solve problems that are too difficult for today’s most powerful supercomputers, but creating them requires learning how to manage the elusive quantum particles, which are smaller than atoms.

Scientists from the University of Bristol and the Technical University of Denmark have created “chip-scale devices” that are able to utilize quantum physics to manipulate single particles of light. The team’s findings have been published in the journal Nature Physics. 

In one of the experiments with the chips, described as a “breakthrough,” the researchers were able to demonstrate “the quantum teleportation of information” between two programmable devices for the very first time using a physical process known as “quantum entanglement.”ALSO ON RT.COMGhost post! Google creates world’s most powerful computer, NASA ‘accidentally reveals’ …and then publication vanishes

This is a phenomenon in which two or more particles have a similar state, and a change in one means a change in another and the distance between the two is irrelevant.

“We were able to demonstrate a high-quality entanglement link across two chips in the lab, where photons on either chip share a single quantum state,” research co-author Dan Llewellyn said

The flagship demonstration was a two-chip teleportation experiment, whereby the individual quantum state of a particle is transmitted across the two chips after a quantum measurement is performed. This measurement utilizes the strange behavior of quantum physics, which simultaneously collapses the entanglement link and transfers the particle state to another particle already on the receiver chip.

The scientists were also able to create a more complex circuit of four sources – and all of them turned out to be “nearly identical” thanks to the aforementioned entanglement. All in all, the team had a 91 percent success rate in getting the particles ‘teleported’ – which is a very solid result, according to the researchers.

The ability to create and maintain reliable quantum circuits is the key to creating more complex devices, and, ultimately, quantum communication systems and networks able to interact with conventional electronics.

Like this story? Share it with a friend!

  • 532

Follow RT on



Subscribe to RT newsletter to get stories the mainstream media won’t tell youSubscribeFROM OUR PARTNERS3 High School Cheerleaders Die in Christmas Day Crash in AlabamaWoman Facing the Barrel of a Gun Protests Communist ChinaMunicipal Police Chief Arrested Over Mexican Mormon MassacrePodcastsAll podcastsLarry King Now: Robbie & Stephen Amell – Canadian actors and producers.Watching the Hawks: America’s farms: Heartbreak in the heartland


RT News App


© Autonomous Nonprofit Organization “TV-Novosti”, 2005–2019. All rights reserved.Add to home screen

Quantum network

From Wikipedia, the free encyclopediaJump to navigationJump to searchThis article is about the implementation and operation of quantum networks. For a mathematical description of quantum communication channels, see Quantum channel.

Quantum networks form an important element of quantum computing and quantum communication systems. Quantum networks facilitate the transmission of information in the form of quantum bits, also called qubits, between physically separated quantum processors. A quantum processor is a small quantum computer being able to perform quantum logic gates on a certain number of qubits. Quantum networks work in a similar way to classical networks. The main difference, as will be detailed more in later paragraphs, is that quantum networking like quantum computing is better at solving certain problems, such as modeling quantum systems.



Quantum networks for computation[edit]

Networked quantum computing or distributed quantum computing[1][2] works by linking multiple quantum processors through a quantum network by sending qubits in-between them. Doing this creates a quantum computing cluster and therefore creates more computing potential. Less powerful computers can be linked in this way to create one more powerful processor. This is analogous to connecting several classical computers to form a computer cluster in classical computing. Like classical computing this system is scale-able by adding more and more quantum computers to the network. Currently quantum processors are only separated by short distances.

Quantum networks for communication[edit]

In the realm of quantum communication, one wants to send qubits from one quantum processor to another over long distances. This way local quantum networks can be intra connected into a quantum internet. A quantum internet[1] supports many applications, which derive their power from the fact that by creating quantum entangled qubits, information can be transmitted between the remote quantum processors. Most applications of a quantum internet require only very modest quantum processors. For most quantum internet protocols, such as quantum key distribution in quantum cryptography, it is sufficient if these processors are capable of preparing and measuring only a single qubit at a time. This is in contrast to quantum computing where interesting applications can only be realized if the (combined) quantum processors can easily simulate more qubits than a classical computer (around 60[3]). Quantum internet applications require only small quantum processors, often just a single qubit, because quantum entanglement can already be realized between just two qubits. A simulation of an entangled quantum system on a classical computer can not simultaneously provide the same security and speed.

Overview of the elements of a quantum network[edit]

The basic structure of a quantum network and more generally a quantum internet is analogous to a classical network. First, we have end nodes on which applications are ultimately run. These end nodes are quantum processors of at least one qubit. Some applications of a quantum internet require quantum processors of several qubits as well as a quantum memory at the end nodes.

Second, to transport qubits from one node to another, we need communication lines. For the purpose of quantum communication, standard telecom fibers can be used. For networked quantum computing, in which quantum processors are linked at short distances, different wavelengths are chosen depending on the exact hardware platform of the quantum processor.

Third, to make maximum use of communication infrastructure, one requires optical switches capable of delivering qubits to the intended quantum processor. These switches need to preserve quantum coherence, which makes them more challenging to realize than standard optical switches.

Finally, one requires a quantum repeater to transport qubits over long distances. Repeaters appear in-between end nodes.[4] Since qubits cannot be copied, classical signal amplification is not possible. By necessity, a quantum repeater works in a fundamentally different way than a classical repeater.

Elements of a quantum network[edit]

End nodes: quantum processors[edit]

End nodes can both receive and emit information.[4] Telecommunication lasers and parametric down-conversion combined with photodetectors can be used for quantum key distribution. In this case, the end nodes can in many cases be very simple devices consisting only of beamsplitters and photodetectors.

However, for many protocols more sophisticated end nodes are desirable. These systems provide advanced processing capabilities and can also be used as quantum repeaters. Their chief advantage is that they can store and retransmit quantum information without disrupting the underlying quantum state. The quantum state being stored can either be the relative spin of an electron in a magnetic field or the energy state of an electron.[4] They can also perform quantum logic gates.

One way of realizing such end nodes is by using color centers in diamond, such as the nitrogen-vacancy center. This system forms a small quantum processor featuring several qubits. NV centers can be utilized at room temperatures.[4] Small scale quantum algorithms and quantum error correction[5] has already been demonstrated in this system, as well as the ability to entangle two remote[6] quantum processors, and perform deterministic quantum teleportation.[7]

Another possible platform are quantum processors based on Ion traps, which utilize radio-frequency magnetic fields and lasers.[4] In a multispecies trapped-ion node network, photons entangled with a parent atom are used to entangle different nodes.[8] Also, cavity quantum electrodynamics (Cavity QED) is one possible method of doing this. In Cavity QED, photonic quantum states can be transferred to and from atomic quantum states stored in single atoms contained in optical cavities. This allows for the transfer of quantum states between single atoms using optical fiber in addition to the creation of remote entanglement between distant atoms.[4][9][10]

Communication lines: physical layer[edit]

Over long distances, the primary method of operating quantum networks is to use optical networks and photon-based qubits. This is due to optical networks having a reduced chance of decoherence. Optical networks have the advantage of being able to re-use existing optical fiber. Alternately, free space networks can be implemented that transmit quantum information through the atmosphere or through a vacuum.[11]

Fiber optic networks[edit]

Optical networks using existing telecommunication fiber can be implemented using hardware similar to existing telecommunication equipment. This fiber can be either single-mode or multi-mode, with multi-mode allowing for more precise communication.[4] At the sender, a single photon source can be created by heavily attenuating a standard telecommunication laser such that the mean number of photons per pulse is less than 1. For receiving, an avalanche photodetector can be used. Various methods of phase or polarization control can be used such as interferometers and beam splitters. In the case of entanglement based protocols, entangled photons can be generated through spontaneous parametric down-conversion. In both cases, the telecom fiber can be multiplexed to send non-quantum timing and control signals.

Free space networks[edit]

Free space quantum networks operate similar to fiber optic networks but rely on line of sight between the communicating parties instead of using a fiber optic connection. Free space networks can typically support higher transmission rates than fiber optic networks and do not have to account for polarization scrambling caused by optical fiber.[12] However, over long distances, free space communication is subject to an increased chance of environmental disturbance on the photons.[4]

Importantly, free space communication is also possible from a satellite to the ground. A quantum satellite capable of entanglement distribution over a distance of 1,203 km[13] has been demonstrated. The experimental exchange of single photons from a global navigation satellite system at a slant distance of 20,000 km has also been reported.[14] These satellites can play an important role in linking smaller ground-based networks over larger distances.


Long distance communication is hindered by the effects of signal loss and decoherence inherent to most transport mediums such as optical fiber. In classical communication, amplifiers can be used to boost the signal during transmission, but in a quantum network amplifiers cannot be used since qubits cannot be copied – known as the no-cloning theorem. That is, to implement an amplifier, the complete state of the flying qubit would need to be determined, something which is both unwanted and impossible.

Trusted repeaters[edit]

An intermediary step which allows the testing of communication infrastructure are trusted repeaters. Importantly, a trusted repeater cannot be used to transmit qubits over long distances. Instead, a trusted repeater can only be used to perform quantum key distribution with the additional assumption that the repeater is trusted. Consider two end nodes A and B, and a trusted repeater R in the middle. A and R now perform quantum key distribution to generate a key {\displaystyle k_{AR}}{\displaystyle k_{AR}}. Similarly, R and B run quantum key distribution to generate a key {\displaystyle k_{RB}}{\displaystyle k_{RB}}. A and B can now obtain a key {\displaystyle k_{AB}}{\displaystyle k_{AB}} between themselves as follows: A sends {\displaystyle k_{AB}}{\displaystyle k_{AB}} to R encrypted with the key {\displaystyle k_{AR}}{\displaystyle k_{AR}}. R decrypts to obtain {\displaystyle k_{AB}}{\displaystyle k_{AB}}. R then re-encrypts {\displaystyle k_{AB}}{\displaystyle k_{AB}} using the key {\displaystyle k_{RB}}{\displaystyle k_{RB}} and sends it to B. B decrypts to obtain {\displaystyle k_{AB}}{\displaystyle k_{AB}}. A and B now share the key {\displaystyle k_{AB}}{\displaystyle k_{AB}}. The key is secure from an outside eavesdropper, but clearly the repeater R also knows {\displaystyle k_{AB}}{\displaystyle k_{AB}}. This means that any subsequent communication between A and B does not provide end to end security, but is only secure as long as A and B trust the repeater R.

Quantum repeaters[edit]

Diagram for quantum teleportation of a photon

A true quantum repeater allows the end to end generation of quantum entanglement, and thus – by using quantum teleportation – the end to end transmission of qubits. In quantum key distribution protocols one can test for such entanglement. This means that when making encryption keys, the sender and receiver are secure even if they do not trust the quantum repeater. Any other application of a quantum internet also requires the end to end transmission of qubits, and thus a quantum repeater.

Quantum repeaters allow entanglement and can be established at distant nodes without physically sending an entangled qubit the entire distance.[15]

In this case, the quantum network consists of many short distance links of perhaps tens or hundreds of kilometers. In the simplest case of a single repeater, two pairs of entangled qubits are established: {\displaystyle |A\rangle }|A\rangle  and {\displaystyle |R_{a}\rangle }|R_a\rangle located at the sender and the repeater, and a second pair {\displaystyle |R_{b}\rangle }|R_b\rangle and {\displaystyle |B\rangle }|B\rangle  located at the repeater and the receiver. These initial entangled qubits can be easily created, for example through parametric down conversion, with one qubit physically transmitted to an adjacent node. At this point, the repeater can perform a bell measurement on the qubits {\displaystyle |R_{a}\rangle }|R_a\rangle and {\displaystyle |R_{b}\rangle }|R_b\rangle thus teleporting the quantum state of {\displaystyle |R_{a}\rangle }|R_a\rangle onto {\displaystyle |B\rangle }|B\rangle . This has the effect of “swapping” the entanglement such that {\displaystyle |A\rangle }|A\rangle  and {\displaystyle |B\rangle }|B\rangle  are now entangled at a distance twice that of the initial entangled pairs. It can be seen that a network of such repeaters can be used linearly or in a hierarchical fashion to establish entanglement over great distances.[16]

Hardware platforms suitable as end nodes above can also function as quantum repeaters. However, there are also hardware platforms specific only[17] to the task of acting as a repeater, without the capabilities of performing quantum gates.

Error correction[edit]

Main article: Quantum error correction

Error correction can be used in quantum repeaters. Due to technological limitations, however, the applicability is limited to very short distances as quantum error correction schemes capable of protecting qubits over long distances would require an extremely large amount of qubits and hence extremely large quantum computers.

Errors in communication can be broadly classified into two types: Loss errors (due to optical fiber/environment) and operation errors (such as depolarization, dephasing etc.). While redundancy can be used to detect and correct classical errors, redundant qubits cannot be created due to the no-cloning theorem. As a result, other types of error correction must be introduced such as the Shor code or one of a number of more general and efficient codes. All of these codes work by distributing the quantum information across multiple entangled qubits so that operation errors as well as loss errors can be corrected.[18]

In addition to quantum error correction, classical error correction can be employed by quantum networks in special cases such as quantum key distribution. In these cases, the goal of the quantum communication is to securely transmit a string of classical bits. Traditional error correction codes such as Hamming codes can be applied to the bit string before encoding and transmission on the quantum network.

Entanglement purification[edit]

Main article: Entanglement distillation

Quantum decoherence can occur when one qubit from a maximally entangled bell state is transmitted across a quantum network. Entanglement purification allows for the creation of nearly maximally entangled qubits from a large number of arbitrary weakly entangled qubits, and thus provides additional protection against errors. Entanglement purification (also known as Entanglement distillation) has already been demonstrated in Nitrogen-vacancy centers in diamond.[19]


A quantum internet supports numerous applications, enabled by quantum entanglement. In general, quantum entanglement is well suited for tasks that require coordination, synchronization or privacy.

Examples of such applications include quantum key distribution,[20][21] clock synchronization,[22] protocols for distributed system problems such as leader election or byzantine agreement,[4] extending the baseline of telescopes,[23][24] as well as position verification, secure identification and two-party cryptography in the noisy-storage model. A quantum internet also enables secure access to a quantum computer[25] in the cloud. Specifically, a quantum internet enables very simple quantum devices to connect to a remote quantum computer in such a way that computations can be performed there without the quantum computer finding out what this computation actually is (the input and output quantum states can not be measured without destroying the computation, but the circuit composition used for the calculation will be known).

Secure communications[edit]

When it comes to communicating in any form the largest issue has always been keeping your communications private.[26] From when couriers were used to send letters between ancient battle commanders to secure radio communications that exist today the main purpose is to ensure that what a sender sends out to the receiver reaches the receiver unmolested. This is an area in which Quantum Networks particularly excel. By applying a quantum operator that the user selects to a system of information the information can then be sent to the receiver without a chance of an eavesdropper being able to accurately be able to record the sent information without either the sender or receiver knowing. This works because if a listener tries to listen in then they will change the information in an unintended way by listening thereby tipping their hand to the people on whom they are attacking. Secondly, without the proper quantum operator to decode the information they will corrupt the sent information without being able to use it themselves.

Current status[edit]

Quantum internet[edit]

At present, there is no network connecting quantum processors, or quantum repeaters deployed outside a lab.

Quantum key distribution networks[edit]

Several test networks have been deployed that are tailored to the task of quantum key distribution either at short distances (but connecting many users), or over larger distances by relying on trusted repeaters. These networks do not yet allow for the end to end transmission of qubits or the end to end creation of entanglement between far away nodes.

Quantum networkStartBB84BBM92E91DPSCOW
DARPA Quantum Network2001YesNoNoNoNo
SECOCQ QKD network in Vienna2003YesYesNoNoYes
Tokyo QKD network2009YesYesNoYesNo
Hierarchical network in Wuhu, China2009YesNoNoNoNo
Geneva area network (SwissQuantum)2010YesNoNoNoYes

DARPA Quantum NetworkStarting in the early 2000s, DARPA began sponsorship of a quantum network development project with the aim of implementing secure communication. The DARPA Quantum Network became operational within the BBN Technologies laboratory in late 2003 and was expanded further in 2004 to include nodes at Harvard and Boston Universities. The network consists of multiple physical layers including fiber optics supporting phase-modulated lasers and entangled photons as well free-space links.[27][28]SECOQC Vienna QKD networkFrom 2003 to 2008 the Secure Communication based on Quantum Cryptography (SECOQC) project developed a collaborative network between a number of European institutions. The architecture chosen for the SECOQC project is a trusted repeater architecture which consists of point-to-point quantum links between devices where long distance communication is accomplished through the use of repeaters.[29]Chinese hierarchical networkIn May 2009, a hierarchical quantum network was demonstrated in Wuhu, China. The hierarchical network consists of a backbone network of four nodes connecting a number of subnets. The backbone nodes are connected through an optical switching quantum router. Nodes within each subnet are also connected through an optical switch and are connected to the backbone network through a trusted relay.[30]Geneva area network (SwissQuantum)The SwissQuantum network developed and tested between 2009 and 2011 linked facilities at CERN with the University of Geneva and hepia in Geneva. The SwissQuantum program focused on transitioning the technologies developed in the SECOQC and other research quantum networks into a production environment. In particular the integration with existing telecommunication networks, and its reliability and robustness.[31]Tokyo QKD networkIn 2010, a number of organizations from Japan and the European Union setup and tested the Tokyo QKD network. The Tokyo network build upon existing QKD technologies and adopted a SECOQC like network architecture. For the first time, one-time-pad encryption was implemented at high enough data rates to support popular end-user application such as secure voice and video conferencing. Previous large-scale QKD networks typically used classical encryption algorithms such as AES for high-rate data transfer and use the quantum-derived keys for low rate data or for regularly re-keying the classical encryption algorithms.[32]Beijing-Shanghai Trunk LineIn September 2017, a 2000-km quantum key distribution network between Beijing and Shanghai, China, was officially opened. This trunk line will serve as a backbone connecting quantum networks in Beijing, Shanghai, Jinan in Shandong province and Hefei in Anhui province. During the opening ceremony, two employees from the Bank of Communications completed a transaction from Shanghai to Beijing using the network. The State Grid Corporation of China is also developing a managing application for the link.[33] The line uses 32 trusted nodes as repeaters.[34] A quantum telecommunication network has been also put into service in Wuhan, capital of central China’s Hubei Province, which will be connected to the trunk. Other similar city quantum networks along the Yangtze River are planned to follow.[35]

See also[edit]


  1. Jump up to:a b Kimble, H. J. (2008-06-19). “The quantum internet”. Nature453 (7198): 1023–1030. arXiv:0806.4195Bibcode:2008Natur.453.1023Kdoi:10.1038/nature07127ISSN 0028-0836PMID 18563153.
  2. ^ Caleffi, Marcello; Cacciapuoti, Angela Sara; Bianchi, Giuseppe (5 September 2018). Quantum internet: from communication to distributed computing!. NANOCOM ’18 Proceedings of the 5th ACM International Conference on Nanoscale Computing and Communication. Reykjavik, Iceland: ACM. doi:10.1145/3233188.3233224.
  3. ^ Pednault, Edwin; Gunnels, John A.; Nannicini, Giacomo; Horesh, Lior; Magerlein, Thomas; Solomonik, Edgar; Wisnieff, Robert (2017-10-16). “Breaking the 49-Qubit Barrier in the Simulation of Quantum Circuits”. arXiv:1710.05867 [quant-ph].
  4. Jump up to:a b c d e f g h i Van Meter, Rodney (2014). Quantum Networking. Hoboken: Wiley. pp. 127–196. ISBN 9781118648926OCLC 879947342.
  5. ^ Cramer, J.; Kalb, N.; Rol, M. A.; Hensen, B.; Blok, M. S.; Markham, M.; Twitchen, D. J.; Hanson, R.; Taminiau, T. H. (2016-05-05). “Repeated quantum error correction on a continuously encoded qubit by real-time feedback”Nature Communications7: ncomms11526. arXiv:1508.01388Bibcode:2016NatCo…711526Cdoi:10.1038/ncomms11526PMC 4858808PMID 27146630.
  6. ^ Hensen, B.; Bernien, H.; Dréau, A. E.; Reiserer, A.; Kalb, N.; Blok, M. S.; Ruitenberg, J.; Vermeulen, R. F. L.; Schouten, R. N. (2015-10-29). “Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres”. Nature526 (7575): 682–686. arXiv:1508.05949Bibcode:2015Natur.526..682Hdoi:10.1038/nature15759ISSN 0028-0836PMID 26503041.
  7. ^ Pfaff, Wolfgang; Hensen, Bas; Bernien, Hannes; van Dam, Suzanne B.; Blok, Machiel S.; Taminiau, Tim H.; Tiggelman, Marijn J.; Schouten, Raymond N.; Markham, Matthew (2014-08-01). “Unconditional quantum teleportation between distant solid-state qubits”. Science345 (6196): 532–535. arXiv:1404.4369Bibcode:2014Sci…345..532Pdoi:10.1126/science.1253512ISSN 0036-8075PMID 25082696.
  8. ^ Inlek, I. V.; Crocker, C.; Lichtman, M.; Sosnova, K.; Monroe, C. (2017-06-23). “Multispecies Trapped-Ion Node for Quantum Networking”. Physical Review Letters118 (25): 250502. arXiv:1702.01062Bibcode:2017PhRvL.118y0502Idoi:10.1103/PhysRevLett.118.250502PMID 28696766.
  9. ^ Pellizzari, T; Gardiner, SA; Cirac, JI; Zoller, P (1995), “Decoherence, continuous observation, and quantum computing: A cavity QED model”, Physical Review Letters75 (21): 3788–3791, Bibcode:1995PhRvL..75.3788Pdoi:10.1103/physrevlett.75.3788PMID 10059732
  10. ^ Ritter, Stephan; Nölleke, Christian; Hahn, Carolin; Reiserer, Andreas; Neuzner, Andreas; Uphoff, Manuel; Müicke, Martin; Figueroa, Eden; Bochmann, Joerg; Rempe, Gerhard (2012), “An elementary quantum network of single atoms in optical cavities”, Nature484 (7393): 195–200, arXiv:1202.5955Bibcode:2012Natur.484..195Rdoi:10.1038/nature11023PMID 22498625
  11. ^ Gisson, Nicolas; Ribordy, Grégoire; Tittel, Wolfgang; Zbinden, Hugo (2002), “Quantum cryptography”, Reviews of Modern Physics74 (1): 145, arXiv:quant-ph/0101098Bibcode:2002RvMP…74..145Gdoi:10.1103/revmodphys.74.145
  12. ^ Hughes, Richard J; Nordholt, Jane E; Derkacs, Derek; Peterson, Charles G (2002), “Practical free-space quantum key distribution over 10 km in daylight and at night”, New Journal of Physics4 (1): 43, arXiv:quant-ph/0206092Bibcode:2002NJPh….4…43Hdoi:10.1088/1367-2630/4/1/343
  13. ^ Yin, Juan; Cao, Yuan; Li, Yu-Huai; Liao, Sheng-Kai; Zhang, Liang; Ren, Ji-Gang; Cai, Wen-Qi; Liu, Wei-Yue; Li, Bo (2017-07-05). “Satellite-Based Entanglement Distribution Over 1200 kilometers”. Science356 (2017): 1140–1144. arXiv:1707.01339Bibcode:2017arXiv170701339Ydoi:10.1126/science.aan3211PMID 28619937.
  14. ^ Calderaro, Luca; Agnesi, Costantino; Dequal, Daniele; Vedovato, Francesco; Schiavon, Matteo; Santamato, Alberto; Luceri, Vincenza; Bianco, Giuseppe; Vallone, Giuseppe; Villoresi, Paolo (2019). “Towards quantum communication from global navigation satellite system”. Quantum Science and Technology4 (1): 015012. arXiv:1804.05022Bibcode:2019QS&T….4a5012Cdoi:10.1088/2058-9565/aaefd4.
  15. ^ Bouwmeester, Dik; Pan, Jian-Wei; Mattle, Klaus; Eibl, Manfred; Weinfurter, Harald; Zeilinger, Anton (1997), “Experimental quantum teleportation”, Nature390 (6660): 575–579, arXiv:1901.11004Bibcode:1997Natur.390..575Bdoi:10.1038/37539
  16. ^ Sangouard, Nicolas; Simon, Christoph; De Riedmatten, Hugues; Gisin, Nicolas (2011), “Quantum repeaters based on atomic ensembles and linear optics”, Reviews of Modern Physics83 (1): 33–80, arXiv:0906.2699Bibcode:2011RvMP…83…33Sdoi:10.1103/revmodphys.83.33
  17. ^ Nunn, Joshua (2017-05-24). “Viewpoint: A Solid Footing for a Quantum Repeater”Physics10: 55. Bibcode:2017PhyOJ..10…55Ndoi:10.1103/physics.10.55.
  18. ^ Muralidharan, Sreraman; Li, Linshu; Kim, Jungsang; Lutkenhaus, Norbert; Lukin, Mikhail; Jiang, Liang (2016), “Optimal architectures for long distance quantum communication”, Scientific Reports, Nature, 6: 20463, Bibcode:2016NatSR…620463Mdoi:10.1038/srep20463PMC 4753438PMID 26876670
  19. ^ Kalb, Norbert; Reiserer, Andreas A.; Humphreys, Peter C.; Bakermans, Jacob J. W.; Kamerling, Sten J.; Nickerson, Naomi H.; Benjamin, Simon C.; Twitchen, Daniel J.; Markham, Matthew (2017-06-02). “Entanglement Distillation between Solid-State Quantum Network Nodes”. Science356 (6341): 928–932. arXiv:1703.03244Bibcode:2017Sci…356..928Kdoi:10.1126/science.aan0070ISSN 0036-8075PMID 28572386.
  20. ^ Sasaki, Masahide (2017). “Quantum networks: where should we be heading?”. Quantum Science and Technology2 (2): 020501. Bibcode:2017QS&T….2b0501Sdoi:10.1088/2058-9565/aa6994ISSN 2058-9565.
  21. ^ Tajima, A; Kondoh, T; Fujiwara, M; Yoshino, K; Iizuka, H; Sakamoto, T; Tomita, A; Shimamura, E; Asami, S; Sasaki, M (2017). “Quantum key distribution network for multiple applications”. Quantum Science and Technology2 (3): 034003. Bibcode:2017QS&T….2c4003Tdoi:10.1088/2058-9565/aa7154ISSN 2058-9565.
  22. ^ Kómár, P.; Kessler, E. M.; Bishof, M.; Jiang, L.; Sørensen, A. S.; Ye, J.; Lukin, M. D. (2014-06-15). “A quantum network of clocks”. Nature Physics10 (8): 582–587. arXiv:1310.6045Bibcode:2014NatPh..10..582Kdoi:10.1038/nphys3000ISSN 1745-2481.
  23. ^ Gottesman, Daniel; Jennewein, Thomas; Croke, Sarah (2012-08-16). “Longer-Baseline Telescopes Using Quantum Repeaters”. Physical Review Letters109 (7): 070503. arXiv:1107.2939Bibcode:2012PhRvL.109g0503Gdoi:10.1103/PhysRevLett.109.070503ISSN 0031-9007PMID 23006349.
  24. ^ Quantum-Assisted Telescope Arrays
  25. ^ Fitzsimons, Joseph F. (2017-06-15). “Private quantum computation: an introduction to blind quantum computing and related protocols”. NPJ Quantum Information3 (1): 23. arXiv:1611.10107Bibcode:2017npjQI…3…23Fdoi:10.1038/s41534-017-0025-3ISSN 2056-6387.
  26. ^ Mastorakis, Nikos E. Networks and Quantum Computing. Nova Science Publishers, 2012.
  27. ^ Elliot, Chip (2002), “Building the quantum network”, New Journal of Physics4 (1): 46, Bibcode:2002NJPh….4…46Edoi:10.1088/1367-2630/4/1/346
  28. ^ Elliott, Chip; Colvin, Alexander; Pearson, David; Pikalo, Oleksiy; Schlafer, John; Yeh, Henry (2005), “Current status of the DARPA Quantum Network”, Defense and Security, International Society for Optics and Photonics: 138–149
  29. ^ Peev, Momtchil; Pacher, Christoph; Alléaume, Romain; Barreiro, Claudio; Bouda, Jan; Boxleitner, W; Debuisschert, Thierry; Diamanti, Eleni; Dianati, M; Dynes, JF (2009), “The SECOQC quantum key distribution network in Vienna”, New Journal of Physics, IOP Publishing, 11 (7): 075001, Bibcode:2009NJPh…11g5001Pdoi:10.1088/1367-2630/11/7/075001
  30. ^ Xu, FangXing; Chen, Wei; Wang, Shuang; Yin, ZhenQiang; Zhang, Yang; Liu, Yun; Zhou, Zheng; Zhao, YiBo; Li, HongWei; Liu, Dong (2009), “Field experiment on a robust hierarchical metropolitan quantum cryptography network”, Chinese Science Bulletin, Springer, 54 (17): 2991–2997, arXiv:0906.3576Bibcode:2009ChSBu..54.2991Xdoi:10.1007/s11434-009-0526-3
  31. ^ Stucki, Damien; Legre, Matthieu; Buntschu, F; Clausen, B; Felber, Nadine; Gisin, Nicolas; Henzen, L; Junod, Pascal; Litzistorf, G; Monbaron, Patrick (2011). “Long-term performance of the SwissQuantum quantum key distribution network in a field environment”. New Journal of Physics. IOP Publishing. 13 (12): 123001. arXiv:1203.4940Bibcode:2011NJPh…13l3001Sdoi:10.1088/1367-2630/13/12/123001.
  32. ^ Sasaki, M; Fujiwara, M; Ishizuka, H; Klaus, W; Wakui, K; Takeoka, M; Miki, S; Yamashita, T; Wang, Z; Tanaka, A (2011), “Field test of quantum key distribution in the Tokyo QKD Network”, Optics Express, Optical Society of America, 19 (11): 10387–10409, arXiv:1103.3566Bibcode:2011OExpr..1910387Sdoi:10.1364/oe.19.010387PMID 21643295
  33. ^ Zhang, Zhihao (2017-09-30). “Beijing-Shanghai quantum link a “new era””. China Daily.
  34. ^ Courtland, Rachel (26 Oct 2016). “China’s 2,000-km Quantum Link Is Almost Complete”. IEEE Spectrum: Technology, Engineering, and Science News.
  35. ^ “Quantum communication networks put in service in central China”. Xinhua. 2017-10-31.

External links[edit]

showvteQuantum information science
showvteQuantum mechanics
showvteEmerging quantum technologies


Navigation menu






Edit links


  1. Hi there, i read your blog from time to time and i own a similar one and i was just wondering if you get a lot of spam remarks? If so how do you protect against it, any plugin or anything you can suggest? I get so much lately it’s driving me crazy so any support is very much appreciated.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s