Editing Category:Quantum Memory Network Stage
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
[[Category: Network Stages]] | [[Category: Network Stages]] | ||
In the fifth network stage, the end nodes have the capability to have a local memory which allows them to store quantum states. A crucial difference between this stage and the previous one is that we are now able to transfer unknown qubits from one network node to another for example, by performing deterministic [[ | In the fifth network stage, the end nodes have the capability to have a local memory which allows them to store quantum states. A crucial difference between this stage and the previous one is that we are now able to transfer unknown qubits from one network node to another for example, by performing deterministic [[Teleportation|teleportation]]. | ||
==Applications== | ==Applications== | ||
This stage also implies the ability to perform entanglement distillation and generate multipartite entangled states from bipartite entanglement by exploiting the ability for local memory and control. It allows the implementation of much more complex protocols that require temporary storage of a quantum state during further quantum or classical communication. Interesting applications outside the domain of cryptography are exploiting long distance entanglement to extend the baseline of telescopes, for basic forms of leader election and for improving the synchronization of clocks. | This stage also implies the ability to perform entanglement distillation and generate multipartite entangled states from bipartite entanglement by exploiting the ability for local memory and control. It allows the implementation of much more complex protocols that require temporary storage of a quantum state during further quantum or classical communication. Interesting applications outside the domain of cryptography are exploiting long distance entanglement to extend the baseline of telescopes, for basic forms of leader election and for improving the synchronization of clocks. |