透過您的圖書館登入
IP:3.141.30.211
  • 期刊

長距離量子通訊的解決方案:量子中繼站

Solutions for Long-Distance Quantum Communication: Quantum Repeater

摘要


隨著世界各國在量子通訊領域的大力投入下,其發展也愈具規模。然而,隨著通訊距離的增長,巨大的損耗強烈的限制了通訊距離。在傳統光纖通訊中,中繼站放大被衰減的訊號得以延長傳輸距離,但基於不可複製原理所保護的量子通訊卻無法採用此傳統方案,為解決此難題,量子中繼站協定因而被提出。該協定利用糾纏交換使得從未交互作用過的節點分享量子關聯性,並連結遙遠的兩節點,達成長距離的量子通訊。本文將介紹量子中繼站的基本原理,探討記憶體型式和全光學型式的量子中繼站之物理原理及技術挑戰。另一方面我們也介紹能突破直接傳輸雙場量子密鑰分發之原理與現狀。我們相信本文之原理與現狀介紹將有助於讀者對長距離量子通訊有一個整體的認識。

並列摘要


With the large resources invested by many countries in the world, the networks of quantum communication have been developed. However, with the increase of communication distance, the losses on the communication line will greatly limit the distance of quantum communication. On the other hand, the no-cloning theorem that protects the security of quantum communication also restricts the application of classical repeater stations through amplifying the attenuated signal in quantum communication. To resolve this problem, the concept of quantum repeater (QR) protocol was proposed. The protocol uses the unique characteristics of quantum mechanics such as entanglement swapping (ES) to further distribute quantum correlations, entangle the nodes that have never interacted, and even resist losses caused by the transmission lines to achieve long-distance quantum communication. In this article, we discuss the difficulties encountered by quantum communications over long-distance transmissions and explain the solution: QR protocol. With the different architectures of QR protocol, their protocols can be divided into memory-based and all-optical types. We will introduce the physical principles of the two different types of QR and the process of the protocol. We also report on some recent progresses of QR. In addition, we also discuss the twin-field quantum key distribution (TFQKD) scheme, recently proposed for long-distance quantum communication. We believe that this report will help the readers to understand the architecture of long-distance quantum communication and the technical challenges that it faces.

參考文獻


Akiba K., Kashiwagi K., Arikawa M., and Kozuma M., 2009, “Storage and Retrieval of Nonclassical Photon Pairs and Conditional Single Photons Generated by the Parametric Down-Conversion Process,” New Journal of Physics, 11(1), 013049. doi:10.1088/1367-2630/11/1/013049
Azuma K., Tamaki K., and Lo H.-K., 2015, “All-Photonic Quantum Repeaters,” Nature Communications, 6, 6787. doi:10.1038/ncomms7787
Bennett C. H., and Brassard G., 2014, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” Theoretical Computer Science, 560, 7-11. doi:10.1016/j.tcs.2014.05.025
Boaron A., Boso G., Rusca D., Vulliez C., Autebert C., Caloz M., Perrenoud M., Gras G., Bussières F., Li M.-J., Nolan D., Martin A., and Zbinden H., 2018, “Secure Quantum Key Distribution over 421 km of Optical Fiber,” Physical Review Letters, 121(19), 190502. doi:10.1103/PhysRevLett.121.190502
Briegel H.-J., Dür W., Cirac J. I., and Zoller P., 1998, “Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication,” Physical Review Letters, 81(26), 5932-5935. doi:10.1103/PhysRevLett.81.5932

延伸閱讀