-
Characterization of $n$-Dimensional Toric and Burst-Error-Correcting Quantum Codes from Lattice Codes
Authors:
Cibele Cristina Trinca,
Reginaldo Palazzo Jr.,
J. Carmelo Interlando,
Ricardo Augusto Watanabe,
Clarice Dias de Albuquerque,
Edson Donizete de Carvalho,
Antonio Aparecido de Andrade
Abstract:
Quantum error correction is essential for the development of any scalable quantum computer. In this work we introduce a generalization of a quantum interleaving method for combating clusters of errors in toric quantum error-correcting codes. We present new $n$-dimensional toric quantum codes, where $n\geq 5$, which are featured by lattice codes and apply the proposed quantum interleaving method to…
▽ More
Quantum error correction is essential for the development of any scalable quantum computer. In this work we introduce a generalization of a quantum interleaving method for combating clusters of errors in toric quantum error-correcting codes. We present new $n$-dimensional toric quantum codes, where $n\geq 5$, which are featured by lattice codes and apply the proposed quantum interleaving method to such new $n$-dimensional toric quantum codes. Through the application of this method to these novel $n$-dimensional toric quantum codes we derive new $n$-dimensional quantum burst-error-correcting codes. Consequently, $n$-dimensional toric quantum codes and burst-error-correcting quantum codes are provided offering both a good code rate and a significant coding gain when it comes to toric quantum codes. Another important consequence from the presented $n$-dimensional toric quantum codes is that if the Golomb and Welch conjecture in \cite{perfcodes} regarding the Lee sphere in $n$ dimensions for the respective close packings holds true, then it follows that these $n$-dimensional toric quantum codes are the only possible ones to be obtained from lattice codes. Moreover, such a methodology can be applied for burst error correction in cases involving localized errors, quantum data storage and quantum channels with memory.
△ Less
Submitted 26 October, 2024;
originally announced October 2024.
-
New Three and Four-Dimensional Toric and Burst-Error-Correcting Quantum Codes
Authors:
Cibele Cristina Trinca,
Reginaldo Palazzo Jr.,
Ricardo Augusto Watanabe,
Clarice Dias de Albuquerque,
José Carmelo Interlando,
Antônio Aparecido de Andrade
Abstract:
Ongoing research and experiments have enabled quantum memory to realize the storage of qubits. On the other hand, interleaving techniques are used to deal with burst of errors. Effective interleaving techniques for combating burst of errors by using classical error-correcting codes have been proposed in several articles found in the literature, however, to the best of our knowledge, little is know…
▽ More
Ongoing research and experiments have enabled quantum memory to realize the storage of qubits. On the other hand, interleaving techniques are used to deal with burst of errors. Effective interleaving techniques for combating burst of errors by using classical error-correcting codes have been proposed in several articles found in the literature, however, to the best of our knowledge, little is known regarding interleaving techniques for combating clusters of errors in topological quantum error-correcting codes. Motivated by that, in this work, we present new three and four-dimensional toric quantum codes which are featured by lattice codes and apply a quantum interleaving method to such new three and four-dimensional toric quantum codes. By applying such a method to these new codes we provide new three and four-dimensional quantum burst-error-correcting codes. As a consequence, new three and four-dimensional toric and burst-error-correcting quantum codes are obtained which have better information rates than those three and four-dimensional toric quantum codes from the literature. In addition to these proposed three and four-dimensional quantum burst-error-correcting codes improve such information rates, they can be used for burst-error-correction in errors which are located, quantum data stored and quantum channels with memory.
△ Less
Submitted 12 July, 2023;
originally announced July 2023.
-
On the Construction of New Toric Quantum Codes and Quantum Burst-Error Correcting Codes
Authors:
Cibele Cristina Trinca,
J. Carmelo Interlando,
Reginaldo Palazzo Jr.,
Antonio Aparecido de Andrade,
Ricardo Augusto Watanabe
Abstract:
A toric quantum error-correcting code construction procedure is presented in this work. A new class of an infinite family of toric quantum codes is provided by constructing a classical cyclic code on the square lattice $\mathbb{Z}_{q}\times \mathbb{Z}_{q}$ for all odd integers $q\geq 5$ and, consequently, new toric quantum codes are constructed on such square lattices regardless of whether $q$ can…
▽ More
A toric quantum error-correcting code construction procedure is presented in this work. A new class of an infinite family of toric quantum codes is provided by constructing a classical cyclic code on the square lattice $\mathbb{Z}_{q}\times \mathbb{Z}_{q}$ for all odd integers $q\geq 5$ and, consequently, new toric quantum codes are constructed on such square lattices regardless of whether $q$ can be represented as a sum of two squares. Furthermore this work supplies for each $q$ the polyomino shapes that tessellate the corresponding square lattices and, consequently, tile the lattice $\mathbb{Z}^{2}$. The channel without memory to be considered for these constructed toric quantum codes is symmetric, since the $\mathbb{Z}^{2}$-lattice is autodual. Moreover, we propose a quantum interleaving technique by using the constructed toric quantum codes which shows that the code rate and the coding gain of the interleaved toric quantum codes are better than the code rate and the coding gain of Kitaev's toric quantum codes for $q=2n+1$, where $n\geq 2$, and of an infinite class of Bombin and Martin-Delgado's toric quantum codes. In addition to the proposed quantum interleaving technique improves such parameters, it can be used for burst-error correction in errors which are located, quantum data stored and quantum channels with memory.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
Well-Rounded Lattices via Polynomials
Authors:
Carina Alves,
William Lima da Silva Pinto,
Antonio Aparecido de Andrade
Abstract:
Well-rounded lattices have been a topic of recent studies with applications in wiretap channels and in cryptography. A lattice of full rank in Euclidean space is called well-rounded if its set of minimal vectors spans the whole space. In this paper, we investigate when lattices coming from polynomials with integer coefficients are well-rounded.
Well-rounded lattices have been a topic of recent studies with applications in wiretap channels and in cryptography. A lattice of full rank in Euclidean space is called well-rounded if its set of minimal vectors spans the whole space. In this paper, we investigate when lattices coming from polynomials with integer coefficients are well-rounded.
△ Less
Submitted 6 April, 2019;
originally announced April 2019.
-
Bandwidth reduction in cognitive radio
Authors:
Tariq Shah,
Sayed Azmat Hussain,
Antonio Aparecido de Andrade
Abstract:
Due to mushroom development of wireless devices cognitive radio is used to resolve the bandwidth utilization and sacristy problem. The crafty usage of bandwidth in cognitive radio based on error correcting codes is ensured to accomodate un authorized user. This study proposes a transmission model by which a finite sequence of binary cyclic codes constructed by a binary BCH code of length…
▽ More
Due to mushroom development of wireless devices cognitive radio is used to resolve the bandwidth utilization and sacristy problem. The crafty usage of bandwidth in cognitive radio based on error correcting codes is ensured to accomodate un authorized user. This study proposes a transmission model by which a finite sequence of binary cyclic codes constructed by a binary BCH code of length $n=2^{s}-1$, in which all codes have same error correction capability and code rate but sequentially increasing code lengths greater than $n$. Initially all these codes are carrying data of their corresponding primary users. A transmission pattern is planned in the sprit of interweave model deals the transmission parameters; modulation scheme, bandwidth and code rate. Whenever, any of the primary users having mod of transmission, the binary cyclic code, is not using its allocated bandwidth, the user having its data built by binary BCH code enter and exploit the free path as a secondary user. Eventually whenever the primary user with $W$ bandwidth having binary BCH code for its data transmission, change its status as a secondary user, it just requires the bandwidth less than $W$.
△ Less
Submitted 4 April, 2013;
originally announced April 2013.