Quantum repeaters: From quantum networks to the quantum internet

K Azuma, SE Economou, D Elkouss, P Hilaire… - Reviews of Modern …, 2023 - APS
A quantum internet is the holy grail of quantum information processing, enabling the
deployment of a broad range of quantum technologies and protocols on a global scale …

Progress in quantum teleportation

XM Hu, Y Guo, BH Liu, CF Li, GC Guo - Nature Reviews Physics, 2023 - nature.com
Thirty years after it was first proposed, quantum teleportation remains one of the most
important protocols in quantum information and quantum technologies, enabling the …

Creation of memory–memory entanglement in a metropolitan quantum network

JL Liu, XY Luo, Y Yu, CY Wang, B Wang, Y Hu, J Li… - Nature, 2024 - nature.com
Towards realizing the future quantum internet,, a pivotal milestone entails the transition from
two-node proof-of-principle experiments conducted in laboratories to comprehensive multi …

Nonlinear and quantum photonics using integrated optical materials

A Dutt, A Mohanty, AL Gaeta, M Lipson - Nature Reviews Materials, 2024 - nature.com
Integrated nonlinear photonics provides transformative capabilities for controlling,
enhancing and manipulating material nonlinearities in miniaturized on-chip platforms. The …

Micius quantum experiments in space

CY Lu, Y Cao, CZ Peng, JW Pan - Reviews of Modern Physics, 2022 - APS
Quantum theory has been successfully validated in numerous laboratory experiments. But
would such a theory, which effectively describes the behavior of microscopic physical …

The evolution of quantum key distribution networks: On the road to the qinternet

Y Cao, Y Zhao, Q Wang, J Zhang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol
capable of maintaining information-theoretic security. Given the recent advances in QKD …

Experimental quantum key distribution certified by Bell's theorem

DP Nadlinger, P Drmota, BC Nichol, G Araneda… - Nature, 2022 - nature.com
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdrop** attacks …

[HTML][HTML] Quantum computing with neutral atoms

L Henriet, L Beguin, A Signoles, T Lahaye… - Quantum, 2020 - quantum-journal.org
The manipulation of neutral atoms by light is at the heart of countless scientific discoveries in
the field of quantum physics in the last three decades. The level of control that has been …

Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Quantum-dot-based deterministic photon–emitter interfaces for scalable photonic quantum technology

R Uppu, L Midolo, X Zhou, J Carolan… - Nature nanotechnology, 2021 - nature.com
The scale-up of quantum hardware is fundamental to realize the full potential of quantum
technology. Among a plethora of hardware platforms, photonics stands out: it provides a …