Abstract
Today’s sensor networks need robustness, security and efficiency with a high level of assurance. Error correction is an effective communicational technique that plays a critical role in maintaining robustness in informational transmission. The general way to tackle this problem is by using forward error correction (FEC) between two communication parties. However, by applying zero-error coding one can assure information fidelity while signals are transmitted in sensor networks. In this study, we investigate zero-error coding via both classical and quantum channels, which consist of n obfuscated symbols such as Shannon’s zero-error communication. As a contrast to the standard classical zero-error coding, which has a computational complexity of , a general approach is proposed herein to find zero-error codewords in the case of quantum channel. This method is based on a n-symbol obfuscation model and the matrix’s linear transformation, whose complexity dramatically decreases to . According to a comparison with classical zero-error coding, the quantum zero-error capacity of the proposed method has obvious advantages over its classical counterpart, as the zero-error capacity equals the rank of the quantum coefficient matrix. In particular, the channel capacity can reach n when the rank of coefficient matrix is full in the n-symbol multilateral obfuscation quantum channel, which cannot be reached in the classical case. Considering previous methods such as low density parity check code (LDPC), our work can provide a means of error-free communication through some typical channels. Especially in the quantum case, zero-error coding can reach both a high coding efficiency and large channel capacity, which can improve the robustness of communication in sensor networks.
1. Introduction
Sensor networks are groups of specialized transducers that have a communications infrastructure that is intended to record and monitor conditions at different locations in the Internet of Things (IoT). Like any other networks, errors in messages can lead to irreversible consequences. In order to ensure the correctness of informational transmission, sensor networks should maintain a high level of robustness, security and efficiency by deploying specially designed transmission mechanisms. Some techniques have been applied to different types of sensor networks such as an efficient spider web-like transmission mechanism for emergency data in vehicular ad hoc networks [1], a spammer identification scheme based on the Gaussian mixture model that utilizes machine learning for industrial mobile networks [2] and a robustness optimization scheme to protect a class of scale-free wireless sensor networks from cyberattacks [3]. All these useful methods focus the network structure or transmission mechanism, and can improve the stabilities of sensor networks for the transmission of information. On the other hand, it is necessary to get distorted or missing information corrected actively between the senders and receivers in sensor networks. There are two basic ways to correct error information. One way is to use error control, which includes automatic repeat request (ARQ) and forward error correction (FEC). Since packets in wireless sensor networks are commonly broadcast over shared channels and forwarded over multiple hops, using FEC is preferable as it can reduce the need to retransmit data packets, thereby reducing the power consumed in the process [4]. Another way is to use error correction coding to defend noises in the transmission process.
Of course, noise always exists in channels, and finding completely noiseless channels is difficult. To address this issue, one should find a means of transmitting zero-error information. Here, it is necessary to discuss zero-error communication in sensor networks. A classical channel can be expressed as , where X is the set of channel inputs and Y denotes the output set. A probability transition function refers to the probability of the output symbol to be y when the input symbol is x. Shannon [5] initiated the study of zero-error communication, which involves transmitting messages through one and asymptotically many uses of the channel. To transmit messages through this channel with no probability of obfuscation, various messages denoted by m need to be associated with different input symbols x in such a way that the output distribution has disjoint supports. Knowledge of graph and matrix theories and combinatory and communication complexity, among others, contributes to the study of classical zero-error channels in theory. These theories and classical channel characteristics promote continued studies on zero-error communication. In a previous study [6], Lovász focused on and proposed an efficient method, namely, the Lovász function, for calculating zero-error capacity. A study was also recently conducted on the zero-error capacity of nearest-neighbor error channels with a multilevel alphabet [7].
Quantum information theory is a fascinating area that is developing rapidly and has a lot of applications in information science [8,9,10,11,12,13,14,15,16,17,18]. Qubit characteristics [19] (superposition and entangled states that cannot be cloned [20]) closely relate the quantum states to matrix and probability theories. Given its quantum characteristics, a quantum channel possesses better confidentiality and larger transmission capacity than a classical channel. Quantum zero-error communication has been increasingly becoming a subject of interest because of the compactness of zero-error communication and matrix research and the easy conversion between quantum channels and matrices. The quantum zero-error channel has attracted researchers’ attention, and quantum zero-error communication has also been studied in depth. A study [21] showed that the quantum clique problem can be defined as follows. Given a quantum channel, the number of k states that are distinguishable with no error after passing through the channel is determined. This definition reconsiders the clique problem in terms of the zero-error capacity of graphs then redefines it using quantum information theory. Super activation of the zero-error capacity of noisy quantum channels has been studied previously [22,23], and the Lovász function, which calculates quantum zero-error capacity, was introduced in previous papers [24] that featured the rewriting and deduction of the Lovász function in the quantum channel. In another work [25], R. Duan, S. Severini and A. Winter presented zero-error communication via quantum channels in the presence of noiseless feedback. Previous studies have focused on quantum zero-error capacity, with quantum zero-error coding attracting considerable attention. A quantum version of zero-error source-channel coding over a noisy channel with side information was investigated in another work [26].
This paper explores classical and quantum zero-error coding based on n-symbol obfuscation models. We introduce the classical zero-error channel model and coding method to the error correction in sensor networks, followed by a presentation of the quantum zero-error channel model. A quantum zero-error coding method based on linear transformation is proposed. Several examples are given to verify the coding efficiency and practicability of this method.
2. Zero-Error Coding via Classical Channel
A classical channel can be expressed as , where X is the set of channel inputs and Y describes the output set. A probability transition function denotes the probability of the output symbols to be y for input symbol x.
Figure 1 presents the model as a channel.
In Figure 1, input set X consists of n symbols, namely, x0, x1, x2, ……, xn−1, whereas the output set also consists of n symbols, namely, y0, y1, y2, ……, yn−1. The relation between these inputs and outputs is N = (X,{P(y | x)},Y), where Pi,j is the probability that each input xi may become output yi through this channel. Next, must be satisfied. In other words, if the input is xi, then the probability of output y0 is Pi,0 while that of output y1 is Pi,1, and so on, through this channel. It can confirm the value between P00 and Pn−1,n−1. In addition, each value of Pi,j is larger than or equal to 0 and less than or equal to 1.
In classical communication, channel coding is achieved by combining isomorphism theory and matrix vectors. Encoding is divided into three steps. First, the channel is translated into a bipartite graph. Channels can be directly converted to bipartite graphs because probability has no effect on the computation of zero-error capacity and coding in the classical channel. Next, the Lovász function confirms the number of letters that correspond to symbols during encoding to ensure that the symbols are not confused [6]. Finally, graph isomorphism is used to determine the coding. For example, if the result of the Lovász function is calculated using , then three-letter messages during encoding indicate that n symbols are non-obfuscation. The procedure for determining the n inputs is as follows. An input is assumed to be 000. Then, the disjoint output is located in 10X (X stands for any symbol of 0 or 1). If the input that matches the condition that is not confused with 000 is not found in 10X, then the input will search for 11X. These inputs are known as two non-obfuscation inputs. In this way, qualified inputs are sought constantly until the n inputs are obtained. Obviously, one almost has to traverse whole codewords’ subspaces to search for effective codewords. It will take nearly steps to complete this process. As a result, the upper bound of the total computational complexity of this method should be due to . The complete procedure of the classical zero-error coding is described in Figure 2.
3. Zero-Error Coding via Quantum Channel
The classical zero-error channel and coding method were discussed in the previous section. This section deals with the coding problem in the quantum zero-error channel using the linear transformation of matrix.
3.1. Quantum n-Symbol Obfuscation Model
In quantum channels, probabilities between inputs and outputs can be represented by coefficients. Figure 2 illustrates the quantum channel.
Figure 3 shows the pure states of n inputs and outputs as |0>, |1>, |2> … |n − 1>. The pure state (i is an integer and ) becomes the superposition state via the quantum channel (ground state is in the outputs; variable j is an integer and ). is the coefficient of the relation between ground states and and satisfies the condition of . Analogous to classical channels, the probability that ground state becomes ground state is .
In the quantum channel, as is shown in Figure 3, the input set can be expressed as , while the output set is . Any input can be represented as
Variable i is an integer and . Ground state is in the outputs. Variable j is an integer and . is a complex number which satisfies .
According to quantum channel theory,
3.2. Preliminary Theorems for Zero-Error Coding in Quantum Cases
In a zero-error channel, outputs should be distinguished through coding. However, quantum states can be distinguished while they are orthogonal to each other. Considering the matrices theory, linearly independent vectors can be used to construct a set of orthogonal vectors.
Firstly, we introduce certain theorems of linear zero-error coding based on linear transformation, which is a lemma in matrices theory. Two theorems are then provided, following the lemma.
Lemma 1.
The rank of a matrix is equal to the rank of its column vectors [27].
Proof.
Let
be an n × n matrix satisfying rank (A) = m. Suppose that A has an m × m submatrix with . The necessary and sufficient condition for the linear independence of a vector group is that matrix , which consists of m vectors, should be of m rank. We determine that the m column in is linearly independent because . In addition, each m + 1 column vector in A is linearly dependent. Therefore, m column vectors compose the maximum linearly independent group among all column vector groups in A. Hence, the column vector groups in A are ranked m. □
Theorem 1.
Letbe an n× n matrix (rank(A) = k). Suppose that A has an n× n similarity matrixconsisting of k linearly independent column vectors in A, such asand n–k zero column vectors. Then, an n× n matrixoccurs, which makes.
Proof.
Matrix A can be transformed into matrix D through the elementary transformation of the matrix, because D is a similarity matrix of A.
An elementary matrix E differs from the identity matrix via a single elementary row operation. Right multiplication (post-multiplication) by an elementary matrix represents elementary column operations.
For example, right multiplication by is equal to the additional transformation of the column operation on matrix A, which adds column i multiplied by scalar k to column j.
Here, .
In the elimination process, the matrix can be reduced step by step to matrix D. The first step is to reduce the value of to 0. That is to say, the first column multiplying is added to the second column (i.e., ) while the elements of the first row and the second column are 0s. Therefore, .
Matrix A can be transformed into matrix D through finite right multiplication by the elementary matrices .
In other words, it can be expressed as . Here, . Therefore, a matrix B always exists and can produce AB = D. □
Theorem 2.
Supposing the channel coefficient matrix A with rank (A) = k and the set of k inputs {},. Here, the value ofrefers to the value of the corresponding position in matrix B. Matrix B is equivalent to matrix B in Theorem 1. The set of k outputs {} can then be distinguished.
Proof.
Let .
Considering the isomorphism between quantum states and vectors, the normalization of quantum states and Theorem 1, k linearly independent outputs and inputs can be found, which can be expressed in the following form.
Inputting :
In accordance with Section 3.1, the input turns into the output after the signal passes through the channel. Here,
In Theorem 1, are linearly independent. Thus, the condition is satisfied by , and therefore
It can be seen from the above equation that the inner product of any two different outputs is zero. This makes the discrimination of two quantum states possible. Therefore, we can say that the set of k outputs {} can be distinguished. □
3.3. Quantum Method
The quantum zero-error communication coding method based on linear transformation is shown in Figure 4.
Linear transformation here plays a central role in realizing the quantum zero-error coding. The following steps present the details of how it works.
A. Establishing the coefficient matrix
In the first step, the information of the quantum zero-error channel can be expressed in the form of a graph, function, or matrix depicting the relation between the ground states of n inputs and outputs. Channel matrix P and coefficient matrix A can be determined by the information of the channel, and can be represented by the following matrix:
In channel matrix P, row and column coordinates are input and output, respectively (i.e., the probability of input to output is ). The corresponding coefficient matrix is also input to the column and row coordinates, and the expression is the probability coefficient of input to output . Moreover, the column vectors in the coefficient matrix can be expressed with .
B. The rank of the coefficient matrix and the set of linearly independent vectors
The second step is to calculate the rank k of the coefficient matrix and find the k linearly independent vectors in the coefficient matrix via matrix transformation. The set of these vectors can be expressed as , with any denoted by
The rank of the coefficient matrix is k, and, in accordance with Lemma 1, the rank of the column of the matrix is also known as k. Therefore, knowing that the coefficient matrix can find at most k linearly independent column vectors is possible. These column vectors and n-k zero vectors form n × n matrix D as
C The relationship between linearly independent vectors and matrix column vectors
The third step is to determine the relation between the k linearly independent and column vectors of the coefficient matrix.
In accordance with Theorem 1, matrix B creates the following relationship between coefficient matrices A and D:
Matrix B can be represented as
By substituting Equations (4), (6) and (8) into Equation (7),
By substituting Equation (9) into Equation (5),
Therefore, the relation between the k linearly independent and column vectors of the coefficient matrix is Equation (10).
D Outputs and inputs as well as channel capacity
The last step is to find the outputs and inputs and the channel capacity after encoding. The encoded outputs and inputs are determined by using the isomorphism between the outputs and the linearly independent vectors. Moreover, k distinguishable outputs and their corresponding inputs can be obtained by finding the linearly independent vectors and normalization of quantum states. The outputs of the zero-error coding using the linear transformation method are distinguished by Theorem 2. Therefore, this method is appropriate.
4. Examples and Method Analysis
4.1. Pentagon Channel
A classic example in the study of zero-error communication is using a pentagon to represent the channel. In the study of classical zero-error communication, the coding scheme is studied in accordance with the isomorphism of graphs. In quantum zero-error communication, we can find the coding scheme through the abovementioned method. In this example, the classical and quantum coefficient channels are shown in Figure 5.
Through the classical channel, the coding {44, 32, 20, 13, 01} can realize the zero-error encoding of the classical communication. The channel capacity after encoding is .
If the quantum channel is replaced, then the quantum superposition principle can be used to achieve a channel capacity of 5. The coding scheme is as follows.
Inputs:
Outputs: ,,,,.
Authors should discuss these results and how they can be interpreted from perspective of previous studies and working hypotheses. The findings and their implications should be discussed in the broadest context possible. Future research directions may also be highlighted.
4.2. Triangular Channel
In quantum zero-error communication, the channel is transformed into a matrix for, and the rank of the matrix is calculated. If the matrix is a full rank matrix, then the matrix elimination method can always find the linearly independent vectors with the same rank. In other words, finding the outputs of many rank numbers is always possible, as is the elimination method to determine the input. In classical zero-error communication, a superposition state is not present. Thus, the quantum zero-error capacity is larger than the classical zero-error capacity. At the same time, the zero-error capacity of the classical zero-error communication can be determined as 1 in the quantum zero-error communication. Figure 6 shows the triangular classical and quantum channels.
In classical zero-error communication, every two inputs are obfuscated. Thus, the channel is transformed into a triangle. In accordance with classical zero-error capacity theory, the capacity of this channel is 1, which is not found in the classical encoding method. In quantum zero-error communication, the rank of the coefficient matrix is 3, and the zero-error capacity is 3.
The matrix transformation method is used to solve the quantum zero-error coding. The coding scheme is as follows.
Inputs: , , and .
Outputs: |0>, |1>, and |2>.
4.3. Five-Symbol Multilateral Obfuscation Channel
Herel is a five-symbol multilateral obfuscation model, two typical examples of which are the classical channel (Figure 7a) and the quantum coefficient channel (Figure 7b) respectively.
Figure 7.
(a) Classical five-symbol multilateral obfuscation channel; (b) quantum five-symbol multilateral obfuscation channel.
In classical zero-error coding, we can calculate a zero-error channel capacity of 2; that is, three-letter encoding can have eight distinguishable outputs, encoding {000 001 010 011 100 101 110 111}. In quantum zero-error coding, one of the four symbols that correspond to the inputs of the four orthogonal outputs is normalized as follows.
Inputs:
Outputs:
4.4. Performance Analysis
The zero-error capacity of the method is discussed in this section using the coding method proposed in Section 3 with several examples presented in that section.
From [5], we learn that zero-error capacity can be represented by α(G), which is the maximum number of one-letter messages that can be sent without danger of obfuscation. Therefore, the zero-error capacity of the quantum zero-error coding method based on linear transformation is the rank of the coefficient matrix, which is denoted by k. Section 3 shows that the rank in the coefficient matrix also represents the number of the linearly independent vectors of the coefficient matrix, whereas the number of linearly independent column vectors is the same as that of input symbols, which can make outputs distinguishable. When the coefficient matrix is a full rank matrix, the zero-error capacity of the n-symbol obfuscation channel is n. In this case, the method of communication can provide lossless coding. When the rank of the coefficient matrix is 1 and no two outputs are orthogonal to each other, the zero-error communication coding scheme cannot be achieved. When the rank of the coefficient matrix is k between 1 and n, there will be k orthogonal outputs and the zero-error capacity is k. It seems that n-k symbols will be discarded in orderto achieve zero-error communication. The channel capacity of this coding method is generally larger than the upper limit of the classical zero-error capacity. Moreover, in classical zero-error channels, multiple letters are often required, whereas this method requires only one letter.
In accordance with the flow of this algorithm (see Figure 3) and the formula for calculating the complexity of the algorithm, the complexity should be the sum of calculation times of each step. The number of calculation times during the first step is n, and the sum of calculation times during the second and third steps is . The number of calculation times during the final step is n. Therefore, the algorithm complexity in this paper can be expressed in the following form:
However, the previous algorithms that solve the zero-error coding problem are all needed to traverse all subspaces in both the classical or quantum cases. The upper limit of computational complexity that traverses all subspaces is . The algorithm has advantages in complexity, which is with strong feasibility.
In addition, the channel capacity and bit error rate (BER) of zero-error coding and the method of low density parity check code (LDPC) are compared as follows [28,29].
As Table 1 shows, the capacity of classical zero-error coding is much lower than its LDPC counterpart. However, the quantum capacity here looks larger than the LDPC’s since the quantum parallelism can increase channel capacity when processing qubits instead of bits.
Table 1.
The channel capacity of zero-error coding and its low density parity check code (LDPC) counterpart.
Moreover, the biggest advantage of zero-error coding is that it can somehow transmit information error free on noisy channels. A comparison of LDPC and zero-error coding for both the classical and quantum cases, in terms of BER, is shown in Figure 8. When the channel capacity can maintain a non-zero positive value, even if the transmission efficiency may be lower than the LDPC case, it remains possible to communicate without any error. On the other hand, if the capacity equals 0 absolutely, there is no way to send a message to the receiver. Zero-error coding totally fails in this situation.
5. Conclusions
This paper presents classical and quantum zero-error coding in sensor networks, which can provide a novel way to ensure the correctness of informational transmission between senders and receivers. The classical method can obtain codewords by traversing whole subspaces with a computational complexity of . The quantum method, on the other hand, is able to find linearly independent vectors through linear transformation in order to determine outputs that are orthogonal to each other, as well as column vectors, and to use the linear relationship between independent vectors to seek the corresponding input encoding. The zero-error capacity of the proposed method is the rank of the coefficient matrix in the quantum channel. We compared classical zero-error coding and the proposed quantum zero-error coding by using three examples. The comparison indicated that the proposed method has significant advantages over classical zero-error communication in terms of channel capacity. In particular, its channel capacity can reach n when the rank of coefficient matrix is full in the n-symbol multilateral obfuscation quantum channel, which cannot be reached in the classical case. Moreover, this method shows its efficiency and practicality due to the complexity of . This means that, compared with traditional error-correction methods such as LDPC, our work can provide a means of error-free communication through some typical channels. Especially in the quantum case, zero-error coding was able to achieve both high coding efficiency and large channel capacity, which could improve the robustness of communication in sensor networks. What is more, tions about zero-error coding in other complex channels in sensor networks are still open, and one related to the entanglement channels is our future research interest.
Author Contributions
Conceptualization, W.Y.; methodology, W.Y., Z.X., S.W. and J.L.; software, W.Y., Z.X., S.W. and J.L.; validation, W.Y., Z.D., G.L. and A.X.L.; formal analysis, W.Y.; investigation, W.Y.; resources, W.Y.; data curation, W.Y.; writing—original draft preparation, W.Y., Z.X., Z.D., S.W. and J.L.; writing—review and editing, W.Y., Z.X., Z.D., G.L. and A.X.L.; visualization, W.Y.; supervision, W.Y.; project administration, W.Y.; funding acquisition, W.Y.
Funding
This research was funded by the Natural Science Foundation of China, grant numbers 61501247, 61373131 and 61702277; the Six Talent Peaks Project of Jiangsu Province, grant number 2015-XXRJ-013; the Natural Science Foundation of Jiangsu Province, grant number BK20171458; the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province, China, grant number 6KJB520030; the NUIST Research Foundation for Talented Scholars, grant number 2015r014; and the PAPD and CICAEET funds.
Acknowledgments
This study was partially supported by the China-USA Computer Science Research Center.
Conflicts of Interest
The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.
References
- Qiu, T.; Wang, X.; Chen, C.; Atiquzzaman, M.; Liu, L. TMED: A Spider Web-Like Transmission Mechanism for Emergency Data in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2018, 67, 8682–8694. [Google Scholar] [CrossRef]
- Qiu, T.; Wang, H.; Li, K.; Ning, H.; Sangaiah, A.K.; Chen, B. SIGMM: A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing. IEEE Trans. Ind. Inform. 2019, 15, 2349–2359. [Google Scholar] [CrossRef]
- Qiu, T.; Liu, J.; Si, W.; Wu, D.O. Robustness Optimization Scheme with Multi-Population Co-Evolution for Scale-Free Wireless Sensor Networks. IEEE/ACM Trans. Netw. 2019, 27, 1028–1042. [Google Scholar] [CrossRef]
- Jeong, J.; Ee, C.T. Forward Error Correction in Sensor Networks. In Proceedings of the First International Workshop on Wireless Sensor Networks (WWSN), Marrakesh, Morocco, 4–8 June 2007; p. 4. [Google Scholar]
- Shanon, C.E. The zero-error capacity of a noisy channel. IRE Trans. Inf. Theory 1956, 2, 8–19. [Google Scholar] [CrossRef]
- Lovász, L. On the Shannon Capacity of a Graph. IEEE Trans. Inf. Theory 1979, 25, 1–7. [Google Scholar] [CrossRef]
- Nakano, T.; Wadayama, T. On Zero Error Capacity of Nearest Neighbor Error Channels with Multilevel Alphabet. In Proceedings of the 2016 International Symposium on Information Theory and Its Applications (ISITA), Monterey, CA, USA, 30 October–2 November 2016; pp. 66–70. [Google Scholar]
- He, Y.; Zhu, K. Fano Effect and Quantum Entanglement in Hybrid Semiconductor Quantum Dot-Metal Nanoparticle System. Sensors 2017, 17, 1445. [Google Scholar] [CrossRef]
- Li, J.; Gao, W.; Qian, J.; Guo, Q.; Xi, J.; Ritz, C.H. Robust Entangled-Photon Ghost Imaging with Compressive Sensing. Sensors 2019, 19, 192. [Google Scholar] [CrossRef]
- Qu, Z.; Wu, S.; Wang, M.; Sun, L.; Wang, X. Effect of Quantum Noise on Deterministic Remote State Preparation of an Arbitrary Two-Particle State via Various Quantum Entangled Channels. Quantum Inf. Process. 2017, 16, 306. [Google Scholar] [CrossRef]
- Qu, Z.; Li, Z.; Xu, G.; Wu, S.; Wang, X. Quantum Image Steganography Protocol Based on Quantum Image Expansion and Grover Search Algorithm. IEEE Access 2019, 7, 50849–50857. [Google Scholar] [CrossRef]
- Qu, Z.; Cheng, Z.; Wang, X. Matrix Coding-Based Quantum Image Steganography Algorithm. IEEE Access 2019, 7, 35684–35698. [Google Scholar] [CrossRef]
- Liu, W.; Gao, P.; Yu, W.; Qu, Z.; Yang, C. Quantum Relief algorithm. Quantum Inf. Process. 2018, 17, 280. [Google Scholar] [CrossRef]
- Liu, W.; Xu, Y.; Yang, C.; Gao, P.; Yu, W. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States. Int. J. Theor. Phys. 2018, 57, 195–207. [Google Scholar] [CrossRef]
- Liu, W.; Wang, H.; Yuan, G.; Xu, Y.; Chen, Z.; An, X.; Ji, F.; Gnitou, G.T. Multiparty Quantum Sealed-Bid Auction Using Single Photons as Message Carrier. Quantum Inf. Process. 2016, 15, 869–879. [Google Scholar] [CrossRef]
- Qu, Z.; Zhu, T.; Wang, J.; Wang, X. A Novel Quantum Steganography Based on Brown States. CMC Comput. Mater. Contin. 2018, 56, 47–59. [Google Scholar]
- Liu, W.; Chen, Z.; Liu, J.; Su, Z.; Chi, L. Full-Blind Delegating Private Quantum Computation. CMC Comput. Mater. Contin. 2018, 56, 211–223. [Google Scholar]
- Wang, M.; Yang, C.; Mousoli, R. Controlled Cyclic Remote State Preparation of Arbitrary Qubit States. CMC Comput. Mater. Contin. 2018, 56, 321–329. [Google Scholar]
- Bennett, C.H.; DiVincenzo, D.P. Quantum Information and Computation. Nature 2000, 404, 247–255. [Google Scholar] [CrossRef]
- Wootters, W.K.; Zurek, W.H. A Single Quantum Cannot Be Cloned. Nature 1982, 299, 802–803. [Google Scholar] [CrossRef]
- Beigi, S.; Shor, P.W. On the Complexity of Computing Zero-Error and Holevo Capacity of Quantum Channels. Available online: https://arxiv.org/abs/0709.2090 (accessed on 13 October 2008).
- Cubitt, T.S.; Chen, J.; Harrow, A.W. Super Activation of the Asymptotic Zero-Error Classical Capacity of a Quantum Channel. Available online: https://arxiv.org/abs/0906.2547 (accessed on 12 September 2011).
- Duan, R. Super-Activation of Zero-Error Capacity of Noisy Quantum Channels. Available online: https://arxiv.org/abs/0906.2527 (accessed on 15 June 2009).
- Duan, R.; Severini, S.; Winter, A. Zero-Error Communication via Quantum Channels, Noncommutative Graphs and a Quantum Lovász Number. IEEE Trans. Inf. Theory 2013, 59, 1164–1174. [Google Scholar] [CrossRef]
- Duan, R.; Severini, S.; Winter, A. On Zero-Error Communication via Quantum Channels in the Presence of Noiseless Feedback. IEEE Trans. Inf. Theory 2016, 62, 5260–5277. [Google Scholar] [CrossRef]
- Stahlke, D. Quantum Zero-Error Source-Channel Coding and Non-Commutative Graph Theory. IEEE Trans. Inf. Theory 2016, 62, 554–577. [Google Scholar] [CrossRef]
- Lancaster, P.; Tismenetsky, M. Theory of Matrices, 2nd ed.; Academic Press: New York, NY, USA; London, UK, 1985. [Google Scholar]
- Jerkovits, T.; Liva, G.; Amat, A.G. Improving the Decoding Threshold of Tailbiting Spatially Coupled LDPC Codes by Energy Shaping. IEEE Commun. Lett. 2018, 22, 660–663. [Google Scholar] [CrossRef]
- Fang, Y.; Bi, G.; Guan, Y.L.; Lau, F.C.M. A Survey on Protograph LDPC Codes and Their Applications. IEEE Commun. Surv. Tutor. 2015, 17, 1989–2016. [Google Scholar] [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).