<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=189.120.189.205</id>
	<title>Quantum Protocol Zoo - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=189.120.189.205"/>
	<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Special:Contributions/189.120.189.205"/>
	<updated>2026-04-15T14:32:43Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.6</generator>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Distributing_Graph_States_Over_Arbitrary_Quantum_Networks&amp;diff=4446</id>
		<title>Distributing Graph States Over Arbitrary Quantum Networks</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Distributing_Graph_States_Over_Arbitrary_Quantum_Networks&amp;diff=4446"/>
		<updated>2022-01-06T18:04:21Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Edit by Lucas: Corrections and suggestions from our last talk - Removed Kaushik&amp;#039;s name&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
This protocol [https://arxiv.org/abs/1811.05445 (1)] implements the task of distributing arbitrary graph states over quantum networks of arbitrary topology. The goal is to distribute this states in a way that is most efficient in terms of the number of Bell pairs consumed and the number of operations realized by the protocol.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;[[:Category:Specific Task|Specific Task]], [[Entanglement Routing]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Perfect distribution of Bell pairs occurring at perfectly synchronized times.&lt;br /&gt;
* Perfect node local computation.&lt;br /&gt;
* Ignore the cost of classical communications.&lt;br /&gt;
* Ignore processing time of local quantum processor.&lt;br /&gt;
* Ignore the cost of quantum memory.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol [https://arxiv.org/abs/1811.05445 (1)] aims to distribute multipartite entangled states that are represented by graph states over fixed networks of arbitrary topology. They first introduce a protocol to distribute GHZ states that considering the assumptions takes a single time step and is optimal in terms of the Bell pair used. Their second protocol is a generalization of the first one and can distribute any arbitrary graph state using at most twice as many Bell pairs and steps than the optimal distributing protocol for the worst case scenario.&lt;br /&gt;
&lt;br /&gt;
In this protocol a quantum network is represented as a graph&lt;br /&gt;
&#039;&#039;&#039;upload image qn_distributing.svg here&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;!--[[File:qn_distributing.svg]]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The physical distribution of graph states are represented as graph operations ignoring&lt;br /&gt;
local corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To distribute a &#039;&#039;&#039;GHZ states&#039;&#039;&#039; over all the nodes of an arbitrary set &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; of the network nodes we have two steps:&lt;br /&gt;
&lt;br /&gt;
# Find a minimal tree covering all the nodes of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; using the [https://en.wikipedia.org/wiki/Steiner_tree_problem Steiner Tree Problem].&lt;br /&gt;
#* Minimal tree is a subgraph connecting all the nodes in &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; with the minimum number of edges.&lt;br /&gt;
# Apply an operation called Star Expansion on the leaves of the tree from the previous step.&lt;br /&gt;
&amp;lt;!-- Put Link to Star Expansion --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To distribute an &#039;&#039;&#039;Arbitrary Graph State&#039;&#039;&#039; we realize multiple iterations of the protocol above. &lt;br /&gt;
After that we make measurements on the participating nodes to generate the arbitrary graph state we want.&lt;br /&gt;
&amp;lt;!-- ==Properties== --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Put the cost of distributing, upper bounds etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
*&#039;&#039;&#039;Network Stage:&#039;&#039;&#039; [[Category: Quantum Memory Network Stage]][[:Category: Quantum Memory Network Stage| Quantum Memory]]&lt;br /&gt;
* Nodal Clifford Operations.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
* &amp;lt;math&amp;gt;b=&amp;lt;/math&amp;gt;qubit in the center of the star graph.&lt;br /&gt;
* &amp;lt;math&amp;gt;A=&amp;lt;/math&amp;gt;Node of the network which contains a qubit &amp;lt;math&amp;gt;a_0 \in A \cap N_b&amp;lt;/math&amp;gt; (neighborhood of b).&lt;br /&gt;
* &amp;lt;math&amp;gt;|A|&amp;lt;/math&amp;gt; number of nodes of A.&lt;br /&gt;
* &amp;lt;math&amp;gt;a_i \in A&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i &amp;gt; 0&amp;lt;/math&amp;gt; Represents each of the qubits of &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; that constitutes a Bell pair with a qubit &amp;lt;math&amp;gt;c_i&amp;lt;/math&amp;gt; in another node of the network.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* The optimality of the protocol depends on the network topology and the wanted graph state to distribute.&lt;br /&gt;
* Analysing the consumption of Bell pair between nodes and considering the worst case scenario that is to entangle each qubit with the opposite one over a line network we have the following upper bounds:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
! Distribute&lt;br /&gt;
! Cost&lt;br /&gt;
! Bound&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| N-GHZ&lt;br /&gt;
| EPR&lt;br /&gt;
| &amp;lt;math&amp;gt;N-1&amp;lt;/math&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| T&lt;br /&gt;
| &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| Arbitrary Graph State&lt;br /&gt;
| EPR&lt;br /&gt;
| &amp;lt;math&amp;gt;\left\lfloor \frac{N}{2} \right\rfloor^2&amp;lt;/math&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| T&lt;br /&gt;
| &amp;lt;math&amp;gt;\left\lfloor \frac{N}{2} \right\rfloor&amp;lt;/math&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&#039;&#039;&#039;Graph Operations:&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Vertex Deletion.&#039;&#039;&#039; Removes one vertex and all the associated edges from the graph.&lt;br /&gt;
** Implemented by the Pauli Measurement of the relevant qubit in the &#039;&#039;Z basis&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Local Complementation.&#039;&#039;&#039; Inverts the subgraph induced by the neighborhood &amp;lt;math&amp;gt;N_a&amp;lt;/math&amp;gt; of the concerned vertex &amp;lt;math&amp;gt;a&amp;lt;/math&amp;gt;.&lt;br /&gt;
** Implemented by the quantum operator &amp;lt;math&amp;gt;U_a^\tau = e^{-i \frac{\pi}{4}X_a} \bigotimes_{b \in N_a} e^{i \frac{\pi}{4}Z_b}&amp;lt;/math&amp;gt; acting on the qubits &amp;lt;math&amp;gt;a \cup N_a&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &#039;&#039;&#039;Edge Addition.&#039;&#039;&#039; Add an edge between two nonadjacent vertices.&lt;br /&gt;
** Implemented by applying a &#039;&#039;controlled-Z&#039;&#039; between the desired nodes.&lt;br /&gt;
* &#039;&#039;&#039;Edge Deletion.&#039;&#039;&#039; Delete an edge between two adjacent vertices.&lt;br /&gt;
** Implemented by applying a &#039;&#039;controlled-Z&#039;&#039; between the desired nodes.&lt;br /&gt;
* &#039;&#039;&#039;Entanglement Swapping.&#039;&#039;&#039;&lt;br /&gt;
** Implemented by applying &#039;&#039;controlled-Z&#039;&#039; gate followed by two single qubit &#039;&#039;Y-measurement&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===GHZ State Distribution Protocol===&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;&lt;br /&gt;
* N-GHZ state: &amp;lt;math&amp;gt;|\text{N-GHZ}\rangle = (|0\rangle^{\otimes N}+|1\rangle^{\otimes N})/\sqrt{2}&amp;lt;/math&amp;gt;.&lt;br /&gt;
* That is locally equivalent to: &amp;lt;math&amp;gt;(|0\rangle|+\rangle^{\otimes N-1}+|1\rangle|-\rangle^{\otimes N-1})/\sqrt{2}&amp;lt;/math&amp;gt; that is called a star graph &#039;&#039;&#039;upload image star_graph_distributing.svg here&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--[[File:star_graph_distributing.svg]]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Arbitrary set &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; of the network nodes.&lt;br /&gt;
** Assuming that the network topology is already given to us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;&lt;br /&gt;
* N-GHZ state distributed over &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;GHZ-Distribution Algorithm&#039;&#039;&#039;&lt;br /&gt;
# Find a minimal tree covering all the nodes of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; &lt;br /&gt;
# &amp;lt;math&amp;gt;l&amp;lt;/math&amp;gt; is a random leaf from the tree of step 1.&lt;br /&gt;
# For &amp;lt;math&amp;gt;j=1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;|W| - 1&amp;lt;/math&amp;gt;:    &lt;br /&gt;
## Let &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; be any unprocessed node of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; such as &amp;lt;math&amp;gt;l \notin A&amp;lt;/math&amp;gt;.&lt;br /&gt;
## Apply the Start Expansion Algorithm on node &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;l&amp;lt;/math&amp;gt; as &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt; the center of the star.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Start Expansion Algorithm&#039;&#039;&#039;&lt;br /&gt;
This routine uses the Bell pairs of the node &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; to add the edges &amp;lt;math&amp;gt;(b,c_i)&amp;lt;/math&amp;gt; to the graph state, as well as the edge &amp;lt;math&amp;gt;(b, a_0)&amp;lt;/math&amp;gt; &#039;&#039;iff&#039;&#039; &amp;lt;math&amp;gt;A \in W&amp;lt;/math&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
# All the qubits &amp;lt;math&amp;gt;a_i, i \geq 0&amp;lt;/math&amp;gt; of &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; are linked using Controlled-Z operations between all possible pairs.&lt;br /&gt;
# Local complementation is applied to the qubit &amp;lt;math&amp;gt;a_0&amp;lt;/math&amp;gt; linked to &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt;.&lt;br /&gt;
# If &amp;lt;math&amp;gt;A \notin W&amp;lt;/math&amp;gt;:&lt;br /&gt;
## Remove &amp;lt;math&amp;gt;a_0&amp;lt;/math&amp;gt; and all the edges within &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; by &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt;-measuring it&lt;br /&gt;
## Else (when &amp;lt;math&amp;gt;A \in W&amp;lt;/math&amp;gt;):&lt;br /&gt;
###Keep &amp;lt;math&amp;gt;a_0&amp;lt;/math&amp;gt; and apply  Controlled-Z gates to remove all edges within &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt;.&lt;br /&gt;
#Apply a &amp;lt;math&amp;gt;Y&amp;lt;/math&amp;gt;-measurement on all the other qubits &amp;lt;math&amp;gt;a_i \in A&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i&amp;gt;0&amp;lt;/math&amp;gt; creating the desired Start Graph.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arbitrary Graph State Distribution Protocol===&lt;br /&gt;
To distribute an arbitrary graph state we first distribute the edge-decorated complete graph state. From this graph we can construct any other graph state by measuring each edge-qubit with a:&lt;br /&gt;
* &#039;&#039;Z measurement&#039;&#039; to delete this vertex and its edges&lt;br /&gt;
or a&lt;br /&gt;
* &#039;&#039;Y measurement&#039;&#039; to delete the vertex but keep the edges.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;&lt;br /&gt;
* Arbitrary graph state to distribute&lt;br /&gt;
* Arbitrary set &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; participating nodes.&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;&lt;br /&gt;
* Arbitrary graph state distributed over &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Arbitrary Graph State Distribution Algorithm&#039;&#039;&#039;&lt;br /&gt;
# Solve the [https://en.wikipedia.org/wiki/Steiner_tree_problem Steiner Tree Problem] on the network for the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; nodes.&lt;br /&gt;
#* Each one of the nodes of this tree has an central leaf &amp;lt;math&amp;gt;l_n&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;1 \leq n \leq k&amp;lt;/math&amp;gt;.&lt;br /&gt;
# For &amp;lt;math&amp;gt;j=1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;:&lt;br /&gt;
## Distribute a (k-1-j)-GHZ state on the node of &amp;lt;math&amp;gt;l_j&amp;lt;/math&amp;gt; using the [[Distributing Graph States Over Arbitrary Quantum Networks#Protocol Description|GHZ-Distribution Algorithm ]].&lt;br /&gt;
## Delete vertices from the tree in order to have the covering tree for the set &amp;lt;math&amp;gt;W \setminus \{l_j\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# For each one of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; nodes apply local operations to generate the edge-decorated graph state.&lt;br /&gt;
# For each one of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; nodes construct the desired arbitrary state by applying &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Y&amp;lt;/math&amp;gt; measurements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
The distribution of multipartite entangled states over quantum networks has also been studied in the following articles:&lt;br /&gt;
* [http://dx.doi.org/10.1088/1367-2630/18/5/053036 Epping et all (2016)] Investigate the creation of a graph state presenting the shape of the network in the presence of noise.&lt;br /&gt;
* [http://dx.doi.org/10.1103/PhysRevA.86.042304 Cuquet and Calsamiglia (2012)] and [http://dx.doi.org/10.1103/PhysRevLett.104.050501 Matsuzaki et al (2010)] Present decomposition of graph states into various building blocks that can be purified and merged to construct graph states over a network.&lt;br /&gt;
* [http://dx.doi.org/10.1038/s41534-019-0191-6 Hahn et all (2019)] Studies the possible transformations of an already shared graph-state, with a single-qubit per location.&lt;br /&gt;
* [http://dx.doi.org/10.1088/1367-2630/ab05f7 Pirker and Dür (2019)] Includes a protocol very similar to the one presented in this page, but the modeling of the network is different, as well as the optimized metrics. They describe a hierarchical network stack and use it to provide robustness against router or sub-network failures, which is not presented in this work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# [https://arxiv.org/abs/1811.05445 Meignant, Markham and Grosshans (2019)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Version 1 --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Contributed by Lucas Arenstein during the QOSF Mentorship Program&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Mentor: Shraddha Singh&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Distributed_Routing_in_a_Quantum_Internet&amp;diff=4445</id>
		<title>Distributed Routing in a Quantum Internet</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Distributed_Routing_in_a_Quantum_Internet&amp;diff=4445"/>
		<updated>2022-01-06T18:03:46Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Edit by Lucas: Corrections and suggestions from our last talk - Removed Kaushik&amp;#039;s name&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
This [https://arxiv.org/abs/1907.11630 example protocol (1)] implements the task of [[Entanglement Routing]]. They develop routing protocols considering different types of path discovery algorithm considering a: &#039;&#039;&#039;continuous&#039;&#039;&#039; model in which entanglement between a subset of the nodes is produced continuously in the background and an &#039;&#039;&#039;on-demand&#039;&#039;&#039; model where entanglement production start when a request is made. Their protocols work on any network topology but are analyzed in the ring, grid and recursively generated network topology. Their quantum repeater nodes have local state information of the other nodes states.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
* Each quantum repeater node is equipped with:&lt;br /&gt;
** Quantum memories that can store a small number of qubits for some predefined time.&lt;br /&gt;
** Entanglement sources.&lt;br /&gt;
** Ability to perform Entanglement Swapping between any pair of qubits of the network&lt;br /&gt;
** Classical computing resources and communication interface.&lt;br /&gt;
* Each quantum repeater node is aware of the overall network topology and have local state information of the other nodes states.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
In [https://arxiv.org/abs/1907.11630 (1)] they develop routing algorithms with the goal of minimizing the latency of the network to serve a request to create entanglement between two distant nodes in the network. They consider two models for the operation of the quantum network: a &#039;&#039;&#039;continuous&#039;&#039;&#039; model, in which entanglement between a subset of the nodes is&lt;br /&gt;
produced continuously in the background that in principle allows the rapid creation of entanglement between distant nodes using the already pre-generated entanglement pairs and a &#039;&#039;&#039;on-demand&#039;&#039;&#039; model, where entanglement production does not commence before a request is made. Their distributed routing algorithm is studied considering three different path discovery algorithms: Modified Greedy Routing, Local Best Effort Routing and NoN Local Best Effort Routing. All of these strategies are simulated on the ring, grid and recursively generated network topology.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
* Quantum network with topology described by two graphs:&lt;br /&gt;
* A &#039;&#039;&#039;physical&#039;&#039;&#039; graph &amp;lt;math&amp;gt;G_{ph}=(V,E_{ph})&amp;lt;/math&amp;gt;&lt;br /&gt;
** &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; represent quantum repeater nodes that can hold a small number of qubits.&lt;br /&gt;
** &amp;lt;math&amp;gt;E_{ph}&amp;lt;/math&amp;gt; correspond to physical communication channels between nodes.&lt;br /&gt;
* A &#039;&#039;&#039;virtual&#039;&#039;&#039; graph &amp;lt;math&amp;gt;\mathcal{G}=(V,\mathcal{E})&amp;lt;/math&amp;gt;&lt;br /&gt;
** &amp;lt;math&amp;gt;\mathcal{E}&amp;lt;/math&amp;gt; represent &#039;&#039;virtual links&#039;&#039;, nodes that are not physically connected but share entanglement.&lt;br /&gt;
* &amp;lt;math&amp;gt;D&amp;lt;/math&amp;gt; is a &amp;lt;math&amp;gt;|V|\times|V|&amp;lt;/math&amp;gt; matrix representing the demands&lt;br /&gt;
** &amp;lt;math&amp;gt;D_{i,j}&amp;lt;/math&amp;gt; denotes the number of entangled links the source node &amp;lt;math&amp;gt;i \in V&amp;lt;/math&amp;gt; wants to share with destination node &amp;lt;math&amp;gt;j \in V&amp;lt;/math&amp;gt; at a specific point in time.&lt;br /&gt;
* &amp;lt;math&amp;gt;cap&amp;lt;/math&amp;gt; denotes the maximum number of entangled links any two neighbour nodes &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; can share simultaneously.&lt;br /&gt;
* The &#039;&#039;average latency (AL)&#039;&#039; is defined as:&lt;br /&gt;
* &amp;lt;math&amp;gt;AL = \frac{1}{|D|} \sum_{i,j} T_{A,i,j}&amp;lt;/math&amp;gt;, where&lt;br /&gt;
** &amp;lt;math&amp;gt;|D|&amp;lt;/math&amp;gt;  denotes the number of non-zero entries in &amp;lt;math&amp;gt;D&amp;lt;/math&amp;gt;&lt;br /&gt;
** &amp;lt;math&amp;gt;T_{A,i,j}&amp;lt;/math&amp;gt; denotes the latency that a routing algorithm &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; takes to distribute &amp;lt;math&amp;gt;D_{i,j}&amp;lt;/math&amp;gt; entangled link between the nodes &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;j&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==Knowledge Graph==--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}}--&amp;gt;&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
* All of the three routing algorithms are used as a subroutine (&amp;lt;math&amp;gt;\mathbf{PathDisc}&amp;lt;/math&amp;gt;) of &#039;&#039;&#039;Algorithm 1&#039;&#039;&#039;.&lt;br /&gt;
* The entire routing procedure between any two nodes can be subdivided into following three phases:&lt;br /&gt;
# Path discovery phase.&lt;br /&gt;
# Entanglement reservation phase.&lt;br /&gt;
# Entanglement distribution phase.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Algorithm 1&#039;&#039;&#039; - Distributed Routing Algorithm &amp;lt;math&amp;gt;(s, e, \mathcal{G}, D, cap)&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;round = \lceil \frac{D_{s,e}}{cap} \rceil&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;i = 1&amp;lt;/math&amp;gt; &lt;br /&gt;
# &#039;&#039;&#039;while&#039;&#039;&#039; &amp;lt;math&amp;gt; i \leq round&amp;lt;/math&amp;gt; &#039;&#039;&#039;do&#039;&#039;&#039;&lt;br /&gt;
## &amp;lt;math&amp;gt;CommPath_{s,e} = \mathbf{PathDisc}(s, e, \mathcal{G}, D_{s,e})&amp;lt;/math&amp;gt; &lt;br /&gt;
## &amp;lt;math&amp;gt;CommPath_{s,e} = \{ s=u_0, u_1,...,u_{d-1} = e\}&amp;lt;/math&amp;gt; &lt;br /&gt;
## &#039;&#039;&#039;if&#039;&#039;&#039; in &amp;lt;math&amp;gt;CommPath_{s,e}&amp;lt;/math&amp;gt; some of the neighbour nodes do not have enough entangled links &#039;&#039;&#039;then&#039;&#039;&#039;&lt;br /&gt;
### Generate all the missing links&lt;br /&gt;
## &#039;&#039;&#039;else&#039;&#039;&#039;&lt;br /&gt;
### &amp;lt;math&amp;gt;j=1&amp;lt;/math&amp;gt; &lt;br /&gt;
### &#039;&#039;&#039;while&#039;&#039;&#039; &amp;lt;math&amp;gt;j \leq d-2&amp;lt;/math&amp;gt; &#039;&#039;&#039;do&#039;&#039;&#039;&lt;br /&gt;
#### &amp;lt;math&amp;gt;EntSwap(u_0,u_j,j_{j+1})&amp;lt;/math&amp;gt; &lt;br /&gt;
#### j = j + 1&lt;br /&gt;
### dem = dem - cap&lt;br /&gt;
### i = i + 1&lt;br /&gt;
&lt;br /&gt;
* During the path discovery phase (&amp;lt;math&amp;gt;\mathbf{PathDisc}&amp;lt;/math&amp;gt;) each node decides the next hop on the basis of the physical graph topology and the information it has about the shared entangled links with its neighbours.&lt;br /&gt;
* In this phase given a demand &amp;lt;math&amp;gt;D_{v,e}&amp;lt;/math&amp;gt; if &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; is an optimal neighbour of &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; to reach a destination node &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; then the routing algorithm has three options:&lt;br /&gt;
** (1) Select the path via &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; and generate sufficient amount of links between &amp;lt;math&amp;gt;u, v&amp;lt;/math&amp;gt; - see &#039;&#039;&#039;Algorithm 2 - Modified Greedy&#039;&#039;&#039;&lt;br /&gt;
** (2) Try to select another neighbour with whom it already shares enough amount of entangled links - see &#039;&#039;&#039;Algorithm 3 - Local Best Effort&#039;&#039;&#039;&lt;br /&gt;
** (3) (2) + Assume that the quantum repeater nodes have information about its neighbours as well as the neighbours of the neighbours in the virtual graph - see &#039;&#039;&#039;Algorithm 4 - NoN Local Best Effort&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
* Various simulations of these protocols are presented in [https://arxiv.org/abs/1907.11630 (1)] comparing the [https://dl.acm.org/doi/abs/10.1145/335305.335325 classical greedy routing algorithm] and algorithms 2, 3 and 4 considering the continuous and on-demand model of the network with multiple sources of destinations pairs in the Ring and Grid topology.&lt;br /&gt;
&lt;br /&gt;
* The main differences between the approaches in [https://arxiv.org/abs/1801.02020 2] and [https://arxiv.org/abs/1610.05238 3], and this paper is that in this model they put an upper bound on the distance (relative to the physical graph) of a pre-shared entangled link and put an upper bound on the storage time of the entangled link in a quantum memory making the model more realistic.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
* [https://arxiv.org/abs/1610.05238 Schoute et al. (2016)] introduce and formalize some of the concepts presented in this work.&lt;br /&gt;
* In [[Routing Entanglement in the Quantum Internet]] Pant et al., proposed a greedy multi-path routing algorithm for distributing entanglement between a source destination pair in a network. Multi-path routing algorithms are useful for sharing entangled links between a source destination pair. However, this type of approach is not scalable for a larger network with multiple demands.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# [https://arxiv.org/abs/1907.11630 Chakraborty et al. (2019)]&lt;br /&gt;
# [https://arxiv.org/abs/1801.02020 Gyongyosi and Imre (2018)]&lt;br /&gt;
# [https://arxiv.org/abs/1610.05238 Schoute et al. (2016)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Version 1 --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Contributed by Lucas Arenstein during the QOSF Mentorship Program&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Mentor: Shraddha Singh&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Routing_Entanglement_in_the_Quantum_Internet&amp;diff=4444</id>
		<title>Routing Entanglement in the Quantum Internet</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Routing_Entanglement_in_the_Quantum_Internet&amp;diff=4444"/>
		<updated>2022-01-06T18:03:14Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Edit by Lucas: Corrections and suggestions from our last talk - Removed Kaushik&amp;#039;s name&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
This [https://www.nature.com/articles/s41534-019-0139-x example protocol (1)] implements the task of [[Entanglement Routing]] considering different scenarios. All of the protocols presented are applicable to quantum networks with arbitrary topology but their analysis is only concerned with the 2D grid network. They develop protocols for multipath routing of a single entanglement ﬂow with global or local state information of the other quantum repeater nodes and a protocol for multipath routing of simultaneous entanglement ﬂows with repeaters with local state information. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].&lt;br /&gt;
&amp;lt;!-- I&#039;m not sure if it is a Building Block or not [[:Category:Building Blocks|Building Block]] --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
* Each quantum repeater node is equipped with:&lt;br /&gt;
** Quantum memories that can hold a qubit perfectly for some predefined time.&lt;br /&gt;
** Entanglement sources.&lt;br /&gt;
** Ability to perform Bell state measurements between any pair of locally-held qubits.&lt;br /&gt;
** Classical computing resources and communication interface.&lt;br /&gt;
* Each quantum repeater node is aware of the overall network topology, as well as the locations of the &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt; Source-Destination pairs.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
In [https://www.nature.com/articles/s41534-019-0139-x.pdf (1)] they develop and analyze routing protocols for generating maximally entangled qubits (ebits) simultaneously between single or multiple pairs of senders and receivers in a quantum network by exploiting multiple paths in the network. They introduce protocols for quantum repeater nodes in the following scenarios: &lt;br /&gt;
* Multipath routing of a &#039;&#039;&#039;single&#039;&#039;&#039; entanglement ﬂow:&lt;br /&gt;
** Considering nodes with global link-state information (the state of every link is known to every repeater in the network and can be used).&lt;br /&gt;
** Considering nodes with local link-state information (a link knows the states of it neighbors).&lt;br /&gt;
* Multipath routing of &#039;&#039;&#039;simultaneous&#039;&#039;&#039; entanglement ﬂows:&lt;br /&gt;
** Considering nodes with local link-state information.&lt;br /&gt;
All of the protocols above considering their characteristics are divided in two phases with the objective of creating an unbroken end-to-end connection between the source and destination nodes. The external and the internal phase which occur in this order.&lt;br /&gt;
*External phase: each pair of memories (neighboring repeaters) across an edge attempts to establish a shared entangled (EPR) pair.&lt;br /&gt;
*Internal phase: BSMs are attempted within each memory (repeater node) based on the successes and failures of the neighboring links in the external phase.&lt;br /&gt;
&lt;br /&gt;
The high-level objective is: Considering the assumptions of quantum and classical operations at each of the repeater nodes of the underlying network, what operations should be performed at the repeater to achieve maximum entanglement-generation rate for one sender and receiver or achieve maximum rate region for multiple ﬂows of entanglement.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
Quantum network with topology described by a graph &amp;lt;math&amp;gt;G(V,E)&amp;lt;/math&amp;gt;:&lt;br /&gt;
* Each of the &amp;lt;math&amp;gt;N=|V|&amp;lt;/math&amp;gt; nodes is equipped with a quantum repeater.&lt;br /&gt;
* Each of the &amp;lt;math&amp;gt;M=|E|&amp;lt;/math&amp;gt; edges is a lossy optical channel of range &amp;lt;math&amp;gt;L_i&amp;lt;/math&amp;gt; (km) and power transmissivity &amp;lt;math&amp;gt;\eta_i \propto e^{-\alpha L_i}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i \in E&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\alpha&amp;lt;/math&amp;gt; depends on the material of the channel.&lt;br /&gt;
* &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt; Source-Destination pairs &amp;lt;math&amp;gt;(A_j, B_j)&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;1 \leq j \leq k&amp;lt;/math&amp;gt; situated at (not necessarily distinct) nodes in &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt;.&lt;br /&gt;
Considering this graph&amp;lt;math&amp;gt;G&amp;lt;/math&amp;gt; we adopt the following notation for the repeater network.&lt;br /&gt;
* Each node &amp;lt;math&amp;gt;v \in V&amp;lt;/math&amp;gt; is a repeater. &lt;br /&gt;
* Each edge &amp;lt;math&amp;gt;e \in E&amp;lt;/math&amp;gt; is a physical link connecting two repeater nodes.&lt;br /&gt;
* &amp;lt;math&amp;gt;S(e) \in \mathbb{Z}^+&amp;lt;/math&amp;gt; is an integer edge weight corresponding to the number of parallel channel across edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;\mathcal{N}(v)&amp;lt;/math&amp;gt; is the set of neighbor edges of &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;&lt;br /&gt;
* &amp;lt;math&amp;gt;d(v) = |\mathcal{N}(v)|&amp;lt;/math&amp;gt; is the degree of node &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;\sum_{e \in \mathcal{N}(v)} S(e)&amp;lt;/math&amp;gt; is the number of memories at node &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;d_A&amp;lt;/math&amp;gt; distance of a node to the node A, using the &amp;lt;math&amp;gt;\mathbb{L}^2&amp;lt;/math&amp;gt; norm.&lt;br /&gt;
* An ebit represents a maximally entangled qubit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==Knowledge Graph== --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}} --&amp;gt;&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* All of the three protocols below assume that time is slotted and each memory can hold a qubit perfectly for &amp;lt;math&amp;gt;T \geq 1&amp;lt;/math&amp;gt; time slot before the stored qubit completely decoheres.&lt;br /&gt;
* Each time slot &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;t=1,2,... &amp;lt;/math&amp;gt; is divided into 2 phases:&lt;br /&gt;
* &#039;&#039;&#039;External Phase:&#039;&#039;&#039;&lt;br /&gt;
** Each of the &amp;lt;math&amp;gt;S(e)&amp;lt;/math&amp;gt; pairs of memories across and edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; attempts to establish an EPR pair.&lt;br /&gt;
*:- An entanglement attempt across any one of the &amp;lt;math&amp;gt;S(e)&amp;lt;/math&amp;gt; parallel links across edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; succeeds with probability &amp;lt;math&amp;gt;p_0(e) \sim \eta(e)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;\eta(e) \sim e^{-\alpha L_e}&amp;lt;/math&amp;gt; &amp;lt;!--is the transmissivity of a lossy optical channel of length &amp;lt;math&amp;gt;L(e)&amp;lt;/math&amp;gt;.--&amp;gt;&lt;br /&gt;
*:- The probability that one or more ebits are established across an edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; is &amp;lt;math&amp;gt;p(e)=1-(1-p_0)^{S(e)}&amp;lt;/math&amp;gt;.&lt;br /&gt;
*:- Assuming &amp;lt;math&amp;gt;S(e)=S,&amp;lt;/math&amp;gt; give us &amp;lt;math&amp;gt;p(e)=p,&amp;lt;/math&amp;gt; &amp;lt;math&amp;gt;\forall e \in E&amp;lt;/math&amp;gt;.&lt;br /&gt;
** Using two-way classical communication over an edge &amp;lt;!--&amp;lt;math&amp;gt;e(u, v)&amp;lt;/math&amp;gt;--&amp;gt;, neighboring repeater nodes &amp;lt;!--&amp;lt;math&amp;gt;u, v&amp;lt;/math&amp;gt;--&amp;gt; learn which of the S(e) (if any) succeeded in the external phase, in a given time slot.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Internal Phase:&#039;&#039;&#039;&lt;br /&gt;
** BSMs are attempted locally at each repeater node between pairs of qubit memories based on the success and failure of the neighboring links in the external phase.&lt;br /&gt;
*:- These BSM attempts are called internal links, i.e., links between memories internal to a repeater node.&lt;br /&gt;
*:- Each of these internal-link attempts succeed with probability &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
At the end of one time-slot a along a path comprising of &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; edges (and thus &amp;lt;math&amp;gt;(k-1)&amp;lt;/math&amp;gt; repeater nodes) one ebit is successfully shared between the end points of the path with probability &amp;lt;math&amp;gt;p^k q^{k-1}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The maximum number of ebits that can be shared between node &amp;lt;math&amp;gt;a&amp;lt;/math&amp;gt; and node &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt; after one time-slot is &amp;lt;math&amp;gt;min\{d(a), d(b)\}&amp;lt;/math&amp;gt;, assuming &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; is the same over all edges.&lt;br /&gt;
&lt;br /&gt;
The protocols described below focus on finding the optimal strategy for each repeater node in order to decide which locally held qubits to attempt BSMs during the internal phase of a&lt;br /&gt;
time slot. Based on the outcomes of the external phase and considering global or local link-state knowledge and &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Multipath Routing of a Single Entanglement Flow===&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;K=1&amp;lt;/math&amp;gt;, Source-Destination pair &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum network with ebits shared between the end points of &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
====Protocol for Entanglement Routing with Global Link-state Information====&lt;br /&gt;
After the External Phase&lt;br /&gt;
# &amp;lt;math&amp;gt;m = 1&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;G_m&amp;lt;/math&amp;gt; = Subgraph induced by the successful external links and the repeater nodes after the external phase.&lt;br /&gt;
# While (True):&lt;br /&gt;
## &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; = shortest path in &amp;lt;math&amp;gt;G_m&amp;lt;/math&amp;gt; connecting &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;. &lt;br /&gt;
## If &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; is empty: Break While Loop.&lt;br /&gt;
## Else:&lt;br /&gt;
### Set &amp;lt;math&amp;gt;L_m&amp;lt;/math&amp;gt; as the length of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt;.&lt;br /&gt;
### Try connecting all internal links along the nodes of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; &amp;lt;br /&amp;gt;//successfully generating an ebit between &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt; with probability &amp;lt;math&amp;gt;q^{L_m - 1}&amp;lt;/math&amp;gt;&lt;br /&gt;
## &amp;lt;math&amp;gt;G_{m+1}&amp;lt;/math&amp;gt; = &amp;lt;math&amp;gt;G_m -&amp;lt;/math&amp;gt; all external and internal links of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt;.&lt;br /&gt;
## &amp;lt;math&amp;gt;m = m + 1.&amp;lt;/math&amp;gt; &lt;br /&gt;
&lt;br /&gt;
====Protocol for Entanglement Routing with Local Link-state Information====&lt;br /&gt;
&lt;br /&gt;
Knowledge of success and failure of the External Phase is communicated only to the two repeater nodes connected by the link.&lt;br /&gt;
Repeater nodes need to decide on which pair(s) of memories BSMs should be attempted (which internal links to attempt), based only on information about the states of external links adjacent to them.&lt;br /&gt;
&lt;br /&gt;
After the External Phase&lt;br /&gt;
# For every repeater except &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;: &amp;lt;br /&amp;gt; Let &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; be the node of this iteration.&lt;br /&gt;
## If less than one of the neighboring external links is successful: &amp;lt;br /&amp;gt;Then no internal links are attempted since this repeater node can not be part of a path from &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
## Else If two or more neighboring external links are successful: &amp;lt;br /&amp;gt;Then let &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; be the node linked to &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; with the smallest &amp;lt;math&amp;gt;d_{A_1}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; be the node linked to &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; with the smallest &amp;lt;math&amp;gt;d_{B_1}&amp;lt;/math&amp;gt;. &amp;lt;br /&amp;gt; Attempt a BSM on node &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; on the memories connected to &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;.&lt;br /&gt;
### Else If four neighboring external links are successful: &amp;lt;br /&amp;gt; Then attempt a BSM on node &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; on the remaining memories disconsidering the two memories from the previous step. &lt;br /&gt;
&lt;br /&gt;
===Protocol for Simultaneous Entanglement Flows with Link-state Information===&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;K=2&amp;lt;/math&amp;gt;, Source-Destination pairs &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(A_2, B_2)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum network with ebits shared between the end points of &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(A_2, B_2)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
This situation motivates the &#039;&#039;&#039;Multi-ﬂow Spatial-division&#039;&#039;&#039; rule which divides the the network between two spatial regions corresponding to the two flows.&lt;br /&gt;
&lt;br /&gt;
* When the shortest path connecting the two source-destination pairs &#039;&#039;&#039;do not&#039;&#039;&#039; cross the network is divided between two spatial regions corresponding to the two ﬂows.&lt;br /&gt;
** For each one of this regions we apply the Protocol for Entanglement Routing with Local Link-state Information.&lt;br /&gt;
&lt;br /&gt;
* When the shortest path connecting the two source-destination pairs &#039;&#039;&#039;do&#039;&#039;&#039; cross the network is divided between two spatial regions corresponding to the two ﬂows.&lt;br /&gt;
** Considering the square-grid topology the two spatial regions are divided by two crossing lines with an angle &amp;lt;math&amp;gt;\theta&amp;lt;/math&amp;gt; between them (forming a hourglass shape).&lt;br /&gt;
** For each one of this regions we apply the Protocol for Entanglement Routing with Local Link-state Information.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
* The goal of the optimal repeater strategy is to achieve:&lt;br /&gt;
** Maximum entanglement generation rate for a single sender and receiver (&amp;lt;math&amp;gt;K=1&amp;lt;/math&amp;gt;).&lt;br /&gt;
*:- Above a (percolation) threshold determined by &amp;lt;math&amp;gt;p&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt; the entanglement generation rate will depend only linearly on the transmissivity &amp;lt;math&amp;gt;\eta&amp;lt;/math&amp;gt; of a single link in the network.&lt;br /&gt;
* Maximum rate regions simultaneously achievable by the entanglement flows (&amp;lt;math&amp;gt;K \geq 2&amp;lt;/math&amp;gt;).&lt;br /&gt;
*:- Above a (percolation) threshold determined by &amp;lt;math&amp;gt;p&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt; this protocol signiﬁcantly exceeds the ones that each repeater node makes BSM decisions by simply time-sharing between catering to the individual ﬂows.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
* [https://arxiv.org/abs/1601.00966 Pirandola (2016)] analyzed entanglement-generation capacities of repeater networks assuming ideal repeater nodes and argued that for a single ﬂow the maximum entanglement-generation rate &amp;lt;math&amp;gt;R_1&amp;lt;/math&amp;gt; reduces to the classical max-ﬂow min-cut problem.&lt;br /&gt;
* [https://arxiv.org/abs/1606.00135 Azuma and Kato (2016)] looked at an &amp;quot;aggregated&amp;quot; protocol in which the repeater protocols run in parallel.&lt;br /&gt;
* [https://arxiv.org/abs/1610.05238 Schoute et al. (2016)] developed routing protocols on speciﬁc network topologies and found scaling laws as functions on the number of qubits in the memories at nodes, and the time and space consumed by the routing algorithms, under lossless and noiseless assumptions.&lt;br /&gt;
* [https://arxiv.org/abs/quant-ph/0612167 Acín et al. (2006)] have considered the problem of entanglement percolation where neighboring nodes share a perfect lossless pure state.&lt;br /&gt;
There is an extensive literature of quantum networks analyzing repeaters in a linear chain for example:&lt;br /&gt;
[https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.81.5932 Briegel et al. (1998)], [https://arxiv.org/abs/0809.3629 Jiand et al. (2008)] and [https://www.nature.com/articles/srep20463 Muralidharan et al. (2016)].&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
# [https://www.nature.com/articles/s41534-019-0139-x Pant et al. (2019)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Version 1 --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Contributed by Lucas Arenstein during the QOSF Mentorship Program&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Mentor: Shraddha Singh&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Entanglement_Routing&amp;diff=4443</id>
		<title>Entanglement Routing</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Entanglement_Routing&amp;diff=4443"/>
		<updated>2022-01-06T18:02:07Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Edit by Lucas: Corrections and suggestions from our last talk.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Functionality page describes a general task which can be realized in a quantum network --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Functionality Description==&lt;br /&gt;
Entanglement routing allows a quantum network to generate long distance entanglement between two or multiple nodes. A Quantum router is a device used to transmit quantum information over long distances along a quantum network using entanglement swapping between routers. As quantum information transmissivity decays exponentially in function of the distance, quantum routers are needed to successfully establish entangled states between any nodes on the quantum network.&lt;br /&gt;
&lt;br /&gt;
There are entanglement routing protocols that are specifically designed for certain network topology e.g: linear, rings, spheres, grids, recursively generated network or for networks with arbitrary topology.&lt;br /&gt;
&lt;br /&gt;
The main goal of entanglement routing is to develop efficient routing protocols to enable long distance entanglement.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].&lt;br /&gt;
&amp;lt;!-- I&#039;m not sure if it is a Building Block or not [[:Category:Building Blocks|Building Block]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Description: A lucid definition of functionality in discussion.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Tags Any related page or list of protocols is connected by this section--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Use Case (if available) analyses how practical the protocol is--&amp;gt;&lt;br /&gt;
==Use Case==&lt;br /&gt;
*No classical analogue.&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
&amp;lt;!-- List of different types of example protocol achieving the functionality--&amp;gt;&lt;br /&gt;
* Almost all of the protocols within this functionality are in the [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]].&lt;br /&gt;
Entanglement routing protocol:&lt;br /&gt;
* [[Routing Entanglement in the Quantum Internet]]&lt;br /&gt;
* [[Distributed Routing in a Quantum Internet]]&lt;br /&gt;
&amp;lt;!-- Maybe in the future make a section on the wiki about applications or usages of quantum networks ? --&amp;gt;&lt;br /&gt;
Related protocol:&lt;br /&gt;
* [[Distributing Graph States Over Arbitrary Quantum Networks]]&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols.--&amp;gt;&lt;br /&gt;
* Entanglement routing assumes the presence of: &lt;br /&gt;
** Classical and quantum communication physical channels.&lt;br /&gt;
** Quantum repeater nodes.&lt;br /&gt;
* Quantum repeater nodes:&lt;br /&gt;
** Contain qubits that in the short and medium term are applicable to only basic operations i.e, Bell State Measurements to pairs of neighborhood nodes allowing the Entanglement Swapping operation.&lt;br /&gt;
** Have global (all the network) or local (just neighborhood) information on the state of other nodes.&lt;br /&gt;
* Some protocols consider fault-tolerant operations on the nodes but other use [https://en.wikipedia.org/wiki/Entanglement_distillation Entanglement Distillation] or Error Corrections schemes on the repeater nodes [https://www.nature.com/articles/s41534-021-00438-7 5].&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- Any issue that could not be addressed or find a place in the above sections or any review paper discussing a feature of various types of protocols related to the functionality. --&amp;gt;&lt;br /&gt;
All of the approaches below were based on the specific structure of the physical graphs and manipulation of multi-partite entangled states. However, with current day technologies, these solutions are very difficult to realize in practice.&lt;br /&gt;
&lt;br /&gt;
* Distributing entanglement in a simple chain network:&lt;br /&gt;
** For a review: [https://ieeexplore.ieee.org/document/7010905 Munro et al. (2015)]&lt;br /&gt;
** [https://arxiv.org/abs/0705.4128 Meter et al. (2009)]&lt;br /&gt;
** [https://arxiv.org/abs/0808.2972 Goebel et al. (2008)]&lt;br /&gt;
** [https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.81.5932 Briegel et al. (1998)]&lt;br /&gt;
&lt;br /&gt;
* Distributing entanglement from a percolation theory point of view:&lt;br /&gt;
** [https://arxiv.org/abs/1209.5303 Perseguers et al. (2013)]&lt;br /&gt;
** [https://www.nature.com/articles/nphys549 Acín et al. (2007)]&lt;br /&gt;
** [https://arxiv.org/abs/0906.1622 Broadfoot et al. (2009)]&lt;br /&gt;
&lt;br /&gt;
* Distributing Entanglements in a noisy network using the concept of quantum network coding:&lt;br /&gt;
&amp;lt;!-- ** [https://arxiv.org/abs/0807.0208 Perseguers et al. (2008)] --&amp;gt;&lt;br /&gt;
** [https://arxiv.org/abs/0910.4074 Fowler et al. (2010)]&lt;br /&gt;
** [https://arxiv.org/abs/0910.1459 Perseguers (2010)]&lt;br /&gt;
** [https://arxiv.org/abs/1202.4077 Cavalcanti and Kwek (2012)]&lt;br /&gt;
** [https://arxiv.org/abs/1202.1016 Mazurek et al. (2014)]&lt;br /&gt;
&lt;br /&gt;
The routing approaches below are based on classical techniques and these are arguably more likely to be implemented with the near future quantum technology.&lt;br /&gt;
In all of these approaches, first, the nodes discover a path from a source to a destination and then distribute the entangled links along the path. The difference between these approaches comes from the path selection algorithms.&lt;br /&gt;
* [https://ieeexplore.ieee.org/document/8068178 Caleffi (2017)]&lt;br /&gt;
* [https://arxiv.org/abs/1801.02020 Gyongyosi and Imre (2018)]&lt;br /&gt;
* [https://arxiv.org/abs/1206.5655 Meter et al. (2013)]&lt;br /&gt;
* [https://arxiv.org/abs/1610.05238 Schoute et al. (2016)]&lt;br /&gt;
&lt;br /&gt;
Example of optimization metrics of Entanglement Routing Protocols:&lt;br /&gt;
* In [[Routing Entanglement in the Quantum Internet]] their goal is to maximize the rate regions simultaneously achievable by the entanglement flows&lt;br /&gt;
* In [[Distributed Routing in a Quantum Internet]] their objective is to minimize the latency of the network to serve a request to create entanglement between two distant nodes in the network.&lt;br /&gt;
* In [https://ieeexplore.ieee.org/document/9210823 Entanglement Distribution in a Quantum Network: A Multicommodity Flow-Based Approach - Chakraborty et al. (2020)] they consider the problem of optimizing the achievable EPR-pair distribution rate between multiple source-destination pairs.&lt;br /&gt;
&lt;br /&gt;
Other Works:&lt;br /&gt;
* In [https://arxiv.org/abs/1601.00966 Capacities of repeater-assisted quantum communications - Pirandola (2016)] analyzed entanglement-generation capacities of repeater networks assuming ideal repeater nodes and argued that for a single ﬂow the maximum entanglement-generation rate &amp;lt;math&amp;gt;R_1&amp;lt;/math&amp;gt; reduces to the classical max-ﬂow min-cut problem.&lt;br /&gt;
* In [https://arxiv.org/abs/1510.08863 Fundamental Limits of Repeaterless Quantum Communications - Pirandola et al. (2015)] provides precise and general benchmarks for quantum repeaters. &lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# [https://arxiv.org/abs/1610.05238 Schoute et al. Shortcuts to Quantum Network Routing (2016)]&lt;br /&gt;
# [https://arxiv.org/abs/1907.11630 Chakraborty et al. (2019)] - [[Distributed Routing in a Quantum Internet]]&lt;br /&gt;
# [https://www.nature.com/articles/s41534-019-0139-x Pant et al. Routing entanglement in the quantum internet (2019)] - [[Routing Entanglement in the Quantum Internet]]&lt;br /&gt;
# [https://dl.acm.org/doi/10.1145/3387514.3405853 Shi and Qian, Concurrent Entanglement Routing for Quantum Networks: Model and Designs (2020)]&lt;br /&gt;
# [https://www.nature.com/articles/s41534-021-00438-7 Rozpędek et al. Quantum repeaters based on concatenated bosonic and discrete-variable quantum codes (2021)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Version 1 --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Contributed by Lucas Arenstein during the QOSF Mentorship Program&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;Mentor: Shraddha Singh - Reviewer: Kaushik Chakraborty &amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4442</id>
		<title>Protocol Library</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4442"/>
		<updated>2022-01-06T13:31:16Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Edit by Lucas: Just changed the order of 2 protocols on the entanglement routing functionality&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!width=&amp;quot;40%&amp;quot;|Functionality&lt;br /&gt;
!width=&amp;quot;60%&amp;quot;|Protocols&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;7&amp;quot;|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Clifford Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Trap Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Auth-QFT-Auth Scheme for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Unitary Design Scheme for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Naive approach using Quantum Teleportation]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Bit Commitment]]||[[Quantum Bit Commitment]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Coin Flipping]]||[[Quantum Strong Coin Flipping]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Weak Coin Flipping]]&lt;br /&gt;
|- &lt;br /&gt;
|[[Copy Protection]]||[[Copy Protection of Compute and Compare Programs]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;8&amp;quot;|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare and Measure Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Arbitrated Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Blind Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Designated Verifiable Quantum Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Limited Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Proxy Signature]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Entanglement Verification]]||[[Multipartite Entanglement Verification]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Fingerprinting]]||[[Quantum Fingerprinting]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Identity Authentication]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Key Distribution (MDI-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Device-Independent Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Continuous-Variable Quantum Key Distribution (CV-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Leader Election]]||[[Quantum Leader Election]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Money|(Quantum) Money]]||[[Quantum Cheque]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Coin]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Token]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wiesner Quantum Money]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;10&amp;quot;| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval in the Visible Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model and in the Blind Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Random Access Memory]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| [[Quantum Secret Sharing|Secret Sharing]] ||[[Quantum Secret Sharing using GHZ States]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Secret Sharing]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;| [[Secure Client- Server Delegated Quantum Computation]] ||[[Classical Fully Homomorphic Encryption for Quantum Circuits]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Prepare-and-Send Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Pseudo-Secret Random Qubit Generator (PSQRG)]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Secure Verifiable Client-Server Delegated Quantum Computation]]||[[Prepare-and-Send Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Verifiable Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Delegated Classical Computation]]||[[Secure Client-Server Classical Delegated Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Multi-Party Delegated Computation]]||[[Secure Multiparty Delegated Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Gate Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Verification of Quantum Computation]]||[[Interactive Proofs for Quantum Computation|Quantum Prover Interactive Proofs]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of NP-complete problems]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Sub-Universal Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Classical Verification of Universal Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Travelling Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum voting based on conjugate coding]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Practical Quantum Electronic Voting]]&lt;br /&gt;
|-&lt;br /&gt;
||-||[[Weak String Erasure]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Entanglement Routing]]||[[Distributed Routing in a Quantum Internet]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Routing Entanglement in the Quantum Internet]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributing Graph States Over Arbitrary Quantum Networks]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Quantum Conference Key Agreement]]||[[Anonymous Conference Key Agreement using GHZ states]]&lt;br /&gt;
|-&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Entanglement_Routing&amp;diff=4423</id>
		<title>Entanglement Routing</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Entanglement_Routing&amp;diff=4423"/>
		<updated>2021-12-22T19:49:28Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Added more papers on the further information section based on our talk with Kaushik from his &amp;quot;Distributed Routing in a Quantum Internet&amp;quot; paper. To do:  add something from Pirandola&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Functionality page describes a general task which can be realized in a quantum network --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Functionality Description==&lt;br /&gt;
Entanglement routing allows a quantum network to generate long distance entanglement between two or multiple nodes. As quantum information transmissivity decays exponentially in function of the distance, quantum routers are needed to successfully establish entangled states between any nodes on a quantum network.&lt;br /&gt;
&lt;br /&gt;
The main goal of entanglement routing is to develop efficient routing protocols to enable long distance entanglement.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].&lt;br /&gt;
&amp;lt;!-- I&#039;m not sure if it is a Building Block or not [[:Category:Building Blocks|Building Block]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Description: A lucid definition of functionality in discussion.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Tags Any related page or list of protocols is connected by this section--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Use Case (if available) analyses how practical the protocol is--&amp;gt;&lt;br /&gt;
==Use Case==&lt;br /&gt;
*No classical analogue.&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
&amp;lt;!-- List of different types of example protocol achieving the functionality--&amp;gt;&lt;br /&gt;
* All the protocols within this functionality are in the [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]].&lt;br /&gt;
* There are entanglement routing protocols that are specifically designed for certain network topology e.g: linear, rings, spheres, grids, recursively generated network or for networks with arbitrary topology.&lt;br /&gt;
* Quantum repeater nodes have global (all the network) or local (just neighborhood) information on the state of other nodes.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols.--&amp;gt;&lt;br /&gt;
* Entanglement routing assumes the presence of: &lt;br /&gt;
** Classical and quantum communication physical channels.&lt;br /&gt;
** Quantum repeater nodes.&lt;br /&gt;
* Quantum repeater nodes:&lt;br /&gt;
** Contain qubits that in the short and medium term are applicable to only basic operations i.e, Bell State Measurements to pairs of neighborhood nodes allowing the Entanglement Swapping operation.&lt;br /&gt;
* Some protocols consider fault-tolerant operations on the nodes but other use [https://en.wikipedia.org/wiki/Entanglement_distillation Entanglement Distillation] or Error Corrections schemes on the repeater nodes [https://www.nature.com/articles/s41534-021-00438-7 5].&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- Add Papers by Pirandola --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Any issue that could not be addressed or find a place in the above sections or any review paper discussing a feature of various types of protocols related to the functionality. --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1) I&#039;m not really sure if it is a good idea to add something about the Distributing Graph States Over Arbitrary Quantum Networks in this page/functionality, maybe as an example of usage of quantum networks ?--&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2) Should I add some of the references from the .doc I send you? --&amp;gt;&lt;br /&gt;
All of the approaches below were based on the specific structure of the physical graphs and manipulation of multi-partite entangled states. However, with current day technologies, these solutions are very difficult to realize in practice.&lt;br /&gt;
&lt;br /&gt;
* Distributing entanglement in a simple chain network:&lt;br /&gt;
** For a review: [https://ieeexplore.ieee.org/document/7010905 Munro et al. (2015)]&lt;br /&gt;
** [https://arxiv.org/abs/0705.4128 Meter et al. (2009)]&lt;br /&gt;
** [https://arxiv.org/abs/0808.2972 Goebel et al. (2008)]&lt;br /&gt;
** [https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.81.5932 Briegel et al. (1998)]&lt;br /&gt;
&lt;br /&gt;
* Distributing entanglement from a percolation theory point of view:&lt;br /&gt;
** [https://arxiv.org/abs/1209.5303 Perseguers et al. (2013)]&lt;br /&gt;
** [https://www.nature.com/articles/nphys549 Acín et al. (2007)]&lt;br /&gt;
** [https://arxiv.org/abs/0906.1622 Broadfoot et al. (2009)]&lt;br /&gt;
&lt;br /&gt;
* Distributing Entanglements in a noisy network using the concept of quantum network coding:&lt;br /&gt;
&amp;lt;!-- ** [https://arxiv.org/abs/0807.0208 Perseguers et al. (2008)] --&amp;gt;&lt;br /&gt;
** [https://arxiv.org/abs/0910.4074 Fowler et al. (2010)]&lt;br /&gt;
** [https://arxiv.org/abs/0910.1459 Perseguers (2010)]&lt;br /&gt;
** [https://arxiv.org/abs/1202.4077 Cavalcanti and Kwek (2012)]&lt;br /&gt;
** [https://arxiv.org/abs/1202.1016 Mazurek et al. (2014)]&lt;br /&gt;
&lt;br /&gt;
The routing approaches below are based on classical techniques and these are arguably more likely to be implemented with the near future quantum technology.&lt;br /&gt;
In all of these approaches, first, the nodes discover a path from a source to a destination and then distribute the entangled links along the path. The difference between these approaches comes from the path selection algorithms.&lt;br /&gt;
* [https://ieeexplore.ieee.org/document/8068178 Caleffi (2017)]&lt;br /&gt;
* [https://arxiv.org/abs/1801.02020 Gyongyosi and Imre (2018)]&lt;br /&gt;
* [https://arxiv.org/abs/1206.5655 Meter et al. (2013)]&lt;br /&gt;
* [https://arxiv.org/abs/1610.05238 Schoute et al. (2016)]&lt;br /&gt;
&lt;br /&gt;
Example of optimization metrics of Entanglement Routing Protocols:&lt;br /&gt;
* In [[Routing Entanglement in the Quantum Internet]] their goal is to maximize the rate regions simultaneously achievable by the entanglement flows&lt;br /&gt;
* In [[Distributed Routing in a Quantum Internet]] their objective is to minimize the latency of the network to serve a request to create entanglement between two distant nodes in the network.&lt;br /&gt;
* In [https://ieeexplore.ieee.org/document/9210823 Entanglement Distribution in a Quantum Network: A Multicommodity Flow-Based Approach - Chakraborty et al. (2020)] they consider the problem of optimizing the achievable EPR-pair distribution rate between multiple source-destination pairs.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# [https://arxiv.org/abs/1610.05238 Schoute et al. Shortcuts to Quantum Network Routing (2016)]&lt;br /&gt;
# [https://arxiv.org/abs/1907.11630 Chakraborty et al. (2019)] - [[Distributed Routing in a Quantum Internet]]&lt;br /&gt;
# [https://www.nature.com/articles/s41534-019-0139-x Pant et al. Routing entanglement in the quantum internet (2019)] - [[Routing Entanglement in the Quantum Internet]]&lt;br /&gt;
# [https://dl.acm.org/doi/10.1145/3387514.3405853 Shi and Qian, Concurrent Entanglement Routing for Quantum Networks: Model and Designs (2020)]&lt;br /&gt;
# [https://www.nature.com/articles/s41534-021-00438-7 Rozpędek et al. Quantum repeaters based on concatenated bosonic and discrete-variable quantum codes (2021)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Lucas Arenstein&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4422</id>
		<title>Protocol Library</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4422"/>
		<updated>2021-12-22T19:04:04Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Added the Distributed Routing in a Quantum Internet hyperlink&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!width=&amp;quot;40%&amp;quot;|Functionality&lt;br /&gt;
!width=&amp;quot;60%&amp;quot;|Protocols&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Clifford Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Trap Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Naive approach using Quantum Teleportation]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Bit Commitment]]||[[Quantum Bit Commitment]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Coin Flipping]]||[[Quantum Strong Coin Flipping]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Weak Coin Flipping]]&lt;br /&gt;
|- &lt;br /&gt;
|[[Copy Protection]]||[[Copy Protection of Compute and Compare Programs]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;8&amp;quot;|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare and Measure Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Arbitrated Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Blind Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Designated Verifiable Quantum Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Limited Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Proxy Signature]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Entanglement Verification]]||[[Multipartite Entanglement Verification]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Fingerprinting]]||[[Quantum Fingerprinting]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Identity Authentication]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Key Distribution (MDI-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Device-Independent Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Continuous-Variable Quantum Key Distribution (CV-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Leader Election]]||[[Quantum Leader Election]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Money|(Quantum) Money]]||[[Quantum Cheque]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Coin]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Token]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wiesner Quantum Money]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;10&amp;quot;| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval in the Visible Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model and in the Blind Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Random Access Memory]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| [[Quantum Secret Sharing|Secret Sharing]] ||[[Quantum Secret Sharing using GHZ States]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Secret Sharing]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;| [[Secure Client- Server Delegated Quantum Computation]] ||[[Classical Fully Homomorphic Encryption for Quantum Circuits]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Prepare-and-Send Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Pseudo-Secret Random Qubit Generator (PSQRG)]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Secure Verifiable Client-Server Delegated Quantum Computation]]||[[Prepare-and-Send Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Verifiable Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Delegated Classical Computation]]||[[Secure Client-Server Classical Delegated Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Multi-Party Delegated Computation]]||[[Secure Multiparty Delegated Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Gate Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Verification of Quantum Computation]]||[[Interactive Proofs for Quantum Computation|Quantum Prover Interactive Proofs]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of NP-complete problems]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Sub-Universal Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Classical Verification of Universal Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Travelling Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum voting based on conjugate coding]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Practical Quantum Electronic Voting]]&lt;br /&gt;
|-&lt;br /&gt;
||-||[[Weak String Erasure]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Entanglement Routing]]||[[Routing Entanglement in the Quantum Internet]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Routing in a Quantum Internet]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributing Graph States Over Arbitrary Quantum Networks]]&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Distributed_Routing_in_a_Quantum_Internet&amp;diff=4421</id>
		<title>Distributed Routing in a Quantum Internet</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Distributed_Routing_in_a_Quantum_Internet&amp;diff=4421"/>
		<updated>2021-12-22T19:02:06Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: First version of the page made by Lucas.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
This [https://arxiv.org/abs/1907.11630 example protocol (1)] implements the task of [[Entanglement Routing]]. They develop routing protocols considering different types of path discovery algorithm considering a: &#039;&#039;&#039;continuous&#039;&#039;&#039; model in which entanglement between a subset of the nodes is produced continuously in the background and an &#039;&#039;&#039;on-demand&#039;&#039;&#039; model where entanglement production start when a request is made. Their protocols work on any network topology but are analyzed in the ring, grid and recursively generated network topology. Their quantum repeater nodes have local state information of the other nodes states.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
* Each quantum repeater node is equipped with:&lt;br /&gt;
** Quantum memories that can store a small number of qubits for some predefined time.&lt;br /&gt;
** Entanglement sources.&lt;br /&gt;
** Ability to perform Entanglement Swapping between any pair of qubits of the network&lt;br /&gt;
** Classical computing resources and communication interface.&lt;br /&gt;
* Each quantum repeater node is aware of the overall network topology and have local state information of the other nodes states.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
In [https://arxiv.org/abs/1907.11630 (1)] they develop routing algorithms with the goal of minimizing the latency of the network to serve a request to create entanglement between two distant nodes in the network. They consider two models for the operation of the quantum network: a &#039;&#039;&#039;continuous&#039;&#039;&#039; model, in which entanglement between a subset of the nodes is&lt;br /&gt;
produced continuously in the background that in principle allows the rapid creation of entanglement between distant nodes using the already pre-generated entanglement pairs and a &#039;&#039;&#039;on-demand&#039;&#039;&#039; model, where entanglement production does not commence before a request is made. Their distributed routing algorithm is studied considering three different path discovery algorithms: Modified Greedy Routing, Local Best Effort Routing and NoN Local Best Effort Routing. All of these strategies are simulated on the ring, grid and recursively generated network topology.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
* Quantum network with topology described by two graphs:&lt;br /&gt;
* A &#039;&#039;&#039;physical&#039;&#039;&#039; graph &amp;lt;math&amp;gt;G_{ph}=(V,E_{ph})&amp;lt;/math&amp;gt;&lt;br /&gt;
** &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt; represent quantum repeater nodes that can hold a small number of qubits.&lt;br /&gt;
** &amp;lt;math&amp;gt;E_{ph}&amp;lt;/math&amp;gt; correspond to physical communication channels between nodes.&lt;br /&gt;
* A &#039;&#039;&#039;virtual&#039;&#039;&#039; graph &amp;lt;math&amp;gt;\mathcal{G}=(V,\mathcal{E})&amp;lt;/math&amp;gt;&lt;br /&gt;
** &amp;lt;math&amp;gt;\mathcal{E}&amp;lt;/math&amp;gt; represent &#039;&#039;virtual links&#039;&#039;, nodes that are not physically connected but share entanglement.&lt;br /&gt;
* &amp;lt;math&amp;gt;D&amp;lt;/math&amp;gt; is a &amp;lt;math&amp;gt;|V|\times|V|&amp;lt;/math&amp;gt; matrix representing the demands&lt;br /&gt;
** &amp;lt;math&amp;gt;D_{i,j}&amp;lt;/math&amp;gt; denotes the number of entangled links the source node &amp;lt;math&amp;gt;i \in V&amp;lt;/math&amp;gt; wants to share with destination node &amp;lt;math&amp;gt;j \in V&amp;lt;/math&amp;gt; at a specific point in time.&lt;br /&gt;
* &amp;lt;math&amp;gt;cap&amp;lt;/math&amp;gt; denotes the maximum number of entangled links any two neighbour nodes &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; can share simultaneously.&lt;br /&gt;
* The &#039;&#039;average latency (AL)&#039;&#039; is defined as:&lt;br /&gt;
* &amp;lt;math&amp;gt;AL = \frac{1}{|D|} \sum_{i,j} T_{A,i,j}&amp;lt;/math&amp;gt;, where&lt;br /&gt;
** &amp;lt;math&amp;gt;|D|&amp;lt;/math&amp;gt;  denotes the number of non-zero entries in &amp;lt;math&amp;gt;D&amp;lt;/math&amp;gt;&lt;br /&gt;
** &amp;lt;math&amp;gt;T_{A,i,j}&amp;lt;/math&amp;gt; denotes the latency that a routing algorithm &amp;lt;math&amp;gt;\mathcal{A}&amp;lt;/math&amp;gt; takes to distribute &amp;lt;math&amp;gt;D_{i,j}&amp;lt;/math&amp;gt; entangled link between the nodes &amp;lt;math&amp;gt;i&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;j&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==Knowledge Graph==--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}}--&amp;gt;&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
* All of the three routing algorithms are used as a subroutine (&amp;lt;math&amp;gt;\mathbf{PathDisc}&amp;lt;/math&amp;gt;) of &#039;&#039;&#039;Algorithm 1&#039;&#039;&#039;.&lt;br /&gt;
* The entire routing procedure between any two nodes can be subdivided into following three phases:&lt;br /&gt;
# Path discovery phase.&lt;br /&gt;
# Entanglement reservation phase.&lt;br /&gt;
# Entanglement distribution phase.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Algorithm 1&#039;&#039;&#039; - Distributed Routing Algorithm &amp;lt;math&amp;gt;(s, e, \mathcal{G}, D, cap)&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;round = \lceil \frac{D_{s,e}}{cap} \rceil&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;i = 1&amp;lt;/math&amp;gt; &lt;br /&gt;
# &#039;&#039;&#039;while&#039;&#039;&#039; &amp;lt;math&amp;gt; i \leq round&amp;lt;/math&amp;gt; &#039;&#039;&#039;do&#039;&#039;&#039;&lt;br /&gt;
## &amp;lt;math&amp;gt;CommPath_{s,e} = \mathbf{PathDisc}(s, e, \mathcal{G}, D_{s,e})&amp;lt;/math&amp;gt; &lt;br /&gt;
## &amp;lt;math&amp;gt;CommPath_{s,e} = \{ s=u_0, u_1,...,u_{d-1} = e\}&amp;lt;/math&amp;gt; &lt;br /&gt;
## &#039;&#039;&#039;if&#039;&#039;&#039; in &amp;lt;math&amp;gt;CommPath_{s,e}&amp;lt;/math&amp;gt; some of the neighbour nodes do not have enough entangled links &#039;&#039;&#039;then&#039;&#039;&#039;&lt;br /&gt;
### Generate all the missing links&lt;br /&gt;
## &#039;&#039;&#039;else&#039;&#039;&#039;&lt;br /&gt;
### &amp;lt;math&amp;gt;j=1&amp;lt;/math&amp;gt; &lt;br /&gt;
### &#039;&#039;&#039;while&#039;&#039;&#039; &amp;lt;math&amp;gt;j \leq d-2&amp;lt;/math&amp;gt; &#039;&#039;&#039;do&#039;&#039;&#039;&lt;br /&gt;
#### &amp;lt;math&amp;gt;EntSwap(u_0,u_j,j_{j+1})&amp;lt;/math&amp;gt; &lt;br /&gt;
#### j = j + 1&lt;br /&gt;
### dem = dem - cap&lt;br /&gt;
### i = i + 1&lt;br /&gt;
&lt;br /&gt;
* During the path discovery phase (&amp;lt;math&amp;gt;\mathbf{PathDisc}&amp;lt;/math&amp;gt;) each node decides the next hop on the basis of the physical graph topology and the information it has about the shared entangled links with its neighbours.&lt;br /&gt;
* In this phase given a demand &amp;lt;math&amp;gt;D_{v,e}&amp;lt;/math&amp;gt; if &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; is an optimal neighbour of &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; to reach a destination node &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; then the routing algorithm has two options:&lt;br /&gt;
** (1) Select the path via &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; and generate sufficient amount of links between &amp;lt;math&amp;gt;u, v&amp;lt;/math&amp;gt; - see &#039;&#039;&#039;Algorithm 2 - Modified Greedy&#039;&#039;&#039;&lt;br /&gt;
** (2) Vertex &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; try to select another neighbour with whom it already shares enough amount of entangled links - see &#039;&#039;&#039;Algorithm 3 - Local Best Effort&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Analyzing Algorithm 3 under the assumption that the quantum repeater nodes have information about its neighbours as well as the neighbours of the neighbours in the virtual graph is &#039;&#039;&#039;Algorithm 4 - NoN Local Best Effort&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
* Various simulations of these protocols are presented in [https://arxiv.org/abs/1907.11630 (1)] comparing the [https://dl.acm.org/doi/abs/10.1145/335305.335325 classical greedy routing algorithm] and algorithms 2, 3 and 4 considering the continuous and on-demand model of the network with multiple sources of destinations pairs in the Ring and Grid topology.&lt;br /&gt;
&lt;br /&gt;
* The main differences between the approaches in [https://arxiv.org/abs/1801.02020 2] and [https://arxiv.org/abs/1610.05238 3], and this paper is that in this model they put an upper bound on the distance (relative to the physical graph) of a pre-shared entangled link and put an upper bound on the storage time of the entangled link in a quantum memory making the model more realistic.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
* [https://arxiv.org/abs/1610.05238 Schoute et al. (2016)] introduce and formalize some of the concepts presented in this work.&lt;br /&gt;
* In [[Routing Entanglement in the Quantum Internet]] Pant et al., proposed a greedy multi-path routing algorithm for distributing entanglement between a source destination pair in a network. Multi-path routing algorithms are useful for sharing entangled links between a source destination pair. However, this type of approach is not scalable for a larger network with multiple demands.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# [https://arxiv.org/abs/1907.11630 Chakraborty et al. (2019)]&lt;br /&gt;
# [https://arxiv.org/abs/1801.02020 Gyongyosi and Imre (2018)]&lt;br /&gt;
# [https://arxiv.org/abs/1610.05238 Schoute et al. (2016)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Lucas Arenstein&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Routing_Entanglement_in_the_Quantum_Internet&amp;diff=4420</id>
		<title>Routing Entanglement in the Quantum Internet</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Routing_Entanglement_in_the_Quantum_Internet&amp;diff=4420"/>
		<updated>2021-12-20T18:51:05Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Updated the terminology to match/agree with the newest protocol page I&amp;#039;m doing (I will finish the new one in the next couple of days)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
This [https://www.nature.com/articles/s41534-019-0139-x example protocol (1)] implements the task of [[Entanglement Routing]] considering different scenarios. All of the protocols presented are applicable to quantum networks with arbitrary topology but their analysis is only concerned with the 2D grid network. They develop protocols for multipath routing of a single entanglement ﬂow with global or local state information of the other quantum repeater nodes and a protocol for multipath routing of simultaneous entanglement ﬂows with repeaters with local state information. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].&lt;br /&gt;
&amp;lt;!-- I&#039;m not sure if it is a Building Block or not [[:Category:Building Blocks|Building Block]] --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
* Each quantum repeater node is equipped with:&lt;br /&gt;
** Quantum memories that can hold a qubit perfectly for some predefined time.&lt;br /&gt;
** Entanglement sources.&lt;br /&gt;
** Ability to perform Bell state measurements between any pair of locally-held qubits.&lt;br /&gt;
** Classical computing resources and communication interface.&lt;br /&gt;
* Each quantum repeater node is aware of the overall network topology, as well as the locations of the &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt; Source-Destination pairs.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
In [https://www.nature.com/articles/s41534-019-0139-x.pdf (1)] they develop and analyze routing protocols for generating maximally entangled qubits (ebits) simultaneously between single or multiple pairs of senders and receivers in a quantum network by exploiting multiple paths in the network. They introduce protocols for quantum repeater nodes in the following scenarios: &lt;br /&gt;
* Multipath routing of a &#039;&#039;&#039;single&#039;&#039;&#039; entanglement ﬂow:&lt;br /&gt;
** Considering nodes with global link-state information (the state of every link is known to every repeater in the network and can be used).&lt;br /&gt;
** Considering nodes with local link-state information (a link knows the states of it neighbors).&lt;br /&gt;
* Multipath routing of &#039;&#039;&#039;simultaneous&#039;&#039;&#039; entanglement ﬂows:&lt;br /&gt;
** Considering nodes with local link-state information.&lt;br /&gt;
All of the protocols above considering their characteristics are divided in two phases with the objective of creating an unbroken end-to-end connection between the source and destination nodes. The external and the internal phase which occur in this order.&lt;br /&gt;
*External phase: each pair of memories (neighboring repeaters) across an edge attempts to establish a shared entangled (EPR) pair.&lt;br /&gt;
*Internal phase: BSMs are attempted within each memory (repeater node) based on the successes and failures of the neighboring links in the external phase.&lt;br /&gt;
&lt;br /&gt;
The high-level objective is: Considering the assumptions of quantum and classical operations at each of the repeater nodes of the underlying network, what operations should be performed at the repeater to achieve maximum entanglement-generation rate for one sender and receiver or achieve maximum rate region for multiple ﬂows of entanglement.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
Quantum network with topology described by a graph &amp;lt;math&amp;gt;G(V,E)&amp;lt;/math&amp;gt;:&lt;br /&gt;
* Each of the &amp;lt;math&amp;gt;N=|V|&amp;lt;/math&amp;gt; nodes is equipped with a quantum repeater.&lt;br /&gt;
* Each of the &amp;lt;math&amp;gt;M=|E|&amp;lt;/math&amp;gt; edges is a lossy optical channel of range &amp;lt;math&amp;gt;L_i&amp;lt;/math&amp;gt; (km) and power transmissivity &amp;lt;math&amp;gt;\eta_i \propto e^{-\alpha L_i}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i \in E&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\alpha&amp;lt;/math&amp;gt; depends on the material of the channel.&lt;br /&gt;
* &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt; Source-Destination pairs &amp;lt;math&amp;gt;(A_j, B_j)&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;1 \leq j \leq k&amp;lt;/math&amp;gt; situated at (not necessarily distinct) nodes in &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt;.&lt;br /&gt;
Considering this graph&amp;lt;math&amp;gt;G&amp;lt;/math&amp;gt; we adopt the following notation for the repeater network.&lt;br /&gt;
* Each node &amp;lt;math&amp;gt;v \in V&amp;lt;/math&amp;gt; is a repeater. &lt;br /&gt;
* Each edge &amp;lt;math&amp;gt;e \in E&amp;lt;/math&amp;gt; is a physical link connecting two repeater nodes.&lt;br /&gt;
* &amp;lt;math&amp;gt;S(e) \in \mathbb{Z}^+&amp;lt;/math&amp;gt; is an integer edge weight corresponding to the number of parallel channel across edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;\mathcal{N}(v)&amp;lt;/math&amp;gt; is the set of neighbor edges of &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;&lt;br /&gt;
* &amp;lt;math&amp;gt;d(v) = |\mathcal{N}(v)|&amp;lt;/math&amp;gt; is the degree of node &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;\sum_{e \in \mathcal{N}(v)} S(e)&amp;lt;/math&amp;gt; is the number of memories at node &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;d_A&amp;lt;/math&amp;gt; distance of a node to the node A, using the &amp;lt;math&amp;gt;\mathbb{L}^2&amp;lt;/math&amp;gt; norm.&lt;br /&gt;
* An ebit represents a maximally entangled qubit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==Knowledge Graph== --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}} --&amp;gt;&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* All of the three protocols below assume that time is slotted and each memory can hold a qubit perfectly for &amp;lt;math&amp;gt;T \geq 1&amp;lt;/math&amp;gt; time slot. After this time the stored qubit completely decoheres.&lt;br /&gt;
* Each time slot &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;t=1,2,... &amp;lt;/math&amp;gt; is divided into 2 phases:&lt;br /&gt;
* &#039;&#039;&#039;External Phase:&#039;&#039;&#039;&lt;br /&gt;
** Each of the &amp;lt;math&amp;gt;S(e)&amp;lt;/math&amp;gt; pairs of memories across and edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; attempts to establish an EPR pair.&lt;br /&gt;
*:- An entanglement attempt across any one of the &amp;lt;math&amp;gt;S(e)&amp;lt;/math&amp;gt; parallel links across edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; succeeds with probability &amp;lt;math&amp;gt;p_0(e) \sim \eta(e)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;\eta(e) \sim e^{-\alpha L_e}&amp;lt;/math&amp;gt; is the transmissivity of a lossy optical channel of length &amp;lt;math&amp;gt;L(e)&amp;lt;/math&amp;gt;.&lt;br /&gt;
*:- The probability that one or more ebits are established across an edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; is &amp;lt;math&amp;gt;p(e)=1-(1-p_0)^{S(e)}&amp;lt;/math&amp;gt;.&lt;br /&gt;
*:- Assuming &amp;lt;math&amp;gt;S(e)=S,&amp;lt;/math&amp;gt; give us &amp;lt;math&amp;gt;p(e)=p,&amp;lt;/math&amp;gt; &amp;lt;math&amp;gt;\forall e \in E&amp;lt;/math&amp;gt;.&lt;br /&gt;
** Using two-way classical communication over edge &amp;lt;math&amp;gt;e(u, v)&amp;lt;/math&amp;gt;, neighboring repeater nodes &amp;lt;math&amp;gt;u, v&amp;lt;/math&amp;gt; learn which of the S(e) parallel links (if any) succeeded in the external phase, in a given time slot.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Internal Phase:&#039;&#039;&#039;&lt;br /&gt;
** BSMs are attempted locally at each repeater node between pairs of qubit memories based on the success and failure of the neighboring links in the external phase.&lt;br /&gt;
*:- These BSM attempts are called internal links, i.e., links between memories internal to a repeater node.&lt;br /&gt;
*:- Each of these internal-link attempts succeed with probability &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
At the end of one time-slot a along a path comprising of &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; edges (and thus &amp;lt;math&amp;gt;(k-1)&amp;lt;/math&amp;gt; repeater nodes) one ebit is successfully shared between the end points of the path with probability &amp;lt;math&amp;gt;p^k q^{k-1}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The maximum number of ebits that can be shared between node &amp;lt;math&amp;gt;a&amp;lt;/math&amp;gt; and node &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt; after one time-slot is &amp;lt;math&amp;gt;min\{d(a), d(b)\}&amp;lt;/math&amp;gt;, assuming &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; is the same over all edges.&lt;br /&gt;
&lt;br /&gt;
The protocols described below focus on finding the optimal strategy for each repeater node in order to decide which locally held qubits to attempt BSMs during the internal phase of a&lt;br /&gt;
time slot. Based on the outcomes of the external phase and considering global or local link-state knowledge and &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Multipath Routing of a Single Entanglement Flow===&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;K=1&amp;lt;/math&amp;gt;, Source-Destination pair &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum network with ebits shared between the end points of &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
====Protocol for Entanglement Routing with Global Link-state Information====&lt;br /&gt;
After the External Phase&lt;br /&gt;
# &amp;lt;math&amp;gt;m = 1&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;G_m&amp;lt;/math&amp;gt; = Subgraph induced by the successful external links and the repeater nodes after the external phase.&lt;br /&gt;
# While (True):&lt;br /&gt;
## &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; = shortest path in &amp;lt;math&amp;gt;G_m&amp;lt;/math&amp;gt; connecting &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;. &lt;br /&gt;
## If &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; is empty: Break While Loop.&lt;br /&gt;
## Else:&lt;br /&gt;
### Set &amp;lt;math&amp;gt;L_m&amp;lt;/math&amp;gt; as the length of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt;.&lt;br /&gt;
### Try connecting all internal links along the nodes of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; &amp;lt;br /&amp;gt;//successfully generating an ebit between &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt; with probability &amp;lt;math&amp;gt;q^{L_m - 1}&amp;lt;/math&amp;gt;&lt;br /&gt;
## &amp;lt;math&amp;gt;G_{m+1}&amp;lt;/math&amp;gt; = &amp;lt;math&amp;gt;G_m -&amp;lt;/math&amp;gt; all external and internal links of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt;.&lt;br /&gt;
## &amp;lt;math&amp;gt;m = m + 1.&amp;lt;/math&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Protocol for Entanglement Routing with Local Link-state Information====&lt;br /&gt;
&lt;br /&gt;
Knowledge of success and failure of the External Phase is communicated only to the two repeater nodes connected by the link.&lt;br /&gt;
Repeater nodes need to decide on which pair(s) of memories BSMs should be attempted (which internal links to attempt), based only on information about the states of external links adjacent to them.&lt;br /&gt;
&lt;br /&gt;
After the External Phase&lt;br /&gt;
# For every repeater except &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;: &amp;lt;br /&amp;gt; Let &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; be the node of this iteration.&lt;br /&gt;
## If less than one of the neighboring external links is successful: &amp;lt;br /&amp;gt;no internal links are attempted since this repeater node can not be part of a path from &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
## If two or more neighboring external links are successful: &amp;lt;br /&amp;gt; Let &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; be the node linked to &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; with the smallest &amp;lt;math&amp;gt;d_{A_1}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; be the node linked to &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; with the smallest &amp;lt;math&amp;gt;d_{B_1}&amp;lt;/math&amp;gt;. &amp;lt;br /&amp;gt; Attempt a BSM on node &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; on the memories connected to &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;.&lt;br /&gt;
### If four neighboring external links are successful: &amp;lt;br /&amp;gt; Attempt a BSM on node &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; on the remaining memories disconsidering the two memories from the previous step. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Protocol for Simultaneous Entanglement Flows with Link-state Information===&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;K=2&amp;lt;/math&amp;gt;, Source-Destination pairs &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(A_2, B_2)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum network with ebits shared between the end points of &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(A_2, B_2)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
This situation motivates the &#039;&#039;&#039;Multi-ﬂow Spatial-division&#039;&#039;&#039; rule which divides the the network between two spatial regions corresponding to the two flows.&lt;br /&gt;
&lt;br /&gt;
* When the shortest path connecting the two source-destination pairs &#039;&#039;&#039;do not&#039;&#039;&#039; cross the network is divided between two spatial regions corresponding to the two ﬂows.&lt;br /&gt;
** For each one of this regions we apply the Protocol for Entanglement Routing with Local Link-state Information.&lt;br /&gt;
&lt;br /&gt;
* When the shortest path connecting the two source-destination pairs &#039;&#039;&#039;do&#039;&#039;&#039; cross the network is divided between two spatial regions corresponding to the two ﬂows.&lt;br /&gt;
** Considering the square-grid topology the two spatial regions are divided by two crossing lines with an angle &amp;lt;math&amp;gt;\theta&amp;lt;/math&amp;gt; between them (forming a hourglass shape).&lt;br /&gt;
** For each one of this regions we apply the Protocol for Entanglement Routing with Local Link-state Information.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
* The goal of the optimal repeater strategy is to achieve:&lt;br /&gt;
** Maximum entanglement generation rate for a single sender and receiver (&amp;lt;math&amp;gt;K=1&amp;lt;/math&amp;gt;).&lt;br /&gt;
*:- Above a (percolation) threshold determined by &amp;lt;math&amp;gt;p&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt; the entanglement generation rate will depend only linearly on the transmissivity &amp;lt;math&amp;gt;\eta&amp;lt;/math&amp;gt; of a single link in the network.&lt;br /&gt;
* Maximum rate regions simultaneously achievable by the entanglement flows (&amp;lt;math&amp;gt;K \geq 2&amp;lt;/math&amp;gt;).&lt;br /&gt;
*:- Above a (percolation) threshold determined by &amp;lt;math&amp;gt;p&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt; this protocol signiﬁcantly exceeds the ones that each repeater node makes BSM decisions by simply time-sharing between catering to the individual ﬂows.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
* [https://arxiv.org/abs/1601.00966 Pirandola (2016)] analyzed entanglement-generation capacities of repeater networks assuming ideal repeater nodes and argued that for a single ﬂow the maximum entanglement-generation rate &amp;lt;math&amp;gt;R_1&amp;lt;/math&amp;gt; reduces to the classical max-ﬂow min-cut problem.&lt;br /&gt;
* [https://arxiv.org/abs/1606.00135 Azuma and Kato (2016)] looked at an &amp;quot;aggregated&amp;quot; protocol in which the repeater protocols run in parallel.&lt;br /&gt;
* [https://arxiv.org/abs/1610.05238 Schoute et al. (2016)] developed routing protocols on speciﬁc network topologies and found scaling laws as functions on the number of qubits in the memories at nodes, and the time and space consumed by the routing algorithms, under lossless and noiseless assumptions.&lt;br /&gt;
* [https://arxiv.org/abs/quant-ph/0612167 Acín et al. (2006)] have considered the problem of entanglement percolation where neighboring nodes share a perfect lossless pure state.&lt;br /&gt;
There is an extensive literature of quantum networks analyzing repeaters in a linear chain for example:&lt;br /&gt;
[https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.81.5932 Briegel et al. (1998)], [https://arxiv.org/abs/0809.3629 Jiand et al. (2008)] and [https://www.nature.com/articles/srep20463 Muralidharan et al. (2016)].&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
# [https://www.nature.com/articles/s41534-019-0139-x Pant et al. (2019)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Lucas Arenstein&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Entanglement_Routing&amp;diff=4416</id>
		<title>Entanglement Routing</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Entanglement_Routing&amp;diff=4416"/>
		<updated>2021-12-11T16:50:38Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Add some references and their correspondence to the network topology.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Functionality page describes a general task which can be realized in a quantum network --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Functionality Description==&lt;br /&gt;
Entanglement routing allows a quantum network to generate long distance entanglement between two or multiple nodes. As quantum information transmissivity decays exponentially in function of the distance, quantum routers are needed to successfully establish entangled states between any nodes on a quantum network.&lt;br /&gt;
&lt;br /&gt;
The main goal of entanglement routing is to develop efficient routing protocols to enable long distance entanglement.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].&lt;br /&gt;
&amp;lt;!-- I&#039;m not sure if it is a Building Block or not [[:Category:Building Blocks|Building Block]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Description: A lucid definition of functionality in discussion.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Tags Any related page or list of protocols is connected by this section--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Use Case (if available) analyses how practical the protocol is--&amp;gt;&lt;br /&gt;
==Use Case==&lt;br /&gt;
*No classical analogue.&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
&amp;lt;!-- List of different types of example protocol achieving the functionality--&amp;gt;&lt;br /&gt;
* All the protocols within this functionality are in the [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]].&lt;br /&gt;
* There are entanglement routing protocols that are specifically designed for certain network topology e.g: linear, rings (1), spheres (1),  grids (2) or for networks with arbitrary topology (2, 3).&lt;br /&gt;
* Quantum repeater nodes have global (all the network) or local (just neighborhood) information on the state of other nodes.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols.--&amp;gt;&lt;br /&gt;
* Entanglement routing assumes the presence of: &lt;br /&gt;
** Classical and quantum communication physical channels.&lt;br /&gt;
** Quantum repeater nodes.&lt;br /&gt;
* Quantum repeater nodes:&lt;br /&gt;
** Contain qubits that in the short and medium term are applicable to only basic operations i.e, Bell State Measurements to pairs of neighborhood nodes allowing the Entanglement Swapping operation.&lt;br /&gt;
* Some protocols consider fault-tolerant operations on the nodes but other use [https://en.wikipedia.org/wiki/Entanglement_distillation Entanglement Distillation] or Error Corrections schemes on the repeater nodes (4).&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- Any issue that could not be addressed or find a place in the above sections or any review paper discussing a feature of various types of protocols related to the functionality. --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1) I&#039;m not really sure if it is a good idea to add something about the Distributing Graph States Over Arbitrary Quantum Networks in this page/functionality, maybe as an example of usage of quantum networks ?--&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2) Should I add some of the references from the .doc I send you? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# [https://arxiv.org/abs/1610.05238 Schoute et al. Shortcuts to Quantum Network Routing (2016)]&lt;br /&gt;
# [https://www.nature.com/articles/s41534-019-0139-x Pant et al. Routing entanglement in the quantum internet (2019)]&lt;br /&gt;
# [https://dl.acm.org/doi/10.1145/3387514.3405853 Shi and Qian, Concurrent Entanglement Routing for Quantum Networks: Model and Designs (2020)]&lt;br /&gt;
# [https://www.nature.com/articles/s41534-021-00438-7 Rozpędek et al. Quantum repeaters based on concatenated bosonic and discrete-variable quantum codes (2021)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Lucas Arenstein&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Routing_Entanglement_in_the_Quantum_Internet&amp;diff=4415</id>
		<title>Routing Entanglement in the Quantum Internet</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Routing_Entanglement_in_the_Quantum_Internet&amp;diff=4415"/>
		<updated>2021-12-11T16:34:41Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Added the introduction, a small edit in the protocol description, the Properties and Further Information section.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
This [https://www.nature.com/articles/s41534-019-0139-x example protocol (1)] implements the task of [[Entanglement Routing]] considering different scenarios. All of the protocols presented are applicable to quantum networks with arbitrary topology but their analysis is only concerned with the 2D grid network. They develop protocols for multipath routing of a single entanglement ﬂow with global or local state information of the other quantum repeater nodes and a protocol for multipath routing of simultaneous entanglement ﬂows with repeaters with local state information. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].&lt;br /&gt;
&amp;lt;!-- I&#039;m not sure if it is a Building Block or not [[:Category:Building Blocks|Building Block]] --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
* Each network repeater node equipped with:&lt;br /&gt;
** Quantum memories that can hold a qubit perfectly for some predefined time.&lt;br /&gt;
** Entanglement sources.&lt;br /&gt;
** Ability to perform Bell state measurements between any pair of locally-held qubits.&lt;br /&gt;
** Classical computing resources and communication interface.&lt;br /&gt;
* Each network repeater node is aware of the overall network topology, as well as the locations of the &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt; Source-Destination pairs.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
In [https://www.nature.com/articles/s41534-019-0139-x.pdf 1] they develop and analyze routing protocols for generating maximally entangled qubits (ebits) simultaneously between single or multiple pairs of senders and receivers in a quantum network by exploiting multiple paths in the network. They introduce protocols for quantum repeater nodes in the following scenarios: &lt;br /&gt;
* Multipath routing of a &#039;&#039;&#039;single&#039;&#039;&#039; entanglement ﬂow:&lt;br /&gt;
** Considering nodes with global link-state information (the state of every link is known to every repeater in the network and can be used).&lt;br /&gt;
** Considering nodes with local link-state information (a link knows the states of it neighbors).&lt;br /&gt;
* Multipath routing of &#039;&#039;&#039;simultaneous&#039;&#039;&#039; entanglement ﬂows:&lt;br /&gt;
** Considering nodes with local link-state information.&lt;br /&gt;
All of the protocols above considering their characteristics are divided in two phases with the objective of creating an unbroken end-to-end connection between the source and destination nodes. The external and the internal phase which occur in this order.&lt;br /&gt;
*External phase: each pair of memories (neighboring repeaters) across an edge attempts to establish a shared entangled (EPR) pair.&lt;br /&gt;
*Internal phase: BSMs are attempted within each memory (repeater node) based on the successes and failures of the neighboring links in the external phase.&lt;br /&gt;
&lt;br /&gt;
The high-level objective is: Considering the assumptions of quantum and classical operations at each of the repeater nodes of the underlying network, what operations should be performed at the repeater to achieve maximum entanglement-generation rate for one sender and receiver or achieve maximum rate region for multiple ﬂows of entanglement.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
Quantum network with topology described by a graph &amp;lt;math&amp;gt;G(V,E)&amp;lt;/math&amp;gt;:&lt;br /&gt;
* Each of the &amp;lt;math&amp;gt;N=|V|&amp;lt;/math&amp;gt; nodes is equipped with a quantum repeater.&lt;br /&gt;
* Each of the &amp;lt;math&amp;gt;M=|E|&amp;lt;/math&amp;gt; edges is a lossy optical channel of range &amp;lt;math&amp;gt;L_i&amp;lt;/math&amp;gt; (km) and power transmissivity &amp;lt;math&amp;gt;\eta_i \propto e^{-\alpha L_i}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i \in E&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\alpha&amp;lt;/math&amp;gt; depends on the material of the channel.&lt;br /&gt;
* &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt; Source-Destination pairs &amp;lt;math&amp;gt;(A_j, B_j)&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;1 \leq j \leq k&amp;lt;/math&amp;gt; situated at (not necessarily distinct) nodes in &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt;.&lt;br /&gt;
Considering this graph&amp;lt;math&amp;gt;G&amp;lt;/math&amp;gt; we adopt the following notation for the repeater network.&lt;br /&gt;
* Each node &amp;lt;math&amp;gt;v \in V&amp;lt;/math&amp;gt; is a repeater. &lt;br /&gt;
* Each edge &amp;lt;math&amp;gt;e \in E&amp;lt;/math&amp;gt; is a physical link connecting two repeater nodes.&lt;br /&gt;
* &amp;lt;math&amp;gt;S(e) \in \mathbb{Z}^+&amp;lt;/math&amp;gt; is an integer edge weight corresponding to the number of parallel channel across edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;\mathcal{N}(v)&amp;lt;/math&amp;gt; is the set of neighbor edges of &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;&lt;br /&gt;
* &amp;lt;math&amp;gt;d(v) = |\mathcal{N}(v)|&amp;lt;/math&amp;gt; is the degree of node &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;\sum_{e \in \mathcal{N}(v)} S(e)&amp;lt;/math&amp;gt; is the number of memories at node &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;d_A&amp;lt;/math&amp;gt; distance of a node to the node A, using the &amp;lt;math&amp;gt;\mathbb{L}^2&amp;lt;/math&amp;gt; norm.&lt;br /&gt;
* An ebit represents a maximally entangled qubit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==Knowledge Graph== --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}} --&amp;gt;&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* All of the three protocols below assume that time is slotted and each memory can hold a qubit perfectly for &amp;lt;math&amp;gt;T \geq 1&amp;lt;/math&amp;gt; time slot. After this time the stored qubit completely decoheres.&lt;br /&gt;
* Each time slot &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;t=1,2,... &amp;lt;/math&amp;gt; is divided into 2 phases:&lt;br /&gt;
* &#039;&#039;&#039;External Phase:&#039;&#039;&#039;&lt;br /&gt;
** Each of the &amp;lt;math&amp;gt;S(e)&amp;lt;/math&amp;gt; pairs of memories across and edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; attempts to establish an EPR pair.&lt;br /&gt;
*:- An entanglement attempt across any one of the &amp;lt;math&amp;gt;S(e)&amp;lt;/math&amp;gt; parallel links across edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; succeeds with probability &amp;lt;math&amp;gt;p_0(e) \sim \eta(e)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;\eta(e) \sim e^{-\alpha L_e}&amp;lt;/math&amp;gt; is the transmissivity of a lossy optical channel of length &amp;lt;math&amp;gt;L(e)&amp;lt;/math&amp;gt;.&lt;br /&gt;
*:- The probability that one or more ebits are established across an edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; is &amp;lt;math&amp;gt;p(e)=1-(1-p_0)^{S(e)}&amp;lt;/math&amp;gt;.&lt;br /&gt;
*:- Assuming &amp;lt;math&amp;gt;S(e)=S,&amp;lt;/math&amp;gt; give us &amp;lt;math&amp;gt;p(e)=p,&amp;lt;/math&amp;gt; &amp;lt;math&amp;gt;\forall e \in E&amp;lt;/math&amp;gt;.&lt;br /&gt;
** Using two-way classical communication over edge &amp;lt;math&amp;gt;e(u, v)&amp;lt;/math&amp;gt;, neighboring repeater nodes &amp;lt;math&amp;gt;u, v&amp;lt;/math&amp;gt; learn which of the S(e) parallel links (if any) succeeded in the external phase, in a given time slot.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Internal Phase:&#039;&#039;&#039;&lt;br /&gt;
** BSMs are attempted locally at each repeater node between pairs of qubit memories based on the success and failure of the neighboring links in the external phase.&lt;br /&gt;
*:- These BSM attempts are called internal links, i.e., links between memories internal to a repeater node.&lt;br /&gt;
*:- Each of these internal-link attempts succeed with probability &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
At the end of one time-slot a along a path comprising of &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; edges (and thus &amp;lt;math&amp;gt;(k-1)&amp;lt;/math&amp;gt; repeater nodes) one ebit is successfully shared between the end points of the path with probability &amp;lt;math&amp;gt;p^k q^{k-1}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The maximum number of ebits that can be shared between node &amp;lt;math&amp;gt;a&amp;lt;/math&amp;gt; and node &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt; after one time-slot is &amp;lt;math&amp;gt;min\{d(a), d(b)\}&amp;lt;/math&amp;gt;, assuming &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; is the same over all edges.&lt;br /&gt;
&lt;br /&gt;
The protocols described below focus on finding the optimal strategy for each repeater node in order to decide which locally held qubits to attempt BSMs during the internal phase of a&lt;br /&gt;
time slot. Based on the outcomes of the external phase and considering global or local link-state knowledge and &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Multipath Routing of a Single Entanglement Flow===&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;K=1&amp;lt;/math&amp;gt;, Source-Destination pair &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum network with ebits shared between the end points of &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
====Protocol for Entanglement Routing with Global Link-state Information====&lt;br /&gt;
After the External Phase&lt;br /&gt;
# &amp;lt;math&amp;gt;m = 1&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;G_m&amp;lt;/math&amp;gt; = Subgraph induced by the successful external links and the repeater nodes after the external phase.&lt;br /&gt;
# While (True):&lt;br /&gt;
## &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; = shortest path in &amp;lt;math&amp;gt;G_m&amp;lt;/math&amp;gt; connecting &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;. &lt;br /&gt;
## If &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; is empty: Break While Loop.&lt;br /&gt;
## Else:&lt;br /&gt;
### Set &amp;lt;math&amp;gt;L_m&amp;lt;/math&amp;gt; as the length of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt;.&lt;br /&gt;
### Try connecting all internal links along the nodes of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; &amp;lt;br /&amp;gt;//successfully generating an ebit between &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt; with probability &amp;lt;math&amp;gt;q^{L_m - 1}&amp;lt;/math&amp;gt;&lt;br /&gt;
## &amp;lt;math&amp;gt;G_{m+1}&amp;lt;/math&amp;gt; = &amp;lt;math&amp;gt;G_m -&amp;lt;/math&amp;gt; all external and internal links of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt;.&lt;br /&gt;
## &amp;lt;math&amp;gt;m = m + 1.&amp;lt;/math&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Protocol for Entanglement Routing with Local Link-state Information====&lt;br /&gt;
&lt;br /&gt;
Knowledge of success and failure of the External Phase is communicated only to the two repeater nodes connected by the link.&lt;br /&gt;
Repeater nodes need to decide on which pair(s) of memories BSMs should be attempted (which internal links to attempt), based only on information about the states of external links adjacent to them.&lt;br /&gt;
&lt;br /&gt;
After the External Phase&lt;br /&gt;
# For every repeater except &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;: &amp;lt;br /&amp;gt; Let &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; be the node of this iteration.&lt;br /&gt;
## If less than one of the neighboring external links is successful: &amp;lt;br /&amp;gt;no internal links are attempted since this repeater node can not be part of a path from &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
## If two or more neighboring external links are successful: &amp;lt;br /&amp;gt; Let &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; be the node linked to &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; with the smallest &amp;lt;math&amp;gt;d_{A_1}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; be the node linked to &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; with the smallest &amp;lt;math&amp;gt;d_{B_1}&amp;lt;/math&amp;gt;. &amp;lt;br /&amp;gt; Attempt a BSM on node &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; on the memories connected to &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;.&lt;br /&gt;
### If four neighboring external links are successful: &amp;lt;br /&amp;gt; Attempt a BSM on node &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; on the remaining memories disconsidering the two memories from the previous step. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Protocol for Simultaneous Entanglement Flows with Link-state Information===&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;K=2&amp;lt;/math&amp;gt;, Source-Destination pairs &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(A_2, B_2)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum network with ebits shared between the end points of &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(A_2, B_2)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
This situation motivates the &#039;&#039;&#039;Multi-ﬂow Spatial-division&#039;&#039;&#039; rule which divides the the network between two spatial regions corresponding to the two flows.&lt;br /&gt;
&lt;br /&gt;
* When the shortest path connecting the two source-destination pairs &#039;&#039;&#039;do not&#039;&#039;&#039; cross the network is divided between two spatial regions corresponding to the two ﬂows.&lt;br /&gt;
** For each one of this regions we apply the Protocol for Entanglement Routing with Local Link-state Information.&lt;br /&gt;
&lt;br /&gt;
* When the shortest path connecting the two source-destination pairs &#039;&#039;&#039;do&#039;&#039;&#039; cross the network is divided between two spatial regions corresponding to the two ﬂows.&lt;br /&gt;
** Considering the square-grid topology the two spatial regions are divided by two crossing lines with an angle &amp;lt;math&amp;gt;\theta&amp;lt;/math&amp;gt; between them (forming a hourglass shape).&lt;br /&gt;
** For each one of this regions we apply the Protocol for Entanglement Routing with Local Link-state Information.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
* The goal of the optimal repeater strategy is to achieve:&lt;br /&gt;
** Maximum entanglement generation rate for a single sender and receiver (&amp;lt;math&amp;gt;K=1&amp;lt;/math&amp;gt;).&lt;br /&gt;
*:- Above a (percolation) threshold determined by &amp;lt;math&amp;gt;p&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt; the entanglement generation rate will depend only linearly on the transmissivity &amp;lt;math&amp;gt;\eta&amp;lt;/math&amp;gt; of a single link in the network.&lt;br /&gt;
* Maximum rate regions simultaneously achievable by the entanglement flows (&amp;lt;math&amp;gt;K \geq 2&amp;lt;/math&amp;gt;).&lt;br /&gt;
*:- Above a (percolation) threshold determined by &amp;lt;math&amp;gt;p&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt; this protocol signiﬁcantly exceeds the ones that each repeater node makes BSM decisions by simply time-sharing between catering to the individual ﬂows.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
* [https://arxiv.org/abs/1601.00966 Pirandola (2016)] analyzed entanglement-generation capacities of repeater networks assuming ideal repeater nodes and argued that for a single ﬂow the maximum entanglement-generation rate &amp;lt;math&amp;gt;R_1&amp;lt;/math&amp;gt; reduces to the classical max-ﬂow min-cut problem.&lt;br /&gt;
* [https://arxiv.org/abs/1606.00135 Azuma and Kato (2016)] looked at an &amp;quot;aggregated&amp;quot; protocol in which the repeater protocols run in parallel.&lt;br /&gt;
* [https://arxiv.org/abs/1610.05238 Schoute et al. (2016)] developed routing protocols on speciﬁc network topologies and found scaling laws as functions on the number of qubits in the memories at nodes, and the time and space consumed by the routing algorithms, under lossless and noiseless assumptions.&lt;br /&gt;
* [https://arxiv.org/abs/quant-ph/0612167 Acín et al. (2006)] have considered the problem of entanglement percolation where neighboring nodes share a perfect lossless pure state.&lt;br /&gt;
There is an extensive literature of quantum networks analyzing repeaters in a linear chain for example:&lt;br /&gt;
[https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.81.5932 Briegel et al. (1998)], [https://arxiv.org/abs/0809.3629 Jiand et al. (2008)] and [https://www.nature.com/articles/srep20463 Muralidharan et al. (2016)].&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
# [https://www.nature.com/articles/s41534-019-0139-x Pant et al. (2019)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Lucas Arenstein&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Distributing_Graph_States_Over_Arbitrary_Quantum_Networks&amp;diff=4414</id>
		<title>Distributing Graph States Over Arbitrary Quantum Networks</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Distributing_Graph_States_Over_Arbitrary_Quantum_Networks&amp;diff=4414"/>
		<updated>2021-12-11T12:37:55Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Added the properties part. I&amp;#039;m going to send the images by email/slack&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Under construction [https://arxiv.org/abs/1811.05445 Meignant, Markham and Grosshans (2019)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;[[:Category:Specific Task|Specific Task]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Perfect distribution of Bell pairs occurring at perfectly synchronized times.&lt;br /&gt;
* Perfect node local computation.&lt;br /&gt;
* Ignore the cost of classical communications.&lt;br /&gt;
* Ignore processing time of local quantum processor.&lt;br /&gt;
* Ignore the cost of quantum memory.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol [https://arxiv.org/abs/1811.05445 1] aims to distribute multipartite entangled states that are represented by graph states over fixed networks of arbitrary topology. They first introduce a protocol to distribute GHZ states that considering the assumptions takes a single time step and is optimal in terms of the Bell pair used. Their second protocol is a generalization of the first one and can distribute any arbitrary graph state using at most twice as many Bell pairs and steps than the optimal distributing protocol for the worst case scenario.&lt;br /&gt;
&lt;br /&gt;
In this protocol a quantum network is represented as a graph&lt;br /&gt;
&#039;&#039;&#039;upload image qn_distributing.svg here&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;!--[[File:qn_distributing.svg]]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The physical distribution of graph states are represented as graph operations ignoring&lt;br /&gt;
local corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To distribute a &#039;&#039;&#039;GHZ states&#039;&#039;&#039; over all the nodes of an arbitrary set &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; of the network nodes we have two steps:&lt;br /&gt;
&lt;br /&gt;
# Find a minimal tree covering all the nodes of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; using the [https://en.wikipedia.org/wiki/Steiner_tree_problem Steiner Tree Problem].&lt;br /&gt;
#* Minimal tree is a subgraph connecting all the nodes in &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; with the minimum number of edges.&lt;br /&gt;
# Apply an operation called Star Expansion on the leaves of the tree from the previous step.&lt;br /&gt;
&amp;lt;!-- Put Link to Star Expansion --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To distribute an &#039;&#039;&#039;Arbitrary Graph State&#039;&#039;&#039; we realize multiple iterations of the protocol above. &lt;br /&gt;
After that we make measurements on the participating nodes to generate the arbitrary graph state we want.&lt;br /&gt;
&amp;lt;!-- ==Properties== --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Put the cost of distributing, upper bounds etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
*&#039;&#039;&#039;Network Stage:&#039;&#039;&#039; [[Category: Quantum Memory Network Stage]][[:Category: Quantum Memory Network Stage| Quantum Memory]]&lt;br /&gt;
* Nodal Clifford Operations.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
* &amp;lt;math&amp;gt;b=&amp;lt;/math&amp;gt;qubit in the center of the star graph.&lt;br /&gt;
* &amp;lt;math&amp;gt;A=&amp;lt;/math&amp;gt;Node of the network which contains a qubit &amp;lt;math&amp;gt;a_0 \in A \cap N_b&amp;lt;/math&amp;gt; (neighborhood of b).&lt;br /&gt;
* &amp;lt;math&amp;gt;|A|&amp;lt;/math&amp;gt; number of nodes of A.&lt;br /&gt;
* &amp;lt;math&amp;gt;a_i \in A&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i &amp;gt; 0&amp;lt;/math&amp;gt; Represents each of the qubits of &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; that constitutes a Bell pair with a qubit &amp;lt;math&amp;gt;c_i&amp;lt;/math&amp;gt; in another node of the network.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
* The optimality of the protocol depends on the network topology and the wanted graph state to distribute.&lt;br /&gt;
* Analysing the consumption of Bell pair between nodes and considering the worst case scenario that is to entangle each qubit with the opposite one over a line network we have the following upper bounds:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
! Distribute&lt;br /&gt;
! Cost&lt;br /&gt;
! Bound&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| N-GHZ&lt;br /&gt;
| EPR&lt;br /&gt;
| &amp;lt;math&amp;gt;N-1&amp;lt;/math&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| T&lt;br /&gt;
| &amp;lt;math&amp;gt;1&amp;lt;/math&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| Arbitrary Graph State&lt;br /&gt;
| EPR&lt;br /&gt;
| &amp;lt;math&amp;gt;\left\lfloor \frac{N}{2} \right\rfloor^2&amp;lt;/math&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| T&lt;br /&gt;
| &amp;lt;math&amp;gt;\left\lfloor \frac{N}{2} \right\rfloor&amp;lt;/math&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&#039;&#039;&#039;Graph Operations:&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Vertex Deletion.&#039;&#039;&#039; Removes one vertex and all the associated edges from the graph.&lt;br /&gt;
** Implemented by the Pauli Measurement of the relevant qubit in the &#039;&#039;Z basis&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Local Complementation.&#039;&#039;&#039; Inverts the subgraph induced by the neighborhood &amp;lt;math&amp;gt;N_a&amp;lt;/math&amp;gt; of the concerned vertex &amp;lt;math&amp;gt;a&amp;lt;/math&amp;gt;.&lt;br /&gt;
** Implemented by the quantum operator &amp;lt;math&amp;gt;U_a^\tau = e^{-i \frac{\pi}{4}X_a} \bigotimes_{b \in N_a} e^{i \frac{\pi}{4}Z_b}&amp;lt;/math&amp;gt; acting on the qubits &amp;lt;math&amp;gt;a \cup N_a&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &#039;&#039;&#039;Edge Addition.&#039;&#039;&#039; Add an edge between two nonadjacent vertices.&lt;br /&gt;
** Implemented by applying a &#039;&#039;controlled-Z&#039;&#039; between the desired nodes.&lt;br /&gt;
* &#039;&#039;&#039;Edge Deletion.&#039;&#039;&#039; Delete an edge between two adjacent vertices.&lt;br /&gt;
** Implemented by applying a &#039;&#039;controlled-Z&#039;&#039; between the desired nodes.&lt;br /&gt;
* &#039;&#039;&#039;Entanglement Swapping.&#039;&#039;&#039;&lt;br /&gt;
** Implemented by applying &#039;&#039;controlled-Z&#039;&#039; gate followed by two single qubit &#039;&#039;Y-measurement&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===GHZ State Distribution Protocol===&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;&lt;br /&gt;
* N-GHZ state: &amp;lt;math&amp;gt;|\text{N-GHZ}\rangle = (|0\rangle^{\otimes N}+|1\rangle^{\otimes N})/\sqrt{2}&amp;lt;/math&amp;gt;.&lt;br /&gt;
* That is locally equivalent to: &amp;lt;math&amp;gt;(|0\rangle|+\rangle^{\otimes N-1}+|1\rangle|-\rangle^{\otimes N-1})/\sqrt{2}&amp;lt;/math&amp;gt; that is called a star graph &#039;&#039;&#039;upload image star_graph_distributing.svg here&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--[[File:star_graph_distributing.svg]]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Arbitrary set &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; of the network nodes.&lt;br /&gt;
** Assuming that the network topology is already given to us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;&lt;br /&gt;
* N-GHZ state distributed over &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;GHZ-Distribution Algorithm&#039;&#039;&#039;&lt;br /&gt;
# Find a minimal tree covering all the nodes of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; &lt;br /&gt;
# &amp;lt;math&amp;gt;l&amp;lt;/math&amp;gt; is a random leaf from the tree of step 1.&lt;br /&gt;
# For &amp;lt;math&amp;gt;j=1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;|W| - 1&amp;lt;/math&amp;gt;:    &lt;br /&gt;
## Let &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; be any unprocessed node of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; such as &amp;lt;math&amp;gt;l \notin A&amp;lt;/math&amp;gt;.&lt;br /&gt;
## Apply the Start Expansion Algorithm on node &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;l&amp;lt;/math&amp;gt; as &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt; the center of the star.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Start Expansion Algorithm&#039;&#039;&#039;&lt;br /&gt;
This routine uses the Bell pairs of the node &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; to add the edges &amp;lt;math&amp;gt;(b,c_i)&amp;lt;/math&amp;gt; to the graph state, as well as the edge &amp;lt;math&amp;gt;(b, a_0)&amp;lt;/math&amp;gt; &#039;&#039;iff&#039;&#039; &amp;lt;math&amp;gt;A \in W&amp;lt;/math&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
# All the qubits &amp;lt;math&amp;gt;a_i, i \geq 0&amp;lt;/math&amp;gt; of &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; are linked using Controlled-Z operations between all possible pairs.&lt;br /&gt;
# Local complementation is applied to the qubit &amp;lt;math&amp;gt;a_0&amp;lt;/math&amp;gt; linked to &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt;.&lt;br /&gt;
# If &amp;lt;math&amp;gt;A \notin W&amp;lt;/math&amp;gt;:&lt;br /&gt;
## Remove &amp;lt;math&amp;gt;a_0&amp;lt;/math&amp;gt; and all the edges within &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; by &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt;-measuring it&lt;br /&gt;
## Else (when &amp;lt;math&amp;gt;A \in W&amp;lt;/math&amp;gt;):&lt;br /&gt;
###Keep &amp;lt;math&amp;gt;a_0&amp;lt;/math&amp;gt; and apply  Controlled-Z gates to remove all edges within &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt;.&lt;br /&gt;
#Apply a &amp;lt;math&amp;gt;Y&amp;lt;/math&amp;gt;-measurement on all the other qubits &amp;lt;math&amp;gt;a_i \in A&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i&amp;gt;0&amp;lt;/math&amp;gt; creating the desired Start Graph.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arbitrary Graph State Distribution Protocol===&lt;br /&gt;
To distribute an arbitrary graph state we first distribute the edge-decorated complete graph state. From this graph we can construct any other graph state by measuring each edge-qubit with a:&lt;br /&gt;
* &#039;&#039;Z measurement&#039;&#039; to delete this vertex and its edges&lt;br /&gt;
or a&lt;br /&gt;
* &#039;&#039;Y measurement&#039;&#039; to delete the vertex but keep the edges.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;&lt;br /&gt;
* Arbitrary graph state to distribute&lt;br /&gt;
* Arbitrary set &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; participating nodes.&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;&lt;br /&gt;
* Arbitrary graph state distributed over &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Arbitrary Graph State Distribution Algorithm&#039;&#039;&#039;&lt;br /&gt;
# Solve the [https://en.wikipedia.org/wiki/Steiner_tree_problem Steiner Tree Problem] on the network for the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; nodes.&lt;br /&gt;
#* Each one of the nodes of this tree has an central leaf &amp;lt;math&amp;gt;l_n&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;1 \leq n \leq k&amp;lt;/math&amp;gt;.&lt;br /&gt;
# For &amp;lt;math&amp;gt;j=1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;:&lt;br /&gt;
## Distribute a (k-1-j)-GHZ state on the node of &amp;lt;math&amp;gt;l_j&amp;lt;/math&amp;gt; using the [[Distributing Graph States Over Arbitrary Quantum Networks#Protocol Description|GHZ-Distribution Algorithm ]].&lt;br /&gt;
## Delete vertices from the tree in order to have the covering tree for the set &amp;lt;math&amp;gt;W \setminus \{l_j\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# For each one of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; nodes apply local operations to generate the edge-decorated graph state.&lt;br /&gt;
# For each one of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; nodes construct the desired arbitrary state by applying &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Y&amp;lt;/math&amp;gt; measurements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
The distribution of multipartite entangled states over quantum networks has also been studied in the following articles:&lt;br /&gt;
* [http://dx.doi.org/10.1088/1367-2630/18/5/053036 Epping et all (2016)] Investigate the creation of a graph state presenting the shape of the network in the presence of noise.&lt;br /&gt;
* [http://dx.doi.org/10.1103/PhysRevA.86.042304 Cuquet and Calsamiglia (2012)] and [http://dx.doi.org/10.1103/PhysRevLett.104.050501 Matsuzaki et al (2010)] Present decomposition of graph states into various building blocks that can be purified and merged to construct graph states over a network.&lt;br /&gt;
* [http://dx.doi.org/10.1038/s41534-019-0191-6 Hahn et all (2019)] Studies the possible transformations of an already shared graph-state, with a single-qubit per location.&lt;br /&gt;
* [http://dx.doi.org/10.1088/1367-2630/ab05f7 Pirker and Dür (2019)] Includes a protocol very similar to the one presented in this page, but the modeling of the network is different, as well as the optimized metrics. They describe a hierarchical network stack and use it to provide robustness against router or sub-network failures, which is not presented in this work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# [https://arxiv.org/abs/1811.05445 Meignant, Markham and Grosshans (2019)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Lucas Arenstein&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Entanglement_Routing&amp;diff=4406</id>
		<title>Entanglement Routing</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Entanglement_Routing&amp;diff=4406"/>
		<updated>2021-12-09T22:33:52Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: First sketch of this functionality by Lucas&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Functionality page describes a general task which can be realized in a quantum network --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Functionality Description==&lt;br /&gt;
Entanglement routing allows a quantum network to generate long distance entanglement between two or multiple nodes. As quantum information transmissivity decays exponentially in function of the distance, quantum routers are needed to successfully establish entangled states between any nodes on a quantum network.&lt;br /&gt;
&lt;br /&gt;
The main goal of entanglement routing is to develop efficient routing protocols to enable long distance entanglement.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;  [[:Category: Multi Party Protocols|Multi Party]], [[:Category: Specific Task|Specific Task]].&lt;br /&gt;
&amp;lt;!-- I&#039;m not sure if it is a Building Block or not [[:Category:Building Blocks|Building Block]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Description: A lucid definition of functionality in discussion.--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Tags Any related page or list of protocols is connected by this section--&amp;gt;&lt;br /&gt;
&amp;lt;!-- Use Case (if available) analyses how practical the protocol is--&amp;gt;&lt;br /&gt;
==Use Case==&lt;br /&gt;
*No classical analogue.&lt;br /&gt;
&lt;br /&gt;
==Protocols==&lt;br /&gt;
&amp;lt;!-- List of different types of example protocol achieving the functionality--&amp;gt;&lt;br /&gt;
* All the protocols within this functionality are in the [[:Category: Quantum Memory Network Stage|Quantum Memory Network Stage]].&lt;br /&gt;
* There are entanglement routing protocols that are specifically designed for certain network topology e.g: linear, rings, spheres and grids or for networks with arbitrary topology.&lt;br /&gt;
* Quantum repeater nodes have global (all the network) or local (just neighborhood) information on the state of other nodes.&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols.--&amp;gt;&lt;br /&gt;
* Entanglement routing assumes the presence of: &lt;br /&gt;
** Classical and quantum communication physical channels.&lt;br /&gt;
** Quantum repeater nodes.&lt;br /&gt;
* Quantum repeater nodes:&lt;br /&gt;
** Contain qubits that in the short and medium term are applicable to only basic operations i.e, Bell State Measurements to pairs of neighborhood nodes allowing the Entanglement Swapping operation.&lt;br /&gt;
* Some protocols consider fault-tolerant operations on the nodes but other use [https://en.wikipedia.org/wiki/Entanglement_distillation Entanglement Distillation] or Error Corrections schemes on the repeater nodes.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- Any issue that could not be addressed or find a place in the above sections or any review paper discussing a feature of various types of protocols related to the functionality. --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1) I&#039;m not really sure if it is a good idea to add something about the Distributing Graph States Over Arbitrary Quantum Networks in this page/functionality, maybe as an example of usage of quantum networks ?--&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2) Should I add some of the references from the .doc I send you? --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;contributed by Shraddha Singh and Lucas Arenstein&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4405</id>
		<title>Protocol Library</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4405"/>
		<updated>2021-12-09T22:33:52Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Add a protocol page to the Entanglement Routing Functionality&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!width=&amp;quot;40%&amp;quot;|Functionality&lt;br /&gt;
!width=&amp;quot;60%&amp;quot;|Protocols&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;|[[Authentication of Quantum Messages]]||[[Purity Testing based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Clifford Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Trap Code for Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Naive approach using Quantum Teleportation]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Bit Commitment]]||[[Quantum Bit Commitment]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Coin Flipping]]||[[Quantum Strong Coin Flipping]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Weak Coin Flipping]]&lt;br /&gt;
|- &lt;br /&gt;
|[[Copy Protection]]||[[Copy Protection of Compute and Compare Programs]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;8&amp;quot;|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare and Measure Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Arbitrated Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Blind Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Designated Verifiable Quantum Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Limited Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Proxy Signature]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Entanglement Verification]]||[[Multipartite Entanglement Verification]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Fingerprinting]]||[[Quantum Fingerprinting]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Identity Authentication]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Key Distribution (MDI-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Device-Independent Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Continuous-Variable Quantum Key Distribution (CV-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Leader Election]]||[[Quantum Leader Election]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Money|(Quantum) Money]]||[[Quantum Cheque]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Coin]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Token]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wiesner Quantum Money]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;10&amp;quot;| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval in the Visible Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model and in the Blind Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Random Access Memory]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| [[Quantum Secret Sharing|Secret Sharing]] ||[[Quantum Secret Sharing using GHZ States]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Secret Sharing]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;| [[Secure Client- Server Delegated Quantum Computation]] ||[[Classical Fully Homomorphic Encryption for Quantum Circuits]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Prepare-and-Send Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Pseudo-Secret Random Qubit Generator (PSQRG)]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Secure Verifiable Client-Server Delegated Quantum Computation]]||[[Prepare-and-Send Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Verifiable Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Delegated Classical Computation]]||[[Secure Client-Server Classical Delegated Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Multi-Party Delegated Computation]]||[[Secure Multiparty Delegated Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Gate Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Universal Quantum Computation]]||[[Interactive Proofs for Quantum Computation|Quantum Prover Interactive Proofs]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Sub-Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of NP-complete problems]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Classical Verification of Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Travelling Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum voting based on conjugate coding]]&lt;br /&gt;
|-&lt;br /&gt;
||-||[[Weak String Erasure]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Entanglement Routing]]||[[Routing Entanglement in the Quantum Internet]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributing Graph States Over Arbitrary Quantum Networks]]&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Routing_Entanglement_in_the_Quantum_Internet&amp;diff=4393</id>
		<title>Routing Entanglement in the Quantum Internet</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Routing_Entanglement_in_the_Quantum_Internet&amp;diff=4393"/>
		<updated>2021-12-03T21:28:58Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: First version of the page made by Lucas. I still need to add some parts and make another good review of everything.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- This is a comment. You can erase them or write below --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Intro: brief description of the protocol --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
&amp;lt;!--Tags: related pages or category --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
==Assumptions==&lt;br /&gt;
&amp;lt;!-- It describes the setting in which the protocol will be successful. --&amp;gt;&lt;br /&gt;
* Each network repeater node equipped with:&lt;br /&gt;
** Quantum memories that can hold a qubit perfectly for some predefined time.&lt;br /&gt;
** Entanglement sources.&lt;br /&gt;
** Ability to perform Bell state measurements between any pair of locally-held qubits.&lt;br /&gt;
** Classical computing resources and communication interface.&lt;br /&gt;
* Each network repeater node is aware of the overall network topology, as well as the locations of the &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt; Source-Destination pairs.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
&amp;lt;!-- A non-mathematical detailed outline which provides a rough idea of the concerned protocol --&amp;gt;&lt;br /&gt;
In [https://www.nature.com/articles/s41534-019-0139-x.pdf 1] they develop and analyze routing protocols for generating maximally entangled qubits (ebits) simultaneously between single or multiple pairs of senders and receivers in a quantum network by exploiting multiple paths in the network. They introduce protocols for quantum repeater nodes in the following scenarios: &lt;br /&gt;
* Multipath routing of a &#039;&#039;&#039;single&#039;&#039;&#039; entanglement ﬂow:&lt;br /&gt;
** Considering nodes with global link-state information (the state of every link is known to every repeater in the network and can be used).&lt;br /&gt;
** Considering nodes with local link-state information (a link knows the states of it neighbors).&lt;br /&gt;
* Multipath routing of &#039;&#039;&#039;simultaneous&#039;&#039;&#039; entanglement ﬂows:&lt;br /&gt;
** Considering nodes with local link-state information.&lt;br /&gt;
All of the protocols above considering their characteristics are divided in two phases with the objective of creating an unbroken end-to-end connection between the source and destination nodes. The external and the internal phase which occur in this order.&lt;br /&gt;
*External phase: each pair of memories (neighboring repeaters) across an edge attempts to establish a shared entangled (EPR) pair.&lt;br /&gt;
*Internal phase: BSMs are attempted within each memory (repeater node) based on the successes and failures of the neighboring links in the external phase.&lt;br /&gt;
&lt;br /&gt;
The high-level objective is: Considering the assumptions of quantum and classical operations at each of the repeater nodes of the underlying network, what operations should be performed at the repeater to achieve maximum entanglement-generation rate for one sender and receiver or achieve maximum rate region for multiple ﬂows of entanglement.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
&amp;lt;!--  Connects the non-mathematical outline with further sections. --&amp;gt;&lt;br /&gt;
Quantum network with topology described by a graph &amp;lt;math&amp;gt;G(V,E)&amp;lt;/math&amp;gt;:&lt;br /&gt;
* Each of the &amp;lt;math&amp;gt;N=|V|&amp;lt;/math&amp;gt; nodes is equipped with a quantum repeater.&lt;br /&gt;
* Each of the &amp;lt;math&amp;gt;M=|E|&amp;lt;/math&amp;gt; edges is a lossy optical channel of range &amp;lt;math&amp;gt;L_i&amp;lt;/math&amp;gt; (km) and power transmissivity &amp;lt;math&amp;gt;\eta_i \propto e^{-\alpha L_i}&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i \in E&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;\alpha&amp;lt;/math&amp;gt; depends on the material of the channel.&lt;br /&gt;
* &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt; Source-Destination pairs &amp;lt;math&amp;gt;(A_j, B_j)&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;1 \leq j \leq k&amp;lt;/math&amp;gt; situated at (not necessarily distinct) nodes in &amp;lt;math&amp;gt;V&amp;lt;/math&amp;gt;.&lt;br /&gt;
Considering this graph&amp;lt;math&amp;gt;G&amp;lt;/math&amp;gt; we adopt the following notation for the repeater network.&lt;br /&gt;
* Each node &amp;lt;math&amp;gt;v \in V&amp;lt;/math&amp;gt; is a repeater. &lt;br /&gt;
* Each edge &amp;lt;math&amp;gt;e \in E&amp;lt;/math&amp;gt; is a physical link connecting two repeater nodes.&lt;br /&gt;
* &amp;lt;math&amp;gt;S(e) \in \mathbb{Z}^+&amp;lt;/math&amp;gt; is an integer edge weight corresponding to the number of parallel channel across edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;\mathcal{N}(v)&amp;lt;/math&amp;gt; is the set of neighbor edges of &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;&lt;br /&gt;
* &amp;lt;math&amp;gt;d(v) = |\mathcal{N}(v)|&amp;lt;/math&amp;gt; is the degree of node &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;\sum_{e \in \mathcal{N}(v)} S(e)&amp;lt;/math&amp;gt; is the number of memories at node &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &amp;lt;math&amp;gt;d_A&amp;lt;/math&amp;gt; distance of a node to the node A, using the &amp;lt;math&amp;gt;\mathbb{L}^2&amp;lt;/math&amp;gt; norm.&lt;br /&gt;
* An ebit represents a maximally entangled qubit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==Knowledge Graph== --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Add this part if the protocol is already in the graph --&amp;gt;&lt;br /&gt;
&amp;lt;!--{{graph}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Properties==&lt;br /&gt;
&amp;lt;!-- important information on the protocol: parameters (threshold values), security claim, success probability... --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&amp;lt;!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* All of the three protocols below assume that time is slotted and each memory can hold a qubit perfectly for &amp;lt;math&amp;gt;T \geq 1&amp;lt;/math&amp;gt; time slot. After this time the stored qubit completely decoheres.&lt;br /&gt;
* Each time slot &amp;lt;math&amp;gt;t&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;t=1,2,... &amp;lt;/math&amp;gt; is divided into 2 phases:&lt;br /&gt;
* &#039;&#039;&#039;External Phase:&#039;&#039;&#039;&lt;br /&gt;
** Each of the &amp;lt;math&amp;gt;S(e)&amp;lt;/math&amp;gt; pairs of memories across and edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; attempts to establish an EPR pair.&lt;br /&gt;
*:- An entanglement attempt across any one of the &amp;lt;math&amp;gt;S(e)&amp;lt;/math&amp;gt; parallel links across edge &amp;lt;math&amp;gt;e&amp;lt;/math&amp;gt; succeeds with probability &amp;lt;math&amp;gt;p_0(e) \sim \eta(e)&amp;lt;/math&amp;gt;, where &amp;lt;math&amp;gt;\eta(e) \sim e^{-\alpha L_e}&amp;lt;/math&amp;gt; is the transmissivity of a lossy optical channel of length &amp;lt;math&amp;gt;L(e)&amp;lt;/math&amp;gt;.&lt;br /&gt;
** Using two-way classical communication over edge &amp;lt;math&amp;gt;e(u, v)&amp;lt;/math&amp;gt;, neighboring repeater nodes &amp;lt;math&amp;gt;u, v&amp;lt;/math&amp;gt; learn which of the S(e) parallel links (if any) succeeded in the external phase, in a given time slot.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Ask Shraddha about the probability of successfully creating an ebit. I probably understood something wrong but there is a small chance there is a typo in the paper --&amp;gt;&lt;br /&gt;
&amp;lt;!-- After solving this put I will add information here ^ --&amp;gt;&lt;br /&gt;
* &#039;&#039;&#039;Internal Phase:&#039;&#039;&#039;&lt;br /&gt;
** BSMs are attempted locally at each repeater node between pairs of qubit memories based on the success and failure of the neighboring links in the external phase.&lt;br /&gt;
*:- These BSM attempts are called internal links, i.e., links between memories internal to a repeater node.&lt;br /&gt;
*:- Each of these internal-link attempts succeed with probability &amp;lt;math&amp;gt;q&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
At the end of one time-slot a along a path comprising of &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; edges (and thus &amp;lt;math&amp;gt;(k-1)&amp;lt;/math&amp;gt; repeater nodes) one ebit is successfully shared between the end points of the path with probability &amp;lt;math&amp;gt;p^k q^{k-1}&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The maximum number of ebits that can be shared between node &amp;lt;math&amp;gt;a&amp;lt;/math&amp;gt; and node &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt; after one time-slot is &amp;lt;math&amp;gt;min\{d(a), d(b)\}&amp;lt;/math&amp;gt;, assuming &amp;lt;math&amp;gt;S&amp;lt;/math&amp;gt; is the same over all edges.&lt;br /&gt;
&lt;br /&gt;
The protocols described below focus on finding the optimal strategy for each repeater node in order to decide which locally held qubits to attempt BSMs during the internal phase of a&lt;br /&gt;
time slot. Based on the outcomes of the external phase and considering global or local link-state knowledge and &amp;lt;math&amp;gt;K&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
===Multipath Routing of a Single Entanglement Flow===&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;K=1&amp;lt;/math&amp;gt;, Source-Destination pair &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum network with ebits shared between the end points of &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
====Protocol for Entanglement Routing with Global Link-state Information====&lt;br /&gt;
After the External Phase&lt;br /&gt;
# &amp;lt;math&amp;gt;m = 1&amp;lt;/math&amp;gt;&lt;br /&gt;
# &amp;lt;math&amp;gt;G_m&amp;lt;/math&amp;gt; = Subgraph induced by the successful external links and the repeater nodes after the external phase.&lt;br /&gt;
# While (True):&lt;br /&gt;
## &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; = shortest path in &amp;lt;math&amp;gt;G_m&amp;lt;/math&amp;gt; connecting &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;. &lt;br /&gt;
## If &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; is empty: Break While Loop.&lt;br /&gt;
## Else:&lt;br /&gt;
### Set &amp;lt;math&amp;gt;L_m&amp;lt;/math&amp;gt; as the length of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt;.&lt;br /&gt;
### Try connecting all internal links along the nodes of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt; &amp;lt;br /&amp;gt;//successfully generating an ebit between &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt; with probability &amp;lt;math&amp;gt;q^{L_m - 1}&amp;lt;/math&amp;gt;&lt;br /&gt;
## &amp;lt;math&amp;gt;G_{m+1}&amp;lt;/math&amp;gt; = &amp;lt;math&amp;gt;G_m -&amp;lt;/math&amp;gt; all external and internal links of &amp;lt;math&amp;gt;S_m&amp;lt;/math&amp;gt;.&lt;br /&gt;
## &amp;lt;math&amp;gt;m = m + 1.&amp;lt;/math&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Protocol for Entanglement Routing with Local Link-state Information====&lt;br /&gt;
&lt;br /&gt;
Knowledge of success and failure of the External Phase is communicated only to the two repeater nodes connected by the link.&lt;br /&gt;
Repeater nodes need to decide on which pair(s) of memories BSMs should be attempted (which internal links to attempt), based only on information about the states of external links adjacent to them.&lt;br /&gt;
&lt;br /&gt;
After the External Phase&lt;br /&gt;
# For every repeater except &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;: &amp;lt;br /&amp;gt; Let &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; be the node of this iteration.&lt;br /&gt;
## If less than one of the neighboring external links is successful: &amp;lt;br /&amp;gt;no internal links are attempted since this repeater node can not be part of a path from &amp;lt;math&amp;gt;A_1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;B_1&amp;lt;/math&amp;gt;.&lt;br /&gt;
## If two or more neighboring external links are successful: &amp;lt;br /&amp;gt; Let &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; be the node linked to &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; with the smallest &amp;lt;math&amp;gt;d_{A_1}&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt; be the node linked to &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; with the smallest &amp;lt;math&amp;gt;d_{B_1}&amp;lt;/math&amp;gt;. &amp;lt;br /&amp;gt; Attempt a BSM on node &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; on the memories connected to &amp;lt;math&amp;gt;v&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;w&amp;lt;/math&amp;gt;.&lt;br /&gt;
### If four neighboring external links are successful: &amp;lt;br /&amp;gt; Attempt a BSM on node &amp;lt;math&amp;gt;u&amp;lt;/math&amp;gt; on the remaining memories disconsidering the two memories from the previous step. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Protocol for Simultaneous Entanglement Flows with Link-state Information===&lt;br /&gt;
&#039;&#039;&#039;Input:&#039;&#039;&#039; &amp;lt;math&amp;gt;K=2&amp;lt;/math&amp;gt;, Source-Destination pairs &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(A_2, B_2)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output:&#039;&#039;&#039; Quantum network with ebits shared between the end points of &amp;lt;math&amp;gt;(A_1, B_1)&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;(A_2, B_2)&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
This situation motivates the &#039;&#039;&#039;Multi-ﬂow Spatial-division&#039;&#039;&#039; rule which divides the the network between two spatial regions corresponding to the two flows.&lt;br /&gt;
&lt;br /&gt;
* When the shortest path connecting the two source-destination pairs &#039;&#039;&#039;do not&#039;&#039;&#039; cross the network is divided between two spatial regions corresponding to the two ﬂows.&lt;br /&gt;
** For each one of this regions we apply the Protocol for Entanglement Routing with Local Link-state Information.&lt;br /&gt;
&lt;br /&gt;
* When the shortest path connecting the two source-destination pairs &#039;&#039;&#039;do&#039;&#039;&#039; cross the network is divided between two spatial regions corresponding to the two ﬂows.&lt;br /&gt;
** Considering the square-grid topology the two spatial regions are divided by two crossing lines with an angle &amp;lt;math&amp;gt;\theta&amp;lt;/math&amp;gt; between them (forming a hourglass shape).&lt;br /&gt;
** For each one of this regions we apply the Protocol for Entanglement Routing with Local Link-state Information.&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
&amp;lt;!-- theoretical and experimental papers including requirements, security proof (important), which protocol does it implement, benchmark values... --&amp;gt;&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;!-- to do --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Lucas Arenstein&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Distributing_Graph_States_Over_Arbitrary_Quantum_Networks&amp;diff=4397</id>
		<title>Distributing Graph States Over Arbitrary Quantum Networks</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Distributing_Graph_States_Over_Arbitrary_Quantum_Networks&amp;diff=4397"/>
		<updated>2021-11-20T14:07:07Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: First version of this page. I still need to add the introduction, properties, images and make another good review of everything.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Under construction [https://arxiv.org/abs/1811.05445 Meignant, Markham and Grosshans (2019)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039;[[:Category:Specific Task|Specific Task]]&lt;br /&gt;
&lt;br /&gt;
==Assumptions==&lt;br /&gt;
* Perfect distribution of Bell pairs occurring at perfectly synchronized times.&lt;br /&gt;
* Perfect node local computation.&lt;br /&gt;
* Ignore the cost of classical communications.&lt;br /&gt;
* Ignore processing time of local quantum processor.&lt;br /&gt;
* Ignore the cost of quantum memory.&lt;br /&gt;
&lt;br /&gt;
==Outline==&lt;br /&gt;
The protocol [https://arxiv.org/abs/1811.05445 1] aims to distribute multipartite entangled states that are represented by graph states over fixed networks of arbitrary topology. They first introduce a protocol to distribute GHZ states that considering the assumptions takes a single time step and is optimal in terms of the Bell pair used. Their second protocol is a generalization of the first one and can distribute any arbitrary graph state using at most twice as many Bell pairs and steps than the optimal distributing protocol for the worst case scenario.&lt;br /&gt;
&lt;br /&gt;
In this protocol a quantum network is represented as a graph&lt;br /&gt;
&#039;&#039;upload image here&#039;&#039;&lt;br /&gt;
&amp;lt;!--[[File:.png]]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The physical distribution of graph states are represented as graph operations ignoring&lt;br /&gt;
local corrections.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To distribute a &#039;&#039;&#039;GHZ states&#039;&#039;&#039; over all the nodes of an arbitrary set &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; of the network nodes we have two steps:&lt;br /&gt;
&lt;br /&gt;
# Find a minimal tree covering all the nodes of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; using the [https://en.wikipedia.org/wiki/Steiner_tree_problem Steiner Tree Problem].&lt;br /&gt;
#* Minimal tree is a subgraph connecting all the nodes in &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; with the minimum number of edges.&lt;br /&gt;
# Apply an operation called Star Expansion on the leaves of the tree from the previous step.&lt;br /&gt;
&amp;lt;!-- Put Link to Star Expansion --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To distribute an &#039;&#039;&#039;Arbitrary Graph State&#039;&#039;&#039; we realize multiple iterations of the protocol above. &lt;br /&gt;
After that we make measurements on the participating nodes to generate the arbitrary graph state we want.&lt;br /&gt;
&amp;lt;!-- ==Properties== --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Put the cost of distributing, upper bounds etc --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Requirements==&lt;br /&gt;
*&#039;&#039;&#039;Network Stage:&#039;&#039;&#039; [[Category: Quantum Memory Network Stage]][[:Category: Quantum Memory Network Stage| Quantum Memory]]&lt;br /&gt;
* Nodal Clifford Operations.&lt;br /&gt;
&lt;br /&gt;
==Notation==&lt;br /&gt;
* &amp;lt;math&amp;gt;b=&amp;lt;/math&amp;gt;qubit in the center of the star graph.&lt;br /&gt;
* &amp;lt;math&amp;gt;A=&amp;lt;/math&amp;gt;Node of the network which contains a qubit &amp;lt;math&amp;gt;a_0 \in A \cap N_b&amp;lt;/math&amp;gt; (neighborhood of b).&lt;br /&gt;
* &amp;lt;math&amp;gt;|A|&amp;lt;/math&amp;gt; number of nodes of A.&lt;br /&gt;
* &amp;lt;math&amp;gt;a_i \in A&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i &amp;gt; 0&amp;lt;/math&amp;gt; Represents each of the qubits of &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; that constitutes a Bell pair with a qubit &amp;lt;math&amp;gt;c_i&amp;lt;/math&amp;gt; in another node of the network.&lt;br /&gt;
&lt;br /&gt;
==Protocol Description==&lt;br /&gt;
&#039;&#039;&#039;Graph Operations:&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;Vertex Deletion.&#039;&#039;&#039; Removes one vertex and all the associated edges from the graph.&lt;br /&gt;
** Implemented by the Pauli Measurement of the relevant qubit in the &#039;&#039;Z basis&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Local Complementation.&#039;&#039;&#039; Inverts the subgraph induced by the neighborhood &amp;lt;math&amp;gt;N_a&amp;lt;/math&amp;gt; of the concerned vertex &amp;lt;math&amp;gt;a&amp;lt;/math&amp;gt;.&lt;br /&gt;
** Implemented by the quantum operator &amp;lt;math&amp;gt;U_a^\tau = e^{-i \frac{\pi}{4}X_a} \bigotimes_{b \in N_a} e^{i \frac{\pi}{4}Z_b}&amp;lt;/math&amp;gt; acting on the qubits &amp;lt;math&amp;gt;a \cup N_a&amp;lt;/math&amp;gt;.&lt;br /&gt;
* &#039;&#039;&#039;Edge Addition.&#039;&#039;&#039; Add an edge between two nonadjacent vertices.&lt;br /&gt;
** Implemented by applying a &#039;&#039;controlled-Z&#039;&#039; between the desired nodes.&lt;br /&gt;
* &#039;&#039;&#039;Edge Deletion.&#039;&#039;&#039; Delete an edge between two adjacent vertices.&lt;br /&gt;
** Implemented by applying a &#039;&#039;controlled-Z&#039;&#039; between the desired nodes.&lt;br /&gt;
* &#039;&#039;&#039;Entanglement Swapping.&#039;&#039;&#039;&lt;br /&gt;
** Implemented by applying &#039;&#039;controlled-Z&#039;&#039; gate followed by two single qubit &#039;&#039;Y-measurement&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===GHZ State Distribution Protocol===&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;&lt;br /&gt;
* N-GHZ state: &amp;lt;math&amp;gt;|\text{N-GHZ}\rangle = (|0\rangle^{\otimes N}+|1\rangle^{\otimes N})/\sqrt{2}&amp;lt;/math&amp;gt;.&lt;br /&gt;
* That is locally equivalent to: &amp;lt;math&amp;gt;(|0\rangle|+\rangle^{\otimes N-1}+|1\rangle|-\rangle^{\otimes N-1})/\sqrt{2}&amp;lt;/math&amp;gt; that is called a star graph &#039;&#039;&#039;link to star graph&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Upload Star Graph Image--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Arbitrary set &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; of the network nodes.&lt;br /&gt;
** Assuming that the network topology is already given to us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;&lt;br /&gt;
* N-GHZ state distributed over &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;GHZ-Distribution Algorithm&#039;&#039;&#039;&lt;br /&gt;
# Find a minimal tree covering all the nodes of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; &lt;br /&gt;
# &amp;lt;math&amp;gt;l&amp;lt;/math&amp;gt; is a random leaf from the tree of step 1.&lt;br /&gt;
# For &amp;lt;math&amp;gt;j=1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;|W| - 1&amp;lt;/math&amp;gt;:    &lt;br /&gt;
## Let &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; be any unprocessed node of &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; such as &amp;lt;math&amp;gt;l \notin A&amp;lt;/math&amp;gt;.&lt;br /&gt;
## Apply the Start Expansion Algorithm on node &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; with &amp;lt;math&amp;gt;l&amp;lt;/math&amp;gt; as &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt; the center of the star.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Start Expansion Algorithm&#039;&#039;&#039;&lt;br /&gt;
This routine uses the Bell pairs of the node &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; to add the edges &amp;lt;math&amp;gt;(b,c_i)&amp;lt;/math&amp;gt; to the graph state, as well as the edge &amp;lt;math&amp;gt;(b, a_0)&amp;lt;/math&amp;gt; &#039;&#039;iff&#039;&#039; &amp;lt;math&amp;gt;A \in W&amp;lt;/math&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
# All the qubits &amp;lt;math&amp;gt;a_i, i \geq 0&amp;lt;/math&amp;gt; of &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; are linked using Controlled-Z operations between all possible pairs.&lt;br /&gt;
# Local complementation is applied to the qubit &amp;lt;math&amp;gt;a_0&amp;lt;/math&amp;gt; linked to &amp;lt;math&amp;gt;b&amp;lt;/math&amp;gt;.&lt;br /&gt;
# If &amp;lt;math&amp;gt;A \notin W&amp;lt;/math&amp;gt;:&lt;br /&gt;
## Remove &amp;lt;math&amp;gt;a_0&amp;lt;/math&amp;gt; and all the edges within &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt; by &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt;-measuring it&lt;br /&gt;
## Else (when &amp;lt;math&amp;gt;A \in W&amp;lt;/math&amp;gt;):&lt;br /&gt;
###Keep &amp;lt;math&amp;gt;a_0&amp;lt;/math&amp;gt; and apply  Controlled-Z gates to remove all edges within &amp;lt;math&amp;gt;A&amp;lt;/math&amp;gt;.&lt;br /&gt;
#Apply a &amp;lt;math&amp;gt;Y&amp;lt;/math&amp;gt;-measurement on all the other qubits &amp;lt;math&amp;gt;a_i \in A&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;i&amp;gt;0&amp;lt;/math&amp;gt; creating the desired Start Graph.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Arbitrary Graph State Distribution Protocol===&lt;br /&gt;
To distribute an arbitrary graph state we first distribute the edge-decorated complete graph state. From this graph we can construct any other graph state by measuring each edge-qubit with a:&lt;br /&gt;
* &#039;&#039;Z measurement&#039;&#039; to delete this vertex and its edges&lt;br /&gt;
or a&lt;br /&gt;
* &#039;&#039;Y measurement&#039;&#039; to delete the vertex but keep the edges.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Input&#039;&#039;&#039;&lt;br /&gt;
* Arbitrary graph state to distribute&lt;br /&gt;
* Arbitrary set &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt; of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; participating nodes.&lt;br /&gt;
&#039;&#039;&#039;Output&#039;&#039;&#039;&lt;br /&gt;
* Arbitrary graph state distributed over &amp;lt;math&amp;gt;W&amp;lt;/math&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Arbitrary Graph State Distribution Algorithm&#039;&#039;&#039;&lt;br /&gt;
# Solve the [https://en.wikipedia.org/wiki/Steiner_tree_problem Steiner Tree Problem] on the network for the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; nodes.&lt;br /&gt;
#* Each one of the nodes of this tree has an central leaf &amp;lt;math&amp;gt;l_n&amp;lt;/math&amp;gt;, &amp;lt;math&amp;gt;1 \leq n \leq k&amp;lt;/math&amp;gt;.&lt;br /&gt;
# For &amp;lt;math&amp;gt;j=1&amp;lt;/math&amp;gt; to &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt;:&lt;br /&gt;
## Distribute a (k-1-j)-GHZ state on the node of &amp;lt;math&amp;gt;l_j&amp;lt;/math&amp;gt; using the [[Distributing Graph States Over Arbitrary Quantum Networks#Protocol Description|GHZ-Distribution Algorithm ]].&lt;br /&gt;
## Delete vertices from the tree in order to have the covering tree for the set &amp;lt;math&amp;gt;W \setminus \{l_j\}&amp;lt;/math&amp;gt;.&lt;br /&gt;
# For each one of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; nodes apply local operations to generate the edge-decorated graph state.&lt;br /&gt;
# For each one of the &amp;lt;math&amp;gt;k&amp;lt;/math&amp;gt; nodes construct the desired arbitrary state by applying &amp;lt;math&amp;gt;Z&amp;lt;/math&amp;gt; and &amp;lt;math&amp;gt;Y&amp;lt;/math&amp;gt; measurements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Further Information==&lt;br /&gt;
The distribution of multipartite entangled states over quantum networks has also been studied in the following articles:&lt;br /&gt;
* [http://dx.doi.org/10.1088/1367-2630/18/5/053036 Epping et all (2016)] Investigate the creation of a graph state presenting the shape of the network in the presence of noise.&lt;br /&gt;
* [http://dx.doi.org/10.1103/PhysRevA.86.042304 Cuquet and Calsamiglia (2012)] and [http://dx.doi.org/10.1103/PhysRevLett.104.050501 Matsuzaki et al (2010)] Present decomposition of graph states into various building blocks that can be purified and merged to construct graph states over a network.&lt;br /&gt;
* [http://dx.doi.org/10.1038/s41534-019-0191-6 Hahn et all (2019)] Studies the possible transformations of an already shared graph-state, with a single-qubit per location.&lt;br /&gt;
* [http://dx.doi.org/10.1088/1367-2630/ab05f7 Pirker and Dür (2019)] Includes a protocol very similar to the one presented in this page, but the modeling of the network is different, as well as the optimized metrics. They describe a hierarchical network stack and use it to provide robustness against router or sub-network failures, which is not presented in this work.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
# [https://arxiv.org/abs/1811.05445 Meignant, Markham and Grosshans (2019)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&#039;text-align: right;&#039;&amp;gt;&#039;&#039;*contributed by Lucas Arenstein&#039;&#039;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4396</id>
		<title>Protocol Library</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4396"/>
		<updated>2021-11-20T11:18:13Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!width=&amp;quot;40%&amp;quot;|Functionality&lt;br /&gt;
!width=&amp;quot;60%&amp;quot;|Protocols&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Authentication of Quantum Messages]]||[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Bit Commitment]]||[[Quantum Bit Commitment]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Coin Flipping]]||[[Quantum Strong Coin Flipping]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Weak Coin Flipping]]&lt;br /&gt;
|- &lt;br /&gt;
|[[Copy Protection]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;8&amp;quot;|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare and Measure Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Arbitrated Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Blind Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Designated Verifiable Quantum Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Limited Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Proxy Signature]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Entanglement Verification]]||[[Multipartite Entanglement Verification]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Fingerprinting]]||[[Quantum Fingerprinting]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Identity Authentication]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Key Distribution (MDI-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Device-Independent Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Continuous-Variable Quantum Key Distribution (CV-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Leader Election]]||[[Quantum Leader Election]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Money|(Quantum) Money]]||[[Quantum Cheque]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Coin]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Token]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wiesner Quantum Money]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;10&amp;quot;| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval in the Visible Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model and in the Blind Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Random Access Memory]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| [[Quantum Secret Sharing|Secret Sharing]] ||[[Quantum Secret Sharing using GHZ States]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Secret Sharing]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;| [[Secure Client- Server Delegated Quantum Computation]] ||[[Classical Fully Homomorphic Encryption for Quantum Circuits]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Prepare-and-Send Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Pseudo-Secret Random Qubit Generator (PSQRG)]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Secure Verifiable Client-Server Delegated Quantum Computation]]||[[Prepare-and-Send Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Verifiable Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Delegated Classical Computation]]||[[Secure Client-Server Classical Delegated Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Multi-Party Delegated Computation]]||[[Secure Multiparty Delegated Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Gate Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Universal Quantum Computation]]||[[Interactive Proofs for Quantum Computation|Quantum Prover Interactive Proofs]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Sub-Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of NP-complete problems]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Classical Verification of Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Travelling Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum voting based on conjugate coding]]&lt;br /&gt;
|-&lt;br /&gt;
||-||[[Weak String Erasure]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Entanglement Routing]]||[[Distributing Graph States Over Arbitrary Quantum Networks]]&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4379</id>
		<title>Protocol Library</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Protocol_Library&amp;diff=4379"/>
		<updated>2021-11-09T15:59:34Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!width=&amp;quot;40%&amp;quot;|Functionality&lt;br /&gt;
!width=&amp;quot;60%&amp;quot;|Protocols&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Anonymous Transmission]]||[[GHZ-based Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Anonymous Transmission]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Authentication of Classical Messages]]||[[Uncloneable Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;1&amp;quot;|[[Authentication of Quantum Messages]]||[[Polynomial Code based Quantum Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Byzantine Agreement]]||[[Fast Quantum Byzantine Agreement]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Bit Commitment]]||[[Quantum Bit Commitment]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Coin Flipping]]||[[Quantum Strong Coin Flipping]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Weak Coin Flipping]]&lt;br /&gt;
|- &lt;br /&gt;
|[[Copy Protection]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;8&amp;quot;|[[Quantum Digital Signature|(Quantum) Digital Signature]] |||[[Gottesman and Chuang Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare and Measure Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Digital Signature (MDI-QDS)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Arbitrated Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Blind Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Designated Verifiable Quantum Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Limited Delegation of Quantum Digital Signature]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Proxy Signature]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Entanglement Verification]]||[[Multipartite Entanglement Verification]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Fingerprinting]]||[[Quantum Fingerprinting]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Identity Authentication]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Key Distribution|(Quantum) Key Distribution]]||[[BB84 Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement Device Independent Quantum Key Distribution (MDI-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Device-Independent Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Continuous-Variable Quantum Key Distribution (CV-QKD)]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Leader Election]]||[[Quantum Leader Election]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Money|(Quantum) Money]]||[[Quantum Cheque]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Coin]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Token]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Wiesner Quantum Money]]&lt;br /&gt;
|-&lt;br /&gt;
||[[Oblivious Transfer]]||[[Quantum Oblivious Transfer]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;10&amp;quot;| [[(Symmetric) Private Information Retrieval]] ||[[Multi-Database Classical Symmetric Private Information Retrieval with Quantum Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Coded Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval for Communicating and Colluding Servers]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval in the Visible Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Multi-Database Quantum Symmetric Private Information Retrieval without Shared Randomness]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval in the Honest Server Model and in the Blind Setting for a Quantum Database]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Single-Database Quantum Private Information Retrieval with Prior Shared Entanglement in the Honest Server Model]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Oblivious Key Distribution]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum Private Queries Protocol Based on Quantum Random Access Memory]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;| [[Quantum Secret Sharing|Secret Sharing]] ||[[Quantum Secret Sharing using GHZ States]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verifiable Quantum Secret Sharing]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;5&amp;quot;| [[Secure Client- Server Delegated Quantum Computation]] ||[[Classical Fully Homomorphic Encryption for Quantum Circuits]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Prepare-and-Send Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Pseudo-Secret Random Qubit Generator (PSQRG)]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;3&amp;quot;|[[Secure Verifiable Client-Server Delegated Quantum Computation]]||[[Prepare-and-Send Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Measurement-Only Verifiable Universal Blind Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Prepare-and-Send Verifiable Quantum Fully Homomorphic Encryption]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Delegated Classical Computation]]||[[Secure Client-Server Classical Delegated Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Secure Multi-Party Delegated Computation]]||[[Secure Multiparty Delegated Quantum Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Secure Multiparty Delegated Classical Computation]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;2&amp;quot;|[[Teleportation|(Quantum) Teleportation]]||[[Quantum Teleportation|State Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Gate Teleporation]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Universal Quantum Computation]]||[[Interactive Proofs for Quantum Computation|Quantum Prover Interactive Proofs]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of Sub-Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Verification of NP-complete problems]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Classical Verification of Universal Quantum Computation]]||[[-]]&lt;br /&gt;
|-&lt;br /&gt;
|rowspan=&amp;quot;4&amp;quot;|[[Quantum Electronic Voting]]||[[Dual Basis Measurement Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Travelling Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Distributed Ballot Based Protocol]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Quantum voting based on conjugate coding]]&lt;br /&gt;
|-&lt;br /&gt;
||-||[[Weak String Erasure]]&lt;br /&gt;
|-&lt;br /&gt;
||-||[[Distributing Graph States Over Arbitrary Quantum Networks]]&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Distributing_Graph_States_Over_Arbitrary_Quantum_Networks&amp;diff=4378</id>
		<title>Distributing Graph States Over Arbitrary Quantum Networks</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Distributing_Graph_States_Over_Arbitrary_Quantum_Networks&amp;diff=4378"/>
		<updated>2021-11-07T18:08:35Z</updated>

		<summary type="html">&lt;p&gt;189.120.189.205: Created page with &amp;quot;To do [https://arxiv.org/abs/1811.05445]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To do [https://arxiv.org/abs/1811.05445]&lt;/div&gt;</summary>
		<author><name>189.120.189.205</name></author>
	</entry>
</feed>