Introduction

Quantum entanglement has a central role in the quantum Internet1,2,3,4,5,6,7,8,9,10, quantum networking11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26, and long-distance quantum key distribution1,19,27,28. Entanglement distribution is a crucial phase for the construction of the entangled core network structure of the quantum Internet. In a quantum Internet scenario, quantum entanglement is a preliminary condition of quantum networking protocols27,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44. Distant quantum nodes that share no quantum entanglement must communicate with their direct neighbors to distribute entanglement. To aim of entanglement distribution is to generate entanglement between a distant source node and a target node through a chain of intermediate quantum repeater nodes45,46,47,48,49,50,51,52,53,54,55,56,57. The intermediate quantum repeater nodes receive the entangled states, store them in their local quantum memories28,58,59, and apply a unitary operation (called entanglement swapping1,2,3,19) to extend the range of quantum entanglement. Storing quantum entanglement in the quantum nodes’ local quantum memories adds noise to the distribution process, since quantum memories are non-perfect devices34,60 and the error probabilities evolve in time1,49,50,51,52,53,54. As the error pattern of the evolution the quantum memories is predictable, the nodes can be characterized by a given storage success probability after a given time from the start of the storage.

The fidelity of entanglement61,62,63 is another critical parameter for entanglement distribution. In a quantum network with a chain of repeater nodes between a source and target nodes, for all pairs of entangled nodes (e.g., for nodes that share a common entanglement) a given lower bound in the fidelity of entanglement must be satisfied, otherwise the entanglement distribution fails1,64. The stored entangled states have a given amount of fidelity that is determined by the transmission procedure, such as the noise of the quantum channel, etc. The evolution of a given entangled system’s fidelity parameter is time-varying in quantum memory, since it evolves through time, from the beginning of storage to the actual current time. Therefore, it is necessary to consider the predictability of the evolution of both the error patterns of the nodes’ local quantum memories, and the evolution of the stored quantum states’ fidelity of entanglement. In our model, using these parameters, we define an appropriate cost function for the realization of entanglement distribution.

Here we define the method of opportunistic entanglement distribution for the quantum Internet. The proposed scheme utilizes a cost function that accounts for the error patterns of local quantum memories and also the evolution of entanglement fidelities. The opportunistic model defines distribution sets in the entangled quantum network of the quantum Internet. A distribution set contains those quantum nodes for which our cost function picks up a local minimum in comparison to the cost of the other nodes in the given distributing set. The distribution set selects a lowest-cost node from a given set of nodes to provide a maximal usability of stored entanglement. The cost function ensures that the nodes selected for entanglement distribution allow the lowest deviation in the entanglement fidelity from the start of storage, and that the behavior of the quantum memory error follows a predicted error model with respect to a given node pair. We also derive the computational complexity of the proposed method. The solution provides an easily-applicable, low-complexity solution for high-fidelity entanglement distribution in the quantum Internet.

The novel contributions of our manuscript are as follows:

  1. 1.

    We define the method of opportunistic entanglement distribution for the quantum Internet.

  2. 2.

    The proposed opportunistic model defines distribution sets that are aimed to select those quantum nodes for which the cost function picks up a local minimum. The cost function utilizes the error patterns of the local quantum memories and the predictability of the evolution of the entanglement fidelities.

  3. 3.

    Our method provides efficient entanglement distributing with respect to the actual statuses of the local quantum memories of the node pairs.

  4. 4.

    We derive the computational complexity of the model.

This paper is organized as follows. In Section 2 the preliminaries are summarized. Section 3 defines the method, while Section 4 proposes the results. Finally, Section 5 concludes the results.

Preliminaries

System Model

The quantum Internet setting is modeled as follows8. Let V refer to the nodes of an entangled quantum network N, with a transmitter quantum node \(A\in V\), a receiver quantum node \(B\in V\), and quantum repeater nodes \({R}_{i}\in V\), \(i=1,\ldots ,q\). Let \(E=\{{E}_{j}\}\), \(j=1,\ldots ,m\), refer to a set of edges between the nodes of V, where each Ej identifies an Ll-level entangled connection, \(l=1,\ldots ,r\), between quantum nodes xj and yj of edge Ej, respectively. The entanglement levels of the entangled connections in the entangled quantum network structure are defined as follows.

Entanglement Levels

In a quantum Internet setting, an \(N=(V,E)\) entangled quantum network consists of single-hop and multi-hop entangled connections, such that the single-hop entangled nodes (The l-level entangled nodes x, y refer to quantum nodes x and y connected by an entangled connection Ll.) are directly connected through an L1-level entanglement, while the multi-hop entangled nodes communicate through Ll-level entanglement. Focusing on the doubling architecture1,2,3 in the entanglement distribution procedure, the number of spanned nodes is doubled in each level of entanglement swapping (entanglement swapping is applied in an intermediate node to create a longer distance entanglement1). Therefore, the \(d{(x,y)}_{{{\rm{L}}}_{l}}\) hop distance in N for the Ll-level entangled connection between x, \(y\in V\) is denoted by8

$$d{(x,y)}_{{{\rm{L}}}_{l}}={2}^{l-1},$$
(1)

with \(d{(x,y)}_{{{\rm{L}}}_{l}}-1\) intermediate quantum nodes between x and y. Therefore, l = 1 refers to a direct entangled connection between two quantum nodes x and y without intermediate quantum repeaters, while \(l > 1\) identifies a multilevel entanglement.

An entangled quantum network N is illustrated in Fig. 1. The quantum network integrates single-hop entangled nodes (depicted by gray nodes) and multi-hop entangled nodes (depicted by blue and orange nodes) connected by edges. The single-hop entangled nodes are directly connected through an L1-level entangled connection, while the multi-hop entangled nodes are connected by L2 and L3-level entangled connection.

Figure 1
figure 1

Opportunistic entanglement distribution in a quantum Internet setting, \(N=(V,{\mathscr{S}})\). The entangled contacts of transmitter node A define the distributing set \({{\mathscr{D}}}_{A}\). From set \({{\mathscr{D}}}_{A}\), a quantum repeater node R1 is selected. Node R1 shares L2-level entanglement with A. The entangled contacts of the repeater node R1 define the distributing set \({{\mathscr{D}}}_{{R}_{1}}\). The iteration is repeated until target node B is reached via a quantum repeater node. In this network setting, B is reached via node R3 from set \({{\mathscr{D}}}_{{R}_{2}}\), where R3 shares L3-level entanglement with B. Applying the opportunistic entanglement distribution for the nodes of the network, a path between A and B is selected (depicted in bold).

The fidelity of entanglement of an Ll-level entangled connection E(x, y) between x, \(y\in V\) depends on the physical attributes of the quantum network.

Terms and Definitions

Entanglement Fidelity

Let

$$|{\beta }_{00}\rangle =\frac{1}{\sqrt{2}}(|00\rangle +|11\rangle )$$
(2)

be the target Bell state subject to be created at the end of the entanglement distribution procedure between a particular source node A and receiver node B. The entanglement fidelity F at an actually created noisy quantum system σ between A and B is

$$F(\sigma )=\langle {\beta }_{00}|\sigma |{\beta }_{00}\rangle ,$$
(3)

where F is a value between 0 and 1, F = 1 for a perfect Bell state and F < 1 for an imperfect state. Without loss of generality, in an experimental quantum Internet setting, an aim is to reach F ≥ 0.98 over long distances1,3.

Some properties of F are as follows4,19. The fidelity for two pure quantum states \(|\phi \rangle \), \(|\psi \rangle \) is defined as

$$F(|\phi \rangle ,|\psi \rangle )=|\langle \phi |\psi \rangle {|}^{2}.$$
(4)

The fidelity of quantum states can describe the relation of a pure state \(|\psi \rangle \) and mixed quantum system \(\sigma ={\sum }_{i=0}^{n-1}\,{p}_{i}{\rho }_{i}={\sum }_{i=0}^{n-1}\,{p}_{i}|{\psi }_{i}\rangle \langle {\psi }_{i}|\), as

$$F(|\psi \rangle ,\sigma )=\langle \psi |\sigma |\psi \rangle =\sum _{i=0}^{n-1}\,{p}_{i}|\langle \psi |{\psi }_{i}\rangle {|}^{2}.$$
(5)

Fidelity can also be defined for mixed states σ and ρ, as

$$F(\rho ,\sigma )={({\rm{Tr}}(\sqrt{\sqrt{\sigma }\rho \sqrt{\sigma }}))}^{2}=\sum _{i}\,{p}_{i}{({\rm{Tr}}(\sqrt{\sqrt{{\sigma }_{i}}{\rho }_{i}\sqrt{{\sigma }_{i}}}))}^{2}.$$
(6)

Method

Before giving the details of the algorithm, we briefly summarize the method of opportunistic entanglement distribution in a quantum Internet setting in Method 1.

Method 1
figure a

Opportunistic entanglement distribution in the quantum Internet.

Discussion

In Step 1, distributing entanglement between i and the direct contacts of i defines the distributing set \({{\mathscr{D}}}_{i}\), which can contain different levels of entangled contacts. In our opportunistic approach, the heterogonous entangled contacts leads to diverse hop-distances, specifically for an Ll-level entanglement \(l=1,\ldots ,r\), the \(d{(i,y)}_{{{\rm{L}}}_{l}}\), the hop-distance between a source node i and target node \({{\mathscr{D}}}_{i}\in y\) from the distributing set \({{\mathscr{D}}}_{i}\) is determined via (4) as \(d{(i,y)}_{{{\rm{L}}}_{l}}={2}^{l-1}\)1,2,3,8.

In Step 2, the next node j from a set \({{\mathscr{D}}}_{i}\) is selected by the same cost metric used for the selection of node i in Step 1. The cost metric65,66 used in the opportunistic node selection procedure in Steps 1–2 ensures the selection of those nodes that can preserve the entangled quantum states with the highest fidelity in their local quantum memories. From a given distributing set \({\mathscr{D}}\), only one node is selected in each iteration step. The cost function will be clarified later in the algorithm.

Finally, Step 3 provides an iteration to reach from the source node to the target node.

Figure 1 illustrates the method of opportunistic entanglement distribution in a quantum repeater network N. A given distributing set \({{\mathscr{D}}}_{i}\) of a node i can contain several different levels Ll of entangled contacts. From a distributing set \({{\mathscr{D}}}_{i}\), only one repeater node is selected in each level of iteration. Those quantum nodes that share L1-level entanglement are referred to as single-hop entangled nodes, while the other entangled nodes are referred to as multi-hop entangled nodes.

Ethics statement

This work did not involve any active collection of human data.

Results

Parameterization

Let \({{\mathscr{D}}}_{i}\) be a distributing set of a node i, and let \({p}_{i,j}^{{F}^{\ast }}\) be the probability of the shared entanglement stored in the quantum memories of nodes (i, j), where \(j\in {{\mathscr{D}}}_{i}\) identifies a repeater node Rj from the distributing set \({{\mathscr{D}}}_{i}\), with a fidelity \({F}^{\ast }\ge {F}_{crit}\), where Fcrit is a critical lower bound on the fidelity of entanglement.

Then, let \({p}_{i,{{\mathscr{D}}}_{i}}^{{F}^{\ast }}\) be the probability that \({F}^{\ast }\ge {F}_{crit}\) is satisfied between node i and at least one repeater node from \({{\mathscr{D}}}_{i}\).

Using \({p}_{i,{{\mathscr{D}}}_{i}}^{{F}^{\ast }}\) and \({p}_{i,j}^{{F}^{\ast }}\), a cost function \(f({p}_{i,{{\mathscr{D}}}_{i}}^{{F}^{\ast }})\) can be defined65,66 as

$$f({p}_{i,{{\mathscr{D}}}_{i}}^{{F}^{\ast }})=\frac{1}{{p}_{i,{{\mathscr{D}}}_{i}}^{{F}^{\ast }}}=\frac{1}{1-{\prod }_{j\in {{\mathscr{D}}}_{i}}\,(1-{p}_{i,j}^{{F}^{\ast }})}.$$
(7)

Similarly, with \({p}_{{{\mathscr{D}}}_{i},B}^{{F}^{\ast }}\) as the probability that there exists entanglement between a node \(j\in {{\mathscr{D}}}_{i}\) of \({{\mathscr{D}}}_{i}\) and the target node B with fidelity criterion \({F}^{\ast }\ge {F}_{crit}\), a cost function between a repeater node \(j\in {{\mathscr{D}}}_{i}\) and a target node B can be defined as

$$f({p}_{{{\mathscr{D}}}_{i},B}^{{F}^{\ast }})=\sum _{j\in {{\mathscr{D}}}_{i}}\,{\varphi }_{i,j}\,f({p}_{j,B}^{{F}^{\ast }}),$$
(8)

where \({p}_{j,B}^{{F}^{\ast }}\) is the probability of \({F}^{\ast }\ge {F}_{crit}\) fidelity entangled contact between a given \(j\in {{\mathscr{D}}}_{i}\) and B, while \({\varphi }_{i,j}\) is the probability that a given repeater node j is selected from \({{\mathscr{D}}}_{i}\) for i, defined66 as

$${\varphi }_{i,j}=\frac{{p}_{i,j}^{{F}^{\ast }}\,{\prod }_{k=1}^{j-1}\,(1-{p}_{i,k}^{{F}^{\ast }})}{1-{\prod }_{j\in {{\mathscr{D}}}_{i}}\,(1-{p}_{i,j}^{{F}^{\ast }})},$$
(9)

where

$$\sum _{i}\,{\varphi }_{i,j}=1.$$
(10)

From equations (7) and (8), the cost function between a quantum node i and a target node B at a distributing set \({{\mathscr{D}}}_{i}\), such that \({F}^{\ast }\ge {F}_{crit}\) holds for the fidelity of all entangled contacts from i to B, is therefore

$$f({p}_{i,B}^{{F}^{\ast }})=f({p}_{i,{{\mathscr{D}}}_{i}}^{{F}^{\ast }})+f({p}_{{{\mathscr{D}}}_{i},B}^{{F}^{\ast }}).$$
(11)

The \({p}_{i,j}^{{F}^{\ast }}\) probabilities depend on the actual state of the quantum memory (particularly, on the εi error probability of the quantum memory of node i) and on the F fidelity of the stored entanglement. Parameters ε and F are time-varying in our model, which is denoted by ε(t) and F(t), where t refers to the storage time in quantum memory. Time t0 refers to the start of the storage of a quantum system in quantum memory.

Let \({\varepsilon }_{i,j}({t}_{0}+{\rm{\Delta }}t)\) identify the error probability of quantum memories in nodes (i, j) such that \({\varepsilon }_{i,j}\in [0,{\varepsilon }_{crit}]\) holds, which allows storing an \({F}^{\ast }\ge {F}_{crit}\) fidelity entanglement in the nodes after Δt time from start time t0. Therefore, at a εcrit critical upper bound on the quantum memories,

$${\varepsilon }_{i,j}({t}_{0}+{\rm{\Delta }}t)=|{\zeta }_{i}({t}_{0}+{\rm{\Delta }}t)-{\zeta }_{j}({t}_{0}+{\rm{\Delta }}t)|\le {\varepsilon }_{crit}$$
(12)

holds, where \({\zeta }_{i}({t}_{0}+{\rm{\Delta }}t)\) characterizes the change of the error probability of the quantum memory of node i at \({t}_{0}+{\rm{\Delta }}t\), as in

$${\zeta }_{i}({t}_{0}+{\rm{\Delta }}t)={\zeta }_{i}({t}_{0})+{\phi }_{i}({t}_{0},{\rm{\Delta }}t),$$
(13)

where \({\zeta }_{i}({t}_{0})\) is the εi error probability of the quantum memory of node i at t0, while \({\phi }_{i}({t}_{0},{\rm{\Delta }}t)\) is the change of εi from t0 to \({t}_{0}+{\rm{\Delta }}t\).

Let \({\eta }_{i}(t)=({\varepsilon }_{i}(t),1-{F}_{i}(t))\) identify the εi(t) quantum memory error probability and the Fi(t) stored entanglement fidelity in node i at time t. Then, the di,j distance between ηi and ηj in \({{\mathbb{R}}}^{2}\) identifies a \({d}_{i,j}\in [0,{d}_{{\rm{\max }}}]\), where dmax is the maximal allowable distance in \({{\mathbb{R}}}^{2}\), which forms an upper bound to the distances for which \({p}_{i,j}^{{F}^{\ast }} > 0\) holds, as

$$\begin{array}{rcl}{d}_{i,j}({t}_{0}) & = & |{\eta }_{i}({t}_{0})-{\eta }_{j}({t}_{0})|\\ & = & \sqrt{{({\varepsilon }_{i}({t}_{0})-{\varepsilon }_{j}({t}_{0}))}^{2}+{((1-{F}_{i}({t}_{0}))-(1-{F}_{j}({t}_{0})))}^{2}},\end{array}$$
(14)

and

$${d}_{i,j}({t}_{0}+{\rm{\Delta }}t)=|{\eta }_{i}({t}_{0}+{\rm{\Delta }}t)-{\eta }_{j}({t}_{0}+{\rm{\Delta }}t)|\le {d}_{{\rm{\max }}},$$
(15)

where

$${\eta }_{i}({t}_{0}+{\rm{\Delta }}t)={\eta }_{i}({t}_{0})+{{\rm{\Omega }}}_{i}({t}_{0},{\rm{\Delta }}t),$$
(16)

where

$${\eta }_{i}({t}_{0})=(\begin{array}{c}{\zeta }_{i}({t}_{0})\\ 1-{F}_{i}({t}_{0})\end{array})$$
(17)

and

$${{\rm{\Omega }}}_{i}({t}_{0},{\rm{\Delta }}t)=(\begin{array}{c}{\phi }_{i}({t}_{0},{\rm{\Delta }}t)\\ 1-{F}_{i}({t}_{0},{\rm{\Delta }}t)\end{array}).$$
(18)

The fidelities Fi(t0) and \({F}_{i}({t}_{0},{\rm{\Delta }}t)\) refer to the fidelities of stored entanglement in a node i at t0 and t0, \({\rm{\Delta }}\)t, respectively, with relation for nodes (i, j)

$$1-{F}_{i,j}({t}_{0}+{\rm{\Delta }}t)=|(1-{F}_{i}({t}_{0}+{\rm{\Delta }}t))-(1-{F}_{j}({t}_{0}+{\rm{\Delta }}t))|\le 1-{F}_{{\rm{\Delta }}},$$
(19)

where Fi,j is the difference of entanglement fidelities Fi and Fj, while FΔ is an upper bound on the fidelity difference.

From equation (15), the following relation holds for \({p}_{i,j}^{{F}^{\ast }}\):

$${p}_{i,j}^{{F}^{\ast }}=\{\begin{array}{ll}{p}_{i,j}^{{F}^{\ast }} > 0, & {\rm{if}}\,{d}_{i,j}({t}_{0}+{\rm{\Delta }}t)\le {d}_{{\rm{\max }}},\\ {p}_{i,j}^{{F}^{\ast }}=0, & {\rm{otherwise}}.\end{array}$$
(20)

Figure 2 illustrates the evolution of the error probabilities of the local quantum memories and the fidelities of the stored entangled states. Time t0 refers to the start of storage in the quantum memory and time \({t}_{0}+{\rm{\Delta }}t\) is the current time. The distance \({d}_{i,j}({t}_{0}+{\rm{\Delta }}t)\) measures the difference of \({\eta }_{i}({t}_{0}+{\rm{\Delta }}t)\) and \({\eta }_{j}({t}_{0}+{\rm{\Delta }}t)\) of a node pair \((i,j)\). From the time evolution of the error probability of the quantum memory, it follows that \(\varepsilon ({t}_{0}+{\rm{\Delta }}t) > \varepsilon ({t}_{0})\), and \(F({t}_{0}+{\rm{\Delta }}t) < F({t}_{0})\) holds for the time evolution of the fidelity of the stored entanglement.

Figure 2
figure 2

Evolution of the \({d}_{i,j}({t}_{0})\) and \({d}_{i,j}({t}_{0}+{\rm{\Delta }}t)\) distances in \({{\mathbb{R}}}^{2}\) with respect to a given node pair \((i,j)\); ε is the error probability of the local quantum memory and F is the fidelity of the stored entanglement in the local quantum memory. The initial states (storage starting at t0) of the nodes \((i,j)\) are identified by \({\eta }_{i}({t}_{0})\) and \({\eta }_{j}({t}_{0})\), the current states at time \({t}_{0}+{\rm{\Delta }}t\) of the nodes are \({\eta }_{i}({t}_{0}+{\rm{\Delta }}t)\) and \({\eta }_{j}({t}_{0}+{\rm{\Delta }}t)\). As \({d}_{i,j}({t}_{0}+{\rm{\Delta }}t) > {d}_{{\rm{\max }}}\), where dmax is a threshold, the yielding probability is \({p}_{i,j}^{{F}^{\ast }}=0\).

The normalized increase of distance di,j between nodes therefore yields a quantity \({\omega }_{i,j}\), \({\omega }_{i,j}\in [0,1]\), which characterizes the usability of a stored entanglement in \((i,j)\) from t0 to \({t}_{0}+{\rm{\Delta }}t\), as

$${\omega }_{i,j}=1-\tfrac{1}{{d}_{{\rm{\max }}}}\,{\rm{\min }}\,(\sqrt{\begin{array}{l}{({\phi }_{i}({t}_{0},{t}_{0}+{\rm{\Delta }}t)-{\phi }_{j}({t}_{0},{t}_{0}+{\rm{\Delta }}t))}^{2}\\ +\,{(1-{F}_{i}({t}_{0},{t}_{0}+{\rm{\Delta }}t)-(1-{F}_{j}({t}_{0},{t}_{0}+{\rm{\Delta }}t)))}^{2}\end{array}},{d}_{{\rm{\max }}}).$$
(21)

As \({\omega }_{i,j}=1\), if no change occurs in the initial distance \({d}_{i,j}({t}_{0})\) in \({{\mathbb{R}}}^{2}\), thus

$${d}_{i,j}({t}_{0}+{\rm{\Delta }}t)\approx {d}_{i,j}({t}_{0}),$$
(22)

while \({\omega }_{i,j}=0\), if

$${d}_{i,j}({t}_{0}+{\rm{\Delta }}t) > {d}_{{\rm{\max }}},$$
(23)

so the yielding relation between \({p}_{i,j}^{{F}^{\ast }}\) and \({\omega }_{i,j}\) is

$${p}_{i,j}^{{F}^{\ast }}=\{\begin{array}{ll}{p}_{i,j}^{{F}^{\ast }}=\,{\rm{\max }}\,, & {\rm{if}}\,{\omega }_{i,j}=1,\\ 0 < {p}_{i,j}^{{F}^{\ast }} < \,{\rm{\max }}\,, & {\rm{if}}\,{\omega }_{i,j} < 1,\\ {p}_{i,j}^{{F}^{\ast }}=0, & {\rm{if}}\,{\omega }_{i,j}=0.\end{array}$$
(24)

Equation (21) also characterizes the future behavior of the quantum memories in the nodes, i.e., the predictability of the error model of the quantum memories after a given time after beginning storage. The highest values of \({\omega }_{i,j}\) are therefore assigned to those memory units for which the error probabilities and the entanglement fidelities evolve by a given pattern.

For a given path \({\mathscr{P}}\) with \({A}_{\delta ,{U}_{k}}\) and \({B}_{\delta ,{U}_{k}}\) as the source and target nodes, respectively, associated with a demand δ of user Uk, \(k=1,\ldots ,K\), where K is the number of users; thus, the overall usability coefficient \({\omega }_{{A}_{\delta ,{U}_{k}},{B}_{\delta ,{U}_{k}}}\) for \({\mathscr{P}}\) is

$${\omega }_{{A}_{\delta ,{U}_{k}},{B}_{\delta ,{U}_{k}}}=\prod _{(i,j)\in {\mathscr{P}}}\,{\omega }_{i,j}.$$
(25)

To determine those quantum nodes for which both \({\omega }_{i,j}\) (21) and \({p}_{i,j}^{{F}^{\ast }}\) are high, a redefined cost function, ci,j, can be defined for a given \((i,j)\) as

$${c}_{i,j}=\frac{1}{{p}_{i,j}^{{F}^{\ast }}{\omega }_{i,j}},$$
(26)

which assigns the lowest cost to those node pairs for which \({\omega }_{i,j}\) and \({p}_{i,j}^{{F}^{\ast }}\) are high.

The remaining quantities from equations (7) and (9) can therefore be rewritten as

$${c}_{i,{{\mathscr{D}}}_{i}}=\frac{1}{1-{\prod }_{j\in {{\mathscr{D}}}_{i}}\,(1-{p}_{i,j}^{{F}^{\ast }}{\omega }_{i,j})},$$
(27)

and

$${\varphi ^{\prime} }_{i,j}=\frac{{p}_{i,j}^{{F}^{\ast }}{\omega }_{i,j}\,{\prod }_{k=1}^{j-1}\,(1-{p}_{i,k}^{{F}^{\ast }}{\omega }_{i,k})}{1-{\prod }_{j\in {{\mathscr{D}}}_{i}}\,(1-{p}_{i,j}^{{F}^{\ast }}{\omega }_{i,j})},$$
(28)

which yields the redefined cost of equation (8) as

$${c}_{{{\mathscr{D}}}_{i},B}=\sum _{j\in {{\mathscr{D}}}_{i}}\,{\varphi ^{\prime} }_{i,j}\,f({p}_{j,B}^{{F}^{\ast }}).$$
(29)

The total cost between i and B such that \({F}^{\ast }\ge {F}_{crit}\) holds for all entangled contacts between quantum nodes i and B is therefore65,66

$${c}_{i,B}={c}_{i,{{\mathscr{D}}}_{i}}+{c}_{{{\mathscr{D}}}_{i},B}.$$
(30)

Opportunistic Entanglement Distribution

The aim of the opportunistic entanglement distribution algorithm \({{\mathscr{A}}}_{O}\) is to determine a shortest path \({{\mathscr{P}}}^{\ast }\) with respect to our cost function. The shortest path \({{\mathscr{P}}}^{\ast }\) contains those node pairs for which \({\omega }_{i,j}\) and \({p}_{i,j}^{{F}^{\ast }}\) are maximal, and therefore the resulting cost function (26) is the lowest in a quantum network N. Thus, the algorithm finds the repeater nodes for entanglement distribution by maximizing the usability of stored entanglement.

Some preliminary notations for the algorithm are as follows. Let \({A}_{\delta ,{U}_{k}}\) and \({B}_{\delta ,{U}_{k}}\) be the source and target nodes, respectively, associated with a demand δ of user Uk. The algorithm selects those nodes that provide the lowest cost with respect to ci,j for a given \((i,j)\) to distribute entanglement from \({A}_{\delta ,{U}_{k}}\) to \({B}_{\delta ,{U}_{k}}\). Assume that for a set S′ of nodes there exists a path to \({B}_{\delta ,{U}_{k}}\) in a quantum network N = (V, S). Let \(\tilde{S}\) refer to a set of nodes for which the shortest path to \({B}_{\delta ,{U}_{k}}\) is not yet determined.

The \({{\mathscr{A}}}_{O}\) algorithm of the minimal-cost opportunistic entanglement distribution is detailed in Algorithm 1.

Algorithm 1
figure b

\({{\mathscr{A}}}_{O}\): Minimal-cost opportunistic entanglement distribution.

Computational Complexity

The computational complexity of the minimal-cost \({{\mathscr{A}}}_{O}\) opportunistic entanglement distribution is as follows.

Let N = (V, E) be a quantum repeater network with |V| quantum nodes. Applying a \( {\mathcal L} \) logarithmic search67 to find a node with an actual minimal cost requires at most

$${\mathscr{O}}(\mathrm{log}\,|V|)$$
(31)

steps, via \({\mathscr{O}}(\mathrm{log}\,|V|)\) comparisons.

Since the number of nodes is |V|, setting the final path cost for all quantum nodes requires at most

$${\mathscr{O}}(|V|)$$
(32)

steps.

From (31) and (32) follows straightforwardly that the complexity of the minimal-cost opportunistic entanglement distribution algorithm is bounded above by

$${\mathscr{O}}(|V|\,\mathrm{log}\,|V|).$$
(33)

Conclusions

Here we defined a method for entanglement distribution in the quantum Internet. Our method utilizes distributing sets for quantum nodes, which can preserve quantum entanglement with the highest fidelity in their local quantum memories. The algorithm is opportunistic, since in each iteration step a node is selected from a distributing set that can provide optimal conditions. The cost function includes the utilization of the evolution of the error model of the local quantum memories, and the fidelities of the stored entangled states. A usability parameter quantifies the predictability of the evolution of the error model, and of the evolution of the entanglement fidelity. The computational complexity of the method is moderate, which allows for direct application in experimental quantum Internet scenarios and in long-distance quantum communications.