- •Preface
- •Foreword
- •The Henri Poincaré Prize
- •Contributors
- •Contents
- •Stability of Doubly Warped Product Spacetimes
- •Introduction
- •Warped Product Spacetimes
- •Asymptotic Behavior
- •Fuchsian Method
- •Velocity Dominated Equations
- •Velocity Dominated Solution
- •Stability
- •References
- •Introduction
- •The Tomonaga Model with Infrared Cutoff
- •The RG Analysis
- •The Dyson Equation
- •The First Ward Identity
- •The Second Ward Identity
- •The Euclidean Thirring Model
- •References
- •Introduction
- •Lie and Hopf Algebras of Feynman Graphs
- •From Hochschild Cohomology to Physics
- •Dyson-Schwinger Equations
- •References
- •Introduction
- •Quantum Representation and Dynamical Equations
- •Quantum Singularity Problem
- •Examples for Properties of Solutions
- •Effective Theory
- •Summary
- •Introduction
- •Results and Strategy of Proofs
- •References
- •Introduction
- •Critical Scaling Limits and SLE
- •Percolation
- •The Critical Loop Process
- •General Features
- •Construction of a Single Loop
- •The Near-Critical Scaling Limit
- •References
- •Black Hole Entropy Function and Duality
- •Introduction
- •Entropy Function and Electric/Magnetic Duality Covariance
- •Duality Invariant OSV Integral
- •References
- •Weak Turbulence for Periodic NLS
- •Introduction
- •Arnold Diffusion for the Toy Model ODE
- •References
- •Angular Momentum-Mass Inequality for Axisymmetric Black Holes
- •Introduction
- •Variational Principle for the Mass
- •References
- •Introduction
- •The Trace Map
- •Introduction
- •Notations
- •Entanglement-Assisted Quantum Error-Correcting Codes
- •The Channel Model: Discretization of Errors
- •The Entanglement-Assisted Canonical Code
- •The General Case
- •Distance
- •Generalized F4 Construction
- •Bounds on Performance
- •Conclusions
- •References
- •Particle Decay in Ising Field Theory with Magnetic Field
- •Ising Field Theory
- •Evolution of the Mass Spectrum
- •Particle Decay off the Critical Isotherm
- •Unstable Particles in Finite Volume
- •References
- •Lattice Supersymmetry from the Ground Up
- •References
- •Stable Maps are Dense in Dimensional One
- •Introduction
- •Density of Hyperbolicity
- •Quasi-Conformal Rigidity
- •How to Prove Rigidity?
- •The Strategy of the Proof of QC-Rigidity
- •Enhanced Nest Construction
- •Small Distortion of Thin Annuli
- •Approximating Non-renormalizable Complex Polynomials
- •References
- •Large Gap Asymptotics for Random Matrices
- •References
- •Introduction
- •Coupled Oscillators
- •Closure Equations
- •Introduction
- •Conservative Stochastic Dynamics
- •Diffusive Evolution: Green-Kubo Formula
- •Kinetic Limits: Phonon Boltzmann Equation
- •References
- •Introduction
- •Bethe Ansatz for Classical Lie Algebras
- •The Pseudo-Differential Equations
- •Conclusions
- •References
- •Kinetically Constrained Models
- •References
- •Introduction
- •Local Limits for Exit Measures
- •References
- •Young Researchers Symposium Plenary Lectures
- •Dynamics of Quasiperiodic Cocycles and the Spectrum of the Almost Mathieu Operator
- •Magic in Superstring Amplitudes
- •XV International Congress on Mathematical Physics Plenary Lectures
- •The Riemann-Hilbert Problem: Applications
- •Trying to Characterize Robust and Generic Dynamics
- •Cauchy Problem in General Relativity
- •Survey of Recent Mathematical Progress in the Understanding of Critical 2d Systems
- •Random Methods in Quantum Information Theory
- •Gauge Fields, Strings and Integrable Systems
- •XV International Congress on Mathematical Physics Specialized Sessions
- •Condensed Matter Physics
- •Rigorous Construction of Luttinger Liquids Through Ward Identities
- •Edge and Bulk Currents in the Integer Quantum Hall Effect
- •Dynamical Systems
- •Statistical Stability for Hénon Maps of Benedics-Carleson Type
- •Entropy and the Localization of Eigenfunctions
- •Equilibrium Statistical Mechanics
- •Short-Range Spin Glasses in a Magnetic Field
- •Non-equilibrium Statistical Mechanics
- •Current Fluctuations in Boundary Driven Interacting Particle Systems
- •Fourier Law and Random Walks in Evolving Environments
- •Exactly Solvable Systems
- •Correlation Functions and Hidden Fermionic Structure of the XYZ Spin Chain
- •Particle Decay in Ising Field Theory with Magnetic Field
- •General Relativity
- •Einstein Spaces as Attractors for the Einstein Flow
- •Loop Quantum Cosmology
- •Operator Algebras
- •From Vertex Algebras to Local Nets of von Neuman Algebras
- •Non-Commutative Manifolds and Quantum Groups
- •Partial Differential Equations
- •Weak Turbulence for Periodic NSL
- •Ginzburg-Landau Dynamics
- •Probability Theory
- •From Planar Gaussian Zeros to Gravitational Allocation
- •Quantum Mechanics
- •Recent Progress in the Spectral Theory of Quasi-Periodic Operators
- •Recent Results on Localization for Random Schrödinger Operators
- •Quantum Field Theory
- •Algebraic Aspects of Perturbative and Non-Perturbative QFT
- •Quantum Field Theory in Curved Space-Time
- •Lattice Supersymmetry From the Ground Up
- •Analytical Solution for the Effective Charging Energy of the Single Electron Box
- •Quantum Information
- •One-and-a-Half Quantum de Finetti Theorems
- •Catalytic Quantum Error Correction
- •Random Matrices
- •Probabilities of a Large Gap in the Scaled Spectrum of Random Matrices
- •Random Matrices, Asymptotic Analysis, and d-bar Problems
- •Stochastic PDE
- •Degenerately Forced Fluid Equations: Ergodicity and Solvable Models
- •Microscopic Stochastic Models for the Study of Thermal Conductivity
- •String Theory
- •Gauge Theory and Link Homologies
Entanglement-Assisted Quantum Error-Correcting Codes |
167 |
is equal to n − − c. To sum up, C0EA defined by S0 is an [[n, k; c]] EAQECC that fixes a 2k -dimensional code space.
Proposition 3. The EAQECC C0EA defined by S0 = S0,I , S0,E can correct an error set E0 if for all E1, E2 E0, E2†E1 S0,I (Gn − Z ( S0,I , S0,E )).
Proof. Since the vector (a, a1, a2, b) completely specifies the error operator E, we consider the following two different cases:
•If two error operators E1 and E2 have the same reduced syndrome (a, a1, a2), then
the error operator E2†E1 gives us all-zero reduced syndrome. Therefore, E2†E1
S0,I . This error E2†E1 has no effect on the codewords of C0EA.
•If two error operators E1 and E2 have different reduced syndromes, and let (a, a1, a2)
be the reduced syndrome of E2†E1, then E2†E1 Z( S0,I , S0,E ). This error E2†E1 can be corrected by the decoding operation given in (6).
3.3 The General Case
We now present our main result: how to convert an arbitrary subgroup of Gn into a EAQECC. We need the following two lemmas.
Lemma 4 ([7]). Let V be an arbitrary subgroup of Gn with size 2m. Then there exists a set of generators {Z1, · · · , Zp+q , Xp+1, · · · , Xp+q } that generates V such that the Z’s and X’s obey the same commutation relations as in (7), for some p, q ≥ 0 and p + 2q = m.
[ |
Z |
i , |
Z |
j ] = 0 |
i, j |
|
|||||||||
[ |
|
|
|
i , |
|
|
j ] = 0 |
i, j |
|
||||||
X |
X |
(7) |
|||||||||||||
[ |
X |
i , |
Z |
j ] = 0 |
i = |
j |
|||||||||
{ |
|
i , |
|
i } = 0 |
i. |
|
|||||||||
X |
Z |
|
The following lemma is a simply result from group theory, and a proof can be obtained from [3].
Lemma 5. If there is a one-to-one map between V and S which preserves their commutation relations, which we denote V S , then there exists a unitary U such that for each Vi V , there is a corresponding Si S such that Vi = U Si U −1, up to a phase which can differ for each generator.
We our now ready for our main result:
Theorem 6. Given a general group S = SI , SE with the sizes of SI and SE being 2n−k−c and 22c , respectively, there exists an [[n, k; c]] EAQECC C EA defined by the encoding and decoding pair (E , D ) with the following properties:
168 |
Igor Devetak, Todd A. Brun and Min-Hsiu Hsieh |
1.The code C EA can correct the error set E if for all E1, E2 E, E2†E1 SI
(Gn − Z ( SI , SE )).
2.The codespace C EA is a simultaneous eigenspace of the Abelian extension of S .
3.To decode, the reduced error syndrome is obtained by simultaneously measuring the observables from S .
Fig. 3 Generalizing the canonical code construction
Proof. Since the |
commutation relations of |
S |
are the same as the EA stabilizer |
S0 |
|||||||||||||||||||||||
|
|
EA |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||
for the EA canonical code C0 |
|
in the previous section, by Lemma 5, there exists an |
|||||||||||||||||||||||||
unitary matrix U such that |
S |
|
= |
|
S |
U −1. Define |
E = |
U −1 |
◦ E |
|
and |
D = D |
|
◦ |
ˆ |
||||||||||||
|
0 |
|
|
U |
|
|
|
|
0 |
|
and |
|
0 |
|
U , |
||||||||||||
|
U |
|
|
|
|
|
|
|
|
|
U are Bob’s Hilbert space, and |
E0 |
D0 |
are |
|||||||||||||
where ˆ is the trivial extension of |
|
|
|
|
|
|
|
|
|
|
|
|
|||||||||||||||
given in (3) and (6), respectively. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
1. |
Since |
|
|
|
|
|
|
|
|
D0 ◦ E0 ◦ E0 = id k |
|
|
|
|
|
|
|
|
|
|
|
||||||
|
for any E0 E0, then |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||||||
|
|
|
|
|
|
D ◦ E ◦ E = id k |
|
|
|
|
|
|
|
|
|
|
|
||||||||||
|
follows for any E E. Thus, the encoding and decoding pair (E , D ) corrects E. |
||||||||||||||||||||||||||
2. |
Since C0EA is the simultaneous +1 eigenspace of S0, S = U −1S0U , and by |
||||||||||||||||||||||||||
|
definition |
C |
|
= ˆ |
C0 |
|
|
|
|
|
|
|
|
C |
EA is a simultaneous eigenspace |
||||||||||||
|
|
EA |
U −1 |
( |
EA), we conclude that |
|
of S .
3.The decoding operation D0 involves
i.measuring the set of generators of S0, yielding the error syndrome according to the error E0.
ii.performing a recovering operation E0 again to undo the error.
ˆis equivalent to measuring S = −1S ,
0 U U 0U
followed by performing the recovering operation U E0U −1
surement outcome, followed by ˆ to undo the encoding.
U
Lemma 7. Performing U followed by measuring the operator measuring the operator U −1AU followed by performing U .
based on the mea-
A is equivalent to
Proof. Let Πi be a projector onto the eigenspace corresponding to eigenvalue λi of A. Performing U followed by measuring the operator A is equivalent to the instrument (generalized measurement) given by the set of operators {Πi U }. The operator U −1AU has the same eigenvalues as A, and the projector onto the eigenspace
Entanglement-Assisted Quantum Error-Correcting Codes
corresponding to eigenvalue λi is U −1Πi U . Measuring the operator U
lowed by performing U is equivalent to the instrument {U (U −1Πi U )}
169
−1AU fol-
= {Πi U }.
3.4 Distance
The notion of distance provides a convenient way to characterize the error correcting properties of a code. We start by defining the weight of a vector u = (z|x) (Z2)2n by wt(u) = wt(z x). Here denotes the bitwise logical “or”, and wt(y) is the number of non-zero bits in y (Z2)n. In terms of the Pauli group, wt(u) is the number of single qubit Pauli matrices in Nu not equal to the identity I .
A code is said to correct t errors if it corrects the error set {u : wt(u) ≤ t } but not {u : wt(u) ≤ t + 1}. A code with distance d = 2t + 1 can correct t errors. An [[n, k; c]] EAQEC code with distance d will be referred to as an [[n, k, d; c]] code.
3.5 Generalized F4 Construction
The following Proposition generalizes a result from [5].
Proposition 8. If a classical [n, k, d]4 code exists then an [[n, 2k − n + c, d; c]] EAQECC exists for some non-negative integer c.
Proof. Consider a classical [n, k, d]4 code (the subscript 4 emphasizes that the code is over F4) with an (n − k) × n quaternary parity check matrix H4. By definition, for each nonzero a (F4)n such that wt4(a) < d,
H4, a = 0T.
This is equivalent to the logical statement
Tr ωH4, a = 0T Tr ωH4, a = 0T.
This is further equivalent to
Tr H4, a = 0T, |
|
||
where |
|
|
|
H4 = |
ωH4 |
(8) |
|
|
. |
||
ωH4 |
|
Applying the following map between the Pauli operators and elements of F4, the field with four elements:
Π I X Y Z
F4 0 ω 1 ω
170 Igor Devetak, Todd A. Brun and Min-Hsiu Hsieh
to H4 gives us a set of generators for the group S of some [[n, 2k − n + c; c]] EAQECC by Theorem 6.
Any classical binary [n, k, d]2 code may be viewed as a quaternary [n, k, d]4 code. In this case, the above construction gives rise to a CSS-type code.
3.6 Bounds on Performance
In this section we shall see that the performance of EAQECCs is comparable to the performance of QECCs (which are a special case of EAQECCs).
The two most important outer bounds for QECCs are the quantum Singleton bound [12, 15] and the quantum Hamming bound [9]. Given an [[n, k, d]] QECC (which is an [[n, k, d; 0]] EAQECC), the quantum Singleton bound reads
n − k ≥ 2(d − 1).
The quantum Hamming bound holds only for non-degenerate codes and reads
|
d−2 1 |
|
n |
≤ 2n−k . |
|
|
3j |
||
|
|
j |
||
j =0 |
|
|
The proofs of these bounds [9, 15] are easily adapted to EAQECCs. This was first noted by Bowen [2] in the case of the quantum Hamming bound. Consequently, an [[n, k, d; c]] EAQECC satisfies both bounds for any value of c. Note that the F4 construction connects the quantum Singleton bound to the classical Singleton bound n − k ≥ d − 1. An [n, k, d]4 code saturating the classical Singleton bound implies an [[n, 2k − n + c, d; c]] EAQECC saturating the quantum Singleton bound.
It is instructive to examine the asymptotic performance of quantum codes on a particular channel. A popular choice is the tensor power channel N n, where N is the depolarizing channel with Kraus operators {√p0I, √p1X, √p2Y, √p3Z}, for some probability vector p = (p0, p1, p2, p3).
It is well known that the maximal transmission rate R = k/n achievable by a non-degenerate QECC (in the sense of vanishing error for large n on the channel N n) is equal to the hashing bound R = 1 − H (p). Here H (p) is the Shannon entropy of the probability distribution p. This bound is attained by picking a random self-orthogonal code. However no explicit constructions are known which achieve this bound.
Interestingly, the F4 construction also connects the hashing bound to the Shannon bound for quaternary channels. Consider the quaternary channel a → a +c, where c takes on values 0, ω, 1, ω, with respective probabilities p0, p1, p2, p3. The maximal achievable rate R = k/n for this channel was proved by Shannon to equal R = 2 − H (p). An [n, k]4 code saturating the Shannon bound implies an [[n, 2k − n + c; c]] EAQECC, achieving the hashing bound!