Communication Engineer
Communication Engineer
QUANTUM COMMUNICATIONS
Quantum Communications:
Explained for Communication Engineers
Sándor Imre, Budapest University of Technology
in Fig. 1, and the corresponding vector represen- and p H have the same magnitude a (Fig. 2), it receives a photon in its
tation in Fig. 2, where vertical polarization is can be expressed by means of a linear combina- input and outputs logical
denoted by vector PV and horizontal polarization tion of p V and p H : p 45° = ap V + ap H . If Alice 0 or 1 depending on the
by vector PH in the perpendicular plane, respec- sends several photons, all of them prepared in angle between the axis of
tively. Alice chooses to represent logical 1 with p45°, Bob’s receiver will answer logical 0 in one photon’s polarization and
vertically polarized photons and logical 0 with half of the cases and 1 in the other half, and it the two built-in orthogo-
horizontally polarized photons. By using a pho- will do this randomly; hence, in the classical nal measurement axes.
ton polarization device, Alice sends information sense, there is no information being sent by The measurement axes
to Bob. The receiver on Bob’s side can readily Alice to Bob. This randomness is a uniquely are labeled 0 and 1.
does not change the direction of rotation, Bob In order to place the above novelties in a
will detect the information from Alice without practical engineering context, we mention that in Near-future
any error. Furthermore, Alice and Bob did not general, both redundancy-free and noise-free
experiments target
apply any redundancy; that is, the error correc- communication cannot be achieved. Therefore,
tion was implemented without extra coins (bits). classical error correction techniques have been Earth-satellite free
The aforementioned quantum mechanical extended to quantum channels. Various block space quantum
properties, which do not have analogs in classical coding methods were developed [7] so that
communications theory, are called out by Fig. 3. redundancy improves the transmission, while communications.
There is no classical error correction code that pilot-symbol-based solutions — where reference For all the media
can overcome a p = 0.5 bit-flip channel. Redun- bits are sent prior to payload data to measure
supporting quantum
dancy does not help. Using quantum codes, we the channel behavior — have recently appeared
can adjust the input states in such a way that in the literature [8]. These techniques are beyond communications,
they will be invariant to the channel effect. the scope of this article. however, the current
Now, we return to the original track at the As a conclusion to this section it is worth
third step where Alice and Bob use polarized highlighting the essence of entering the quantum lengths of the
photons to communicate. There, we concluded domain. The advantage comes from the connections are
that sending p45° photons will result in random increased degrees of freedom. In general, if we
limited by the lack of
results at Bob. replace the conventional classical physical media
Let us assume that Alice is connected to Bob representing logical values 0 and 1 with nano- effective quantum
via a quantum bit-flip channel that randomly scale objects (photons, electrons, etc.) that are repeaters.
either leaves each photon’s polarization governed by quantum phenomena, we are
unchanged or exchanges the coefficients of each allowed to use linear combinations of the logical
photon’s polarization components representing values. For example, for a polarized photon p =
the logical values (0 1); that is, if originally p apv + bpH, coefficients a and b can be adjusted
= ap v + bp H , applying an exchange operator to optimize any communication protocol; thus,
exch(◊) (called the Pauli-X operator in the litera- they represent new degrees of freedom that have
ture) gives exch(p) bpv + apH. no analogs in the classical domain.
According to our coin example, Alice encodes Before continuing, it is important to note that
classical 0 and 1 values into p45° and p–45° pho- quantum information can be delivered over vari-
tons, respectively. The tossed coin rotating in the ous media. One channel is optical fibers fed by
air emulates a quantum bit (below we will point polarized photons instead of light pulses. A
out what is the difference between a rotating practical obstacle, though, to using the current
coin and a p45° photon). It contains both heads fiber optic infrastructure is that commercial
and tails at the same time when rotating, similar fibers are engineered to operate at different
to a p45° photon containing pv and pH polariza- wavelengths than those that are optimal for
tions in an equally weighted linear combination quantum information transmission. Early trials
p45° = apv+ bpH. exceed 200 km distance. Free space quantum
Next we investigate the effect of the quantum channels are also available, bridging transmitters
bit-flip channel on the sent photons by means of and receivers located more than 100 km apart.
Fig. 2. The channel either lets the p in = p 45° Near-future experiments target Earth-satellite
photon through without any modifications, pin = free space quantum communications. For all the
p out = p 45°, or exchanges the coefficients of p v media supporting quantum communications,
and p H : ap v + ap H ap H + ap v ap H + ap v . however, the current lengths of the connections
Because the weights are equal, the photon polar- are limited by the lack of effective quantum
ization remains unchanged: pout = apH + apv = repeaters.
p45°. In the case of pin = p45° = –apv + apH pho-
tons, again the channel either performs an iden-
tity transform pout = pin = p–45° or modifies the ENTANGLEMENT:
photon to p out = –ap H + ap v = –(–ap v + ap H)
= –p–45° .
A STRANGE RESOURCE
Now, Bob applies a polarization detector In the previous section we have already crossed
adjusted to p ±45°. This device is able to distin- the border between the classical and quantum
guish photons according to their polarization domains, and learned that some quantum phe-
angles, and it ignores the sign of the polarization nomena can be exploited to improve communi- 3 If this article focused on
vector. Therefore, the detector will show 0 to cations. In this section, we describe and exploit quantum computing (vs.
Bob if a p45° photon has been received and 1 for another quantum phenomenon called entangle- quantum communica-
each ±p–45° photon. Since the channel does not ment. Again, we use a practical example to intro- tion), we would call the
modify the polarization angle of the sent pho- duce entanglement instead of citing the pure readers’ attention to the
tons, Bob decodes the information without any theory. fact that two coins
error: this classical-to-quantum encoding method Let us again use the coin-tossing analogy, but (“qubits”) can encode 22
makes the communication noise-free. now Alice uses two coins. She tosses both coins = 4 integers; therefore, n
Two aspects have to be emphasized when into the air, one after the other, and asks Bob to = 500 qubits comprises
evaluating this quantum protocol. First, we catch them (i.e., forcing them into heads or tails more classical numbers
improved the classically zero capacity of the bit- positions). Bob will receive one of the bit-pairs than the number of all the
flip channel to maximal capacity. Second, as 00, 01, 10, and 11,3 since each coin can be either atoms in the known uni-
mentioned above, we used no redundancy for 0 (heads) or 1 (tails) in Bob’s palm. verse. The readers may
error correction. Neither aspect would be possi- Next Alice glues one end of a matchstick to imagine the parallel infor-
ble in the case of classical communications. To the first coin and the other end to the second mation storage capacity
achieve these improvements, we had to enter the coin so that both coins show heads upward. This offered by quantum com-
quantum domain. results in synchronized rotation of the two coins puting.
after tossing. Because of the matchstick, which entangle only elementary particles (photons,
Many cyber attacks implements a strict connection between the two electrons, etc.) and some larger structures, but
coins, if Alice catches one of the coins, the other always below the nano-scale. At present, we do
are undetected, or coin will also stop rotating. Therefore, Alice will not know how to entangle macroscopic objects
not detected until receive either 00 or 11. such as coins or space ships. Furthermore, the
well after serious To make the game more relevant to telecom- result of a coin tossing appears to be random,
munications, Alice uses a one-mile-long match- but we know that by using the appropriate for-
technical and stick 4 to connect the coins. Alice tosses them mulas of classical physics with carefully chosen
financial damage has and asks Bob to walk to the second rotating coin parameters, we are able to deterministically cal-
while the first is spinning in front of Alice. The culate the result. In contrast, according to our
occurred. Quantum first coin is collocated with Alice, while the sec- current knowledge about quantum mechanics,
optics-based ond is collocated with Bob. Now, Alice catches the measurement of a p 45° photon with a p v–H
solutions may her coin, and observes it in 0 (heads upward) detector will be fully random (i.e., no one can
position. What will Bob experience? Suddenly, predict the measurement outcome). This is why
provide new his coin stops rotating and remains in the 0 we mentioned above that coin tossing is only an
effective defense state. Similarly, if Alice observes 1, Bob will also emulation of what happens in the quantum
observe 1. For multiple coin tosses, 00 and 11 domain, but a very plausible emulator.
methods. will appear randomly. Entanglement plays an important role in
We can reproduce this experiment with two quantum mechanics, and therefore in quantum
photons by identifying heads (0) and tails (1) computing and communications. The noise in
with vertically and horizontally polarized pho- quantum communication channels can be traced
tons. A tossed coin rotating in the air represents back to the entanglement between the channel
both heads and tails at the same time, similar to and its environment. If a photon traversing an
a photon polarized at a 45° angle. Its polariza- optical fiber is entangled with another photon
tion is the linear combination of p v and p H as outside the fiber, and this latter photon has been
depicted in Fig. 2. When Bob measures this p45° subjected to some effects, these effects will influ-
photon with a pv–H measurement device, he will ence the state of the first photon in the fiber.
randomly get pv or pH (0 or 1). If Alice prepares Therefore, either we keep the photons from
two photons at a 45° angle one after the other becoming entangled, or we suffer the conse-
and sends them to Bob, Bob will detect 00 or 01 quences (channel noise). Fortunately, to entan-
or 10 or 11. gle two photons, they must be located very close
Next, Alice produces the analogy of the two to each other at some point in time; that is,
matchstick connected coins. She generates two entanglement cannot be created between distant
photons by means of a nonlinear beta-barium particles. Also, whereas naturally occurring
borate crystal so that their polarizations will be entanglements cause undesirable noise in quan-
connected [2], although this connection remains tum communications channels, man-made delib-
invisible. Alice keeps the first photon and sends erate entanglements may be exploited to improve
the second to Bob. Next, Alice measures her communications and computing capabilities.
photon with a detector. It behaves like a photon We end this section with a simple communi-
(i.e., Alice observes either 0 or 1 randomly). cation example where entanglement may be
Now, if Bob observes his photon anytime after exploited in future networks. Above, we consid-
Alice has observed her photon, Bob will observe ered a physical layer problem: how to mitigate
the same value as Alice did, because Alice’s or possibly eliminate noise in a communication
measurement also set Bob’s photon to the same channel. Now we step up to the medium access
value. Therefore, the result of the two measure- control (MAC) layer and describe how entangle-
ments will be either 00 or 11. ment may be used to improve the capacity uti-
This invisible binding effect is called entangle- lization of shared media. For exemplary
ment, referring to the fact that the two photons purposes, we use the ALOHA protocol, which is
have a special connection: acting on one of them a simplified version of the distributed MAC pro-
will influence the state of the other. Those read- tocol applied in WiFi networks.
ers who find this spooky action at a distance — as In an ALOHA-mediated system, the time
Einstein [3] called it — too surprising are asked dimension is divided into intervals (time slots)
to recall that by means of invisible electromag- with fixed duration (Fig. 4). At the beginning of
netic waves, remote devices can interact with each slot, Alice and Bob decide whether or not
each other. Unlike electromagnetism, however, to send a packet. If only one of them sends a
interactions between entangled photons occur packet into the channel, the packet will be deliv-
instantaneously, regardless of how far apart the ered. If neither of them sends a packet into the
photons are, whereas electromagnetic interac- channel, the slot will remain empty, and a trans-
tions are bounded by the speed of light. A discus- mission opportunity is lost. Finally, if both par-
sion of this amazing phenomenon is beyond the ties attempt to send their packets, a collision will
scope of this article; we mention it here not to occur, and again the transmission opportunity
confuse the reader, but to further distinguish the will be lost. In centralized MAC solutions, there
quantum domain from the classical domain and is a node (access point or base station) which
to make the reader aware of yet another quan- coordinates Alice and Bob so that collisions do
tum phenomenon that may be exploited some- not occur. However, there are many protocols
how in the future to improve communications. that use distributed MAC (e.g., ad hoc network-
Before introducing a communications appli- ing protocols and sensor network protocols).
4This is only emulation; cation example that exploits entanglement, we According to information theory, the best dis-
nature will be more sur- pause briefly to explain one difference between tributed solutions (as measured by fairness and
prising, as we will discuss. a photon and a coin. Currently we are able to overall throughput) have these properties: