Introduction

Quantum teleportation provides a method for transporting unknown quantum states between remote systems based on shared entanglement and quantum measurements1. Teleportation constitutes the fundamental element required to perform a wide range of quantum computation and quantum information tasks in a quantum network2,3,4,5,6,7,8,9. In particular, to construct large-scale quantum computing processors with a modular architecture4,7,10,11,12,13,14,15,16 (Fig. 1a), ideal teleportation is required to connect the various modules within the network4,7,10,13,14,15,16 (Fig. 1b,c). Notably, such an ideal quantum process is also essential for the modularization of quantum networks in which spatially-separated quantum nodes communicate across different modules6.

Figure 1
figure 1

Networking teleportation in a modular architecture. (a) Modular architecture of the quantum network. Each module is regarded as a node of the quantum network and consists of qubits4,7,10,12,13,16. The modules transmit quantum states to one another by performing intra- and inter-module operations4,7,10,11,1316. The architecture can be extended to realize a universal quantum computer by teleporting a controlled-Z (CZ) gate7. (b) Transmission of quantum information among different modules. Due to the isolation between modules, quantum teleportation4,7,10,1316 is utilized to transport an arbitrary quantum state of qubit 0 (purple) from module 1 to module 2 consisting of qubits 1–6. In particular, qubit 0 is entangled with a flying photon qubit7,11,12,14 (gradient purple) via a CNOT-like operation on Alice’s side14. Alice then measures qubit 0 on a specific basis to enable the flying qubit to carry the information regarding the quantum state of qubit 0 to be transported via remote state preparation80. (c) Networking teleportation protocol based on a 6-qubit box-cluster state \(\left|{C}_{b,6}\right\rangle \). The protocol aims to teleport the arbitrary state of qubit 0 from Alice to Bob using a shared entangled state \(\left|{C}_{b,6}\right\rangle \) among Alice, the participants and Bob. The main steps of the protocol are as follows: (i) Bell-state measurement (red) on Alice’s flying photon qubit which carries the information of the quantum state of qubit 0 and qubit 1; (ii) specific local measurements (orange) on participants’ qubits 2–5; (iii) appropriate unitary transformations P on Bob’s qubit N to recover the initial input state (purple) in accordance with the measurement results informed by Alice and the participants. (See text for detailed procedures.).

Recently, IBM launched the IBM Q Experience, which makes universal quantum computers accessible to the general public through cloud service17. IBM has also developed Qiskit18 to provide users with the tools required to run their quantum programs on prototype quantum devices and simulators. IBM Q Experience provides an online platform for the experimental testing of the fundamentals of quantum physics19,20,21,22,23 and a wide variety of applications in quantum information theory24,25,26,27,28. However, while IBM has built both 20-qubit and 50-qubit quantum processors17, a comprehensive characterization of the networking teleportation process for future modular use on IBM quantum devices is still lacking.

Accordingly, we present herein a toolbox for examining the performance of IBM quantum computers, where the networking teleportation protocol is executed. We firstly propose two systematically extensible networking teleportation protocols for a network consisting of N parties based on either a box-cluster state or a chain-type cluster state29,30. The proposed protocols possess applicability to arbitrary finite size of modules and the adaptability to the benchmark provided by a generic classical process model31. We then implement the proposed protocol based on the N-qubit box-cluster state on a 14-qubit quantum processor named ibmq_16_melbourne for N up to 12.

A generic classical-process model providing the strictest criteria in order to rule out any classical strategies of mimicry of teleportation31 is utilized for assessing the performance of the real quantum device, on which the proposed networking teleportation protocol is conducted. Through the generic classical-process model, one can identify whether the experimental networking teleportation process is faithful. In the case that the experimental process is identified as faithful, all the elements on real quantum devices required in the networking teleportation process are identified as all qualified for use. The model is defined as input states satisfying the assumption of realism and their evolutions to output states that can be reconstructed as a density operator, where this evolution conforms to classical stochastic theory. Existing identification methods utilize the state characteristics to verify the teleportation of IBM Q24,25,26, solid-state systems32,33,34, trapped atoms35,36, photonic qubits37,38,39,40,41, atomic ensembles42,43 and satellite-based systems44,45. By contrast, the present study provides a novel toolbox consisting of the two scalable N-qubit networking teleportation protocols and the criteria for identifying faithful teleportation.

Results

Cluster states

To implement the proposed networking teleportation protocol, it is first necessary to generate highly-entangled multipartite states (so-called cluster states)29,30. Cluster states with multipartite quantum correlations are considered to be the significant source: basic building block when constructing general modular architectures for quantum networks6.

An N-qubit cluster state \(\left|C\right\rangle \) can be generated by applying the controlled-Z (CZ) gates with a specified configuration to the initial states, i.e.,

$${\left|+\right\rangle }^{\otimes N}={H}^{\otimes N}{\left|0\right\rangle }^{\otimes N},$$
(1)

where \(\left|+\right\rangle =(\left|0\right\rangle +\left|1\right\rangle )/\sqrt{2}\) and \(H=(\left|0\right\rangle \left\langle 0\right|+\left|0\right\rangle \left\langle 1\right|+\left|1\right\rangle \left\langle 0\right|-\left|1\right\rangle \left\langle 1\right|)/\sqrt{2}\) is the Hadamard transformation (H). The state vector \(\left|C\right\rangle \) can then be written in the form

$$\left|C\right\rangle =\prod _{(a{\prime} )\in {\mathcal{I}}(a)}{{\rm{CZ}}}_{(a,a{\prime} )}{\left|+\right\rangle }^{\otimes N},$$
(2)

where \({\mathcal{I}}\)(a) is the set of qubits that physically interact with qubit a, and \({{\rm{CZ}}}_{a,a{\prime} }=\left|0\right\rangle {\left\langle 0\right|}_{a}\otimes {I}_{a{\prime} }+\left|1\right\rangle {\left\langle 1\right|}_{a}\otimes {Z}_{a{\prime} }\) denotes the CZ gate acting on the control qubit a and target qubit \({a}^{{\prime} }\). Here, I is a 2-dimensional identity matrix, and \(Z=(\left|0\right\rangle \left\langle 0\right|-\left|1\right\rangle \left\langle 1\right|)\) and \(X=(\left|+\right\rangle \left\langle +\right|-\left|-\right\rangle \left\langle -\right|)\) are the Pauli-Z matrix and Pauli-X matrix, respectively, where \(\left|-\right\rangle =(\left|0\right\rangle -\left|1\right\rangle )/\sqrt{2}\). The proposed networking teleportation protocol utilizes two different types of physical interaction of the cluster states, namely an N-qubit box-cluster state \(\left|{C}_{b,N}\right\rangle \) (shown in Fig. 2a, top) and a chain-type cluster state \(\left|{C}_{c,N}\right\rangle \) (shown in Fig. 2a, bottom).

Figure 2
figure 2

Schematic of the N-qubit networking teleportation protocols and participants’ specific measurement basis of N-qubit box-cluster state. (a) Schematic of the proposed networking teleportation protocols. The protocol aims to teleport an arbitrary state ρin (purple) using a shared N-qubit box-cluster state \(\left|{C}_{b,N}\right\rangle \) (top) or N-qubit chain-type cluster state \(\left|{C}_{c,N}\right\rangle \) (bottom), consisting of qubits 1–N shared by Alice (pink), the participants (yellow), and Bob (blue). The protocol involves the following three steps: (i) Bell-state measurement performed on qubits 0 and 1 (red) at Alice’s side, (ii) local measurements on the specific basis performed on qubits 2–N-1 (orange) at the participants’ side, and (iii) unitary transformations P (as shown in Eqs. 4 and 6) on qubit N (purple) to recover the teleported state at Bob’s side. (b) Participants’ specific measurement basis in the case of \(\left|{C}_{b,N}\right\rangle \) with positive even integers from 4 to 12 (from diagrams (i) to (v), respectively). The notation Qni indicates that the logical qubit i in the protocol description corresponds to the physical qubit n on the 14-qubit ibmq_16_melbourne device.

Notably, the advantages are twofold for the teleportation protocols to use either chain-type cluster states or box-cluster states. First, according to the connectivity map of 14-qubit ibmq_16_melbourne device and the other quantum devices on IBMQ17, chain-type cluster states and box-cluster states are the most feasible and applicable types of entangled states to be generated. Second, these two types of cluster states are natural resources to be integrated into different and complex networking protocols, such as universal measurement-based quantum computation30,46,47,48, error correction49,50,51,52, blind quantum computation53,54,55,56, as well as quantum cryptography like quantum secret sharing57,58.

Networking teleportation protocols

This section presents a general description of the proposed networking teleportation protocol, wherein either an N-qubit box-cluster state \(\left|{C}_{b,N}\right\rangle \) (Fig. 2a, top) with positive even integer N up to 12 or an N-qubit chain-type cluster state \(\left|{C}_{c,N}\right\rangle \) (Fig. 2a, bottom) with arbitrary positive even integer N (Fig. 2a), is employed. The proposed protocols are applicable to arbitrary finite size of modules (Fig. 1). It should be noted that Fig. 1 illustrates the concept of performing our protocols in a modular architecture, where the flying photon qubit is required for the Bell-state measurement performed by Alice because of the separation between the modules. However, it is worth stressing that our protocols are applicable regardless of whether modular architecture is used in universal superconducting quantum computer. Furthermore, the proposed protocols are also adaptable to other network communication systems, such as optics54,58,59, ion traps60,61, and NV centres62.

In the following, we introduce the executive steps for Alice, the participants, and Bob, respectively in the proposed networking teleportation.

  1. 1.

    Measurement performed by Alice. Alice performs Bell-state measurement on qubit 0 (whose state ρin is arbitrary) and qubit 1, and obtains one of four possible results, namely 00, 01, 10, or 11. The measurement thus projects her two qubits into one of the four different Bell states \(({U}_{j}\otimes I)\left|{\phi }^{+}\right\rangle \) with j = 00, 01, 10, or 11, where

    $$\begin{array}{ll}{U}_{00}=I, & {U}_{01}=X,\\ {U}_{10}=Z, & {U}_{11}=ZX,\end{array}$$
    (3)

    and \(\left|{\phi }^{+}\right\rangle =(\left|00\right\rangle +\left|11\right\rangle )\)/\(\sqrt{2}\). Alice communicates her measurement outcome j to Bob (step (i) in Fig. 2a). It is worth noting that Bell-state measurement (analysis) is one of the key element in quantum teleportation protocols and has been widely studied especially in optical systems63,64,65,66,67,68,69,70,71; on the other hand, the Bell-state measurement performed on the universal IBM quantum computer is implemented by using universal logic gates followed by measurement on the Pauli-Z basis (Fig. 3c).

    Figure 3
    figure 3

    Schematic showing quantum circuit of networking teleportation based on a 6-qubit box-cluster state \(\left|{C}_{b,6}\right\rangle \) on the ibmq_16_melbourne device. The circuit to teleport an arbitrary state of Q0, 0 to Q11, 6 consists of the following: (a) all of the qubits are initialized to \(\left|0\right\rangle \) and the arbitrary state of qubit Q0, 0 to be teleported is implemented by different unitary operations U1; (b) \(\left|{C}_{b,6}\right\rangle \); (c) Bell-state measurement is performed on Alice’s qubits Q0, 0 and Q1, 1; (d) local measurements are performed on the specific basis on the participants’ qubits Q13, 2Q3, 5; (e) state tomography is performed for the transported state on Bob’s qubit Q11, 6, and is implemented by different unitary operations U2 followed by measurement on the Pauli-Z basis. (See the related text for a detailed description).

  2. 2.

    Local measurements performed by the participants. Each participant in the teleportation process performs measurement and communicates the result mi classically to Bob, where mi {+1, −1} represents the possible measurement outcome of the i-th participant’s qubit on a specific measurement basis (step (ii) in Fig. 2a). The protocols based on \(\left|{C}_{b,N}\right\rangle \) and \(\left|{C}_{c,N}\right\rangle \) have 2(N−3) and 2(N−2) possible participant measurement results (m2m3, …, mi, …, mN−1), respectively. The detailed steps of the participants’ measurement processes for \(\left|{C}_{b,N}\right\rangle \) and \(\left|{C}_{c,N}\right\rangle \) are given in the following:

    1. (a)

      For \(\left|{C}_{b,N}\right\rangle \), every participant performs measurement on a specific basis on their qubit i. In particular, for all of the even qubits of the participants and qubit 3, measurement is performed on the Pauli-X basis for measurements. By contrast, for the remaining odd qubits, measurement is performed on the Pauli-Z basis for measurements (Fig. 2b). A specific example is given in Methods section.

    2. (b)

      For \(\left|{C}_{c,N}\right\rangle \), all of the participants perform local measurements on the Pauli-X basis.

  3. 3.

    Once Alice’s and the participants’ qubits have been collapsed by their measurements, Bob recovers ρin by applying appropriate unitary operations P on his qubit N, where P {IZXZXHZHXHZXH}. Note that P is calculated based on Alice’s measurement result j and the participants’ measurement results (m2m3, …, mi, …, mN−1) (step (iii) in Fig. 2a). Bob’s operations for \(\left|{C}_{b,N}\right\rangle \) and \(\left|{C}_{c,N}\right\rangle \), respectively, are elaborated as follows:

    1. (a)

      For \(\left|{C}_{b,N}\right\rangle \), Bob’s operation to recover the arbitrary state has the form

      $$P=(\mathop{\prod }\limits_{i=2}^{N-1}{O}_{i,{m}_{i}}){U}_{j}({H}^{(N)}),$$
      (4)

      where \({O}_{i,{m}_{i}}\) represents the unitary transformation according to measurement result mi of the i-th participant’s qubit. The unitary operations Oi,+1 = I and Oi,−1 are defined as follows:

      $$\begin{array}{ll}{O}_{2,-1}=I, & {O}_{3,-1}=X,\\ {O}_{4,-1}=Z, & {O}_{5,-1}=I,\\ {O}_{6,-1}=X, & {O}_{7,-1}=Z,\\ {O}_{8,-1}=Z, & {O}_{9,-1}=X,\\ {O}_{10,-1}=X, & {O}_{11,-1}=Z.\end{array}$$
      (5)

      Referring to Eq. 4, Uj is the unitary operation according to Alice’s measurement result j, and is obtained using the definition given in Eq. 3. In addition, H(N) is the Hadamard transformation (H) of qubit number N and has a value of H(N) = I if qubit number N can be divided by four; or H(N) = H otherwise. An illustrative case is given in Methods section.

    2. (b)

      For \(\left|{C}_{c,N}\right\rangle \), Bob’s operation to recover the arbitrary state is written in the form

      $$P=(\mathop{\prod }\limits_{i=2}^{N-1}{O}_{i,{m}_{i}}){U}_{j}H,$$
      (6)

      where \({O}_{i,{m}_{i}}\) is the unitary transformation according to measurement result mi of the i-th participant’s qubit. The unitary operations Oi,+1 = I and Oi,−1 are defined respectively as follows:

      $${O}_{i,-1}=\{\begin{array}{cc}X & {\rm{i}}{\rm{f}}\,i\,{\rm{i}}{\rm{s}}\,{\rm{e}}{\rm{v}}{\rm{e}}{\rm{n}}\\ Z & {\rm{i}}{\rm{f}}\,i\,{\rm{i}}{\rm{s}}\,{\rm{o}}{\rm{d}}{\rm{d}}\end{array}.$$
      (7)

      As described above, Uj in Eq. 6 is the unitary operation determined from Alice’s measurement result j using the definition given in Eq. 3. An illustrative example is given in Methods.

It should be noted that when calculating P using the protocols based on \(\left|{C}_{b,N}\right\rangle \) or \(\left|{C}_{c,N}\right\rangle \), there are four properties of matrix multiplication: (i) IX = XI = X, IZ = ZI = Z; (ii) XZX = Z, ZXZ = X; (iii) XX = I, ZZ = I, II = I; and (iv) when P is lastly calculated to be XZ, then P should be considered to be ZX. Let us give four illustrative examples: (1) \(P=IIZIXH\mathop{\to }\limits^{({\rm{i}})}ZXH\); (2) \(P=IZIIXIZH\mathop{\to }\limits^{({\rm{i}})}ZXZH\mathop{\to }\limits^{({\rm{ii}})}XH\); (3) \(P=IXZIXZZX\mathop{\to }\limits^{({\rm{i}})}XZXZZX\mathop{\to }\limits^{({\rm{ii}})}\) \(ZZZX\mathop{\to }\limits^{({\rm{iii}})}IZX\mathop{\to }\limits^{({\rm{i}})}ZX\); (4) \(P=XZXZXZH\mathop{\to }\limits^{({\rm{ii}})}ZZXZH\mathop{\to }\limits^{({\rm{iii}})}IXZH\mathop{\to }\limits^{({\rm{i}})}\)\(XZH\mathop{\to }\limits^{({\rm{iv}})}ZXH\).

It is worth noting that the two proposed protocols based on either a \(\left|{C}_{b,N}\right\rangle \) or a \(\left|{C}_{c,N}\right\rangle \) are both systematically scalable to arbitrary positive even integer N. To extend the proposed networking protocol based on \(\left|{C}_{b,N}\right\rangle \) for N > 12, the specific measurement basis of the i-th participant’s qubit and the unitary operations Oi,−1 for i > 11 are required to be defined. After all the measurements are performed by Alice and participants, Bob then calculates his operation P using Eq. 4 and recovers ρin by applying P to his qubit.

Identifying quantum-mechanical process of networking teleportation

A generic classical process model31 was utilized to quantitatively analyze the performance of a real quantum device, on which the proposed teleportation protocol was executed.

Suppose that a process of interest is created and its normalized process matrix, χexpt, is obtained experimentally via the method of process tomography (PT)72. If the experimental process cannot be described at all by any classical processes (denoted as χC), then χexpt is said to be a genuinely quantum process (denoted by χQ)31.

A classical process, χC, comprises a classical initial state and its evolution to a final state. The initial system can be regarded as a physical object with properties satisfying the assumption of realism. The system then evolves according to classical stochastic theory to a final state. It should be noted that the assumption of realism predicates that the system state can be described by a set of measurement outcomes. Moreover, the dynamics of these classical states are fully described by the transition probabilities from a specific state to a final state31.

An experimental process, χexpt, is identified as non-classical, i.e., close to the ideal quantum process \({\chi }_{{Q}_{I}}\), if the process fidelity satisfies that \({F}_{p}\equiv \,{\rm{tr}}\,({\chi }_{{\rm{expt}}}{\chi }_{{Q}_{I}}) > {F}_{C}\equiv \mathop{max}\limits_{{\chi }_{C}}\,{\rm{tr}}\,({\chi }_{C}{\chi }_{{Q}_{I}})\) or \({\bar{F}}_{s,{\rm{expt}}} > {\bar{F}}_{s,C}\), where \({\bar{F}}_{s,{\rm{expt}}(C)}=(2{F}_{{\rm{expt}}(C)}\)\(+1)\)/3 is the average state fidelity73. It should be noted that ideal teleportation corresponds to an identity process, for which the process fidelity threshold is given by

$${F}_{C} \sim 0.683,$$
(8)

and the average state fidelity threshold for teleportation is

$${F}_{s,C} \sim 0.789.$$
(9)

In contrast, the measure-prepare strategy74 in which Alice directly measures her input state and Bob then prepares the output state accordingly is included as a special case in our generic classical-process model. It can be understood by the fact that the measure-prepare process is not an optimal classical teleportation: FC = 0.5 < 0.683, and the average state fidelity is Fs,C = 0.667 < 0.789. Accordingly, our model provides the strictest criteria to evaluate whether an experimental teleportation can outperform classical mimicry. Our model is further proven in a quantitative way for evaluating an experimental teleportation process75.

Networking teleportation implemented on ibmq_16_melbourne device

The proposed networking teleportation protocol was experimentally implemented on the 14-qubit ibmq_16_melbourne device (Fig. 2b). Five different box-cluster states were considered, namely a 4-qubit box-cluster state \(\left|{C}_{b,4}\right\rangle \) consisting of qubits Q1, 1Q12, 4 (Fig. 2b(i)); a 6-qubit box-cluster state \(\left|{C}_{b,6}\right\rangle \) consisting of qubits Q1, 1Q11, 6 (Fig. 2b(ii)); an 8-qubit box-cluster state \(\left|{C}_{b,8}\right\rangle \) consisting of qubits Q1, 1Q10, 8 (Fig. 2b(iii)); a 10-qubit box-cluster state \(\left|{C}_{b,10}\right\rangle \) consisting of qubits Q1, 1Q9, 10 (Fig. 2b(iv)); and a 12-qubit box-cluster state \(\left|{C}_{b,12}\right\rangle \) consisting of qubits Q1, 1Q8, 12 (Fig. 2b(v)).

 Figure 3 shows a schematic illustration of the implemented networking teleportation procedure for the 6-qubit box-cluster state \(\left|{C}_{b,6}\right\rangle \) (Fig. 1c). As shown, all of the qubits Qni are initially prepared in the state \(\left|0\right\rangle \) and the arbitrary quantum state of qubit Q0, 0 to be teleported is then prepared by applying the unitary operation U1 (Fig. 3a). To transport an arbitrary quantum state of qubit Q0, 0 to qubit Q11, 6, the networking teleportation procedure commences by preparing a 6-qubit cluster state using the definitions given in Eqs. 1 and 2. The CZ gates are then implemented by a CNOT gate and two H gates in accordance with the connectivity map of the 14-qubit ibmq_16_melbourne quantum processor (Fig. 3b).

Bell-state measurement is then performed on qubits Q0, 0 and Q1, 1 (Fig. 1c(i)) using a CNOT gate and an H gate; followed by measurement on the Pauli-Z basis (Fig. 3c). As described previously, the participants perform measurements on a specific basis (Fig. 1c(ii)). In particular, for all of the even qubits Q13, 2, Q12, 4 and the qubit Q2, 3, the participants perform measurements on the Pauli-X basis (Fig. 2b(ii)), which is implemented by an H gate, followed by measurement on the Pauli-Z basis. For the remaining odd qubit, Q3, 5, the participant performs measurement on the Pauli-Z basis (Fig. 3d).

In the last step of the protocol, Alice sends her measurement result j, and each of the participants sends his or her measurement result mi, to Bob through a classical communications channel. Bob then applies the last unitary operation P defined in Eq. 6 on qubit Q11, 6 to recover the transported state relying on the results from Alice and participants he received (Fig. 1c(iii)).

Note that IBM Q Experience only permits at most one measurement on every given qubit. Moreover, no operations can be employed after a measurement. Thus, it is possible only to obtain the probabilities of all the possible measurement outcomes.

To complete the networking teleportation procedure, quantum state tomography72 is performed on qubit Q11, 6 to reconstruct the density matrix of the teleported state, ρout, by measuring the state in the Pauli basis {X, Y, Z}, where \(Y=(\left|R\right\rangle \left\langle R\right|-\left|L\right\rangle \left\langle L\right|)\) with \(\left|R\right\rangle =(\left|0\right\rangle +i\left|1\right\rangle )\)/\(\sqrt{2}\) and \(\left|L\right\rangle =(\left|0\right\rangle -i\left|1\right\rangle )\)/\(\sqrt{2}\) (Fig. 3e).

Experimentally, the measurements performed on the Pauli-X or Pauli-Y basis are implemented by using different transformations U2 followed by measurement on the Pauli-Z basis. In particular, the measurement on the Pauli-X basis is implemented by an H gate followed by measurement on the Pauli-Z basis; while the measurement on the Pauli-Y basis is implemented by S and H gates followed by measurement on the Pauli-Z basis. Finally, the last unitary operation P is applied as a post-selection to the experimental density matrices based on the measurement results informed by Alice and the participants, respectively. Herein, it is assumed that the transported state is perfectly recovered by Bob’s operation, P.

To quantitatively characterize the performance of the real quantum processor, including all the required elements for teleportation, where the proposed protocol is implemented, the experimental results were evaluated using the process fidelity criterion 8. In performing the evaluation, complete PT72 was applied to the teleported state ρout of the protocol. Furthermore, states \({\rho }_{{\rm{in}}}\in \{\left|0\right\rangle \left\langle 0\right|,\left|1\right\rangle \left\langle 1\right|,\left|+\right\rangle \left\langle +\right|,\left|R\right\rangle \left\langle R\right|\}\) were chosen as the input states for teleportation. The teleportation process was described by the following positive Hermitian process matrix χexpt:

$${\rho }_{{\rm{out}}}=\mathop{\sum }\limits_{m,n=1}^{4}{\chi }_{mn}{M}_{m}{\rho }_{{\rm{in}}}{M}_{n},$$
(10)

where M1 = I, M2 = X, M3 = −iY, and M4 = Z. The ideal teleportation process matrix, \({\chi }_{{Q}_{I}}\), has only one non-zero element, \({({\chi }_{{Q}_{I}})}_{11}=1\). In other words, the input state is teleported without any loss in fidelity (Fig. 4a).

Figure 4
figure 4

Absolute values of the reconstructed process matrix χmn with m, n = 1, 2, 3, 4 for the proposed networking teleportation protocol based on \(\left|{C}_{b,N}\right\rangle \) for: (a) ideal quantum teleportation; (b) N = 4; (c) N = 6; (d) N = 8; (e) N = 10; and (f) N = 12.

Experimentally, to encode the qubit Q0, 0 to be teleported, where this qubit starts in the \(\left|0\right\rangle \) state, various unitary gates U1 are applied (Fig. 3a). Specifically, to encode the \(\left|1\right\rangle \) (\(\left|+\right\rangle \)) state, an X (H) gate is placed on qubit Q0, 0, while to encode the \(\left|R\right\rangle \) state, an H gate is first applied followed by an S gate, where \(S=\left|0\right\rangle \left\langle 0\right|+i\left|1\right\rangle \left\langle 1\right|\).

Identification of quantum-mechanical process of networking teleportation

Before considering the identification of a real device, on which the proposed N-party networking teleportation protocol is conducted, the protocol was simulated on the 32-qubit ibmq_qasm_simulator device, which enables anonymous users to compose ideal multi-shot executions of quantum circuits and then returns counts through IBM Q Experience17. The aim of the simulation was to verify the correctness of the individual steps in the proposed protocol based on an N-qubit box-cluster state \(\left|{C}_{b,N}\right\rangle \) and a chain-type cluster state \(\left|{C}_{c,N}\right\rangle \), respectively, for N up to 12.

The process fidelities of the networking teleportation protocol based on \(\left|{C}_{b,N}\right\rangle \) 32-qubit ibmq_qasm_simulator device were calculated to be Fp = 0.9972, 1.0007, 1.0032, 0.9997 and 0.9997 for qubit numbers of N = 4, 6, 8, 10 and 12, respectively (Fig. 5). Meanwhile, the process fidelities of the networking teleportation protocol utilizing \(\left|{C}_{c,N}\right\rangle \) were calculated to be Fp = 0.9966, 1.0004, 0.9988, 1.0004 and 1.0004, respectively. The state fidelities for the teleported quantum states ρout of the protocols based on \(\left|{C}_{b,N}\right\rangle \) and \(\left|{C}_{c,N}\right\rangle \), respectively, for N up to 12 were calculated to be Fs = 1.0000 in both cases.

Figure 5
figure 5

Process fidelity of N-qubit teleportation based on 2- and 3-qubit chain-type cluster states and \(\left|{C}_{b,N}\right\rangle \) for qubit numbers N = 4, 6, 8, 10 and 12, respectively. The red dotted line denotes the maximum classical process fidelity of FC = 0.683. The bars colored light blue and dark blue denote the results obtained from the 32-qubit ibmq_qasm_simulator device and the 14-qubit ibmq_16_melbourne device, respectively.

We can observe that the process fidelities of the protocols based on \(\left|{C}_{b,N}\right\rangle \) for N = 6 and 8 and \(\left|{C}_{c,N}\right\rangle \) for N = 6, 10 and 12 are higher than 1, while those for the other values of N are lower than 1. The reason is that if we conduct the simulation on the 32-qubit ibmq_qasm_simulator device, we will obtain approximate probabilities. However, we will obtain an exact result if and only if the probabilities are zero or one. More specifically, events with zero probabilities will never be observed, while events with probability 0 < p < 1 will be observed proportional to "p” (but unlikely to be exactly "p”)76. The tomographic measurement of density matrices using this simulation measurement result may be able to produce results that violate important basic properties like positivity77. Therefore, the process fidelity is not exactly equal to 1 even though the state fidelities are all equal to 1.

Having validated the proposed protocol, it was conducted based on \(\left|{C}_{b,N}\right\rangle \) for N=4 to 12 on the 14-qubit ibmq_16_melbourne device. Complete PT was implemented on the teleported state ρout, and formalisms and criteria described in Eqs. 11 and 12 were used to evaluate the performance of the real device, on which our protocol was implemented. Figure 4b–f show the reconstructed process matrix χexpt for different N. One can observe that the experimental teleportation process matrix has four evenly distributed non-zero elements \({({\chi }_{{\rm{expt}}})}_{11}\), \({({\chi }_{{\rm{expt}}})}_{22}\), \({({\chi }_{{\rm{expt}}})}_{33}\), \({({\chi }_{{\rm{expt}}})}_{44}\), while ideally it should have only one non-zero element \({({\chi }_{{Q}_{I}})}_{11}=1\). In other words, the input state is teleported with nearly 75% loss in fidelity.

To investigate the effect of the qubit number N on the performance of the real processor, where the proposed protocol was conducted utilizing both a 2-qubit chain-type cluster state and a 3-qubit chain-type cluster state, respectively. The process fidelities \({F}_{p}\equiv \,{\rm{tr}}\,({\chi }_{{\rm{expt}}}{\chi }_{{Q}_{I}})\) were calculated to be Fp = 0.7166 ± 0.0010, 0.6063 ± 0.0012, 0.2550 ± 0.0012, 0.2523 ± 0.0012, 0.2493 ± 0.0012, 0.2539 ± 0.0012 and 0.2508 ± 0.0012 for qubit numbers N=2, 3, 4, 6, 8, 10 and 12, respectively (Fig. 5). Note that each experimental value in Fig. 5 corresponds to the mean value obtained over 8192 measurements of 10 times. Note also that the error bars are obtained by Poissonian counting statistics and are rounded off to 4 decimals. Finally, the experimental values for N = 4–12 and N = 2–3 were accessed through IBM Q Experience17 on 09 December 2018 and 25 August 2019, respectively.

From the experimental results obtained from the 14-qubit ibmq_16_melbourne device reported above, one can observe that the experimental process fidelities for qubit numbers N = 2, 3, 4, 6, 8, 10 and 12 decrease as N increases. It is also observed that the quality of the experiments when utilizing a 3-qubit chain-type cluster state and \(\left|{C}_{b,N}\right\rangle \) for qubit numbers N = 4, 6, 8, 10 and 12 does not go beyond the maximum process fidelity of FC = 0.683 (Eq. 8) that can be achieved classically (Fig. 5). Finally, it is noted that the process fidelities are close to 0.25 for qubit numbers N = 4, 6, 8, 10 and 12.

The state fidelity Fs of the teleportation process is defined as the overlap of the ideal transported state ρin and the experimental density matrix ρout. In other words, Fs(ρin, ρout) = \({\rm{tr}}\sqrt{\sqrt{{\rho }_{{\rm{in}}}}{\rho }_{{\rm{out}}}\sqrt{{\rho }_{{\rm{in}}}}}\). It can be observed that the state fidelities of the four transported states (shown in Table 1) also do not surpass the maximum value of 0.789 in Eq. 9 which is achievable by classical means.

Table 1 State fidelities for the teleported quantum states ρout for qubit numbers N = 2, 3, 4, 6, 8, 10 and 12, respectively. Each experimental value corresponds to the mean value obtained over 8192 measurements of 10 times, considers the Poissonian counting statistics, and is rounded off to 4 decimal places.

In order to explore the potential causes of the experimental process fidelities of the real device, on which the proposed protocol was executed, the following section deconstructs the key ingredients required in the process. A series of analyses are additionally conducted on the shared entanglement and its fundamental CZ gate.

Firstly, we apply an optimal entanglement witness78 to detect the existence of genuine multipartite entangled states on the 14-qubit ibmq_16_melbourne processor. The result implies that the existence of genuine multipartite entanglement cannot be detected in the experimental prepared state on the real quantum device (see Methods). Secondly, to clarify the effect of the CZ gate on the present experimental results for the multipartite cluster states, we characterized the CZ gate on the 14-qubit ibmq_16_melbourne device by using PT. The experimental result suggests that an increasing number of N and CZ gates leads to a corresponding decrease in the fidelity of the networking teleportation procedure on the 14-qubit quantum device (see Methods). Then we inquire into the effects of quantum noise in the experiments by comparing three common noise channels72. The results shows that the noise in the networking teleportation process is similar to that produced in a depolarizing channel (see Methods).

Discussion

In this work, we have proposed two systematically scalable networking teleportation protocols consisting of N parties utilizing either an N-qubit box-cluster state with positive even integer N up to 12, or a chain-type cluster state with arbitrary positive even integer N, to transmit arbitrary quantum states inside and among the modules in a quantum network. The proposed protocols are adaptable to the benchmark provided by a generic classical-process model and applicable to arbitrary finite size of modules. Notably, the original teleportation protocol illustrates that two communication parties, Alice and Bob, can teleport the unknown state by sharing Einstein-Podolsky-Rosen (EPR) pairs1. Our protocols illustrate that many communication parties, Alice, participants and Bob, can teleport the unknown state by sharing multi-qubit cluster states. In contrast to the original protocol, the proposed protocols are more applicable for many communication parties in the future quantum network and can be further integrated into potential networking applications consisting of multiparties, such as protocols for quantum computation30,46,47,48,49,50,51,52,53,54,55,56 and quantum cryptography57,58.

We have verified and tested the proposed protocols on both the IBM quantum simulator and the 14-qubit ibmq_16_melbourne device. We have further utilized the generic classical-process model to quantify quantum-mechanical processes for identifying non-classical networking teleportation. The experimental results have shown that the process fidelities of the real quantum device, where the proposed networking teleportation protocol was conducted cannot go beyond the best mimicry attained by classical processes. That is, the components on the real device required for the networking teleportation process are not yet all qualified for use.

We have then unambiguously deconstructed the essential components in the networking teleportation process. We have prepared cluster states consisting of 4, 6, 8, 10 and 12 qubits on a 14-qubit ibmq_16_melbourne device and have shown that genuine multipartite entanglement cannot be detected using entanglement witness operators. We then characterized the effect of the essential CZ gate on a 14-qubit ibmq_16_melbourne device in constructing cluster states by process tomography and utilized the experimental process matrix of the controlled gate to reconstruct the whole networking teleportation procedure. The results showed that as the number of qubit N and CZ gates increase, the fidelity of the networking teleportation procedure decreases. In addition, the noise in the experiments is close to that produced in a depolarizing channel.

Qiskit is arranged in four libraries: Terra, Aqua, Aer and Ignis. The work presented herein utilizes Terra and Aer. Terra is intended for composing and optimizing quantum programs on a particular device, while Aer provides a simulator framework for users to compose and verify quantum circuits using the Qiskit software stack. In future studies, our work can further combine with error mitigation and correction software such as Ignis, one of the four libraries in Qiskit, to characterize the noise and errors induced by hardware via simulations.

Finally, through both the scalability to arbitrary finite even number of the qubit and the adaptability to the more general criteria for identifying non-classical teleportation of the proposed protocol, we provide an essential identification toolbox for future modular uses from a process point of view. It is worth stressing that the toolbox provides an essential assessment for identifying whether all the components on the real quantum device required in the networking teleportation process are all qualified for use. In particular, the proposed assessment method paves the way for further advancement of every key element in the whole networking teleportation process to facilitate the development of future modular techniques with improved reliability in performing quantum-information processing tasks.

Methods

Illustrative examples for the steps in the proposed protocols

In the case of step 2(a), assume that the qubit number is N = 6. In the measurement process, all of the even qubits (i.e., qubits 2 and 4) and qubit 3 are measured on the Pauli-X basis, while the remaining odd particle (i.e., qubit 5) is measured on the Pauli-Z basis (Fig. 1c).

In the case of step 3(a), let us assume that qubit number N = 6, Alice’s measured outcome is j = 01, and the measurement process for the participants’ qubits yields (m2m3m4m5) = (−1, +1, −1, −1). According to the measurement results informed by Alice and the participants, P = IIZIXH, In other words, P = ZXH is applied to recover the input state ρin. That is, Bob recovers ρin by applying first an H gate, then an X gate, and finally a Z gate to his qubit.

In the case of step 3(b), we herein consider an illustrative example in which qubit number N = 8, Alice’s measured outcome is j = 10, and the measurement results of the participants’ qubits are (m2m3m4m5m6m7) = (+1, −1, +1, +1, −1, +1). According to the measurement results informed by Alice and the participants, P = IZIIXIZH. In other words, Bob applies P = XH to recover the input state ρin. That is, Bob recovers ρin by first applying an H gate and then an X gate.

Detection of genuine multipartite entangled state

To detect the existence of genuine multi-partite entangled states on the 14-qubit ibmq_16_melbourne device, which are the essential elements for realizing teleportation, we herein apply an optimal entanglement witness78 to evaluate the quality of the cluster states on the 14-qubit ibmq_16_melbourne processor. For illustration purposes, we consider both a 6-qubit box-cluster state \(\left|{C}_{b,6}\right\rangle \) and a 6-qubit chain-type cluster state \(\left|{C}_{c,6}\right\rangle \). The witness for \(\left|{C}_{b,6}\right\rangle \) has the form

$$\begin{array}{ll}{{\mathcal{W}}}_{{C}_{b,6}}= & 5{I}^{\otimes 6}-XZZIII-IZZXIZ-ZXIZII\\ & -IIZIXZ-ZIXZZI-IIIZZX.\end{array}$$
(11)

Meanwhile, the witness for \(\left|{C}_{c,6}\right\rangle \) has the form

$$\begin{array}{ll}{{\mathcal{W}}}_{{C}_{c,6}}= & 5{I}^{\otimes 6}-XZIIII-IIZXZI-ZXZIII\\ & -IIIZXZ-IZXZII-IIIIZX.\end{array}$$
(12)

For a genuine 6-partite entanglement state close to \(\left|{C}_{b,6}\right\rangle \) (\(\left|{C}_{c,6}\right\rangle \)), \(\left\langle {\mathcal{W}}\right\rangle \) is optimally equal to −1. To minimize the readout error caused by the measurements, the witnesses we used here only require two local measurement settings independent of the number of qubits for detection of each genuine multipartite entanglement. For example, XZZXXZ and ZXXZZX are required to evaluate \(\left|{C}_{b,6}\right\rangle \), while XZXZXZ and ZXZXZX are required to evaluate \(\left|{C}_{c,6}\right\rangle \).

 Table 2 lists all the observables required to evaluate the witnesses for \(\left|{C}_{b,6}\right\rangle \) and \(\left|{C}_{c,6}\right\rangle \), respectively. Substituting the experimental results into Eqs. 11 and 12 yields \(\left\langle {{\mathcal{W}}}_{{C}_{b,6}}\right\rangle \) = 5.126 and \(\left\langle {{\mathcal{W}}}_{{C}_{c,6}}\right\rangle \) = 4.1224. This result implies that the existence of genuine six-partite entanglement cannot be detected in the experimental prepared state on the real quantum device. In other words, it is necessary to improve the quality of multi-partite entanglement on the real quantum device. (Note that the experimental values shown in Table 2 were accessed through IBM Q Experience17 on 20 December 2018.)

Table 2 Experimental values of all the observables on states \(\left|{C}_{b,6}\right\rangle \) and \(\left|{C}_{c,6}\right\rangle \), respectively, for entanglement witness \({\mathcal{W}}\) measurement. Each experimental value corresponds to the mean value obtained over 8192 measurements of 10 times and the error bars are obtained by Poissonian counting statistics.

Examination of experimental controlled gate

As shown in Eq. 2, the CZ gate is an essential entangling quantum gate for constructing a cluster state. To clarify the effect of the CZ gate on the present experimental results for the multipartite cluster states, the CZ gate on the 14-qubit ibmq_16_melbourne device was fully characterized by means of quantum process tomography. In particular, the process matrix of the CZ gate was experimentally determined with maximum likelihood79 and was then utilized to reconstruct the whole networking teleportation procedure utilizing \(\left|{C}_{b,4}\right\rangle \). The process fidelity was calculated to be Fp = 0.2457. In other words, this suggests that an increasing number of N and CZ gates leads to a corresponding decrease in the fidelity of the networking teleportation procedure on the 14-qubit quantum device. (Note that the tomographic measurement of the CZ gate was accessed through IBM Q Experience17 on 10 April 2019.)

To inquire into the effects of quantum noise in the experiments, we compared three common noise channels72, namely a depolarizing channel (χD), a phase damping channel (χAD), and an amplitude damping channel (χPD), to the experimental process matrix χexpt. The noise channels were defined respectively as

$$\begin{array}{lll}{\chi }_{{\rm{D}}}(\rho ) & = & (1-\frac{3}{4})I\rho I+\frac{1}{4}(X\rho X+Y\rho Y+Z\rho Z),\\ {\chi }_{{\rm{PD}}}(\rho ) & = & (1-\frac{1}{2})I\rho I+\frac{1}{2}Z\rho Z,\\ {\chi }_{{\rm{AD}}}(\rho ) & = & (\frac{1}{2}I+\frac{1}{2}Z)\rho (\frac{1}{2}I\ +\frac{1}{2}Z)+\frac{1}{4}(X\ +\ iY)\rho (X\ -\ iY).\end{array}$$
(13)

An inspection of the computed fidelity values F(χexpt, χnoise) = \({\rm{tr}}\sqrt{\sqrt{{\chi }_{{\rm{noise}}}}{\chi }_{{\rm{expt}}}\sqrt{{\chi }_{{\rm{noise}}}}}\) (Table 3) shows that the noise in the networking teleportation process is similar to that produced in a depolarizing channel. This then explains why the experimental process fidelities are all close to 0.25.

Table 3 F(χexpt, χnoise) for networking teleportation protocol utilizing an N-qubit box-cluster state \(\left|{C}_{b,N}\right\rangle \) and three common noise channels, respectively.