Corresponding author: Emily Van Milligen (email: evanmilligen@arizona.edu).
Entanglement Routing over Networks with Time Multiplexed Repeaters
Abstract
Quantum networks will be able to service consumers with long-distance entanglement by use of quantum repeaters that generate Bell pairs (or links) with their neighbors, iid with probability and perform Bell state measurements (BSMs) on the links that succeed iid with probability . While global link state knowledge is required to maximize the rate of entanglement generation between any two consumers, it increases the protocol latency due to the classical communication requirements and necessitates long quantum memory coherence times. We propose two entanglement routing protocols that require only local link state knowledge to relax the quantum memory coherence time requirements and reduce the protocol latency. These protocols utilize multi-path routing protocol and time multiplexed repeaters. The time multiplexed repeaters first generate links for time steps before performing BSMs on any pairs of links. Our two protocols differ in the decision rule used for performing BSMs at the repeater; The first is a static path based routing protocol and the second is a dynamic distance based routing protocol. The performance of these protocols depends on the quantum network topology and the consumers’ locations. We observe that the average entanglement rate and the latency increase with the time multiplexing block length, , irrespective of the protocol. When a step function memory decoherence model is introduced such that qubits are held in the quantum memory for an exponentially distributed time with mean , an optimal () value appears, such that for increasing beyond hurts the entanglement rate. decreases with and increases with . appears due to the tradeoff between benefits from time multiplexing and the increased likelihood of previously established Bell pairs decohering due to finite memory coherence times.
=-15pt
I Introduction
Quantum networks will have the ability to generate, distribute, and process quantum information along with classical data. These networks will connect quantum computers, sensors, simulators, and other quantum equipped devices, and enable consumers to share entangled connections on demand over potentially large distances. There are various applications for entangled qubits shared over quantum networks, such as provably-secure communication [1, 2], entanglement-enhanced sensing [3, 4, 5, 6, 7], and distributed quantum computing [8]. To enable these, it is important to be able to reliably and quickly transmit quantum bits from one point in a network to another in order to establish entanglement between distant users.
A quantum network is comprised of two main components: nodes, which are equipped with entanglement sources, quantum memories, quantum processors, and the ability to classically communicate, and edges, which connect neighboring nodes via channels that transmit entangled (typically photonic) qubits, such as optical fibers. The nodes can be consumers wanting to utilize entanglement for some application or quantum repeaters, which are fundamental for the successful distribution of entanglement across large distances. The rate that entangled photons can be delivered across an optical fiber decays exponentially with the distance between communicating parties [9]. However, when utilizing these intermediate nodes, the magnitude of the exponent can be decreased by breaking up the total distance between consumers, which helps to mitigate the loss incurred from the transmitting medium [10, 11, 12, 13].
Quantum links are maximally-entangled two-qubit states called Bell states shared along edges when two neighboring nodes each successfully store one half of a Bell pair in their quantum memories. The generation of these links has a probability of succeeding. This value is determined by the actual physical hardware and encompasses optical loss of the link, as well as detector and memory inefficiencies. Repeaters in this paper are quantum switches [14, 12], which can simultaneously attempt to form entangled links with neighboring nodes and dynamically choose on which links to perform entanglement swaps by using local network information. A swap is most commonly implemented by performing a Bell state measurement (BSM) on qubits held within a repeater with a probability of success denoted by . If successful, this results in the corresponding qubits held at the repeater’s neighbors to become entangled. However, if the measurement fails, both of the Bell states the repeater shared with its neighbors are lost.

Increasing the rate of entanglement distribution for networks under different constraints is crucial to the usefulness of quantum networks. The probabilistic nature of link generation means that different links will be present or absent when the network is observed at different instances in time. We refer to each such network state observation as a ”snapshot”. Global link state knowledge is needed by a protocol to ensure that two consumers, Alice and Bob, share the maximum number of Bell pairs possible given the initial snapshot. However, global link state knowledge is often not possible as quantum networks can spread out across large distances giving rise to large latencies due to classical communication. Quantum memories cannot support this condition as they have very short storage lifetimes. Routing protocols have been proposed to lower latency and therefore the requirements on quantum memories by creating virtual graphs of entangled links before or at the time consumers request entangled pairs [15, 16]. To further reduce this latency, [17] created a protocol that combined local link state knowledge and multi-path routing to distribute Bell pairs to consumers. It was seen to provide rates larger than those achievable by a single linear repeater chain and only required that each repeater knew the physical topology of the network and the outcomes of their own entanglement generation attempts. Further exploration of distance-based routing schemes can be found in [18, 19, 20]. Distillation protocols and routing were analyzed in [21] to maximize the distillable entanglement between consumers.
When quantum repeaters are equipped with the ability to perform GHZ-projective measurements, which result in multipartite entangled states, the rate of entanglement distribution becomes distance independent under a certain range of and values, in contrast with the typical exponential decay observed with distance [22]. Further improved multipartite entanglement distribution schemes can be found in [23, 24].
Time multiplexed link generation is currently being explored to increase the rate of distribution of entangled qubits. It has recently been shown that time-multiplexed repeater nodes, equipped with the ability to perform BSMs across different time steps, allow for a sub-exponential decay with distance [25]. This result is otherwise unattainable with just spatial or spectral multiplexing. Time multiplexing has also been combined with GHZ-projective measurements, and it has been shown that distance independent rates can be achieved over larger region in the - space than that without multiplexing [26].
In this paper, we combine the benefits of multipath routing and local link state knowledge with time-multiplexed repeaters to further improve the rate of entanglement distribution. These time multiplexed repeater nodes are able to hold onto multiple links before routing decisions are made. This increases the likelihood that two repeaters are connected and the number of end-to-end links consumers can generate. We develop two pragmatic routing protocols assuming the repeaters know the network topology and have local-link state knowledge. The static protocol uses fixed path routing. It predetermines the pair of neighbors (if any) a repeater connects by performing BSMs. The dynamic protocol, on the other hand, uses distance-based metrics to decide which pairs of neighbors are connected via BSMs at a repeater.
Both protocols are presented in Section II. In Section III, we will evaluate these protocols on networks where memories have infinite coherence time; in this case, time multiplexing only serves to improve the average rate of the distribution of Bell pairs. We discuss the impact that quantum network structure, as well as location of consumers, have on the performance on both of our protocols. In Section IV we reduce the coherence time of our quantum memories, and show that there exists an optimal amount of time multiplexing dependent on the conditions of the network. Last, we offer concluding thoughts in Section V and comment on future directions.
II Protocol Design: Multi-path Routing with Time Multiplexed Repeaters
We propose an algorithm that combines local link state knowledge and multi-path routing with time multiplexed repeaters. The proposed protocol can be divided into two phases.
The External Phase
is the first phase, which lasts for timesteps, where is the time multiplexing block length. These timesteps are of length seconds. In each timestep, an attempt is made to generate a pair of entangled qubits between neighboring repeaters along all edges. (In the case where the network has a grid topology, each node attempts this times with each of its four neighbors.) The probability that the initial link generation succeeds is denoted by . We will refer to the network state after this phase as a snapshot.
The heralding of the initial success/failure of these Bell pairs is received by neighbors seconds after the entanglement is attempted, where is the distance between neighbors and is the speed of light. This initial latency between the creation of the Bell pair and when the pair can actually be utilized exists even when there is no time multiplexing. For this paper, we will assume that each repeater node has quantum memory buffer greater than per edge to accommodate this latency as well as that which arises from the time multiplexing. Although this work does not specify a specific type of architecture for the network, the quality of entanglement may degrade during this time. This paper employs the step-function decoherence model used in [26, 27, 28] where qubits are held perfectly in memory until some random time, drawn from an exponential distribution with mean lifetime , after which the entanglement is discarded. It is assumed that repeaters know when entanglement is discarded, so that the remaining entanglement in the network is not lost. This model is a conservative approximation for memory architectures that have exponentially decaying qubit fidelities with measurable time constants, such as trapped ions and color centers[29]. Initially, we will set . This condition will later be relaxed, so that not all the original Bell pairs are recoverable after waiting the additional seconds.
The Internal Phase
is the second phase in which entanglement swaps are attempted within each repeater node with success probability . It is assumed that this process is instantaneous when compared to the first phase. Repeaters can choose different pairs of successful links to connect depending on the protocol being used. This paper investigates two different categories of protocols: static and dynamic.
Static refers to a fixed path routing protocol that is predetermined based on the physical structure of the underlying network. Let be the number of edge disjoint paths connecting consumers. In the case of regular lattices, this is equivalent to the node degree. A greedy algorithm is used to find the first edge disjoint shortest paths between consumers, Alice and Bob. This information is communicated to the repeaters along these paths, and only connections along these paths will be made. In order to most efficiently use any successfully generated entangled links along edges, a predetermined ordering can be used to maximize the number of Bell pairs at the end. An example of this would be an ordering based on the time slot the links were successfully created, and performing BSMs on the most recent ones on each edge.
Dynamic has also be referred to as distance based routing, where all repeater nodes simultaneously choose which internal swaps to make using their knowledge of the successful outcomes of the first phase, along with knowledge of their neighbors’ relative distances from the consumers, Alice and Bob. A further explanation of this process is described below, and pseudo-code formulation is included in Appendix A.
Distance Based Routing:
Let be the current node and let be the number of successful external links at that have not been swapped yet. As long as there are successful links remaining, swaps continue to occur. Out of the neighbors that are successfully connected to node , let be the neighbor closest to Alice and define their relative distance to be . Let be the neighbor closest to Bob with a relative distance be . There are many different ways of setting this distance metric, such as Euclidean distance, hop distance etc., which will be specified for the given example.
If and are different neighbors, an entanglement swap is attempted. If and refer to the same neighbor, then the second closest neighbor to Alice, , and the second closest neighbor to Bob, , are found. The quantities and are compared, and the pair that minimizes this choice is chosen to perform a swap. If these quantities are the same, the quantities and are compared, and the pair that maximizes this value is chosen to perform a swap. The reasoning behind this condition is explained in Appendix B. If neither nor exist, a self connection will be made when possible such that two links between the node and the same neighbor from different timesteps will attempt swapping. (This prevents the protocol from creating holes in the path between consumers and is done as a last resort.) In all of these cases, the procedure is repeated until .
Performance Metric:
this paper aims to compare the average entanglement distribution rate achieved by different routing protocols over various network conditions. After each entanglement generation attempt occurs, the network will have different links present/absent. This instance of the network can be thought of as a particular network snapshot. The average number of Bell pairs shared between consumers given by a certain protocol for a particular network snapshot is defined as:
(1) |
where is the set of link-disjoint paths connecting Alice and Bob allowed by the particular snapshot and by the protocol being evaluated, is a single path in , is a node along the path (not including Alice and Bob), and is the probability that a BSM will succeed at node . The average rate of a protocol as a function of given a certain network is defined as:
(2) |
where gives the set of all possible snapshots for a given network, and gives the probability of the particular snapshot after timesteps. In this paper, the average rate will be approximated by sampling from Monte Carlo simulations. We will now introduce a notation to compare the average rates under different circumstances. The average rate will be written as Bell pairs per time slot, where and have all been previously defined.
III Memories with infinite storage lifetime
In this section, we apply the dynamic routing protocol described previously to two different network topologies with . Initially, we apply it to a large square grid, for which the Euclidean distance metric was found to be the most favorable metric. The simulated entanglement rates are used to better understand the general behavior of this protocol. Then we apply this protocol to a smaller six-node network. In these cases, hop distance is the metric used to determine local swaps. The entanglement rates given by this simulation are then compared against those attained using global state knowledge.
III-A 2D Square Lattice




.
III-A1 Initial Performance Evaluation
Two consumers placed on a square grid can have at most four edge disjoint paths connecting them. When time multiplexing is introduced so that any edge can have up to links, the maximum number of connections between consumers is . If is sufficiently large, the average number of links along a given edge will be . Letting , we expect connections between consumers. Dividing this by yields an average rate of Bell pairs per time slot. For general , in the limit as gets large, the highest that the average rate can get is given by
(3) |
where is the hop distance of the th shortest path on the underlying graph, which is found via the greedy algorithm.
As depicted in Fig. 2, the dynamic protocol is able to approach this bound on the square grid. We note that low values of are more detrimental to the rate than low values of . This is because time multiplexing can compensate for low values. The probability that an edge has at least one successful link after timesteps is
(4) |
which monotonically increases with . If we were to use only one success along any edge, the rate would then be equivalent to , which scales as . However, the dynamic protocol utilizes as much entanglement as possible, ultimately overcoming this scaling as shown in Fig. 3. When is small, there are cases where the opposite is true. In Fig. 3, when , using multiple successes results in a lower average rate because there is an increased likelihood of paths to self loop. The value of determines how quickly the average rate approaches , as shown in Fig. 4.
When , time multiplexing doesn’t show an improvement to rate since there is no improvement to , as shown in Fig. 5. It is important to note that while the average rate only benefits from larger , the corresponding latency suffers. Therefore realistically, one should choose some finite based on the desired latency.
III-A2 Varying consumer orientations
We now compare the dynamic protocol against the static protocol and determine the ideal protocol based on the network parameter regime. Generally, for the 2D square grid graph the distance based routing protocol does best when a Euclidean distance metric is used to make swapping decisions, as opposed to a Hop distance metric. However, even with this metric, the dynamic protocol is only able to outperform the static protocol in certain situations.
When and the consumers are oriented along the diagonal, the dynamic protocol outperforms the static protocol for . For this specific orientation, the dynamic protocol naturally maps over the same paths as those chosen by the static paths algorithm, unless those links do not exist. However, unlike the static protocol, the dynamic protocol is able to adapt when there are failed links. When , the static and dynamic protocols perform equally well. This behavior is consistent regardless of the distance between consumers.
As increases however, a region emerges in space, shown in Fig. 6, where the static protocol outperforms the dynamic protocol. This behavior stems from the additional ordering that the static path protocol introduces, so that it is able to more efficiently use successful entangled links than the dynamic protocol. The static path protocol does better when is large, but the exact size and shape of this region depends on and the distance between consumers. As the distance between consumers grows, the static protocol performs better for lower values.
When and the consumers are not oriented along the diagonal, there already exists a region in space where is large where the static protocol outperforms the dynamic protocol. This is because when consumers aren’t along the diagonal, the dynamic protocol doesn’t always choose the most efficient paths. Thus there exists a value that is large enough that the ability to reroute paths is less useful than the directness of the paths provided by the static path protocol. When the length of a path no longer matters, as all BSMs are deterministic. However, there still exists a range of values of where the static protocol does better, showing that the dynamic protocol not only chooses longer paths, but also makes decisions that do not result in continuous paths between consumers. As increases, the quantity defined in Eqn. (4) increases, explaining why the borders shift to lower values.
With the condition explained in Appendix B, the dynamic protocol does better for a larger range of values assuming the consumers are along the same column when compared to other off diagonal orientations. When and the Manhattan distance is fixed, the border separating the regions where the dynamic protocol does better from where the static protocol does better occurs at lower values for the column orientation and higher values for diagonal orientation. The border for other angles falls between these two cases.
When and the angle is fixed, the border shifts to lower values as the Manhattan distance is increased. The larger distance between consumers requires more successful BSMs. The ability to reroute is not as important, so static paths do better since they are chosen to minimize the number of these BSMs. As goes to one however, the difference in path lengths does not matter as much, explaining why the borders appear to tilt diagonally upwards.
The network topology and the relative locations of the consumers determine the effectiveness of the dynamic protocol.This section shows that the effectiveness of the dynamic distance based routing algorithm is impacted by the network topology as well as the consumer locations. The dynamic protocol is the better option when networks have low connectivity, as it can adaptively choose different repeaters to route over. However, static or fixed path routing is usually preferable when connectivity is high.

III-B Small Network Examples


In this section, we evaluate the performance of the protocols on the six node network depicted in Fig. 7. This network is representative of near-term quantum networks, which will have a small number of nodes that span across a building, a campus, or an urban center. The size of the network was also chosen so that the average rate of the dynamic local link state knowledge protocol could be compared against two global link state knowledge routing protocols introduced in [17] and [vardoyan2023bipartite].
For the dynamic local link state knowledge protocol, shown in Fig. 8 by the solid lines, the distance metric utilized to inform decisions was based on hop distance. Two different calculations were done to obtain the global link state knowledge rates. Firstly, the mixed-integer quadratically constrained program (MIQCP) code from [vardoyan2023bipartite] was used to calculate the maximum rate for every potential snapshot, or unique instance, of the network. The average rate of the network, provided global link state knowledge and optimal decision making, was then calculated by summing over the snapshot rates weighed by their likelihood of occurring. This was then compared against a suboptimal scheme presented in [17]. The main difference was the latter protocol used global link state knowledge and repeatably applied Dijkstra’s algorithm to find the rate of each snapshot. The rates found by this greedy algorithm, which may not be optimal, were similarly weighed by their likelihood, providing the average rate with global link state knowledge and sub-optimal decision-making. The benefit of such a protocol is that the calculation can be performed far more quickly. These results were in agreement up to seven significant digits, and are represented by the dashed lines in Fig. 8.
Three versions of the six node graph shown in Fig. 7 were evaluated. The first included all the channels present in the figure. The second included all, but the channel between repeater 2 and repeater 3. The third included all the channels, but the channel between Alice and repeater 3. The average rates given by the global algorithms did best when more channels were present, since there were simply more potential paths that could be chosen to route over. However, the local protocol did best when the channel between repeaters 2 and 3 was removed. Similar to Braess’ paradox in classical routing, where adding more roads to a road network can slow down the overall traffic, our local algorithm can perform worse on networks when there are more channels if these channels create a contention for paths. Consider a snapshot where all links succeed except for the one between Alice and repeater 3. Since the repeater nodes are making decisions on their own, the local protocol can result in the path given by Alice, 2, 3, Bob, which intersects the two otherwise disjoint paths. The dynamic protocol performs best on topologies where there are multiple subsections of the graph connected in parallel at the consumer nodes. Otherwise, fixed path routing or some form of network-divisions similar to those introduced in [22] should be used to work around this.
IV Memories with limited storage lifetime
The previously discussed results imply that as long as consumers are willing to wait for some increased latency cost, time multiplexing always helps improve the rate of entanglement distribution. However, as time multiplexing blocks increase in length, qubits stored in the quantum memories experience more decoherence. We now relax the assumption that qubits are held in the quantum memories indefinitely and instead will evaluate for a finite valued . This model will be applied to a 2D grid network to show that for given network conditions, there arises a finite for which the rate of entanglement is maximized.






For such a network, there exists a trade-off between the benefits of increased time multiplexing block length and the risk of losing already established entangled links, as shown in Fig. 9. This relationship results in an optimal time multiplexing value, , dependent on the network conditions. Fig. 10 shows that as decreases, increases. When goes to one, so that external links are deterministic, time multiplexing is no longer useful, and . Fig. 11 shows that even with decoherence, there is an improvement in rate with time multiplexing, as seen by the envelope. The amount of improvement is limited by the magnitude of . As goes to infinity, the achievable rates with time multiplexing will increase, eventually resembling Fig. 4. Fig. 12 also agrees with previous results, as it shows that as increases, so does . In the case where quantum memories have infinite lifetime, and thus no decoherence, the rate continues to increase with . Fig. 14 shows the improved rate over space, using the values of shown in Fig. 13. There is noise in the data stemming from the finite number of trials the Monte Carlo simulation was run over and the limited data points collected, so it is not immediately clear if the value of impacts the optimal , despite it clearly affecting the average rate. However, it is once again clear that time multiplexing helps, especially in the case of lower .
V Conclusion
This study discusses a local link state knowledge multi-path routing protocol that utilizes time multiplexed repeaters. In the case of no decoherence, the average entanglement rate increases monotonically with the time multiplexing block length . This is because the probability of have a link between repeaters increases with . Theoretically, to maximize the rate of entanglement distribution, it is best to let . This is not practical, however, as latency and the required number of quantum memories also become infinite. Therefore, the value of must be chosen while keeping both the initial latency and memory buffer length in mind. Future work should consider the effects of having a fixed number of quantum memories in the repeaters on optimal scheduling.
The distance metric chosen and the topology of the network itself, impacts how effectively the dynamic protocol performs with respect to a static fixed path routing algorithm. For the case of a 2D grid, the dynamic protocol performs best when consumers reside on the diagonal. In general, the performance of the dynamic protocol when compared to the static protocol depends on the values of and the locations of the consumers. The dynamic protocol was also applied to a smaller six node network, so that it could be compared to the global optimum rate. The local link state knowledge protocol can perform comparably well when consumers are connected via disjoint subsets of repeaters. However, when there is a high contention for the same paths, our local protocol cannot approach the average rates seen with global link state knowledge. Future works could evaluate a wider variety of topologies to further explore how the structure of the quantum network impacts the performance of the protocol.
A step function decoherence model was also used in the simulation to see how the mean lifetime of qubits held in the quantum memories impacted the effects of time multiplexing. In this case, an optimal value emerges which balances the benefits from time multiplexing with the increased risk of losing a Bell pair. It was seen that as decreases or increases, the value of increases. To fully understand the effect of on , further study is needed; however, we conjecture that there may be a connection stemming from the fact increasing allows for more direct paths to be routed over. Overall, the results with decoherence agree with the results without decoherence when .
The decoherence model used in this paper can be improved upon by introducing non-unit fidelity links. These links could then undergo depolarization noise channels to model both the effects of being held in the quantum memory over time, as well as the noise introduced by the imperfect gates used to perform BSMs. With this, time multiplexing could then be combined with distillation techniques, which would result in purer states, but at the cost of reducing to the number of Bell pairs delivered to the consumers over some fixed time. A protocol dictating how and when to distill links would then need to be considered.
Appendix A Distance Based Routing Pseudocode
In this appendix we provide the pseudocode for the External and Internal Phases of the Distance Based Routing Protocol.
Appendix B “Straight Path” protocol
Recall the Distance Based Routing Protocol definition given in Section II.
At every node the successfully connected neighbor closest to Alice/Bob was denoted , and their relative distances were defined . When and referred to the same neighbor node, initially new neighbors , the second closest neighbor to Alice, and , the second closest neighbor to Bob, were found. The quantity and would then be compared, and the pair that minimizes this choice will be chosen to perform a swap.
If these quantities were equal, the “straight path” protocol was evaluated. The quantities and would be compared, and the pair that maximizes this value would be chosen to perform a swap.
Prior to this addition, the average rate of the distance based routing protocol was considerably lower when consumers were off diagonal for the 2D grid graph. An example of a snapshot generated prior to the introduction of the straight path protocol is shown in Fig. 15, which is clearly not routing along the most direct paths, despite attaining the maximum rate of 4. However, repeater nodes 2, 13, 15, 19, 21, and 32 all could make different decisions, such that the rate of a given snapshot, even when , is as low as 1. After the inclusion of this “straight path” protocol, all snapshots gave a rate of three or four when . Consumers on the diagonal of the 2D graph, as well as consumers in the small networks discussed here, did just as well with this condition as without it.

Appendix C Rate equation for deterministic link generation with memory decoherence
In this section it is shown how to analytically calculate the average flow of entanglement between consumers for the case and along a path of fixed length . This can then be used to compare against our simulated values.
In the presence of imperfect memories, let the random variable describing the lifetime of an individual link be labelled . This value is sampled from
(5) |
where . The actual quantity of interest is the probability that the lifetime of a link is greater than some value , which is given by:
(6) |
A link generated in the th time slot, where , must survive until the th time slot in order to be used to connect two consumers. Therefore the likelihood of it having a lifetime at least timesteps long is given by:
which is denoted for brevity.
Note for the most recently generated link, i.e. when and , . Since every edge will have such a link in the case , there will always be at least one path along the chain of repeaters over which BSMs will be performed to connect consumers. This case will then contribute the term to the final rate calculation. From here forward then the focus will be on links where .
The probability that any edge has correctable links generated in time slots at the end of the timesteps is:
The probability of having paths then comes from where are iid from . The probability of having paths is then given by:
The average rate attainable by a linear chain of time multiplexed repeaters of length block length when is then given by:
(8) |
with defined above.
Acknowledgment
EV, EJ, AP, DT and SG acknowledge support from the NSF grant CNS-1955834, and NSF-ERC Center for Quantum Networks grant EEC-1941583. GV acknowledges support from NWO QSC grant BGR2 17.269. EV thanks Prithwish Basu for useful discussions. This material is based upon High Performance Computing (HPC) resources supported by the University of Arizona TRIF, UITS, and Research, Innovation, and Impact (RII) and maintained by the UArizona Research Technologies department.
References
- [1] A. K. Ekert, Quantum Cryptography and Bell’s Theorem. Boston, MA: Springer US, 1992, pp. 413–418.
- [2] C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Physical Review Letters, vol. 68, no. 5, pp. 557–559, Feb. 1992. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevLett.68.557
- [3] Y. Xia, W. Li, W. Clark, D. Hart, Q. Zhuang, and Z. Zhang, “Demonstration of a Reconfigurable Entangled Radio-Frequency Photonic Sensor Network,” Physical Review Letters, vol. 124, no. 15, p. 150502, Apr. 2020. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevLett.124.150502
- [4] M. R. Grace, C. N. Gagatsos, and S. Guha, “Entanglement-enhanced estimation of a parameter embedded in multiple phases,” Phys. Rev. Res., vol. 3, p. 033114, Aug 2021. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevResearch.3.033114
- [5] P. C. Humphreys, M. Barbieri, A. Datta, and I. A. Walmsley, “Quantum enhanced multiple phase estimation,” Phys. Rev. Lett., vol. 111, p. 070403, Aug 2013. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevLett.111.070403
- [6] T. J. Proctor, P. A. Knott, and J. A. Dunningham, “Multiparameter Estimation in Networked Quantum Sensors,” Physical Review Letters, vol. 120, no. 8, p. 080501, Feb. 2018. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevLett.120.080501
- [7] Q. Zhuang, Z. Zhang, and J. H. Shapiro, “Distributed quantum sensing using continuous-variable multipartite entanglement,” Physical Review A, vol. 97, no. 3, p. 032329, Mar. 2018. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.97.032329
- [8] R. Van Meter and S. J. Devitt, “The Path to Scalable Distributed Quantum Computing,” Computer, vol. 49, no. 9, pp. 31–42, Sep. 2016, conference Name: Computer.
- [9] S. Pirandola, R. Laurenza, C. Ottaviani, and L. Banchi, “Fundamental limits of repeaterless quantum communications,” Nature Communications, vol. 8, no. 1, p. 15043, Apr. 2017. [Online]. Available: https://www.nature.com/articles/ncomms15043
- [10] M. Takeoka, S. Guha, and M. M. Wilde, “Fundamental rate-loss tradeoff for optical quantum key distribution,” Nature Communications, vol. 5, no. 1, pp. 1–7, Oct. 2014, number: 1 Publisher: Nature Publishing Group. [Online]. Available: https://www.nature.com/articles/ncomms6235
- [11] S. Guha, H. Krovi, C. A. Fuchs, Z. Dutton, J. A. Slater, C. Simon, and W. Tittel, “Rate-loss analysis of an efficient quantum repeater architecture,” Physical Review A, vol. 92, no. 2, p. 022357, Aug. 2015. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.92.022357
- [12] M. Pant, H. Krovi, D. Englund, and S. Guha, “Rate-distance tradeoff and resource costs for all-optical quantum repeaters,” Physical Review A, vol. 95, no. 1, p. 012304, Jan. 2017. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.95.012304
- [13] L.-M. Duan, M. D. Lukin, J. I. Cirac, and P. Zoller, “Long-distance quantum communication with atomic ensembles and linear optics,” Nature, vol. 414, no. 6862, pp. 413–418, Nov. 2001. [Online]. Available: https://doi.org/10.1038/35106500
- [14] Y. Lee, E. Bersin, A. Dahlberg, S. Wehner, and D. Englund, “A quantum router architecture for high-fidelity entanglement flows in quantum networks,” npj Quantum Information, vol. 8, no. 1, pp. 1–8, Jun. 2022, number: 1 Publisher: Nature Publishing Group. [Online]. Available: https://www.nature.com/articles/s41534-022-00582-8
- [15] E. Schoute, L. Mancinska, T. Islam, I. Kerenidis, and S. Wehner, “Shortcuts to quantum network routing,” Oct. 2016, arXiv:1610.05238 [quant-ph]. [Online]. Available: http://arxiv.org/abs/1610.05238
- [16] K. Chakraborty, F. Rozpedek, A. Dahlberg, and S. Wehner, “Distributed Routing in a Quantum Internet,” Jul. 2019, arXiv:1907.11630 [quant-ph]. [Online]. Available: http://arxiv.org/abs/1907.11630
- [17] M. Pant, H. Krovi, D. Towsley, L. Tassiulas, L. Jiang, P. Basu, D. Englund, and S. Guha, “Routing entanglement in the quantum internet,” npj Quantum Information, vol. 5, no. 1, pp. 1–9, Mar. 2019, number: 1 Publisher: Nature Publishing Group. [Online]. Available: https://www.nature.com/articles/s41534-019-0139-x
- [18] T. N. Nguyen, K. J. Ambarani, L. Le, I. Djordjevic, and Z.-L. Zhang, “A Multiple-Entanglement Routing Framework for Quantum Networks,” Jul. 2022, arXiv:2207.11817 [cs]. [Online]. Available: http://arxiv.org/abs/2207.11817
- [19] L. Zhang, S.-X. Ye, Q. Liu, and H. Chen, “Multipath concurrent entanglement routing in quantum networks based on virtual circuit,” in 2022 4th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC), Apr. 2022, pp. 1–5.
- [20] C. Li, T. Li, Y.-X. Liu, and P. Cappellaro, “Effective routing design for remote entanglement generation on quantum networks,” npj Quantum Information, vol. 7, no. 1, pp. 1–12, Jan. 2021, number: 1 Publisher: Nature Publishing Group. [Online]. Available: https://www.nature.com/articles/s41534-020-00344-4
- [21] M. Victora, S. Krastanov, A. S. de la Cerda, S. Willis, and P. Narang, “Purification and Entanglement Routing on Quantum Networks,” Nov. 2020, arXiv:2011.11644 [quant-ph]. [Online]. Available: http://arxiv.org/abs/2011.11644
- [22] A. Patil, M. Pant, D. Englund, D. Towsley, and S. Guha, “Entanglement generation in a quantum network at distance-independent rate,” npj Quantum Information, vol. 8, no. 1, p. 51, May 2022. [Online]. Available: https://www.nature.com/articles/s41534-022-00536-0
- [23] E. Sutcliffe and A. Beghelli, “Multi-user entanglement distribution in quantum networks using multipath routing,” 2023.
- [24] L. Gyongyosi and S. Imre, “Decentralized base-graph routing for the quantum internet,” Physical Review A, vol. 98, no. 2, p. 022310, Aug. 2018, publisher: American Physical Society. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.98.022310
- [25] P. Dhara, A. Patil, H. Krovi, and S. Guha, “Subexponential rate versus distance with time-multiplexed quantum repeaters,” Physical Review A, vol. 104, no. 5, p. 052612, Nov. 2021. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.104.052612
- [26] A. Patil, J. Jacobson, E. Van Milligen, D. Towsley, and S. Guha, “Distance-independent entanglement generation in a quantum network using space-time multiplexed Greenberger–Horne–Zeilinger (GHZ) measurements,” in 2021 IEEE International Conference on Quantum Computing and Engineering (QCE). IEEE, oct 2021.
- [27] P. Nain, G. Vardoyan, S. Guha, and D. Towsley, “On the Analysis of a Multipartite Entanglement Distribution Switch,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, vol. 4, no. 2, pp. 1–39, Jun. 2020. [Online]. Available: https://dl.acm.org/doi/10.1145/3392141
- [28] G. Vardoyan, S. Guha, P. Nain, and D. Towsley, “On the Stochastic Analysis of a Quantum Entanglement Switch,” ACM SIGMETRICS Performance Evaluation Review, vol. 47, no. 2, pp. 27–29, Dec. 2019. [Online]. Available: https://dl.acm.org/doi/10.1145/3374888.3374899
- [29] P. Wang, C.-Y. Luan, M. Qiao, M. Um, J. Zhang, Y. Wang, X. Yuan, M. Gu, J. Zhang, and K. Kim, “Single ion qubit with estimated coherence time exceeding one hour,” Nature Communications, vol. 12, no. 1, p. 233, Jan. 2021, number: 1 Publisher: Nature Publishing Group. [Online]. Available: https://www.nature.com/articles/s41467-020-20330-w
- [30] M. Pant, H. Krovi, D. Towsley, L. Tassiulas, L. Jiang, P. Basu, D. Englund, and S. Guha, “Routing entanglement in the quantum internet,” npj Quantum Information, vol. 5, no. 1, p. 25, 2019. [Online]. Available: https://doi.org/10.1038/s41534-019-0139-x
- [31] G. Vardonyan, E. Van Milligen, S. Guha, S. Wehner, and D. Towsley, “On the bipartite entanglement capacity of quantum networks,” in preparation.