190 research outputs found

    Computing Extensions of Linear Codes

    Full text link
    This paper deals with the problem of increasing the minimum distance of a linear code by adding one or more columns to the generator matrix. Several methods to compute extensions of linear codes are presented. Many codes improving the previously known lower bounds on the minimum distance have been found.Comment: accepted for publication at ISIT 0

    Quantum MDS Codes over Small Fields

    Full text link
    We consider quantum MDS (QMDS) codes for quantum systems of dimension qq with lengths up to q2+2q^2+2 and minimum distances up to q+1q+1. We show how starting from QMDS codes of length q2+1q^2+1 based on cyclic and constacyclic codes, new QMDS codes can be obtained by shortening. We provide numerical evidence for our conjecture that almost all admissible lengths, from a lower bound n0(q,d)n_0(q,d) on, are achievable by shortening. Some additional codes that fill gaps in the list of achievable lengths are presented as well along with a construction of a family of QMDS codes of length q2+2q^2+2, where q=2mq=2^m, that appears to be new.Comment: 6 pages, 3 figure

    Leveraging Automorphisms of Quantum Codes for Fault-Tolerant Quantum Computation

    Full text link
    Fault-tolerant quantum computation is a technique that is necessary to build a scalable quantum computer from noisy physical building blocks. Key for the implementation of fault-tolerant computations is the ability to perform a universal set of quantum gates that act on the code space of an underlying quantum code. To implement such a universal gate set fault-tolerantly is an expensive task in terms of physical operations, and any possible shortcut to save operations is potentially beneficial and might lead to a reduction in overhead for fault-tolerant computations. We show how the automorphism group of a quantum code can be used to implement some operators on the encoded quantum states in a fault-tolerant way by merely permuting the physical qubits. We derive conditions that a code has to satisfy in order to have a large group of operations that can be implemented transversally when combining transversal CNOT with automorphisms. We give several examples for quantum codes with large groups, including codes with parameters [[8,3,3]], [[15,7,3]], [[22,8,4]], and [[31,11,5]]

    Constructions of Quantum Convolutional Codes

    Get PDF
    We address the problems of constructing quantum convolutional codes (QCCs) and of encoding them. The first construction is a CSS-type construction which allows us to find QCCs of rate 2/4. The second construction yields a quantum convolutional code by applying a product code construction to an arbitrary classical convolutional code and an arbitrary quantum block code. We show that the resulting codes have highly structured and efficient encoders. Furthermore, we show that the resulting quantum circuits have finite depth, independent of the lengths of the input stream, and show that this depth is polynomial in the degree and frame size of the code.Comment: 5 pages, to appear in the Proceedings of the 2007 IEEE International Symposium on Information Theor

    Generalized decoding, effective channels, and simplified security proofs in quantum key distribution

    Full text link
    Prepare and measure quantum key distribution protocols can be decomposed into two basic steps: delivery of the signals over a quantum channel and distillation of a secret key from the signal and measurement records by classical processing and public communication. Here we formalize the distillation process for a general protocol in a purely quantum-mechanical framework and demonstrate that it can be viewed as creating an ``effective'' quantum channel between the legitimate users Alice and Bob. The process of secret key generation can then be viewed as entanglement distribution using this channel, which enables application of entanglement-based security proofs to essentially any prepare and measure protocol. To ensure secrecy of the key, Alice and Bob must be able to estimate the channel noise from errors in the key, and we further show how symmetries of the distillation process simplify this task. Applying this method, we prove the security of several key distribution protocols based on equiangular spherical codes.Comment: 9.1 pages REVTeX. (v3): published version. (v2): revised for improved presentation; content unchange

    Residual and Destroyed Accessible Information after Measurements

    Full text link
    When quantum states are used to send classical information, the receiver performs a measurement on the signal states. The amount of information extracted is often not optimal due to the receiver's measurement scheme and experimental apparatus. For quantum non-demolition measurements, there is potentially some residual information in the post-measurement state, while part of the information has been extracted and the rest is destroyed. Here, we propose a framework to characterize a quantum measurement by how much information it extracts and destroys, and how much information it leaves in the residual post-measurement state. The concept is illustrated for several receivers discriminating coherent states.Comment: 5 pages, 1 figur

    Non-Additive Quantum Codes from Goethals and Preparata Codes

    Full text link
    We extend the stabilizer formalism to a class of non-additive quantum codes which are constructed from non-linear classical codes. As an example, we present infinite families of non-additive codes which are derived from Goethals and Preparata codes.Comment: submitted to the 2008 IEEE Information Theory Workshop (ITW 2008
    corecore