skip to main content
10.1145/3558819.3565196acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccsieConference Proceedingsconference-collections
research-article

Introduction and Discussion on Quantum Communication and Quantum Network

Published:26 October 2022Publication History

ABSTRACT

Being one of the major points of research focus since the end of the twentieth century, quantum computation technologies have experienced significant improvements and is under the progress of forming an inter-connected commercial quantum network in recent years. Communication through quantum mechanisms proved to be considerably more efficient and secure than classical communication protocols. Basic quantum communication networks have the primary composition of quantum processing nodes and channels where the interaction between the nodes is satisfied by the entanglement phenomenon. Quantum networking technology is under rapid development currently and is anticipated to receive milestone achievements shortly.

References

  1. PLANCK, M. (1967). On the theory of the energy Distribution law of the normal spectrum. The Old Quantum Theory, 82–90. https: //doi.org/10.1016/b978-0-08-012102-4.50013 - 9.Google ScholarGoogle ScholarCross RefCross Ref
  2. Einstein, A. “Über Einen Die Erzeugung Und Verwandlung Des Lichtes Betreffenden Heuristischen Gesichtspunkt.” Annalen Der Physik, vol. 322, no. 6, 1905, pp. 132–48. Crossref, doi: 10.1002/andp.19053220607.Google ScholarGoogle ScholarCross RefCross Ref
  3. BOHR, N. (1967). On the Constitution of atoms and molecules. Atomic Spectra, 117–144. https://doi.org/10.1016/b978-0-08-012103-1.50014-1.Google ScholarGoogle ScholarCross RefCross Ref
  4. Heisenberg, W. (1985). Über Quantentheoretische Umdeutung kinematischer UND MECHANISCHER Beziehungen. Original Scientific Papers Wissenschaftliche Originalarbeiten, 382–396. https://doi.org/10.1007/978-3-642-61659-4_26.Google ScholarGoogle ScholarCross RefCross Ref
  5. Schrödinger, E. (1926). An undulatory theory of the mechanics of atoms and molecules. Physical Review, 28 (6), 1049–1070. https://doi.org/10.1103/physrev.28.1049.Google ScholarGoogle ScholarCross RefCross Ref
  6. Bennett, Charles H., "Teleporting an Unknown Quantum State via Dual Classical and Einstein-Podolsky-Rosen Channels." Physical Review Letters, vol. 70, no. 13, 1993, pp. 1895–99. Crossref, doi: 10.1103/physrevlett.70.1895.Google ScholarGoogle ScholarCross RefCross Ref
  7. Bouwmeester, Dik, “Experimental Quantum Teleportation.” Nature, vol. 390, no. 6660, 1997, pp. 575–79. Crossref, doi: 10.1038/37539.Google ScholarGoogle ScholarCross RefCross Ref
  8. Zhao, Zhi, "Experimental Demonstration of Five-Photon Entanglement and Open-Destination Teleportation." Nature, vol. 430, no. 6995, 2004, pp. 54–58. Crossref, doi:10.1038/nature02643.Google ScholarGoogle ScholarCross RefCross Ref
  9. C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing", Proceedings of IEEE International Conference on Computers Systems and Signal Processing Bangalore India, pp. 175-179, 1984.Google ScholarGoogle Scholar
  10. D. Mayers, "Unconditional security in quantum cryptography", J. Assoc. Compo Mach., vol. 48, no. 351, 2001.Google ScholarGoogle Scholar
  11. Gottesman, D., "Security of Quantum Key Distribution with Imperfect Devices." Quantum Information and Computation, vol. 4, no. 5, 2004, pp. 325–60. Crossref, doi:10.26421/qic4.5 - 1.Google ScholarGoogle ScholarCross RefCross Ref
  12. Xiao-Min Hu, Cen-Xiao Huang, Yu-Bo Sheng, Lan Zhou, Bi-Heng Liu, Yu Guo, Chao Zhang, Wen-Bo Xing, Yun-Feng Huang, Chuan-Feng Li, and Guang-Can Guo," Long-Distance Entanglement Purification for Quantum Communication" Phys. Rev. Lett. 126, 010503 – Published 8 January 2021.Google ScholarGoogle ScholarCross RefCross Ref
  13. S. Bose, Phys. Rev. Lett. 91, 207901 2003.Google ScholarGoogle Scholar
  14. T. J. Osborne and N. Linden, Phys. Rev. A 69, 052315 2004.Google ScholarGoogle ScholarCross RefCross Ref
  15. M. Avellino, A. J. Fisher, and S. Bose, “Quantum communication in spin systems with long-range interactions” Phys. Rev. A 74, 012321, 31 July 2006.Google ScholarGoogle ScholarCross RefCross Ref
  16. B. Vaucher, D. Burgarth, and S. Bose, J. Opt. B: Quantum Semiclassical Opt. 7, S356 2005.Google ScholarGoogle ScholarCross RefCross Ref
  17. Popkin, Gabriel. “China's Quantum Satellite Achieves ‘Spooky Action’ at Record Distance.” Science, 2017. Crossref, doi:10.1126/science.aan6972.Google ScholarGoogle ScholarCross RefCross Ref
  18. Bennett, C. H., and G. Brassard. “Experimental Quantum Cryptography: The Dawn of a New Era for Quantum Cryptography: The Experimental Prototype Is Working].” ACM SIGACT News, vol. 20, no. 4, 1989, pp. 78–80. Crossref, doi:10.1145/74074.74087.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Chen, Yu-Ao, “An Integrated Space-to-Ground Quantum Communication Network over 4,600 Kilometres.” Nature, vol. 589, no. 7841, 2021, pp. 214–19. Crossref, doi: 10.1038/s41586 - 020 - 03093 - 8.Google ScholarGoogle ScholarCross RefCross Ref
  20. Antonio Manzalini. 11 March, 2020. Quantum Communications in Future Networks and Services. Quantum Reports 2020.Google ScholarGoogle Scholar
  21. Nicolas Gisin, Rob Thew. 1 February, 2008. Quantum communication.Google ScholarGoogle Scholar
  22. M. Pompili 8 February, 2021. Realization of a multi-node quantum network of remote solid-state qubits.Google ScholarGoogle Scholar
  23. Zhengwei Zhou, "Overview of Quantum Information Technique." Chinese Science Bulletin 57.17 (2012): 1498 - 1525. Doi: CNKI: SUN: KXTB.0.2012 - 17 - 002.Google ScholarGoogle ScholarCross RefCross Ref
  24. Peng Chen, "Model of Quantum Tunnel Based on Entanglement State Quantum Communication Network." Acta Physica Sinica 64.04 (2015): 5 - 11. doi: CNKI: SUN: WLXB.0.2015 - 04 - 002.Google ScholarGoogle Scholar

Index Terms

  1. Introduction and Discussion on Quantum Communication and Quantum Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCSIE '22: Proceedings of the 7th International Conference on Cyber Security and Information Engineering
      September 2022
      1094 pages
      ISBN:9781450397414
      DOI:10.1145/3558819

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)24
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format