I. Introduction
Computation and communication using quantum data has attracted growing attention. On the one hand, quantum computation provides a real breakthrough in computing power—at least for certain applications—as demonstrated by Shor's algorithm. On the other hand, quantum communication realizes “unconditional security” e.g. via quantum key distribution. The latter is being even tested for practical use.