Quantum Communication: Transmitting Information at the Quantum Level

Quantum communication is the discipline of encoding, transmitting, and receiving information using quantum mechanical properties — primarily superposition, entanglement, and the no-cloning theorem — as the physical substrate for information transfer. This page covers the definition and scope of quantum communication, the physical mechanisms that govern how it operates, the scenarios where it is applied, and the boundaries that distinguish it from adjacent fields such as classical cryptography and post-quantum cryptography. Understanding these distinctions matters because quantum communication offers security guarantees that derive from physics, not computational hardness, a fundamentally different foundation than any classical protocol.


Definition and scope

Quantum communication encompasses protocols and hardware systems that exploit quantum states — typically individual photons or entangled particle pairs — to transmit information between two or more parties. The defining characteristic is that any eavesdropping attempt on a quantum channel physically disturbs the transmitted states in a detectable way, a property grounded in the Heisenberg Uncertainty Principle and the no-cloning theorem, which prohibits the creation of an identical copy of an arbitrary unknown quantum state.

The National Institute of Standards and Technology (NIST) distinguishes quantum communication from post-quantum cryptography on a structural basis: post-quantum cryptography runs on classical hardware using math problems believed to be hard for quantum computers, while quantum communication uses quantum hardware and quantum states as the transmission medium itself.

The scope of quantum communication spans three primary domains:

  1. Quantum Key Distribution (QKD) — generating and distributing cryptographic keys whose security is guaranteed by quantum mechanics rather than computational assumptions.
  2. Quantum teleportation — transferring quantum states between locations using pre-shared entanglement and a classical side channel, without physically moving the particle itself.
  3. Quantum networking — linking multiple quantum nodes, potentially through quantum repeaters, into a broader infrastructure sometimes called the quantum internet.

The broader field connects directly to the science research landscape, where quantum information sits at the intersection of physics, computer science, and engineering.


How it works

The operational mechanism of quantum communication rests on three physical principles that have no classical analog.

Superposition allows a quantum bit (qubit) to exist in a combination of states 0 and 1 simultaneously until a measurement forces a definite outcome. In QKD, this means an eavesdropper cannot passively copy a qubit without altering it, because measurement collapses the superposition.

Entanglement links two particles such that measuring one instantly determines the correlated state of the other, regardless of the physical separation between them. The American Physical Society (APS) identifies entanglement-based QKD — specifically the E91 protocol, proposed by Artur Ekert in 1991 — as one of the foundational protocols exploiting Bell inequality violations to detect any interception attempt.

The no-cloning theorem, proven independently by Wootters and Zurek and by Dieks in 1982 (published in Physics Letters A), establishes that no quantum operation can produce a perfect duplicate of an unknown quantum state. This provides the physical enforcement layer for QKD security.

A standard QKD session proceeds through 4 discrete phases:

  1. Quantum transmission — the sender (Alice) encodes key bits onto individual photon polarization states and transmits them over a quantum channel (typically optical fiber or free-space optics).
  2. Measurement — the receiver (Bob) measures incoming photons using randomly selected bases.
  3. Basis reconciliation — Alice and Bob compare their basis choices over a classical authenticated channel, discarding bits where bases did not match.
  4. Error analysis and privacy amplification — the error rate on the remaining bits is measured; an error rate exceeding approximately 11% in the BB84 protocol signals potential eavesdropping and triggers session abort. Privacy amplification then compresses the key to eliminate any partial information a third party might have obtained.

The BB84 protocol, introduced by Charles Bennett and Gilles Brassard in 1984 at a conference in Bangalore, India, remains the most widely studied and deployed QKD protocol.


Common scenarios

Quantum communication is deployed or actively researched across 4 primary application environments.

Government and defense networks represent the highest-maturity deployment context. China's Micius satellite, launched in 2016 by the Chinese Academy of Sciences, demonstrated satellite-based QKD over a distance exceeding 1,200 kilometers in 2017, establishing a terrestrial-to-satellite quantum link that classical methods cannot replicate.

Financial infrastructure uses QKD to protect inter-datacenter key exchange, where a compromise of classical channels could expose encrypted transaction records to retrospective decryption. The Bank of England has publicly acknowledged quantum communication as part of its long-term cryptographic risk assessment framework.

Healthcare data transmission is a candidate application given the multi-decade sensitivity of medical records and the harvest-now-decrypt-later threat model, where adversaries collect encrypted classical traffic today for decryption once quantum computers become capable.

Quantum network testbeds such as the US Department of Energy's 17-node quantum network across Argonne National Laboratory and the Chicago metro area (DOE Office of Science) serve as infrastructure prototypes for eventual wide-area quantum networking.


Decision boundaries

Quantum communication is frequently conflated with two adjacent fields that it does not encompass.

Quantum communication vs. post-quantum cryptography (PQC): PQC, as standardized by NIST in 2024 through FIPS 203, FIPS 204, and FIPS 205 (NIST FIPS 203), runs entirely on classical hardware. Quantum communication requires quantum hardware at both endpoints and on the channel. The security source also differs: PQC security rests on mathematical hardness assumptions; QKD security rests on physical law. Organizations facing a near-term migration deadline typically deploy PQC because quantum hardware infrastructure does not yet exist at commercial scale. QKD is appropriate where physical channel installation is feasible and the threat model demands information-theoretic security rather than computational security.

Quantum communication vs. quantum computing: Quantum computing uses qubits to perform calculations that are intractable for classical processors. Quantum communication uses qubits as information carriers over a channel. A quantum computer does not transmit information in the quantum communication sense; it processes it. The two fields share hardware primitives — qubits, entanglement, and superposition — but their operational goals are distinct. Quantum repeaters, which will be necessary to extend QKD beyond roughly 500 kilometers (the approximate photon loss limit in optical fiber), represent a convergence point where quantum memory and processing components from quantum computing research are essential to quantum communication infrastructure.

Readers seeking broader context on how quantum communication fits within the scientific research ecosystem can explore the Quantum Physics Authority index for additional reference material.


References


The law belongs to the people. Georgia v. Public.Resource.Org, 590 U.S. (2020)