[Qirg] multi-partite entanglement

Rodney Van Meter <rdv@sfc.wide.ad.jp> Wed, 20 November 2019 08:13 UTC

Return-Path: <rdv@sfc.wide.ad.jp>
X-Original-To: qirg@ietfa.amsl.com
Delivered-To: qirg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4898120A45 for <qirg@ietfa.amsl.com>; Wed, 20 Nov 2019 00:13:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sfc.wide.ad.jp
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GisTGR47rcS3 for <qirg@ietfa.amsl.com>; Wed, 20 Nov 2019 00:13:33 -0800 (PST)
Received: from mail1.sfc.wide.ad.jp (mail1.sfc.wide.ad.jp [203.178.142.133]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0EE70120896 for <qirg@irtf.org>; Wed, 20 Nov 2019 00:13:32 -0800 (PST)
Received: from dhcp-9daa.meeting.ietf.org (dhcp-9daa.meeting.ietf.org [31.133.157.170]) (Authenticated sender: rdv) by mail1.sfc.wide.ad.jp (Postfix) with ESMTPSA id 129651BCA; Wed, 20 Nov 2019 17:13:30 +0900 (JST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sfc.wide.ad.jp; s=mail1; t=1574237611; bh=QlMklF+b/P6b41t9TNIUWlGnWgmcEkHVxagi393Pq04=; h=From:Subject:Date:Cc:To:From; b=yG8MIBEkn2o88RZkSfdES5DWSu+IkMkOiliSM3X/Uu7kZz3dSyXD4rgkZ7T2U58+9 FrjfZ7UEP85bHHW1EfD0JpFVT3+4H/7QZJ9+1hRYbCsa4tXZnyAswhJgTlGUalY9CD 0AcR5HAWkV7/eoQsti34zOet6mXyvR4lW+w7019TRP5al614mfDhLQHQRpRXdpGoNP jAPpIEbnXuVyQnc6NYzv/pmFEgpM/SHSnq93QP5BYoGfG1IQD5E13vlgcUCeZOjcR6 XqLU4yrSJz3tT512YIHW+EIYGvCjM1LIaa2INMue5q3nRKYfFUzo2ZMwu3+6MvjOjq dwCT0805fIEsg==
From: Rodney Van Meter <rdv@sfc.wide.ad.jp>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.8\))
Message-Id: <DA2DF71A-26D8-45EB-BD46-FF536DC77F9D@sfc.wide.ad.jp>
Date: Wed, 20 Nov 2019 17:13:28 +0900
Cc: Rodney Van Meter <rdv@sfc.wide.ad.jp>
To: qirg@irtf.org
X-Mailer: Apple Mail (2.3445.104.8)
Archived-At: <https://mailarchive.ietf.org/arch/msg/qirg/F_1Qwdje-4SFB8rmulJCpKEfYJc>
Subject: [Qirg] multi-partite entanglement
X-BeenThere: qirg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Quantum Internet \(proposed\) RG" <qirg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/qirg>, <mailto:qirg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/qirg/>
List-Post: <mailto:qirg@irtf.org>
List-Help: <mailto:qirg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/qirg>, <mailto:qirg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Nov 2019 08:13:35 -0000

I did some thinking about this last night and tonight.  I realized that the approach we’ve proposed for bipartite won’t work.  We propose that the information for planning be accumulated on the outbound leg from the initiator to the responder, then the RuleSets constructed at the responder, and the RuleSets distributed on the return leg.  One of the nice things about this is e.g. if you’re a user and you want to connect to quantumgooduckduckgogle.com, then one of quantumgooduckduckgogle.com’s potential value adds business-wise is the ability to do a better job of connection planning than you as an individual can, or better than duckgooduckquantum.com can, and they can upgrade that ability autonomously.

With one initiator and multiple responders, obviously that doesn’t work.

But the multi-partite process is *SO* complex; for example, you may be better off building a Steiner tree on a graph, whereas the initial request by the initiator might follow a set of (partially overlapping) two-terminal paths.  So how do you pick the path, collect the information about the links & nodes, perform the planning, and distribute?

I want bipartite and multipartite to be separate also because of the difficulty of getting enough people to understand and review even the two-party operation, and because multi-party state generation in an experimental network is still much farther away.  I want the mechanism we are defining here to be used by those building networks (e.g., Delft), and a more complex protocol is less likely to be adopted.

—Rod

Rodney Van Meter
Professor, Faculty of Environment and Information Studies
Keio University, Japan
rdv@sfc.wide.ad.jp