2020
DOI: 10.1038/s42005-020-0318-2
|View full text |Cite
|
Sign up to set email alerts
|

Linear programs for entanglement and key distribution in the quantum internet

Abstract: Quantum networks will allow to implement communication tasks beyond the reach of their classical counterparts. A pressing and necessary issue for the design of quantum network protocols is the quantification of the rates at which these tasks can be performed. Here, we propose a simple recipe that yields efficiently computable lower and upper bounds for network capacities. For this we make use of the max-flow min-cut theorem and its generalization to multi-commodity flows to obtain linear programs (LPs). We exe… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
47
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(48 citation statements)
references
References 71 publications
1
47
0
Order By: Relevance
“…In the information-theoretic setting and considering the general case of adaptive protocols, upper bounds on this key rate have been studied in Refs. [39,40] and later in a series of other papers [41][42][43][44][45][46]. Here we report the tightest-known bounds that establish the end-toend capacities in chains and networks connected by fundamental channels (subsections XII B and XII C).…”
Section: A Overviewmentioning
confidence: 66%
See 2 more Smart Citations
“…In the information-theoretic setting and considering the general case of adaptive protocols, upper bounds on this key rate have been studied in Refs. [39,40] and later in a series of other papers [41][42][43][44][45][46]. Here we report the tightest-known bounds that establish the end-toend capacities in chains and networks connected by fundamental channels (subsections XII B and XII C).…”
Section: A Overviewmentioning
confidence: 66%
“…All seems well except for the fact that the value of i in equations (46) and (47) runs from 0 to infinite! This literally means that to have a precise value for Y 1 and e 1 , Alice should in principle, use and infinite number of decoy states.…”
Section: Decoy Statesmentioning
confidence: 97%
See 1 more Smart Citation
“…For instance, for R i = 0 and R j =i = 0, we get the unicast bounds of Eq. (26). For R i = 0, R j =i = 0 and R k =i,j = 0 we get the double-unicast bounds of Eq.…”
Section: Multiple-unicast Quantum Network With Single-path Routingmentioning
confidence: 99%
“…In recent literature, several studies have appeared where the performance of quantum communication networks have been studied using different configurations and methods [17][18][19][20][21][22][23][24][25][26]. In fact, once understood that the use of relays or repeaters [27][28][29] can overcome the PLOB bound, it is also important to understand the ultimate limits achievable by repeater-assisted quantum communications.…”
Section: Introductionmentioning
confidence: 99%