Agenda IETF123: qirg
agenda-123-qirg-03
| Meeting Agenda | Quantum Internet Research Group (qirg) RG | |
|---|---|---|
| Date and time | 2025-07-21 07:30 | |
| Title | Agenda IETF123: qirg | |
| State | Active | |
| Other versions | markdown | |
| Last updated | 2025-07-09 |
Agenda
1. Administrivia (5 min):
- Resolving any online issues
- RG update
2. Toward Functional Abstractions and Evaluation Frameworks for Quantum Networks (20 min)
Speaker: Amar Abane (National Institute of Standards and Technology)
Abstract: In our recent survey of entanglement routing approaches in quantum networks (https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=10882978), we observed that directly standardizing protocol stacks or implementing complete control/data planes for quantum repeaters remains premature and potentially risky. Instead, we identify a more viable near-term strategy: focusing on defining network functions and services—especially those governing routing, entanglement swapping, and purification coordination. Converging assumptions and functions begin to emerge across studies, indicating an opportunity to identify useful abstractions and boundaries.
Our taxonomy of 50+ entanglement routing studies reveals that approximately 45% employ purpose-built simulators, 36% rely solely on analytical models, and only 18% use widely available open-source simulation platforms. This fragmentation hinders fair comparison, modular experimentation, and broader reuse. Moreover, very few studies explore interactions between routing strategies or their integration with memory management and purification scheduling.
To address these gaps, we propose a flexible simulation framework designed to support rapid exploration of routing and forwarding approaches under a wide range of realistic, dynamic network conditions. The framework models non-uniform channel capacities, dynamic entanglement swapping and purification strategies, qubit memory management, and routing paradigms—proactive and reactive—across centralized and distributed control models. An expressive formalism and signaling architecture allows users to specify combinations of routing, purification, and resource management strategies, enabling a more systematic and comparable evaluation of their effectiveness.
Rather than prescribing rigid protocol layers for a standalone quantum internet, our approach aligns with the vision of an internet with quantum capabilities by identifying reusable network functions and modular interfaces, following the spirit of 5G/6G system architectures. We invite community feedback on this direction and seek collaborators interested in extending this framework as an open research tool.
3. Design and Development of a Quantum Network Simulation Module for ns-3 (20 min)
Speaker: Mohit P. Tahiliani
Abstract: Our team at the National Institute of Technology Karnataka, Surathkal, India is developing a quantum network simulation module for ns-3 to address the need for realistic, open-source tools that support both quantum and classical networking in a unified framework. Our goal is to lay a robust architectural foundation by using ns-3, enabling researchers to prototype, experiment, and benchmark quantum networking ideas in a familiar, extensible environment. Along these lines, we have designed and partially developed physical and protocol-level models to make the quantum network simulation module work similar to the real network as much as possible. This includes comprehensive noise modeling (channel-based and time-based), fidelity tracking, quantum memory effects, quantum error correction, entanglement preparation and purification, and local operations using registers, gates, and circuits. The proposed simulation module supports core components like quantum repeaters and routers, and quantum network applications such as QKD protocols. This talk will describe the architecture of the proposed quantum network simulation module for ns-3, the features that have been built and the ones that are being currently developed, along with a glimpse into the future tasks to be accomplished.
4. Modeling Quantum Transduction for the Quantum Internet (20 min)
Speaker: Angela Sara Cacciapuoti
Abstract: The Quantum Internet inherently relies on heterogeneous hardware, as no single qubit platform can simultaneously meet the requirements for storage, processing, and communication. This heterogeneity calls for quantum transduction. This presentation examines the quantum transduction from a communication engineering perspective, highlighting its critical role in the network design. We identify diverse source-destination link archetypes, where transduction significantly impacts performance. The discussion underscores how transduction is pivotal for scalable quantum networks, by bridging the gap between different hardware platforms.
5. Quditto: Emulating and Orchestrating Distributed Quantum Network Deployments (20 min)
Speaker: Blanca Asunción López
Abstract: Quditto (www.quditto.io) is a tool built as an open-access automated emulation platform that combines high-fidelity quantum channel simulation with a standardized key delivery API, allowing users to interact with the emulated distributed network exactly as they would with real QKD hardware. After validating Quditto with multiple proof-of-concepts and field trials, we now intend to go further and evolve Quditto to enable the emulation of general entanglement networks. In this presentation, in addition to reviewing the current state of Quditto, we outline the main challenges and ideas to reach this new stage.
6. Enhancing Position Verification in Multi-Node Quantum Networks (20 min)
Speaker: Ziyan Zhang
Abstract: Quantum position verification (QPV) is emerging as a promising application for quantum networks, leveraging spatial and quantum information to verify locations. However, current discussions on QPV protocols are largely confined to perfect experimental setups and one-dimensional scenarios. To address this gap, we extend the QPV$^f_{BB84}$ protocol to two dimensions. First, we define the requirements for the 2D QPV task and assess its performance under real-world constraints, which potentially expose the system to external attacks. To strengthen the protocol against these vulnerabilities, we study the 'danger zones', defining a region in spacetime within which attackers can manipulate these real-world constraints to convince verifiers. We then develop two algorithms to implement this theory: the Verifiable Vertices Selection algorithm, which identifies nodes that can validate their locations with designated verifiers, and the Malicious Prover Location Identification algorithm, which determines the 'danger zone' around the prover. Finally, we present a case study to demonstrate the conceptual implementation of the protocol. Our findings advance the development of secure and practical QPV protocols while highlighting the potential of quantum networks in the noisy intermediate-scale quantum (NISQ) era.
7. Update on draft-lopez-qirg-qi-multiplane-arch (15 min)
Speakers: Diego R. Lopez and Antonio Pastor
Total: 120 minutes