Quantum internet under random breakdowns and intentional attacks

被引:8
|
作者
Zhang, Bingzhi [1 ,2 ]
Zhuang, Quntao [1 ,3 ]
机构
[1] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
[2] Univ Arizona, Dept Phys Univ, Tucson, AZ 85721 USA
[3] Univ Arizona, James C Wyant Coll Opt Sci, Tucson, AZ 85721 USA
来源
QUANTUM SCIENCE AND TECHNOLOGY | 2021年 / 6卷 / 04期
基金
美国国家科学基金会;
关键词
quantum network; entanglement distribution; quantum communication; complex networks; network capacity; SCALE-FREE;
D O I
10.1088/2058-9565/ac1041
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum networks (QNs) will play a key role in distributed quantum information processing. As the network size increases, network-level errors like random breakdown and intentional attack are inevitable; therefore, it is important to understand the robustness of large-scale QNs, similar to what has been done for the classical counterpart-the internet. For exponential networks such as Waxman networks, errors simply re-parameterize the network and lead to a linear decrease of the quantum capacity with the probability of error. The same linear decay happens for scale-free QNs under random breakdowns, despite the previously discovered robustness in terms of the connectivity. In presence of attack, however, the capacity of scale-free QNs shows a sharp exponential decay with the increasing attack fraction. Our results apply to quantum internet based on fibers for all kinds of quantum communications and provide implications for the future construction of QNs with regard to its robustness.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Robust Network Construction against Intentional Attacks
    Wang, Hui
    Cui, Wanyun
    Xiao, Yanghua
    Tong, Hanghang
    2015 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2015, : 279 - 286
  • [32] On Intentional Attacks and Protections in Complex Communication Networks
    Xiao, Shi
    Xiao, Gaoxi
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [33] Facility protection strategies against intentional attacks
    Bricha, Naji
    Nourelfath, Mustapha
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND SYSTEMS MANAGEMENT (IESM'2011): INNOVATIVE APPROACHES AND TECHNOLOGIES FOR NETWORKED MANUFACTURING ENTERPRISES MANAGEMENT, 2011, : 1183 - 1192
  • [34] Countermeasures for unintentional and intentional video watermaking attacks
    Deguillaume, F
    Csurka, G
    Pun, T
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 346 - 357
  • [35] Color Image Authentication for Detecting Intentional Attacks
    Al-Otum, Hazem A. Munawer
    2016 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS (ICDIPC), 2016, : 97 - 102
  • [36] Optimal defense strategy against intentional attacks
    Levitin, Gregory
    IEEE TRANSACTIONS ON RELIABILITY, 2007, 56 (01) : 148 - 157
  • [37] Minimizing makespan on a single machine subject to random breakdowns
    Kasap, N
    Aytug, H
    Paul, A
    OPERATIONS RESEARCH LETTERS, 2006, 34 (01) : 29 - 36
  • [38] On the probability of facing random breakdowns: a measure of networks' vulnerability
    Safaei, Farshad
    Sotoodeh, Hamidreza
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (07) : 1045 - 1073
  • [40] Design of hypergraph-based multiagent systems under random attacks
    Nugraha, Yurid E.
    JOURNAL OF CONTROL AND DECISION, 2025,