Quantum repeaters: From quantum networks to the quantum internet
A quantum internet is the holy grail of quantum information processing, enabling the
deployment of a broad range of quantum technologies and protocols on a global scale …
deployment of a broad range of quantum technologies and protocols on a global scale …
Micius quantum experiments in space
Quantum theory has been successfully validated in numerous laboratory experiments. But
would such a theory, which effectively describes the behavior of microscopic physical …
would such a theory, which effectively describes the behavior of microscopic physical …
Applications of single photons to quantum communication and computing
In the context of quantum technologies, the generation and manipulation of single photons
has become a key element for applications such as quantum communication and quantum …
has become a key element for applications such as quantum communication and quantum …
Realization of a multinode quantum network of remote solid-state qubits
The distribution of entangled states across the nodes of a future quantum internet will unlock
fundamentally new technologies. Here, we report on the realization of a three-node …
fundamentally new technologies. Here, we report on the realization of a three-node …
Qubit teleportation between non-neighbouring nodes in a quantum network
Future quantum internet applications will derive their power from the ability to share
quantum information across the network,. Quantum teleportation allows for the reliable …
quantum information across the network,. Quantum teleportation allows for the reliable …
A device-independent quantum key distribution system for distant users
W Zhang, T van Leent, K Redeker, R Garthoff… - Nature, 2022 - nature.com
Device-independent quantum key distribution (DIQKD) enables the generation of secret
keys over an untrusted channel using uncharacterized and potentially untrusted devices …
keys over an untrusted channel using uncharacterized and potentially untrusted devices …
Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdrop** attacks …
as the hardness of prime factorization to provide security against eavesdrop** attacks …
Circuit quantum electrodynamics
Quantum-mechanical effects at the macroscopic level were first explored in Josephson-
junction-based superconducting circuits in the 1980s. In recent decades, the emergence of …
junction-based superconducting circuits in the 1980s. In recent decades, the emergence of …
Entanglement of trapped-ion qubits separated by 230 meters
We report on an elementary quantum network of two atomic ions separated by 230 m. The
ions are trapped in different buildings and connected with 520 (2) m of optical fiber. At each …
ions are trapped in different buildings and connected with 520 (2) m of optical fiber. At each …
Quantum guidelines for solid-state spin defects
Defects with associated electron and nuclear spins in solid-state materials have a long
history relevant to quantum information science that goes back to the first spin echo …
history relevant to quantum information science that goes back to the first spin echo …