Genuine quantum networks with superposed tasks and addressing

We show how to make quantum networks, both standard and entanglement-based, genuine quantum by providing them with the possibility of handling superposed tasks and superposed addressing. This extension of their functionality relies on a quantum control register, which specifies not only the task of the network, but also the corresponding weights in a coherently superposed fashion. Although adding coherent control to classical tasks, such as sending or measuring—or not doing so—is in general impossible, we introduce protocols that are able to mimick this behavior under certain conditions. We achieve this by always performing the classical task, either on the desired state or a properly chosen dummy state. We provide several examples, and show that externally controlling quantum superposition of tasks offers additional possibilities and advantages over usually considered single functionality. For instance, superpositions of different target state configurations shared among different nodes of the network can be prepared, or quantum information can be sent among a superposition of different paths or to different destinations.


I. INTRODUCTION
Quantum networks promise to be the backbone of upcoming quantum technologies [1,2].Several tasks have been identified where quantum effects allow one to obtain an advantage over classical approaches, or even make things possible in the first place.Many of these applications are based on the distribution of quantum states to spatially separated parties and by exploiting truly quantum features such as entanglement.This includes security applications such as key distribution [3][4][5], secret sharing [6,7] and secret voting [8,9], distributed (or cloud) quantum computation [10], as well as improved sensing or time and frequency standards [11][12][13].
There are basically two approaches to such quantum networks: a bottom-up [2,14] and a top-down approach [15].The former one conceptually closely relates to classical networks.In a bottom-up approach, the quantum network completes requests and tasks by sending quantum states through channels, from network device to network device.Even though there are some new elements, such as the generation of quantum states or the transmission of quantum information, well-established concepts of classical networks, such as routing or addressing, still appear to be applicable or at least adjustable.The latter approach to quantum networks, i.e. a top-down approach, consists of entanglement-based networks, where devices prepare entanglement beforehand, which is subsequently manipulated in order to complete desired requests.In both cases, stack models [16,17] that define necessary elements and functionalities have been proposed and analyzed.However, so far the desired functionality of networks is restricted to a specific, classically defined task such as transmitting quantum information to a specific node in the network, or to prepare a certain multipartite entangled quantum state shared among different parties.
In this work we lift the functionality of quantum networks to a genuine quantum level by introducing techniques and procedures which enable network devices to complete tasks and to address other devices in a coherent fashion.Besides, these tasks can in principle be controlled in a quantum way from the outside.This allows for several interesting applications such as the preparation of superpositions of desired target states, possibly shared among different parties.Other applications in-clude the transmission of quantum information to a superposition of different receivers, as well as sending quantum information over a superposition of different paths.Note that this goes beyond multi-path routing as considered e.g. in [18,19], where resources are used in a parallel, but not a superposed way.In order to complete tasks in a superposed way, we mimic the behaviour of coherently controlling classical tasks.We remark that adding quantum control to classical tasks, such as performing a measurement, e.g. for state merging or teleportationwhich are part of typical network requests-, is in general impossible, as we argue later.However, we find that one can mimic the behaviour of the system in such a way that the resulting state or network configuration is "as if" such a coherently controlled classical operation was performed.This is done by adding quantum control at the level of unitary operations, in such a way that operations act on different desired states or on dummy states, in order to generate the superposition.Crucially, the classical task is always performed.As we show later, one needs to ensure that for the known input state and the dummy state, the probabilities and measurement outcomes are equal and indistinguishable for all involved configurations and states.
We argue that the additional functionality of external quantum control and of handling superpositions of tasks is a desirable and useful feature that offers new possibilities.We illustrate this by providing examples where superpositions of states shared among different parties in the network are generated.This includes e.g. a superposition of three-party GHZ states shared among four parties, where the superposed state can be reduced deterministically to a three-party GHZ state.In contrast to each of the individual configurations, this superposed state has an additional built-in robustness against losses.Similar observations apply to coherent superpositions of two copies of the four Bell states, which is maximally entangled with respect to all bipartitions.In contrast, each individual state is separable w.r.t.certain bipartitions, and a classical mixture corresponds to the so-called Smolin state [20], which is bound entangled.Further examples include sending of quantum states to a superposition of different locations or in a superposition of different paths, thereby distributing quantum information in a delocalized way within the network, or encoding unknown quantum states within the whole network.
Parallelism in quantum information processing closely relates to adding quantum control to operations, which was investigated in a variety of contexts.For instance, in [21] it was shown that a universal quantum gate array is not feasible, whereas approximate implementations thereof seem to be viable [22].Superposed access to quantum random access memory was investigated in [23].Coherently controlling the order of applying unitaries was subject of study in [24], which was experimentally verified in [25], where analyses are performed within the indefinite causal order framework [26,27].In addition, the possibility of adding quantum control to unknown operation has been studied in [28,29].The preparation of quantum states in superposition, by applying controlled unitaries, has also received attention.In particular, it has been shown that the so-called quantum adder for quantum states [30,31] is, in general, not realizable.However, when partial information of the states is available, a quantum adder turns out to be probabilistically feasible [31,32].This has been experimentally investigated in [33,34].
In contrast to this former work of adding quantum control to operations, the results we present here differ in two key points.First, we do not require to coherently control the application of all different possible kinds of operations.More precisely, we restrict the set of coherently controlled operations which the network devices apply to be chosen from a finite set of possible transformations.Second, we do not aim to prepare a superposition of completely unknown states, or to superpose unknown operations.In contrast, we study the distributed preparation of superpositions of known quantum states by mimicking quantum control of classical tasks.We do not assume the states which shall be brought into superposition to be available a priori, but we coherently control the generation process (unitaries and measurements) which each network device implements onto some network resource.In general the desired process is known, or part of a finite set of possible operations.
The paper is organized as follows.In Sec.II we give an overview of the fundamental concepts and tools we make use of throughout the paper, including characteristics of graph states and quantum networks.We introduce the problem setting in Sec.III, and provide a detailed analysis of the initialization and preparation of the whole network, as well as a general picture of the overall process.All the basic tools and mechanisms to add control to classical tasks are introduced in Sec.IV, followed by a detailed example illustrating the procedures required to generate superposition of arbitrary requests within a network (Sec.V).In Sec.VI, we show how quantum controlled addressing functionality can also be included within our network approach.Finally, in Sec.VII we provide different examples or scenarios where the generation of superposed states in a coherently controlled way is desirable and beneficial.We summarize and conclude in Sec.VIII.

II. BACKGROUND
In this section we provide a brief overview of the relevant background material for this work.In particular, we give a short introduction to Bell-states, GHZ-states and graph states as well as a brief discussion about previous works on quantum networks.

A. Bell-states, GHZ-states and graph states
In the following we make use of Bell states.These states are two-qubit maximally entangled quantum states.Specifically, the four Bell states are where i ∈ {0, 1} is called the phase, and j ∈ {0 Such maximally entangled states are a valuable resource for different applications in a distributed setting, including e.g.super-dense coding [35] and quantum teleportation [36].We briefly recall the steps comprising the teleportation protocol, since we will require them later in this work.In quantum teleportation, two communication partners, Alice and Bob, share a perfect Bell pair in the state |Φ + .If now Alice wants to transmit an unknown single-qubit state |ϕ to Bob, she performs a Bell measurement between the qubit to be transmitted and her half of the Bell pair, and sends the outcomes of the measurement classically to Bob.This in turn enables Bob to restore the state |ϕ on his qubit by performing a local Pauli correction operation that depends on the measurement outcome.
GHZ states are the natural extension of Bell states to more than two parties.We define a n-qubit GHZ state as GHZ states are useful for applications such as clocksynchronization [37], distributed sensing [11] and quantum key agreement [38].
Graph states are n-qubit quantum states which exhibit correlations corresponding to classical graphs [39].Generally speaking, graph states are so-called stabilizer states, i.e. states which are stabilized by elements of the Pauli group.Precisely, given a classical graph G = (V, E), where V denotes the set of vertices and E the set of edges, the graph state |G is defined as the unique +1 eigenstate of the set of operators for all a ∈ V , where the superscript indicates on which qubit the Pauli operator is acting on.In other words, K a |G = |G for all a ∈ V and K a as defined in Eq. (3).One easily verifies that the state |G can also be explicitly written as for any vertex a ∈ V , where N (a) refers to the neighbourhood of vertex a.This decomposition turns out to be useful e.g. when merging two graph states.

B. Transformations of entangled states
We make use of different quantum operations acting on entangled states that we recall here.

Bell-measurement
A Bell-measurement is a joint measurement between two qubits, that can be part of some larger entangled state, such that the joint state of the qubits is projected into one of the elements of the Bell basis (Eq.1).We consider Bell-measurements between different states.First, we consider a Bell-measurement between two GHZ-states of arbitrary size, say states |GHZ m and |GHZ n .The state after the measurement is, up to local correction operations, given by |GHZ n+m−2 .On the other hand, we make use of a Bell-measurement between an arbitrary single-qubit state, e.g.|ϕ = α |0 + β |1 , and a GHZstate of size n + 1, i.e. |GHZ n+1 .The state after the measurement reads as up to local corrections of the form {1, σ ⊗n z , σ ⊗n x , σ ⊗n x σ ⊗n z } for each measurement outcome |Φ i .
An extension to qudit systems is straightforward, and results in a state of the form where one uses a d-level GHZ state, i.e. a state of the form Eq. ( 6) with α i = √ d and n + 1 systems as input.We also observe that a GHZ-state is local unitary (LU) equivalent to a graph state.Specifically, we can transform a GHZ state of size n into a graph state by the following local transformation.A GHZ-state of size n is stabilized by operators of the form σ x .Now suppose that we apply a Hadamard rotation to all qubits except the first.Then, because Hσ z H = σ x , the stabilizers transform to σ , which corresponds to the stabilizers of the star graph state.

Cutting of graph states
Graph states show a simple behavior under Pauli measurement of single qubits, which can be described by graphical rules on the corresponding graph.Consider a graph state of the form Eq. (4).A measurement with respect to the Pauli σ z operator on qubit a has the effect that qubit a is cut from the rest of the graph state and the resulting state is |G/a , up to σ N (a) z corrections.Other Pauli measurements lead to additional changes of the resulting graph state, see [39] for details.

Merging of graph states
Consider two graph states, |G 1 and |G 2 , of the form Eq. ( 4).We want to merge the vertices a 1 ∈ V 1 and a 2 ∈ V 2 into a single vertex ã1 .For that purpose we measure a 1 and a 2 with respect to the operators P 0 = |0 00| + |1 11| and P 1 = |0 01| + |1 10|.Assuming we find the measurement outcome 0 w.r.t.{P 0 , P 1 }, the resulting state reads where the state is renormalized.In case the outcome 1 is found in the measurement, one can restore the state of Eq. ( 7) by applying a correction operation of the form σ . That is, the resulting state corresponds to a graph state |G 1 ∪ G 2 where the two vertices a 1 and a 2 are merged into one vertex denoted as ã1 .

C. Quantum networks
The construction of large-scale quantum networks involves several obstacles that need to be overcome.For instance, sending quantum states directly over unconditionally long distances is not possible due to the No-Cloning theorem [40].This obstacles are addressed by socalled quantum repeaters [41,42], which enable for longdistance quantum communication.Different approaches for building quantum repeaters exist, such as by directly utilizing channels and using quantum error correction [43,44], or by exploiting bipartite [45,46], and multipartite entanglement [47,48].Quantum networks utilize quantum repeaters to generate entanglement over arbitrary distances.Quantum networks are also constructed by different approaches, e.g. by using bipartite entanglement (also referred to as quantum repeater networks [16,[49][50][51]), and by using multipartite entanglement [15,17,52,53].In addition, noise and imperfections in transmission channels and network devices have to be tackled.This is the subject of study in fault-tolerant quantum computation [54,55], quantum error correction and entanglement distillation protocols [56,57].Finally, also the organization, management, operation and design of quantum networks poses a significant challenge [14][15][16][17].
Two different approaches how to organize and build quantum networks exist: bottom-up [14] or top-down [15,17].In a bottom-up approach quantum networks combine the resources of the network, e.g.quantum channels or entanglement, depending on the task, in an appropriate manner.For example, suppose that three clients of a quantum network request to share a three qubit GHZstate.In a bottom-up approach, the quantum network devices need to route and make use of the local resources to fulfill the request [49,50,53,58,59].In contrast, quantum networks using a top-down approach first prepare a universal resource which the devices use later to complete all required tasks.For that purpose, quantum networks mainly use multipartite entangled quantum states.If now clients issue a task to the network, the devices manipulate these states according to the task.Top-down quantum networks minimize the waiting times for clients and result in states with higher fidelity (due to less merging).However the network devices need to prepare the universal resource beforehand, and store them until the task should be performed.
In principle, quantum networks can complete different tasks.In this work we focus on two main tasks: the transmission of quantum information between two (or more) distant communication partners, and the generation of multipartite entangled states shared among different clients [15][16][17]60].Some of the concrete (sub)tasks we investigate in this work include: (i) Sending of quantum information by means of quantum teleportation [36].
(ii) Sending of qubits via quantum channels.
(iii) Sending of quantum information through certain paths of a network.
(iv) Distribution of quantum information among network devices.
(v) Preparation of certain multipartite entangled states between arbitrary network devices under request, including state manipulation (e.g.cutting and merging of graph states).
(vi) Addressing of network devices.
There exist works which study these tasks in detail.For instance, in [50] it was studied how to determine paths in quantum repeater networks.In contrast, Refs.[15,52] study how to generate graph states in quantum networks.However, all of these works have in common that they investigate a single task.In this work we provide functionalities that empower a quantum network such that it is able to also complete these tasks in a coherent superposition.As we will show, there are several examples in which it is useful and beneficial to complete tasks in a coherent superposition, compared to completing them individually or considering the corresponding classical mixture of tasks.

III. SUPERPOSITION OF TASKS IN QUANTUM NETWORKS
In the following we outline the problem setting we consider in this work, as well as the general idea about how we tackle the problem.
For that purpose we consider a quantum network that comprises n quantum network devices.The network devices connect in an arbitrary manner, either by some entangled resource state or via quantum channels.We illustrate our approach for entanglement-based quantum networks throughout the paper, as this case is conceptually simpler.We show later how to extend it to other situations and settings.
We summarize the entanglement resource of the quantum network as the state |ψ res .Additionally, we denote as |ψ aux the global state of the auxiliary qubits belonging to the network devices.These auxiliary qubits are systems locally prepared by each device in a suitably way, and the number of auxiliary qubits stored depends on each task and scenario.The goal of the quantum network is to enable for the coherent completion of different tasks, such as those mentioned above in Sec.II C. We first consider tasks in a limited sense, where we deal with the preparation of superpositions of quantum states.We discuss later if and how this can be extended to more general settings.By this we mean also the superpositions of "applications", e.g.superpositions of sending and not sending, sending among different paths, encoding of information into superposition of different codes, or performing a BB84 protocol in a superposed way.
Suppose that the request for the quantum network is to prepare a superposition of m different tasks represented by quantum states, i.e. the states |ψ 1 , . . ., |ψ m , with weights α 1 , . . ., α m ∈ C. Precisely, the state which shall be prepared by the network devices (the ones actively involved in the realization of the particular tasks), referred to as target state, reads as where each state |ψ i defines the completion of each particular task and can involve resource as well as auxiliary systems.In some cases, the external quantum control (sub-index c) can be deterministically detached, leading to a target state of the form In order to prepare the states of Eq. ( 8) and Eq. ( 9), we propose the following procedure.The tasks the network should perform are specified by a quantum state of a single qudit that one of the parties prepares or receives from outside, which we also refer to as weight state.The coefficients α i ∈ C of this state specify the weights of the superposed target tasks |ψ i , and is supplemented by additional classical information on the operations to be performed.Together with a previously shared n + 1 qudit GHZ-state the parties can prepare the required control state via Bell measurement by the initiator device (Sec.II B 1): We refer to this resulting state as request state.Quantum control of further operations is determined by this request state.The scheme is depicted in Fig. 1.Note that the size of the state Eq. ( 12) depends on the number of devices of the network that take part in this process, and its dimensionality depends on the number of constituents of the final superposition.An important observation in Eq. ( 12) is that each quantum network device stores exactly one qudit.This  (1)   (2)    ( 3)  (4) 1. Schematic illustration of the overall process for a four-device quantum network.Upper-left device acts as initiator.Each grey vertex represents all the resource and auxiliary qubits that each device owns.First (upper-left), the initiator device prepares the weight state of Eq. ( 10), which corresponds to the orange vertex.Further, we require that the four quantum network devices share a five qudit GHZ-state, see Eq. ( 11), which comprises the blue vertices.After the Bell-measurement, the four quantum network devices share the state |ψR of Eq. ( 12).In second place (upper-right), each device applies the corresponding controlled unitaries, using the request state |ψR and their auxiliary qubits |ψ aux , to the resource state of the network |ψ res in a coherent way.The maps C (i) are defined as k , i.e. the product of all controlled unitaries for one particular network device.In this way, the desired coherent superposition is generated (bottom-right).Finally, all control registers, except the initiator one, are measured and the desired superposed state (up to corrections) of Eq. ( 16) is generated (bottom-left).
enables each network device to apply controlled unitaries on the resource and auxiliary states |ψ res |ψ aux of the quantum network.We imitate the behaviour of controlled-tasks by suitably adding control at the level of unitary operations.More specifically, the request state of Eq. ( 17) enables the quantum network device j to apply controlled unitaries U i for 0 ≤ i ≤ m − 1, i.e. operations of the form Each device is provided beforehand, together with Eq. ( 10), with a classical description of what unitary they have to apply for each state of the control register.Unitaries U (j) i for 0 ≤ j ≤ n − 1 are coherently applied by all quantum network devices, i.e. the application of the controlled unitaries of Eq. ( 13) for 0 ≤ i ≤ m − 1 and all 0 ≤ j ≤ n − 1 to the resource and auxiliary state |ψ res |ψ aux results in the state Therefore, the request state |ψ R of Eq. ( 12) enables the network devices to apply unitaries in a coherently, controlled and synchronized manner (see also Fig. 1).These unitary operations are applied on both, the resource and the auxiliary qubits, which are adequately prepared by each device.
In a next step, all quantum network devices except the initiator device measure their qudits w.r.t. the generalized Pauli σ x observable, such that |k ⊗n c → |k c , up to phases.In this way, the initiator device becomes the only one still holding the control system of the resulting state.One straightforwardly verifies that we can always transform the resulting state to by applying local corrections consisting of some phases that can be corrected by simply acting on the remaining control register.By defining |ψ |ψ aux , we can rewrite Eq. ( 15) to where the states |ϕ i involve the resource and auxiliary qubits in a non-trivial way.
The suitable application of the unitaries in a controlled way intends to imitate the behaviour of certain tasks in a coherent way.As we show later, in order to accomplish this and generate the target state |ψ T1 of Eq. ( 8), such that states |ϕ i relate to the states |ψ i , each particular task has to always be implemented.The implementation of the task usually involves measurements, such as a Bellmeasurement or a merging measurement.The crucial point is if these measurements are applied on desired or on dummy states.In this way, adding control at the level of unitaries allows us to effectively add quantum control at the level of tasks.We remark that the unitaries are known, and correspond to SWAP operations.
In case that one wants to get rid of the control qubit and end up with states of the form Eq. ( 9), we observe that, in general, this is not possible.A measurement of the generalized Pauli σ x observable on the qudit of the initiator device may lead to a change of the weights α i of the superposition in Eq. ( 9), therefore jeopardizing the coherence.However, in case that the states |ψ 1 , . . ., |ψ m are mutually orthogonal, one obtains with probability 1/m the state m−1 i=0 α i e χi |ψ i via a generalized Pauli σ x measurement, up to unwanted phases χ i .In some cases these phases can be corrected using local operations on the remaining systems, although this is not always possible.Hence, orthogonality of the final constituents turns out to be a crucial property.In Sec.V B, we propose a procedure that in some relevant cases allows us to guarantee this orthogonality and correct unwanted phases, therefore being able to get rid of the control register deterministically.In all other cases, additional entanglement is required to resolve this issue.

A. Fully quantum description
So far, we have assumed that the description of the desired target states and the required actions is given classically for all branches.This is typically the case for all single-task requests in networks, and hence it is also natural to assume this for the superposition of tasks.
However, we point out that this description can be made fully quantum.In order to achieve this, a program register is attached and sent to the devices, which encodes the information of the actions to be performed by each device, depending on the request state.Thus, the global state can be defined as This program register has to be attached together with the request qubits that are distributed among the network devices, by modifying the GHZ state construction of Eqs. ( 10)- (12).The first register of Eq. ( 17) is the request register of Eq. ( 12), a bit-string data register which defines the operations applied in each case.The second register is the aforementioned program register.The program register encodes the information of all the unitary operations needed, and is implemented in each device j by a programmable quantum array gate, in analogy to [21,22].It has the following effect: where |R U is some residual state.Essentially, for any input control state, it invokes the operation k |k c k| ⊗ U k , where U j k acts locally on the resource and auxiliary qubits of the j network device.Note that, following [21,22], a deterministic programmable array is realizable when considering a finite number of tasks, e.g. the generation of superpositions of graph states, since in this case we deal with a finite number of unitary transformations to be encoded and invoked by the program register.When demanding full functionality, i.e. an infinite number of possible tasks asuch as the generation of all possible target states, the restrictions of programable gate arrays apply [21,22].Observe also that, even for a finite number of tasks, the residual states have to be taken into account during the rest of the process and, in principle, cannot be detached deterministically.

IV. MIMICKING QUANTUM CONTROLLED CLASSICAL TASKS
In this section we show indications that adding quantum control to classical tasks in a way that is desirable for our purpose is in general impossible.We introduce an approach based on controlled unitary operations that allows us to overcome this problem and imitate the effect of different controlled tasks, including controlled measurements on partially known states or controlled sending of information, in a coherent way.We show applications of our approach that allow one to effectively add quantum control to different classical processes.
A. Coherent controlled measurements on arbitrary pure states The feasibility of adding quantum control to quantum measurements has not been explored previously.Given the fact that adding control to unknown unitaries is in general impossible [27][28][29], one can expect similar nogo results for adding control to measurements.In addition, a measurement is by definition an incoherent process, which poses additional challenges when attempting to add control in a coherent way.
The first challenge is already a proper definition of the desired functionality, i.e. how one formally defines a controlled-measurement operation.A formal discussion about it goes beyond the purpose of this paper.We restrict ourselves to one particular desired effect of a transformation that can be interpreted as a certain kind of controlled projective measurement acting on pure states.Several indications show that the transformation we require is not a valid quantum operation in general (see Appendix A).However, we also show that we can actually mimick the desired behavior on pure states, which is sufficient for our purpose.In the following we consider performing known measurements on unknown quantum states, and adding control to this process.We will later restrict to performing known measurements on partially known quantum states.
The desired effect of the transformation is to obtain a coherent superposition of a state being measured or not, depending on the state of an additional quantum control register.In particular, if the control register is |0 , the input state should remain the same.If the control register is |1 , a particular, pre-defined measurement should be performed on the input state.A measurement is however a stochastic process, where with certain probability one out of several outcomes is obtained.What we actually demand is that for each of the possible outcomes of the measurement (which we also denote as branches), we obtain a coherent superposition of the unperturbed state, and the properly renormalized state after obtaining this particular measurement outcome, in such a way that the weights in the superposition are the same for all branches.In addition, each of the branches should happen with the probability p k , that corresponds to the measurement outcome k.
Therefore, consider two qubit registers.The first one, the control register, is given by the state where coefficients α 0 and α 1 define the weights of the desired superposition.The measurement is performed in a controlled way on some pure target state |ψ .We consider a POVM {A k } with k A † k A k = 1.When obtaining an outcome k, the state after the measurement is given by |ψ k = A k |ψ / √ p k , which occurs with probabil- The desired effect for an arbitrary projective measurement M is thus Notice that we have left out an additional register for the state of the measurement apparatus, as one would usually include in a formal description of the measurement process.In a standard description, including the state of the measurement apparatus, the target state for a particular result of the measurement would read as i.e. the state of the measurement register factors out.We give some further details in Appendix A. In general, the transformation of Eq. ( 20) is however non-linear, and can hence not be realized by a quantum mechanical process.There is also an inconsistency for mixed input states.If one takes this desired behavior -that is only defined for pure states-to derive the action on mixed states, this action is actually not well defined.When we assume linearity (i.e. the existence of a quantum mechanical process that can realize the desired behavior in general) and consider two equivalent descriptions of a mixed state using different basis states, one obtains different predictions for the target state.We take this as indications that adding control even to known measurements is in general impossible.We leave a formal description and discussion to further work.

B. Controlled measurements on known states
Although the transformation of the previous section seems in general not physically realizable, we show how one can effectively reproduce its effect in a suitable way.To this aim we consider a two-outcome projective measurement with a qubit control register for simplicity.However an extension to general measurements is straightforward.Consider three qubit registers, a control, a target and an auxiliary register.The process now consists of the following steps.First, we apply a controlled swap operation, also known as Fredkin gate [61,62], acting on the target and the auxiliary qubit, which is controlled by the control qubit (see Fig. 2).After that, we measure the auxiliary qubit.In order to induce the coherent superposition from the control qubit, we need to choose the auxiliary qubit accordingly.Note that we denote here the input state to be measured as target state.
The initial global state is given by and some auxiliary state |φ aux .After the controlled swap operation is applied (Fig. 2), we find (21) Finally, a general projective measurement {P 0 , P 1 } = {|ψ 0 ψ 0 | , |ψ 1 ψ 1 |} is performed on the auxiliary qubit.In order to maintain the weights of the superposition unchanged, the auxiliary qubit has to be suitably prepared Controlled measurement is performed by a controlled-swap operation, also known as Fredkin gate [61,62], followed by the measurement of the auxiliary qubit.The auxiliary state has to be suitably prepared depending on the measurement basis and the target state, in order to guarantee that the weights of the final superposition do not change.
depending on the measurement basis and the target state.Therefore, the measurement basis, as well as the amplitude probability distribution of the target state, has to be known.The target state can be written in the measurement basis {|ψ 0 , |ψ 1 }, i.e. |ϕ t = j,i ψ j |i |ψ j .The auxiliary state has to be prepared with amplitude probabilities | i ψ j |i | 2 , also written in the measurement basis.In this case, after the measurement is performed and the outcome, say 0 (from P 0 ), is obtained, the resulting global state is In this way, a superposition of the target state being measured or not is generated.
Although this construction might not seem very useful at this stage, interesting properties arise from it when e.g. the target state is part of a larger entangled state.Consider a system a from an arbitrary entangled state where a belongs to party A, who performs the controlled measurement.The state of a is determined by its reduced density operator ρ a .Given the same projective measurement as before, i.e. {|ψ 0 , |ψ 1 }, the auxiliary qubit of A has to be adequately prepared in some pure state ρ aux = |φ aux φ|.The weights of this state are again chosen in order to ensure the same probabilities for the measurement outcomes as for ρ a , i.e.

| φ| ψ
where P i defines each projector |ψ i ψ i | of the measurement.By writing the auxiliary state in the measurement basis, |φ aux = α 0 |ψ 0 +α 1 |ψ 1 , one can immediately see that the weights α 0 , α 1 need to be chosen accordingly to the diagonal elements of the reduced density operator ρ a , also written in the measurement basis, such that Once the state is prepared, the controlled swap is performed between ρ a and ρ aux , followed by the measurement of the auxiliary system.Since both branches have the same probability distribution, the coherence of the final state is guaranteed.For instance, if the controlled measurement in the σ x basis is done on parts of a larger maximally entangled state, weights can always be kept equal by preparing the auxiliary system in the 1 2 1 state.In the same direction, if the larger entangled state is some arbitrary graph state, this construction allows us to coherently cut qubit a, ending up with a superposition of the system a being part -or not-of the graph state.We explain in detail this, and the completion of other controlled tasks, in the following section.
Note that we require partial knowledge of the measurement basis and the target state.However, this does not represent a problem for our purposes, as we show later.Note also that generalization to qudits and to general multi-outcome measurements is straightforward.

C. Controlled measurements on parts of entangled states
We introduce different tools where the mechanisms presented above allow us to coherently control classical tasks for different purposes.We restrict the analysis, without loss of generality, to qubit systems and superpositions with two constituents for simplicity, but a generalization for an arbitrary number of elements and for qudit systems is straightforward.Crucially, the processes do not change the initial amplitudes in any case.

Controlled sending
Consider the simplest scenario of sending quantum information via teleportation, where a state is teleported by performing a Bell measurement between the state that is teleported and one constituent of a Bell state.One can add control to this process and create a coherent superposition of sending and not sending the state information by applying the following procedure.
Consider the setting shown in Fig. 3. Parties A and B initially share a Bell state and party A prepares the arbitrary unknown state |ψ a1 , which shall be teleported in a controlled way.Additionally, party A possesses two auxiliary qubits, ax 1 and ax 2 , initialized in the states |0 ax1 and |+ ax2 respectively.Party A also owns the control register c.We refer to Appendix B for details.The protocol involves the following steps.First, party A applies a controlled swap operation between qubits a 1 , ax 1 and a 2 , ax 2 simultaneously, followed by a Bell measurement {|Φ i } between qubits ax 1 and ax 2 .The controlled swap transformation is described as where More formally, the protocol starts with the following overall state: where tensor products have been omitted for simplicity.After the controlled swap of Eq. ( 25) is performed, a Bell measurement is carried out on qubits ax 1 and ax 2 .Assuming that the outcome of the Bell measurement is |Φ i ax1ax2 , the final state reads Note that the global state has been re-normalized and the weights of the superposition remain unchanged.Depending on the measurements outcome i, correction operations are necessary.This just involves controlled Pauli correction operations σ i on qubit b, which only need to be applied if the state was sent (i.e.control state is |1 ).
Since the control register belongs to party A, this correction can also be implemented by B always applying the unitary σ i on qubit b, followed by party A applying the controlled unitary We refer the reader to Appendix B for details.
Observe that if the control qubit is in the state |0 , the protocol preserves the state |ψ in the qubit a 1 of party A, and the Bell state |Φ + shared between A and B (qubits a 2 and b).A coherent superposition of sending and not sending the state |ψ is hence achieved.Note that we are able to teleport an unknown state, i.e. the restrictions of partially knowing the state on which applying the controlled measurement do not apply.The reason is that we perform the measurement on part of a maximally entangled state in one branch, which corresponds to a uniform probability distribution for the different measurement outcomes, independent of the state to be teleported.The same is true for the second branch, where the Bell measurement is performed on a product state |0 |+ instead.In Sec.V B we show a procedure to deterministically detach the control register of Eq. ( 27), ensuring the orthogonality of the constituents of the remaining superposition.

FIG. 3. Schematic representation of controlled sending, both the initial state (top) and the final superposition (bottom).
Party A possesses four qubits which are coherently either swapped or not in a controlled and simultaneous way, followed by a Bell measurement of the auxiliary systems ax1, ax2.A superposition of the state |ϕ teleported and kept by A (i.e.not sent) is generated.
We have shown how controlled sending works by means of quantum teleportation.Nevertheless, this formalism is in principle extendible for sending of information through quantum channels, where a dummy state or a desired state is sent through the channel in a coherent controlled way.

Controlled cutting of graph states
Based on the same mechanisms, we discuss here the possibility of controlled-cutting on parts of graphs states in a coherent way.Consider a general graph state of the form Eq. ( 4).Assume one aims to construct a state in superposition of the unaltered graph state and the graph state with qubit a measured out in the computational basis.The party a additionally owns a control register, and one auxiliary system initially prepared in the |+ aux state.The initial state is hence given by We now imitate a controlled cutting of qubit a of the graph state by first applying a controlled swap between the qubits a and aux (see Eq. 4), leading to A single-qubit projective measurement is now performed on the auxiliary system in the computational basis.The resulting state reads where i = {0, 1} is the measurement outcome and the state is not normalized.Assuming the outcome of the measurement is the |0 state, and after re-normalization, the final state is Observe that the graph state |G does not change if the control qubit is |0 , but the operation removes all the edges between vertex a and its neighbourhood of the graph state |G if the control qubit is |1 .Furthermore, the weights of the superposition remain unchanged.
In case the measurement outcome is |1 , a controlled correction unitary of the form |0 0| ⊗ 1 + |1 1| ⊗ Na σz is required to recover state Eq.(31).Note that this operation is always realizable locally since the rest of devices, concretely Na, possesses their own control systems, see Eq. ( 12), before applying the final transformation of Eq. ( 15).

Controlled merging and state manipulation
These techniques can be further combined and extended to obtain full functionality for controlled state preparation of graph states.
In order to obtain this functionality, we discuss here controlled-merging of different graph states.
Consider two graph states |G1 , |G2 of the form Eq. ( 4), which we want to merge the vertices a1, a2.We make use of the merging measurement operation defined by Assume that qubits a1, a2 belong to party A, which also possesses an auxiliary qubit prepared in |+ aux .The initial state is therefore The controlled merging comprises the following steps.First, party A performs a controlled swap between qubits a2 and aux.Note that the swap operation is now applied in case the control register is in the Schematic representation of controlled merging where the protocol is accomplished in the following way.If the control register is in the |0 state, the protocol preserves the two graph states unaltered, while the procedure merges the two graph states if the control register is in the |1 state.
|0 state.Next, party A applies the merging measurement of Eq. ( 7) on qubits a1 and a2, merging them into one vertex ã1.Observe that the superposition amplitudes do not change.More precisely, the state before the merging measurement is: up to normalization.In Appendix C the details of the process are provided.If the merging measurement is now performed, and assuming that the outcome is 0, the resulting state reads where qubits aux and a2 have been relabelled (see Appendix C).In case the outcome 1 is found in the merging measurement, a controlled correction operation of the form is required to recover the state Eq.(33).Therefore, the final state consists of a superposition between two graph states preserved unaltered, if the control qubit is in the |0 state, and two merged graph states, if the control register is in the |1 state.Again, the reason why the process can be performed on unknown (connected) graph states is that at least one of the qubits to be measured is part of a maximally entangled state.

V. EXAMPLE OF QUANTUM CONTROLLED REQUEST. ORTHOGONALITY OF STATES
In this section we provide a detailed example of a particular quantum controlled request in a quantum network.As mentioned before, orthogonality of constituents of the final superposition turns out to be a crucial property to guarantee coherence when dispatching the control register.We discuss possible solutions to tackle this problem in general.

A. Example
With the tools introduced in the previous section, multiple tasks can be completed in a coherent controlled manner.
Consider the following example of a network request.Each device of the network represents a single user or node, and each of them shares a Bell pair with each of the remaining ones.This is the initial entangled resource state in an entanglementbased top-down approach to quantum networks.Every node possesses an additional auxiliary qubit per each resource Bell state it owns, apart from the control register.In principle also a full quantum description of the desired actions can be provided by adding a program register.In total, each device stores 2 + 2(n − 1) qubits, where n is the number of users.For simplicity, we assume that the network consists only of four devices, such that the resource state is given by (see Fig. 5) with Φ + the Bell state of Sec.II A and  8), is a equal-weight superposition of all the possible 3-party combinations of GHZ states, i.e.
where |GHZ N/i indicates a GHZ state shared among the other three parties, excluding system i.The remaining auxiliary states are omitted for simplicity.
FIG. 5. Schematic example of the initial state (upper figure) of Eq. ( 34) and final desired superposition (bottom figure) of Eq. (41).Red vertices represent the resource qubits and blue vertices represent the auxiliary qubits, which are omitted in the bottom picture for illustrative simplicity.
The whole process is carried out by effective controlled operations in every node.In each site, three "rounds" of controlled-merging operations (see Sec. IV C 3) are performed.Each round specifically consists in taking two-by-two resource qubits, that are subsequently merged -or not-in a controlled way.Following Sec.IV C 3, the controlled swap operations of each round are defined by the request control register of each of the devices.In each round the result can be the merging of the two resource Bell states at that site, or the resource Bell pair not becoming part of a larger GHZ state, in case the swap has been performed.In this last situation, the Bell state is retained at the auxiliary level.Observe that for retaining the Bell pairs at the auxiliary level, synchronized actions between devices are required.In particular, in both devices the swap operation need to be performed within a particular branch of the superposition, such that the initial resource Bell state they share is kept between their auxiliary systems.In order to obtain the target state of Eq. ( 35), one can combine controlled-merging with controlled-cutting (Sec.IV C 2), such that the auxiliary qubits are measured after each round and no entanglement is kept at the auxiliary level.
Consider now only one branch of the superposition, the corresponding to the element i = 1 of Eq. (35).Consider for instance the device j = 4, which performs three controlledmerging rounds, from which one involves the swapping, synchronized with device j = 1.The corresponding resource Bell state shared by j = 1 and j = 4 is therefore kept at the auxiliary level.The other two parties do not swap, and hence the resource Bell pairs are merged into a larger GHZ state (see Sec. IV C 3), leading to where we have omitted the remaining resource and auxiliary qubit states for simplicity.Observe that the Bell state in Eq. ( 36) involves the auxiliary qubits of devices j = 1 and j = 4.
We can combine this with a controlled cutting process (see Sec. IV C 2).After each merging round, the auxiliary qubit is hence always measured in the computational basis, such that the resulting state reads where we have assumed the outcome |0 of the measurement is found and the remaining resource and all auxiliary qubit states are again omitted.Note again that merging and cutting affects only this branch of the superposition.In extension, this process applies for the different branches and the different network devices, such that the process of Fig. 5 is accomplished.
Observe that, when combining controlled merging and controlled cutting, only one auxiliary qubit is required to be stored per site, independently of the resource state.This auxiliary qubit is measured in each round and prepared again in the |+ state, such that it can be used for the next merging round.Note also that, in the case the controlled cutting is included, entanglement kept at the auxiliary level is destroyed.In contrast, if controlled cutting is not included in the procedure, the resource entanglement is kept anyway, either at the target or auxiliary level, but extra storage for auxiliary qubits is needed for each device.
Following with the example, the state after the remaining controlled operations and considering the different branches is exactly of the form of Eq. ( 35) (see Fig. 5).Observe that the effect of unwanted measurement outcomes can be adequately corrected locally, as explained in Sec.III.These procedures are extensible for different initial entanglement resources and for different desired states within the superposition, including e.g. generation of superposition of states with different entanglement properties.The applied operations depend entirely on the desired target states.
In addition, one might aim to detach the control register from Eq. (35), in order to obtain in analogy to Eq. ( 9).From Eq. ( 35), the initiator device has to measure its control register in the generalized Pauli X basis.However, two problems arises at this stage.First, one can see that the states of the superposition of Eq. ( 38) are not orthogonal to each other.Therefore, Eq. ( 38) is not a coherent superposition of the different constituents.On the other hand, the X measurement of the control register can lead to unwanted phases in the different elements of the superposition, which cannot be a-priori corrected.This two inconveniences can be adequately overcome by considering the following modification.

B. Orthogonality of target states. Extra-level modification
We show a modification that allow us to go from Eq. ( 35) to Eq. ( 38) deterministically, such that the coherence of the final superposition is guaranteed.This modification can be extended to more general cases.
A simple trick can be used to ensure orthogonality of the target states.It consists in providing extra levels (qudits) for certain systems and applying the controlled operation invoking the map {|0 , |1 } → {|2 , |3 } between subspaces.In Eq. ( 39), X is the generalized Pauli operator for d-level systems, such that X |j = |j ⊕ 1 , with addition mod d.This controlled operation becomes now part of the procedure, implemented in suitable places for the different branches.Observe that this operation should be applied before the control registers, except the initiator one, are measured (see Sec. III).
Following the example of the previous section, the final state with the extra-level modification reads now The control register can be now measured, ensuring the orthogonality of the elements of the resulting superposition.Not only the orthogonality issue is resolved, but one can also correct the state in case of unwanted phases come from the measurement of the control register.Depending on the outcome of the measurement, each party applies an adequate controlled correction unitary of the form where the operator U (i) depends on the outcome of the measurement and the position it is applied.A coherent superposition is finally found, where all the constituents are now orthogonal to each other.Note that before each device was required to store one qudit system, corresponding to the request register.With this modification, more than one dlevel systems have to be stored in each station.We remark that two qubit systems can be always be embedded to play the role of a four dimensional system, by defining This modification can also be implemented, for instance, in the controlled sending setting introduced in Sec.IV C 1, where target states are not orthogonal if the control register is measured.There, one just need to implement, at the final stage of the process, the transformation {|0 , |1 } → {|2 , |3 } in a controlled way.From Eq. ( 27), this controlled operation is applied on the auxiliary system a2 if the control register is in the |0 c state, and on the qubit a1 if the control register is in |1 c This mechanism can also be extended and used in more general situations, for those target states whose constituents are not orthogonal.In order to be able to apply this modification, for each target state in the superposition there should always be a different node which is not involved in the process.

VI. QUANTUM CONTROLLED ADDRESSING
So far, we have shown how to provide quantum networks with a truly quantum functionality, based on the generation of superpositions of different tasks in a controlled way.This is accomplished by mimicking the behavior of certain classical tasks in a controlled way, always performing the task.
An additional addressing feature can be included on top of our approach.Consider again a quantum network consisting of different devices.Each device would own an addressing system, adequately prepared in some quantum state.This register works as an addressing register (ad), identifying each of the devices.Additionally, depending on the target network objective, they are provided with an activation register (ac).The addressing and activation registers determine, when compared, if the device takes an active role in the process or not.The comparison is simply performed by a generalized Toffoli operation [63], acting locally on each device j (see Fig. 6), i.e.
where P m i = |i i| are the projectors of the m register, and X is the generalized Pauli operator σx of dimension d.The target state where the operation acts on is the request register (rq) -also denoted as control register (c) in previous sections-, that determines the control over the actions that the device applies in order to generate the requested superposition.The request system is hence prepared in such a way that no actions are invoked, in a controlled way, if the Toffoli operation is unsuccessful, and some particular operations are invoked if the Toffoli is performed, taking into account the effect of the Toffoli operation in each device.
In summary, the roles of the involved registers are the following.The addressing qubit labels or addresses each network device.The activation qubit identifies each device unequivocally and decides its activation.Only if these two register states match, the device is correctly identified and effectively turned on.Otherwise, in case their states differ, it means that the device is not involved in the process for that concrete request, and there is no need to activate it.This process is only implemented once.In case the device is activated, the role of control register is thus transferred to the request register.Subsequently, this request register defines the control of the applied operations (see Fig. 6).The information of the actions requested to obtain the desired output state is encoded in the program register.
Following the fully quantum setting description of Eq. ( 17), in case the device is effectively activated, the controlledoperation of Fig.
6 invokes an operation of the form via the program register, as explained in Sec.III A. The rest of the procedure takes place in an analogous way than for previous sections, but with the additional controlled addressing feature, which completes the fully quantum description of Sec.III A. Observe that the inclusion of the activation register, together with the program register, allows in some way for a remote invocation of the applied controlled unitary operations.

VII. APPLICATIONS AND FEATURES
In this section we analyze the applicability of the mechanisms and techniques presented so far.We have introduced procedures to obtain coherent superpositions of tasks.We discuss now how the generation of these superpositions can lead to advantages in different contexts.In order to do a reliable analysis that justifies the benefit of generating such 6. Schematic illustration of controlled addressing.Each device of the network possesses an addressing register prepared in |ϕ ad , as well as the resource and auxiliary qubits (grey vertices).Note that each device owns some number of resource and auxiliary qubits, but we represent all of them unified in one for simplicity.Additionally, each device is provided with a request register |ϕ rq , a program register |φU and an activation register |ϕ ac .A Toffoli gate is applied, such that only if the addressing and activation registers match, the device is effectively turned on, and the control of the operations is now defined by the request register state.A programmable operation G (Eq. 18) is applied, controlled by the request register, resulting in the coherent application of some unitary U on the device's resource qubits |ϕ (j) res (see Sec. III A for details).
superposed states (see Eq. 9), in general, one has to compare them, firstly, with the corresponding classical mixtures, defined by the a-priori classical probability distribution of the different target states, i.e. |ψT = i αi |ψi ψi|.Secondly, one has to compare the superposition features with the properties of each individual constituent generated according to some probability distribution {αi, |ψi }.Orthogonality between the different constituents of the final superposition is a crucial requirement to make these comparisons trustworthy.
For simplicity, we assume superpositions with equal-weight coefficients in most of the examples.However, they are extendible to arbitrary-weight superpositions.

A. Entanglement structure
An important advantage that motivates the generation of states in superposition is the entanglement structure it provides.We show two examples where this structure is found beneficial for the generated superposed states.

Bound vs. maximal entanglement
Consider a network of four devices (see e.g.Fig. 5) which implements the protocols explained in previous sections in order to generate the state where {Φi} defines the basis of Bell states for qubits (Eq.1).Note that in this case, the control register can be deterministically detached without changing the weights or turning into extra-level systems, by just measuring it in a generalized σx basis.The corresponding phases of the different measurement outcomes can be corrected in a local way by appropriate unitary transformations of the form 1, such that the resulting state reads Note that the corresponding classical mixture is ρ = 1 4 3 i=0 |Φi 12 Φi| ⊗ |Φi 34 Φi|, the well-studied state socalled Smolin state [20].An important property of this state is that it is bound entangled, meaning that, although entangled, the entanglement of distillation is zero, and hence pure entanglement cannot be locally created between any bipartition of a single qubit and any of the others.In opposition, the state Eq. ( 44) is purely maximally entangled with respect to all the bipartitions, i.e. the reduced density operator of each bipartite cut corresponds to the identity operator.
Additionally, when comparing the superposed state of Eq. ( 44) with the individual constituents chosen from a given probability distribution, one can clearly see that, while all bipartitions of the superposed state are maximally entangled, there exist bipartitions with zero entanglement, e.g. between systems {1, 2} and {3, 4}, for the individual case.Therefore, there exists a clear motivation in terms of entanglement for generating states of the form Eq. ( 44), instead of working with the individual elements or the classical mixture of the constituents.

Entanglement vs. no-entanglement
Our approach can also be conceived as a hierarchical entanglement decision tool, where the control register can determine, at a later stage, if the final state is entangled or not.This can be simply seen from the following example.With the tools introduced in this work, we can generate a state of the form between two systems 1 and 2. Subsequently, the initiator device, which owns the control system, can decide from the outside, by appropriately choosing the measurement basis, if the final state will be entangled or not.A projective measurement of the control qubit in the Pauli σx basis leads to a Bell state between parties 1 and 2, while a measurement in the Pauli σz basis leads to a product state, up to local corrections.In both cases, these corrections can be applied locally.In particular, for the first situation, the state Φ + can be obtained deterministically.

B. Stability under losses
In several cases, states in superposition also exhibit stronger stability, in terms of entanglement, under errors or losses.

Superposition of GHZ states
Consider again the state Eq. ( 41), i.e.
which consists of all the possible permutations of 3-party GHZ states shared among 4 different parties, where the extra-level modification is included to ensure orthogonality between elements.In Sec.V A and Sec.V B the detailed process to generate this state is provided.When e.g. two systems of the state Eq. ( 46) are lost or traced out, the remaining state is still entangled at a bipartite level.More precisely, the remaining state has negativity N = 0.1, where the negativity is defined as the absolute value of the sum of the negative eigenvalues of the partial transposition of the state, N = ||ρ Ta ||−1 2 .However, if one studies the corresponding classical mixture, i.e.
under analogous circumstances, i.e. two systems are lost, one can observe that the state Eq. ( 47) becomes separable.In the same direction, in case only one system is lost, the state resulting from Eq. ( 46) presents larger entanglement than the one resulting from the classical mixture, Eq. ( 47) with respect to all the bipartitions.One can also compare the superposition of Eq. ( 46) with respect to the individual constituents generated from a probability distribution.In this case, given a single GHZ state, two immediate features arise.First, as before, when two systems are lost, it always leads to a separable state.Secondly, assume the control register has not been detached and one system is lost.Therefore, from the superposition of Eq. ( 46) one can always probabilistically go to a perfect GHZ shared by three parties, by simply measuring the control register in the Pauli σz basis.This is not possible in the individual-constituent case.
Similar results are found when considering superposition of all the possible Bell pair connections between three parties, as well as when considering superposition states of increasing entanglement order, i.e. between product states, Bell states and GHZ states as elements of the superposition.

Superposition of states with different entanglement structures
One can also provide the control register with the possibility of deciding the entanglement structure of the final state.Similarly to Sec.VII A 2, we can generate a state of the form where Therefore, by choosing the measurement basis of the control register, the entanglement structure of the final state is decided.If the control register is measured in the Pauli σz basis, a GHZ state is found.However, if the control qubit is measured in the Pauli σx basis, a cluster state C1D is obtained (up to phase corrections), where |C1D = 1 2 (|0000 + |0011 + |1100 − |1111 ) is the one dimensional cluster state.
In a similar direction, one can also generate superposition of states with different entanglement structure.Consider for instance the state Note that the states C1D and GHZ are orthogonal.The state of Eq. ( 49) exhibits similar properties as the ones in the previous examples.Once the control register is measured and detached, since orthogonality condition is fulfilled, and considering that two systems are lost, the remaining state is still entangled, with negativity N = 0.35 for each of the branches of the measurement.In opposition, the corresponding classical mixture, becomes separable under the same assumptions.For one lost system, the remaining entanglement is again larger in the superposition case, in terms of negativity, for any bipartition cut.Similarly, if one considers each state individually, one finds that each state becomes separable if two systems are lost, while the superposition remains entangled.Further examples exist where the superposition always exhibits stronger entanglement robustness under errors or losses of systems, when comparing with the corresponding classical mixture.In particular, the examples presented above stress the motivation of generating superposition states due to their entanglement stability under losses, where indeed the corresponding classical mixtures become separable in some situations.

C. Superposed destinations
The techniques introduced in Sec.IV C 1 to add control to sending of quantum information can be used to distribute information to several parties within a network in a coherent way.Consider an scenario where the initiator device shares a Bell state with each of the network devices.Given some arbitrary state |ϕ = α |0 + β |1 that the initiator owns, and given the tools of Sec.IV C 1, one can directly generate a state of the form One finds a superposed state, whose elements correspond to the state |ϕ being distributed among each of the network devices.In order to detach the control register, one can again apply the controlled-extra level modification explained in Sec.V B, which allow us to correct unwanted phases and, besides, make the final state constituents orthogonal to each other.The final state then reads where ⊕ denotes addition mod n.Note that unwanted phases from the measurement of the control register can be suitably corrected by applying controlled operations of the form |2 2| ⊗ U (i) , where U (i) depends on the position of the |2 state.
An intimidate application of this example is the case where one aims to send information to a subset of parties, but does not want to decide yet who will ultimately receive the information.

D. Superposition of paths
One can also understand the mechanisms for generating states in superposition in the following way.Consider a network with several nodes connected by some resource state (e.g. a 2-D cluster state), where direct communication links between network constituents aim to be established.The simplest scenario, illustrated in Fig. 7, consist of two parties, a and i, between which a direct communication link should be provided.Different approaches for solving this, and more advance routing problems have been studied [49,50,53].Typically, for qubit graph state resources, the easiest way to connect parties a and i (Fig. 7) consists in finding the shortest path between the two parties and measure the intermediate nodes in the Pauli σx basis, followed by Pauli σz measurements of the path neighbourhood.Following our approach, consider some resource state |ψ res and a control register attached, as explained in previous sections, Based on the example of Fig. 7, the desired target state is Φ + ai , and an equal-weight superposition between two different possible paths to reach that target state can be prepared, i.e.
The Pauli operators σz act on the neighbourhood of the elements of each path, where paths are labelled as 0 and 1, in order to isolate the desired Bell pair connection.Each constituent of the superposition defines the actions to be done for each case, leading to a final state of the form where the desired Bell pair is obtained in both cases, but following different directions, therefore modifying the resource state in different ways.One possible application of this scheme regards the protection against errors.Since a path does not have to be chosen beforehand, the process is consequently protected against possible failures or errors of individual nodes of the resource.Example of superposition of paths.Given some resource state (e.g.2D cluster state) connecting several nodes in a network, a coherent superposition can be obtained in a controlled way between different network routes in order to connect two parties (a and i).

E. Encoding and delocalized quantum information
One can also conceive the quantum network as a tool to distribute and store quantum information.In particular, the protocols allow one to generate the states required in order to encode quantum information into a network of several devices in a straightforward way.Instead of getting rid of the control register, it can be used to encode and delocalize quantum information.Following [64], consider a state of the form with two codewords |0L , |1L , which are essentially two orthogonal states of n qubits correpsonding to some error correction code.As we have shown, the tools presented in this paper provide the possibility of generating states of the form Eq. ( 56), for different codeword pairs.From state Eq. ( 56), the control system can encode the information of any arbitrary state |ϕ = α |0 + β |1 by distributing it throughout a n-party network.This is simply accomplished by performing a Bell measurement between the initiator control qubit and the arbitrary state qubit, such that the final state reads This delocalization process offers a natural protection of the quantum information under errors or losses of individual parties.In the same direction, this construction can be useful for some settings in the context of quantum secret sharing [6,7], where a dealer (the control system) aims to share a secret between all the constituents.The secret is defined by parameters α, β and only authorized sets of parties can, collaboratively, access to it.

F. Other applications
We briefly discuss in this section some ideas for possible further applications of adding control to different tasks in a coherent way, although we do not discuss them in detail.We hope that this work motivates additional analysis and extensions for these and other applications.

Superposition of QEC and QKD protocols
Similarly to Sec.VII E, one can generate superpositions of different encodings or codes such as e.g.quantum error correction (QEC) codes [65,66].Consider two codes, C1 and C2, where e.g. one is particularly adequate for correcting amplitude-bit errors and the other for correcting phase-bit errors.We conjecture that a superposition of both, i.e.

|Ψ = α|ψ
might lead to advantages for correcting certain kind of errors under specific circumstances.On the other hand, one can also consider Quantum Key Distribution (QKD) protocols [3,4].The simplest case, the socalled BB84 protocol [4], basically consists in Alice preparing a bit string of qubits in the |0 or |1 states out of two possible bases (e.g.σz and σx bases).The information of the bases is encoded in another bit string.The qubit bit string is sent to Bob, who randomly chooses a basis to measure each qubit.By classical publication of the chosen bases of each one, they can, by comparison, generate secure quantum keys protected from attacks.With our mechanisms, one can for instance, generate superposition of different BB84 protocols, in such a way that each constituent of the superposition involves a different BB84 with a different pair of bases, such as e.g.{σz, σx}, {σz, σy} and {σx, σy}.This might improve the protocol performance, including the number of qubits required or the stability under errors.

Sending of qubits
We have considered in this paper sending of quantum information via teleportation.Following Sec.IV C 1, we are able to generate states in superposition between teleporting some desired state and not teleporting any useful information (or not teleporting at all).This framework can be extended to directly sending -or not-a qubit via quantum channel.More precisely, the information carrier should be sent or not.When using ions or atoms as information carriers, this implies that the classical process to send the atom or not needs to be controlled -or alternatively an atom is always transmitted, either the one carrying information or some auxiliary one prepared in a dummy state.The latter solution however requires the usage of the channel also in cases where no quantum information is transmitted.
In the more realistsic setting where photons are used as information carriers, one should be able to add control at a quantum level.Following some of the existing techniques in cavity-QED with ions in cavities (see e.g.[67]), where the internal state of the ion is mapped to the cavity field that eventually leaks out and is transmitted as a photon, one should be able to generate such a superposition state by just adding control to the mapping process via a second ion stored in the cavity.No photon will be generated (and hence transmitted) if the control qubit is in state |0 .

Distributed quantum sensing
Quantum metrology [12,68] allows to carry out high precision measurements of certain physical quantities with an improved precision as compared to classical techniques.In particular, distributed quantum sensing [12] consists of distributed multi-partite entangled sensor states, located and measured at different positions, in order to determine certain non-local physical quantities such as field gradients or higher moments of a scalar field.The quantum systems are prepared in particular states and evolve for a certain time, before they are finally measured in a certain way.With the techniques shown in this paper, one would be in principle able to generate superpositions at any step of the sensing process, including superposition between different experiments, e.g. between the measurement of some component of a constant field and the gradient on another component.We conjecture that the generation of these superpositions could lead to better efficiency and performance results for distributed quantum sensing procedures.Note however, that further extensions or modifications of our methods would be needed.While in principle we can establish coherent superpositions of different experiments, including the preparation of different states and running experiments for different times, at the level of measurements a problem arises.By definition, quantum metrology deals with the measurement of unknown states, as the desired (unknown) information of the quanity of interest is encoded in the states and revealed by measurements.The methods to add coherent control to measurements we presented in this work however require at least partial knowledge of the state to be measured, and are hence not directly applicable.

VIII. SUMMARY AND CONCLUSIONS
In this paper we have shown how to provide quantum networks with a truly quantum functionality.This novel functionality allows network devices to handle or operate with coherent superpositions of different tasks.The preparation of these superpositions is achieved by effectively controlling classical tasks in a coherent way.Adding explicit control to classical task is, in general, an impossible process.However, we have presented mechanisms, based on the control of quantum unitary operations, that can mimick the desired behavior.The crucial element is that the classical part is not controlled, but always performed, either acting usefully on the desired state or in vain on some dummy state.This mechanism involves the application of controlled-swap operations followed by a measurement of some auxiliary particles.Different tools arise from this approach, such as the possibility of effectively performing controlled-measurements, as well as e.g. the generation of superposition of sending or not sending information, or merging or not merging two graph states.Based on these tools, superposition of different tasks can be generated, either with or without external control.For this later case, we show procedures to suitably detach the control register while keeping the coherence and orthogonality of the state constituents.
Finally, we have shown different promising applications that emerge from our approach.Among them, one can highlight the possibility of preparing superpositions of states shared between different devices, superpositions of distributing quantum information through different paths or to different destinations, and superpositions of encoding information among different devices.These examples demonstrate possible advantages, most notable built-in robustness and favourable entanglement features.We hope that this work motivates future investigations of further possible extensions or applications of the truly quantum functionality of quantum networks introduced here.
FIG. 7.Example of superposition of paths.Given some resource state (e.g.2D cluster state) connecting several nodes in a network, a coherent superposition can be obtained in a controlled way between different network routes in order to connect two parties (a and i).
The states |k m of the measurement apparatus indicate different measurement outcomes, where |0 m corresponds to the case where no measurement is performed.All states of the measurement apparatus are mutually orthogonal and classical (and can hence be copied).This implies that one would actually obtain an incoherent mixture of the unmeasured state and the different measurement branch.One may circumvent this problem -as we do later-by actually always performing a measurement, either on a dummy state to preserve the input state |ψ , or on |ψ .In this case the resulting state is k Additionally, the auxiliary qubit of each device is initialized in the |+ state.Note that a Bell state is LU-equivalent to a graph state, and the choice of the state of the auxiliary qubits is hence motivated by the merging measurement we consider (see Sec. IV C 3) for graph states.In particular, the merging of a qubit of a graph state with a qubit in the |+ state, retains the graph state unchanged.Besides, weight invariance is also guaranteed for the superposition.The desired target state, see Eq. (