190 research outputs found
Computing Extensions of Linear Codes
This paper deals with the problem of increasing the minimum distance of a
linear code by adding one or more columns to the generator matrix. Several
methods to compute extensions of linear codes are presented. Many codes
improving the previously known lower bounds on the minimum distance have been
found.Comment: accepted for publication at ISIT 0
Quantum MDS Codes over Small Fields
We consider quantum MDS (QMDS) codes for quantum systems of dimension
with lengths up to and minimum distances up to . We show how
starting from QMDS codes of length based on cyclic and constacyclic
codes, new QMDS codes can be obtained by shortening. We provide numerical
evidence for our conjecture that almost all admissible lengths, from a lower
bound on, are achievable by shortening. Some additional codes that
fill gaps in the list of achievable lengths are presented as well along with a
construction of a family of QMDS codes of length , where , that
appears to be new.Comment: 6 pages, 3 figure
Leveraging Automorphisms of Quantum Codes for Fault-Tolerant Quantum Computation
Fault-tolerant quantum computation is a technique that is necessary to build
a scalable quantum computer from noisy physical building blocks. Key for the
implementation of fault-tolerant computations is the ability to perform a
universal set of quantum gates that act on the code space of an underlying
quantum code. To implement such a universal gate set fault-tolerantly is an
expensive task in terms of physical operations, and any possible shortcut to
save operations is potentially beneficial and might lead to a reduction in
overhead for fault-tolerant computations. We show how the automorphism group of
a quantum code can be used to implement some operators on the encoded quantum
states in a fault-tolerant way by merely permuting the physical qubits. We
derive conditions that a code has to satisfy in order to have a large group of
operations that can be implemented transversally when combining transversal
CNOT with automorphisms. We give several examples for quantum codes with large
groups, including codes with parameters [[8,3,3]], [[15,7,3]], [[22,8,4]], and
[[31,11,5]]
Constructions of Quantum Convolutional Codes
We address the problems of constructing quantum convolutional codes (QCCs)
and of encoding them. The first construction is a CSS-type construction which
allows us to find QCCs of rate 2/4. The second construction yields a quantum
convolutional code by applying a product code construction to an arbitrary
classical convolutional code and an arbitrary quantum block code. We show that
the resulting codes have highly structured and efficient encoders. Furthermore,
we show that the resulting quantum circuits have finite depth, independent of
the lengths of the input stream, and show that this depth is polynomial in the
degree and frame size of the code.Comment: 5 pages, to appear in the Proceedings of the 2007 IEEE International
Symposium on Information Theor
Generalized decoding, effective channels, and simplified security proofs in quantum key distribution
Prepare and measure quantum key distribution protocols can be decomposed into
two basic steps: delivery of the signals over a quantum channel and
distillation of a secret key from the signal and measurement records by
classical processing and public communication. Here we formalize the
distillation process for a general protocol in a purely quantum-mechanical
framework and demonstrate that it can be viewed as creating an ``effective''
quantum channel between the legitimate users Alice and Bob. The process of
secret key generation can then be viewed as entanglement distribution using
this channel, which enables application of entanglement-based security proofs
to essentially any prepare and measure protocol. To ensure secrecy of the key,
Alice and Bob must be able to estimate the channel noise from errors in the
key, and we further show how symmetries of the distillation process simplify
this task. Applying this method, we prove the security of several key
distribution protocols based on equiangular spherical codes.Comment: 9.1 pages REVTeX. (v3): published version. (v2): revised for improved
presentation; content unchange
Residual and Destroyed Accessible Information after Measurements
When quantum states are used to send classical information, the receiver
performs a measurement on the signal states. The amount of information
extracted is often not optimal due to the receiver's measurement scheme and
experimental apparatus. For quantum non-demolition measurements, there is
potentially some residual information in the post-measurement state, while part
of the information has been extracted and the rest is destroyed. Here, we
propose a framework to characterize a quantum measurement by how much
information it extracts and destroys, and how much information it leaves in the
residual post-measurement state. The concept is illustrated for several
receivers discriminating coherent states.Comment: 5 pages, 1 figur
Non-Additive Quantum Codes from Goethals and Preparata Codes
We extend the stabilizer formalism to a class of non-additive quantum codes
which are constructed from non-linear classical codes. As an example, we
present infinite families of non-additive codes which are derived from Goethals
and Preparata codes.Comment: submitted to the 2008 IEEE Information Theory Workshop (ITW 2008
- …
