Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

On the Capacity Region of Bipartite and Tripartite Entanglement Switching

Published: 07 March 2023 Publication History

Abstract

We study a quantum entanglement distribution switch serving a set of users in a star topology with equal-length links. The quantum switch, much like a quantum repeater, can perform entanglement swapping to extend entanglement across longer distances. Additionally, the switch is equipped with entanglement switching logic, enabling it to implement switching policies to better serve the needs of the network. In this work, the function of the switch is to create bipartite or tripartite entangled states among users at the highest possible rates at a fixed ratio. Using Markov chains, we model a set of randomized switching policies. Discovering that some are better than others, we present analytical results for the case where the switch stores one qubit per user, and find that the best policies outperform a time division multiplexing policy for sharing the switch between bipartite and tripartite state generation. This performance improvement decreases as the number of users grows. The model is easily augmented to study the capacity region in the presence of quantum state decoherence and associated cut-off times for qubit storage, obtaining similar results. Moreover, decoherence-associated quantum storage cut-off times appear to have little effect on capacity in our identical-link system. We also study a smaller class of policies when the switch stores two qubits per user.

1 Introduction

Multi-qubit entangled states are fundamental building blocks for quantum computation, sensing, and security. Consequently, there is a need for a quantum network that can generate such entanglement on demand between pairs and groups of users [9, 24, 25, 29, 30]. In this article, we study the performance of the simplest multi-user network, a star-topology quantum switch connecting k users, where each user is connected to the switch via a separate link. Bipartite, two-qubit maximally entangled states, i.e., Bell pairs (or EPR states) are generated at a constant rate across each link, with the qubits stored at local quantum memories at each end of the links. As these link-level entangled states start appearing, the switch uses two-qubit Bell-state measurements (BSM) between pairs of locally held qubits and three-qubit Greenberger-Horne-Zeilinger (GHZ) basis measurements between triples of locally held qubits to provide two-qubit and three-qubit entanglement to pairs and triples of users, respectively [23]. The capacity of such a switch to provide these two types of entanglement to the users depends on the switching mechanism, the number of quantum memories and their decoherence rates (assuming that quantum state decoherence imposes a qubit storage cut-off policy implemented at the switch), and the total number of links or users.
We define the bipartite and tripartite capacities of the switch as the highest possible rate at which the device can generate Bell pairs and 3-qubit GHZ states via entanglement swapping, respectively, under a specified entanglement switching policy. For a given number of end nodes and quantum memories, the set of all switching policies define the capacity region of the switch. In this article, we study the capacity region when the switch can store either \(B=1\) or \(B=2\) qubits for each link at any given time. The number of quantum memories available to a link is referred to as its buffer size. We consider a simple time division multiplexing (TDM) policy between the two types of entangled states, along with a class of randomized switching policies. In a TDM policy, the switch performs BSMs a fixed fraction of the time, and three-way GHZ basis measurements for the remaining portion of the time. When properly configured, the randomized switching policies provide higher capacities than TDM. However, the relative difference between the two sets of policies goes to zero as \(k \rightarrow \infty\). We also observe that increasing the number of memories from one to two increases capacity but that the increase diminishes as k increases. Since the locally stored qubits at each end of the link are subject to a noise process that reduces the entanglement between the two qubits, we also explore the effect that decoherence has on capacity. Specifically, we assume that the switch implements a cut-off policy for qubit storage to cope with finite coherence time of quantum memories. Throughout this manuscript, we often implicitly refer to storage cut-off times when referring to studying a system with quantum state decoherence. In the cases of \(B=1\) with and without decoherence, we have simple closed form expressions for capacity whereas for the case of \(B=2\), we provide a partial analysis but our results are mainly numerical.
The remainder of this article is organized as follows: in Section 2, we provide relevant background and related work. In Section 3, we formulate the problem and propose a method for solving it. In Section 4, we present the case where the system has a per-link buffer of size one, and provide analytical and numerical results. In Section 5, we present numerical results for the case where the system has a per-link buffer of size two and observe similar behavior to the buffer size one case. For the \(B=2\) scenario, we also provide a partial analysis. In Section 6, we introduce a simple technique for modeling quantum state decoherence and associated cut-off times on qubit storage, and use it to examine the effect of decoherence on the bipartite-tripartite capacity region for systems with per-link buffer sizes one and two. For the former, we also have analytical results. We make concluding remarks in Section 7.

2 Background and Related Work

Bell states are an integral part of a diverse set of distributed quantum applications, including Quantum Key Distribution (QKD) [2, 10], superdense coding [3], teleportation [1], and distributed quantum computation [15]. Similarly, GHZ states can be used to implement a variety of quantum protocols, such as cryptographic conferencing [12], quantum sensing [11], and multipartite generalization of superdense coding [14]. The advantage of these applications is that they offer functionality that cannot be achieved classically, e.g., information-theoretic security. However, quantum distributed tasks typically require reliable transport of quantum states; this can be a significant challenge due to the exponential rate-versus-distance decay [26]. Quantum repeaters positioned between communicating parties alleviate this issue [13]. In this work, we use the term “quantum switch” instead of “repeater” to indicate that the former is equipped with entanglement switching logic.
A mathematical model for a quantum switch was originally introduced in Reference [31]. There, the authors study a switch that serves only BSMs, but they account for quantum state decoherence, link heterogeneity, and arbitrary buffer sizes (including infinite). In Reference [22], the authors study a multipartite entanglement distribution switch that serves n-partite GHZ states to users, for \(n\ge 3\). In this work, links are assumed to be identical and the effects of state decoherence negligible. In References [22, 31], the authors model the switch as a continuous-time Markov chain (CTMC). In Reference [32], the authors use a discrete-time Markov chain (DTMC) instead, but they focus on the simplest and most idealized scenario of bipartite entanglement switching with an infinite number of quantum memories, unit quantum state fidelities, and identical links. In this work, the authors discover that the DTMC is a logically more accurate model of a quantum switch; at the same time, the authors illustrate the modeling and analytical challenges that arise with using a DTMC, rendering more complex problem formulations (e.g., those that include heterogeneous links, finite buffers, and storage cut-offs) intractable.
In contrast to this prior work, we no longer assume that the switch serves only one type of entangled state, i.e., we allow n to be either two or three, and our goal is to design and evaluate a suitable switching policy. Another difference is that the quantum switch is assumed to have an infinite number of quantum memories in Reference [22], while we consider finite buffer sizes that scale with the number of links. We opt for continuous-time Markov chains as the modeling technique, because of the findings of Reference [32]. It is worth noting that results of the CTMC analyses of References [22, 31] have been partially validated using NetSquid, a discrete-event simulation framework for quantum networks [8]. In particular, the authors of Reference [8] showed that CTMCs yield accurate results for the capacity of a quantum switch when there is no quantum state decoherence (storage cut-off times were not simulated).
Decoherence-associated quantum storage cut-off times [7, 17, 18, 19, 27, 28] play an important role when it comes to the fidelity (“quality”) of quantum states. The qubit storage cut-off time has varying definitions in the literature: while some define it as the quantum memory lifetime (or coherence time), others view it as a configurable parameter that specifies the amount of time a qubit is to be held in memory; in either case, when the storage cut-off time expires, the qubit is deemed unusable and is discarded. We model this (deterministic) qubit discarding procedure by a probabilistic one, by assuming that the qubit is discarded after an exponentially distributed amount of time with mean \(1/\alpha\). This approach was previously explored in Reference [33], where the authors argued that such an approximation is reasonable for realistic use cases (i.e., in scenarios where the rate at which qubits are discarded is at least an order of magnitude smaller than the entanglement generation rate). In this work, we do not study the effects of decoherence and of BSM and GHZ1 measurements on the quality of the resulting quantum states and focus only on the effects of storage cut-offs on the capacity region of the switch.

3 System Description and Assumptions

We consider a switch that connects k users over k separate, identical links. Creation of end-to-end entanglement requires two steps. First, two-qubit Bell states are generated pairwise between a qubit stored locally at the switch and a qubit owned by a user. This can be accomplished using a number of available methods, see, e.g., Reference [21] and references therein for an overview, as well as Appendix A for additional detail. Once such link-level two-qubit entangled states have been created, the switch performs joint (entangling) measurements (over \(j \ge 2\) locally held qubits that are entangled with qubits held by j distinct users), which, if successful, produces a j-qubit maximally entangled state between the corresponding j users. Link-level entanglement generation, as well as entangling measurements, when realized with practical systems, are inherently probabilistic [13]. We assume that only two-user (two-qubit) and three-user (three-qubit) entangled states are created, i.e., BSMs and 3-qubit GHZ basis measurements are done at the switch.2 For simplicity, we assume that these \(j = 2\) or 3 qubit measurements at the switch take negligible time and always succeed. The reasoning for the former assumption is that entanglement generation with remote nodes is likely to be more time consuming than local quantum gates and measurements performed at the central switch node—see, e.g., References [8, 9] for detailed descriptions of timings; see also Reference [5] for GHZ state creation latency data obtained from a simulation. The purpose of the latter assumption is to reduce clutter during the analysis; it may be relaxed if we allow BSMs and 3-qubit GHZ basis measurements to succeed with probabilities \(q_1\) and \(q_2\),3 as the only consequence would be that the bipartite and tripartite capacities \(C_2\) and \(C_3\) would be scaled by their respective factors.
Each link attempts two-qubit entanglement in each time slot of length \(\tau\) seconds, and with probability p, establishes one entangled pair successfully. For simplicity, we model the time to successfully create a link entanglement as an exponential random variable with mean \(1/\mu = \tau /p\). Because all links are identical, they all have the same parameters p and \(\mu\). Once a link-level entanglement is successfully generated, the qubits are stored in memories, one at the user, the second at the switch. We assume that each link can store \(B=1\) or \(B=2\) qubits. We also assume that qubits at the switch can decohere and be discarded, and model decoherence (or quantum storage cut-off) time as an exponential r.v. with mean \(1/\alpha\). Last, when a qubit is stored at the switch, with its entangled pair stored at a user, we refer to this as a stored link entanglement.
We assume all possible bipartite and tripartite user entanglement is of interest and consider two classes of probabilistic policies, one for \(B=1\) and the second for \(B=2\), that provide the flexibility to generate both types of entanglement with arbitrary rates. Policies in both classes incorporate the oldest link entanglement first(OLEF) rule whereby when a link entanglement is created it is always matched up with stored link entanglement when possible rather than be stored. This has the nice consequence, when coupled with the assumption that links are homogeneous but statistically independent, that the system can be modeled by a continuous time Markov chain where the state simply tracks the number of stored EPR pairs for two users. The next section describes the class of policies for \(B=1\) and Section 5 for the class of \(B=2\) policies.

4 System with Per-link Buffer Size One

In this section, we assume that each link can store one qubit in the buffer, so that the per-link buffer size \(B = 1\). We model this system using a CTMC, and by obtaining its stationary distribution, we are able to compute the capacity region of the switch. We discover that it is always possible to configure a randomized policy that outperforms TDM, although as the number of links grows, the advantage of using such a policy diminishes.

4.1 Description

In a system where the switch can make tripartite measurements, we track two variables for each state of the CTMC: each representing a link with a stored qubit. Hence, \((1,1)\) represents the state where two of the k links have a qubit stored, one each. Note that we do not need to keep track of all links individually due to the OLEF rule and link homogeneity assumption. States \((1,0)\) and \((0,0)\) represent cases where only one link has a stored qubit or no link has a qubit, respectively.
The system is fully described in Figure 1. For a variable \(x\in [0,1]\), we use the notation \(\bar{x}\equiv 1-x\). When the system is in state \((0,0)\), new entanglement is generated with rate \(k\mu\); this is the transition rate from \((0,0)\) to \((1,0)\). When the system is in state \((1,0)\), any new entanglement generated on the link that already has one stored qubit causes the switch to drop one of the qubits. New entanglement on other links is generated with rate \((k-1)\mu\), and the switch must decide whether to immediately use the two qubits for a BSM or keep both and wait for a new link entanglement. To generalize the policy as much as possible, we add a policy parameter, \(r_1\in [0,1]\), that specifies the fraction of time the switch performs a BSM. Note that \(r_1=1\) corresponds to the policy of always using qubits for BSMs. While this maximizes the bipartite capacity \(C_2\), it also means that the tripartite capacity \(C_3\) is equal to zero.
Fig. 1.
Fig. 1. CTMC for a system with at least three links and buffer size one for each link. k is the number of links, \(\mu\) is the rate of entanglement generation, and \(r_1\), \(r_2\), and \(r_3\) are parameters that specify the scheduling policy.
Now, suppose that the system is in state \((1,1)\) and a third link generates an entanglement. This event occurs with rate \((k-2)\mu\). The switch has two choices: either use all three qubits for a tripartite measurement, or choose two of them for a BSM. We add another policy parameter, \(r_2\in [0,1]\), that specifies fractions of times the switch performs a BSM and three-qubit GHZ measurements in the event of three qubits on three different links. Another event that can occur in the \((1,1)\) state is the generation of entanglement on either of the two links that already have stored entanglement. This event occurs with rate \(2\mu\). Since \(B=1\), the switch cannot store the new entanglement. A decision must be made: to either discard one of the link entanglements (and remain in state \((1,1)\)) or perform a BSM on two of them and keep the third (and transition to state \((1,0)\)). Since it is not clear which policy is most advantageous, we add another parameter, \(r_3\in [0,1]\), which specifies the fraction of time that the switch performs a BSM when it resides in this state.

4.2 Numerical Results

We plot the capacity region for the switch with \(B=1\) for all values of \(r_1\), \(r_2\), \(r_3\in [0,1]\) and compare it against TDM. The entanglement generation rate \(\mu\) simply scales the capacities, so we set it equal to one (e.g., Kilo-ebits/s). In Figure 2, the number of links is three, and the TDM line is shown in red. Clearly, it is possible to design a policy that yields better performance than TDM: the triangular blue region above the TDM line represents the maximum capacities of the set of such policies.
Fig. 2.
Fig. 2. Capacity region for a system of buffer size one and three links. The red line represents the set of TDM policies. \(C_2\) and \(C_3\) are bipartite and tripartite capacities, respectively.
Note that TDM connects points \((0,C_2^*)\) and \((C_3^*,0)\), where \(C_2^*\) and \(C_3^*\) are the maximum achievable capacities for bipartite and tripartite entanglement, respectively. The point farthest from and above the TDM line (the vertex of the triangular region above the line, shown in green in Figure 2) is achieved by setting \(r_1=0\) and \(r_2=r_3=1\). In other words, the most “efficient” policy in terms of being the farthest from the TDM line is the following: (i) never perform BSMs in state \((1,0)\); and (ii) when in state \((1,1)\) and a third entanglement is generated on a different link, always use it in a tripartite measurement, but when a third entanglement is generated on one of the links that already has a stored qubit, always perform a BSM. Note that the latter rule directs the switch to not waste an entanglement whenever it is possible to use it in a measurement.
The capacity regions for \(k=10\) and 50 are shown in Figure 3. Note that as the number of links increases, the differences between TDM and the more efficient random policies diminish. In the next section, we provide an analytical proof of this phenomenon.
Fig. 3.
Fig. 3. Capacity region for a system of buffer size one and varying number of links. The red line represents the set of TDM policies. The vertex of each triangular region above the TDM line yields the optimal policy in the sense of being farthest from the TDM line.

4.3 Analysis

Let \(\pi (0,0)\), \(\pi (1,0)\), and \(\pi (1,1)\) represent the stationary distribution of the CTMC in Figure 1. The balance equations (excluding \(\mu\), as it cancels out due to every transition rate being its multiple), are
\begin{align*} &\pi (0,0)k = \pi (1,0)(k-1)r_1+\pi (1,1)(k-2)r_2,\\ &\pi (1,1)((k-2)r_2+(k-2)\bar{r}_2+2r_3) = \pi (1,0)(k-1)\bar{r}_1,\\ &\pi (0,0)+\pi (1,0)+\pi (1,1) = 1. \end{align*}
Solving these equations yields
\begin{align*} &\pi (1,1) = \frac{k(k-1)\bar{r}_1}{D_1},\\ &\pi (1,0) = \frac{k(k-2+2r_3)}{D_1},\quad \text{where}\\ &D_1 = (k-2+2r_3)((k-1)r_1+k)+(k-1)\bar{r}_1((k-2)r_2+k). \end{align*}
Then the bipartite and tripartite capacities for this system, \(C_2 \equiv C_2(r_1,r_2,r_3)\) and \(C_3\equiv C_3(r_1,r_2,r_3)\), are
\begin{align*} C_2 &= \pi (1,0)(k-1)\mu r_1 + \pi (1,1)((k-2)\mu \bar{r}_2+2\mu r_3)\\ &=\frac{k(k-1)\mu (k-2+2 r_3-(k-2)r_2\bar{r}_1)}{(k-2+2r_3)((k-1)r_1+k)+(k-1)\bar{r}_1((k-2)r_2+k)},\\ C_3 &= \pi (1,1)(k-2)\mu r_2\\ &=\frac{k(k-1)(k-2)\mu r_2\bar{r}_1}{(k-2+2r_3)((k-1)r_1+k)+(k-1)\bar{r}_1((k-2)r_2+k)}. \end{align*}
Claim 1.
The maximum value of \(C_2\) is given by \(C_2^* = C_2(r_1,0,1)=C_2(1,0,r_3)\), where \(r_1\) and \(r_3\) are arbitrary values in \([0,1]\). The maximum value of \(C_3\) is given by \(C_3^*=C_3(0,1,0)\).
Proof.
We start by proving this for \(C_2\). First, note that to maximize \(C_2\)’s numerator and minimize its denominator, \(r_2\) must be set to 0. This yields
\begin{align*} C_2(r_1,0,r_3) &= \frac{k(k-1)\mu (k-2+2 r_3)}{(k-2+2r_3)((k-1)r_1+k)+k(k-1)\bar{r}_1}\\ &= \frac{k(k-1)\mu }{(k-1)r_1+k+\frac{k(k-1)\bar{r}_1}{k-2+2r_3}}. \end{align*}
Now, \(r_3=1\) maximizes \(C_2(r_1,0,r_3)\), which yields
\begin{align*} C_2(r_1,0,1) &= \frac{k(k-1)\mu }{(k-1)r_1+k+(k-1)\bar{r}_1} = \frac{k(k-1)\mu }{2k-1}. \end{align*}
Note that \(C_2(1,0,r_3)\) yields the same expression as \(C_2(r_1,0,1)\). Next, consider the expression for \(C_3\). To minimize the denominator, we should set \(r_3=0\). This yields
\begin{align*} C_3(r_1,r_2,0) &= \frac{k(k-1)(k-2)\mu r_2\bar{r}_1}{(k-2)((k-1)r_1+k)+(k-1)\bar{r}_1((k-2)r_2+k)}\\ &= \frac{k(k-1)(k-2)\mu r_2\bar{r}_1}{(k-1)r_1((k-2)\bar{r}_2-k)+k(k-2)+(k-1)((k-2)r_2+k)}. \end{align*}
It is clear that \(r_1\) must be 0, which yields
\begin{align*} C_3(0,r_2,0) &= \frac{k(k-1)(k-2)\mu r_2}{k(k-2)+(k-1)((k-2)r_2+k)}\\ &= \frac{k(k-1)(k-2)\mu r_2}{k(2k-3)+(k-1)(k-2)r_2}\\ &= \frac{k(k-1)(k-2)\mu }{\frac{k(2k-3)}{r_2}+(k-1)(k-2)}. \end{align*}
From above, we can see that \(r_2\) must be 1, so the maximum is at \(C_3^*=C_3(0,1,0)\).□
For brevity, let \((C_3(0,1,1),C_2(0,1,1))\equiv (\hat{C}_3,\hat{C}_2)\); this is the point farthest above the TDM line within the achievable capacity region (e.g., the green point in Figure 2). We prove this as part of the proof of the claim below.
Claim 2.
Any point \((C_3,C_2)\) in the achievable capacity region satisfies the following constraints:
\begin{align} C_2 &\le -\frac{3k-2}{2k-1}C_3+\frac{\mu k (k-1)}{2k-1} \quad \text{and} \end{align}
(1)
\begin{align} C_2 &\le -\frac{k(k-2)+2(k-1)^2}{k(k-2)}C_3 + \mu (k-1), \end{align}
(2)
\begin{align} C_2,~C_3&\ge 0. \end{align}
(3)
Moreover, Equations (1) and (2) define a tight upper bound on the achievable capacity region.
Proof.
First, we must show that the point \((\hat{C}_3,\hat{C}_2)\) is indeed the farthest point from the TDM line. We do this by first assuming that there exists an achievable capacity region above the TDM line that is shaped like a triangle, as in Figures 2 and 3, and later prove this to be true. Moreover, the sides of this triangular region impose upper bounds on the achievable bipartite-tripartite capacities. With these assumptions proven, it is clear that the point farthest from the TDM line will be located at the vertex of this triangle. Thus, let us find a point \((C_3,C_2)\) on the plane such that the (potentially negative) slope of the line that passes through it and \((0,C_2^*)\) is maximized. This is equivalent to minimizing the quantity
\begin{align*} \frac{C_2^*-C_2}{C_3} &= \frac{(3k-2)(k-2)r_2+2(k-1)(1-r_3)}{r_2(2k-1)(k-2)}. \end{align*}
To do so, we must set \(r_3=1\), yielding a slope of
\begin{align} -\frac{C_2^*-C_2}{C_3} &= -\frac{3k-2}{2k-1}. \end{align}
(4)
Next, note that the TDM line is given by the equation
\begin{align} f(x,y)=y-C_2^*(1-x/C_3^*), \end{align}
(5)
and the distance between it and any point \((C_3,C_2)\) is given by
\begin{align*} \frac{\vert f(C_3,C_2)\vert }{\sqrt {1+(C_2^*/C_3^*)^2}}. \end{align*}
Hence, it is sufficient to maximize \(\vert f(C_3(r_1,r_2,1),C_2(r_1,r_2,1))\vert\), given by
\begin{align*} \frac{2\mu k (k-1)}{(2k-1)\left(k-2+\frac{2k^2-k}{(k-1)r_2(1-r_1)}\right)}. \end{align*}
It is clear that we must set \(r_2=1\) and \(r_1=0\), yielding \((\hat{C}_3,\hat{C}_2)\equiv (C_3(0,1,1),C_2(0,1,1))\) as the point farthest from the TDM line, as expected. Note that this holds under the assumption that the achievable capacity region has the shape of a triangle, which still remains to be proven.
To do so, consider the line passing through \((0,C_2^*)\) and \((\hat{C}_3,\hat{C}_2)\), whose slope is given by Equation (4):
\begin{align} y_1 &= -\frac{3k-2}{2k-1}x_1+\frac{\mu k (k-1)}{2k-1}, \end{align}
(6)
and the line passing through \((\hat{C}_3,\hat{C}_2)\) and \((C_3^*,0)\):
\begin{align} y_2 &= -\frac{k(k-2)+2(k-1)^2}{k(k-2)}x_2 + \mu (k-1). \end{align}
(7)
It is not hard to show that for any point \((C_3, C_2)\), Equations (1) and (2) are satisfied. In other words, all points in the achievable capacity region fall on or below these two lines. To prove that this upper bound is tight, it remains to show that all points on lines (6) and (7) are achievable. To see this, let \(r_1=0\) and \(r_3=1\):
\begin{align*} C_2(0,r_2,1) &= \frac{(k-(k-2)r_2)k(k-1)\mu }{k^2+(k-1)(k+(k-2)r_2)},\\ C_3(0,r_2,1) &= \frac{(k-2)r_2k(k-1)\mu }{k^2+(k-1)(k+(k-2)r_2)}. \end{align*}
Note that any point \((C_3(0,r_2,1),C_2(0,r_2,1))\) is on line (6), and these two functions are continuous in \(r_2\in [0,1]\). Similarly, letting \(r_1=0\) and \(r_2=1\), we have
\begin{align*} C_2(0,1,r_3) &= \frac{2r_3k(k-1)\mu }{k(k-2+2r_3)+2(k-1)^2},\\ C_3(0,1,r_3) &= \frac{k(k-1)(k-2)\mu }{k(k-2+2r_3)+2(k-1)^2}. \end{align*}
Any point \((C_3(0,1,r_3),C_2(0,1,r_3))\) is on line (7), and these two functions are continuous in \(r_3\in [0,1]\). Using these facts, we conclude that all points on lines (6) and (7) are achievable.□
Claim 3.
As \(k\rightarrow \infty\), the benefit of using an alternate policy (one that lies above TDM) diminishes.
Proof: We prove this by showing that as \(k\rightarrow \infty\), the ratio of the achievable area above the TDM line, which we call \(A_{\triangle }\) (because this area has the shape of a triangle) to the total area below the capacity region, which we call \(A_T\), goes to zero. For \(A_{\triangle }\), the length of the base of the triangle is simply the distance between the points \((0,C_2^*)\) and \((C_3^*,0)\), or \(\sqrt {(C_2^*)^2+(C_3^*)^2}\). The height is given by
\begin{align*} \frac{\vert f(\hat{C}_3,\hat{C}_2)\vert }{\sqrt {1+(C_2^*/C_3^*)^2}}. \end{align*}
Then,
\begin{align*} A_{\triangle } &= \frac{\vert f(\hat{C}_3,\hat{C}_2)\vert C_3^*}{2}. \end{align*}
Then, the area below the TDM line is given by
\begin{align*} A_{TDM} &= \frac{C_2^*C_3^*}{2}, \end{align*}
so the total area is
\begin{align*} A_T &= A_{\triangle }+A_{TDM} = \frac{\vert f(\hat{C}_3,\hat{C}_2)\vert C_3^*+C_2^*C_3^*}{2}. \end{align*}
Then the ratio of the area above the TDM to the total area is
\begin{align*} \frac{A_{\triangle }}{A_T} &=\frac{\vert f(\hat{C}_3,\hat{C}_2)\vert C_3^*}{\vert f(\hat{C}_3,\hat{C}_2)\vert C_3^*+C_2^*C_3^*} =\frac{\vert f(\hat{C}_3,\hat{C}_2)\vert }{\vert f(\hat{C}_3,\hat{C}_2)\vert +C_2^*} =\frac{1}{1 +\frac{C_2^*}{\vert f(\hat{C}_3,\hat{C}_2)\vert }}. \end{align*}
To prove that this ratio goes to zero with k, it suffices to show that the second term in the denominator goes to \(\infty\). It can be shown that \(C_2^*/\vert f(\hat{C}_3,\hat{C}_2)\vert\) simplifies to
\begin{align*} \qquad \qquad \qquad \qquad \qquad \qquad \qquad \;\, \frac{3k^2 - 4k + 2}{2(k - 1)}~~ \overset{k\rightarrow \infty }{\longrightarrow }~\infty .\qquad \qquad \qquad \qquad \qquad \qquad \qquad \Box \end{align*}
Using Equation (5), we may describe the set of TDM policies from a more mathematical perspective. Namely, for any point \((C_3,C_2)\) on the TDM line, we may write \(C_2=\delta C_2^{*}\), for \(\delta \in [0,1]\), which by Equation (5) implies that \(C_3=(1-\delta)C_3^{*}\). Thus, \((C_3,C_2)\) is obtained by a policy that performs BSMs a fraction \(\delta\) of the time, and 3-GHZs a fraction \(1-\delta\) of the time.

5 System with Per-link Buffer Size Two

In a system with per-link buffer size two, there are three additional states, as shown in Figure 4. Recall that in Section 4, we analyzed the Markov chain of buffer size one systems to find policies that are optimal, in the sense that the corresponding \((C_3,C_2)\) point within the capacity region is farthest from the TDM line. The goal of this part of the study—i.e., for \(B=2\) systems—is to show the existence of better policies than TDM, rather than to find such an optimal policy, as the former allows for a significantly simpler analysis. Hence, the design in Figure 4 does not encapsulate all possible switching policies: for instance, there is no \(r_1\) parameter here. Our exhaustive policy search over the entire parameter space for systems with \(B=1\) in Section 4 revealed that \(r_1\) is best set to zero; while it is possible that a positive \(r_1\) may be beneficial to a \(B=2\) system, we omit it from the model under the intuitive reasoning that the switch should favor states that allow for (more demanding in terms of the number of necessary EPR pairs) 3-GHZ measurements. In addition, note that if the system is in state \((1,1)\) and another entanglement is generated on one of the links that already has a stored qubit, the system is not allowed to use two of the qubits for a BSM. The reasoning is that since \(B=2\), there is enough space to keep the new qubit. Similarly, when the system is in state \((2,1)\) a BSM is only allowed if (i) another entanglement is generated on one of the \(k-2\) links that does not have a stored qubit, or (ii) another entanglement is generated on the link that already has two qubits stored. In the latter scenario, not performing a BSM would cause a qubit to be discarded. While this design does not grant the switch access to the full range of policies, it does enable us to find a class of policies that are more efficient than TDM.
Fig. 4.
Fig. 4. CTMC for a system with at least three links and buffer size two for each link. k is the number of links, \(\mu\) is the rate of entanglement generation, and \(r_2\) and \(r_3\) are parameters that specify the scheduling policy.
A note on the notation in this and the following sections: with some abuse of notation, we use the variables \(C_2\) and \(C_3\) to represent the bipartite and tripartite capacities of a switch with per-link buffer size two.

5.1 Numerical Results

Figure 5 shows capacity regions for \(B=2\) with number of links \(k=3\) and 10. We observe that policies more efficient than TDM can be found, but as the number of links grows, the advantage of such policies relative to TDM diminishes. This phenomenon mimics that of the \(B=1\) switch.
Fig. 5.
Fig. 5. Capacity region for per-link buffer size \(B=2\), for \(k=3\), 10 links. The red line represents the set of TDM policies.
Figure 6 shows a comparison of \(B=1\) and \(B=2\) switches for three and ten links. We observe that while there is a clear benefit to extra buffer space for a small number of users, the advantage becomes less apparent as the number of users grows. In addition, it appears that \(C_3\) benefits more from the extra buffer space than \(C_2\).
Fig. 6.
Fig. 6. Comparison of capacity regions for systems of buffer sizes one and two with varying number of links k and entanglement generation rate \(\mu =1\).

5.2 Analysis

In this section, we provide a partial analysis of the quantum switch with two quantum memories allocated to each link. Specifically, we derive the stationary distribution of the CTMC representing this system, and compute the maximum bipartite and tripartite capacities for the switch. However, we do not fully characterize the capacity region as in the case of \(B=1\).
Let \(\pi (0,0)\), \(\pi (1,0)\), \(\pi (2,0)\), \(\pi (1,1)\), \(\pi (2,1)\), and \(\pi (2,2)\) represent the stationary distribution of the CTMC in Figure 4. The balance equations (excluding \(\mu\), as it cancels out due to every transition rate being its multiple), are
\begin{align*} &k\pi (0,0) = (k-2)r_2\pi (1,1),\\ & k \pi (1,0) = k\pi (0,0)+(k-2)\bar{r}_2\pi (1,1)+(k-2)r_2\pi (2,1),\\ &(k-1)\pi (2,0) = \pi (1,0)+((k-2)\bar{r}_2+r_3)\pi (2,1),\\ &k\pi (1,1) = (k-1)\pi (1,0)+(k-2)r_2\pi (2,2),\\ &(k-2+2r_3)\pi (2,2) = \pi (2,1),\\ &\pi (0,0)+\pi (1,0)+\pi (2,0)+\pi (1,1)+\pi (2,1)+\pi (2,2)=1. \end{align*}
Solving these equations yields
\begin{align*} \pi (0,0) &= \frac{1}{k}\frac{(k-1)(k-2)^2r_2^2((k-1)((k+1)(k-2)+2kr_3)+3k-2)}{D_2},\\ \pi (1,0) &= \frac{k(k-1)(k-2)r_2((k+1)(k-2)+2kr_3)}{D_2},\\ \pi (1,1) &= \frac{(k-1)(k-2)r_2((k-1)((k+1)(k-2)+2kr_3)+3k-2)}{D_2}, \end{align*}
\begin{align*} \pi (2,0) &= \frac{k(k-2)r_2((k+1)(k-2)+2kr_3)+k(k-2+2r_3)(3k-2)((k-2)\bar{r}_2+r_3)}{D_2},\\ \pi (2,1) &= \frac{k(k-1)(3k-2)(k-2+2r_3)}{D_2},\quad \text{and}\\ \pi (2,2) &= \frac{k(k-1)(3k-2)}{D_2},\quad \text{where}\\ D_2 &= kr_2(2kr_3+(k+1)(k-2))(r_2(k-1)(k-2)+2(k-1)^2+k-2)\\ &\quad +(k-2+2r_3)(3k-2)(k\bar{r}_2(2k-3)-r_2^2(k-1)(k-2)+kr_3)+k(k-1)(3k-2). \end{align*}
The bipartite and tripartite capacities for this system, \(C_2 \equiv C_2(r_2,r_3)\) and \(C_3\equiv C_3(r_2,r_3)\), are
\begin{align} C_2 &= \pi (1,1)(k-2)\mu \bar{r}_2+\pi (2,1)((k-2)\mu \bar{r}_2+\mu r_3)+\pi (2,2)((k-2)\mu \bar{r}_2+2\mu r_3)\nonumber \nonumber\\ &= (k-1)\mu \frac{(k-2)\bar{r}_2[k(3k-2)(k-1+2r_3)+(k-2)r_2((k-1)((k+1)(k-2)+2kr_3)+3k-2)]}{D_2}\nonumber \nonumber\\ &\quad +(k-1)\mu \frac{(3k-2)k(k+2r_3)r_3}{D_2}, \end{align}
(8)
\begin{align} C_3 &= (k-2)\mu r_2 (\pi (1,1)+\pi (2,1)+\pi (2,2))\nonumber \nonumber\\ &= (k-1)(k-2)\mu r_2\frac{k(3k-2)(k-1+2r_3)+(k-2)r_2[(k-1)((k+1)(k-2)+2kr_3)+3k-2]}{D_2}. \end{align}
(9)
Finally, we note that the maximum value of \(C_2\) is given by \(C_2^* = C_2(0,1)\), and the maximum value of \(C_3\) is given by \(C_3^*=C_3(1,0)\). Intuitively, setting \(r_2=1\) ensures that a BSM is never performed when a 3-qubit GHZ basis measurement could be performed instead, while setting \(r_3=1\) preserves all stored qubits for an opportunity of a 3-qubit GHZ measurement in the future. Similarly, setting \(r_2=0\) and \(r_3=1\) has the opposite effect, causing the switch to take all opportunities to perform a BSM.

6 Modeling Decoherence and Quantum Storage Cut-off Time

In this section, we present a simple way to augment the model from Section 4 to account for the decoherence of quantum states and associated cut-off time on quantum storage. For switches with \(B=1\), we present both analytic and numerical results. We also augment the model from Section 5 to incorporate decoherence and storage cut-offs, but for switches with \(B=2\), we present only numerical results. Our decoherence model is described in Section 3. For \(B=1\), the resulting CTMC is illustrated in Figure 7.
Fig. 7.
Fig. 7. CTMC for a system with at least three links and buffer size one. k is the number of links, \(\mu\) is the rate of entanglement generation, \(\alpha\) is the decoherence-associated storage cut-off rate, and \(r_1\), \(r_2\), \(r_3\) are parameters that specify the scheduling policy.
The analysis of this model is almost identical to that of the \(B=1\) system without decoherence. As with the latter, the capacity region is bounded above by two lines:
\begin{align*} y_1 &= -\frac{\mu (3k-2)(\alpha +(k-2)\mu)+2\alpha ^2}{\mu (k-2)((2k-1)\mu +\alpha)}x_1+\frac{k(k-1)\mu ^2}{(2k-1)\mu +\alpha }\\ y_2 &= -\frac{2(k-1)^2\mu ^2+(k\mu +\alpha)((k-2)\mu +2\alpha)}{\mu (k-2)(k\mu +\alpha)}x_2+\frac{k(k-1)\mu ^2}{k\mu +\alpha }. \end{align*}
To avoid ambiguity, let \(C_2^{\prime }\) and \(C_3^{\prime }\) denote the bipartite and tripartite capacities of a system with decoherence. As with the previous model, \(C_2^{\prime }\) is maximized at \(r_1=1\), \(r_2=r_3=0\); \(C_3^{\prime }\) is maximized at \(r_1=r_3=0\), \(r_2=1\), and the point farthest from TDM is obtained by setting \(r_1=0\), \(r_2=r_3=1\). The first bounding line passes through the points \((0,C_2^{\prime }(1,0,0))\) and \((C_3^{\prime }(0,1,1),C_2^{\prime }(0,1,1))\); and the second line passes through \((C_3^{\prime }(0,1,1),C_2^{\prime }(0,1,1))\) and \((C_3^{\prime }(0,1,0),0)\). Moreover, all points on the bounding lines are achievable, indicating that the bound is tight.
The capacities are given by
\begin{align*} C_2^{\prime } &=(k(k-1)\mu ^2\left(2(\alpha r_1+\mu r_3)+(k-2)\mu (1-r_2\bar{r}_1)\right))/D,\\ C_3^{\prime } &= (k\mu ^3(k-1)(k-2) \bar{r}_1 r_2)/D, \quad \text{where}\\ D&=(k-1)\mu \bar{r}_1((k-2)\mu r_2+k\mu) +(k\mu +(k-1)\mu r_1+\alpha)((k-2+2r_3)\mu +2\alpha). \end{align*}
Note that the denominator is quadratic in \(\alpha\). This causes both \(C_2^{\prime }\) and \(C_3^{\prime }\) to tend to zero as \(\alpha \rightarrow \infty\).
Figure 8 shows a comparison of the capacity regions for systems with \(B=1\), for three and ten links and different decoherence rates. For all cases, \(\mu\) is set to one: for qualitative results, we only need to concern ourselves with the value of \(\alpha\) relative to \(\mu\). In real scenarios, we expect \(\alpha\) to be at least one order of magnitude less than \(\mu\). From numerical results, we observe that the effect of decoherence on the capacity region is not significant, especially as the number of links grows. Analysis supports this observation, since we can show that
\begin{align*} \lim \limits _{k\rightarrow \infty }\frac{C_2^{\prime }}{C_2} =1 \text{~and~} \lim \limits _{k\rightarrow \infty }\frac{C_3^{\prime }}{C_3} =1. \end{align*}
Fig. 8.
Fig. 8. Capacity region for a system of buffer size one and varying number of links k, decoherence/storage cut-off rates \(\alpha\), and entanglement generation rate \(\mu =1\). The solid lines are the upper boundaries of the capacity region, and the dashed are TDM lines.
Figure 9 shows a comparison for systems with \(B=2\) and varying number of links and decoherence rates. Results are consistent with that of the case \(B=1\): the effects of decoherence on capacity are less apparent for larger k values.
Fig. 9.
Fig. 9. Capacity region for a system of buffer size two and varying number of links k, decoherence/storage cut-off rates \(\alpha\), and entanglement generation rate \(\mu =1\). The solid lines are the upper boundaries of the capacity region, and the dashed are TDM lines.

7 Conclusion

In this work, we explored a set of policies for a quantum switch that can store up to two qubits per link and whose objective is to perform bipartite and tripartite joint measurements to distribute two and three qubit entanglement to pairs and triples of users. We presented analytical results for the case where the per-link buffer has size one. We presented a class of policies that achieve a larger capacity region than time-division multiplexing, but found that as the number of links grows, the advantage of using such policies diminishes. We also compared the capacity regions for systems with different per-link buffer sizes and observed that systems with fewer links benefit more from the extra storage space than systems with a larger number of links. Finally, we modeled decoherence and associated storage cut-off times for both types of systems and presented analytical results for the case with per-link buffer size one. Observations and analysis showed that as the number of links increases, the effects of decoherence and storage cut-offs become less apparent on systems.

Footnotes

1
In general, performing a measurement on two or more qubits results in a state with a lower fidelity.
2
In principle, by including non-Clifford quantum logic at network nodes, it is possible to extend the entanglement distribution protocol to include a larger class of (non-stabilizer) states. This extension is left as a subject for future work.
3
The specific values of \(q_1\) and \(q_2\) will depend on the switch architecture and subsequently, on the methods used for BSMs and GHZ projective measurements. We thus refrain from making general statements about their relative difference.
4
In quantum networking literature, it is customary to refer to entanglement generated between two neighboring nodes as “elementary link” entanglement. This is not to be confused with what we refer to as end-to-end entanglement in this work, which is a result of the switch performing entangling measurements on two or more qubits belonging to elementary links.

A Elementary Link Entanglement Generation

We have stated earlier that successful entanglement generation at the elementary link level4—for our switch architecture, this refers to entanglement between the switch and an end node—is an inherently probabilistic event, and that each attempt succeeds with a probability p. In this Appendix, we discuss this process in more detail.
A major challenge for distributed quantum systems is the difficulty of safely transmitting quantum states across large distances. For optical fiber, the channel transmissivity is given by \(\eta =e^{-\gamma L}\), where L is the link length and \(\gamma\) the fiber attenuation coefficient—i.e., fiber losses scale exponentially with distance. A link’s entanglement generation success probability p is proportional to its transmissivity \(\eta\), and further has a dependence on the parameters of the entanglement generation scheme—some of these may be tunable, while others are inherent properties of the hardware used. An example of the former is the bright-state population of the single-photon entanglement generation protocol [6], and examples of the latter are photon emission probability and detector efficiency.
The precise method of entanglement generation at the elementary link level depends on the hardware available, as well as the manner in which qubits are encoded into photonic states. We describe here two types of link-level architectures:
(1)
One method of bipartite entanglement generation is to prepare an EPR state locally (in our switch scenario, this step may be taken either at the switch or at one of the end nodes), and send one half of it to a neighboring node. Upon arrival at the remote node, the state is transferred from the photon to a memory. Two notable examples of such a scheme are its realization for trapped atoms in Reference [16], and for a silicon-vacancy (SiV) center integrated in a diamond nanophotonic cavity as part of an asynchronous BSM experiment [4].
(2)
Another (rather more popular and arguably experimentally less challenging) family of schemes utilizes a so-called midpoint or heralding station, as depicted in Figure 10. Here, the two ends of the link, Alice and Bob, each possess a quantum processor capable of generating memory-photon entanglement via a communication qubit, shown in purple (storage qubits, shown in yellow, with longer coherence times may be used to store other, possibly also entangled states, as well as partake in computation/processing). The entangled photons then travel to the midpoint station, which effectively performs a BSM on the photonic qubits to entangle the two remote memories. Such an operation is probabilistic—succeeding with probability 0.5 in the most basic setup [20]—but heralded, meaning that Alice and Bob will be made aware of the outcome via classical communication.
Fig. 10.
Fig. 10. Elementary link entanglement generation using a heralding station. In this example, the heralding station consists of a beamsplitter and two detectors. Depending on the type of photonic qubit encoding used (e.g., time-bin, polarization), additional detectors and beamsplitters (possibly of different types, e.g., 50/50, polarizing) may be necessary.
The “identical links” assumption of our quantum switch network, along with an implicit assumption that all end nodes have identical hardware, ensure that p is the same for all links. We have also assumed that the switch has enough communication qubits to support simultaneous communication with all end nodes, and that storage qubits have sufficiently long coherence times to store entangled states until they can be consumed in entangling measurements.

References

[1]
Charles H. Bennett, Gilles Brassard, Claude Crépeau, Richard Jozsa, Asher Peres, and William K. Wootters. 1993. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 13 (1993), 1895.
[2]
Charles H. Bennett, Gilles Brassard, and N. David Mermin. 1992. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 5 (1992), 557.
[3]
Charles H. Bennett and Stephen J. Wiesner. 1992. Communication via one-and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 69, 20 (1992), 2881.
[4]
Mihir K. Bhaskar, Ralf Riedinger, Bartholomeus Machielse, David S. Levonian, Christian T. Nguyen, Erik N. Knall, Hongkun Park, Dirk Englund, Marko Lončar, Denis D. Sukachev et al. 2020. Experimental demonstration of memory-enhanced quantum communication. Nature 580, 7801 (2020), 60–64.
[5]
C. E. Bradley, S. W. de Bone, P. F. W. Möller, S. Baier, M. J. Degen, S. J. H. Loenen, H. P. Bartling, M. Markham, D. J. Twitchen, R. Hanson et al. 2022. Robust quantum-network memory based on spin qubits in isotopically engineered diamond. NPJ Quant. Info. 8, 1 (2022), 1–9.
[6]
Carlos Cabrillo, J Ignacio Cirac, Pablo Garcia-Fernandez, and Peter Zoller. 1999. Creation of entangled states of distant atoms by interference. Phys. Rev. A 59, 2 (1999), 1025.
[7]
O. A. Collins, S. D. Jenkins, A. Kuzmich, and T. A. B. Kennedy. 2007. Multiplexed memory-insensitive quantum repeaters. Phys. Rev. Lett. 98, 6 (2007), 060502.
[8]
Tim Coopmans, Robert Knegjens, Axel Dahlberg, David Maier, Loek Nijsten, Julio Oliveira, Martijn Papendrecht, Julian Rabbie, Filip Rozpędek, Matthew Skrzypczyk et al. 2020. NetSquid, a discrete-event simulation platform for quantum networks. Retrieved from https://arXiv:2010.12535.
[9]
Axel Dahlberg, Matthew Skrzypczyk, Tim Coopmans, Leon Wubben, Filip Rozpędek, Matteo Pompili, Arian Stolk, Przemysław Pawełczak, Robert Knegjens, Julio de Oliveira Filho et al. 2019. A link layer protocol for quantum networks. In Proceedings of the ACM Special Interest Group on Data Communication. 159–173.
[10]
Artur K. Ekert. 1991. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 6 (1991), 661.
[11]
Zachary Eldredge, Michael Foss-Feig, Jonathan A. Gross, Steven L. Rolston, and Alexey V. Gorshkov. 2018. Optimal and secure measurement protocols for quantum sensor networks. Phys. Rev. A 97, 4 (2018), 042337.
[12]
Federico Grasselli, Hermann Kampermann, and Dagmar Bruß. 2018. Finite-key effects in multipartite quantum key distribution protocols. New J. Phys. 20, 11 (2018), 113014.
[13]
Saikat Guha, Hari Krovi, Christopher A. Fuchs, Zachary Dutton, Joshua A. Slater, Christoph Simon, and Wolfgang Tittel. 2015. Rate-loss Analysis of an Efficient Quantum Repeater Architecture. Phys. Rev. A 92, 2 (2015), 022357.
[14]
Jiu-Cang Hao, Chuan-Feng Li, and Guang-Can Guo. 2001. Controlled dense coding using the Greenberger-Horne-Zeilinger state. Phys. Rev. A 63, 5 (2001), 054301.
[15]
Liang Jiang, Jacob M. Taylor, Anders S. Sørensen, and Mikhail D. Lukin. 2007. Distributed quantum computation based on small quantum registers. Phys. Rev. A 76, 6 (2007), 062323.
[16]
Norbert Kalb, Andreas Reiserer, Stephan Ritter, and Gerhard Rempe. 2015. Heralded storage of a photonic quantum bit in a single atom. Phys. Rev. Lett. 114, 22 (2015), 220501.
[17]
Sumeet Khatri, Corey T. Matyas, Aliza U. Siddiqui, and Jonathan P. Dowling. 2019. Practical figures of merit and thresholds for entanglement distribution in quantum networks. Phys. Rev. Res. 1, 2 (2019), 023032.
[18]
Wojciech Kozlowski, Axel Dahlberg, and Stephanie Wehner. 2020. Designing a quantum network protocol. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies. 1–16.
[19]
Boxi Li, Tim Coopmans, and David Elkouss. 2020. Efficient optimization of cut-offs in quantum repeater chains. Retrieved from https://arXiv:2005.04946.
[20]
Norbert Lütkenhaus, John Calsamiglia, and K.-A. Suominen. 1999. Bell measurements for teleportation. Phys. Rev. A 59, 5 (1999), 3295.
[21]
William J. Munro, Koji Azuma, Kiyoshi Tamaki, and Kae Nemoto. 2015. Inside quantum repeaters. IEEE J. Select. Top. Quant. Electr. 21, 3 (2015), 78–90.
[22]
P. Nain, G. Vardoyan, S. Guha, and D. Towsley. 2020. On the analysis of a multipartite entanglement distribution switch. Proc. ACM Measure. Anal. Comput. Syst. 4, 2 (Article 23, June, 2020).
[23]
Michael A. Nielsen and Isaac Chuang. 2002. Quantum Computation and Quantum Information. Cambridge University Press.
[24]
Mihir Pant, Hari Krovi, Don Towsley, Leandros Tassiulas, Liang Jiang, Prithwish Basu, Dirk Englund, and Saikat Guha. 2019. Routing entanglement in the quantum internet. NPJ Quant. Info. 5, 1 (2019), 1–9.
[25]
Stefano Pirandola. 2019. End-to-end capacities of a quantum communication network. Commun. Phys. 2, 1 (2019), 1–10.
[26]
Stefano Pirandola, Riccardo Laurenza, Carlo Ottaviani, and Leonardo Banchi. 2017. Fundamental limits of repeaterless quantum communications. Nature Commun. 8, 1 (2017), 1–15.
[27]
Filip Rozpędek, Kenneth Goodenough, Jeremy Ribeiro, Norbert Kalb, V. Caprara Vivoli, Andreas Reiserer, Ronald Hanson, Stephanie Wehner, and David Elkouss. 2018. Parameter regimes for a single sequential quantum repeater. Quant. Sci. Technol. 3, 3 (2018), 034002.
[28]
Filip Rozpędek, Raja Yehia, Kenneth Goodenough, Maximilian Ruf, Peter C. Humphreys, Ronald Hanson, Stephanie Wehner, and David Elkouss. 2019. Near-term quantum-repeater experiments with nitrogen-vacancy centers: Overcoming the limitations of direct transmission. Phys. Rev. A 99, 5 (2019), 052330.
[29]
Eddie Schoute, Laura Mancinska, Tanvirul Islam, Iordanis Kerenidis, and Stephanie Wehner. 2016. Shortcuts to quantum network routing. Retrieved from https://arXiv:cs.NI/1610.05238.
[30]
Rodney Van Meter. 2014. Quantum Networking. John Wiley & Sons.
[31]
Gayane Vardoyan, Saikat Guha, Philippe Nain, and Don Towsley. 2019. On the stochastic analysis of a quantum entanglement switch. ACM SIGMETRICS Perform. Eval. Rev. 47, 2 (2019), 27–29.
[32]
Gayane Vardoyan, Saikat Guha, Philippe Nain, and Don Towsley. 2020. On the exact analysis of an idealized quantum switch. Perform. Eval. 144 (2020), 102141.
[33]
G. Vardoyan, S. Guha, P. Nain, and D. Towsley. 2021. On the stochastic analysis of a quantum entanglement distribution switch. IEEE Trans. Quant. Eng. 2 (2021). Retrieved from https://arxiv.org/abs/1903.04420.

Cited By

View all
  • (2024)Entanglement buffering with two quantum memoriesQuantum10.22331/q-2024-09-03-14588(1458)Online publication date: 3-Sep-2024
  • (2024)Quantum Switches for Gottesman–Kitaev–Preskill Qubit-Based All-Photonic Quantum NetworksIEEE Transactions on Quantum Engineering10.1109/TQE.2024.34760095(1-15)Online publication date: 2024
  • (2024)Analytical Performance Estimations for Quantum Repeater Network Scenarios2024 IEEE International Conference on Quantum Computing and Engineering (QCE)10.1109/QCE60285.2024.00226(1960-1966)Online publication date: 15-Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Modeling and Performance Evaluation of Computing Systems
ACM Transactions on Modeling and Performance Evaluation of Computing Systems  Volume 8, Issue 1-2
June 2023
93 pages
ISSN:2376-3639
EISSN:2376-3647
DOI:10.1145/3582894
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 March 2023
Online AM: 19 November 2022
Accepted: 07 November 2022
Revised: 21 June 2022
Received: 22 February 2021
Published in TOMPECS Volume 8, Issue 1-2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Quantum switch
  2. entanglement distribution
  3. Markov chain

Qualifiers

  • Research-article

Funding Sources

  • National Science Foundation
  • NSF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)379
  • Downloads (Last 6 weeks)41
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Entanglement buffering with two quantum memoriesQuantum10.22331/q-2024-09-03-14588(1458)Online publication date: 3-Sep-2024
  • (2024)Quantum Switches for Gottesman–Kitaev–Preskill Qubit-Based All-Photonic Quantum NetworksIEEE Transactions on Quantum Engineering10.1109/TQE.2024.34760095(1-15)Online publication date: 2024
  • (2024)Analytical Performance Estimations for Quantum Repeater Network Scenarios2024 IEEE International Conference on Quantum Computing and Engineering (QCE)10.1109/QCE60285.2024.00226(1960-1966)Online publication date: 15-Sep-2024
  • (2024)Calculating the Capacity Region of a Quantum Switch2024 IEEE International Conference on Quantum Computing and Engineering (QCE)10.1109/QCE60285.2024.00216(1868-1878)Online publication date: 15-Sep-2024
  • (2024)Multi-Objective Planning of Transfer Capacity Distribution System Based on ESGA Genetic Algorithm2024 International Conference on Power, Electrical Engineering, Electronics and Control (PEEEC)10.1109/PEEEC63877.2024.00047(225-230)Online publication date: 14-Aug-2024
  • (2024)A GKP Qubit-Based All-Photonic Quantum SwitchICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622457(503-508)Online publication date: 9-Jun-2024
  • (2023)Optimal Entanglement Distillation Policies for Quantum Switches2023 IEEE International Conference on Quantum Computing and Engineering (QCE)10.1109/QCE57702.2023.00135(1198-1204)Online publication date: 17-Sep-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media