4,790 research outputs found

    The Small Stellated Dodecahedron Code and Friends

    Get PDF
    We explore a distance-3 homological CSS quantum code, namely the small stellated dodecahedron code, for dense storage of quantum information and we compare its performance with the distance-3 surface code. The data and ancilla qubits of the small stellated dodecahedron code can be located on the edges resp. vertices of a small stellated dodecahedron, making this code suitable for 3D connectivity. This code encodes 8 logical qubits into 30 physical qubits (plus 22 ancilla qubits for parity check measurements) as compared to 1 logical qubit into 9 physical qubits (plus 8 ancilla qubits) for the surface code. We develop fault-tolerant parity check circuits and a decoder for this code, allowing us to numerically assess the circuit-based pseudo-threshold.Comment: 19 pages, 14 figures, comments welcome! v2 includes updates which conforms with the journal versio

    Analytical solution of thermal magnetization on memory stabilizer structures

    Full text link
    We return to the question of how the choice of stabilizer generators affects the preservation of information on structures whose degenerate ground state encodes a classical redundancy code. Controlled-not gates are used to transform the stabilizer Hamiltonian into a Hamiltonian consisting of uncoupled single spins and/or pairs of spins. This transformation allows us to obtain an analytical partition function and derive closed form equations for the relative magnetization and susceptibility. These equations are in agreement with the numerical results presented in [arXiv:0907.0394v1] for finite size systems. Analytical solutions show that there is no finite critical temperature, Tc=0, for all of the memory structures in the thermodynamic limit. This is in contrast to the previously predicted finite critical temperatures based on extrapolation. The mismatch is a result of the infinite system being a poor approximation even for astronomically large finite size systems, where spontaneous magnetization still arises below an apparent finite critical temperature. We extend our analysis to the canonical stabilizer Hamiltonian. Interestingly, Hamiltonians with two-body interactions have a higher apparent critical temperature than the many-body Hamiltonian.Comment: 13 pages, 7 figures, analytical solutions of problems studied numerically in arXiv:0907.0394v1 [quant-ph

    Density Evolution for Deterministic Generalized Product Codes with Higher-Order Modulation

    Full text link
    Generalized product codes (GPCs) are extensions of product codes (PCs) where coded bits are protected by two component codes but not necessarily arranged in a rectangular array. It has recently been shown that there exists a large class of deterministic GPCs (including, e.g., irregular PCs, half-product codes, staircase codes, and certain braided codes) for which the asymptotic performance under iterative bounded-distance decoding over the binary erasure channel (BEC) can be rigorously characterized in terms of a density evolution analysis. In this paper, the analysis is extended to the case where transmission takes place over parallel BECs with different erasure probabilities. We use this model to predict the code performance in a coded modulation setup with higher-order signal constellations. We also discuss the design of the bit mapper that determines the allocation of the coded bits to the modulation bits of the signal constellation.Comment: invited and accepted paper for the special session "Recent Advances in Coding for Higher Order Modulation" at the International Symposium on Turbo Codes & Iterative Information Processing, Brest, France, 201

    Coding with Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis

    Full text link
    This study examines the use of nonsystematic channel codes to obtain secure transmissions over the additive white Gaussian noise (AWGN) wire-tap channel. Unlike the previous approaches, we propose to implement nonsystematic coded transmission by scrambling the information bits, and characterize the bit error rate of scrambled transmissions through theoretical arguments and numerical simulations. We have focused on some examples of Bose-Chaudhuri-Hocquenghem (BCH) and low-density parity-check (LDPC) codes to estimate the security gap, which we have used as a measure of physical layer security, in addition to the bit error rate. Based on a number of numerical examples, we found that such a transmission technique can outperform alternative solutions. In fact, when an eavesdropper (Eve) has a worse channel than the authorized user (Bob), the security gap required to reach a given level of security is very small. The amount of degradation of Eve's channel with respect to Bob's that is needed to achieve sufficient security can be further reduced by implementing scrambling and descrambling operations on blocks of frames, rather than on single frames. While Eve's channel has a quality equal to or better than that of Bob's channel, we have shown that the use of a hybrid automatic repeat-request (HARQ) protocol with authentication still allows achieving a sufficient level of security. Finally, the secrecy performance of some practical schemes has also been measured in terms of the equivocation rate about the message at the eavesdropper and compared with that of ideal codes.Comment: 29 pages, 10 figure
    • …
    corecore