Abstract
Quantum entanglement is one of the most startling but strong aspects in quantum mechanics. It will be an important feature of communication networks in the future. At its most basic level, entanglement is when two or more quantum particles get linked in such a way that the state of one particle is instantly linked to the state of another, no matter how far apart they are. Einstein dubbed this "spooky action at a distance," and it has made many highly interested in how it could be employed in incredibly quick and safe methods for sending data. As the need for global data rises exponentially, researchers are looking into whether quantum entanglement could be the basis for communication networks that are far faster and safer than traditional ones. Some individuals anticipated that quantum entanglement would let humans talk faster than light, however the no-communication theorem says this isn't true. This idea claims that even while entangled particles seem to be connected straight away, they can't be used to communicate classical information right away. Entanglement can still have a big impact on quantum communication, though. Quantum teleportation and quantum key distribution (QKD) are two methods that use entangled states to convey information swiftly and safely. But there are still portions of the process that rely on traditional communication channels.
This research paper goes into great detail on the ideas behind quantum entanglement and how it can be utilised to send information. It looks at the current state of experimental research and technological advances, like new techniques to send entangled particles over long distances via fibre optics and satellites. For instance, China's Micius satellite proved that quantum entanglement may spread over distances greater than 1,200 km. This showed that communication based on entanglement can happen all over the world. Quantum repeaters are devices that extend the range of entangled states without harming them. Their research is also helping to make a powerful quantum internet conceivable. Quantum entanglement has ramifications that go beyond just how quickly data can be conveyed. It is a big step forward in cybersecurity that it can construct communication channels that are safe by design. Quantum Key Distribution methods make sure that any attempt to listen in may be found. This means that the encryption is based on the laws of physics, not on how hard it is to crack. Also, quantum entanglement helps systems that are far apart sync up with each other with never-before-seen accuracy. This is very helpful for things like processing financial transactions and satellite navigation.
There are a lot of challenges that need to be solved before quantum communication using entanglement can work. Some of these are keeping coherence over long distances, dealing with quantum decoherence caused by interference from the environment, and designing infrastructure that can grow and work with classical networks that are already there. Theoretical and technical groups are still working on these issues by coming up with novel techniques to rectify quantum errors, produce sources of photonic entanglement, and build communication frameworks that use both classical and quantum technology. In the end, quantum entanglement might not let communication happen faster than light, but harnessing it to transfer data swiftly and safely is a huge change in how we think about and create communication networks. In the future, as the science and technology underpinning entanglement get better, it will transform the way people interact and keep their data safe.
PDF
Reference
[1] Einstein, A., Podolsky, B., & Rosen, N. (1935). Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? Physical Review, 47(10), 777–780.
[2] Bell, J. S. (1964). On the Einstein Podolsky Rosen Paradox. Physics Physique Физика, 1(3), 195–200.
[3] Aspect, A., Dalibard, J., & Roger, G. (1982). Experimental Test of Bell's Inequalities Using Time‐Varying Analyzers. Physical Review Letters, 49(25), 1804–1807.
[4] Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175–179.
[5] Bennett, C. H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., & Wootters, W. K. (1993). Teleporting an Unknown Quantum State via Dual Classical and Einstein-Podolsky-Rosen Channels. Physical Review Letters, 70(13), 1895–1899.
[6] Bouwmeester, D., Pan, J. W., Mattle, K., Eibl, M., Weinfurter, H., & Zeilinger, A. (1997). Experimental quantum teleportation. Nature, 390(6660), 575–579.
[7] Briegel, H. J., Dür, W., Cirac, J. I., & Zoller, P. (1998). Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication. Physical Review Letters, 81(26), 5932–5935.
[8] Yin, J., Cao, Y., Li, Y. H., Liao, S. K., Zhang, L., Ren, J. G., ... & Pan, J. W. (2017). Satellite-based entanglement distribution over 1200 kilometers. Science, 356(6343), 1140–1144.
[9] Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., Weier, H., Scheidl, T., Lindenthal, M., ... & Zeilinger, A. (2007). Entanglement-based quantum communication over 144 km. Nature Physics, 3(7), 481–486.
[10] Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., ... & Wallden, P. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236.
[11] Gisin, N., & Thew, R. (2007). Quantum communication. Nature Photonics, 1(3), 165–171.
[12] Kimble, H. J. (2008). The quantum internet. Nature, 453(7198), 1023–1030.
[13] Zukowski, M., Zeilinger, A., Horne, M. A., & Ekert, A. K. (1993). “Event-ready-detectors” Bell experiment via entanglement swapping. Physical Review Letters, 71(26), 4287–4290.
[14] Wootters, W. K. (1998). Entanglement of formation of an arbitrary state of two qubits. Physical Review Letters, 80(10), 2245–2248.
[15] Nielsen, M. A., & Chuang, I. L. (2010). Quantum Computation and Quantum Information. Cambridge University Press.
[16] Preskill, J. (2018). Quantum Computing in the NISQ era and beyond. Quantum, 2, 79.
[17] Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dusek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301–1350.
[18] Pan, J. W., Chen, Z. B., Lu, C. Y., Weinfurter, H., Zeilinger, A., & Żukowski, M. (2012). Multiphoton entanglement and interferometry. Reviews of Modern Physics, 84(2), 777–838.
[19] Giovannetti, V., Lloyd, S., & Maccone, L. (2004). Quantum-enhanced measurements: beating the standard quantum limit. Science, 306(5700), 1330–1336.
[20] Zeilinger, A. (1999). Experiment and the foundations of quantum physics. Reviews of Modern Physics, 71(2), S288–S297.
[21] Liao, S. K., Cai, W. Q., Handsteiner, J., Liu, B., Yin, J., Zhang, L., ... & Pan, J. W. (2018). Satellite-relayed intercontinental quantum network. Physical Review Letters, 120(3), 030501.
[22] Ren, J. G., Xu, P., Yong, H. L., Zhang, L., Liao, S. K., Yin, J., ... & Pan, J. W. (2017). Ground-to-satellite quantum teleportation. Nature, 549(7670), 70–73.
[23] Bregman, J. D. (2021). Quantum Communication and the Quantum Internet. IEEE Spectrum.
[24] Lloyd, S. (2006). The quantum mechanics of time travel through post-selected teleportation. Physical Review Letters, 96(1), 010801.
[25] Dür, W., Briegel, H. J., Cirac, J. I., & Zoller, P. (1999). Quantum repeaters based on entanglement purification. Physical Review A, 59(1), 169–181.
[26] Van Meter, R., Satoh, T., Ladd, T. D., Munro, W. J., & Nemoto, K. (2013). Path selection for quantum repeater networks. Networking Science, 3(1-4), 82–95.
[27] Zoller, P., Beth, T., Binosi, D., Blatt, R., Briegel, H. J., Bruss, D., ... & Weinfurter, H. (2005). Quantum information processing and communication. European Physical Journal D, 36(2), 203–228.
[28] Acín, A., Cirac, J. I., & Lewenstein, M. (2007). Entanglement percolation in quantum networks. Nature Physics, 3(4), 256–259.
[29] O’Brien, J. L., Furusawa, A., & Vučković, J. (2009). Photonic quantum technologies. Nature Photonics, 3(12), 687–695.
[30] Aaronson, S. (2013). Quantum Computing Since Democritus. Cambridge University Press.
[31] Shor, P. W. (1994). Algorithms for quantum computation: discrete logarithms and factoring. Proceedings 35th Annual Symposium on Foundations of Computer Science, 124–134.
[32] Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661–663.
[33] Peres, A. (2000). Delayed choice for entanglement swapping. Journal of Modern Optics, 47(2-3), 139–143.
[34] Vedral, V. (2006). Introduction to quantum information science. Oxford University Press.
[35] Yamamoto, T., Koashi, M., & Imoto, N. (2001). Polarization-entangled W state using parametric down-conversion. Physical Review A, 64(1), 012304.
[36] Kwiat, P. G., Mattle, K., Weinfurter, H., Zeilinger, A., Sergienko, A. V., & Shih, Y. (1995). New High-Intensity Source of Polarization-Entangled Photon Pairs. Physical Review Letters, 75(24), 4337–4341.
[37] Hensen, B., Bernien, H., Dréau, A. E., Reiserer, A., Kalb, N., Blok, M. S., ... & Hanson, R. (2015). Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature, 526(7575), 682–686.
[38] Pan, J. W., Daniell, M., Gasparoni, S., Weihs, G., & Zeilinger, A. (2001). Experimental entanglement purification of arbitrary unknown states. Nature, 410(6832), 1067–1070.
[39] Gao, W. B., Fallahi, P., Togan, E., Miguel-Sánchez, J., & Imamoğlu, A. (2012). Observation of entanglement between a quantum dot spin and a single photon. Nature, 491(7424), 426–430.
[40] Zyczkowski, K., & Bengtsson, I. (2006). An introduction to quantum entanglement: A geometric approach. arXiv preprint quant-ph/0606228.