Have a personal or library account? Click to login
Entanglement Percolation in Two Types of Irregular Quantum Networks Cover

Entanglement Percolation in Two Types of Irregular Quantum Networks

By: Liuxia Han,  Yaqi Zhao and  Kan He  
Open Access
|Jan 2025

Full Article

1.
Introduction

Quantum entanglement is a crucial resource in quantum communication [1]. Yet, the long-distance transmission of quantum information is often compromised by environmental noise [2], which can significantly impair the efficiency of establishing direct long-distance entanglement connections. To mitigate this, a prevalent approach involves the use of intermediate devices known as “relays”, coupled with various foundational communication protocols. Key among these are entanglement swapping [3,4] and entanglement distillation [5,6], which are supplemented by more intricate protocols like recursive and nested repeater protocols [7,8,9]. Consider each participant as a node comprising a set of information carriers, and regard each bipartite state with partial entanglement among these information carriers across nodes as a link. This conceptualization effectively creates a network model that captures the spatial distribution of entanglement resources, commonly referred to as a quantum network (QN) [10].

Entanglement percolation is a statistical physics theory that characterizes the entanglement transmission on QNs. In 2007, Acín and others extended classical percolation theory to QN, proposing classical entanglement percolation (CEP) [10], and the quantum entanglement percolation (QEP)[10] which are probabilistic. Later the QEP is extended to QNs whose resource pairs are mixed states [5], tripartite entanglement (GHZ states) [11], and random networks [12,13,14,15].

In 2021, Meng and others proposed a deterministic entanglement transmission scheme [16] based on concurrence [17]. On this basis, the concurrence percolation theory (ConPT) [16,17] has been established between two arbitrarily distant nodes. In Ref. [16], they mainly studied the entanglement percolation problem of some specific regular [18] lattices as shown in Figure 1 based on the ConPT.

Figure 1.

Four examples of regular networks. (a) Bethe lattice. (b) Square lattice. (c) Honeycomb lattice. (d) Triangular lattice.

In the aforementioned lattices, when the peripheral nodes are disregarded, each node in the network has the same number of connections (i.e., the degree is the same), and the networks are highly symmetric, thus qualifying as regular networks. However, in real life, regular networks are relatively rare, and most are irregular networks (i.e., the degree is different) [18]. Therefore, we study more irregular networks based on the ConPT, focusing on their characteristics. We explore QNs model based on the widely used butterfly network [19] and the parallel-then-series network [20] where each link represents a entangled two-qubit pure state with the concurrence c.

In butterfly networks, the degree of each node is unequal, and in parallel-then-series networks, the degree of each node is also different when the number of parallel resource states between adjacent nodes varies, hence both are considered irregular networks. Our main discoveries are as follows:

  • For the butterfly network, through calculation and numerical simulation, we find that the entanglement percolation threshold [16] and the saturation point [16] of c is approximately 0.71 and 0.93 when the precision is 0.02 under the ConPT.

  • For the parallel-then-series network, we find that the threshold can be calculated by fixing the number of parallel resources. The saturation point, on the other hand, is jointly determined by both the minimum number of parallel resources between all adjacent nodes and the concurrence of resource states. Additionally, we calculate the entanglement thresholds and saturation points for several specific parallel-then-series networks, and we also derive an interesting result through analysis: if the number of parallel resource states between nodes and the concurrence of the shared resource states are fixed, then there exists a critical number of nodes such that when the number of nodes exceeds this critical value, all subsequent nodes will share maximally entangled states among them.

  • Furthermore, we compare the concurrence percolation and the CEP based on the aforementioned QNs and find that the concurrence percolation indeed demonstrates a quantum superiority.

Analyzing and calculating these helps us address the problem of efficient transmission resource allocation.

The organization of this paper is as follows. In Section 2, we briefly introduce some basic concepts. In Section 3, we calculate the entanglement transmission threshold and saturation point for the butterfly network. In Section 4, we address the computation of the entanglement transmission threshold and saturation point for the parallel-then-series network.

2.
Preliminary
2.1.
Concurrence Percolation Theory (ConPT)

Consider two distant nodes A and B that originally do not share entangled states, connected by an n-node QN 𝒢θ(n). Each pair of nodes connected by a link shares a same resource state (1) ψθ=cosθ00+sinθ11,(0<θ<π4). \left| {\psi \left(\theta \right)} \right. \rangle = \cos \theta \left| {00} \right. \rangle + \sin \theta \left| {11} \right. \rangle ,(0 < \theta < {\pi \over 4}).

In the ConPT, the weight of each link is characterized by the concurrence of the state, (2) c=sin2θ. c = \sin 2\theta.

After performing deterministic local operations and classical communication (LOCC) [21] operations on the nodes, we ultimately establish entanglement between A and B. This process is known as entanglement percolation.

For a QN, given nodes A and B, the topology can be categorized into different types (Figure 2). Topologies Figure 2a to Figure 2e are considered to be serial-parallel [16], but the topology shown in Figure 2f is not, because there is a “bridge” [16,22] as shown by the red line in the QN compared to Figure 2e.

Figure 2.

Different QN topologies between A and B. (a) Simple series QN. (b) Simple parallel QN. (c) Parallel-then-series QN. (d) Series-then-parallel QN. (e) Series-parallel QN. (f) General QN.

Most QNs can be considered as being in series-parallel. Based on the series-parallel network [16], Ref. [16] presents a deterministic entanglement transmission scheme, which can be succinctly described as the series-parallel rule (see Table 1) [16].

Table 1.

Connectivity rules of ConPT.

ConPT
Series ruleC = c1 c2
Parallel rule 1+1C22=max12,1+1c1221+1c222 {{1 + \sqrt {1 - {C^2}}} \over 2} = \max \left\{{{1 \over 2},{{1 + \sqrt {1 - c_1^2}} \over 2}{{1 + \sqrt {1 - c_2^2}} \over 2} \ldots} \right\}

Here, both C and ci, where i = 1, 2, ⋯, represent the degree of entanglement concurrence. If C is formed by ci in series, that is, C = seri(c1, c2, …), then according to the series-parallel rule, we have C = c1c2 ⋯. We denote the rule as C = seri(c1, c2, …) and C = para(c1, c2, ⋯), respectively. The sum of weights of all paths in this QN is referred to as the sponge-crossing concurrence [16,17] denoted as CSC. For an arbitrary QN, the CSC can be represented by the original concurrence c of each resource state.

Moreover, for a finite-size scaling network, the entanglement percolation threshold cth in Ref. [16] under this rule is defined as the value of c that makes the second derivative of CSC is zero, (3) cth=c0,1|2CSCc2=0. {c_{th}} = \left\{{c \in \left[ {0,1} \right]|{{{\partial^2}{C_{SC}}} \over {\partial {c^2}}} = 0} \right\}.

Given the precision ɛ, we define the approximate saturation point csat under ɛ as: (4) csat=inf{c0,1|1CSC<ε}. {c_{sat}} = \inf \{c \in \left[ {0,1} \right]|1 - {C_{SC}} < \varepsilon \}.

2.2.
Star-mesh(SM)transform

In a series-parallel network, the calculation of CSC can be only carried out using the rules in Table 1. However, the current QNs still encompass some non-series-parallel networks (such as bridge circuits [16,23] ). For these types of QNs, Meng and others [16] proposed the star-mesh (SM) transform [16,24]. Next, we elucidate this process through a simple QN example, to remove node R from the Figure 3 (by simulating the mechanism of LOCC [21], we can sever the quantum entanglement between node R and all nodes connected to it, effectively excising node R from the QN), allowing the remaining nodes to form a complete network, namely a triangular network, we need to recalculate the entanglement between connections using the series-parallel rule.

Figure 3.

SM transform. The left network becomes the right one after removing node R through the SM transform.

Since removing a node does not affect the value between two nodes in a QN under the serial-parallel rule, that is: (5) seric1,c2=paraseric13,c23c12,seric1,c3=paraseric12,c23c13,seric2,c3=paraseric12,c13c23. \matrix{{{\text {seri}}\left({{c_1},{c_2}} \right)} \hfill & {= {\text {para}}\left({{\text {seri}}\left({{c_{13}},{c_{23}}} \right){c_{12}}} \right),} \hfill \cr {{\text {seri}}\left({{c_1},{c_3}} \right)} \hfill & {= {\text {para}}\left({{\text {seri}}\left({{c_{12}},{c_{23}}} \right){c_{13}}} \right),} \hfill \cr {{\text {seri}}\left({{c_2},{c_3}} \right)} \hfill & {= {\text {para}}\left({{\text {seri}}\left({{c_{12}},{c_{13}}} \right){c_{23}}} \right).} \hfill \cr} where c1, c2, c3 represent the original weights of links in the QN, and c12, c13, c23 represent the weights of links in the QN after the SM transform.

3.
Butterfly Network

The Butterfly network [19] is an irregular network topology as shown in Figure 4a, where its advantages in parallel computing and data transmission optimization are particularly pronounced. Thus, we aim to investigate the advantages of the butterfly network through the lens of entanglement percolation. In this section, we discuss the issue of entanglement percolation in butterfly networks under the series-parallel rule. Clearly, the QN will become a series-parallel network after removing nodes 1 and 4, and the specific simplification process as shown in Figure 4.

Figure 4.

Process of the entanglement transmission on a butterfly network. (a) The initial butterfly network. (b) The butterfly network after removing node 1 through SM transform. (c) The butterfly network after removing nodes 2 and 3 in Fig. (b). (d) The butterfly network after removing node 4 in Fig. (c) through SM transform. (e) The butterfly network after removing node 5 in Fig. (d) by performing series-parallel operations. Here, links with varying line colors denote the weights of the connections, which correspond to the degree of concurrence between the two nodes.

In Figure 4, the deep blue links represent the initial entanglement concurrence c of each resource pair. In the first step, we remove node 1 through the SM transform, resulting in Figure 4b. Where the red links indicate the entanglement concurrence x (6) 1+1c42=max12,1+1x21+1x44. {{1 + \sqrt {1 - {c^4}}} \over 2} = \max \left\{{{1 \over 2},{{\left({1 + \sqrt {1 - {x^2}}} \right)\left({1 + \sqrt {1 - {x^4}}} \right)} \over 4}} \right\}.

In the second step, we remove nodes 2 and 3 using the series (topology) rule, resulting in Figure 4c. Where the yellow links represent entanglement concurrence c2 after the series operation. Let α represents the entanglement concurrence generated by the parallel connection of c2 and x, where α = para(c2, x). Then we have that (7) 1+1α22=max12,1+1x21+1c44. {{1 + \sqrt {1 - {\alpha^2}}} \over 2} = \max \left\{{{1 \over 2},{{\left({1 + \sqrt {1 - {x^2}}} \right)\left({1 + \sqrt {1 - {c^4}}} \right)} \over 4}} \right\}.

In the third step, we proceed to remove node 4 using the SM transform. In Figure 4d, the light blue link represents the entanglement concurrence y and the green link represents the entanglement concurrence y′, and the purple link represents the entanglement concurrence y″ satisfying the equation: (8) 1+1αc22=max12,1+1y21+1yy241+1αx22=max12,1+1y21+1yy241+1cx22=max12,1+1y21+1yy24. \left\{{\matrix{{{{1 + \sqrt {1 - {{\left({\alpha c} \right)}^2}}} \over 2} = \max \left\{{{1 \over 2},{{\left({1 + \sqrt {1 - {y^2}}} \right)\left({1 + \sqrt {1 - {{\left({y'y''} \right)}^2}}} \right)} \over 4}} \right\}} \hfill \cr {{{1 + \sqrt {1 - {{\left({\alpha x} \right)}^2}}} \over 2} = \max \left\{{{1 \over 2},{{\left({1 + \sqrt {1 - {{y'}^2}}} \right)\left({1 + \sqrt {1 - {{\left({yy''} \right)}^2}}} \right)} \over 4}} \right\}} \hfill \cr {{{1 + \sqrt {1 - {{\left({cx} \right)}^2}}} \over 2} = \max \left\{{{1 \over 2},{{\left({1 + \sqrt {1 - {{y''}^2}}} \right)\left({1 + \sqrt {1 - {{\left({yy'} \right)}^2}}} \right)} \over 4}} \right\}} \hfill \cr}} \right..

Let β represents the entanglement concurrence generated by the parallel connection of α and y′, where β = para(α, y′). Thus, β satisfies (9) 1+1β22=max12,1+1α21+1y24. {{1 + \sqrt {1 - {\beta^2}}} \over 2} = \max \left\{{{1 \over 2},{{\left({1 + \sqrt {1 - {\alpha^2}}} \right)\left({1 + \sqrt {1 - {{y'}^2}}} \right)} \over 4}} \right\}.

Let α represents the entanglement concurrence generated by the parallel connection of c and y″, where γ = para(c, y″). Then we obtain (10) 1+1γ22=max12,1+1c21+1y24. {{1 + \sqrt {1 - {\gamma^2}}} \over 2} = \max \left\{{{1 \over 2},{{\left({1 + \sqrt {1 - {c^2}}} \right)\left({1 + \sqrt {1 - {{y''}^2}}} \right)} \over 4}} \right\}.

In the fourth step, we eliminate the remaining nodes between A and B using series-parallel rule. In Figure 4f, the black link represent the entanglement concurrence βγ after series connection below A and B, The final value of the sponge-crossing concurrence CSC is the entanglement concurrence value after y and βγ are connected in parallel, where CSC = para(y, βγ), i.e., (11) 1+1CSC22=max12,1+1y21+1(βγ)24. {{1 + \sqrt {1 - {C_{SC}}^2}} \over 2} = \max \left\{{{1 \over 2},{{\left({1 + \sqrt {1 - {y^2}}} \right)\left({1 + \sqrt {1 - {{(\beta \gamma)}^2}}} \right)} \over 4}} \right\}.

Now we want to compare the concurrence percolation with the CEP [10]. For the CEP, the connection between two nodes is the sum of the weights of all paths between them, determining the probability of singlet state formation [15]. This sum weight is referred to as the classical “sponge-crossing” probability, denoted as PSC. By replacing the original weight of each link in the ConPT with the classical bond percolation p [25] of the state, and utilizing the CEP, then can derive the series-parallel rule as illustrated in Table 2 [16].

Table 2.

Connectivity rules of CEP.

CEP
Series rulep = p1p2
Parallel rule1 − p = (1 − p1)(1 − p2) ⋯

In the case where nodes share an entangled state |ψ(θ)〉 (Eq. (1)), then, from Eq. (2), we derive that p=2sin2θ=11c2 p = 2{\sin^2}\theta = 1 - \sqrt {1 - {c^2}} . So the probability of ultimately obtaining a singlet state between two nodes under the ConPT is: (12) PSCConPT=11CSC2. P_{SC}^{\rm{ConPT}} = 1 - \sqrt {1 - C_{SC}^2}.

Due to the difficulty in finding an analytical solution to the Eq. (11), we use numerical analysis obtain the results for Table 3. To more vividly demonstrate the quantum superiority of the butterfly network under the ConPT, we plot the relationship between c and CSC (Figure 5), as well as the relationship between PSC and PSCConPT P_{SC}^{\rm{ConPT}} (Figure 6). We can see that the concurrence percolation exhibits quantum superiority in the butterfly network, then we find that the threshold for the concurrence percolation cth ≈ 0.71 and for the CEP cthCEP0.95 c_{th}^{CEP} \approx 0.95 . In our setup with a precision ɛ = 0.02, the saturation point csat of the butterfly network for the concurrence percolation is approximately 0.93.

Figure 5.

The scatter plot of c and CSC in the butterfly network under the ConPT. The black scatter plot represents the relationship graph between c and CSC, the red dashed line is the entanglement percolation threshold cth and the blue dashed line is the saturation point csat under the concurrence percolation.

Figure 6.

Comparison of PSCConPT P_{SC}^{{\rm{ConPT}}} and PSC in the butterfly network. The orange scatter plot represents the relationship graph between c and PSC, the purple scatter plot also represents the relationship graph between c and PSCConPT P_{SC}^{\rm{ConPT}} .

Table 3.

The data supporting the Figure 5 and the Figure 6 in the butterfly network.

cCSC 2CSCc2 {{{\partial^2}{C_{SC}}} \over {\partial {c^2}}} PSC 2PSCc2 {{{\partial^2}{P_{SC}}} \over {\partial {c^2}}} PSCConPT P_{SC}^{\rm{ConPT}}
0.660.5436782140.00130.05982517.19320.160706
0.680.5843457880.00060.07332719.17720.188495
0.700.6263473480.00040.089587910.33250.220455
0.720.668926005−0.00050.10872611.71000.256671
0.740.711917832−0.000386940.13153513.67250.297737
0.760.754400424−0.00140.15847715.36250.343585
0.780.796496077−0.00210.19010317.70750.395356
0.920.99929325−0.00690.60555520.23000.962410
0.941−0.00940.6998149.12001
0.961−0.00940.802165−35.40751

These results will contribute to the study of resource allocation problems in butterfly networks, aiding network designers in ensuring the minimum resource requirements for effective data transmission while avoiding excessive resource investment in the early stages of research.

4.
Parallel-Then-Series QN

In this section, we study the parallel-then-series QNs (i.e. type (c) networks in Figure 2). The QN goes from A to B, there are nodes R1, R2, R3,..., Ri−1 between nodes A and B (treat node A as R0, treat node B as Ri). Between nodes Ri and Ri−1, there are ki shared resource states with an entanglement concurrence of c, as shown in Figure 7. Where ki is any positive integer (i.e., the degree of each node is not equal). Next, we calculate the percolation threshold and saturation point of this QN under the series-parallel rule with the results presented in Table 1.

Figure 7.

Parallel-then-series QN network.

According to the series-parallel rule, we can deduce that the entanglement percolation formula for the above network is (13) {Ci=1(max{1,2(1+1c22)ki}1)2.CSC=iCi. \left\{{\matrix{{{C_i}} \hfill & {= \sqrt {1 - {{\left({\max \left\{{1,2{{\left({{{1 + \sqrt {1 - {c^2}}} \over 2}} \right)}^{{k_i}}}} \right\} - 1} \right)}^2}}.} \hfill \cr {{C_{SC}}} \hfill & {= \mathop \prod \limits_i {C_i}.} \hfill \cr}} \right.

In the formula, Ci is the entanglement concurrence shared between the nodes Ri and Ri−1 after the series-parallel rule, and CSC is the sponge-crossing concurrence of the nodes A and B.

Direct calculation of the analytical solution for the percolation threshold cth of this network is quite difficult. Here, we only calculate the analytical solution for its saturation point csat.

Next we calculate the saturation point of Eq. (13), it is known that the saturation point, csat, is given by the limit as CSC approaches 1, i.e., csat = limCSC→1 c. To achieve CSC = 1, it is sufficient to ensure that Ci = 1 hold for all i, i.e. 21+1c22K1 2{\left({{{1 + \sqrt {1 - {c^2}}} \over 2}} \right)^K} \le 1 for all i, where K=miniki K = \mathop {\min}\limits_i {k_i} . Thus, we obtain that c1211K12 c \le \sqrt {1 - {{\left({{2^{1 - {1 \over K}}} - 1} \right)}^2}} . Consequently, the saturation point csat is given by csat=1211K12 {c_{sat}} = \sqrt {1 - {{\left({{2^{1 - {1 \over K}}} - 1} \right)}^2}} .

Regarding the calculation of percolation threshold cth for such network, we present the following example, where all ki = 3 and i = 5 (there are 5 sets of resource states, each of which is composed of 3 paralleled ones). Under these specific conditions, we calculate the percolation threshold, cth, for this type of network: (14) Ci=1max1,21+1c22312.CSC=Ci5. \left\{{\matrix{{{C_i}} \hfill & {= \sqrt {1 - {{\left({\max \left\{{1,2{{\left({{{1 + \sqrt {1 - {c^2}}} \over 2}} \right)}^3}} \right\} - 1} \right)}^2}}.} \hfill \cr {{C_{SC}}} \hfill & {= C_i^5.} \hfill \cr}} \right.

We compare the concurrence percolation [16,17] and CEP [10] based on the aforementioned QN, and obtain Figures 8 and 9 through numerical analysis methods. The results indicate that under a precision ɛ = 0.02, the threshold for the concurrence percolation cth ≈ 0.63 and for the cthCEP0.93 c_{th}^{CEP} \approx 0.93 , and then the saturation point csat of the aforementioned QN under the concurrence percolation is approximately 0.81. The specific data support is provided by Table 4. From Figure 9, we can get that the concurrence percolation also exhibits quantum superiority in this type of QN.

Figure 8.

The scatter plot of c and CSC in the parallel-then-series network under conditions ki = 3 and i = 5. The black scatter plot represents the relationship graph between c and CSC, the red dashed line is the entanglement percolation threshold cth and the blue dashed line is the saturation point csat under the concurrence percolation.

Figure 9.

Comparison of PSCConPT P_{SC}^{\rm{ConPT}} and PSC in the parallel-then-series network under conditions ki = 3 and i = 5. The orange scatter plot represents the relationship graph between c and PSC, the purple scatter plot also represents the relationship graph between c and PSCConPT P_{SC}^{\rm{ConPT}} .

Table 4.

The data supporting the Figure 8 and the Figure 9 for the parallel-then-series network under conditions ki = 3 and i = 5.

cCSC 2CSCc2 {{{\partial^2}{C_{SC}}} \over {\partial {c^2}}} PSC 2PSCc2 {{{\partial^2}{P_{SC}}} \over {\partial {c^2}}} PSCConPT P_{SC}^{\rm{ConPT}}
0.600.55512.81570.02774.63010.168216
0.620.61420.43450.03695.64870.210849
0.640.6734−2.28990.04876.79740.260721
0.660.7317−5.34030.06348.06770.318373
0.680.7878−8.68930.08169.44160.384068
0.700.8405−12.29920.103910.890.458188
0.720.8882−16.12060.130812.36980.540542
0.740.9294−20.09260.16313.8210.630925
0.760.9627−24.14250.20115.16450.729428
0.780.9863−28.18610.245216.2980.835038
0.800.9986−32.12890.296217.09340.947103
0.821−36.15670.354117.39191
0.841−40.12380.418916.99941
0.921−55.78570.73312.7451
0.941−59.72850.8166−6.41831
0.961−63.67130.895−20.0641

In Figure 7, under this QN, we focus on analyzing a special case where the number of parallel connections between adjacent nodes in the QN increases geometrically, the network goes from A to B, there are nodes R1, R2, R3,..., Rm−1 between nodes A and B (treat node A as R0, treat node B as Rm). Between nodes Rm and Rm−1, there are km (m and k are both positive integers) shared resource states with an entanglement concurrence of c. The entanglement percolation formula for this QN configuration is (15) {Cm=1(max{1,2(1+1c22)km}1)2.CSC=mCm. \left\{{\matrix{{{C_m}} \hfill & {= \sqrt {1 - {{\left({\max \left\{{1,2{{\left({{{1 + \sqrt {1 - {c^2}}} \over 2}} \right)}^{{k^m}}}} \right\} - 1} \right)}^2}}.} \hfill \cr {{C_{SC}}} \hfill & {= \mathop \prod \limits_m {C_m}.} \hfill \cr}} \right.

In the formula, Cm is the entanglement concurrence shared between the Rm and Rm−1 nodes after the series-parallel rule are applied. Now we consider the simplest case of Eq. (15), the formula for ( k = 2 ) : (16) {C2m=1(max{1,2(1+1c22)2m}1)2.CSC=mC2m. \left\{{\matrix{{{C_{{2^m}}}} \hfill & {= \sqrt {1 - {{\left({\max \left\{{1,2{{\left({{{1 + \sqrt {1 - {c^2}}} \over 2}} \right)}^{{2^m}}}} \right\} - 1} \right)}^2}}.} \hfill \cr {{C_{SC}}} \hfill & {= \mathop \prod \limits_m {C_{{2^m}}}.} \hfill \cr}} \right.

We calculate its saturation point csat by using Eq. (4), csat2=limCSC1c2 c_{sat}^2 = {\lim_{{C_{SC}} \to 1}}{c^2} , i.e., C2m ≤ 1 for all m, that is 21+1c222m1 2{\left({{{1 + \sqrt {1 - {c^2}}} \over 2}} \right)^{{2^m}}} \le 1 for all m, derive c222 c \le \sqrt {2\sqrt 2 - 2} , So csat=222 {c_{sat}} = \sqrt {2\sqrt 2 - 2} .

Additionally, in this QN, we also derive an interesting result through analysis: if k and c are fixed, there exists a m such that 1+1c22km12 {\left({{{1 + \sqrt {1 - {c^2}}} \over 2}} \right)^{{k^m}}} \le {1 \over 2} holds true, at this moment mlogklog21+1c22 m \ge - {\log_k}\left({- {{\log}_2}{{1 + \sqrt {1 - {c^2}}} \over 2}} \right) , let M = ⌈m⌉ (M is the ceiling of m). Therefore, when mM is present, the subsequent shared state will be in a highly entangled state. This can save resource states, requiring only the minimum km states, without the need for additional resource states afterwards.

5.
Conclusions

In this paper, we study two irregular QNs—the butterfly network and the parallel-then-series network based on a deterministic entanglement transmission scheme (ConPT). We calculate the approximate of the entanglement percolation thresholds and saturation points for these QNs under certain accuracy. Moreover, we compare the concurrence percolation and the CEP under these two types QNs, and then find that the concurrence percolation demonstrates quantum superiority. The calculation of entanglement transmission thresholds and saturation points has practical significance for the optimization of subsequent types of QNs and quantum resource allocation issues.

There have been no research findings on deterministic entanglement percolation schemes for high-dimensional complex QNs. Therefore, it is essential to continue exploring how to define swapping and concentration functions to adapt to high-dimensional complex QNs. Additionally, delving into the properties of infinite-dimensional QNs is another question worth considering deeply.

DOI: https://doi.org/10.2478/qic-2024-0004 | Journal eISSN: 3106-0544 | Journal ISSN: 1533-7146
Language: English
Page range: 58 - 68
Submitted on: Sep 13, 2024
Accepted on: Dec 8, 2024
Published on: Jan 9, 2025
Published by: Cerebration Science Publishing Co., Limited
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2025 Liuxia Han, Yaqi Zhao, Kan He, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.