Shortcuts to quantum network routing

Communication is a key part of society that we make huge investments in. Each message has to both arrive quickly and use minimal network resources. Moreover, communications must sometimes also remain private, so encryption is used to prevent third parties from listening in. However, standard classical encryption protocols are proven not to be secure against quantum adversaries. With quantum communication we have a method that does provably attains perfect secrecy, even against adversaries with unlimited (quantum) computational power. It is, however, infeasible to have a direct quantum connection between all users of quantum communications. We thus look into the possibilities of a \emph{quantum network}, which is able to connect arbitrary users of the network as if they had direct quantum channel available. Once such a quantum network is built, we will need to route quantum messages effectively to their destination. In this work, we take the first step in studying network structures for quantum networks on a high level, and their accompanying routing algorithms. Current ongoing research into quantum communication with satellites and the possibility of a global network made the case of a quantum network of satellites relevant. We will consider a simplified model where each satellite can perform quantum communication with its immediate neighbours, and can create quantum virtual links that form shortcuts through the network. The first step towards a quantum network that we take is the structure of the network. Using virtual links as shortcuts we can reduce the maximum distance between nodes (the diameter) by an exponential factor. Let $|V|$ be the size of the set of all vertices in a graph, equal to the number of satellites. Then for the case of satellites we give a network structure with the following properties: \begin{itemize} \item The diameter of the graph is $4\log_2\left( \frac{|V|-2}{10} \right) +3 = O(\log |V|)$. This means that the distance between any two nodes in the graph will scale logarithmically in the number of nodes. \item The maximum degree of a vertex is $12\log_2\left( \frac{|V| -2}{10} \right) + 6 = O(\log |V|)$. The degree of a vertex is directly related to the size of its quantum memory. Since quantum memories are currently limited in size, it is important for feasibility reasons that the degree stays low. \end{itemize} With a logarithmic scaling, the diameter and degree scale well for large graphs. This is especially relevant for networks, which can become large. A lower distance between vertices also allows quantum communications to fail less often, in effect decreasing the communication time. We can thus achieve a much smaller diameter by using virtual links, while the degree of each vertex remains low. We furthermore give a routing algorithm for finding the shortest path on this network structure that only uses local information at each vertex to route, where local information is the nearby surroundings of a vertex. The routing algorithm has the following properties: \begin{itemize} \item The space complexity of the algorithm is $O(\log^5 |V|)$ per vertex. A small space complexity implies little memory usage of the algorithm. Since network routers are typically small computers, the small memory requirement allows them to run this algorithm. \item The time complexity of the algorithm is $O(\log^2 |V|)$ per vertex. A small time complexity allows network nodes to compute the next step in the path in minimal time. The time necessary to communicate decreases with decreasing time complexity. \end{itemize} For large enough $|V|$, our algorithm outperforms standard routing algorithms such as Dijkstra's algorithm by an exponential factor. Furthermore, we have proved that the local routing algorithm always gives a shortest path. Local routing transitions well into a real world implementation, so that every network router can make simple decisions for routing.

[1]  Rajashekhar C. Biradar,et al.  A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[2]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[3]  Joachim Gudmundsson,et al.  Augmenting Graphs to Minimize the Diameter , 2013, Algorithmica.

[4]  Yakov Rekhter,et al.  A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.

[5]  Farouk Kamoun,et al.  Hierarchical Routing for Large Networks; Performance Evaluation and Optimization , 1977, Comput. Networks.

[6]  Peter Sanders,et al.  Contraction Hierarchies: Faster and Simpler Hierarchical Routing in Road Networks , 2008, WEA.

[7]  Bo'az Klartag,et al.  Quantum one-way communication can be exponentially stronger than classical communication , 2011, STOC '11.

[8]  S. Pirandola Capacities of repeater-assisted quantum communications , 2016, 1601.00966.

[9]  K. Nemoto,et al.  System Design for a Long-Line Quantum Repeater , 2007, IEEE/ACM Transactions on Networking.

[10]  Charles H. Bennett,et al.  Purification of noisy entanglement and faithful teleportation via noisy channels. , 1995, Physical review letters.

[11]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[12]  Shiri Chechik,et al.  Compact Routing Schemes , 2016, Encyclopedia of Algorithms.

[13]  D. Bruß,et al.  Quantum Router with Network Coding , 2016, 1605.08384.

[14]  J. Cirac,et al.  Quantum State Transfer and Entanglement Distribution among Distant Nodes in a Quantum Network , 1996, quant-ph/9611017.

[15]  Ekert,et al.  "Event-ready-detectors" Bell experiment via entanglement swapping. , 1993, Physical review letters.

[16]  Jonathan L. Gross,et al.  Handbook of Graph Theory, Second Edition , 2013 .

[17]  William I. Gasarch,et al.  On the Finiteness of the Recursive Chromatic Number , 1998, Ann. Pure Appl. Log..

[18]  Andreas Reiserer,et al.  Cavity-based quantum networks with single atoms and optical photons , 2014, 1412.2889.

[19]  M. Markham,et al.  Heralded entanglement between solid-state qubits separated by three metres , 2012, Nature.

[20]  Avinatan Hassidim,et al.  Fast quantum byzantine agreement , 2005, STOC '05.

[21]  Charles T. Loop,et al.  Smooth Subdivision Surfaces Based on Triangles , 1987 .

[22]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[23]  H. J. Kimble,et al.  The quantum internet , 2008, Nature.

[24]  Masahito Hayashi,et al.  Quantum Network Coding , 2006, STACS.

[25]  Piet Van Mieghem,et al.  Data communications networking , 2006 .

[26]  J. Cirac,et al.  Quantum repeaters based on entanglement purification , 1998, quant-ph/9808065.

[27]  Gilles Brassard,et al.  Cryptography in a Quantum World , 2015, SOFSEM.

[28]  Cyril Gavoille,et al.  Routing in distributed networks: overview and open problems , 2001, SIGA.

[29]  David Elkouss,et al.  qu an tph ] 2 1 A ug 2 01 4 Unbounded number of channel uses are required to see quantum capacity , 2014 .

[30]  Chung-Lun Li,et al.  On the minimum-cardinality-bounded-diameter and the bounded-cardinality-minimum-diameter edge addition problems , 1992, Oper. Res. Lett..

[31]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[32]  Ran Raz,et al.  Exponential Separation for One-Way Quantum Communication Complexity, with Applications to Cryptography , 2008, SIAM J. Comput..

[33]  Wolfgang Dür,et al.  Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .

[34]  Peter Drake,et al.  Data structures and algorithms in Java , 2005 .

[35]  D. Matsukevich,et al.  Entanglement of single-atom quantum bits at a distance , 2007, Nature.

[36]  R. Schumann Quantum Information Theory , 2000, quant-ph/0010060.

[37]  Koji Azuma,et al.  Aggregating quantum repeaters for the quantum internet , 2016, 1606.00135.

[38]  Norbert Kalb,et al.  Robust quantum-network memory using decoherence-protected subspaces of nuclear spins , 2016, 1603.01602.

[39]  David Peleg,et al.  Average stretch analysis of compact routing schemes , 2007, Discret. Appl. Math..

[40]  H. Briegel,et al.  Entanglement purification and quantum error correction , 2007, 0705.4165.

[41]  Jieping Ye,et al.  A quantum network of clocks , 2013, Nature Physics.

[42]  Michael Siomau,et al.  Quantum entanglement percolation , 2016, 1602.06152.

[43]  Jürgen Falb,et al.  The Internet Protocol , 2005, The Industrial Information Technology Handbook.

[44]  Yu-Chin Hsu,et al.  Hybrid routing , 1990, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[45]  Martin Rötteler,et al.  Perfect quantum network communication protocol based on classical network coding , 2009, 2010 IEEE International Symposium on Information Theory.

[46]  J. Cirac,et al.  Entanglement distribution in pure-state quantum networks , 2007, 0708.1025.

[47]  Michael Epping,et al.  Large-scale quantum networks based on graphs , 2015, 1504.06599.

[48]  Ziv Bar-Yossef,et al.  Exponential separation of quantum and classical one-way communication complexity , 2004, STOC '04.

[49]  S. Redner,et al.  Introduction To Percolation Theory , 2018 .

[50]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[51]  R. N. Schouten,et al.  Unconditional quantum teleportation between distant solid-state quantum bits , 2014, Science.

[52]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[53]  Nicolas Gisin,et al.  Quantum repeaters based on atomic ensembles and linear optics , 2009, 0906.2699.

[54]  John E. Hopcroft,et al.  The Directed Subgraph Homeomorphism Problem , 1978, Theor. Comput. Sci..

[55]  Martí Cuquet,et al.  Entanglement percolation in quantum complex networks. , 2009, Physical review letters.

[56]  David Peleg,et al.  Compact routing schemes with low stretch factor , 2003, J. Algorithms.

[57]  P. Knight,et al.  Multiparticle generalization of entanglement swapping , 1998 .

[58]  Alastair Kay,et al.  Perfect quantum routing in regular spin networks. , 2010, Physical review letters.

[59]  Jian Li,et al.  Perfect state transfer and efficient quantum routing: a discrete-time quantum walk approach , 2014, 1405.6422.

[60]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[61]  Debbie W. Leung,et al.  Quantum Network Communication—The Butterfly and Beyond , 2010, IEEE Transactions on Information Theory.

[62]  R. Cleve,et al.  Quantum fingerprinting. , 2001, Physical review letters.

[63]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .

[64]  Ran Raz,et al.  Exponential separation of quantum and classical communication complexity , 1999, STOC '99.

[65]  Christopher Chudzicki,et al.  Parallel state transfer and efficient quantum routing on quantum networks. , 2010, Physical review letters.

[66]  W. Munro,et al.  Inside Quantum Repeaters , 2015, IEEE Journal of Selected Topics in Quantum Electronics.

[67]  Michael Epping,et al.  Robust entanglement distribution via quantum network coding , 2016 .

[68]  J. Cirac,et al.  Entanglement percolation in quantum networks , 2006, quant-ph/0612167.

[69]  G. Rempe,et al.  An elementary quantum network of single atoms in optical cavities , 2012, Nature.

[70]  Bei Zeng,et al.  Quantum capacities for entanglement networks , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[71]  S. Bose Quantum communication through an unmodulated spin chain. , 2002, Physical review letters.

[72]  M. Lewenstein,et al.  Quantum Entanglement , 2020, Quantum Mechanics.

[73]  Jonathan L. Gross,et al.  Topological Graph Theory , 1987, Handbook of Graph Theory.

[74]  David Peleg,et al.  Bubbles: adaptive routing scheme for high-speed dynamic networks , 1995, STOC '95.

[75]  Andrew V. Goldberg,et al.  Routing in Networks with Low Doubling Dimension , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[76]  D. Richard Kuhn,et al.  Quantum computing and communication , 2002, Adv. Comput..

[77]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[78]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[79]  D. Gottesman,et al.  Longer-baseline telescopes using quantum repeaters. , 2011, Physical review letters.

[80]  Giuseppe Di Battista,et al.  26 Computer Networks , 2004 .

[81]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[82]  Hoi-Kwong Lo,et al.  Fundamental rate-loss trade-off for the quantum internet , 2016, Nature Communications.

[83]  Eitan M. Gurari,et al.  Introduction to the theory of computation , 1989 .