Schematic of a quantum network link based on multiple 171Yb qubits in nanophotonic cavities.

Multi-Qubit Nodes Expands Quantum Network Potential

Researchers have achieved a breakthrough in quantum networking by creating a two-node system with multiple rare-earth ions per node that enables multiplexed entanglement distribution and multipartite state preparation, overcoming traditional single-qubit limitations and laying the groundwork for scalable quantum networks with applications in computing, communication, and sensing.

IonQ to acquire ID Quantique to form the world’s largest quantum-safe networks and quantum networking provider

IonQ to Acquire Controlling Stake in ID Quantique

IonQ is acquiring a controlling stake in quantum safe networking leader ID Quantique (IDQ) to strengthen its global quantum ecosystem, accelerate quantum networking development, and establish a strategic partnership with SK Telecom, with the acquisition expected to close in Q2 2025.

Anahita Khodadad Kashi and Prof. Dr. Michael Kues demonstrated for the first time entanglement-based quantum key distribution using the frequency degree of freedom to enable scalable quantum networks. Credit: Leibniz University Hannover

Light-Based Quantum Networks: A Breakthrough in Secure Data

Scientists at Leibniz University Hannover have developed a cost-effective quantum network security system using frequency-bin coding of light particles, which reduces complexity and equipment costs by 75% while enhancing security against quantum computer threats through a simplified single-detector design that enables dynamic, scalable quantum key distribution.

Proposed scheme for two-dimensional states generation.

MacZac: A High-Stability Time-Bin Encoder for Quantum Key Distribution

A novel quantum key distribution encoder called MacZac combines Sagnac and Mach-Zehnder interferometers with a single phase modulator to achieve exceptionally low error rates and high stability in time-bin encoded quantum communications, while simplifying the optical setup and eliminating the need for active compensation.

Protocol scheme with arbitrary modes.

High-dimensional coherent one-way Quantum Key Distribution (QKD)

Scientists have introduced and analyzed a high-dimensional QKD protocol that requires only standard two-dimensional hardware. They have provided security analysis against individual and coherent attacks, establishing upper and lower bounds on the secure key rates.

The chain complex relevant to the distance balancing construction.

Local testability of distance-balanced quantum codes

npj Quantum Information, Published online: 20 November 2024; doi:10.1038/s41534-024-00908-8 In this paper, scientists proved a lower bound on the soundness of quantum locally testable codes under the distance balancing construction of Evra et al. Their […]

Roberto Morandotti. Credits : Josée Lecompte

Quantum research breakthrough uses synthetic dimensions to efficiently process quantum information

A new study opens the door to cutting-edge solutions that could contribute to the realization of a system capable of processing quantum information in a simple yet powerful way. The work presents a method for manipulating the photonic states of light in a never-before-seen way, offering greater control over the evolution of photon propagation. This control makes it possible to improve the detection and number of photon coincidences, as well as the efficiency of the system.

Long-range quantum key exchange with an untrusted satellite.

Long-range QKD without trusted nodes is not possible with current technology

The ARQ19 patent’s claim of achieving long-range quantum key distribution without trusted nodes is unfounded because it relies on an unexplained confidential classical channel between end users that cannot be quantum-based due to distance limitations, making the system’s security ultimately dependent on this non-quantum channel rather than achieving true quantum security.

Quantum communication chain within a network.

Composable Security Analysis of Gaussian Quantum Networks

A theoretical study advancing the composable security analysis of Gaussian quantum networks in finite-size regimes, introducing a novel parameter estimation methodology based on end-user data sharing, while demonstrating potential breakthroughs in surpassing the PLOB bound through quantum amplifier-assisted chains, though practical implementation remains challenging.

Source comparison for three main QKD schemes.

Enhancing quantum cryptography with quantum dot single-photon sources

Quantum dot-based single-photon sources offer superior security for quantum cryptography through their unique combination of on-demand emission, high brightness, low multiphoton contribution, and tunable coherence in photon-number states, outperforming traditional Poisson-distributed sources across multiple cryptographic primitives.

Quantum physics: record entanglement of quantum memories

Record entanglement of quantum memories

Researchers from LMU and Saarland University have entangled two quantum memories over a 33-kilometer-long fiber optic connection — a record and an important step toward the Quantum Internet. This is the longest distance so far […]

A particle of light from the single photon source (below) is stored in the vapor cell (above). A simultaneously emitted second photon is revealed by a detector (right), which triggers the control laser pulse and thereby initiates the storage process. (Image: Department of Physics/University of Basel)

Quantum network nodes with warm atoms

Physicists at the University of Basel, Switzerland, have now developed a network node for quantum communication networks that can store single photons in a vapor cell and pass them on later. In quantum communication networks, […]

Part of the photon pair source with the luminous glass fibres of the optical fibre amplifier.

New QKD stable secure protocol

Based on the so-called Quantum Key Distribution (QKD), researchers at TU Darmstadt have developed a new, tap-proof communication network. The new system is used to exchange symmetric keys between parties in order to encrypt messages […]

Qunnect Logo

Qunnect aims to Quantum Repeater Commercialization

Qunnect was awarded two SBIR awards from the US Department of Energy totaling $1.85M for the development and commercialization of the company’s Quantum Repeater product suite. When complete, this collection of devices supports the next generation […]

Schematic setup for our one cycle implementation of Salih et al.’s 2013 counterfactual communication protocol.

The laws of physics do not prohibit counterfactual communication

It has been conjectured that counterfactual communication is impossible, even for post-selected quantum particles. A team of researchers has strongly challenged this by proposing precisely such a counterfactual scheme where—unambiguously—none of Alice’s photons that correctly […]

Fusion success creates a 7-GHZ state and failure performs X-basis measurements on the fused qubits, resulting in two 2-GHZ states (Bell pairs) and a 3-GHZ state. Even though the states are represented using graphs, they are not cluster states.

Entanglement generation in a quantum network at distance-independent rate

Researchers have developed a protocol for entanglement generation in the Quantum Internet that allows a repeater node to use n-qubit Greenberger-Horne-Zeilinger (GHZ) projective measurements that can fuse n successfully entangled links, i.e., two-qubit entangled Bell pairs shared across n network edges, […]