Copyright © 2006 Keio University Applications of an Entangled Quantum Internet Conference on Future Internet Technologies Seoul, Korea June 20, 2008 Rodney.

Slides:



Advertisements
Similar presentations
Introduction to Quantum Teleportation
Advertisements

CSE 413: Computer Networks
Quantum Cryptography Post Tenebras Lux!
Quantum Key Distribution works like an unsophisticated candy machine Scott Shepard Louisiana Tech University.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Quantum Computing Uf H Nick Bonesteel
Universal Optical Operations in Quantum Information Processing Wei-Min Zhang ( Physics Dept, NCKU )
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
1/20 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics Implementation Issues.
Quantum Entanglement David Badger Danah Albaum. Some thoughts on entanglement... “Spooky action at a distance.” -Albert Einstein “It is a problem that.
Future Challenges in Long-Distance Quantum Communication Jian-Wei Pan Hefei National Laboratory for Physical Sciences at Microscale, USTC and Physikalisches.
Architectural Components for a Practical Quantum Computer: John Kubiatowicz University of California at Berkeley Cohorts in Crime: Fred Chong (UC Davis),
Memory Hierarchies for Quantum Data Dean Copsey, Mark Oskin, Frederic T. Chong, Isaac Chaung and Khaled Abdel-Ghaffar Presented by Greg Gerou.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
NETWORKING HARDWARE.
Quantum Public Key Cryptography with Information- Theoretic Security Daniel Gottesman Perimeter Institute.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
GAP Optique Geneva University 1 Quantum Communications at telecom wavelengths Nicolas Gisin Hugo Zbinden Toni Acin, Claudio Bareiro, Sylvain Fasel, J.-D.
Gagan Deep Singh GTBIT (IT) August 29,2009.
CE 4228 DATA COMMUNICATIONS AND NETWORKING Introduction.
Copyright © 2006 Keio University Networking Problems in Using Quantum Repeaters Rodney Van Meter MAUI, 2009/4/16
Textbook  “Data Communications and Networking” 2 nd Edition by Behrouz A. Forouzan  “Data and Computer Communication” 6 th Edition by William Stallings.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Project funded by the Future and Emerging Technologies arm of the IST Programme FET-QIPC -RAMBOQ IST RAMBOQ pRobabilistic gAtes Making Binary.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
QUANTUM TELEPORTATION
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Runtime Authentication in Highly-Secured Network Systems Iftakhar Ahmad Department of Computer Science and Engineering.
The Road to Quantum Computing: Boson Sampling Nate Kinsey ECE 695 Quantum Photonics Spring 2014.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Computing Paola Cappellaro
Quantum Dense coding and Quantum Teleportation
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Architectural Components for a Practical Quantum Computer: John Kubiatowicz University of California at Berkeley Berkeley IAB March 19, 2003.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Build Your Own Quantum Computer for Fun and Profit!
Fall 2001CS 6401 Introduction to Networking Outline Networking History Statistical Multiplexing Performance Metrics.
Copyright © 2006 Keio University Distributed Quantum Error Correction First International Conference on Quantum Error Correction December 19, 2007 Rodney.
Nawaf M Albadia
Is This the Dawn of the Quantum Information Age? Discovering Physics, Nov. 5, 2003.
Copenhagen interpretation Entanglement - qubits 2 quantum coins 2 spins ( spin “up” or spin “down”) Entangled state many qubits: Entangled state:
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile (DCS3) Winter 2009.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Introduction Computer networks: – definition – computer networks from the perspectives of users and designers – Evaluation criteria – Some concepts: –
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Data Communication & Networking. Data communication Not to be confused with telecommunication –Any process that permits the passage from a sender to one.
Suggestion for Optical Implementation of Hadamard Gate Amir Feizpour Physics Department Sharif University of Technology.
Quantum Teleportation What does the future hold?.
Christopher Monroe Joint Quantum Institute and Department of Physics NIST and University of Maryland Quantum Computation and Simulation.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
COMPSCI 290.2: Computer Security
Quantum Information and Everything.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Cryptography Alok.T.J EC 11.
Quantum Information with Continuous Variables
Teleportation Between Distant Atoms
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
A Link Layer Protocol for Quantum Networks
Presentation transcript:

Copyright © 2006 Keio University Applications of an Entangled Quantum Internet Conference on Future Internet Technologies Seoul, Korea June 20, 2008 Rodney Van Meter (Keio) Byung-Soo Choi (Ewha Woman’s University)‏

2 Outline Quantum Key Distribution (QKD)‏ Extending QKD: switching and trusting Quantum Repeaters What would a distributed quantum system be good for? What problems do we have to solve to get there?

3 What's a Qubit? A qubit has two states that can be 0 and 1, such as horizontal and vertical polarization of a photon, or up and down spin of an electron. A qubit can be in a superposition of both states at once! = |0> = |0> + |1> What is this? = |1>

4 Quantum Key Distribution “Tamper-evident” generation of shared random numbers Ideal use: generate bit stream for one-time pad –Mostly, too slow for that Use as Diffie-Hellman replacement Still requires classical authentication

5 Quantum Key Distribution Basic use is <150km, dedicated point-to-point fiber, no amplifiers Can be optically switched & multiplexed w/ other data Longer distance requires: –trusting intermediate nodes, or –entanglement-based quantum repeaters Everything but repeaters in actual use now (thanks, Chip Elliott!)‏

Putting It All Together AliceBob slide from Elliott, BBN

The DARPA Quantum Network slide from Elliott, BBN

8 Going the Distance Longer distance requires: –trusting intermediate nodes, or –entanglement-based quantum repeaters Quantum repeaters are not amplifiers Repeaters use teleportation Teleportation requires entangled states known as Bell pairs

9 Network Link Technology (Qubus)‏ coherent optical source (laser)‏ waveguide homodyne detector transceiver qubit in node 1 transceiver qubit in node 2 millimeters to kilometers Munro, Nemoto, Spiller, New J. Phys. 7, 137 (2005)‏

10 Teleportation 1) Start with an EPR pair, and the qubit to be sent 3) Measure both qubits at source 4) Transmit classical results to destination 5) Local operations recreate original qubit 2) Entangle locally at the source Source Destination 1,1 ? Bennett et al., Phys. Rev. Letters 70, 1993

11 Quantum Repeater Operation Bell State Measurement Station 0 Station 1Station 2 Called entanglement swapping. Fidelity declines; you must purify afterwards

12 Purification Station 0 Station 2

13 Nested Entanglement Swapping Destination

14 Repeater Protocol Stack Van Meter et al., IEEE/ACM Trans. on Networking, Aug (to appear) Physical Entanglement (PE)‏ Entanglement Control (EC)‏ Purification Control (PC)‏ Entang. Swapping Ctl (ESC)‏ Purification Control (PC)‏ Application Distance=1 } } Repeated at Different Distances } End-to-End Only quantum!

15 Four-Hop Protocol Interactions Van Meter et al., IEEE/ACM Trans. on Networking, Aug (to appear) PE EC PC ES C PC App ES C PC PE EC PC ES C PC App ES C PC PE EC PC ES C PC ES C PE EC PC ES C PE EC PC ES C

16 What about Distributed QC? Two types: those that use entanglement, and those that don’t Quantum key distribution can be done either way Entanglement can be either a digital resource, or a gyroscopic reference

17 Long-Distance Entanglement: Digital Uses Quantum Key Distribution Distributed leader election Same as classical distrib. systems: connect –People –Machines –Data/databases...that are in distant locations

18 Gyroscopic (Physical) Uses Entanglement can also be used to improve precision of measurements –Phase/timing –Directional information Better atomic clocks Quantum imaging

19 Gravity Waves? From Goda et al., Nature Physics, GW detector using “squeezed” states. Squeezed states are non-classical, but not entangled; can they be created using entanglement? Does long-distance entanglement help?

20 Problems to Solve Well, repeaters don’t work yet... (QKD does)‏ Lots of networking problems: –Routing of “messages” –Resource management in networks –Protocol design –Network Coding (Net. Info. Flow)‏ –Effective use of wide-area, large-scale entanglement

21 Routing A B Simple....but we don’t yet know the cost metric.

22 Resource Management (QoS?)‏ A B C D A B & C D want to talk. Remember, it’s a distributed computation. Worse, fragile quantum memory means there is a hard real time component. ==>requires circuit switching??? (bottleneck likely is memory per node)‏

23 Protocol Design

24 Conclusions Entangled Quantum Internet will be buildable (eventually)‏ Digital applications include quantum key distribution, leader election, simple connection of distributed resources Gyroscopic uses include possible “Big Science” projects like gravity wave observatories...and there are lots of fun networking problems before we get there

25 AQUA: Advancing Quantum Architecture What will you build your computer out of? with thanks to Chip Elliott, Kohei M. Itoh, Thaddeus Ladd, Kae Nemoto, Bill Munro, Gerard Milburn, C. Walker, Min Yun