Next Article in Journal
Neutrosophic Logic Based Quantum Computing
Previous Article in Journal
Online Social Networks (OSN) Evolution Model Based on Homophily and Preferential Attachment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

New Constructions of Quantum Stabilizer Codes Based on Difference Sets

School of Electrical Engineering, University of Ulsan, Ulsan 44610, Korea
*
Author to whom correspondence should be addressed.
Symmetry 2018, 10(11), 655; https://doi.org/10.3390/sym10110655
Submission received: 19 October 2018 / Revised: 15 November 2018 / Accepted: 15 November 2018 / Published: 19 November 2018

Abstract

:
In this paper, new conditions on parameters in difference sets are derived to satisfy symplectic inner product, and new constructions of quantum stabilizer codes are proposed from the conditions. The conversion of the difference sets into parity-check matrices is first explained. Then, the proposed code construction is composed of three steps, which are to choose the generators of quantum stabilizer code, to determine the quantum stabilizer groups, and to determine subspace codewords with large minimum distance. The quantum stabilizer codes with various length are also presented to explain the practicality of the code construction. The proposed design can be applied to quantum stabilizer code construction based on combinatorial design.

1. Introduction

Quantum theory gives the probability of the possible outcomes for a measurement on a physical system [1]. Quantum computers which are based on quantum theory give us the possibility deal on the various tasks such as factoring the large integer number that shows the substantial speed-up in polynomial time over the best classical algorithm [2,3]. However, the effects of noisy and imperfect environments of the quantum channel would reduce the performance advantages. Therefore, quantum error correcting codes (QECCs) have been proposed to protect quantum information from noisy environments. Since the first QECCs were proposed in the 1990s by Shor [4] and Steane [5], the general theory of QECCs has been introduced [6].
After establishment in 1997 [7], quantum stabilizer codes have played a prominent role in QECCs. A stabilizer code appends ancilla qubits to qubits to be protected. The most consequential advantage of stabilizer code is that the errors can be detected and removed from the stabilizer operators [4]. Hence, stabilizer codes had been constructed to enhance the application of stabilizer formalism in quantum mechanics. In addition, the stabilizer theory allows the transfer of classical binary and quaternary codes to corresponding quantum stabilizer codes. Consequently, the various constructions of quantum stabilizer codes based on classical codes have been proposed [3,5,8,9]. The key idea of development of quantum stabilizer code is that the quantum stabilizer code can be established as a parity-check matrix whose binary or quaternary elements satisfy the constraint of symplectic inner product (SIP). Therefore, in [8,9], the authors considered the circulant matrix to construct the parity-check matrix. The modified circulant matrix has been proposed to construct the parity-check matrix and the results for entanglement-assisted quantum error correction codes are explained [8]. In [9], two sub-matrices are proposed to satisfy the constraint of parity-check matrix for quantum stabilizer codes with length seven.
Low-density parity-check (LDPC) codes were first introduced by Gallager [10]. Then, an excellent performance close to Shannon channel capacity was obtained according to large block size of binary parity-check matrix in classical communication [11]. Innovative designs of the parity-check matrix have been proposed for LDPC codes with better performances or with easy implementation. The application of combinatoric design on LDPC codes was proposed to increase the girth of the parity-check matrices [12]. Adaptive selection of quasi-cyclic LDPC (QC-LDPC) codes suitable for visible light communication had been studied to adjust the dimming control [13]. New quantum codes have been proposed based on LDPC codes with the Calderbank-Shor-Steane (CSS) form in [14,15] and quantum LDPC with the non-CSS form in [16,17].
A difference set (DS) in combinatorics [18,19,20] is defined as a subset in which each difference of two elements occurs in the group. Perfect DSs have been used to build up cyclic codes which have remarkable performance in classical channels. Hence, the new trial using DSs on quantum code was first studied in [21] where DSs are used to construct dual-containing sparse-graph codes for QECCs. Further, one-time DSs were used to construct entanglement-assisted quantum LDPC codes in [22] and these quantum codes have shown a significant improvement in the error probability performance. The quantum QC-LDPC codes based on the DSs in [23], where the set of DSs is easily generated by only a single parameter; however, a lot of the DSs cannot be defined except for prime numbers of the form n = 4k − 1, where k is even number.
In this paper, new constructions of quantum stabilizer codes based on DSs are proposed. From the suitable DSs, the circulant matrices are designed and used to construct the parity-check matrix. Then, the generators of the stabilizer should first be chosen to make independent rows of parity-check matrix. Finally, the codeword and minimum distance are determined. Two quantum stabilizer codes with lengths of seven and 15 from the proposed design are shown to express the practical application. The organization of this paper is as follows. In Section 2, we introduce the importance of the stabilizer codes as well as the quantum theory and we explain the binary formalism of quantum stabilizer codes. In Section 3, the definition of difference sets and the circulant matrices are first explained. Then, an innovative approach to DS properties and how to use DSs to build up circulant permutation matrices which satisfy the condition are discussed. Finally, conclusions are listed in Section 4.

2. Quantum Stabilizer Code

2.1. Quantum Information Theory

Qubit is the simplest unit in quantum information and can be expressed as a two-state Hilbert space H⊗2 with dimension 2. Therefore, the two basis quantum states can be denoted as | 0 = [ 1 0 ] , | 1 = [ 0 1 ] . The general quantum state of a qubit can be represented by a linear superposition of its two orthogonal basis states as | ψ = α | 0 + β | 1 = [ α β ] . The state can be found at both of basis states |0〉 and |1〉 at the same time, where the probability of outcome |0〉 is |α|2 and the probability of outcome |1〉 is |β|2. According to the norm condition for qubits, the condition |α|2 + |β|2 = 1 must be satisfied. In general, n qubits are represented by 2n dimensional Hilbert space H⊗n as
| ψ = i k = { 0 , 1 } α i 1 i 2 i n | i 1 | i 2 | i n = i α i | i ,  
where i = k = 1 n 2 n k i k .
In classical computation, Boolean functions f: {0, 1} → {0, 1} are performed over a single bit. In the case of quantum computation, reversible operation represented by unitary matrices are performed over a qubit. Representative quantum operations are Pauli operators. Four Pauli operators (matrices) I, σ X , σ Y , and σ Z are
I = [ 1 0 0 1 ] , σ X = [ 0 1 1 0 ] , σ Y = j [ 0 1 1 0 ] , σ Z = [ 1 0 0 1 ] ,
where j = 1 . The transformations of quantum states by Pauli operators is as
I | ψ = [ 1 0 0 1 ] × [ α β ] = [ α β ] = α | 0 + β | 1 , σ X | ψ = [ 0 1 1 0 ] × [ α β ] = [ β α ] = β | 0 + α | 1 , σ Y | ψ = [ 0 j j 0 ] × [ α β ] = [ j β j α ] = j ( β | 0 + α | 1 ) , σ Z | ψ = [ 1 0 0 1 ] × [ α β ] = [ α β ] = α | 0 β | 1 .
Therefore, operators σ X , σ Z , and σ Y are regarded as a bit flip, a phase flip, and a combination of bit and phase flips, respectively. Multiplications between Pauli operators are defined as
σ X 2 = σ Y 2 = σ Z 2 = I ; σ X × σ Y = j σ Z and σ Y × σ X = j σ Z σ X × σ Y = σ Y × σ X ; σ Y × σ Z = j σ X and σ Z × σ Y = j σ X σ Y × σ Z = σ Z × σ Y ; σ Z × σ X = j σ Y and σ X × σ Z = j σ Y σ Z × σ X = σ X × σ Z .
The Pauli group P1 on a qubit is a group composed of Pauli operators and their multiplications with the factor ±1, ±j. Then, P 1 = ± { I , σ X , j σ X , σ Y , j σ Y , σ Z , j σ Z } . The Pauli group on n qubits Pn is defined as n tensor product of the Pauli operators. Then, the elements of Pn are either commutative or anti-commutative. The commutative operator “◦” for two operators A and B is defined as
A B = i = 1 n A i B i    where    A i B i = { + 1 ,      if    A i × B i = B i × A i 1 ,       if A i × B i = B i × A i .
Quotient group Pn/C where C = {±I, ±jI} is defined as the center of Pn [24]. Therefore, the notation X σ X , Y j σ Y , Z σ Z [25] are used in the rest of the paper.

2.2. Quantum Error Correction Code

QECCs are used in quantum computing to protect quantum information from errors due to decoherence and other quantum noises. QECCs are essential to achieve fault-tolerant quantum computation [6]. In classical error correcting code, it is easy to make the copy of information. In contrast, it is impossible to make the copy of quantum information due to the non-cloning theorem [3]. Therefore, quantum information can be extended to highly entangled quantum state with the help of ancillary qubits and Unitary transforms. Classical error correcting codes use a syndrome measurement to diagnose errors which corrupt an encoded state. QECC also employs the syndrome detection with the help of quantum stabilizers operators. A block diagram of the QECC process is shown in Figure 1. The quantum information can be protected from noisy quantum channel with the help of ancillary qubits, the quantum stabilizer operators, and syndrome measurement.
A quantum state | ψ is stabilized by operator g P n if g | ψ = | ψ . The quantum states, which are stabilized by all elements of any subgroup S of the Pauli group Pn form a subspace CS of Hn. The subspace CS is defined as,
C S = { | ψ H n | g | ψ = | ψ , g S } .  
If CS is non-trivial subspace, S is an abelian subgroup which is closed under multiplication. The subgroup generated by elements g1, g2, …, gm is denoted as S = 〈g1, g2, …, gm〉. Then, any two operators on S are commutative. Since g1, g2, …, gm are m (=nk) independent Pauli operators, S forms subspace Cs to be [[n, k, dmin]] quantum stabilizer code [7] which encodes k logical qubits into n physical qubits and can correct t = ⎣(dmin − 1)/2⎦ errors [6]. For example, the quantum stabilizer code [[5,1,3]] can correct one error and four generators in Table 1 produce the full quantum stabilizer set S.
Let {E} ⊂ Pn be the error set which makes the state |Ψ〉 to the corrupted state E|Ψ〉. Since elements of Pauli operators are either commutative or anti-commutative, a vector on error set is either commutative or anti-commutative with elements of stabilizer group S. Therefore, the corrupted state E|Ψ〉 is identified by the elements of stabilizer group S and the error detection is defined as
S i × E | ψ = {       E × S i | ψ =     E | ψ ,     Error undetected . E × S i | ψ = E | ψ ,       Error detected .  
The operator Ei is correctable by stabilizer group S if the following condition is satisfied.
E i E j N ( S ) S , E i , E j E ,  
where E i is the conjugate transpose of Ei and N(S) is the normalizer of S in Pn. Then, normalizer of S is defined as
N ( S ) = { A P n | A E A S , E S } .  
N(S) is the collection of all operators in Pauli group which is commutative with elements in S. Therefore, the minimum distance dmin is determined as
d min = min ( W ( E ) ) s . t E N ( S ) \ S ,  
where W(A) is defined as the number of positions not equal to Pauli operators I in A and min(x) is the minimum number in set x.

2.3. Binary Formalism of Quantum Stabilizer Codes

In classical error correcting codes, the parity-check matrices give the constraint that the codewords must have vanishing scalar product with every vector of the parity-check matrices. In quantum error correcting codes, binary expression of quantum stabilizer operators also remains the parity-check constraint to quantum codeword.
Any Pauli operators can be expressed as the product of X-containing and Z-containing operators such as XYYZI = XXXII × IZZZI. Therefore, a simple but useful mapping exists between elements of Pauli operators and binary vector as I → (0, 0), X → (1, 0), Z → (0, 1), Y → (1, 1). Consequently, the nk generators of an [[n, k]] quantum stabilizer code can be formed by a parity-check matrix H which is a concatenation of HX, HZ as follows,
H = [ H X | H Z ] ,  
where HX, HZ are the binary matrices of size (nk) × n. For example, the quantum stabilizer code [[5,1,3]] in Table 1 has corresponding parity-check matrices as
H = [ 1   0   0   1   0 0   1   0   0   1 1   0   1   0   0 0   1   0   1   0 0   1   1   0   0 0   0   1   1   0 0   0   0   1   1 1   0   0   0   1 ] .  
Since there exists the requirement that quantum stabilizer operators must be commutative, the constraint known as the symplectic inner product (SIP) is applied to H. We assume that m-th row of parity-check matric H, rm is expressed as rm = [xm|zm], where zm and xm are binary strings for Z and X, respectively. Hence, the symplectic product of the m1-th row and m2-th row is given as
r m 1 r m 2 = [ x m 1 | z m 1 ] [ x m 2 | z m 2 ] = x m 1 z m 2 + x m 2 z m 1 modulo ​  2 ,  
where x k z l = i = 1 n x k i × z l i . This product will give us zero if the number of different positions in X and Z are even. Hence, for a given parity-check matrix H = [HX|HZ] with size (nk) × 2n, the SIP formulation is defined as
H X × H Z T + H Z × H X T = 0 n k modulo 2 ,  
where 0a is the a × a zero matrix. The constraint in (3) is called SIP constraint. For quantum stabilizer code [[5,1,3]] in Table 1, the formulation (3) is calculated as
H X × H Z T + H Z × H X T = [ 0   2   2   2 2   0   2   2 2   2   0   2 2   2   2   0 ] = 0 4 modulo 2 .  
The parity-check matrix in (1) has the rank (nk). Hence, the dual space of H has the dimension 2nm (=m + 2k). Then, the normalizer group N(S) can be generated by an (m + 2k) × 2n binary matrix. The first m rows are the parity-check matrix and the last 2k row are the logical operators denoted as X ¯ , Z ¯ . Logical operators satisfy the conditions as
{ X i ¯ X j ¯ = + 1 Z i ¯ Z j ¯ = + 1 X i ¯ Z j ¯ = + 1 for i j X i ¯ Z j ¯ = 1 for i = j .
Using Gaussian elimination, we can transform the parity check matrix into standard form as
[ I r A 1 n k r A 2 k B r C 1 n k r C 2 k 0 0 0 D I E ] } r } n k r
Therefore, logical operators are in standard form as
{ X ¯ = [ 0 E T I ( E T C 1 + C 2 T ) 0 0 ] Z ¯ = [ 0 0    0                 A 2 T                 0 I ] .  
Finally, the codewords of the quantum stabilizer code are given as
| c 1 c 2 c k = 1 2 m × ( i = 1 m ( I + g i ) ) × X 1 ¯ c 1 × X 2 ¯ c 2 × × X k ¯ c k | 00 0 n ,  
where c i { 0 , 1 } . For the quantum stabilizer code [[5,1,3]] in Table 1, the standard form of parity-check matrix is investigated as,
H = [ 1   0   0   0   1    1   1   0   1   1 0   1   0   0   1   0   0   1   1   0 0   0   1   0   1   1   1   0   0   0 0   0   0   1   1   1   0   1   1   1 ] .  
Therefore, its logical operators are in standard form as,
{ X ¯ =    [ 0   0   0   0   1   1   0   0   1   0 ] X ¯ = Z I I Z X Z ¯ =        [ 0   0   0   0   0   1   1   1   1   1 ] Z ¯ = Z Z Z Z Z .  

3. Circulant Matrices Based on DS and QECC Construction

In this section, the definition, properties of DS, and circulant permutation matrices will be first introduced. Then, the QECC construction from circulant matrices based on parameters of DS are discussed with two examples.

3.1. Difference Sets and Shifted Difference Sets

A ( n , k , λ ) difference set (DS) D = { d 1 , d 2 , , d k } is defined as a collection of k residues ( { 0 , 1 , 2 , , n 1 } ) . Then, for any residue α 0 , the congruence d i d j = α (modulo n ) has exactly λ solution pairs ( d i , d j ) with d i , d j D . The necessary condition of the parameters ( n , k , λ ) is k ( k 1 ) = λ ( n 1 ) [18]. Assume that the ( n , k , λ ) DS D = { d 1 , d 2 , , d k } is given, then the shifted set D ( s ) = { d 1 + s , d 2 + s , , d k + s } is also a new DS with the same parameters ( n , k , λ ) . A DS with three elements and its shifted DS are shown in Example 1.
Example 1.
A perfect DS is (7, 3, 1) with D = {1, 2, 4},
{ 1 2 6 2 1 1 4 1 3 1 4 4 2 4 5 4 2 2 modulo 7.  
The shifted (7, 3, 1) DS with offset 6 is D (6) = {0, 1, 3},
{ 0 1 6 1 0 1 3 0 3 0 3 4 1 3 5 3 1 2 modulo 7.  
The notation D(s) stands for the shifted DS from D with the offset s.

3.2. Circulant Permutation Matrices

Let In be the identity matrix of size n × n. Then, In(x) is the shift of In where the rows of In are circularly shifted to the right by x positions (0 ≤ xn − 1). Generally, we notice that In(0) = In and I n ( x ± k n ) = I n ( x ) for any integer k. Let I n ( 1 ) c be the c times of multiplying In(1), we have I n ( 1 ) c = I n ( c ) (0 ≤ cn − 1).
Example 2.
With n = 4, we have:
I 4 ( 0 ) = I 4 = [ 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 ] , I 4 ( 2 ) = [ 0 0 1 0 0 0 0 1 1 0 0 0 0 1 0 0 ] ,   and  
I 4 ( 2 ) = [ 0 1 0 0 0 0 1 0 0 0 0 1 1 0 0 0 ] × [ 0 1 0 0 0 0 1 0 0 0 0 1 1 0 0 0 ] = [ 0 0 1 0 0 0 0 1 1 0 0 0 0 1 0 0 ] = I 4 ( 1 ) 2 .
A n × n circulant permutation binary matrix Pn is defined as
P n = [ i 0 i 1 i 2 i n 1 i n 1 i 0 i 1 i n 2 i n 2 i n 1 i 0 i n 3 i 1 i 2 i 3 i 0 ] ,
where ik is the binary value. Pn can be given as the linear combination of identity matrix and its shifted matrices.
P n = i 0 × I n ( 0 ) + i 1 × I n ( 1 ) + i 2 × I n ( 2 ) + + i n 1 × I n ( n 1 ) .  
It is assumed that i 0 + i 1 + + i n 1 = k . Let t 0 < t 1 < < t k 1 be the position index of nonzero elements in the sequence set { i 0 , i 1 , , i n 1 } . For example, if the sequence set { i 0 , i 1 , , i n 1 } is {1, 1, 0, 0, 1, 0, 1}, then t 0 = 0, t 1 = 1, t 2 = 4, and t 3 = 6. The matrix Pn can also be expressed by using the Hall-polynomial form p n ( x ) [18] as
p n ( x ) = x t 0 + x t 1 + + x t k 1  
Let T be the transpose operator. Then, the transpose matrix of Pn is denoted as PnT. Let p n ( x ) T be the Hall-polynomial form of PnT. Then, the polynomial p n ( x ) T is expressed as
p n ( x ) T = x t 0 + x t 1 + + x t k 1 ,
where t 0 , t 1 , , t k 1 are the values in (8). For a ( n , k , λ ) DS D = { d 1 , d 2 , , d k } , the circulant permutation matrix Pn in (7) is made where the element ij is 1 if j D and is 0 otherwise. Then, the Hall-polynomial form p n ( x ) D for the DS D is expressed as
p n ( x ) D = x d 1 + x d 2 + + x d k  

3.3. Construction of Quantum Stabilizer Code Based on DS

With difference sets ( n , k , λ ) D, the product of the two circulant permutation matrices can be expressed as a function of parameter of DS and the shift values in the following theorem.
Theorem 1.
Let h1(x) and h2(x) be the Hall-polynomials of D(s1) and D(s2), which are defined as h 1 ( x ) = p n D ( s 1 ) and h 2 ( x ) = p n D ( s 2 ) , respectively. Let the circulant permutation matrices H1 and H2 correspond to h1(x) and h2(x), respectively. Then, the product of the two polynomials h1(x), h2(x)T and the product of the two matrices H1 and H2T are given as
h 1 ( x ) × h 2 ( x ) T = ( k λ ) × x s 1 s 2 + λ × l = 0 n 1 x l and H 1 × H 2 T = ( k λ ) × I n ( s 1 s 2 ) + λ × J n ,  
where the size of matrix Jn is n × n and whose entries are all one.
Proof. 
From the definition of the Hall-polynomial, h1(x) and h2(x) can be expressed as
h 1 ( x ) = x d 1 + s 1 + x d 2 + s 1 + + x d k + s 1 and h 2 ( x ) = x d 1 + s 2 + x d 2 + s 2 + + x d k + s 2 .  
Then, the Hall-polynomial h2(x)T for (9) is given as h 2 ( x ) T = x d 1 s 2 + x d 2 s 2 + + x d k s 2 . Therefore, the product of the two polynomials h1(x) and h2(x)T is given as
h 1 ( x ) × h 2 ( x ) T = ( x d 1 + s 1 + x d 2 + s 1 + + x d k + s 1 ) × ( x d 1 s 2 + x d 2 s 2 + + x d k s 2 )   = i = 1 k [ x ( d i + s 1 ) ( d 1 + s 2 ) + x ( d i + s 1 ) ( d 2 + s 2 ) + + x ( d i + s 1 ) ( d k + s 2 ) ]   = i = 1 k x s 1 s 2 × [ x d i d 1 + x d i d 2 + + x d i d k ] = x s 1 s 2 × u = 1 k v = 1 k x d u d v = x s 1 s 2 × [ k × x 0 + u = 1 k v = 1 , v u k x d u d v ] .
u = 1 k v = 1 , v u k x d u d v in (11) can be expressed as
u = 1 k v = 1 , v u k x d u d v = λ × l = 1 n 1 x l = λ × l = 0 n 1 x l λ × x 0 .  
Hence, Equation (11) is expressed as
x s 1 s 2 × [ k × x 0 + u = 1 k v = 1 , v u k x d u d v ] = x s 1 s 2 × [ k × x 0 + λ × l = 0 n 1 x l λ × x 0 ] = ( k λ ) × x s 1 s 2 + λ × x s 1 s 2 × l = 0 n 1 x l = ( k λ ) × x s 1 s 2 + λ × l = 0 n 1 x l .
Since the circulant permutation matrices corresponding to the polynomials x s 1 s 2 and l = 0 n 1 x l are I n ( s 1 s 2 ) and J n , respectively, the product of H 1 and H 2 T is expressed as
H 1 × H 2 T = ( k λ ) × I n ( s 1 s 2 ) + λ × J n  
Therefore, the expressions in (12) and (13) prove Theorem 1. □
Since the product of H1 and H2T in Theorem 1 is expressed as the function of k , λ , s 1 , and s2, the constraint on parameter of DSs to satisfy the SIP condition of parity-check matrix is explained in the following theorem.
Theorem 2.
For any ( n , k , λ ) DS D where k λ modulo 2 and any integers s 1 s 2 where s 1 , s 2 { 0 , 1 , , n 1 } , parity-check matrix H = [ H 1 | H 2 ] where H 1 and H 2 corresponding to h 1 ( x ) = p n D ( s 1 ) and h 2 ( x ) = p n D ( s 2 ) , respectively, satisfies the SIP condition (2).
Proof. 
From Theorem 1, we have:
H 1 × H 2 T = ( k λ ) × I n ( s 1 s 2 ) + λ × J n  
H 2 × H 1 T = ( k λ ) × I n ( s 2 s 1 ) + λ × J n  
The summation of (14) and (15) is
H 1 × H 2 T + H 2 × H 1 T = ( k λ ) × I n ( s 1 s 2 ) + λ × J n + ( k λ ) × I n ( s 2 s 1 ) + λ × J n = ( k λ ) × [ I n ( s 1 s 2 ) + I n ( s 2 s 1 ) ] + 2 λ × J n .
If k λ is even, all elements of the matrix ( k λ ) × [ I n ( s 1 s 2 ) + I n ( s 2 s 1 ) ] in (16) are even. Moreover, all elements of the matrix 2 λ × J n in (16) are also even. Then, all elements of the matrix ( k λ ) × [ I n ( s 1 s 2 ) + I n ( s 2 s 1 ) ] + 2 λ × J n in (16) are even. Therefore, if k λ modulo 2, the equation H 1 × H 2 T + H 2 × H 1 T = 0 n is always true. Therefore, the parity-check matrix H of H1 and H2 which is made from the parameter of DS with the constraint k λ modulo 2 satisfies the SIP condition. □
In Table 2, eight DSs with the constraint k λ modulo 2 are listed among the DSs in [18,19]. For the practical applications of proposed construction, two DSs with parameters (7, 4, 2) and (15, 7, 3) are considered in Examples 3 and 4.
Example 3.
For the DS D = {0, 3, 5, 6} with parameter (7, 4, 2), two shifted DSs are considered as D(1) = {0 + 1, 3 + 1, 5 + 1, 6 + 1} = {0, 1, 4, 6}, D(4) = {0 + 4, 3 + 4, 5 + 4, 6 + 4} = {0, 2, 3, 4}. Then, the Hall-polynomials for D(1) and D(4) are h 1 ( x ) = p 7 D ( 1 ) and h 2 ( x ) = p 7 D ( 4 ) , respectively. Therefore, the corresponding binary matrices for the Hall-polynomials are given as
H 1 = [ 1   1   0   0   1   0   1 1   1   1   0   0   1   0 0   1   1   1   0   0   1 1   0   1   1   1   0   0 0   1   0   1   1   1   0 0   0   1   0   1   1   1 1   0   0   1   0   1   1 ] , H 2 = [ 1   0   1   1   1   0   0 0   1   0   1   1   1   0 0   0   1   0   1   1   1 1   0   0   1   0   1   1 1   1   0   0   1   0   1 1   1   1   0   0   1   0 0   1   1   1   0   0   1 ] , H = [ H 1 | H 2 ] .  
It follows that two products H 1 × H 2 T and H 2 × H 1 T are given by:
H 1 × H 2 T = [ 2   2   2   2   4   2   2 2   2   2   2   2   4   2 2   2   2   2   2   2   4 4   2   2   2   2   2   2 2   4   2   2   2   2   2 2   2   4   2   2   2   2 2   2   2   4   2   2   2 ] = ( 4 2 ) × I 7 ( 1 4 ) + 2 × J 7 ,    H 2 × H 1 T = [ 2   2   2   4   2   2   2 2   2   2   2   4   2   2 2   2   2   2   2   4   2 2   2   2   2   2   2   4 4   2   2   2   2   2   2 2   4   2   2   2   2   2 2   2   4   2   2   2   2 ] = ( 4 2 ) × I 7 ( 4 1 ) + 2 × J 7 .  
Then, the SIP product is H 1 × H 2 T + H 2 × H 1 T = [ 2    2    2   6   6   2   2 2    2    2   2   6   6   2 2    2   2   2   2   6   6 6    2   2   2   2   2   6 6    6   2   2   2   2   2 2    6   6   2   2   2   2 2    2   6   6   2   2   2 ] = 0 7 modulo 2.
The seven quantum stabilizer operators corresponding to the seven rows in H(17) are given as
g 1 = Y X Z Z Y I X ; g 2 = X Y X Z Z Y    I ;    g 3 =    I    X Y X Z Z Y ; g 4 = Y I X Y X Z Z ; g 5 = Z Y I X Y X Z ; g 6 = Z Z Y    I X Y X ; g 7 = X Z Z Y I X Y .
Among the seven operators, there are a maximum of three linearly independent operators. If g1, g2 and g3 are chosen as the maximum of three linearly independent operators, the other operators are expressed as g 4 = g 1 × g 3 ; g 5 = g 1 × g 2 × g 3 ; g 6 = g 1 × g 2 ; g 7 = g 2 × g 3 . With S = g 1 , g 2 , g 3 , a stabilizer subgroup is composed as
S = { Y X Z Z Y I X ,   X Y X Z Z Y I , I X Y X Z Z Y , Y I X Y X Z Z , Z Y I X Y X Z , Z Z Y I X Y X , X Z Z Y I X Y , I    I    I    I    I    I    I } .  
Using Equation (4), we transform the H matrix in (17) into its standard form as
[ 1   0   0   1   0   1   1   0   1   1     1   0   0   1 0   1   0   1   1   1   0   1   1   0 0   1   0   1 0   0   1   0   1   1   1   1   1   1 0   0   1   0 ] .
Then, as Equation (5), the logical operators X ¯ and Z ¯ are calculated as
X ¯ = [ 0   0   0   1   0   0   0   1   0   0 0   0   0   0 0   0   0   0   1   0   0   0   1   0 0   0   0   0 0   0   0   0   0   1   0   0   0   1 0   0   0   0 0   0   0   0   0   0   1   1   1   0 0   0   0   0 ] and Z ¯ = [ 0   0   0   0   0   0   0   1   1   0 1   0   0   0 0   0   0   0   0   0   0   0   1   1 0   1   0   0 0   0   0   0   0   0   0   1   1   1 0   0   1   0 0   0   0   0   0   0   0   1   0   1 0   0   0   1 ] { X 1 ¯ = Z I    I X I    I    I X 2 ¯ = I Z I    I X I    I X 3 ¯ = I    I Z I    I X I X 4 ¯ = Z Z I    I    I    I X and    { Z 1 ¯ = Z Z I Z    I    I    I Z 2 ¯ = I Z Z I Z I    I Z 3 ¯ = Z Z Z I I Z I Z 4 ¯ = Z    I Z I    I    I Z .
The codewords of the quantum stabilizer code [[7,4]] are expressed as
| c 1 c 2 c 3 c 4 = 1 2 3 × ( i = 1 3 ( I + g i ) ) × X 1 ¯ c 1 × X 2 ¯ c 2 × X 3 ¯ c 3 × X 4 ¯ c 4 | 0000000 = 1 2 3 × X 1 ¯ c 1 × X 2 ¯ c 2 × X 3 ¯ c 3 × X 4 ¯ c 4 ( s S s | 0000000 ) ,
where i = 1 3 ( I + g i ) = s S s and c i { 0 , 1 } .
The minimum distance dmin of the [[7,4]] code is determined by the smallest weight of N(S)\S. One of the smallest weights is X 1 ¯ × I I I I I I I . Since W( X 1 ¯ × I I I I I I I ) = 2, the minimum distance dmin is 2. Therefore, the quantum stabilizer code from the DS with parameter (7, 4, 2) is [[7,4,2]].
Example 4.
A DS D = {0 1 2 4 5 8 10} with parameters (15, 7, 3) is considered to construct a quantum stabilizer code with length 15. The parity-check matrix is given as H = [ H 1    H 2 ] where
H 1 = [ 0   1   1   1   0   1   1   0   0   1 0   1   0   0   0 0   0   1   1   1   0   1   1   0   0 1   0   1   0   0 0   0   0   1   1   1   0   1   1   0 0   1   0   1   0 0   0   0   0   1   1   1   0   1   1 0   0   1   0   1 1   0   0   0   0   1   1   1   0   1 1   0   0   1   0 ] , H 2 = [ 0   1   1   0   0   1   0   1   0   0 0   0   1   1   1 1   0   1   1   0   0   1   0   1   0 0   0   0   1   1 1   1   0   1   1   0   0   1   0   1 0   0   0   0   1 1   1   1   0   1   1   0   0   1   0 1   0   0   0   0 0   1   1   1   0   1   1   0   0   1 0   1   0   0   0 ] .  
Five independent generators can be chosen as
{ g 1 =    I Y Y X    I Y X Z I X    I X Z Z Z g 2 = Z    I Y Y X I Y X Z I X    I X Z Z g 3 = Z Z I Y Y X I Y X Z I X I    X Z g 4 = Z Z Z I Y Y X I    Y X Z I X I X g 5 = X Z Z Z I Y Y X I Y X Z I X    I .
By using Gaussian elimination, the logical operators X ¯ and Z ¯ can be written as
X 1 ¯ = Z    I     I Z Z X    I    I    I    I    I    I    I    I    I ,   Z 1 ¯ = Z    I    Z    I    Z Z    I    I    I    I    I    I    I    I    I   X 2 ¯ = Z Z Z I    I    I     X    I    I    I    I    I    I    I    I ,   Z 2 ¯ = Z Z Z Z Z    I    Z    I    I    I    I    I    I    I    I   X 3 ¯ = I    Z Z Z    I    I    I    X    I    I    I    I    I    I    I ,   Z 3 ¯ = Z Z    I    Z    I    I    I    Z    I    I    I    I    I    I    I   X 4 ¯ = I    I Z Z Z    I    I     I X    I    I    I    I    I    I ,   Z 4 ¯ = I    Z    Z    I Z I    I    I    Z    I    I    I    I    I    I   X 5 ¯ = Z I Z Z    I     I    I    I     I X    I    I    I    I    I ,   Z 5 ¯ = Z    I    I    Z    Z I    I    I    I    Z    I    I    I    I    I   X 6 ¯ = I    Z I Z Z    I    I    I     I    I X    I    I    I    I ,   Z 6 ¯ = Z Z Z    I     I     I     I    I    I    I    Z    I    I    I    I   X 7 ¯ = Z    I    I    I     I    I    I    I    I     I     I X    I    I    I ,   Z 7 ¯ = I    Z Z    Z    I     I    I    I    I    I    I    Z    I    I    I   X 8 ¯ =     I    Z I    I     I     I    I    I    I     I     I    I    X I    I ,   Z 8 ¯ = I      I    Z    Z Z    I    I    I    I    I    I    I     Z    I    I   X 9 ¯ =     I    I Z    I    I     I    I    I    I    I     I    I     I X    I ,   Z 9 ¯ = Z    I    Z    Z    I    I    I    I    I    I    I    I    I    Z    I   X 10 ¯ = I    I    I    Z    I    I    I    I    I    I     I    I    I    I    X ,   Z 10 ¯ = I Z    I    Z    Z    I    I    I    I    I    I    I    I    I    Z  
Therefore, the codewords for the [[15,10,2]] stabilizer code can be expressed as
| c 1 c 2 c 10 L = 1 2 5 × ( i = 1 5 ( I + g i ) ) × X 1 ¯ c 1 × X 2 ¯ c 2 × × X 10 ¯ c 10 | 0 1 0 2 0 15 = 1 2 5 × X 1 ¯ c 1 × X 2 ¯ c 2 × × X 10 ¯ c 10 ( s S s | 0 1 0 2 0 15 ) .
As shown in Table 3, the parameter constraints for difference sets in proposed construction are different from the ones in [23]. Since 2 p 1 p 1 modulo 2 where p is an even number, DSs which are used in [23] can be also used in the proposed construction. In contrast, DSs in the proposed construction are not always used in [23] because 4p − 1 must be a prime number. As a result, the proposed construction is more general than [23]’s construction and the proposed construction enlarges the results of using DSs for quantum stabilizer code construction. In addition, in comparison to the proposed codes with existing quantum codes, quantum codes with length 7 and 15 are discussed. It is known that existing quantum stabilizer codes with length 7 have code parameters [[7,3,2]] from quadratic residue sets in [26], or [[7,3,2]] and [[7,4,2]] constructed over the quaternary alphabet, listed in [27]. To compare to the proposed codes and codes in [26], the number of information bits of the proposed codes is 1 bit larger than the referenced code. As referenced in the list in [27], a stabilizer with length 15 and the same parameters of [[15,10,2]] that were constructed over quaternary alphabet are found.

4. Conclusions

In this paper, the conditions of a DS are examined to satisfy the SIP condition and a new construction method of quantum stabilizer codes from the DS is proposed. The condition of a DS to satisfy the SIP constraint is equivalent to determine a DS with k λ modulo 2. Quantum stabilizer codes [[7,4,2]] and [[15,10,2]] are presented from the proposed construction with DS (7, 4, 2) and DS (15, 7, 3), respectively, for practical applications. Moreover, since there are many DSs with parameters that satisfy k λ modulo 2, it is possible to produce new quantum stabilizer codes with greater length. In comparison with the referenced construction, the proposed construction provides more candidates for the quantum stabilizer code based on DSs.

Author Contributions

All authors discussed the contents of the manuscript and contributed to its presentation. D.M.N. designed and implemented the proposed scheme, analyzed the simulation data and wrote the paper under the supervision of S.K.

Funding

This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF-2016R1D1A1B03934653).

Acknowledgments

The authors are extremely thankful for the reviewers’ comments and suggestions for improving this article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Goyal, P.; Knuth, K.H. Quantum Theory and Probability Theory: Their Relationship and Origin in Symmetry. Symmetry 2011, 3, 171–206. [Google Scholar] [CrossRef] [Green Version]
  2. Shor, P.W. Algorithms for quantum computation discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
  3. Nguyen, D.M.; Kim, S. Quantum Key Distribution Protocol Based on Modified Generalization of Deutsch-Jozsa Algorithm in d-level Quantum System. Int. J. Theor. Phys. 2018. [Google Scholar] [CrossRef]
  4. Shor, P.W. Scheme for reducing decoherence in quantum memory. Phys. Rev. A 1995, 52, 2493–2496. [Google Scholar] [CrossRef]
  5. Steane, A.M. Error correcting codes in quantum theory. Phys. Rev. Lett. 1996, 77, 793–797. [Google Scholar] [CrossRef] [PubMed]
  6. Calderbank, A.R.; Shor, P.W. Good quantum error-correcting codes exist. Phys. Rev. A 1996, 54, 1098–1105. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  7. Gottesman, D. Stabilizer Codes and Quantum Error Correction. Ph.D. Thesis, California Institute of Technology, Pasadena, CA, USA, 1997. [Google Scholar]
  8. Nguyen, D.M.; Kim, S. Minimal-Entanglement Entanglement-Assisted Quantum Error Correction Codes from Modified Circulant Matrices. Symmetry 2017, 9, 122. [Google Scholar] [CrossRef]
  9. Nguyen, D.M.; Kim, S. Construction and complement circuit of a quantum stabilizer code with length 7. In Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, Vienna, Austria, 5–8 July 2016. [Google Scholar] [CrossRef]
  10. Gallager, R.G. Low density parity check codes. IRE Trans. Inf. Theory 1962, 8, 21–28. [Google Scholar] [CrossRef]
  11. Chung, S.Y.; Forney, G.D.; Richardson, T.J.; Urbanke, R. On the design of low-density parity check codes within 0.045 db of the shannon limit. IEEE Comm. Lett. 2001, 45, 58–60. [Google Scholar] [CrossRef]
  12. Kim, S.; No, J.S.; Chung, H.; Shin, D.J. Quasi-cyclic low-density parity-check codes with girth larger than 12. IEEE Trans. Inf. Theory 2007, 53, 2885–2891. [Google Scholar]
  13. Kim, S. Adaptive FEC codes suitable for variable dimming values in visible light communication. IEEE Photonics Technol. Lett. 2015, 27, 967–969. [Google Scholar]
  14. Postol, M.S. A proposed quantum low density parity check code. arXiv, 2001; arXiv:quant-ph/010813. [Google Scholar]
  15. Hagiwara, M.; Imai, H. Quantum quasi-cyclic LDPC codes. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Nice, France, 24–29 June 2007. [Google Scholar]
  16. Hwang, Y.; Chung, Y.; Jeon, M. A class of quantum low-density parity check codes by combining seed graphs. Quantum Inf. Process. 2013, 12, 2219–2239. [Google Scholar] [CrossRef]
  17. Tan, P.; Li, J. Efficient quantum stabilizer codes: LDPC and LDPC convolutional constructions. IEEE Trans. Inf. Theory 2010, 56, 476–491. [Google Scholar] [CrossRef]
  18. Baumert, L.D. Cyclic Difference Sets; Springer: New York, NY, USA, 1971. [Google Scholar]
  19. Anderson, I. Combinatorial Designs: Construction Methods; Ellis Horwood Limited: New York, NY, USA, 1990. [Google Scholar]
  20. Beth, T.; Jungnickel, D.; Lenz, H. Design Theory; Cambridge University Press: New York, NY, USA, 1986. [Google Scholar]
  21. MacKay, D.; Mitchison, G.; McFadden, P. Sparse-graph codes for quantum error correction. IEEE Trans. Inf. Theory 2004, 50, 2315–2330. [Google Scholar] [CrossRef]
  22. Liu, Y.; Wang, Y.; Zhao, S.; Zheng, B. A construction of entanglement-assisted quantum LDPC codes from the cyclic difference set. In Proceedings of the IEEE 11th International Conference on Signal Processing (ICSP), Beijing, China, 21–25 October 2012. [Google Scholar]
  23. Xie, Y.; Yuan, J.; Malaney, R. Quantum stabilizer codes from difference sets. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Istanbul, Turkey, 7–12 July 2013. [Google Scholar]
  24. Vos, A.D.; Baerdemacker, S.D. Symmetry Groups for the Decomposition of Reversible Computers, Quantum Computers, and Computers in between. Symmetry 2011, 3, 305–324. [Google Scholar] [CrossRef] [Green Version]
  25. Nguyen, D.M.; Kim, S. Quantum Stabilizer Codes Construction from Hermitian Self-Orthogonal Codes over GF (4). J. Commun. Netw. 2018, 20, 209–315. [Google Scholar] [CrossRef]
  26. Xie, Y.; Yuan, J.; Sun, T.Q. On design of quantum stabilizer codes from quadratic residues sets. IEEE Trans. Inf. Theory 2014, 66, 3721–3735. [Google Scholar]
  27. Grassl, M. Bounds on the Minimum Distance of Linear Codes and Quantum Codes. Available online: http://codetables.de/ (accessed on 7 November 2018).
Figure 1. Quantum error correction operating process.
Figure 1. Quantum error correction operating process.
Symmetry 10 00655 g001
Table 1. Generators of [[5,1,3]] quantum stabilizer code.
Table 1. Generators of [[5,1,3]] quantum stabilizer code.
GeneratorsOperators
g1XZZXI
g2IXZZX
g3XIXZZ
g4ZXIXZ
Table 2. Difference sets (DSs) with parameters k λ modulo 2.
Table 2. Difference sets (DSs) with parameters k λ modulo 2.
No n , k , λ Difference Set
17, 3, 11 2 4.
27, 4, 20 3 5 6.
315, 7, 30 1 2 4 5 8 10.
421, 5, 13 6 7 12 14.
523, 11, 51 2 3 4 6 8 9 12 13 16 18.
631, 15, 71 2 3 4 6 8 12 15 16 17 23 24 27 29 30.
747, 23, 111 2 3 4 6 7 8 9 12 14 16 17 18 21 24 25 27. 28 32 34 36 37 42.
8199, 99, 491 2 4 5 7 8 9 10 13 14 16 18 20 23 25 26 28 29 31 32 33 35 36 40 43 45 46 47 49 50 51 52 53 56 57 58 61 62 63 64 65 66 70 72 79 80 81 86 89 90 91 92 94 98 100 102 103 104 106 111 112 114 115 116 117 121 122 123 124 125 126 128 130 131 132 139 140 144 145 151 155 157 158 160 161 162 165 169 172 175 177 178 180 182 184 187 188 193 196.
Table 3. Comparison of our proposed method and [23]’s method.
Table 3. Comparison of our proposed method and [23]’s method.
Paper [23]’s ConstructionProposed Construction
Focus on the difference set with parameters: ( n , k , λ ) = ( 4 p 1 , 2 p 1 , p 1 ) where p is even number and 4p − 1 is a prime number.Focus on the difference set with parameters: ( n , k , λ ) where k λ (modulo 2)

Share and Cite

MDPI and ACS Style

Nguyen, D.M.; Kim, S. New Constructions of Quantum Stabilizer Codes Based on Difference Sets. Symmetry 2018, 10, 655. https://doi.org/10.3390/sym10110655

AMA Style

Nguyen DM, Kim S. New Constructions of Quantum Stabilizer Codes Based on Difference Sets. Symmetry. 2018; 10(11):655. https://doi.org/10.3390/sym10110655

Chicago/Turabian Style

Nguyen, Duc Manh, and Sunghwan Kim. 2018. "New Constructions of Quantum Stabilizer Codes Based on Difference Sets" Symmetry 10, no. 11: 655. https://doi.org/10.3390/sym10110655

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop