HTML conversions sometimes display errors due to content that did not convert correctly from the source. This paper uses the following packages that are not yet supported by the HTML conversion tool. Feedback on these issues are not necessary; they are known and are being worked on.

  • failed: romannum

Authors: achieve the best HTML results from your LaTeX submissions by following these best practices.

License: CC BY 4.0
arXiv:2402.15462v1 [quant-ph] 23 Feb 2024

Unveiling the Importance of Longer Paths in Quantum Networks

Xinqi Hu    Gaogao Dong [email protected] School of Mathematical Sciences, Jiangsu University, Zhenjiang, Jiangsu 212013, China    Renaud Lambiotte [email protected] Mathematical Institute, University of Oxford, Oxford OX2 6GG, UK Turing Institute, London NW1 2DB, UK    Kim Christensen [email protected] Blackett Laboratory and Centre for Complexity Science, Imperial College London, London SW7 2AZ, UK    **gfang Fan School of Systems Science and Institute of Nonequilibrium Systems, Bei**g Normal University, Bei**g 100875, China    Lixin Tian School of Mathematical Sciences, Jiangsu University, Zhenjiang, Jiangsu 212013, China    Shlomo Havlin Department of Physics, Bar-Ilan University, Ramat Gan 52900, Israel    Xiangyi Meng [email protected] Department of Physics and Astronomy, Northwestern University, Evanston, Illinois 60208, USA
(February 23, 2024)
Abstract

The advancement of quantum communication technologies is calling for a better understanding of quantum network (QN) design from first principles, approached through network science. Pioneering studies have established a classical percolation map** to model the task of entanglement transmission across QN. Yet, this map** does not capture the stronger, yet not fully understood connectivity observed in QNs, which facilitates more efficient entanglement transmission than predicted by classical percolation. In this work, we explore the critical phenomena of the potential statistical theory underlying this enhanced connectivity, known as concurrence percolation. Compared to classical percolation, the concurrence percolation map** employs a unique approach of “superposing” path connectivities, utilizing a different set of path connectivity rules, thereby boosting the overall network connectivity. Firstly, we analytically derive the percolation critical exponents for hierarchical, scale-free networks, particularly the (U,V𝑈𝑉U,Vitalic_U , italic_V) flower model, characterized by two distinct network length scales, UV𝑈𝑉U\leq Vitalic_U ≤ italic_V. Our analysis confirms that classical and concurrence percolations, albeit both satisfying the hyperscaling relation, fall into separate universality classes. Most importantly, this separation stems from their different treatment of non-shortest path contributions to overall connectivity. Notably, as the longer path scale V𝑉Vitalic_V increases, concurrence percolation retains unignorable dependence of both its critical threshold and critical exponents on V𝑉Vitalic_V and thus, comparing with its classical counterpart, shows a higher resilience to the weakening of non-shortest paths. This higher resilience is also observed in real-world network topology, e.g., the Internet. Our findings reveal a first principle for QN design: longer paths still contribute significantly to QN connectivity—as long as they are abundant.

The emerging prospect of quantum Internet [1] is driving the field of quantum communication to explore larger and more complex scales, entering the realms of statistical physics [2] and network science [1]. As a response, a quantum network (QN) model [3] has been introduced to explore the potentials of transmitting quantum resource—most notably, entanglement [4]—across complex network topologies. In the QN model, each link represents an identical, partially entangled state |ψ(θ)=cosθ|00+sinθ|11ket𝜓𝜃𝜃ket00𝜃ket11\left|\psi(\theta)\right\rangle=\cos\theta\left|00\right\rangle+\sin\theta% \left|11\right\rangle| italic_ψ ( italic_θ ) ⟩ = roman_cos italic_θ | 00 ⟩ + roman_sin italic_θ | 11 ⟩, shared between two qubits that come from different nodes [Fig. 1a]. The parameter θ[0,π/4]𝜃0𝜋4\theta\in[0,\pi/4]italic_θ ∈ [ 0 , italic_π / 4 ] serves as a “link weight” that quantifies the degree of entanglement. Specifically, θ=π/4𝜃𝜋4\theta=\pi/4italic_θ = italic_π / 4 signifies a perfectly entangled state, while θ=0𝜃0\theta=0italic_θ = 0 indicates zero entanglement. This homogeneous, pure-state QN maps onto a classical percolation problem [3], where each link can employ certain quantum operations as a sort of “gambling” to enhance its level of entanglement, with allows a probability p2sin2θ𝑝2superscript2𝜃p\equiv 2\sin^{2}\thetaitalic_p ≡ 2 roman_sin start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT italic_θ of becoming perfectly entangled and 1p1𝑝1-p1 - italic_p of losing all entanglement [3]. Within this percolation analogy, entanglement transmission between two distant nodes—say, Alice (A) and Bob (B)—translates to the probability of having a path comprising only maximally entangled links between A and B. The presence of such a path further ensures that infinite-distance entanglement can be established between A and B [5], marking a successful event of entanglement transmission.

In the thermodynamic limit (i.e., when the number of nodes N𝑁N\to\inftyitalic_N → ∞), classical percolation exhibits a critical threshold pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT [6, *galam1996universal, *cohen2002percolation]. It implies that if θ<sin1pth/2𝜃superscript1subscript𝑝th2\theta<\sin^{-1}{\sqrt{p_{\text{th}}/2}}italic_θ < roman_sin start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT square-root start_ARG italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT / 2 end_ARG, no entanglement transmission can happen between A and B when their distance L𝐿L\to\inftyitalic_L → ∞. This is, however, refuted by recent discovery of an alternate, more effective map** from QN to a percolation-like statistical theory of concurrence percolation [5].

The best way to understand the difference between classical and concurrence percolation is to express the percolation connectivity between A and B as a “superposition” of all paths’ connectivity [Fig. 1b]: In classical percolation, the overall probability of connection of A and B can be computed through each individual path, contingent upon p𝑝pitalic_p. The superposition can be simplified into connectivity rules, such as the series and parallel rules [Fig. 1a, left]. Similarly, in concurrence percolation, a distinct parameter c𝑐citalic_c called concurrence, a conventional measure of entanglement, can be defined via θ𝜃\thetaitalic_θ in the QN, csin2θ𝑐2𝜃c\equiv\sin 2\thetaitalic_c ≡ roman_sin 2 italic_θ. The superposition of concurrence paths adheres to a distinct set of connectivity rules [Fig. 1a, right]. Concurrence percolation also reveals a critical threshold cthsubscript𝑐thc_{\text{th}}italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT, which, in terms of θ𝜃\thetaitalic_θ, is always lower than pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT: (sin1cth)/2sin1pth/2superscript1subscript𝑐th2superscript1subscript𝑝th2\left(\sin^{-1}{c_{\text{th}}}\right)/2\leq\sin^{-1}{\sqrt{p_{\text{th}}/2}}( roman_sin start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ) / 2 ≤ roman_sin start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT square-root start_ARG italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT / 2 end_ARG [9], indicating that QNs potentially have stronger connectivity than classical percolation predicts.

What is the origin of this stronger connectivity, from a statistical physics perspective? It is conceivable that concurrence percolation might simply be a variant of classical percolation (albeit under a different set of variables), thereby belonging to the same universality class. Alternatively, concurrence percolation could represent a fundamentally distinct phenomenon from classical percolation, characterized by distinct critical exponents. Previous research, unfortunately, has been unable to identify the universality class of concurrence percolation due to computational constraints [10]. Gaining a deeper insight into the nature of this stronger concurrence connectivity could shed light on QN design from first principles, as explored through the lens of network science.

In this study, we investigate the critical phenomena of concurrence percolation in networks displaying hierarchical and scale-free structures, typical characteristics found in numerous real-worlds networks such as the Internet [11]. Firstly, we exactly determine the critical exponents for a family of hierarchical scale-free network models known as the (U𝑈Uitalic_U,V𝑉Vitalic_V) flowers [12], which are characterized by two distinct network length scales, UV𝑈𝑉U\leq Vitalic_U ≤ italic_V. Our analysis confirms that concurrence percolation falls into a distinct universality class, separated from that of classical percolation.

Most importantly, we highlight that this separation is largely reflected in how the two percolation theories respond to an increase in the longer length scale V𝑉Vitalic_V, controlling the lengths of non-shortest paths. When V𝑉V\to\inftyitalic_V → ∞, we find that the classical critical exponents become decoupled from V𝑉Vitalic_V, depending only on the shorter length scale U𝑈Uitalic_U. In contrast, the concurrence critical exponents depend on both U𝑈Uitalic_U and V𝑉Vitalic_V. This distinction extends to the behavior of critical thresholds: while both pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT and cthsubscript𝑐thc_{\text{th}}italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT tend towards unity as V𝑉V\to\inftyitalic_V → ∞, the concurrence threshold cthsubscript𝑐thc_{\text{th}}italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT shows a slower rate of approach. This implies a higher resilience of concurrence connectivity against increase in V𝑉Vitalic_V, a phenomenon we also observe in real-world network topology. Our findings underscore the role of longer paths in QN: despite the exponential decay of entanglement along longer paths, these paths cannot be ignored in concurrence percolation. In fact, longer paths still contribute significantly to QN connectivity—as long as they are abundant. In practice, this principle suggests that an effective design of QN should move beyond a focus solely on the shortest paths to include a strategic incorporation of longer paths as well. This view may open up opportunities to explore advanced quantum communication technologies, such as path routing [13] and network coding [14], in a synergistic manner.

Refer to caption
(a)
Refer to caption
(b)
Figure 1: Percolation map**s of a quantum network (QN). (a) In a QN, a node comprises several qubits, each entangled with those in other nodes, and a link symbolizes a partially entangled bipartite state |ϕketitalic-ϕ\left|\phi\right\rangle| italic_ϕ ⟩ shared between two nodes. Entanglement transmission across QN can be understood from two distinct statistical physics map**s: classical percolation (blue) vs. concurrence “quantum” percolation (red). Each map** is based on its own set of path connectivity rules—series and parallel rules—which dictate the “superposition” of multiple path connectivities to determine the total percolation connectivity between two distant nodes, say, Alice (A) and Bob (B). (b) Different connectivity rules result in a varied emphasis on path length in classical vs. concurrence percolations. While in classical percolation, the shortest path between A and B dominates the overall network connectivity, in concurrence percolation, longer paths also contribute to the concurrence connectivity if they are abundant.
Refer to caption
Figure 2: (U𝑈Uitalic_U,V𝑉Vitalic_V) flower as hierarchical scale-free network. The (U𝑈Uitalic_U,V𝑉Vitalic_V) flower is a self-similar network, constructed by iteratively replacing each link with a motif comprising two nodes connected by two parallel paths of varying lengths UV𝑈𝑉U\leq Vitalic_U ≤ italic_V. The n𝑛nitalic_n-th generation (U𝑈Uitalic_U,V𝑉Vitalic_V) flower can be fully decomposed into 2nsuperscript2𝑛2^{n}2 start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT non-overlap** paths between A and B, with varying lengths (Un,VUn1,,Vn)superscript𝑈𝑛𝑉superscript𝑈𝑛1superscript𝑉𝑛(U^{n},VU^{n-1},...,V^{n})( italic_U start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_V italic_U start_POSTSUPERSCRIPT italic_n - 1 end_POSTSUPERSCRIPT , … , italic_V start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) and corresponding count of paths (Cn0,Cn1,,Cnn)subscriptsuperscript𝐶0𝑛subscriptsuperscript𝐶1𝑛subscriptsuperscript𝐶𝑛𝑛(C^{0}_{n},C^{1}_{n},...,C^{n}_{n})( italic_C start_POSTSUPERSCRIPT 0 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , italic_C start_POSTSUPERSCRIPT 1 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , … , italic_C start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ). The example shows U=2𝑈2U=2italic_U = 2 and V=3𝑉3V=3italic_V = 3.
Refer to caption
Figure 3: Critical phenomena on (U𝑈Uitalic_U,V𝑉Vitalic_V) flower. (a-e) Critical exponent ν𝜈\nuitalic_ν in classical (blue) and quantum (red) map**s. (f-j) Critical exponents β𝛽\betaitalic_β and dfsubscript𝑑𝑓d_{f}italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT.

I Critical Exponents and Hyperscaling

We begin by focusing on (U𝑈Uitalic_U,V𝑉Vitalic_V) flowers [12], a canonical example of hierarchical, scale-free networks. In a (U𝑈Uitalic_U,V𝑉Vitalic_V) flower, the (n+1)𝑛1(n+1)( italic_n + 1 )-th generation is built by replacing each existing link in the n𝑛nitalic_n-th generation by a basic motif, formed by a shorter path with U𝑈Uitalic_U links and a longer path with V𝑉Vitalic_V links between two nodes A and B (Fig. 2). The two scales U𝑈Uitalic_U and V𝑉Vitalic_V determine different network characteristics: while the shorter length scale U𝑈Uitalic_U governs the shortest path length L=Un𝐿superscript𝑈𝑛L=U^{n}italic_L = italic_U start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT between A and B, which is asymptotically the same as the diameter of the network [15], the longer length scale V𝑉Vitalic_V controls the lengths of non-shortest paths, thereby controlling the dimension of the network, d=lnN/lnL𝑑𝑁𝐿d=\ln N/\ln Litalic_d = roman_ln italic_N / roman_ln italic_L, where N(U+V)nsimilar-to𝑁superscript𝑈𝑉𝑛N\sim\left(U+V\right)^{n}italic_N ∼ ( italic_U + italic_V ) start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT is the number of nodes in the network [15]. Note that all length scales are established in the chemical (“time”) space, thus differing from traditional Euclidean length scales ξ𝜉\xiitalic_ξ by an additional dynamic exponent z𝑧zitalic_z, related by Lξzsimilar-to𝐿superscript𝜉𝑧L\sim\xi^{z}italic_L ∼ italic_ξ start_POSTSUPERSCRIPT italic_z end_POSTSUPERSCRIPT [12].

A promising feature of (U𝑈Uitalic_U,V𝑉Vitalic_V) flowers is that they are also series-parallel networks [16]. Consequently, they allow for an analytical calculation of the classical sponge-crossing probability [6, 17], Pscsubscript𝑃scP_{\text{sc}}italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT, which is the probability of connection between the two boundary nodes A and B (a.k.a. Π(p;L)subscriptΠ𝑝𝐿\Pi_{\infty}(p;L)roman_Π start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT ( italic_p ; italic_L ) in boundary conformal field theories [18]). Specifically, Pscsubscript𝑃scP_{\text{sc}}italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT can be calculated through iteratively applying an exact renormalization-group (RG) function that is constructed from series and parallel rules [Fig. 1a]:

(Psc)=para(seri(Psc,,PscU),seri(Psc,,PscV)).subscript𝑃scparaserisuperscriptsubscript𝑃scsubscript𝑃sc𝑈serisuperscriptsubscript𝑃scsubscript𝑃sc𝑉\displaystyle\mathcal{R}(P_{\text{sc}})=\text{para}(\text{seri}(\stackrel{{% \scriptstyle U}}{{\overbrace{P_{\text{sc}},\cdots,P_{\text{sc}}}}}),\text{seri% }(\stackrel{{\scriptstyle V}}{{\overbrace{P_{\text{sc}},\cdots,P_{\text{sc}}}}% })).caligraphic_R ( italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT ) = para ( seri ( start_RELOP SUPERSCRIPTOP start_ARG over⏞ start_ARG italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT , ⋯ , italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT end_ARG end_ARG start_ARG italic_U end_ARG end_RELOP ) , seri ( start_RELOP SUPERSCRIPTOP start_ARG over⏞ start_ARG italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT , ⋯ , italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT end_ARG end_ARG start_ARG italic_V end_ARG end_RELOP ) ) . (1)

Equation (1) allows us to derive the n𝑛nitalic_n-th generation Pscsubscript𝑃scP_{\text{sc}}italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT by nesting \mathcal{R}caligraphic_R n𝑛nitalic_n times, given by Psc=(((n(p))))P_{\text{sc}}=\stackrel{{\scriptstyle n}}{{\overbrace{\mathcal{R}(\mathcal{R}(% \mathcal{R}(\cdots\mathcal{R}}}}(p))))italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT = start_RELOP SUPERSCRIPTOP start_ARG over⏞ start_ARG caligraphic_R ( caligraphic_R ( caligraphic_R ( ⋯ caligraphic_R end_ARG end_ARG start_ARG italic_n end_ARG end_RELOP ( italic_p ) ) ) ). The critical thresholds pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT can be determined by locating the nontrivial fixed point of p𝑝pitalic_p that satisfies the RG fixed point equation, p=(p)𝑝𝑝p=\mathcal{R}(p)italic_p = caligraphic_R ( italic_p ). It also means that the sponge-crossing probability Pscsubscript𝑃scP_{\text{sc}}italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT at criticality is equal to pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT when n𝑛n\to\inftyitalic_n → ∞.

Similarly, the sponge-crossing concurrence Cscsubscript𝐶scC_{\text{sc}}italic_C start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT and the concurrence threshold cthsubscript𝑐thc_{\text{th}}italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT (hereafter referred to as “quantum” results) can be calculated by replacing Pscsubscript𝑃scP_{\text{sc}}italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT to Cscsubscript𝐶scC_{\text{sc}}italic_C start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT in Eq. (1) and the corresponding classical series/parallel rules to their quantum counterparts [Fig. 1a]. For example, in a (2222,2222) flower, for concurrence percolation, we find cth=0.759subscript𝑐th0.759c_{\text{th}}=0.759\cdotsitalic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT = 0.759 ⋯, or θ0.549π/4𝜃0.549𝜋4\theta\approx 0.549\pi/4italic_θ ≈ 0.549 italic_π / 4, while for classical percolation, pth=(51)/20.618subscript𝑝th5120.618p_{\text{th}}=(\sqrt{5}-1)/2\approx 0.618italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT = ( square-root start_ARG 5 end_ARG - 1 ) / 2 ≈ 0.618 [15], corresponding to θ0.750π/4𝜃0.750𝜋4\theta\approx 0.750\pi/4italic_θ ≈ 0.750 italic_π / 4 [Fig. 3c]. The results reinforce that the quantum threshold is lower than the classical one [5].

Near criticality, the thermal exponent ν𝜈\nuitalic_ν characterizes the divergence of the correlation length as one approaches the critical point. We can obtain an exact expression for ν𝜈\nuitalic_ν by evaluating [15]

R(p)p|p=pth=[(UL)/L]1/νν=lnUln(R(p)/p)|p=pth,evaluated-at𝑅𝑝𝑝𝑝subscript𝑝thsuperscriptdelimited-[]𝑈𝐿𝐿1𝜈𝜈evaluated-at𝑈𝑅𝑝𝑝𝑝subscript𝑝th\frac{\partial R(p)}{\partial p}\big{|}_{p=p_{\text{th}}}=\left[\left(UL\right% )/L\right]^{1/\nu}\Rightarrow\nu=\frac{\ln{U}}{\ln\left({\partial R(p)}/{% \partial p}\right)}\big{|}_{p=p_{\text{th}}},divide start_ARG ∂ italic_R ( italic_p ) end_ARG start_ARG ∂ italic_p end_ARG | start_POSTSUBSCRIPT italic_p = italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT end_POSTSUBSCRIPT = [ ( italic_U italic_L ) / italic_L ] start_POSTSUPERSCRIPT 1 / italic_ν end_POSTSUPERSCRIPT ⇒ italic_ν = divide start_ARG roman_ln italic_U end_ARG start_ARG roman_ln ( ∂ italic_R ( italic_p ) / ∂ italic_p ) end_ARG | start_POSTSUBSCRIPT italic_p = italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT end_POSTSUBSCRIPT , (2)

where L𝐿Litalic_L and UL𝑈𝐿ULitalic_U italic_L correspond to the diameters of the n𝑛nitalic_n-th and (n+1)𝑛1\left(n+1\right)( italic_n + 1 )-th generations of the network, respectively. Compared to the established classical value of ν=1.635𝜈1.635\nu=1.635\cdotsitalic_ν = 1.635 ⋯ [15], we find a distinct quantum value of ν=1.352𝜈1.352\nu=1.352\cdotsitalic_ν = 1.352 ⋯. These exact values are numerically verified by finite-size scaling analysis: assuming that the finite-size critical threshold pth(L)subscript𝑝th𝐿p_{\text{th}}(L)italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ( italic_L ) deviates from the true threshold pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT by |pth(L)pth|L1/νsimilar-tosubscript𝑝th𝐿subscript𝑝thsuperscript𝐿1𝜈|p_{\text{th}}(L)-p_{\text{th}}|\sim L^{-1/\nu}| italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ( italic_L ) - italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT | ∼ italic_L start_POSTSUPERSCRIPT - 1 / italic_ν end_POSTSUPERSCRIPT, we find ν1.63528(1)𝜈1.635281\nu\approx 1.63528(1)italic_ν ≈ 1.63528 ( 1 ) for classical and ν1.3530(1)𝜈1.35301\nu\approx 1.3530(1)italic_ν ≈ 1.3530 ( 1 ) for quantum on both sides of the critical threshold of the (2222,2222) flower [Figs. 3a,b,d,e] (also see SI, Section IV).

In the traditional study of classical percolation, not only does the length scale but the cluster size distribution shows critical behaviors as well. Notably, the emergence of a giant component when ppth𝑝subscript𝑝thp\geq p_{\text{th}}italic_p ≥ italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT [19], where the strength P=Ng/Nsubscript𝑃subscript𝑁𝑔𝑁P_{\infty}=N_{g}/Nitalic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT = italic_N start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT / italic_N represents the giant component’s relative size Ngsubscript𝑁𝑔N_{g}italic_N start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT to the total network size N𝑁Nitalic_N, leads to a scaling behavior as P(ppth)βsimilar-tosubscript𝑃superscript𝑝subscript𝑝th𝛽P_{\infty}\sim(p-p_{\text{th}})^{\beta}italic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT ∼ ( italic_p - italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ) start_POSTSUPERSCRIPT italic_β end_POSTSUPERSCRIPT for ppth+𝑝superscriptsubscript𝑝thp\to p_{\text{th}}^{+}italic_p → italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT start_POSTSUPERSCRIPT + end_POSTSUPERSCRIPT. This cluster-based concept of Psubscript𝑃P_{\infty}italic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT has not been translated into the quantum counterpart, which relies on path connectivity rules and lacks a notion of “clusters.” Nevertheless, we notice that Psubscript𝑃P_{\infty}italic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT can be alternatively considered as the probability of a randomly chosen node in the bulk to reach the boundaries of the network [15]. This consideration allows us to redefine Psubscript𝑃P_{\infty}italic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT, and crucially Csubscript𝐶C_{\infty}italic_C start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT, in terms of path connectivity from a randomly chosen node (which must be averaged across all nodes) to the boundaries. For the (U,V𝑈𝑉U,Vitalic_U , italic_V) flowers, the boundaries are represented by A and B. The construction is detailed in SI, Section I.

Using the new definition of Psubscript𝑃P_{\infty}italic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT, we find an exponent β0.1688290(1)𝛽0.16882901\beta\approx 0.1688290(1)italic_β ≈ 0.1688290 ( 1 ) [Fig. 3g], closely matching the cluster-defined value, β=0.165𝛽0.165\beta=0.165\cdotsitalic_β = 0.165 ⋯ on (2222,2222) flowers. (The minor difference arises because computing Psubscript𝑃P_{\infty}italic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT requires higher-order path connectivity rules (SI, Section I) that extend beyond the basic series and parallel rules. However, these higher-order rules can be approximated using only the series/parallel rules through a technique known as star-mesh transformations [5], yielding results that are close, but not precise.) In the quantum domain, we observe β0.0765379(1)𝛽0.07653791\beta\approx 0.0765379(1)italic_β ≈ 0.0765379 ( 1 ) [Fig. 3f], markedly distinct from its classical counterpart.

Another critical exponent, dfsubscript𝑑𝑓d_{f}italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT, defines the fractal dimension of the giant cluster at the critical point, with NgLdfsimilar-tosubscript𝑁𝑔superscript𝐿subscript𝑑𝑓N_{g}\sim L^{d_{f}}italic_N start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT ∼ italic_L start_POSTSUPERSCRIPT italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT end_POSTSUPERSCRIPT. Again, lacking a “cluster” notion, Ng=NPsubscript𝑁𝑔𝑁subscript𝑃N_{g}=NP_{\infty}italic_N start_POSTSUBSCRIPT italic_g end_POSTSUBSCRIPT = italic_N italic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT must be redefined through Psubscript𝑃P_{\infty}italic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT at the critical point. We find df1.89675835(5)subscript𝑑𝑓1.896758355d_{f}\approx 1.89675835(5)italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT ≈ 1.89675835 ( 5 ) [Fig. 3j] in the classical scenario, nearly identical to the cluster-defined value df=1.899.subscript𝑑𝑓1.899d_{f}=1.899\cdots.italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT = 1.899 ⋯ . In contrast, the quantum scenario shows df1.9434305(5)subscript𝑑𝑓1.94343055d_{f}\approx 1.9434305(5)italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT ≈ 1.9434305 ( 5 ) [Fig. 3i].

Promisingly, the three path-defined critical exponents still adhere to the hyperscaling relation, df=dβ/νsubscript𝑑𝑓𝑑𝛽𝜈d_{f}=d-\beta/\nuitalic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT = italic_d - italic_β / italic_ν [20, 21], in both classical and concurrence percolation, underscoring a consistent path-connectivity framework across different percolation theories.

II Asymptotic dependence on the longer length scale

To investigate the impact of the longer length scale V𝑉Vitalic_V on the two percolation theories, we derive the asymptotic behaviors of both critical thresholds pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT and cthsubscript𝑐thc_{\text{th}}italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT in the V𝑉V\to\inftyitalic_V → ∞ limit (SI, Section II), finding that for classical percolation,

pth1(lnUU1)V1+O(V2),similar-to-or-equalssubscript𝑝th1𝑈𝑈1superscript𝑉1𝑂superscript𝑉2p_{\text{th}}\simeq 1-\left(\ln\frac{U}{U-1}\right)V^{-1}+O(V^{-2}),italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ≃ 1 - ( roman_ln divide start_ARG italic_U end_ARG start_ARG italic_U - 1 end_ARG ) italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT + italic_O ( italic_V start_POSTSUPERSCRIPT - 2 end_POSTSUPERSCRIPT ) , (3)

and, in comparison, for concurrence percolation,

cth1(14lnV)V1+O(V1lnlnV).similar-to-or-equalssubscript𝑐th114𝑉superscript𝑉1𝑂superscript𝑉1𝑉c_{\text{th}}\simeq 1-\left(\frac{1}{4}\ln V\right)V^{-1}+O(V^{-1}\ln\ln V).italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ≃ 1 - ( divide start_ARG 1 end_ARG start_ARG 4 end_ARG roman_ln italic_V ) italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT + italic_O ( italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT roman_ln roman_ln italic_V ) . (4)

The V1superscript𝑉1V^{-1}italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT terms originate from the fact that as V𝑉V\to\inftyitalic_V → ∞, loops within the (U𝑈Uitalic_U,V𝑉Vitalic_V) flower extend to infinite lengths, and the network essentially becomes tree-like. As a result, both thresholds should approach 1111 when V𝑉V\to\inftyitalic_V → ∞. For classical percolation, the prefactor for V1superscript𝑉1V^{-1}italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT depends solely on U𝑈Uitalic_U, signaling the significant role the shorter paths play in classical percolation near the critical point. In contrast, concurrence percolation shows a unique behavior. The presence of a logarithmic prefactor (lnV)/4𝑉4\left(\ln V\right)/4( roman_ln italic_V ) / 4 highlights the importance of longer paths in concurrence percolation. This term indicates that connectivity in concurrence percolation near criticality is enhanced compared to its classical counterpart, implying 1cth1pthmuch-greater-than1subscript𝑐th1subscript𝑝th1-c_{\text{th}}\gg 1-p_{\text{th}}1 - italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ≫ 1 - italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT as V𝑉V\to\inftyitalic_V → ∞. Moreover, this term is fully decoupled from U𝑈Uitalic_U, suggesting that the shorter length scale no longer plays a determining role in cthsubscript𝑐thc_{\text{th}}italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT.

The asymptotic behaviors of the critical exponents are also different. We analytically determine ν𝜈\nuitalic_ν and dfsubscript𝑑𝑓d_{f}italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT directly via the solution of Pscsubscript𝑃scP_{\text{sc}}italic_P start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT and Psubscript𝑃P_{\infty}italic_P start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT (cf. Cscsubscript𝐶scC_{\text{sc}}italic_C start_POSTSUBSCRIPT sc end_POSTSUBSCRIPT and Csubscript𝐶C_{\infty}italic_C start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT), and β𝛽\betaitalic_β from the hyperscaling relation df=dβ/νsubscript𝑑𝑓𝑑𝛽𝜈d_{f}=d-\beta/\nuitalic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT = italic_d - italic_β / italic_ν. The results are summarized in Table 1. We find that in classical percolation, all dominant terms governing ν𝜈\nuitalic_ν, ddf𝑑subscript𝑑𝑓d-d_{f}italic_d - italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT, and β𝛽\betaitalic_β are fully determined by U𝑈Uitalic_U, once again signaling the dominance of shorter paths. In contrast, in concurrence percolation, we notice the emergence of a very slow correction (lnlnVsimilar-toabsent𝑉\sim\ln\ln V∼ roman_ln roman_ln italic_V) affecting the dominant terms in ν𝜈\nuitalic_ν and dfsubscript𝑑𝑓d_{f}italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT. Interestingly, the corrections counterbalance each other in the calculation of β𝛽\betaitalic_β, resulting in a constant β=2𝛽2\beta=2italic_β = 2 that is independent on either U𝑈Uitalic_U or V𝑉Vitalic_V. Since β𝛽\betaitalic_β is intrinsically tied to the definition of an order parameter, we hypothesize that this unique, constant value of β𝛽\betaitalic_β reveals an entirely distinct symmetry associated with the order parameter in concurrence percolation on (U𝑈Uitalic_U,V𝑉Vitalic_V) flowers.

Table 1: Critical exponents in the V𝑉V\to\inftyitalic_V → ∞ limit.
Classical [f(U)+O(V1)similar-toabsent𝑓𝑈𝑂superscript𝑉1\sim\!f(U)+O(V^{-1})∼ italic_f ( italic_U ) + italic_O ( italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT )] Quantum [g(U,V)similar-toabsent𝑔𝑈𝑉\sim\!g(U,V)∼ italic_g ( italic_U , italic_V )]
ν𝜈\nuitalic_ν lnUln[1+(U1)lnUU1]+O(V1)𝑈1𝑈1𝑈𝑈1𝑂superscript𝑉1\frac{\ln U}{\ln\left[1+\left(U-1\right)\ln\frac{U}{U-1}\right]}\!+\!O(\!V^{-1% }\!)divide start_ARG roman_ln italic_U end_ARG start_ARG roman_ln [ 1 + ( italic_U - 1 ) roman_ln divide start_ARG italic_U end_ARG start_ARG italic_U - 1 end_ARG ] end_ARG + italic_O ( italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) 2lnUlnlnV+O(lnlnlnV(lnlnV)2)2𝑈𝑉𝑂𝑉superscript𝑉2\frac{2\ln U}{\ln\ln V}\!+\!O\left(\frac{\ln\ln\ln V}{\left(\ln\ln V\right)^{2% }}\right)divide start_ARG 2 roman_ln italic_U end_ARG start_ARG roman_ln roman_ln italic_V end_ARG + italic_O ( divide start_ARG roman_ln roman_ln roman_ln italic_V end_ARG start_ARG ( roman_ln roman_ln italic_V ) start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT end_ARG )
ddf𝑑subscript𝑑𝑓d\!-\!d_{f}\!italic_d - italic_d start_POSTSUBSCRIPT italic_f end_POSTSUBSCRIPT lnUln[(1U)+2/(lnUU1)]lnU+O(V1)𝑈1𝑈2𝑈𝑈1𝑈𝑂superscript𝑉1\frac{\!\ln{U}\!-\!\ln{\left[\left(1\!-\!U\right)+2/\left(\ln\!{\frac{U}{U-1}}% \right)\right]}}{\ln{U}}\!+\!O(\!V^{-1}\!)divide start_ARG roman_ln italic_U - roman_ln [ ( 1 - italic_U ) + 2 / ( roman_ln divide start_ARG italic_U end_ARG start_ARG italic_U - 1 end_ARG ) ] end_ARG start_ARG roman_ln italic_U end_ARG + italic_O ( italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) lnlnVlnU+O(lnlnVlnV)𝑉𝑈𝑂𝑉𝑉\frac{\ln\ln V}{\ln U}\!+\!O\left(\frac{\ln\ln V}{\ln V}\right)divide start_ARG roman_ln roman_ln italic_V end_ARG start_ARG roman_ln italic_U end_ARG + italic_O ( divide start_ARG roman_ln roman_ln italic_V end_ARG start_ARG roman_ln italic_V end_ARG )
β𝛽\betaitalic_β lnUln[(1U)+2/(lnUU1)]ln[1+(U1)lnUU1]+O(V1)𝑈1𝑈2𝑈𝑈11𝑈1𝑈𝑈1𝑂superscript𝑉1\frac{\!\ln{U}\!-\!\ln{\left[\left(1\!-\!U\right)+2/\left(\ln\!{\frac{U}{U-1}}% \right)\right]}}{\ln\left[1+\left(U-1\right)\ln\frac{U}{U-1}\right]}\!+\!O(\!V% ^{-1}\!)divide start_ARG roman_ln italic_U - roman_ln [ ( 1 - italic_U ) + 2 / ( roman_ln divide start_ARG italic_U end_ARG start_ARG italic_U - 1 end_ARG ) ] end_ARG start_ARG roman_ln [ 1 + ( italic_U - 1 ) roman_ln divide start_ARG italic_U end_ARG start_ARG italic_U - 1 end_ARG ] end_ARG + italic_O ( italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ) 2+O(lnlnlnVlnlnV)2𝑂𝑉𝑉2\!+\!O\left(\frac{\ln\ln\ln V}{\ln\ln V}\right)2 + italic_O ( divide start_ARG roman_ln roman_ln roman_ln italic_V end_ARG start_ARG roman_ln roman_ln italic_V end_ARG )

III Superposition of paths in general

The above results have broader implications beyond the specific (U𝑈Uitalic_U,V𝑉Vitalic_V) flower topology. To see this, it is worth noting that the n𝑛nitalic_n-th generation of a (U𝑈Uitalic_U,V𝑉Vitalic_V) flower could be fully decomposed into several non-overlap** but intersecting paths between A and B. In the language of graph theory, these paths are edge-disjoint, but not vertex-disjoint. Specifically, each of these paths can have a length that is given by one of the options {Un,VUn1,,Vn}superscript𝑈𝑛𝑉superscript𝑈𝑛1superscript𝑉𝑛\{U^{n},VU^{n-1},\cdots,V^{n}\}{ italic_U start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_V italic_U start_POSTSUPERSCRIPT italic_n - 1 end_POSTSUPERSCRIPT , ⋯ , italic_V start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT }. The number of paths corresponding to each length option is determined by the binomial coefficients {Cn0,Cn1,,Cnn}subscriptsuperscript𝐶0𝑛subscriptsuperscript𝐶1𝑛subscriptsuperscript𝐶𝑛𝑛\{C^{0}_{n},C^{1}_{n},\cdots,C^{n}_{n}\}{ italic_C start_POSTSUPERSCRIPT 0 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , italic_C start_POSTSUPERSCRIPT 1 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT , ⋯ , italic_C start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT }, summing up to 2nsuperscript2𝑛2^{n}2 start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT paths in total.

The exact decomposition goes as follows. Initially, in the 1111-st generation, there are only two non-overlap** paths between A and B, characterized by lengths U𝑈Uitalic_U and V𝑉Vitalic_V. As progressing to the 2222-nd generation, each link from the previous generation is systematically replaced by the basic motif, necessitating a decision for each link within a previous path: to replace it by either a U𝑈Uitalic_U-length path or a V𝑉Vitalic_V-length path. Consequently, there are two non-overlap** options: replacing all links entirely by U𝑈Uitalic_U-length paths, or entirely by V𝑉Vitalic_V-length paths. This bifurcation results in each earlier generation’s path splitting into two distinct paths. Thus, as a shorthand, each path can be encoded as a string of n+1𝑛1n+1italic_n + 1 characters (e.g., “UVVUUV….”), each designated as ‘U’ or ‘V’. This string reflects the sequence of choices made at each generation, with ‘U’ for choosing all U𝑈Uitalic_U-length paths and ‘V’ for V𝑉Vitalic_V-length paths. Each non-overlap** path can be uniquely identified by such a string. The corresponding path length is UnxVxsuperscript𝑈𝑛𝑥superscript𝑉𝑥U^{n-x}V^{x}italic_U start_POSTSUPERSCRIPT italic_n - italic_x end_POSTSUPERSCRIPT italic_V start_POSTSUPERSCRIPT italic_x end_POSTSUPERSCRIPT, with x𝑥xitalic_x representing the count of ‘V’s in the string. For each possible length, there are Cnxsubscriptsuperscript𝐶𝑥𝑛C^{x}_{n}italic_C start_POSTSUPERSCRIPT italic_x end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT such choices, which scale as Cnx(2πx)1/2xxnxexsimilar-to-or-equalssubscriptsuperscript𝐶𝑥𝑛superscript2𝜋𝑥12superscript𝑥𝑥superscript𝑛𝑥superscript𝑒𝑥C^{x}_{n}\simeq\left(2\pi x\right)^{-1/2}x^{-x}n^{x}e^{x}italic_C start_POSTSUPERSCRIPT italic_x end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ≃ ( 2 italic_π italic_x ) start_POSTSUPERSCRIPT - 1 / 2 end_POSTSUPERSCRIPT italic_x start_POSTSUPERSCRIPT - italic_x end_POSTSUPERSCRIPT italic_n start_POSTSUPERSCRIPT italic_x end_POSTSUPERSCRIPT italic_e start_POSTSUPERSCRIPT italic_x end_POSTSUPERSCRIPT for xnmuch-less-than𝑥𝑛x\ll nitalic_x ≪ italic_n, x𝑥x\to\inftyitalic_x → ∞, suggesting that longer paths are also exponentially more abundant.

When V𝑉Vitalic_V adjusts to tV𝑡𝑉tVitalic_t italic_V, these lengths would adjust to (Un,tVUn1,,tnVn)superscript𝑈𝑛𝑡𝑉superscript𝑈𝑛1superscript𝑡𝑛superscript𝑉𝑛(U^{n},tVU^{n-1},\cdots,t^{n}V^{n})( italic_U start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT , italic_t italic_V italic_U start_POSTSUPERSCRIPT italic_n - 1 end_POSTSUPERSCRIPT , ⋯ , italic_t start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT italic_V start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ), i.e., changed by (1,t,,tn)1𝑡superscript𝑡𝑛(1,t,\cdots,t^{n})( 1 , italic_t , ⋯ , italic_t start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ) sequentially, highlighting different growth patterns between shorter and longer paths. On the other hand, the number of these paths remains constant. This allows us to investigate the response to adjustment of the longer length scale V𝑉Vitalic_V for hierarchical, scale-free networks of more general topologies. Specifically, given a real-world network, we select two hub nodes A and B and non-overlap** (but potentially intersecting) paths between them (SI, Section V). These paths are ranked by their lengths and sequentially placed into different groups, such that each successive group encompasses an exponentially larger number of longer paths. The lengths of these grouped paths are then rescaled by (1,t,t2,)1𝑡superscript𝑡2(1,t,t^{2},\cdots)( 1 , italic_t , italic_t start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT , ⋯ ), reflecting the adjustment of V𝑉Vitalic_V.

We analyzed a segment of the real-world Internet at the autonomous-system level [11]. By rearranging Eq. (3) and expanding the equation near θth(V)=π/4subscript𝜃th𝑉𝜋4\theta_{\text{th}}(V\to\infty)=\pi/4italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ( italic_V → ∞ ) = italic_π / 4, we derive V[θth()θth(p)(V)]V(1pth)/2ln[U/(U1)]/2similar-to-or-equals𝑉delimited-[]subscript𝜃thsuperscriptsubscript𝜃th𝑝𝑉𝑉1subscript𝑝th2similar-to-or-equals𝑈𝑈12V\left[\theta_{\text{th}}(\infty)-\theta_{\text{th}}^{(p)}(V)\right]\simeq V% \left(1-p_{\text{th}}\right)/2\simeq\ln{\left[U/\left(U-1\right)\right]}/2italic_V [ italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ( ∞ ) - italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_p ) end_POSTSUPERSCRIPT ( italic_V ) ] ≃ italic_V ( 1 - italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ) / 2 ≃ roman_ln [ italic_U / ( italic_U - 1 ) ] / 2 as V𝑉V\to\inftyitalic_V → ∞, where θth(p)sin1pth/2superscriptsubscript𝜃th𝑝superscript1subscript𝑝th2\theta_{\text{th}}^{(p)}\equiv\sin^{-1}{\sqrt{p_{\text{th}}/2}}italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_p ) end_POSTSUPERSCRIPT ≡ roman_sin start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT square-root start_ARG italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT / 2 end_ARG. Similarly, from Eq. (4) we derive V[θth()θth(c)(V)]V(1cth)/2VlnV/8similar-to-or-equals𝑉delimited-[]subscript𝜃thsuperscriptsubscript𝜃th𝑐𝑉𝑉1subscript𝑐th2similar-to-or-equals𝑉𝑉8V\left[\theta_{\text{th}}(\infty)-\theta_{\text{th}}^{(c)}(V)\right]\simeq V% \sqrt{\left(1-c_{\text{th}}\right)/2}\simeq\sqrt{V\ln V/8}italic_V [ italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ( ∞ ) - italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_c ) end_POSTSUPERSCRIPT ( italic_V ) ] ≃ italic_V square-root start_ARG ( 1 - italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ) / 2 end_ARG ≃ square-root start_ARG italic_V roman_ln italic_V / 8 end_ARG as V𝑉V\to\inftyitalic_V → ∞, where θth(c)(sin1cth)/2superscriptsubscript𝜃th𝑐superscript1subscript𝑐th2\theta_{\text{th}}^{(c)}\equiv\left(\sin^{-1}{c_{\text{th}}}\right)/2italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_c ) end_POSTSUPERSCRIPT ≡ ( roman_sin start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT ) / 2. The distinct θthsubscript𝜃th\theta_{\text{th}}italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT dependencies on V𝑉Vitalic_V (or t𝑡titalic_t, assuming Vtsimilar-to𝑉𝑡V\sim titalic_V ∼ italic_t) are illustrated for both the (U𝑈Uitalic_U,V𝑉Vitalic_V) flower [Fig. 4b] and the Internet [Fig. 4c]. The resemblance of the dependencies reveals a striking similarity between the two network topologies, highlighting a shared quantum characteristic: the slower approach of θth(c)(V)superscriptsubscript𝜃th𝑐𝑉\theta_{\text{th}}^{(c)}(V)italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_c ) end_POSTSUPERSCRIPT ( italic_V ) towards to θth(c)(V)superscriptsubscript𝜃th𝑐𝑉\theta_{\text{th}}^{(c)}(V\to\infty)italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT start_POSTSUPERSCRIPT ( italic_c ) end_POSTSUPERSCRIPT ( italic_V → ∞ ), which indicates a higher resilience of concurrence connectivity. This observation underscores the presence of such resilience in general network topologies, characterized by non-overlap** but intersecting paths.

Given the very slow corrections lnlnVsimilar-toabsent𝑉\sim\ln\ln V∼ roman_ln roman_ln italic_V in the quantum critical exponents (Table 1), this extreme effect becomes eminent only at a very large length scale, far exceeding the Internet diameter. However, if we consider “fundamental” networks, such as spin networks in loop quantum gravity [22], where the length unit is extremely small (the Planck scale 1035superscript103510^{-35}10 start_POSTSUPERSCRIPT - 35 end_POSTSUPERSCRIPT m), the corrections could potentially become detectable.

Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Figure 4: Real-world path connectivity. (a) Paths between two hub nodes A and B in real-world networks (e.g., Zachary’s Karate club). Identifying non-overlap** paths between the hubs enables investigation of how the percolation critical thresholds (pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT vs. cthsubscript𝑐thc_{\text{th}}italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT) depend on non-shortest path lengths (governed by the longer length scale, V𝑉Vitalic_V) in general. (b) pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT and cthsubscript𝑐thc_{\text{th}}italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT show different scaling behaviors when translating to θthsubscript𝜃th\theta_{\text{th}}italic_θ start_POSTSUBSCRIPT th end_POSTSUBSCRIPT in (U𝑈Uitalic_U,V𝑉Vitalic_V) flowers. As V𝑉Vitalic_V increases, pthsubscript𝑝thp_{\text{th}}italic_p start_POSTSUBSCRIPT th end_POSTSUBSCRIPT (blue) approaches unity at a constant rate V1similar-toabsentsuperscript𝑉1\sim V^{-1}∼ italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT. In contrast, cthsubscript𝑐thc_{\text{th}}italic_c start_POSTSUBSCRIPT th end_POSTSUBSCRIPT (red) shows a slower rate of approach (V1lnVsimilar-toabsentsuperscript𝑉1𝑉\sim V^{-1}\ln V∼ italic_V start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT roman_ln italic_V). (c) Corresponding patterns are also observed in the Internet network topology [11].

IV Discussion

We have found analytical expressions for the critical thresholds and exponents of both classical percolation and concurrence percolation using the (U,V𝑈𝑉U,Vitalic_U , italic_V) flowers model, a hierarchical scale-free network structure. Our findings, which place concurrence percolation in a distinct universality class, rule out the possibility that differences between classical and concurrence percolation theories are confined merely to short-range (i.e., ultraviolet) details. Instead, variations also stem from long-range (i.e., infrared) behaviors. This distinction underscores the fact that concurrence percolation represents a fundamentally different statistical framework compared to its classical counterpart. The question of whether concurrence percolation can be described by a field theory akin to the ϕ3superscriptitalic-ϕ3\phi^{3}italic_ϕ start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT model [23] for classical percolation remains open. A crucial step in this direction involves defining a cluster-based order parameter (field) specific to concurrence percolation. Our alternate definition of the giant “component” Csubscript𝐶C_{\infty}italic_C start_POSTSUBSCRIPT ∞ end_POSTSUBSCRIPT on (U,V𝑈𝑉U,Vitalic_U , italic_V) flowers might offer valuable insights for this.

From the perspective of quantum communication, our research indicates that having a path of maximally entangled states in QN is a sufficient, but not necessary criterion. It is possible to achieve entanglement transmission via longer, exponentially weaker paths composed of partially entangled links, provided there is a compensatory increase in the number of such links. This principle finds a parallel in classical branching processes, where infinite connectivity is achievable if the growing number of trees with given size exactly compensates for the exponential decline in the probability of such a tree existing at the critical point [19]. Further exploration of this concept through other models, such as the (U,V,W𝑈𝑉𝑊U,V,Witalic_U , italic_V , italic_W) flowers (with three different length scales), could provide deeper insights on both theoretical and practical aspects of entanglement distribution efficiency in QNs.

V Acknowledgements

S.H. thanks the EU H2020 DIT4Tram (Grant number 953783) and the Horizon Europe grant OMINO (grant number 101086321).

References

  • Wehner et al. [2018] S. Wehner, D. Elkouss, and R. Hanson, Quantum internet: A vision for the road ahead, Science 362, eaam9288 (2018).
  • Brito et al. [2020] S. Brito, A. Canabarro, R. Chaves, and D. Cavalcanti, Statistical properties of the quantum internet, Phys. Rev. Lett. 124, 210501 (2020).
  • Acín et al. [2007] A. Acín, J. I. Cirac, and M. Lewenstein, Entanglement percolation in quantum networks, Nat. Phys. 3, 256 (2007).
  • Chitambar and Hsieh [2016] E. Chitambar and M.-H. Hsieh, Relating the resource theories of entanglement and quantum coherence, Phys. Rev. Lett. 11710.1103/PhysRevLett.117.020402 (2016).
  • Meng et al. [2021] X. Meng, J. Gao, and S. Havlin, Concurrence Percolation in Quantum Networks, Phys. Rev. Lett. 126, 170501 (2021).
  • Kesten [1980] H. Kesten, The critical probability of bond percolation on the square lattice equals 1/2, Commun. Math. Phys. 74, 41 (1980).
  • Galam and Mauger [1996] S. Galam and A. Mauger, Universal formulas for percolation thresholds, Physical Review E 53, 2177 (1996).
  • Cohen et al. [2002] R. Cohen, D. ben Avraham, and S. Havlin, Percolation critical exponents in scale-free networks, Physical Review E 66, 036113 (2002).
  • Meng et al. [2023] X. Meng, X. Hu, Y. Tian, G. Dong, R. Lambiotte, J. Gao, and S. Havlin, Percolation Theories for Quantum Networks, Entropy 25, 1564 (2023).
  • Malik et al. [2022] O. Malik, X. Meng, S. Havlin, G. Korniss, B. K. Szymanski, and J. Gao, Concurrence percolation threshold of large-scale quantum networks, Commun. Phys. 510.1038/s42005-022-00958-4 (2022).
  • Tilch et al. [2020] G. Tilch, T. Ermakova, and B. Fabian, A multilayer graph model of the internet topology, Int. J. Netw. Virtual Organ. 22, 219 (2020).
  • Rozenfeld et al. [2007] H. D. Rozenfeld, S. Havlin, and D. ben Avraham, Fractal and transfractal recursive scale-free nets, New Journal of Physics 910.1088/1367-2630/9/6/175 (2007).
  • Pirandola [2019] S. Pirandola, End-to-end capacities of a quantum communication network, Communications Physics 2, 1 (2019).
  • Kobayashi et al. [2010] H. Kobayashi, F. Le Gall, H. Nishimura, and M. Rötteler, Perfect quantum network communication protocol based on classical network coding, in 2010 IEEE International Symposium on Information Theory (2010) pp. 2686–2690.
  • Rozenfeld and ben Avraham [2007] H. D. Rozenfeld and D. ben Avraham, Percolation in hierarchical scale-free nets, Physical Review E 7510.1103/PhysRevE.75.061102 (2007).
  • Duffin [1965] R. J. Duffin, Topology of series-parallel networks, J. Math. Anal. Appl. 10, 303 (1965).
  • Wierman [1981] J. C. Wierman, Bond percolation on honeycomb and triangular lattices, Adv. Appl. Probab. 13, 298 (1981).
  • Cardy [2001] J. Cardy, Conformal Invariance and Percolation (2001), arxiv:math-ph/0103018 .
  • Christensen and Moloney [2005] K. Christensen and N. R. Moloney, Complexity and criticality, Vol. 1 (World Scientific Publishing Company, 2005).
  • Kapitulnik et al. [1983] A. Kapitulnik, A. Aharony, G. Deutscher, and D. Stauffer, Introduction to percolation theory, 2nd ed, J. Phys. A 16, L269 (1983).
  • ben Avraham and Havlin [2000] D. ben Avraham and S. Havlin, Diffusion and reactions in fractals and disordered systems,  16, L269 (2000).
  • Ashtekar and Bianchi [2021] A. Ashtekar and E. Bianchi, A short review of loop quantum gravity, Rep. Prog. Phys. 84, 042001 (2021).
  • Amit [1976] D. J. Amit, Renormalization of the Potts model, J. Phys. A: Math. Gen. 9, 1441 (1976).