Next Article in Journal
Hybrid Mutation Mechanism-Based Moth–Flame Optimization with Improved Flame Update Mechanism for Multi-Objective Engineering Problems
Previous Article in Journal
The Non-Uniqueness of Weak Solutions of the Boussinesq System in the Periodic Domain T3
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Equivalence Relations Between Conical 2-Designs and Mutually Unbiased Generalized Equiangular Tight Frames

by
Katarzyna Siudzińska
Institute of Physics, Faculty of Physics, Astronomy and Informatics, Nicolaus Copernicus University in Toruń, ul. Grudziądzka 5, 87-100 Toruń, Poland
Mathematics 2026, 14(1), 128; https://doi.org/10.3390/math14010128 (registering DOI)
Submission received: 5 December 2025 / Revised: 20 December 2025 / Accepted: 22 December 2025 / Published: 29 December 2025
(This article belongs to the Section E4: Mathematical Physics)

Abstract

Quantum measurements play a fundamental role in quantum information. Therefore, increasing efforts are being made to construct symmetric measurement operators for qudit systems. A wide class of projective measurements corresponds to complex projective 2-designs, which include symmetric, informationally complete (SIC) POVMs and mutually unbiased bases (MUBs). In this paper, we establish a one-to-one correspondence between conical 2-designs and mutually unbiased generalized equiangular tight frames, both of which are common generalizations of SIC POVMs and MUBs to operators of arbitrary rank. It turns out that there exist rich families of operators that belong to only one of those two classes. This raises important questions about which symmetries have to be preserved for applicational prominence.

1. Introduction

Quantum measurements are important tools in quantum information theory for the purpose of extracting information from unknown quantum states. Their various applications include, e.g., quantum communication protocols [1,2,3], quantum state estimation [4,5,6], entanglement detection [7,8,9,10,11], steering [12,13,14], and quantum tomography [15,16,17,18]. The most well known measurements are symmetric, informationally complete (SIC) POVMs [19] and mutually unbiased bases (MUBs) [20,21], which are examples of complex projective 2-designs [22,23,24,25].
In recent years, much attention has been paid to formulate generalized quantum measurements that consist of SIC POVMs or MUBs as special cases. One approach introduces semi-SIC POVMs [26] and equioverlapping measurements [27,28,29,30]—projective measurements that go beyond complex projective 2-designs. Alternatively, one defines families of mutually unbiased symmetric measurements with arbitrary rank. ( N , M ) -POVMs describe collections of N mutually unbiased POVMs, where each POVM consists of M operators [31]. Generalized symmetric measurements allow for these POVMs to have different numbers of elements [32], whereas generalized equiangular measurements (GEAMs) assume that each POVM can be taken with a different weight [33]. It turns out that every ( N , M ) -POVM and generalized symmetric measurement forms a conical 2-design [32,34], which is a generalization of complex projective 2-designs to non-projective operators [35,36,37]. This has not been observed for generalized equiangular measurements, where large families exist that go beyond conical 2-designs. However, many important discoveries could only be made for GEAMs that are conical 2-designs, like the relation between the index of coincidence and state purity [33] that is necessary for the derivation of entropic uncertainty relations, quantum coherence, the Brukner–Zeilinger invariants, and entanglement detection [38,39]. A natural question arises: Are there POVMs that form conical 2-designs but are not GEAMs? If so, can they be easily characterized?
In this paper, we analyze conical 2-designs with distinct, non-zero elements, as well as their relations to mutually unbiased generalized equiangular tight frames (MU GETFs), which are simply GEAMs rescaled by a common positive factor. Our main results are establishing the necessary and sufficient conditions for conical 2-designs to be MU GETFs. Analogical equivalence is then derived under the assumption that conical 2-designs are POVMs. The main results are collected into Theorems 1–4. During our calculations, we find a large family of conical 2-designs that are not MU GETFs. This opens a new direction for further research.
This paper is organized as follows. In Section 2, we recall the definition and basic properties of conical 2-designs. Section 3 introduces generalized equiangular tight frames (GETFs) as a generalization of equiangular tight frames to operators of arbitrary rank. Section 4 establishes implication relations between GETFs and conical 2-designs constructed from linearly independent operators. It also gives the most general trace conditions and a one-to-one correspondence between a class of conical 2-designs and GETFs. Next, we consider collections of linearly dependent operators that span the operator space. In Section 5, we define mutually unbiased (MU) GETFs as a straightforward generalization of generalized equiangular measurements. Then, in an analogy to Section 4, Section 6 compares a class of informationally overcomplete conical 2-designs with MU GETFs. We provide a set of conditions under which the sets of GEAMs and conical 2-designs are equivalent. Our results are summarized in the Conclusions Section, where we also present a list of open questions for further considerations.

2. Conical 2-Designs

Conical designs have been introduced as a generalization of complex projective designs from rank-1 projectors to semi-positive (non-negative) operators of arbitrary rank acting on the Hilbert space H C d . As the name suggests, these operators form a cone { λ ρ ; λ 0 } generated by density operators ρ [35]. Unlike complex projective designs [22,23,40] and mixed-state designs [41], conical designs are not suitable for averaging with respect to the Hilbert–Schmidt (flat) measure.
Definition 1
([35]). A conical 2-design R = { R k ; k = 1 , , M } is a collection of M d 2 semi-positive operators R k such that
k = 1 M R k R k = κ + I d I d + κ F d ,
where κ + κ > 0 , and F d = m , n = 1 d | m n | | n m | is the flip operator.
From definition, k = 1 M R k R k commutes with U U for any unitary U, and R k span the operator space B ( H ) on H . Moreover, in ref. [32], it has been shown that, through the Choi–Jamiołkowski isomorphism [42,43], Equation (1) is equivalent to
Φ = κ + d Φ 0 + κ 1 l .
In the above formula, Φ 0 [ X ] = I d Tr ( X ) / d is the maximally depolarizing channel, 1 l denotes the identity map, and Φ [ X ] = k = 1 M R k Tr ( R k X ) is a linear map constructed from R k . Also note that Equation (1) implies
Tr 2 k = 1 M R k R k = k = 1 M R k Tr ( R k ) = ( d κ + + κ ) I d ,
where Tr 2 ( X ) is the trace of X over the second subsystem. Moreover, there are special classes of conical 2-designs:
(i) 
Homogeneous conical 2-designs, for which Tr ( R k ) and Tr ( R k 2 ) are constant [35];
(ii) 
Complex projective 2-designs, whose elements are rank-1 projectors [22,23,25];
(iii) 
Rescaled weighted projective 2-designs, which are formed from orthonormal vector bases [44,45,46].
Example 1.
There exist linear operators that satisfy Equation (1) with κ + κ > 0 but are not semi-positive. Consider the following qubit operators:
R 1 = 1 4 3 1 + 5 1 i 1 + i 1 + 5 ,   R 2 = 1 12 3 1 + 3 5 5 i 5 + i 1 + 3 5 , R 3 = 1 12 3 1 3 5 1 5 i 1 + 5 i 1 3 5 ,   R 4 = 1 12 3 5 3 5 1 + i 1 i 5 3 5 .
Observe that R 1 and R 2 have positive eigenvalues, while the eigenvalues of R 3 and R 4 are negative. The traces of R k are real and have the same module
Tr ( R 1 ) = Tr ( R 2 ) = 5 2 3 ,   Tr ( R 3 ) = Tr ( R 4 ) = 5 2 3 .
Now, it is straightforward to show that
k = 1 4 R k R k = 1 6 3 0 0 0 0 2 1 0 0 1 2 0 0 0 0 3 ,
and hence R k satisfy Equation (1) with κ + = 1 / 3 and κ = 1 / 6 . However, R k do not form a conical 2-design due to R k 0 . This proves that semi-positivity is indeed an essential requirement in the definition of conical designs.
Conical 2-designs are also formed by certain classes of positive, operator-valued measures (POVMs), where R k are semi-positive operators such that k = 1 M R k = I d . Examples include symmetric, informationally complete (SIC) POVMs [19], general SIC POVMs [47,48], mutually unbiased bases (MUBs) [20,21], mutually unbiased measurements (MUMs) [49,50], ( N , M ) -POVMs [31], generalized symmetric measurements [32], and generalized equiangular measurements [33]. A counterexample consists of semi-SIC POVMs [26] and equioverlapping measurements [27,28,29], which allow for operators of unequal traces.
In what follows, we prove that there exists a close relation between conical 2-designs and generalized equiangular tight frames.

3. Generalized Equiangular Tight Frames

In quantum information theory, pure quantum states are represented by rank-1 projectors | ψ k ψ k | onto the vectors ψ k in the Hilbert space H C d . A more general construction is a line { P k = a k | ψ k ψ k | ; a k R / { 0 } , whose elements are rank-1 operators P k that are projective only for a k = 1 . Of particular interest are collections { P k ; k = 1 , , M } of lines that are uniform and equiangular; that is, a k = a and Tr ( P k P ) = c Tr ( P k ) Tr ( P ) for all k . Uniform equiangular lines for which k = 1 M P k = γ I d , γ > 0 , define an equiangular tight frame [51,52]. It has been shown that the number M of frame elements P k belongs to the range d M d 2 , where M = d 2 corresponds to a SIC POVM rescaled by the factor γ [53]. Recently, a generalization of equiangular tight frames has been considered, where the rank requirement of P k is dropped.
Definition 2
([33]). A generalized equiangular tight frame (GETF) P = { P k ; k = 1 , , M } is a collection of 2 M d 2 semi-positive, non-zero operators P k such that
Tr ( P k ) = a , Tr ( P k 2 ) = b [ Tr ( P k ) ] 2 , Tr ( P k P ) = c Tr ( P k ) Tr ( P ) ,   k ,
and k = 1 M P k = γ I d with γ > 0 .
Consequently, this definition fixes the values of both the trace and the overlap
a = d γ M ,   c = M d b d ( M 1 ) ,
as well as the admissible range of the free parameter b,
1 d < b 1 d min { d , M } .
We exclude b = 1 / d that corresponds to the trivial case with P k = γ I d / M . The choice b = 1 corresponds to rank-1 projectors. If b = M / d , then P k are projectors or rank d / M . Additionally, all the elements of a GETF are always linearly independent. For a detailed derivation of these properties, see Appendix B. Note that for γ = 1 , GETFs are quantum measurements known as ( 1 , M ) -POVMs [31], and taking a = 1 reproduces (projective) equiangular measurements [27].
Following the methods presented in refs. [32,47], we show that any GETF can be constructed from a set G = { G k ; k = 0 , , M 1 } of orthonormal Hermitian operators such that G 0 = I d / d and Tr ( G k ) = 0 for all k = 1 , , M 1 . In particular, for maximal GETFs ( M = d 2 ), G is an operator basis. Now, using G k , let us define M traceless operators
H k = G M ( 1 + M ) G k ,   k = 1 , , M 1 , ( 1 + M ) G ,     k = M ,
where G = k = 1 M 1 G k . Then, the corresponding GETF is given by
P k = γ M I d + τ H k ,
provided that the real parameter τ is chosen so that it guarantees the semi-positivity of every P k . Observe that τ is related to the GETF parameters ( a , b , c ) via
τ = ± a 2 ( b c ) M ( M + 1 ) 2 .
Another way to construct a GETF from the same Hermitian orthonormal basis is to replace H k with
H k = G + M ( 1 M ) G k ,   k = 1 , , M 1 , ( 1 M ) G ,     k = M .
Then, one arrives at an alternative formula
P k = γ M I d + τ H k
for a GETF P = { P k ; k = 1 , , M } with
τ = ± a 2 ( b c ) M ( M 1 ) 2 .
Note that a single triple ( a , b , c ) is associated with four numbers: ± | τ | , ± | τ | . Moreover, in general, P P , and hence the same G can be used to introduce more than one GETF. For more details, see the results in ref. [32] for N = 1 .

4. Conical 2-Designs vs. Generalized Equiangular Tight Frames

In this section, we establish an equivalence relation between conical 2-designs and GETFs. Note that this is possible only for sets of M = d 2 operators. For tables of coefficients, see Appendix A. We divide this task into proving two implication relations.
Proposition 1.
If P = { P k ; k = 1 , , d 2 } is a generalized equiangular tight frame, then it is a conical 2-design.
Proof. 
Let us start by constructing the map Φ [ X ] = k = 1 d 2 P k Tr ( P k X ) , multiplying it by P , and taking the trace. This results in
Tr ( Φ [ X ] P ) = k = 1 d 2 Tr ( P k P ) Tr ( P k X ) = Tr ( P 2 ) Tr ( P X ) + k Tr ( P k P ) Tr ( P k X ) = a 2 b Tr ( P X ) + a 2 c k = 1 d 2 Tr ( P k X ) Tr ( P X ) = a 2 ( b c ) Tr ( P X ) + a 2 c γ Tr ( X ) ,
where we have used the properties of P k from Definition 2. Equivalently, this formula can be rewritten into
Tr Φ + a 2 ( b c ) 1 l + a c d γ Φ 0 [ X ] P = 0 ,
and it has to hold for every X and P . As P spans the operator space on H , this condition reduces to
Φ = a 2 ( b c ) 1 l + a c d γ Φ 0 .
Comparing the above equation with Equation (2), we find that
κ + = a c γ ,   κ = a 2 ( b c ) .
Now, Equations (8) and (9) allow us to check that indeed
κ + = γ 2 d b d ( d 2 1 ) κ = γ 2 d b 1 d ( d 2 1 ) > 0
for every b 1 . □
Therefore, all generalized equiangular tight frame with M = d 2 elements are (homogeneous) conical 2-designs. Next, we prove an inverse implication relation for conical 2-designs that are Hermitian operator bases.
Proposition 2.
If R = { R k ; k = 1 , , d 2 } with linearly independent operators R k is a conical 2-design, then its elements obey the trace relations
Tr ( R k ) = w k , Tr ( R k 2 ) = κ + κ + κ w k 2 , Tr ( R k R ) = κ + κ w k w ,   k ,
where k = 1 d 2 w k 2 = d κ with κ = d κ + + κ .
Proof. 
Assume that a conical 2-design satisfies the most general trace relations:
Tr ( R k ) = w k , Tr ( R k 2 ) = x k , Tr ( R k R ) = y k ,   k ,
where w k , x k , and y k = y k are real numbers due to the Hermiticity of R k . From Equation (3), one also has
k = 1 d 2 w k R k = κ I d .
Using the trace relations, we find
k = 1 d 2 w k 2 = k = 1 d 2 w k Tr ( R k ) = κ Tr ( I d ) = d κ , κ w k = κ Tr ( R k ) = = 1 d 2 w Tr ( R k R ) = w k x k + k w y k .
Recall that R is a conical 2-design if and only if
Φ = κ + d Φ 0 + κ 1 l ,   κ + κ > 0 ,
where Φ [ X ] = = 1 d 2 R Tr ( R X ) . For the left hand-side of Equation (25), we calculate
Tr ( Φ [ X ] R k ) = = 1 d 2 Tr ( R R k ) Tr ( R X ) = Tr ( R k 2 ) Tr ( R k X ) + k Tr ( R R k ) Tr ( R X ) = x k Tr ( R k X ) + k y k Tr ( R X ) ,
and, for the right hand-side,
Tr ( Φ [ X ] R k ) = κ + w k Tr ( X ) + κ Tr ( R k X ) .
By comparing Equations (26) and (27), we obtain the formula
Tr ( x k κ ) R k + k y k R κ + w k I d X = 0
that holds for all Hermitian X. Hence,
( x k κ ) R k + k y k R = w k κ + I d ,
or, in terms of R k only,
[ κ ( x k κ ) κ + w k 2 ] R k + k ( κ y k w k w κ + ) R = 0 .
But all R k are linearly independent, so every term multiplying R k vanishes. Therefore,
x k = κ + κ + κ w k 2 ,   y k = κ + κ w k w .
Finally, we find that the Cauchy–Schwarz inequality does not introduce any new conditions due to the inequalities
w k 2 = [ Tr ( R k ) ] 2 Tr ( R k 2 ) Tr ( I d ) = d x k , y k 2 = [ Tr ( R k R ) ] 2 Tr ( R k 2 ) Tr ( R 2 ) = x k x
being always satisfied for x k and y k given by Equation (31). □
Example 2.
As an illustrative example of a conical 2-design with elements of unequal traces (and hence, not a GETF), consider the following semi-positive qubit operators:
R 1 = 1 4 3 1 + 5 1 i 1 + i 1 + 5 ,   R 2 = 1 12 3 1 + 3 5 5 i 5 + i 1 + 3 5 , R 3 = 1 12 3 1 3 5 1 5 i 1 + 5 i 1 3 5 ,   R 4 = 1 12 3 5 3 5 1 + i 1 i 5 3 5 .
Observe that Tr ( R 1 ) = Tr ( R 3 ) = 5 / ( 3 2 ) and Tr ( R 2 ) = Tr ( R 4 ) = 5 / 3 . Moreover, R 1 and R 3 are rank-1 operators, whereas R 2 and R 4 are full rank operators with the same spectrum:
10 + 5 6 5 , 10 5 6 5 .
Now, we calculate k = 1 4 R k R k , which gives results identical to Equation (6). This shows that R k form a conical 2-design with κ + = 1 / 3 and κ = 1 / 6 .
In general, conical 2-designs define a wider, less symmetric class than generalized equiangular tight frames. Regardless, there exists a close relation between homogeneous designs and GETFs. To show this, we first present the following properties.
Proposition 3.
For a conical 2-design R = { R k ; k = 1 , , d 2 } with linearly independent elements R k , the following statements are equivalent:
(i) 
R k  are of equal trace:  Tr ( R k ) = w ;
(ii) 
R k 2  are of equal trace:  Tr ( R k 2 ) = x ;
(iii) 
R k  satisfy the symmetry condition  Tr ( R k R ) = y  for all  k ;
(iv) 
R k  sum up to a rescaled identity operator  k = 1 d 2 R k = η I d  for some  η > 0 ;
(v) 
R  is a homogeneous conical 2-design.
Proof. 
Let us use the notation from Proposition 2. Obviously,
( i )   k   w k = w     ( i i i )   k   y k = κ + κ w k w = y ,
and also
( i )   k   w k = w     ( i i )   k   x k = κ + κ + κ w k 2 = x ,
which in turn implies that R is a homogeneous conical 2-design. The inverse implication relation follows directly from the definition of homogeneous designs, and hence ( i ) ( v ) . Next, note that if w k = w , then one immediately has ( i v ) with η = κ / w due to k = 1 d 2 w k R k = w k = 1 d 2 R k = κ I d . Conversely, if ( i v ) holds, then
κ k = 1 d 2 R k = κ η I d = η k = 1 d 2 w k R k ,
where we used Equation (23) in the second equality. Hence, we have
k = 1 d 2 ( κ η w k ) R k = 0 ,
which recovers w k = κ / η = w from linear independence of R k , and therefore ( i ) ( i v ) . □
Finally, a one-to-one correspondence can be established between homogeneous conical 2-designs and GETFs.
Proposition 4.
A homogeneous conical 2-design R = { R k ; k = 1 , , d 2 } with linearly independent elements R k is a GETF.
Proof. 
Consider a homogeneous conical 2-design, where by definition
Tr ( R k ) = w = κ d , Tr ( R k 2 ) = x = κ + κ + d , Tr ( R k R ) = y = κ + d ,   k ,
and k = 1 d 2 R k = κ I d / w . Now, comparing these coefficients with Definition 2 of generalized equiangular tight frames, we identify γ = κ / w > 0 , as well as
a = w ,   b = x w 2 ,   c = y w 2 .
It remains to check whether the above choices of a, b, and c indeed satisfy all the properties of a GETF. Obviously, a > 0 and c > 0 . The range of b follows from the conditions on κ ± . Observe that if κ > 0 , then
b = x w 2 = 1 d 1 + d 2 1 κ κ > 1 d .
Finally, if κ + κ , then b is upper bounded by
b max = b | κ + = κ = 1 .
Therefore, b corresponding to a homogeneous conical 2-design lies in the admissible range from Equation (9), which guarantees R k 0 . □
By combining the results from Propositions 1 and 4, we formulate our first main result.
Theorem 1.
A collection R = { R k ; k = 1 , , d 2 } of linearly independent operators R k is a homogeneous conical 2-design if and only if it is a generalized equiangular tight frame.
Recall that a GETF is a quantum measurements (POVM) if γ = 1 . More specifically, it is a general SIC POVM [47]. By definition, the POVM elements P k sum up to the identity and hence satisfy all the statements in Proposition 3. This allows us to formulate another relation.
Theorem 2.
Consider a POVM P = { P k ; k = 1 , , d 2 } whose elements P k are linearly independent. Then, P is a conical 2-design if and only if it is a general SIC POVM.
The scope of our considerations is limited to maximal sets of semi-positive operators, which form informationally complete sets. However, the results of this section can easily be generalized to informationally overcomplete. To show this, we introduce families of GETFs that satisfy additional symmetry constraints.

5. Mutually Unbiased Generalized Equiangular Tight Frames

Consider a collection of N generalized equiangular tight frames P α = { P α , k ; k = 1 , , M α } , where k = 1 M α P α , k = γ α I d with γ α > 0 . Each frame consists of M α 2 semi-positive operators, and there are no constraints on their ranks. Assume that these GETFs are complementary [16] (or mutually unbiased [54,55]), which means that their elements satisfy Tr ( P α , k P β , ) = f Tr ( P α , k ) Tr ( P β , ) for any α β . This allows us to introduce the following definition.
Definition 3.
Mutually unbiased generalized equiangular tight frames (MU GETFs) P = α = 1 N P α are a collection of N generalized equiangular tight frames P α = { P α , k ; k = 1 , , M α } , α = 1 , , N , such that
Tr ( P α , k ) = a α , Tr ( P α , k 2 ) = b α Tr ( P α , k ) 2 , Tr ( P α , k P α , ) = c α Tr ( P α , k ) Tr ( P α , ) ,   k , Tr ( P α , k P β , ) = f Tr ( P α , k ) Tr ( P β , ) ,   α β ,
and k = 1 M α P α , k = γ α I d for γ α > 0 .
Using the results in Equations (8) and (9), we immediately recover the coefficients
a α = d γ α M α ,   c α = M α d b α d ( M α 1 ) ,
and the ranges of the free parameters b α ,
1 d < b α 1 d min { d , M α } .
Lastly, the value of f = 1 / d follows from
d γ α γ β = k = 1 M α = 1 M β Tr ( P α , k P β , ) = f k = 1 M α = 1 M β Tr ( P α , k ) Tr ( P β , ) = d 2 f γ α γ β ,
which holds for every α β .
Note that, in the most general case, P itself is not a GETF because it does not always satisfy the trace relations in Definition 2, even though α = 1 N k = 1 M α P α , k = Γ I d with Γ = α = 1 N γ α . The special case where MU GETFs form a GETF corresponds to the choice γ α = a M α / d and b α = b , where a is a positive constant and 1 / d < b min α { d , M α } .
In Appendix C, we prove that the set { I d , P α , k ; k = 1 , , M α 1 ; α = 1 , , N } consists of linearly independent operators, and the total number | P | of elements of P is bounded by
2 N α = 1 N M α d 2 + N 1 .
If and only if the upper bound is reached, P α , k P form an informationally overcomplete set. Additionally taking Γ = 1 results in generalized equiangular measurements [33].
Similarly to Section 3, we construct MU GETFs from a set of orthonormal Hermitian operators G = { G 0 , G α , k ; k = 1 , , M α 1 ; α = 1 , , N } that consists of G 0 = I d / d and traceless G α , k . Note that this time the elements of G are assigned two indices, and the resulting GETFs strongly depend on the partition of G into G α = { G α , k ; k = 1 , , M α 1 } . This can be seen from the construction method alone, as the mutually unbiased GETFs are given by
P α , k = γ α M α I d + τ α H α , k ,
where
H α , k = G α M α ( 1 + M α ) G α , k ,   k = 1 , , M α 1 , ( 1 + M α ) G α ,   k = M α ,
G α = k = 1 M α 1 G α , k , and τ α is chosen to guarantee that P α , k 0 for all k = 1 , , M α and a fixed α . The relation between τ α and the GETF parameters ( a α , b α , c α ) reads
τ α = ± S α M α ( M α + 1 ) 2 ,   S α a α 2 ( b α c α ) .
Alternatively, any number of GETFs P α = { P α , k ; k = 1 , , M α } can be constructed through the formula
P α , k = γ α M α I d + τ α H α , k ,
where the choice of τ α guarantees that P α , k 0 and
H α , k = G α + M α ( 1 M α ) G α , k ,   k = 1 , , M α 1 , ( 1 M α ) G α ,   k = M α .
Once again, there are two possible choices of τ α for the same triple ( a α , b α , c α ) ,
τ α = ± S α M α ( M α 1 ) 2 ,   S α a α 2 ( b α c α ) .
In general, P α P α [32], and hence the same partition of G into G α results in up to four one-parameter families of GETFs. Maximal sets of MU GETFs are informationally overcomplete, with N 1 informationally redundant elements, and they are constructed from orthonormal bases G . Finally, observe that P = α = 1 N P ˜ α , where P ˜ α { P α , P α } . Therefore, one set of orthonormal Hermitian operators G can lead to many unequivalent constructions of MU GETFs.
Of particular interest is a class of informationally overcomplete MU GETFs for which there exists a direct relation between the index of coincidence [56]
C ( ρ ) = α = 1 N k = 1 M α p α , k 2 ( ρ ) ,   p α , k ( ρ ) = 1 Γ Tr ( P α , k ρ ) ,
and the state purity Tr ( ρ 2 ) . The rescaling by 1 / Γ is necessary for p α , k to form a probability distribution. Observe that the operators P α , k / Γ form a GEAM, and therefore the corresponding index of coincidence reads [33]
C ( ρ ) = S Tr ρ 2 1 d + μ ,
where
μ = 1 d α = 1 N a α γ α ,
but only under the additional condition that S α = a α ( b α c α ) S . As it turns out, this constraint is closely related to yet another property of MU GETFs. Indeed, let us calculate the Frobenius distance between the elements P α , k of a single GETF P α [57],
D 2 2 ( X , Y ) = 1 2 X Y 2 2 ,
where X 2 = Tr ( X X ) is the Frobenius norm of X. Now, for any k , we have
D 2 2 ( P α , k , P α , ) = 1 2 Tr [ ( P α , k P α , ) 2 ] = 1 2 Tr ( P α , k 2 ) + Tr ( P α , 2 ) 2 Tr ( P α , k P α , k ) = a α 2 ( b α c α ) S α .
Definition 4.
Mutually unbiased generalized equiangular tight frames are equidistant if S α = S for all α = 1 , , N , where
0 < S min α d γ α 2 M α , d 1 M α 1 d γ α 2 M α ,
A detailed derivation of the range of S is presented in Appendix D. It is important to note that the equidistance property is singled out by requiring a linear relation between the index of coincidence and purity of a quantum state. Whether this connects with other symmetry conditions remains unclear.

6. Conical 2-Designs vs. Mutually Unbiased GETFs

This section generalizes the results of Section 4 to conical 2-designs whose elements are linearly dependent while still spanning the space of operators on H C d . In analogy to mutually unbiased (MU) GETFs, conical 2-designs are now numbered via two sets of indices, so that R = { R α , k ; k = 1 , , M α ; α = 1 , , N } . The total number of operators R α , k is given by the upper bound from Equation (47), which guarantees that R is an informationally overcomplete (IOC) set. From now on, we assume that all sets of MU GETFs are maximal, which means that there is the total of | P | = α = 1 N M α = d 2 + N 1 elements P α , k . For tables of coefficients, refer to Appendix A.
Again, we start from proving an implication relation for the GETFs.
Proposition 5.
If P α = { P α , k ; k = 1 , , M α } , α = 1 , , N , are equidistant mutually unbiased generalized equiangular tight frames, then P = α = 1 N P α is a conical 2-design.
Proof. 
The proof is analogical to that of Proposition 1. For every GETF P α , let us construct a map Φ α [ X ] = k = 1 M α P α , k Tr ( P α , k X ) . From Equation (16), we immediately get
Tr ( Φ α [ X ] P α , ) = a α 2 ( b α c α ) Tr ( P α , X ) + a α 2 c α γ α Tr ( X ) .
Now, for any β α , it follows from Definition 3 that
Tr ( Φ α [ X ] P β , ) = k = 1 M α Tr ( P α , k P β , ) Tr ( P α , k X ) = f a β k = 1 M α a α Tr ( P α , k X ) = f γ α a α a β Tr ( X ) .
Therefore, for the total map Φ = α = 1 N Φ α , one finds the formula
Tr ( Φ [ X ] P α , k ) = a α 2 ( b α c α ) Tr ( P α , k X ) + a α 2 γ α ( c α f ) + a α f β = 1 N a β γ β Tr ( X )   = a α 2 ( b α c α ) Tr ( P α , k X ) a α d a α 2 ( b α c α ) β = 1 N a β γ β Tr ( X )
that is the same as for generalized equiangular measurements in ref. [33]. In the last equality, the following identity between the coefficients has been used,
c α f = b α c α M α .
Now, Equation (62) can be rewritten as
Tr Φ + S α 1 l + μ S α d d Φ 0 [ X ] P α , k = 0 ,
where S α = a α 2 ( b α c α ) and μ is given by Equation (56). The above trace relation holds for all X and P α , k , and hence
Φ = S α 1 l + μ S α d d Φ 0 .
Comparing our results with Φ = κ + d Φ 0 + κ 1 l from Equation (2), we notice that MU GETFs are conical 2-designs if and only if they are equidistant: S α S for all α = 1 , , N . Under this condition, we identify
κ + = μ S d ,   κ = S .
Finally, it is easy to ckeck that κ > 0 and
κ + κ = μ d + 1 d S 0 .
Note that the parameters κ ± for the equidistant MU GETFs can be rewritten as
κ + = C max S ,   κ = S ,
where
C max = d 1 d S + μ
is the upper bound for the index of coincidence C ( ρ ) , reached for pure states ( Tr ( ρ 2 ) = 1 ). Therefore, κ ± are fully characterized by the maximal index of coincidence and the Frobenius distance S.
The conical 2-designs from Proposition 5 are in general no longer homogeneous for N 2 . Moreover, there exists a large class of MU GETFs that go beyond conical 2-designs. Neither of these was observed for a single GETF ( N = 1 ).
Example 3.
Let us provide a simple example of MU GETFs that are not conical 2-designs. In d = 2 , consider N = 3 MU GETFs such that
P 1 , 1 = γ 1 1 0 0 0 , P 1 , 2 = γ 1 0 0 0 1 ,   P 2 , 1 = γ 2 2 1 1 1 1 , P 2 , 2 = γ 2 2 1 1 1 1 ,   P 3 , 1 = γ 3 2 1 i i 1 , P 3 , 2 = γ 3 2 1 i i 1 ,
where γ α > 0 , α = 1 , 2 , 3 . Observe that
α = 1 3 k = 1 2 P α , k P α , k = 1 2 γ 1 2 + γ 2 2 + 2 γ 3 2 0 0 γ 1 2 γ 2 2 0 γ 1 2 + γ 2 2 γ 1 2 + γ 2 2 0 0 γ 1 2 + γ 2 2 γ 1 2 + γ 2 2 0 γ 1 2 γ 2 2 0 0 γ 1 2 + γ 2 2 + 2 γ 3 2 ,
and hence P α , k do not form a conical 2-design if γ α γ β for any α β . Interestingly, for γ 1 = γ 2 = γ 3 = 1 , the operators in Equation (70) are rank-1 projectors onto the vectors that form a maximal set of three mutually unbiased bases. Therefore, MU GETFs that are not conical 2-designs can be constructed from MU GETFs that are conical 2-designs.
Now, we formulate an inverse implication for informationally overcomplete conical 2-designs. The main difference from the case in Proposition 2 is that now there exist partial sums of Tr ( R k ) R k equal to a rescaled identity operator.
Proposition 6.
Consider N sets R α = { R α , k ; k = 1 , , M α } of linearly independent semi-positive operators that satisfy k = 1 M α Tr ( R α , k ) R α , k = κ α I d for some κ α > 0 and together span the operator space B ( H ) . If R = α = 1 N R α with | R | = d 2 + N 1 is a conical 2-design, then its elements obey the trace relations
Tr ( R α , k ) = w α , k , Tr ( R α , k 2 ) = κ + κ α κ d κ α w α , k 2 , Tr ( R α , k R α , ) = κ α κ d κ α w α , k w α , ,   k , Tr ( R α , k R β , ) = 1 d w α , k w β , ,   α β .
Proof. 
Let us start by observing that if k = 1 M α Tr ( R α , k ) R α , k = κ α I d and | R | = d 2 + N 1 , then the set { I d , R α , k ; k = 1 , , M α 1 ; α = 1 , , N } consists of operators that are linearly independent (for more details, see Appendix C). Next, we assume that a conical 2-design obeys the most general trace relations:
Tr ( R α , k ) = w α , k , Tr ( R α , k 2 ) = x α , k , Tr ( R α , k R α , ) = y α , k , ,   k , Tr ( R α , k R β , ) = z α , k ; β , ,   α β .
As R α , k are Hermitian, all the numbers are real. Moreover, from the cyclicity of the trace, y α , k , = y α , , k and z α , k ; β , = z β , ; α , k . From Equation (3), it follows that
α = 1 N κ α = κ ,   where   k = 1 M α w α , k R α , k = κ α I d
and κ = d κ + + κ . Additionally, the trace relations imply
k = 1 M α w α , k 2 = k = 1 M α w α , k Tr ( R α , k ) = κ α Tr ( I d ) = d κ α , κ α w α , k = κ α Tr ( R α , k ) = = 1 M α w α , Tr ( R α , k R α , ) = w α , k x α , k + k w α , y α , k , ,
which is a direct generalization of Equation (24). For α β , we obtain
κ β w α , k = κ β Tr ( R α , k ) = = 1 M β w β , Tr ( R α , k R β , ) = = 1 M β w β , z α , k ; β , .
This, together with the first line of Equation (75), gives
d κ α κ β = k = 1 M α = 1 M β w α , k w β , z α , k ; β , .
Now, for each R α , we construct Φ α [ X ] = k = 1 M α R α , k Tr ( R α , k X ) and then calculate
Tr ( Φ α [ X ] R α , k ) = = 1 M α Tr ( R α , R α , k ) Tr ( R α , X ) = x α , k Tr ( R α , k X ) + k y α , k , Tr ( R α , X ) ,
as well as, for any β α
Tr ( Φ β [ X ] R α , k ) = = 1 M β Tr ( R β , R α , k ) Tr ( R β , X ) = = 1 M β z α , k ; β , Tr ( R β , X ) .
Therefore, for the total map Φ = α = 1 N Φ α , we find
Tr ( Φ [ X ] R α , k ) = x α , k Tr ( R α , k X ) + k y α , k , Tr ( R α , X ) + β α = 1 M β z α , k ; β , Tr ( R β , X ) .
Next, we have to compare our results with the general formula. Recall that the collection R = α = 1 N R α forms a conical 2-design if and only if
Φ = κ + d Φ 0 + κ 1 l ,   κ + κ > 0 .
Using the above equation, one gets
Tr ( Φ [ X ] R α , k ) = w α , k κ + Tr ( X ) + κ Tr ( R α , k X ) .
By comparing Equations (80) and (82), we obtain an equivalent formula for conical 2-designs
Tr ( x α , k κ ) R α , k + k y α , k , R α , + β α = 1 M β z α , k ; β , R β , w α , k κ + I d X = 0 ,
which holds for all Hermitian X. Therefore, the expression in the square brackets vanishes. In Appendix E, we show that this is the case provided that
x α , k = κ + κ α κ d κ α w α , k 2 ,   y α , k , = κ α κ d κ α w α , k w α , ,   z α , k ; β , = 1 d w α , k w β , .
Finally, the condition κ α κ guarantees that y α , k , 0 . □
Interestingly, κ controls the parameters in the trace relations, whereas κ + only appears as the constraint for the sum over all κ α . Observe that the semi-positivity of R α , k imposes the following conditions on the parameters in Proposition 6 (see Appendix F):
κ α κ ,   d κ κ α ( d 1 ) κ α + κ w α , k 2 < d κ α .
Also, R α are equidistant if and only if w α , k = w α , , which can be checked by computing
D 2 2 ( R α , k , R α , ) = κ + κ α κ 2 d κ α ( w α , k w α , ) 2 .
Example 4.
A good example of a conical 2-design that is not formed by MU GETFs but still belongs to the class from Proposition 6 is given by two collections of qubit operators:
R 1 , 1 = 1 6 1 0 0 0 , R 1 , 2 = 1 6 0 0 0 1 ,       R 2 , 1 = 1 2 30 2 3 5 i 2 5 + i 2 2 3 , R 2 , 2 = 1 2 30 2 3 5 i 2 5 + i 2 2 3 , R 2 , 3 = 1 2 15 2 2 i 3 i 3 2 2 .
R 1 is a rescaled von Neumann measurement, whereas R 2 is composed of three full rank operators with Tr ( R 2 , 1 ) = Tr ( R 2 , 2 ) Tr ( R 2 , 3 ) . Note that R 1 , 1 + R 1 , 2 = I 2 / 6 and R 2 , 1 Tr ( R 2 , 1 ) + R 2 , 2 Tr ( R 2 , 2 ) + R 2 , 3 Tr ( R 2 , 3 ) = 2 I 2 / 3 . Moreover, R 2 , 1 and R 2 , 2 have the same eigenvalues. The parameters that characterize this conical design are κ + = 1 / 3 and κ = 1 / 6 , which are identical to those in Example 2. This proves that the same values of κ ± can correspond to different designs.
Under additional conditions, an implication relation between conical 2-designs and MU GETFs can be established. Note that it goes beyond the homogeneous designs because the traces of operators from different GETFs do not have to be the same. However, if the traces of R α , k R α are equal, some interesting properties can be recovered.
Proposition 7.
If R is a conical 2-design from Proposition 6, then the following statements are equivalent:
(i) 
R α , k R α are of equal trace: Tr ( R α , k ) = w α ;
(ii) 
R α , k 2 R α are of equal trace: Tr ( R α , k 2 ) = x α ;
(iii) 
R α , k R α satisfy the symmetry condition Tr ( R α , k R α , ) = y α for all k ;
(iv) 
R α , k R α sum up to a rescaled identity operator k = 1 M α R α , k = η α I d for some η α > 0 ;
(v) 
each R α is a GETF;
(vi) 
R α are mutually unbiased: Tr ( R α , k R β , ) = f Tr ( R α , k ) Tr ( R β , ) for all α β .
Proof. 
Using the notation from Proposition 6, we immediately show that
( i )   k   w α , k = w α     ( i i )   k   x α , k = κ + κ α κ d κ α w α , k 2 = x α ,
( i )   k   w α , k = w α     ( i i i )   k   y α , k , = κ α κ d κ α w α , k w α , = y α ,
and
( i )   k   w α , k = w α     ( v i )   β α   z α , k ; β = 1 d w α w β = 1 d Tr ( R α , k ) Tr ( R β , ) ,
which proves the mutual unbiasedness of R α with f = 1 / d . Moreover, if w α , k = w α , then ( i v ) holds for η α = κ α / w α > 0 , which can be seen from
k = 1 M α w α , k R α , k = w α k = 1 M α R α , k = κ α I d .
On the other hand, if ( i v ) is satisfied, then
κ α k = 1 M α R α , k = κ α η α I d = η α k = 1 M α w α , k R α , k ,
which implies that
k = 1 M α ( κ α η α w α , k ) R α , k = 0 .
As R α , k R α are linearly independent, one recovers w α , k = κ α / η α = w α , and hence ( i ) ( i v ) . Finally, by definition, R α satisfies conditions ( i ) to ( i v ) if and only if ( v ) R α is a GETF. □
Now, let us expand these results to further establish a relation between conical 2-designs and MU GETFs.
Proposition 8.
If R = { R α , k ; k = 1 , , M α , α = 1 , , N } is a conical 2-design from Proposition 6 with Tr ( R α , k ) = w α , then it is a maximal set of equidistant MU GETFs.
Proof. 
The condition that the trace of every R α , k R α depends only on the index α transforms Equation (72) into
Tr ( R α , k ) = w α , Tr ( R α , k 2 ) = x α = w α 2 d + M α 1 M α κ , Tr ( R α , k R α , ) = y α = w α 2 d κ M α ,   k , Tr ( R α , k R β , ) = z α β = 1 d w α w β ,   α β ,
where α = 1 N M α w α 2 = d κ . If we compare the above coefficients with Definition 3 of MU GETFs, we find that
a α = w α ,   b α = x α w α 2 ,   c α = y α w α 2 ,   f = z α β w α w β ,
and also γ α = κ α / w α = w α M α / d . It is straightforward to determine the positivity of the following constants: γ α > 0 , a α > 0 , and f > 0 (because w α > 0 ). Now, for R to be a collection of MU GETFs, b α has to belong to the range given by Equation (45). This is the case as long as κ > 0 and
w α d κ M α max 1 , M α 1 d 1 .
The above condition follows from Equation (85) for w α , k = w α and already guarantees c α 0 . Finally, observe that S α = a α 2 ( b α c α ) = κ , which means that these MU GETFs are indeed equidistant. □
The class of homogeneous conical 2-designs is recovered for R α , k that are of equal trace. Then,
w α = w = d κ d 2 + N 1 , x α = x = w 2 d + M α 1 M α κ , y α = y = w 2 d κ M α , z α β = z = w 2 d .
One immediately notes that the constant coefficients x, y, z can be organized into an increasing sequence: y < z < x .
At last, we combine the results of Propositions 5 and 8 to formulate our next main result.
Theorem 3.
Consider N GETFs R α = { R α , k ; k = 1 , , M α } such that R = α = 1 N R α spans the operator space B ( H ) and | R | = d 2 + N 1 . Then, R is a conical 2-design if and only if it is a set of equidistant mutually unbiased generalized equiangular tight frames.
In particular, if Γ α = 1 N γ α = α = 1 N w α M α / d = 1 , then Theorem 3 establishes a one-to-one correspondence between a class of conical 2-designs and equidistant generalized equiangular measurements (GEAMs) [33]. If instead the N GETFs R α are POVMs, then one recovers equidistant generalized symmetric measurements [32], which are simply equidistant MU GETFs with all γ α = 1 .
Theorem 4.
Consider N ( 1 , M α ) -POVMs P α = { P α , k ; k = 1 , , M α } such that P = α = 1 N P α spans the operator space B ( H ) and | P | = d 2 + N 1 . Then, P is a conical 2-design if and only if it is an equidistant generalized symmetric measurement.
The known special cases include ( N , M ) -POVMs ( M α = M ) [31] and MUMs ( M α = d , N = d + 1 ) [49].

7. Conclusions

In this paper, we have analyzed two important classes of conical 2-designs and their relations to other known constructions: equiangular tight frames of arbitrary rank (GETFs) and their mutually unbiased collections (MU GETFs). First, we consider an informationally complete set of semi-positive operators R = { R k ; k = 1 , , M } . Assuming that all R k are linearly independent, we find the most general trace relations between the elements of R . As a special class, we consider homogeneous conical 2-designs and analyze their properties. Then, we provide the necessary and sufficient conditions for a set of linearly independent operators to be a homogeneous conical 2-design. We also give an example of d 2 linearly independent operators that form an inhomogeneous conical 2-design, thus proving that this set is non-empty. A one-to-one correspondence is also given for conical 2-designs constructed from POVMs. Analogical results are then obtained for an informationally overcomplete set R = { R α , k ; α = 1 , , N ; k = 1 , , M α } , where partial sums k = 1 M α Tr ( R α , k ) R α , k are linearly proportional to the identity operator I d . Then, an equivalence relation is established between equidistant MU GETFs and a class of conical 2-designs that go beyond homogeneous designs. Finally, it turns out that generalized equiangular measurements are the most general conical 2-designs constructed from symmetric measurements.
In further research, it would be interesting to present a full analysis of conical 2-designs. In particular, one could provide general construction methods and more examples of inhomogeneous designs. Another open problem is to generalize the results of refs. [38,39] to wider classes of conical designs. This would help to establish whether the following properties extend to all conical 2-designs: (i) a linear relation between the index of coincidence and the purity of a mixed state, (ii) the existence of a family of measures that depend only on κ ± , and (iii) the sum of squared elements being proportional to the identity operator.
Projective 2-designs and their generalizations find wide applications in many subfields of quantum information. In the foundations of quantum theory, they are used to define uncertainty relations in terms of entropies [56,58,59,60,61]. Nowadays, entropic uncertainty relations are used in most quantum cryptographic protocols, including quantum key distribution and two-party quantum cryptography [62,63,64]. In quantum entanglement, projective and conical 2-designs play an important role in the detection and quantification of entangled states via entanglement witnesses [8,65,66,67,68,69] and criteria based on the correlation matrix [7,70,71,72]. Entanglement is a precious quantum resource for the purposes of quantum communication and information processing, quantum computation, and other modern technologies [73,74]. Its strength lies in ensuring better performance in many quantum tasks, like teleportation [75] and channel discrimination [76]. Another important problem is the reconstruction of a quantum state from a finite number of measurements, which in turn allows for observable estimation. This is known as state tomography and is often performed using SIC POVMs or mutually unbiased bases [77,78,79,80,81,82,83,84]. Hence, if special classes of conical 2-designs find relevance in the aforementioned fields, one could assume that this applicational prowess could straightforwardly extend to the entire family of conical 2-designs.

Funding

This research was funded in whole or in part by the National Science Centre, Poland, Grant number 2021/43/D/ST2/00102. For the purpose of Open Access, the author has applied a CC-BY public copyright licence to any Author Accepted Manuscript (AAM) version arising from this submission.

Data Availability Statement

The original contributions presented in this study are included in the article. For further inquiries, please contact the corresponding author. All authors have read and agreed to the published version of the manuscript. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Conflicts of Interest

The author declares no conflicts of interest.

Appendix A. Notation Clarification

Appendix A.1. Section 4: Conical 2-Designs vs. Generalized Equiangular Tight Frames

Table A1. Conical 2-design parameters.
Table A1. Conical 2-design parameters.
SymbolDescription
R Conical 2-design
R k Operators in R
MNumber of operators in R
w k Trace of R k
x k Trace of R k 2
y k Trace of R k R for k
Table A2. GETF parameters.
Table A2. GETF parameters.
SymbolDescription
P GETF
P k Operators in P
MNumber of operators in P
aTrace of P k
bTrace of P k 2 / a 2
cTrace of P k P / a 2 for k

Appendix A.2. Section 6: Conical 2-Designs vs. Mutually Unbiased GETFs

Table A3. Conical 2-design parameters.
Table A3. Conical 2-design parameters.
SymbolDescription
R Conical 2-design
R α Subset of R
R α , k Operators in R α
NNumber of subsets R α
M α Number of operators in R α
κ α Positive number such that k = 1 M α R α , k Tr ( R α , k ) = κ α I d
κ Constant equal to α = 1 N κ α
w α , k Trace of R α , k
x α , k Trace of R α , k 2
y α , k , Trace of R α , k R α , for k
z α , k ; β , Trace of R α , k R β , for α β
Table A4. MU GETF parameters.
Table A4. MU GETF parameters.
SymbolDescription
P MU GETFs
P α GETF from P
P α , k Operators in P α
NNumber of subsets P α
M α Number of operators in P α
γ α Positive number such that k = 1 M α P α , k = γ α I d
Γ Constant equal to α = 1 N γ α
a α Trace of P α , k
b α Trace of P α , k 2 / a α 2
c α Trace of P α , k R α , / a α 2 for k
fTrace of P α , k P β , / ( a α a β ) for α β
S α Frobenius distance equal to a α 2 ( b α c α )

Appendix B. Properties of Generalized Equiangular Tight Frames

To derive the values of a and c, we use the fact that the elements of a GETF sum up to γ I d . This way, we obtain
d γ = Tr ( γ I d ) = k = 1 M Tr ( P k ) = M a
and
a γ = γ Tr ( P k ) = Tr ( P k γ I d ) = Tr ( P k 2 ) + k Tr ( P k P ) = a 2 b + ( M 1 ) a 2 c ,
from which Equation (8) immediately follows.
The lower bound on b in Equation (9) is calculated from the Cauchy–Schwarz inequality. It states that [ Tr ( A B ) ] 2 Tr ( A 2 ) Tr ( B 2 ) for any Hermitian operators A and B, where the equality holds for A = B . In our case,
a 2 = [ Tr ( P k I d ) ] 2 Tr ( P k 2 ) Tr ( I d 2 ) = d a 2 b .
We exclude the equality in Equation (A3) because then all P k are linearly proportional to I d . The upper bound follows from Tr ( P k 2 ) [ Tr ( P k ) ] 2 and Tr ( P k P ) 0 , which are equivalent to b 1 and c 0 , respectively.
Now, take M real numbers r k , k = 1 , , M . If
k = 1 M r k P k = 0
implies that all r k = 0 , then P k are linearly independent operators. By taking the trace of Equation (A4), we find that
Tr k = 1 M r k P k = a k = 1 M r k = 0 .
If we first multiply both sides of Equation (A4) by P and then calculate the trace, we obtain
Tr k = 1 M r k P k P = a 2 b r + a 2 c k r k = a 2 ( b c ) r + c k = 1 M r k = 0 .
Therefore, due to a > 0 and b c , we finally have r = 0 .

Appendix C. Linearly Independent Subset of Mutually Unbiased GETFs

From definition, a set of MU GETFs cannot consist of linearly independent operators because of the constraints k = 1 M α P α , k = γ α I d for every GETF P α . However, if we take M α 1 operators from each GETF, then they can be linearly independent from each other and the identity operator I d , provided that some additional conditions are met. There can be at most d 2 linearly independent operators on C d , and hence the number of all P α , k is bounded by | P | = α = 1 N M α d 2 1 + N . Moreover, it is assumed that P α , k γ α I d , so that the number of GETF elements is M α 2 .
Now, let us define
P = r 0 I d + α = 1 N k = 1 M α 1 r α , k P α , k .
From basic algebra, we know that if P = 0 implies r 0 = r α , k = 0 , then the elements of { I d , P α , k ; k = 1 , , M α 1 ; α = 1 , , N } are linearly independent. Assuming that P = 0 , we calculate
Tr ( P ) = d r 0 + α = 1 N a α k = 1 M α 1 r α , k = 0 ,
and also, for any P α , k with k = 1 , , M α 1 ,
Tr ( P P α , k ) = a α r 0 + a α 2 ( b α c α ) r α , k + a α 2 ( c α f ) = 1 M α 1 r α , + a α f β = 1 N a β = 1 M β 1 r β , = a α 2 ( b α c α ) r α , k 1 M α = 1 M α 1 r α , = 0 ,
where we made use of Equation (A8) and the fact that
c α f = b α c α M α .
Next, if one takes the sum over all k = 1 , , M α 1 in Equation (A9), it results in
k = 1 M α 1 Tr ( P P α , k ) = a α 2 ( b α c α ) M α k = 1 M α 1 r α , k = 0 ,
and therefore k = 1 M α 1 r α , k = 0 . Substituting this into Equations (A8) and (A9) gives r 0 = 0 and r α , k = 0 , respectively.

Appendix D. Admissible Range of S

Using the formulas for a α and c α from Equation (44), we calculate
S α = a α 2 ( b α c α ) = d γ α 2 M α d b α 1 M α 1 .
Now, through performing linear operations on Equation (45) that do not change the inequality sign, it is straightforward to show that
0 < S α γ α 2 min d ( d 1 ) M α ( M α 1 ) , d M α .
The range for S α S is recovered when one takes the minimization of the right hand-side of this inequality over all α .

Appendix E. Trace Parameters for Conical 2-Designs in Proposition 6

From Equation (83), we know that, for all k and α ,
F ( α , k ) ( x α , k κ ) R α , k + k y α , k , R α , + β α = 1 M β z α , k ; β , R β , w α , k κ + I d = 0 .
To solve this equation, we need to rewrite it using only d 2 linearly independent operators. Recall that the operators R α , M α are linearly dependent on I d and R α , k , k = 1 , , M α 1 , through Equation (74). Hence,
R α , M α = 1 w α , M α κ α I d k = 1 M α 1 w α , k R α , k .
Applying Equation (A15) into Equation (A14) results in two formulas: for all k = 1 , , M α 1 ,
F ( α , k ) = I d w α , k κ + + y α , k , M α κ α w α , M α + β α z α , k ; β , M β κ β w β , M β + R α , k x α , k κ y α , k , M α w α , k w α , M α + k , M α R α , y α , k , y α , k , M α w α , w α , M α + β α = 1 M β 1 z α , k ; β , z α , k ; β , M β w β , w β , M β ,
and, for k = M α ,
F ( α , M α ) = I d w α , M α κ + + ( x α , M α κ ) κ α w α , M α + β α z α , M α ; β , M β κ β w β , M β + = 1 M α 1 R α , y α , M α , ( x α , M α κ ) w α , w α , M α + β α = 1 M β 1 z α , M α ; β , z α , M α ; β , M β w β , w β , M β .
Now, the solution of F ( α , k ) = 0 for all k = 1 , , M α and α = 1 , , N is equivalent to all the real coefficients that multiply each operators vanishing. In other words,
z α , k ; β , = z α , k ; β , M β w β , w β , M β ,
w α , k κ + = y α , k , M α κ α w α , M α + β α z α , k ; β , M β κ β w β , M β ,
y α , k , M α = ( x α , k κ ) w α , M α w α , k ,
y α , k , j = y α , k , M α w α , j w α , M α ,
and
z α , M α ; β , = z α , M α ; β , M β w β , w β , M β ,
w α , M α κ + = ( x α , M α κ ) κ α w α , M α + β α z α , M α ; β , M β κ β w β , M β ,
y α , M α , j = ( x α , M α κ ) w α , j w α , M α ,
where k , j = 1 , , M α 1 , = 1 , , M β 1 , and β α . Now, Equations (A18) and (A22), together with Equation (76), give
α , k , β α ,   z α , k ; β , = 1 d w α , k w β , .
Next, if we input this result and Equation (A24) into Equations (A19) and (A23), we recover
α , j < M α   y α , j , M α = κ α κ d κ α w α , j w α , M α .
Combining the above formula with Equation (A21) returns the general relation
α , k , j k   y α , k , j = κ α κ d κ α w α , k w α , j .
Finally, substituting the results for y α , k , j into Equations (A20) and (A24), one arrives at
α , k   x α , k = κ + κ α κ d κ α w α , k 2 .

Appendix F. Consequences of Semi-Positivity of R α,k

Conical 2-designs are constructed from semi-positive (non-zero) operators R α , k , and hence Tr ( R α , k ) = w α , k > 0 as well as
Tr ( R α , k R α , ) = y α , k , = κ α κ d κ α w α , k w α , j 0 ,   k ,
Tr ( R α , k R β , ) = z α , k ; β , = 1 d w α , k w β , 0 ,   β α .
Note that Equation (A30) immediately holds for w α , k > 0 , whereas Equation (A29) is satisfied under the additional condition that κ α κ . The admissible range for
Tr ( R α , k 2 ) = x α , k = κ + κ α κ d κ α w α , k 2
is determined by
Tr ( R α , k 2 ) [ Tr ( R α , k ) ] 2     x α , k w α , k 2
and the Cauchy–Schwarz inequality
w α , k 2 = [ Tr ( R α , k I d ) ] 2 Tr ( R α , k 2 ) Tr ( I d 2 ) = d x α , k .
Equation (A32) simplifies to
w α , k 2 d κ κ α ( d 1 ) κ α + κ ,
and from Equation (A33) we obtain
w α , k 2 < d κ α ,
where the equality is excluded because it holds only for R α , k = w α , k I d / d .

References

  1. Zhou, P. Joint remote preparation of an arbitrary m-qudit state with a pure entangled quantum channel via positive operator-valued measurement. J. Phys. A Math. Theor. 2012, 45, 215305. [Google Scholar] [CrossRef]
  2. Song, J.F.; Wang, Z.Y. Controlled Remote Preparation of a Two-Qubit State via Positive Operator-Valued Measure and Two Three-Qubit Entanglements. Int. J. Theor. Phys. 2011, 50, 2410. [Google Scholar] [CrossRef]
  3. Bouchard, F.; Heshami, K.; England, D.; Fickler, R.; Boyd, R.W.; Englert, B.G.; Sánchez-Soto, L.L.; Karimi, E. Experimental investigation of high-dimensional quantum key distribution protocols with twisted photons. Quantum 2018, 2, 111. [Google Scholar] [CrossRef]
  4. Zhu, H. Quantum state estimation with informationally overcomplete measurements. Phys. Rev. A 2014, 90, 012115. [Google Scholar] [CrossRef]
  5. Adamson, R.B.A.; Steinberg, A.M. Improving Quantum State Estimation with Mutually Unbiased Bases. Phys. Rev. Lett. 2010, 105, 030406. [Google Scholar] [CrossRef] [PubMed]
  6. Zhu, H. Quantum Measurements in the Light of Quantum State Estimation. PRX Quantum 2022, 3, 030306. [Google Scholar] [CrossRef]
  7. Shang, J.; Asadian, A.; Zhu, H.; Gühne, O. Enhanced entanglement criterion via symmetric informationally complete measurements. Phys. Rev. A 2018, 98, 022309. [Google Scholar] [CrossRef]
  8. Li, T.; Lai, L.M.; Liang, D.F.; Fei, S.M.; Wang, Z.X. Entanglement Witnesses Based on Symmetric Informationally Complete Measurements. Int. J. Theor. Phys. 2020, 59, 3549–3557. [Google Scholar] [CrossRef]
  9. Kalev, A.; Bae, J. Optimal approximate transpose map via quantum designs and its applications to entanglement detection. Phys. Rev. A 2013, 87, 062314. [Google Scholar] [CrossRef]
  10. Blume-Kohout, R.; Yin, J.O.S.; van Enk, S.J. Entanglement Verification with Finite Data. Phys. Rev. Lett. 2010, 105, 170501. [Google Scholar] [CrossRef] [PubMed]
  11. Li, J.; Yao, H.; Fei, S.M.; Fan, Z.; Ma, H. Quantum entanglement estimation via symmetric-measurement-based positive maps. Phys. Rev. A 2024, 109, 052426. [Google Scholar] [CrossRef]
  12. Lai, L.M.; Li, T.; Fei, S.M.; Wang, Z.X. Detecting EPR steering via two classes of local measurements. Quant. Inf. Proc. 2020, 19, 93. [Google Scholar] [CrossRef]
  13. Tavakoli, A.; Farkas, M.; Rosset, D.; Bancal, J.D.; Kaniewski, J. Mutually unbiased bases and symmetric informationally complete measurements in Bell experiments. Sci. Adv. 2021, 7, eabc3847. [Google Scholar] [CrossRef] [PubMed]
  14. Vértesi, T.; Bene, E. Two-qubit Bell inequality for which positive operator-valued measurements are relevant. Phys. Rev. A 2010, 82, 062115. [Google Scholar] [CrossRef]
  15. Prugovečki, E. Information-theoretical aspects of quantum measurement. Int. J. Theor. Phys. 1977, 16, 321–331. [Google Scholar] [CrossRef]
  16. Petz, D.; Ruppert, L. Efficient Quantum Tomography Needs Complementary and Symmetric Measurements. Rep. Math. Phys. 2012, 69, 161. [Google Scholar] [CrossRef]
  17. Pimenta, W.M.; Marques, B.; Maciel, T.O.; Vianna, R.O.; Delgado, A.; Saavedra, C.; Pádua, S. Minimum tomography of two entangled qutrits using local measurements of one-qutrit symmetric informationally complete positive operator-valued measure. Phys. Rev. A 2013, 88, 012112. [Google Scholar] [CrossRef]
  18. Bent, N.; Qassim, H.; Tahir, A.A.; Sych, D.; Leuchs, G.; Sánchez-Soto, L.L.; Karimi, E.; Boyd, R.W. Experimental Realization of Quantum Tomography of Photonic Qudits via Symmetric Informationally Complete Positive Operator-Valued Measures. Phys. Rev. X 2015, 5, 041006. [Google Scholar] [CrossRef]
  19. Renes, J.M.; Blume-Kohout, R.; Scott, A.J.; Caves, C.M. Symmetric Informationally Complete Quantum Measurements. J. Math. Phys. 2004, 45, 2171. [Google Scholar] [CrossRef]
  20. Schwinger, J. Unitary Operator Bases. Proc. Nat. Acad. Sci. USA 1960, 46, 570. [Google Scholar] [CrossRef]
  21. Ruskai, M.B.; Szarek, S.; Werner, E. An analysis of completely-positive trace-preserving maps on M2. Linear Algebra Appl. 2002, 347, 159–187. [Google Scholar] [CrossRef]
  22. Neumaier, A. Combinatorial Configurations in Terms of Distances; Eindhoven University of Technology: Dept of Mathematics: Memorandum; Technische Hogeschool Eindhoven: Eindhoven, The Netherlands, 1981; p. 8109. [Google Scholar]
  23. Hoggar, S. t-Designs in Projective Spaces. Eur. J. Comb. 1982, 3, 233–254. [Google Scholar] [CrossRef]
  24. Zauner, G. Quantum Designs Foundations of a Non-Commutative Design Theory. Ph.D. Thesis, University of Vienna, Vienna, Austria, 1999. [Google Scholar]
  25. Scott, A.J. Tight informationally complete quantum measurements. J. Phys. A Math. Gen. 2006, 39, 13507. [Google Scholar] [CrossRef]
  26. Geng, I.J.; Golubeva, K.; Gour, G. What are the minimal conditions required to define a SIC POVM? Phys. Rev. Lett. 2021, 126, 100401. [Google Scholar] [CrossRef]
  27. Feng, L.; Luo, S. Equioverlapping measurements. Phys. Lett. A 2022, 445, 128243. [Google Scholar] [CrossRef]
  28. Feng, L.; Luo, S.; Zhao, Y.; Guo, Z. Equioverlapping measurements as extensions of symmetric informationally complete positive operator valued measures. Phys. Rev. A 2024, 109, 012218. [Google Scholar] [CrossRef]
  29. Zhao, Y.; Guo, Z.; Feng, L.; Luo, S.; Lee, T.L. Equioverlapping measurements in qutrit systems. Phys. Lett. A 2024, 495, 129314. [Google Scholar] [CrossRef]
  30. Guo, Z.; Liu, Y.; Lee, T.L.; Luo, S. Construction and classification of all equioverlapping measurements in qubit and qutrit systems. Phys. Rev. A 2025, 111, 012430. [Google Scholar] [CrossRef]
  31. Siudzińska, K. All classes of informationally complete symmetric measurements in finite dimensions. Phys. Rev. A 2022, 105, 042209. [Google Scholar] [CrossRef]
  32. Siudzińska, K. How much symmetry do symmetric measurements need for efficient operational applications? J. Phys. A Math. Theor. 2024, 57, 355301. [Google Scholar] [CrossRef]
  33. Siudzińska, K. Informationally overcomplete measurements from generalized equiangular tight frames. J. Phys. A Math. Theor. 2024, 57, 335302. [Google Scholar] [CrossRef]
  34. Huang, F.; Wu, F.; Tang, L.; Mo, Z.W.; Bai, M.Q. Characterizing the uncertainty relation via a class of measurements. Phys. Scr. 2023, 98, 105103. [Google Scholar] [CrossRef]
  35. Graydon, M.A.; Appleby, D.M. Quantum Conical Designs. J. Phys. A Math. Theor. 2016, 49, 085301. [Google Scholar] [CrossRef]
  36. Graydon, M.A.; Appleby, D.M. Entanglement and Designs. J. Phys. A Math. Theor. 2016, 49, 33LT02. [Google Scholar] [CrossRef]
  37. Graydon, M.A. Conical Designs and Categorical Jordan Algebraic Post-Quantum Theories. Ph.D. Thesis, University of Waterloo, Waterloo, ON, Canada, 2017. [Google Scholar]
  38. Siudzińska, K. Entanglement witnesses and separability criteria based on generalized equiangular tight frames. Sci. Rep. 2025, 15, 29890. [Google Scholar] [CrossRef]
  39. Siudzińska, K. Measures from conical 2-designs depend only on two constants. J. Phys. A Math. Theor. 2025, 58, 375302. [Google Scholar] [CrossRef]
  40. Klappenecker, A.; Rötteler, M. Mutually Unbiased Bases are Complex Projective 2-Designs. In Proceedings of the Proceedings 2005 IEEE International Symposium on Information Theory (ISIT 2005), Adelaide, Australia, 4–9 September 2005; pp. 1740–1744. [Google Scholar]
  41. Czartowski, J.; Goyeneche, D.; Grassl, M.; Życzkowski, K. Iso-entangled mutually unbiased bases, symmetric quantum measurements and mixed-state designs. Phys. Rev. Lett. 2020, 124, 090503. [Google Scholar] [CrossRef]
  42. Choi, M.D. Completely Positive Linear Maps on Complex Matrices. Linear Algebra Appl. 1975, 10, 285–290. [Google Scholar] [CrossRef]
  43. Jamiołkowski, A. Linear transformations which preserve trace and positive semidefiniteness of operators. Rep. Math. Phys. 1972, 3, 275–278. [Google Scholar] [CrossRef]
  44. Levenshtein, V. On designs in compact metric spaces and a universal bound on their size. Discrete Math. 1998, 192, 251–271. [Google Scholar] [CrossRef]
  45. Roy, A.; Scott, A.J. Weighted complex projective 2-designs from bases: Optimal state determination by orthogonal measurements. J. Math. Phys. 2007, 48, 072110. [Google Scholar] [CrossRef]
  46. McConnell, G.; Gross, D. Efficient 2-designs from bases exist. Quantum Inf. Comput. 2008, 8, 734. [Google Scholar] [CrossRef]
  47. Kalev, A.; Gour, G. Construction of all general symmetric informationally complete measurements. J. Phys. A Math. Theor. 2014, 47, 335302. [Google Scholar]
  48. Yoshida, M.; Kimura, G. Construction of general symmetric-informationally-complete-positive-operator-valued measures by using a complete orthogonal basis. Phys. Rev. A 2022, 106, 022408. [Google Scholar] [CrossRef]
  49. Kalev, A.; Gour, G. Mutually unbiased measurements in finite dimensions. New J. Phys. 2014, 16, 053038. [Google Scholar] [CrossRef]
  50. Wang, K.; Wu, N.; Song, F. Uncertainty Relations in the Presence of Quantum Memory for Mutually Unbiased Measurements. Phys. Rev. A 2018, 98, 032329. [Google Scholar] [CrossRef]
  51. Strohmer, T.; Heath, R. Grassmannian Frames with Applications to Coding and Communication. Appl. Comput. Harmon. Anal. 2003, 14, 257–275. [Google Scholar] [CrossRef]
  52. Strohmer, T. A note on equiangular tight frames. Linear Algebra Appl. 2008, 429, 326. [Google Scholar] [CrossRef]
  53. Lemmens, P.W.H.; Seidel, J.J. Equiangular lines. J. Algebra 1973, 24, 494. [Google Scholar] [CrossRef]
  54. Fickus, M.; Mayo, B.R. Mutually Unbiased Equiangular Tight Frames. arXiv 2020, arXiv:2001.02055. [Google Scholar] [CrossRef]
  55. Perez, F.C.; Avella, V.G.; Goyeneche, D. Mutually unbiased frames. Quantum 2022, 6, 851. [Google Scholar] [CrossRef]
  56. Rastegin, A.E. Uncertainty relations for MUBs and SIC-POVMs in terms of generalized entropies. Eur. Phys. J. D 2013, 67, 269. [Google Scholar] [CrossRef]
  57. Knöll, L.; Orłowski, A. Distance between density operators: Applications to the Jaynes-Cummings model. Phys. Rev. A 1995, 51, 1622. [Google Scholar] [CrossRef]
  58. Ivanović, I.D. Geometrical description of quantal state determination. J. Phys. A Math. Gen. 1992, 25, L363. [Google Scholar]
  59. Sánchez, J. Entropic uncertainty and certainty relations for complementary observables. Phys. Lett. A 1993, 173, 233–239. [Google Scholar] [CrossRef]
  60. Chen, B.; Fei, S.M. Uncertainty relations based on mutually unbiased measurements. Quant. Inf. Proc. 2015, 14, 2227–2238. [Google Scholar] [CrossRef]
  61. Rastegin, A.E. Notes on general SIC-POVMs. Phys. Scr. 2014, 89, 085101. [Google Scholar] [CrossRef]
  62. Coles, P.J.; Berta, M.; Tomamichel, M.; Wehner, S. Entropic Uncertainty Relations and their Applications. Rev. Mod. Phys. 2017, 89, 015002. [Google Scholar] [CrossRef]
  63. Koashi, M. Simple security proof of quantum key distribution via uncertainty principle. New J. Phys. 2009, 11, 045018. [Google Scholar] [CrossRef]
  64. Wehner, S.; Winter, A. Entropic uncertainty relations - A survey. New J. Phys. 2010, 12, 025009. [Google Scholar] [CrossRef]
  65. Chruściński, D.; Sarbicki, G.; Wudarski, F.A. Entanglement witnesses from mutually unbiased bases. Phys. Rev. A 2018, 97, 032318. [Google Scholar] [CrossRef]
  66. Bae, J.; Bera, A.; Chruściński, D.; Hiesmayr, B.C.; McNulty, D. How many measurements are needed to detect bound entangled states? J. Phys. A Math. Theor. 2022, 55, 505303. [Google Scholar] [CrossRef]
  67. Li, T.; Lai, L.M.; Fei, S.M.; Wang, Z.X. Mutually Unbiased Measurement Based Entanglement Witnesses. Int. J. Theor. Phys. 2019, 58, 3973–3985. [Google Scholar] [CrossRef]
  68. Salehi, M.; Akhtarshenas, S.J.; Sarbishaei, M.; Jaghouri, H. Mutually unbiased measurements with arbitrary purity. Quantum Inf. Process. 2021, 20, 401. [Google Scholar] [CrossRef]
  69. Wang, K.; Zheng, Z.J. Constructing Entanglement Witnesses from Two Mutually Unbiased Bases. Int. J. Theor. Phys. 2021, 60, 274–283. [Google Scholar] [CrossRef]
  70. Spengler, C.; Huber, M.; Brierley, S.; Adaktylos, T.; Hiesmayr, B.C. Entanglement detection via mutually unbiased bases. Phys. Rev. A 2012, 86, 022311. [Google Scholar] [CrossRef]
  71. Chen, B.; Ma, T.; Fei, S.M. Entanglement detection using mutually unbiased measurements. Phys. Rev. A 2014, 89, 064302. [Google Scholar] [CrossRef]
  72. Chen, B.; Li, T.; Fei, S.M. General SIC-Measurement Based Entanglement Detection. Quant. Inf. Proc. 2015, 14, 2281–2290. [Google Scholar] [CrossRef]
  73. Nielsen, M.A.; Chuang, I.L. Quantum Computation and Quantum Information; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  74. Horodecki, R.; Horodecki, P.; Horodecki, M.; Horodecki, K. Quantum entanglement. Rev. Mod. Phys. 2009, 81, 865. [Google Scholar] [CrossRef]
  75. Masanes, L. All Bipartite Entangled States Are Useful for Information Processing. Phys. Rev. Lett. 2006, 96, 150501. [Google Scholar] [CrossRef]
  76. Bae, J.; Chruściński, D.; Piani, M. More Entanglement Implies Higher Performance in Channel Discrimination Tasks. Phys. Rev. Lett. 2019, 122, 140404. [Google Scholar] [CrossRef] [PubMed]
  77. Zhu, H.; Englert, B.G. Quantum state tomography with fully symmetric measurements and product measurements. Phys. Rev. A 2011, 84, 022327. [Google Scholar] [CrossRef]
  78. Yuan, H.; Shi, X.; Han, L.F. Qutrit state tomography via optimal unambiguous state discrimination and mutually unbiased measurements. Res. Phys. 2022, 34, 105228. [Google Scholar] [CrossRef]
  79. Diaz-Guevara, J.; Sainz, I.; Klimov, A.B. MUB-like structures and tomographic reconstruction for N-ququart systems. J. Phys. A Math. Theor. 2021, 54, 295305. [Google Scholar] [CrossRef]
  80. Sainz, I.; Garcia, A.; Klimov, A.B. MUB tomography performance under influence of systematic errors. Phys. Lett. A 2018, 382, 66–71. [Google Scholar] [CrossRef]
  81. Bae, J.; Hiesmayr, B.C.; McNulty, D. Linking Entanglement Detection and State Tomography via Quantum 2-Designs. New J. Phys. 2019, 21, 013012. [Google Scholar] [CrossRef]
  82. Fernández-Pérez, A.; Klimov, A.B.; Saavedra, C. Quantum process reconstruction based on mutually unbiased basis. Phys. Rev. A 2011, 83, 052332. [Google Scholar] [CrossRef]
  83. Filippov, S.N.; Man’ko, V.I. Mutually unbiased bases: Tomography of spin states and the star-product scheme. Phys. Scr. 2011, 2011, 014010. [Google Scholar] [CrossRef]
  84. Lima, G.; Neves, L.; Guzmán, R.; Gómez, E.S.; Nogueira, W.A.T.; Delgado, A.; Vargas, A.; Saavedra, C. Experimental quantum tomography of photonic qudits via mutually unbiased basis. Opt. Express 2011, 19, 3542–3552. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Siudzińska, K. Equivalence Relations Between Conical 2-Designs and Mutually Unbiased Generalized Equiangular Tight Frames. Mathematics 2026, 14, 128. https://doi.org/10.3390/math14010128

AMA Style

Siudzińska K. Equivalence Relations Between Conical 2-Designs and Mutually Unbiased Generalized Equiangular Tight Frames. Mathematics. 2026; 14(1):128. https://doi.org/10.3390/math14010128

Chicago/Turabian Style

Siudzińska, Katarzyna. 2026. "Equivalence Relations Between Conical 2-Designs and Mutually Unbiased Generalized Equiangular Tight Frames" Mathematics 14, no. 1: 128. https://doi.org/10.3390/math14010128

APA Style

Siudzińska, K. (2026). Equivalence Relations Between Conical 2-Designs and Mutually Unbiased Generalized Equiangular Tight Frames. Mathematics, 14(1), 128. https://doi.org/10.3390/math14010128

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop