如何迎接量子互联网?量子互联网的六个发展阶段
[1]Richard P. Feynman, “Simulating Physics with Computers,” International Journal of Theoretical Physics 21, nos. 6/7 (June 1982), 467–488.
[2]Peter W. Shor, “Algorithms for Quantum Computation: Discrete Logarithms and Factoring,” in Proceedings: The 35th Annual Symposium on Foundations of Computer Science (Washington, DC: Institute of Electrical and Electronics Engineers, 1994), 124–134.
[3]“Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms,” National Institute of Standards and Technology Call for Proposals, December 20, 2016, available at <https:>.
[4]Stephanie Wehner, David Elkouss, and Ronald Hanson, “Quantum Internet: A Vision for the Road Ahead,” Science 362, no. 6412 (2018), available at <https:>.
[5]Joint Publication 5-0, Joint Planning (Washington, DC: The Joint Staff, December 1, 2020), IV-6.
[6]Michael A. Nielsen and Isaac L. Chuang, Quantum Computation and Quantum Information (Cambridge, UK: Cambridge University Press, 2000).
[7]Richard Jozsa et al., “Quantum Clock Synchronization Based on Shared Prior Entanglement,” Physical Review Letters 85, no. 9 (August 2000), 2010–2013, available at <https:>.
[8]Wehner, Elkouss, and Hanson, “Quantum Internet.”
[9]Charles H. Bennett and Gilles Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” Theoretical Computer Science 560 (2014), 7–11. Originally published as Charles H. Bennett and Gilles Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” in International Conference on Computers, Systems & Signal Processing, vol. 1 of 3 (Bangalore, India: Institute of Electrical and Electronics Engineers, December 1984), 175–179, available at <https:>.
[10]Douglas Stebila, Michele Mosca, and Norbert Lütkenhaus, “The Case for Quantum Key Distribution,” in Quantum Communication and Quantum Networking, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 36, ed. Alexander Sergienko, Saverio Pascazio, and Paolo Villoresi (Heidelberg, Germany: Springer, 2010).
[11]Nielsen and Chuang, Quantum Computation and Quantum Information.
[12]Charles H. Bennett and Stephen J. Wiesner, “Communication via One- and Two-Particle Operators on Einstein-Podolsky-Rosen States,” Physical Review Letters 69, no. 20 (November 1992), 2881–2884.
[13]Tom Stefanick, “The State of U.S.-China Quantum Data Security Competition,” Brookings, September 18, 2020, available at <https:>.
[14]Martin Giles, “The U.S. and China Are in a Quantum Arms Race That Will Transform Warfare,” MIT Technology Review, January 3, 2019, available at <https:>.
[15]Nicolas Sangouard et al., “Quantum Repeaters Based on Atomic Ensembles and Linear Optics,” Reviews of Modern Physics 83, no. 1 (2011), 33–80.
[16]Umesh Vazirani and Thomas Vidick, “Erratum: Fully Device-Independent Quantum Key Distribution,” Physical Review Letters 116, no. 8 (February 2016).
[17]Jozsa et al., “Quantum Clock Synchronization.”
[18]Howard Barnum et al., “Authentication of Quantum Messages,” in Proceedings: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002 (Washington, DC: Institute of Electrical and Electronics Engineers, 2002), 449–458.
[19]Quantum Sensing and Computing: Advancing National Security Through Fundamental Research (Washington, DC: Defense Advanced Research Projects Agency, n.d.), 2, available at <https:>.
[20]Matthew R. Myer, “Danger Close: Calculating Risk Within the ‘Last 100 Yards,’” Infantry Online, 2013, available at <https:>.
[21]Maarten Van den Nest, “Classical Simulation of Quantum Computation, the Gottesman-Knill Theorem, and Slightly Beyond,” Quantum Information & Computation 10, no. 3 (March 2010), 258–271.
[22]Peter W. Shor, “Scheme for Reducing Decoherence in Quantum Computer Memory,” Physical Review A 52, no. 4 (October 1995), R2493–R2496, available at <https:>.
[23]Frank Arute et al., “Quantum Supremacy Using a Programmable Superconducting Processor,” Nature 574 (2019), 505–510, available at <https:>.
[24]Jon Harper, “Pentagon Trying to Manage Quantum Science Hype,” National Defense, December 10, 2020, available at <https:>.
[25]Ibid.
[26]Shor, “Algorithms for Quantum Computation,” 124–134.