Quantum Communication: Transmitting Information at the Quantum Level
Quantum communication uses the principles of quantum mechanics to transmit information in ways that are physically impossible to intercept without detection. This page covers the core definition of quantum communication, the mechanisms that make it work, the real-world scenarios where it is being deployed, and the decision boundaries that determine when quantum communication outperforms classical alternatives. The stakes are high: national laboratories, defense agencies, and central banks worldwide are investing in quantum-secured networks precisely because classical encryption faces an existential threat from quantum computing hardware.
Definition and scope
Quantum communication is the transmission of information encoded in quantum states — typically individual photons — between two or more parties. Unlike classical communication, where bits are definite 0s or 1s, quantum communication encodes information in qubits that can exist in superposition, and whose states collapse irreversibly upon measurement. That collapse is not a bug; it is the security mechanism.
The field's practical core is quantum key distribution (QKD), a protocol for establishing cryptographic keys whose security derives from quantum physics rather than computational hardness. Broader quantum communication also includes quantum teleportation of states (not matter), quantum dense coding, and the infrastructure layer known as quantum communication networks — fiber and free-space links between nodes that relay quantum states across distances.
The scope is genuinely global. The Chinese satellite Micius, launched in 2016 by the Chinese Academy of Sciences, demonstrated QKD between ground stations separated by 1,203 kilometers, a record at the time of the experiment (Nature, 2017, vol. 549). The U.S. Department of Energy's National Quantum Initiative, authorized under the National Quantum Initiative Act of 2018 (Public Law 115-368), funds seventeen national labs working on quantum networking infrastructure.
How it works
The operating principle rests on quantum entanglement and the no-cloning theorem. The no-cloning theorem, a direct consequence of quantum mechanics' linearity, proves that an arbitrary unknown quantum state cannot be copied exactly — which means any eavesdropper attempting to intercept a quantum channel necessarily disturbs it in a detectable way.
A standard QKD exchange follows these steps:
- State preparation: The sender (conventionally called Alice) encodes bits as quantum states of photons — for example, polarization angles of 0°, 45°, 90°, or 135°.
- Transmission: Photons travel through a fiber-optic or free-space channel to the receiver (Bob).
- Measurement: Bob measures each photon using a randomly chosen basis. Because he cannot know Alice's basis in advance, roughly 50 percent of his measurements use the wrong basis and are discarded.
- Sifting: Alice and Bob communicate over a classical (insecure) channel to compare which bases matched. Matching measurements form the raw key.
- Error estimation: A sample of the raw key is compared publicly. Errors above a threshold (typically around 11 percent for the BB84 protocol) indicate eavesdropping or channel noise.
- Privacy amplification: Mathematical post-processing distills a shorter, provably secure final key from the raw key.
The BB84 protocol, introduced by Charles Bennett and Gilles Brassard in 1984, remains the most widely implemented QKD scheme. The E91 protocol, developed by Artur Ekert in 1991, uses entangled photon pairs instead, with Bell's theorem providing the security proof — any hidden-variable eavesdropping strategy violates measurable Bell inequalities.
Photon loss is the field's persistent engineering challenge. Optical fiber attenuates signals roughly 0.2 dB per kilometer, limiting direct QKD to distances of approximately 100–200 kilometers without quantum repeaters. Quantum repeaters — devices that use entanglement swapping and quantum memory to relay states without measuring them — are still in the laboratory stage at most facilities.
Common scenarios
Government and defense networks: Several national governments operate dedicated quantum-secured links. China's Beijing-Shanghai quantum backbone, spanning 2,000 kilometers, has carried traffic between financial institutions and government agencies since 2017, according to reporting in Science (vol. 360, 2018).
Financial sector key exchange: European banks participating in the OpenQKD consortium, a European Commission Horizon 2020 project, have trialed QKD for protecting interbank settlement communications — a domain where the cost of a compromise is not merely reputational but systemic.
Satellite-based free-space links: Where fiber is impractical — oceanic crossings, remote infrastructure — satellite relay provides an alternative. Free-space links avoid fiber attenuation but introduce atmospheric turbulence and pointing precision requirements measured in microradians.
Quantum internet testbeds: The broader physics landscape includes testbeds such as the Quantum Internet Alliance's European network and Argonne National Laboratory's 52-mile Chicago-area quantum loop, which connects three sites using entangled photons through deployed fiber.
Decision boundaries
Not every security problem requires quantum communication. Classical post-quantum cryptographic algorithms — NIST finalized its first set of post-quantum cryptographic standards in 2024 (NIST Post-Quantum Cryptography) — offer computational security against quantum attacks at far lower infrastructure cost.
Quantum communication's advantage is information-theoretic security: security that holds even against an adversary with unlimited computing power, because the laws of physics — not mathematical complexity — enforce it. Classical post-quantum algorithms remain computationally secure, meaning security depends on the assumption that certain mathematical problems stay hard.
The practical decision boundary looks like this:
| Criterion | Quantum Communication | Post-Quantum Classical |
|---|---|---|
| Security basis | Physical law | Computational hardness |
| Infrastructure cost | Very high | Moderate |
| Deployment range | ~100–200 km (fiber) | Unlimited |
| Key distribution speed | Kilobits per second | Gigabits per second |
| Maturity | Early commercial | Standardization complete |
For organizations protecting data with a classification horizon measured in decades — think nuclear command systems or long-duration intelligence archives — the information-theoretic guarantee of QKD is the relevant comparison point. For most enterprise encryption needs, post-quantum algorithms are sufficient and far more practical to deploy at scale.
Quantum sensing and metrology shares some of the same underlying physics — the fragility of quantum states is simultaneously the source of sensitivity and the source of security — making the two fields increasingly intertwined at the component level.
References
- National Quantum Initiative Act, Public Law 115-368 (2018)
- NIST Post-Quantum Cryptography Project
- U.S. Department of Energy — Quantum Internet Blueprint
- Yin et al., "Satellite-based entanglement distribution over 1200 kilometers," Science, 2017
- Liao et al., "Satellite-to-ground quantum key distribution," Nature, vol. 549, 2017
- Liao et al., "Satellite relayed intercontinental quantum network," Science, vol. 360, 2018
- Argonne National Laboratory — Chicago Quantum Exchange