This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Asymmetric Quantum Concatenated and Tensor Product Codes with Large ZZ-Distances

Jihao Fan,  Jun Li,  Jianxin Wang, Zhihui Wei and Min-Hsiu Hsieh J. Fan, J. Li, J. Wang, and Z. Wei are with School of Electronic and Optical Engineering, Nanjing University of Science and Technology, Nanjing 210094, China (e-mails: jihao.fan@outlook.com, {jun.li, wangjxin, gswei}@njust.edu.cn). J. Fan is also with Key Laboratory of Computer Network and Information Integration (Southeast University), Ministry of Education, Nanjing 211189, China.M.H. Hsieh was with Center for Quantum Software and Information, Faculty of Engineering and Information Technology, University of Technology Sydney, 15 Broadway, Ultimo NSW 2007, Australia, and is now with Hon Hai Quantum Computing Research Center, Taipei 114, Taiwan (email: minhsiuh@gmail.com)
Abstract

In this paper, we present a new construction of asymmetric quantum codes (AQCs) by combining classical concatenated codes (CCs) with tensor product codes (TPCs), called asymmetric quantum concatenated and tensor product codes (AQCTPCs) which have the following three advantages. First, only the outer codes in AQCTPCs need to satisfy the orthogonal constraint in quantum codes, and any classical linear code can be used for the inner, which makes AQCTPCs very easy to construct. Second, most AQCTPCs are highly degenerate, which means they can correct many more errors than their classical TPC counterparts. Consequently, we construct several families of AQCs with better parameters than known results in the literature. Third, AQCTPCs can be efficiently decoded although they are degenerate, provided that the inner and outer codes are efficiently decodable. In particular, we significantly reduce the inner decoding complexity of TPCs from Ω(n2an1)(a>1)\Omega(n_{2}a^{n_{1}})(a>1) to O(n2)O(n_{2}) by considering error degeneracy, where n1n_{1} and n2n_{2} are the block length of the inner code and the outer code, respectively. Furthermore, we generalize our concatenation scheme by using the generalized CCs and TPCs correspondingly.

Index Terms:
Asymmetric quantum code, concatenated code, error degeneracy, tensor product code.

I Introduction

Quantum noise due to decoherence widely exists in quantum communication channels, quantum gates and quantum measurement. It is one of the biggest challenges in realizing large-scale quantum communication systems and fully fault-tolerant quantum computation. For a quantum state, the two main mechanisms of decoherence are population relaxation and dephasing. The level of noise is usually characterized by the relaxation time 𝒯1\mathcal{T}_{1} and the dephasing time 𝒯2\mathcal{T}_{2}. Further, dephaisng usually generates a single phase flip error, while population relaxation generates a mixed bit-phase flip error. It is shown in almost all quantum systems that, the dephasing rate 1/𝒯21/\mathcal{T}_{2} is much faster than the relaxation rate 1/𝒯11/\mathcal{T}_{1}, i.e., 𝒯1𝒯2\mathcal{T}_{1}\gg\mathcal{T}_{2} [1, 2]. For example, in the trapped ions [1, 3], the ratio 𝒯1/𝒯2\mathcal{T}_{1}/\mathcal{T}_{2} can be larger than 10210^{2} and, in quantum dots systems [4], it can be larger than 10410^{4}. Such large asymmetry between population relaxation and dephasing indicates that phase flip errors (ZZ-errors) happen much more frequently than bit flip errors (XX-errors).

Steane first saw that prior knowledge of this asymmetry in errors could be leveraged for performance gains and, hence, proposed asymmetric quantum codes (AQCs) in [5]. In the years since, many AQCs have been designed to have a biased error correction towards ZZ-errors [1, 6, 7, 8]. For example, AQCs constructed from classical Bose-Chaudhuri-Hocquenghem (BCH) codes [9] and low-density parity-check (LDPC) codes [10, 11, 12, 13, 14] were proposed in [1, 7]. The BCH codes are used to correct XX-errors and the more powerful LDPC codes are used to correct ZZ-errors. Another approach, devised by Galindo et al. [15], is to introduce some preshared entanglement [16, 17, 18, 19, 20, 21] to help construct AQCs. More recently, asymmetric errors have been explored as a way to help improve the fault-tolerant thresholds [6, 8], particularly, in topological quantum codes [2, 22, 23]. In [8], a family of asymmetric Bacon-Shor (ABS) codes with parameters [[mn,1,m/n]][[mn,1,m/n]], where mm and nn are positive integers, is used for fault-tolerant quantum computation against highly biased noise. For example, ABS codes with parameters [[175,1,25/7]][[175,1,25/7]] and [[315,1,35/9]][[315,1,35/9]] can achieve a very low logical error rate around 101210^{-12} with much fewer physical two-qubit gates than symmetric quantum codes. In [22], surface codes definied on a d×dd\times d square lattice of qubits with d=12,14,16,18,d=12,14,16,18, and 2020 have thresholds exceeding 5%5\% when the asymmetry between ZZ-errors and XX-errors is around 100100. Even more, it is shown recently in [24] that thresholds for surface codes can exceed the zero-rate Shannon bound of Pauli channels when the asymmetry is properly large! These results reveal that the large asymmetry in quantum channels has a significant effect to quantum error correction and needs to be further exploited.

However, although there are many different constructions of AQCs in the literature, only a few are made on binary AQCs with a relatively large ZZ-distance dZd_{Z}. This is because the dual-containing constraint in CSS codes often makes constructing an AQC with a large minimum distance dZd_{Z} difficult. Aly [25] and Sarvepalli et al. [7] derived families of binary asymmetric quantum Bose-Chaudhuri-Hocquenghemmds (QBCH) codes with minimum distances dXd_{X} and dZd_{Z}, both upper bounded by the square root of the block length. Li et al. [26] were able to construct a few binary QBCH codes of length n=2m1n=2^{m}-1 with a large minimum distance dZd_{Z}. Ezerman et al. [27] constructed some binary CSS-like AQCs of length 40\leq 40 with best-known parameters by exhaustively searching the database of MAGMA [28]. Additionally, several families of nonbinary AQCs with a large dZd_{Z} have been developed, but all have a large field size [29, 30, 31].

The key to construct an AQC is to find two classical linear codes that satisfy a certain dual-containing relationship. In classical codes, the two most useful combining methods for constructing linear codes from short constituent codes are: concatenated codes (CCs) [32] and tensor product codes (TPCs) [33, 34]. In general, CCs have a large minimum distance because the distances in the constituent codes are multiplied, while TPCs have a poor minimum distance but a better dimension as a trade-off. In [35], Maucher et al. show that generalized concatenated codes (GCCs) are equivalent to generalized tensor product codes (GTPCs).

It is not difficult to apply the concatenation method to the quantum realm, i.e., to construct concatenated quantum codes (CQCs) [36, 37] and quantum tensor product codes (QTPCs) [38, 39], including asymmetric QTPCs [40] and entanglement-assisted QTPCs [41]. CQCs and QTPCs also exhibit some similar characteristics to their classical counterparts. For example, CQCs have a large minimum distance but a relatively small dimension, which is seeing them play an important role in fault-tolerant quantum computation. And, like TPCs, QTPCs have a large dimension but a small minimum distance. However, it is worth noting that CQCs are not constructed from classical CCs directly, but rather by serially concatenating two constituent quantum codes. This means both the inner and outer constituent codes need to satisfy the dual-containing relationship, which limits their construction. The same does not apply to QTPCs, giving them a distinct advantage. But QTPCs usually have a poor minimum distance. Moreover, some CQCs are known to be degenerate codes [37], which is a unique phenomenon in quantum coding theory. Degenerate codes have an advantage in that they can correct more errors than non-degenerate codes, but, in general, they are difficult to decode (see [42]) with the classical decoding algorithms often failing outright.

Hence, in this paper, we propose a novel concatenation scheme called asymmetric quantum concatenated and tensor product codes (AQCTPCs) that combines both CCs and TPCs, where CCs are used to correct ZZ-errors, and TPCs are used to correct XX-errors. Compared to the current methods, this new concatenation scheme has several advantages.

  • 1)

    In AQCTPCs, only the outer constituent codes over the extension field need to satisfy the dual-containing constraint. The inner constituent codes can be any classical linear codes. Then we have much freedom in the choice of the constituent codes.

  • 2)

    It is shown that AQCTPCs can be decoded efficiently provided that the classical constituent codes can be decoded efficiently. In addition, AQCTPCs are highly degenerate for correcting XX-errors and they can correct many more XX-errors beyond the error correction ability of the corresponding TPCs. Further, we show that the total inner decoding complexity of TPCs is reduced significantly from Ω(n2an1)(a>1)\Omega(n_{2}a^{n_{1}})(a>1) to O(n2)O(n_{2}) due to error degeneracy. To this end, we have developed a syndrome-based decoding algorithm specifically for AQCTPCs.

  • 3)

    The AQCTPCs demonstrated in this paper are better than QBCH codes or asymmetric quantum algebraic geometry (QAG) codes as the block length goes to infinity. We construct a family of AQCTPCs with a very large ZZ-distance dZd_{Z}, of approximately half the block length. Meanwhile, the dimension and the XX-distance dXd_{X} continue increasing as the block length goes to infinity. If dX=2d_{X}=2, then the ZZ-distance dZd_{Z} is larger than half the block length.

We compare the parameters of AQCTPCs to previous results, and provide a generalized AQCTPC concatenation scheme that uses GCCs and GTPCs. We list AQCTPCs with better parameters than the binary extension of asymmetric quantum Reed-Solomon (QRS) codes. We derive families of AQCTPCs with the largest ZZ-distance dZd_{Z} compared to existed AQCs with comparable block length and XX-distance dXd_{X}.

The rest of this paper is organized as follows. In Section II, we provide the basic notations and definitions needed for the construction of AQCTPCs. In Section III, we present the AQCTPC concatenation scheme and the decoding algorithms. Section IV provides detailed performance comparisons of AQCTPCs against previous constructions, and the discussions and conclusions follow in Section V.

II Preliminaries

In this section we first review some basic definitions and known results about stabilizer codes and AQCs, followed by the introduction of classical CCs and TPCs and their generalizations.

II-A Stabilizer Codes and Asymmetric Quantum Codes

Denote by qq a power of a prime pp and denote by 𝔽p\mathbb{F}_{p} the prime field. Let 𝔽q\mathbb{F}_{q} be the finite field with qq elements and let the field 𝔽qm\mathbb{F}_{q^{m}} be a field extension of 𝔽q\mathbb{F}_{q}, where m1m\geq 1 is an integer. Let \mathbb{C} be the field of complex numbers. For a positive integer nn, let Vn=(q)n=qnV_{n}=(\mathbb{C}^{q})^{\otimes n}=\mathbb{C}^{q^{n}} be the nnth tensor product of q\mathbb{C}^{q}. Denote by uu and vv two vectors of 𝔽qn\mathbb{F}_{q}^{n}. Define the error operators on VnV_{n} by X(u)|φ=|u+φX(u)|\varphi\rangle=|u+\varphi\rangle and Z(v)|φ=ζTr(vφ)|φZ(v)|\varphi\rangle=\zeta^{Tr(v\varphi)}|\varphi\rangle, where “TrTr” stands for the trace operation from 𝔽q\mathbb{F}_{q} to 𝔽p\mathbb{F}_{p}, and ζ=exp(2πi/p)\zeta=\exp(2\pi i/p) is a primitive ppth root of unity. Denote by

Gn={ζaX(u)Z(v):u,v𝔽qn,a𝔽q}G_{n}=\{\zeta^{a}X(u)Z(v):u,v\in\mathbb{F}_{q}^{n},a\in\mathbb{F}_{q}\} (1)

the group generated by En={X(u)Z(v):u,v𝔽qn}E_{n}=\{X(u)Z(v):u,v\in\mathbb{F}_{q}^{n}\}. For any ε=ζaX(u)Z(v)Gn\varepsilon=\zeta^{a}X(u)Z(v)\in G_{n}, where u=(u1,,un)𝔽qnu=(u_{1},\ldots,u_{n})\in\mathbb{F}_{q}^{n} and v=(v1,,vn)𝔽qnv=(v_{1},\ldots,v_{n})\in\mathbb{F}_{q}^{n}, the weight of ε\varepsilon is defined by

wtQ(ε)=|{1in:(ui,vi)(0,0)}|.\textrm{wt}_{Q}(\varepsilon)=|\{1\leq i\leq n:(u_{i},v_{i})\neq(0,0)\}|. (2)

The weight of XX-errors and the weight of ZZ-errors in ε\varepsilon are defined by wtH(u)\textrm{wt}_{H}(u) and wtH(v)\textrm{wt}_{H}(v), respectively, where “wtH\textrm{wt}_{H}” stands for the Hamming weight. The definition of quantum stabilizer codes is given below.

Definition II.1

A qq-ary quantum stabilizer code 𝒬\mathcal{Q} is a qkq^{k}-dimensional (k>0k>0) subspace of VnV_{n} such that

𝒬=εS{|φVn:ε|φ=|φ},\mathcal{Q}=\bigcap_{\varepsilon\in S}\{|\varphi\rangle\in V_{n}:\varepsilon|\varphi\rangle=|\varphi\rangle\}, (3)

where SS is a subgroup of GnG_{n} and is called the stabilizer group. 𝒬\mathcal{Q} has minimum distance dd if it can detect all errors εGn\varepsilon\in G_{n} of weight wtQ(ε)\textrm{wt}_{Q}(\varepsilon) up to d1d-1. Then 𝒬\mathcal{Q} is denoted by 𝒬=[[n,k,d]]q\mathcal{Q}=[[n,k,d]]_{q}. Further, 𝒬\mathcal{Q} is called non-degenerate if each stabilizer in SS has quantum weight at least the minimum distance dd, otherwise it is degenerate.

The Calderbank-Shor-Steane (CSS) code in [43, 5] is a special family of quantum stabilizer codes and can be constructed from two classical linear codes which satisfy some dual-containing relationship. Let dXd_{X} and dZd_{Z} be two positive integers. We define an AQC as a CSS code in VnV_{n} with parameters Q=[[n,k,dZ/dX]]qQ=[[n,k,d_{Z}/d_{X}]]_{q} if it can detect all εGn\varepsilon\in G_{n} of weight wtX(ε)\textrm{wt}_{X}(\varepsilon) up to dX1d_{X}-1 and weight wtZ(ε)\textrm{wt}_{Z}(\varepsilon) up to dZ1d_{Z}-1, simultaneously. The construction in [7, 1, 44] can be used to construct AQCs in which a pair of classical linear codes are used, one for correcting XX-errors and the other for correcting ZZ-errors.

Lemma II.1 ([44, Theorem 2.4])

Let C1C_{1} and C2C_{2} be two classical linear codes with parameters [n,k1,d1]q[n,k_{1},d_{1}]_{q} and [n,k2,d2]q[n,k_{2},d_{2}]_{q}, respectively, and C2C1C_{2}^{\bot}\subseteq C_{1}. Then there exists an AQC with parameters Q=[[n,k1+k2n,dZ/dX]]q,{Q}=[[n,k_{1}+k_{2}-n,d_{Z}/d_{X}]]_{q}, where

dZ=max{wtH(C1\C2),wtH(C2\C1)},d_{Z}=\max\{\text{wt}_{H}(C_{1}\backslash C_{2}^{\bot}),\text{wt}_{H}(C_{2}\backslash C_{1}^{\bot})\}, (4)
dX=min{wtH(C1\C2),wtH(C2\C1)}.d_{X}=\min\{\text{wt}_{H}(C_{1}\backslash C_{2}^{\bot}),\text{wt}_{H}(C_{2}\backslash C_{1}^{\bot})\}. (5)

If d1=wtH(C1\C2)d_{1}=\text{wt}_{H}(C_{1}\backslash C_{2}^{\bot}) and d2=wtH(C2\C1)d_{2}=\text{wt}_{H}(C_{2}\backslash C_{1}^{\bot}), then QQ is non-degenerate, otherwise it is degenerate.

II-B Classical Tensor Product Codes

Let C1=[n1,k1,d1]qC_{1}=[n_{1},k_{1},d_{1}]_{q} be a classical linear code whose parity check matrix is given by Hc1H_{c_{1}}, and let r1=n1k1r_{1}=n_{1}-k_{1} be the number of parity checks. Let C2=[n2,k2,d2]qr1C_{2}=[n_{2},k_{2},d_{2}]_{q^{r_{1}}} be a linear code over the extension field 𝔽qr1\mathbb{F}_{q^{r_{1}}} whose parity check matrix is given by Hc2H_{c_{2}}. Let r2=n2k2r_{2}=n_{2}-k_{2}. Denote by

CTC2TC1C_{T}\equiv C_{2}\otimes_{T}C_{1} (6)

the tensor product code of C1C_{1} and C2C_{2}. The block length and dimension of CTC_{T} are given by [n1n2,n1n2r1r2][n_{1}n_{2},n_{1}n_{2}-r_{1}r_{2}]. In addition, C1C_{1} and C2C_{2} are known as the inner and outer constituent codes of CTC_{T}, respectively. If we regard Hc1H_{c_{1}} as a 1×n11\times n_{1} matrix with elements over 𝔽qr1\mathbb{F}_{q^{r_{1}}}, then the parity check matrix HTH_{T} of CTC_{T} is the Kronecker product of Hc1H_{c_{1}} and Hc2H_{c_{2}}, i.e.,

HT=Hc2Hc1.H_{T}=H_{c_{2}}\otimes H_{c_{1}}. (7)

Then we can derive a parity check matrix of CTC_{T} with elements over 𝔽q\mathbb{F}_{q} by expanding all the elements of HTH_{T} from 𝔽qr1\mathbb{F}_{q^{r_{1}}} to 𝔽q\mathbb{F}_{q}. The error detection/correction ability of CTC_{T} is restricted by the constituent codes and is given by:

Lemma II.2 ([33, Theorem 1])

Partition the codeword of CT=C2TC1C_{T}=C_{2}\otimes_{T}C_{1} into n2n_{2} sub-blocks, where each sub-block contains n1n_{1} elements, and assume that the constituent code CiC_{i} can detect or correct an error pattern class ξi\xi_{i} (i=1i=1 or 2), then the TPC CTC_{T} can detect or correct all error-patterns where the sub-blocks containing errors form a pattern belonging to class ξ2\xi_{2} and the errors within each erroneous sub-block fall within the class ξ1\xi_{1}.

Here we give an illustrative example for the construction of TPCs.

Example II.1

Let C1=[3,1,3]2C_{1}=[3,1,3]_{2} be a binary repetition code with a parity check matrix given by

Hc1\displaystyle H_{c_{1}} =\displaystyle= (101011)=(1ωω2),\displaystyle\left(\begin{array}[]{ccc}1&0&1\\ 0&1&1\end{array}\right)=\left(\begin{array}[]{ccc}1&\omega&\omega^{2}\end{array}\right), (11)

where ω\omega is a primitive element of GF(22)GF(2^{2}) such that ω2+ω+1=0\omega^{2}+\omega+1=0. Let C2C_{2} be a 222^{2}-ary linear code over GF(22)GF(2^{2}), such as we let C2=[5,3,3]22C_{2}=[5,3,3]_{2^{2}} be a maximum-distance-separable (MDS) code with a parity check matrix

Hc2=(101ωω01ωω1).H_{c_{2}}=\left(\begin{array}[]{ccccc}1&0&1&\omega&\omega\\ 0&1&\omega&\omega&1\end{array}\right). (12)

Then we can derive a TPC CTC_{T} of length 1515 whose parity check matrix HT=Hc2Hc1H_{T}=H_{c_{2}}\otimes H_{c_{1}} is given in (20).

HT\displaystyle H_{T} =\displaystyle= (1ωω20001ωω2ωω21ωω210001ωω2ωω21ωω211ωω2)\displaystyle\left(\begin{array}[]{ccccccccccccccc}1&\omega&\omega^{2}&0&0&0&1&\omega&\omega^{2}&\omega&\omega^{2}&1&\omega&\omega^{2}&1\\ 0&0&0&1&\omega&\omega^{2}&\omega&\omega^{2}&1&\omega&\omega^{2}&1&1&\omega&\omega^{2}\end{array}\right) (15)
=\displaystyle= (101000101011011011000011110110000101011011101000011110110011).\displaystyle\left(\begin{array}[]{ccccccccccccccc}1&0&1&0&0&0&1&0&1&0&1&1&0&1&1\\ 0&1&1&0&0&0&0&1&1&1&1&0&1&1&0\\ 0&0&0&1&0&1&0&1&1&0&1&1&1&0&1\\ 0&0&0&0&1&1&1&1&0&1&1&0&0&1&1\end{array}\right). (20)

It is easy to verify, e.g., by using the MAGMA computational software [28], that the dimension and minimum distance of CTC_{T} with a parity check matrix HTH_{T} in (20) are exact 1111 and 33, respectively.

Ref. [35] shows that the parity check matrix of TPCs can also be represented in a companion matrix form. Let g(x)=g0+g1x++gr11xr11+xr1g(x)=g_{0}+g_{1}x+\cdots+g_{r_{1}-1}x^{r_{1}-1}+x^{r_{1}} be a primitive polynomial over 𝔽qr1\mathbb{F}_{q^{r_{1}}} and denote by α\alpha a primitive element of 𝔽qr1\mathbb{F}_{q^{r_{1}}}. The companion matrix of g(x)g(x) is defined to be the r1×r1r_{1}\times r_{1} matrix

M=(010000100001g0g1g2gr11).M=\left(\begin{array}[]{ccccc}0&1&0&\cdots&0\\ 0&0&1&\cdots&0\\ \vdots&\vdots&\vdots&\ddots&\vdots\\ 0&0&0&\cdots&1\\ -g_{0}&-g_{1}&-g_{2}&\cdots&-g_{r_{1}-1}\end{array}\right). (21)

Then for any element β=αi\beta=\alpha^{i} of 𝔽qr1\mathbb{F}_{q^{r_{1}}}, the companion matrix of β\beta, denoted by [β]=Mi[\beta]=M^{i}, is an r1×r1r_{1}\times r_{1} matrix with elements over 𝔽q\mathbb{F}_{q}. Let the parity check matrix of the constituent code C2C_{2} be Hc2=(aij)r2×n2H_{c_{2}}=(a_{ij})_{r_{2}\times n_{2}} with elements over 𝔽qr1\mathbb{F}_{q^{r_{1}}}, i.e., aij𝔽qr1a_{ij}\in\mathbb{F}_{q^{r_{1}}} for 1ir21\leq i\leq r_{2} and 1jn21\leq j\leq n_{2}. Following the notations used in [35], we denote by [Hc2]=([aij])r1r2×r1n2[H_{c_{2}}]=([a_{ij}])_{r_{1}r_{2}\times r_{1}n_{2}}, where [aij][a_{ij}] is a companion matrix form. The parity check matrix of CTC_{T} can be written as

HT[Hc2t]Hc1\displaystyle H_{T}\equiv[H_{c_{2}}^{t}]\otimes H_{c_{1}} (26)
=([a11t]Hc1[a12t]Hc1[a1n2t]Hc1[a21t]Hc1[a22t]Hc1[a2n2t]Hc1[ar21t]Hc1[ar22t]Hc1[ar2n2t]Hc1)\displaystyle=\left(\begin{array}[]{cccc}[a_{11}^{t}]H_{c_{1}}&[a_{12}^{t}]H_{c_{1}}&\cdots&[a_{1n_{2}}^{t}]H_{c_{1}}\\ [a_{21}^{t}]H_{c_{1}}&[a_{22}^{t}]H_{c_{1}}&\cdots&[a_{2n_{2}}^{t}]H_{c_{1}}\\ \vdots&\vdots&\vdots&\vdots\\ [a_{r_{21}}^{t}]H_{c_{1}}&[a_{r_{22}}^{t}]H_{c_{1}}&\cdots&[a_{r_{2}n_{2}}^{t}]H_{c_{1}}\end{array}\right)

in which the matrix [Hc2t][H_{c_{2}}^{t}] is obtained by transposing the constituent companion matrices of [Hc2][H_{c_{2}}], and [aijt][a_{ij}^{t}] is the transpose of [aij][a_{ij}]. According to [35, 45], if we do not transpose the constituent companion matrices in (26), we can obtain another representation of the parity check matrix HTH_{T} as follows

HT[Hc2]Hc1\displaystyle H_{T}\equiv[H_{c_{2}}]\otimes H_{c_{1}} (31)
=([a11]Hc1[a12]Hc1[a1n2]Hc1[a21]Hc1[a22]Hc1[a2n2]Hc1[ar21]Hc1[ar22]Hc1[ar2n2]Hc1).\displaystyle=\left(\begin{array}[]{cccc}[a_{11}]H_{c_{1}}&[a_{12}]H_{c_{1}}&\cdots&[a_{1n_{2}}]H_{c_{1}}\\ [a_{21}]H_{c_{1}}&[a_{22}]H_{c_{1}}&\cdots&[a_{2n_{2}}]H_{c_{1}}\\ \vdots&\vdots&\vdots&\vdots\\ [a_{r_{21}}]H_{c_{1}}&[a_{r_{22}}]H_{c_{1}}&\cdots&[a_{r_{2}n_{2}}]H_{c_{1}}\end{array}\right).

The two representations in (26) and (31) do not make any difference for the parameters and the error correction performance of TPCs. We will use them alternately in the following constructions. It should be noticed that the Kronecker product defined in equations (26) and (31) is a little different from the standard one. In the following, the Kronecker product of matrices follows the definition in (26) and (31).

The generalized tensor product codes are proposed in [35, 46] by combining a series of outer codes and inner codes. Let A=[nA,k,d]qA_{\hbar}=[n_{A},k_{\hbar},d_{\hbar}]_{q} and B=[NB,K,D]qrB_{\hbar}=[N_{B},K_{\hbar},D_{\hbar}]_{q^{r_{\hbar}}} be LL pairs of inner and outer codes, respectively, where 1L1\leq\hbar\leq L and r=nAkr_{\hbar}=n_{A}-k_{\hbar}. Let the parity check matrices of AA_{\hbar} and BB_{\hbar}, respectively, be HAH_{\hbar}^{A} and HBH_{\hbar}^{B}, 1L1\leq\hbar\leq L. Assume that all the rows in HAH_{\hbar}^{A}, 1L1\leq\hbar\leq L, are independent with each other. Then the parity check matrix of the GTPCs

𝒞𝒯==1LBTA\mathcal{C}_{\mathcal{T}}=\bigcap\limits_{\hbar=1}^{L}B_{\hbar}\otimes_{T}A_{\hbar} (32)

is defined by

H𝒞𝒯([H1Bt]H1A[H2Bt]H2A[HLBt]HLA),H_{\mathcal{C}_{\mathcal{T}}}\equiv\left(\begin{array}[]{c}[H^{B^{t}}_{1}]\otimes H^{A}_{1}\\ [H^{B^{t}}_{2}]\otimes H^{A}_{2}\\ \vdots\\ [H^{B^{t}}_{L}]\otimes H^{A}_{L}\end{array}\right), (33)

where [HBt][H^{B^{t}}_{\hbar}] is obtained by transposing the component companion matrices of [HB][H^{B}_{\hbar}] for each 1L1\leq\hbar\leq L. The block length and the dimension of GTPCs are given by 𝒞𝒯=[NBnA,NBnA=1LRr]q\mathcal{C}_{\mathcal{T}}=[N_{B}n_{A},N_{B}n_{A}-\sum_{\hbar=1}^{L}R_{\hbar}r_{\hbar}]_{q}, where R=NBKR_{\hbar}=N_{B}-K_{\hbar} for 1L1\leq\hbar\leq L.

II-C Classical Concatenated Codes

Concatenated codes can be seen as the dual counterpart of TPCs, which are obtained by concatenating an inner code C1=[n,k,d]qC_{1}=[n,k,d]_{q} with an outer code C2=[N,K,D]qkC_{2}=[N,K,D]_{q^{k}}. Denote the concatenation of C1C_{1} and C2C_{2} by

CCC2CC1,C_{C}\equiv C_{2}\otimes_{C}C_{1}, (34)

and CC=[Nn,Kk,dCCDd]qC_{C}=[Nn,Kk,d_{C_{C}}\geq Dd]_{q} (see [9, 32]). The generator matrix of CCC_{C} can also be given in a companion matrix form (see [35])

GC=[G2]G1.G_{C}=[G_{2}]\otimes G_{1}. (35)

where G1G_{1} and G2G_{2} are the generator matrices of C1C_{1} and C2C_{2}, respectively.

In [9, 35], the generalized concatenated codes are obtained by concatenating a serial of outer codes and inner codes. For simplicity, we only consider linear codes here. Let A1=[nA,k1,d1]qA_{1}=[n_{A},k_{1},d_{1}]_{q} be a qq-ary linear code with the generator matrix G1AG_{1}^{A}, which is partitioned to SS submatrices 𝐆1A,,𝐆SA\mathbf{G}_{1}^{A},\ldots,\mathbf{G}_{S}^{A} such that kA=rank(𝐆A)k_{\ell}^{A}=\textrm{rank}(\mathbf{G}_{\ell}^{A}) for 1S1\leq\ell\leq S, and then k1==1SkAk_{1}=\sum_{\ell=1}^{S}k_{\ell}^{A}. Denote by

G1A=(𝐆1A𝐆2A𝐆SA),GA=(𝐆A𝐆+1A𝐆SA),2S,G_{1}^{A}=\left(\begin{array}[]{c}\mathbf{G}_{1}^{A}\\ \mathbf{G}_{2}^{A}\\ \vdots\\ \mathbf{G}_{S}^{A}\end{array}\right),G_{\ell}^{A}=\left(\begin{array}[]{c}\mathbf{G}_{\ell}^{A}\\ \mathbf{G}_{\ell+1}^{A}\\ \vdots\\ \mathbf{G}_{S}^{A}\end{array}\right),2\leq\ell\leq S, (36)

and let GAG_{\ell}^{A} be the generator matrices of the linear codes A=[nA,k,d]qA_{\ell}=[n_{A},k_{\ell},d_{\ell}]_{q}, for 2S2\leq\ell\leq S, respectively. Denote by B=[NB,K,D]qkAB_{\ell}=[N_{B},K_{\ell},D_{\ell}]_{q^{k_{\ell}^{A}}} the outer codes with the generator matrices, respectively, GBG_{\ell}^{B}, for 1S1\leq\ell\leq S. Then the generator matrix of the GCCs

𝒞𝒞==1SBCA\mathcal{C}_{\mathcal{C}}=\bigcup\limits_{\ell=1}^{S}B_{\ell}\otimes_{C}A_{\ell} (37)

is defined by

G𝒞𝒞([G1B]𝐆1A[G2B]𝐆2A[GSB]𝐆SA),G_{\mathcal{C}_{\mathcal{C}}}\equiv\left(\begin{array}[]{c}[G^{B}_{1}]\otimes\mathbf{G}^{A}_{1}\\ [G^{B}_{2}]\otimes\mathbf{G}^{A}_{2}\\ \hskip 5.69054pt\vdots\\ [G^{B}_{S}]\otimes\mathbf{G}^{A}_{S}\end{array}\right), (38)

and the parameters of GCCs are given by

𝒞𝒞=[NBnA,=1SKkA,d𝒞𝒞]]q,\mathcal{C}_{\mathcal{C}}=[N_{B}n_{A},\sum\limits_{\ell=1}^{S}K_{\ell}k_{\ell}^{A},d_{\mathcal{C}_{\mathcal{C}}}]]_{q}, (39)

where d𝒞𝒞min{D1d1,,DSdS}d_{\mathcal{C}_{\mathcal{C}}}\geq\min\{D_{1}d_{1},\ldots,D_{S}d_{S}\}.

Compared to other types of classical linear codes in [9, 47], the parameters of CCs (GCCs) and TPCs (GTPCs) may not have any advantages. However the encoding and decoding algorithms of CCs (GCCs) and TPCs (GTPCs) usually have low complexity, and can be decoded efficiently in polynomial time. Therefore CCs are widely used in many digital communication systems, e.g., the NASA standard for deep space communications and wireless communications [48, 10], and GCCs show large potential applications, e.g., in data transmission systems [49] and Flash memory [50, 51]. TPCs and GTPCs exhibit large advantages in magnetic storage systems [52, 53, 54, 55], Flash memory [56, 57] and in constructing locally repairable codes for distributed storage systems [58, 59, 60]. In [61], it is shown that Polar codes can be treated as GCCs for a fast encoding.

III Main Results

In this section, we present the AQCTPC concatenation framework, where CCs are used to correct ZZ-errors and TPCs are used to correct XX-errors. In our construction, the dimension of the inner codes of CCs needs to be equal to the number of parity checks of the inner codes of TPCs. Let C1=[n1,k1,d1]qC_{1}=[n_{1},k_{1},d_{1}]_{q} denote an arbitrary qq-ary linear code and C2=[n2,k2,d2]qk1C_{2}=[n_{2},k_{2},d_{2}]_{q^{k_{1}}} and C3=[n2,k3,d3]qk1C_{3}=[n_{2},k_{3},d_{3}]_{q^{k_{1}}} denote two linear codes over the extension field 𝔽qk1\mathbb{F}_{q^{k_{1}}}. Let 𝒞C=C3CC1\mathcal{C}_{C}=C_{3}\otimes_{C}C_{1} be the CC of C1C_{1} and C3C_{3}, and let 𝒞T=C2TC1\mathcal{C}_{T}=C_{2}\otimes_{T}C_{1}^{\bot} be the TPC of C1C_{1}^{\bot} and C2C_{2}. Then we have the following dual-containing relationship between CCs and TPCs.

Lemma III.1

If C3C2C_{3}^{\bot}\subseteq C_{2}, then there exists 𝒞T𝒞C\mathcal{C}_{T}^{\perp}\subseteq\mathcal{C}_{C}.

Proof:

Let Hc1H_{c_{1}} and Gc1G_{c_{1}} be the parity check matrix and generator matrix of C1C_{1} over 𝔽q\mathbb{F}_{q}, respectively. Let HciH_{c_{i}} and GciG_{c_{i}}, i=2,3i=2,3, be the parity check matrix and generator matrix of CiC_{i} over 𝔽qk1\mathbb{F}_{q^{k_{1}}}, respectively. It is easy to see that the parity check matrix of the TPC 𝒞T\mathcal{C}_{T} with transposed companion matrices is given by

H𝒞T=[Hc2t]Gc1.H_{\mathcal{C}_{T}}=[H_{c_{2}}^{t}]\otimes G_{c_{1}}. (40)

From [35, 45], we know that the parity check matrix of 𝒞C\mathcal{C}_{C} is given by

H𝒞C=([Hc3](Ik1,0)[In2]Hc1),H_{\mathcal{C}_{C}}=\left(\begin{array}[]{l}[H_{c_{3}}]\otimes(I_{k_{1}},\textbf{0})\\ [I_{n_{2}}]\otimes\ H_{c_{1}}\end{array}\right), (41)

where “0” is a zero sub-block of size k1×(n1k1)k_{1}\times(n_{1}-k_{1}). It is not difficult to verify that if C3C2C_{3}^{\bot}\subseteq C_{2}, then we have [Hc3][Hc2t]T=0[H_{c_{3}}][H_{c_{2}}^{t}]^{T}=0 and H𝒞CH𝒞TT=0H_{\mathcal{C}_{C}}H_{\mathcal{C}_{T}}^{T}=0. Therefore we have 𝒞T𝒞C\mathcal{C}_{T}^{\perp}\subseteq\mathcal{C}_{C}. ∎

By combining 𝒞C=C3CC1\mathcal{C}_{C}=C_{3}\otimes_{C}C_{1} and 𝒞T=C2TC1\mathcal{C}_{T}=C_{2}\otimes_{T}C_{1}^{\bot}, we have the construction of AQCTPCs as follows.

Theorem III.1

There exists a family of AQCTPCs with parameters 𝒬=[[n1n2,k1(k2+k3n2),dZd1d3/dXd2]]q\mathcal{Q}=[[n_{1}n_{2},k_{1}(k_{2}+k_{3}-n_{2}),d_{Z}\geq d_{1}d_{3}/d_{X}\geq d_{2}]]_{q}.

The AQCTPC concatenation scheme has several advantages over the current methods. First, only the outer constituent codes C2C_{2} and C3C_{3} over the extension field need to satisfy the dual-containing constraint. Then we have much freedom in the choice of the outer codes. It is generally believed that certain families of linear codes over the extension field can easily satisfy the dual-containing constraint. For example, the dual-containing relationship of \ell-ary MDS codes has been determined for all possible dimensions and block length less than +2\ell+2, see e.g., in [62, 63, 64], where \ell is a power of a prime. We can let C2C_{2} and C3C_{3} be two MDS codes that satisfy the dual-containing constraint and with reasonable block length. Second, in the following proof we show that AQCTPCs are highly degenerate in that they can correct more XX-errors than a corresponding classical TPC.

Proof:

Let 𝒞C=C3CC1\mathcal{C}_{C}=C_{3}\otimes_{C}C_{1} denote the CC of C1C_{1} and C3C_{3}, and let 𝒞T=C2TC1\mathcal{C}_{T}=C_{2}\otimes_{T}C_{1}^{\bot} denote the TPC of C1C_{1}^{\bot} and C2C_{2}. Then we have 𝒞C=[n1n2,k1k2]q\mathcal{C}_{C}=[n_{1}n_{2},k_{1}k_{2}]_{q} and 𝒞T=[n1n2,n1n2k1(n2k2)]q\mathcal{C}_{T}=[n_{1}n_{2},n_{1}n_{2}-k_{1}(n_{2}-k_{2})]_{q}. According to the CSS construction in Lemma II.1 and Lemma III.1, if C3C2C_{3}^{\bot}\subseteq C_{2}, then we can derive an AQCTPC with parameters 𝒬=[[n1n2,k1(k2+k3n2),dZ/dX]]q.\mathcal{Q}=[[n_{1}n_{2},k_{1}(k_{2}+k_{3}-n_{2}),d_{Z}/d_{X}]]_{q}.

We still need to compute the minimum distance of 𝒬\mathcal{Q}. It is easy to see that the minimum distance of the CC is larger than or equal to d1d3d_{1}d_{3}, and then we have dZd1d3d_{Z}\geq d_{1}d_{3}. Next we determine the XX-distance dXd_{X}.

Suppose that there is an XX-error eXe_{X} of length n1n2n_{1}n_{2} in the encoded codeword. We divide the error eXe_{X} into n2n_{2} sub-blocks eXi(1in2)e_{X_{i}}(1\leq i\leq n_{2}), with each sub-block being of length n1n_{1} (see Fig. 1). We then do the syndrome measurement for XX-errors by using the parity check matrix H𝒞TH_{\mathcal{C}_{T}} given in (40). The syndrome information Φ\Phi can be derived by measuring the ancilla, which is given by

Φ\displaystyle\Phi \displaystyle\equiv [Hc2t]Gc1eXT\displaystyle[H_{c_{2}}^{t}]\otimes G_{c_{1}}\cdot e_{X}^{T} (46)
=\displaystyle= ([a11t]ΦI1++[a1n2t]ΦIn2[a21t]ΦI1++[a2n2t]ΦIn2[ar21t]ΦI1++[ar2n2t]ΦIn2),\displaystyle\left(\begin{array}[]{c}[a_{11}^{t}]\Phi_{\textrm{I}_{1}}+\cdots+[a_{1n_{2}}^{t}]\Phi_{\textrm{I}_{n_{2}}}\\ [a_{21}^{t}]\Phi_{\textrm{I}_{1}}+\cdots+[a_{2n_{2}}^{t}]\Phi_{\textrm{I}_{n_{2}}}\\ \vdots\\ [a_{r_{2}1}^{t}]\Phi_{\textrm{I}_{1}}+\cdots+[a_{r_{2}n_{2}}^{t}]\Phi_{\textrm{I}_{n_{2}}}\end{array}\right),

where Hc2=(aij),1ir2=n2k2,1jn2H_{c_{2}}=(a_{ij}),1\leq i\leq r_{2}=n_{2}-k_{2},1\leq j\leq n_{2}. We let ΦIlGc1eXlT,1ln2,\Phi_{\textrm{I}_{l}}\equiv G_{c_{1}}e_{X_{l}}^{T},1\leq l\leq n_{2}, which can be regarded as the logical error sequences in the outer code C2C_{2}. Then we have

Φ=([a11t][a12t][a1n2t][a21t][a22t][a2n2t][ar21t][ar22t][ar2n2t])(ΦI1ΦI2ΦIn2).\Phi=\left(\begin{array}[]{cccc}[a_{11}^{t}]&[a_{12}^{t}]&\cdots&[a_{1n_{2}}^{t}]\\ [a_{21}^{t}]&[a_{22}^{t}]&\cdots&[a_{2n_{2}}^{t}]\\ \vdots&\vdots&\vdots&\vdots\\ [a_{r_{2}1}^{t}]&[a_{r_{2}2}^{t}]&\cdots&[a_{r_{2}n_{2}}^{t}]\end{array}\right)\left(\begin{array}[]{c}\Phi_{\textrm{I}_{1}}\\ \Phi_{\textrm{I}_{2}}\\ \vdots\\ \Phi_{\textrm{I}_{n_{2}}}\end{array}\right). (47)

If the outer decoding can be conducted successfully, then the sequences ΦIl(1n2)\Phi_{\textrm{I}_{l}}(1\leq\ell\leq n_{2}) are used as the inner syndrome information for C1C_{1}^{\bot}.

The outer code C2C_{2} must be decoded by mapping the syndrome information Φ\Phi to the symbols over the extension field 𝔽qk1\mathbb{F}_{q^{k_{1}}}. Here we need a syndrome based decoding [9] of the outer code C2C_{2}, which, if successful, will result in the exact inner syndrome sequence ΦIl(1ln2)\Phi_{\textrm{I}_{l}}(1\leq l\leq n_{2}). The inner decoding follows using the dual of the inner code C1C_{1}. In general, for any ΦIlGc1eXlT(1ln2)\Phi_{\textrm{I}_{l}}\equiv G_{c_{1}}e_{X_{l}}^{T}(1\leq l\leq n_{2}), we can always obtain a decoded error sequence e~Xl\widetilde{e}_{X_{l}} such that ΦIl=Gc1e~XlT\Phi_{\textrm{I}_{l}}=G_{c_{1}}\widetilde{e}_{X_{l}}^{T} by using some syndrome based decoder for C1C_{1}^{\bot}, such as a syndrome table-look-up decoder. However, we do not need to do that and just let e~Xl=(ΦIl,0)\widetilde{e}_{X_{l}}=(\Phi_{\textrm{I}_{l}},\textbf{0}) by assuming that Gc1G_{c_{1}} is in a standard form, where “0” is a zero vector of length r1r_{1}. Let e~X(e~X1,,e~Xn2)\widetilde{e}_{X}\equiv(\widetilde{e}_{X_{1}},\ldots,\widetilde{e}_{X_{n_{2}}}) be the decoded error sequence. There must be G𝒞C(eXT+e~XT)=0G_{\mathcal{C}_{C}}(e_{X}^{T}+\widetilde{e}_{X}^{T})=0, where

G𝒞C=[Gc3t]Gc1G_{\mathcal{C}_{C}}=[G_{c_{3}}^{t}]\otimes G_{c_{1}} (48)

is the generator matrix of 𝒞C=C3CC1\mathcal{C}_{C}=C_{3}\otimes_{C}C_{1}. There are two cases: (1) eX=e~Xe_{X}=\widetilde{e}_{X} which means that the decoded error e~X\widetilde{e}_{X} is exactly the true error. (2) eXe~Xe_{X}\neq\widetilde{e}_{X} but they belong to the same coset of 𝒞C\mathcal{C}_{C}^{\bot}, which means that they are degenerate.

This phenomenon of degeneracy is quite different from the decoding of classical TPCs [52, 33, 35], where the decoding fails if the number of errors in one sub-block exceeds the error correction ability of the inner codes. As such, AQCTPCs can correct many more XX-errors than their classical TPC counterparts. If wt(eX)d21\textrm{wt}(e_{X})\leq d_{2}-1, whenever the error is separated into different sub-blocks in Fig. 1, the number of erroneous sub-blocks will be at most d21d_{2}-1. This means that either the error will always be detectable or that the error is undetectable but harmless since it is degenerate. Thus the XX-distance dXd_{X} is at least d2d_{2}. Therefore we have an AQCTPC with the parameters 𝒬=[[n1n2,k1(k2+k3n2),dZd1d3/dXd2]]q\mathcal{Q}=[[n_{1}n_{2},k_{1}(k_{2}+k_{3}-n_{2}),d_{Z}\geq d_{1}d_{3}/d_{X}\geq d_{2}]]_{q}. ∎

Refer to caption
Figure 1: Dividing the Pauli XX-error eXe_{X} into n2n_{2} sub-blocks where each sub-block eXi(1in2)e_{X_{i}}(1\leq i\leq n_{2}) is of length n1n_{1}.

In the proof of Theorem III.1, we have given the decoding of AQCTPCs for correcting XX-errors. We summarize and provide the whole decoding process in Algorithm 1.

Algorithm 1 The Decoding Algorithm of AQCTPCs for Correcting XX-errors.
1:Φ,Hc2\Phi,H_{c_{2}};
2:The decoded XX-error sequence e~X\widetilde{e}_{X}.
3:Initialization: Φ^=\widehat{\Phi}=\emptyset, e~X=\widetilde{e}_{X}=\emptyset;
4://// Divide Φ\Phi into r2r_{2} sub-blocks, each sub-block is of length k1k_{1}.
5:Φ=(Φ1,,Φr2),|Φi|=k1\Phi=(\Phi_{1},\ldots,\Phi_{r_{2}}),|\Phi_{i}|=k_{1};
6://// Map Φ\Phi to Φ^\widehat{\Phi} with elements over the extension field 𝔽qk1\mathbb{F}_{q^{k_{1}}}.
7:for  i[1,r2]i\in[1,r_{2}] do
8:     Map Φi\Phi_{i} into a symbol Φ^i\widehat{\Phi}_{i} over the field 𝔽qk1\mathbb{F}_{q^{k_{1}}};
9:     Φ^=(Φ^,Φ^i)\widehat{\Phi}=(\widehat{\Phi},\widehat{\Phi}_{i});
10:end for
11://// Do the outer decoding according to the syndrome information Hc2Φ^IT=Φ^H_{c_{2}}\widehat{\Phi}_{\textrm{I}}^{T}=\widehat{\Phi}.
12:Denote by Φ^I=(Φ^I1,,Φ^In2)\widehat{\Phi}_{\textrm{I}}=(\widehat{\Phi}_{\textrm{I}_{1}},\ldots,\widehat{\Phi}_{\textrm{I}_{n_{2}}});
13:for  i[1,n2]i\in[1,n_{2}] do
14:     Map Φ^Ii\widehat{\Phi}_{\textrm{I}_{i}} into a sequence over field 𝔽q\mathbb{F}_{q}, ΦIi{\Phi}_{\textrm{I}_{i}};
15:     e~Xi=(ΦIi,0)\widetilde{e}_{X_{i}}=(\Phi_{\textrm{I}_{i}},\textbf{0});
16:     e~X=(e~X,e~Xi)\widetilde{e}_{X}=(\widetilde{e}_{X},\widetilde{e}_{X_{i}});
17:end for
18:return e~X\widetilde{e}_{X};

On the other hand, like the serial decoding of classical CCs, the decoding of ZZ-errors in AQCTPCs can also be done serially, i.e., an inner decoding followed by an outer decoding. However, the decoding algorithm for classical CCs can not be used to decode ZZ-errors directly. Instead, a modified version of syndrome-based decoding is needed, as explained next.

Before performing the decoding, the ancilla needs to be measured first to determine the syndrome information. Denote the encoded quantum basis states of the AQCTPC 𝒬\mathcal{Q} by

|u+𝒞C1|𝒞C|v𝒞C|u+v,|u+\mathcal{C}_{C}^{\bot}\rangle\equiv\frac{1}{\sqrt{|\mathcal{C}_{C}^{\bot}|}}\sum_{v\in\mathcal{C}_{C}^{\bot}}|u+v\rangle, (49)

where u𝒞Tu\in\mathcal{C}_{T}. Suppose that a ZZ-error eZe_{Z} happens to the encoded sate (49), then

|u+𝒞C1|𝒞C|w𝒞C(1)wuT|w+eZ.|u+\mathcal{C}_{C}^{\bot}\rangle\rightarrow\frac{1}{\sqrt{|\mathcal{C}_{C}|}}\sum_{w\in\mathcal{C}_{C}}(-1)^{wu^{T}}|w+e_{Z}\rangle. (50)

First we take the syndrome measurement using the inner parity check matrix Hc1H_{c_{1}} to get the inner syndrome information

ΨIiHc1(wi+eZi)T=Hc1eZiT,1in2,\Psi_{\textrm{I}_{i}}\equiv H_{c_{1}}(w_{i}+e_{Z_{i}})^{T}=H_{c_{1}}e_{Z_{i}}^{T},1\leq i\leq n_{2}, (51)

where w=(w1,,wn2)w=(w_{1},\ldots,w_{n_{2}}) and eZ=(eZ1,,eZn2)e_{Z}=(e_{Z_{1}},\ldots,e_{Z_{n_{2}}}). The inner decodings are done first according to the inner syndrome information ΨIi(1in2)\Psi_{\textrm{I}_{i}}(1\leq i\leq n_{2}). They result in n2n_{2} decoded error sequences e¯Zi(1in2)\overline{e}_{Z_{i}}(1\leq i\leq n_{2}), each of length n1n_{1}. Denote by e¯Z=(e¯Z1,,e¯Zn2)\overline{e}_{Z}=(\overline{e}_{Z_{1}},\ldots,\overline{e}_{Z_{n_{2}}}). We add the decoded result e¯Z\overline{e}_{Z} to (50), and then perform the measurement using the parity check matrix [Hc3](Ik1,0)[H_{c_{3}}]\otimes(I_{k_{1}},\textbf{0}) to get the outer syndrome information

ΨO\displaystyle\Psi_{\textrm{O}} \displaystyle\equiv [Hc3](Ik1,0)(w+eZ+e¯Z)T\displaystyle[H_{c_{3}}]\otimes(I_{k_{1}},\textbf{0})(w+e_{Z}+\overline{e}_{Z})^{T} (52)
=\displaystyle= [Hc3](Ik1,0)(eZ+e¯Z)T.\displaystyle[H_{c_{3}}]\otimes(I_{k_{1}},\textbf{0})(e_{Z}+\overline{e}_{Z})^{T}.

Discarding the zero part in ΨO\Psi_{\textrm{O}} due to the 0 sub-block in (Ik1,0)(I_{k_{1}},\textbf{0}), the punctured ΨO\Psi_{\textrm{O}} is then mapped into a sequence Ψ¯O\overline{\Psi}_{\textrm{O}} with elements over field 𝔽qk1\mathbb{F}_{q^{k_{1}}}.

The outer decoding is done with a syndrome-based decoding of C3C_{3} according to the outer syndrome information Ψ¯O\overline{\Psi}_{\textrm{O}}. If the outer decoding is successful, we can obtain a decoded sequence 𝐞Z=(𝐞Z1,,𝐞Zn2)\mathbf{e}^{\prime}_{Z}=(\mathbf{e}^{\prime}_{Z_{1}},\ldots,\mathbf{e}^{\prime}_{Z_{n_{2}}}) with elements over 𝔽qk1\mathbb{F}_{q^{k_{1}}}. Then we map the sequence 𝐞Z\mathbf{e}^{\prime}_{Z} back to the basis field 𝔽q\mathbb{F}_{q}, and derive a decoded error sequence eZ=(eZ1,,eZn2)e^{\prime}_{Z}=(e^{\prime}_{Z_{1}},\ldots,e^{\prime}_{Z_{n_{2}}}) with elements over 𝔽q\mathbb{F}_{q}, where eZi(1in2)e^{\prime}_{Z_{i}}(1\leq i\leq n_{2}) is the sub-sequence of length k1k_{1}. But notice that eZe^{\prime}_{Z} is incomplete due to the 0 sub-block in (Ik1,0)(I_{k_{1}},\textbf{0}). In order to derive the fully-decoded error sequence, we only need to do some operations according to the inner syndrome information in (51). Denote by e~Z=(e~Z1,,e~Zn2)\widetilde{e}_{Z}=(\widetilde{e}_{Z_{1}},\ldots,\widetilde{e}_{Z_{n_{2}}}) and e~Zi=(eZi,fZi)(1in2)\widetilde{e}_{Z_{i}}=(e^{\prime}_{Z_{i}},f_{Z_{i}})(1\leq i\leq n_{2}), where fZif_{Z_{i}} denotes the unknown errors in e~Zi\widetilde{e}_{Z_{i}} and is of length r1r_{1}. Suppose that Hc1=(P1,P2)H_{c_{1}}=(P_{1},P_{2}), where P1P_{1} is of size r1×k1r_{1}\times k_{1} and P2P_{2} is an invertible r1×r1r_{1}\times r_{1} matrix, then we have ΨIi=Hc1e~ZiT=P1eZiT+P2fZiT\Psi_{\textrm{I}_{i}}=H_{c_{1}}\widetilde{e}_{Z_{i}}^{T}=P_{1}e^{\prime T}_{Z_{i}}+P_{2}f_{Z_{i}}^{T} and then fZi=[P21(ΨIiP1eZiT)]Tf_{Z_{i}}=[P_{2}^{-1}(\Psi_{\textrm{I}_{i}}-P_{1}e^{\prime T}_{Z_{i}})]^{T}, where 1in21\leq i\leq n_{2}.

Similar to classical CCs, no matter how many ZZ-errors happen in each sub-block of length n1n_{1}, the outer decoding will not be affected provided that the total number of erroneous sub-blocks does not exceed the error correction ability of the outer code C3C_{3}. A summary of the full decoding process is provided in Algorithm 2. A complexity analysis of the whole decoding process follows.

In terms of decoding XX-errors with the TPC, we first need to map the outer decoding sequence from 𝔽qk1\mathbb{F}_{q^{k_{1}}} to 𝔽q\mathbb{F}_{q} whose running time complexity is O(n2)O(n_{2}) (see Algorithm 1, lines 1111-1515). And it is easy to see that the complexity of the inner syndrome decoding of C1=[n1,r1]C_{1}^{\bot}=[n_{1},r_{1}] is O(1)O(1) since we just need to do e~Xl=(ΦIl,0)\widetilde{e}_{X_{l}}=(\Phi_{\textrm{I}_{l}},\textbf{0}), for 1ln21\leq l\leq n_{2}. Therefore, the inner decoding complexity (IDC) of the TPC is O(n2)O(n_{2}). Recall that the IDC of classical TPCs is Ω(n2an1)(a>1)\Omega(n_{2}a^{n_{1}})(a>1) by using the maximum likelihood (ML) decoding in general, which is enormous if n1n_{1} is large. Even though the inner codes can be efficiently decoded, see, e.g., [52, 34], the IDC of TPCs is still Ω(n2n1b)(b>0)\Omega(n_{2}n_{1}^{b})(b>0). Here, in quantum cases, we consider error degeneracy in the inner decoding and significantly reduce the IDC of TPCs to O(n2)O(n_{2}) in general.

It is easy to see that the outer decoding complexity (ODC) of TPCs is completely determined by the outer constituent codes. Thus if the outer codes can be decoded efficiently, the whole decoding of TPCs is efficient. For example, we let the outer codes be the Reed-Solomon (RS) codes or the generalized Reed-Solomon (GRS) codes that satisfy the dual-containing relationship [64, 63]. They can be decoded efficiently in time polynomial to their block length, e.g., by using the Berlekamp-Massey (BM) algorithm, see [9, 10, 52]. Then the whole decoding of TPCs for correcting XX-errors can be done efficiently in polynomial time.

Algorithm 2 The Decoding Algorithm of AQCTPCs for Correcting ZZ-errors.
1:ΨIi(1in2)\Psi_{\textrm{I}_{i}}(1\leq i\leq n_{2}), ΨO\Psi_{\textrm{O}}, Hc1=(P1,P2)H_{c_{1}}=(P_{1},P_{2}), Hc3H_{c_{3}};
2:The decoded ZZ-error sequence e~Z\widetilde{e}_{Z}.
3:Initialization: e¯Z=,e~Z=\overline{e}_{Z}=\emptyset,\widetilde{e}_{Z}=\emptyset;
4:for  i[1,n2]i\in[1,n_{2}] do
5:     //// Do the inner decoding according to (51).
6:     Hc1e¯ZiT=ΨIiH_{c_{1}}\overline{e}_{Z_{i}}^{T}=\Psi_{\textrm{I}_{i}}, e¯Z=(e¯Z,e¯Zi)\overline{e}_{Z}=(\overline{e}_{Z},\overline{e}_{Z_{i}});
7:end for
8:Map ΨO\Psi_{\textrm{O}} to a sequence Ψ¯O\overline{\Psi}_{\textrm{O}} with elements over field 𝔽qk1\mathbb{F}_{q^{k_{1}}};
9:////Do the outer decoding according to Ψ¯O\overline{\Psi}_{\textrm{O}} and C3C_{3}.
10:𝐞Z=(𝐞Z1,,𝐞Zn2)\mathbf{e}^{\prime}_{Z}=(\mathbf{e}^{\prime}_{Z_{1}},\ldots,\mathbf{e}^{\prime}_{Z_{n_{2}}});
11:for  i[1,n2]i\in[1,n_{2}] do
12:     Map 𝐞Z1\mathbf{e}^{\prime}_{Z_{1}} into a sequence over field 𝔽q\mathbb{F}_{q}, eZie^{\prime}_{Z_{i}};
13:     fZi=[P21(ΨIiP1eZiT)]Tf_{Z_{i}}=[P_{2}^{-1}(\Psi_{\textrm{I}_{i}}-P_{1}e^{\prime T}_{Z_{i}})]^{T};
14:     e~Zi=(eZi,fZi)\widetilde{e}_{Z_{i}}=(e^{\prime}_{Z_{i}},f_{Z_{i}});
15:     e~Z=(e~Z,e~Zi)\widetilde{e}_{Z}=(\widetilde{e}_{Z},\widetilde{e}_{Z_{i}});
16:end for
17:return e~Z\widetilde{e}_{Z};

When correcting ZZ-errors by using the CC, it is easy to see that the decoding complexity is the sum of the complexities of the inner and outer decodings. Thus, the CC is efficiently decodable provided that the constituent codes C1C_{1} and C3C_{3} can be decoded efficiently, e.g., in time polynomial to the block length [9, 10]. Overall, we can conclude that the entire AQCTPC decoding process for correcting both XX-errors and ZZ-errors is efficient provided that the inner and outer constituent codes are efficiently decodable.

Similar to the generalization of classical CCs and TPCs, we can generalize the concatenation scheme of AQCTPCs by combining GCCs with GTPCs. Let A=[nA,k,d]q(1L)A_{\ell}=[n_{A},k_{\ell},d_{\ell}]_{q}(1\leq\ell\leq L) be LL qq-ary linear codes. Let B=[NB,K,D]qkB_{\ell}=[N_{B},K_{\ell},D_{\ell}]_{q^{k_{\ell}}} and C=[NB,M,E]qk(1L)C_{\ell}=[N_{B},M_{\ell},E_{\ell}]_{q^{k_{\ell}}}(1\leq\ell\leq L) be LL qkq^{k_{\ell}}-ary linear codes, respectively. Denote 𝐀=[nA,kA]q(1L)\mathbf{A}_{\ell}=[n_{A},k_{\ell}^{A}]_{q}(1\leq\ell\leq L) by LL linear codes obtained by partitioning the generator matrix of A1A_{1} into LL submatrices. Then we have the following result about the dual-containing relationship between GCCs and GTPCs.

Lemma III.2

Let 𝒞𝒯\mathcal{C}_{\mathcal{T}} be the GTPC of 𝐀\mathbf{A}_{\ell}^{\bot} and B(1L)B_{\ell}(1\leq\ell\leq L), and let 𝒞𝒞\mathcal{C}_{\mathcal{C}} be the GCC of AA_{\ell} and C(1L)C_{\ell}(1\leq\ell\leq L). If BCB_{\ell}^{\bot}\subseteq C_{\ell} for all 1L1\leq\ell\leq L, then there is 𝒞𝒯𝒞𝒞\mathcal{C}_{\mathcal{T}}^{\bot}\subseteq\mathcal{C}_{\mathcal{C}}.

Proof:

We use the notations for GTPCs and GCCs given in Preliminaries. Denote the collection of duals matrix (cdm) (see Ref. [35]) of G1AG_{1}^{A} in (36) by

H^A=cdm(G1A)=(H^1AH^2AH^L+1A)\hat{H}^{A}=\textrm{cdm}(G^{A}_{1})=\left(\begin{array}[]{c}\hat{H}^{A}_{1}\\ \hat{H}^{A}_{2}\\ \vdots\\ \hat{H}^{A}_{L+1}\end{array}\right) (53)

with kA=rank(H^A)=rank(𝐆A)k_{\ell}^{A}=\textrm{rank}(\widehat{H}^{A}_{\ell})=\textrm{rank}(\mathbf{G}_{\ell}^{A}), for 1L1\leq\ell\leq L, and kL+1A=rank(H^L+1A)=nAk1k_{L+1}^{A}=\textrm{rank}(\widehat{H}^{A}_{L+1})=n_{A}-k_{1}. Then the parity check matrix of the GCC 𝒞𝒞\mathcal{C}_{\mathcal{C}} is given by

H𝒞𝒞([H1C]H^1A[HLC]H^LA[INB]H^L+1A).H_{\mathcal{C}_{\mathcal{C}}}\equiv\left(\begin{array}[]{l}[H^{C}_{1}]\otimes\widehat{H}^{A}_{1}\\ \hskip 25.60747pt\vdots\\ [H^{C}_{L}]\otimes\widehat{H}^{A}_{L}\\ [I_{N_{B}}]\otimes\widehat{H}^{A}_{L+1}\end{array}\right). (54)

And the parity check matrix of the GTPC 𝒞𝒯\mathcal{C}_{\mathcal{T}} is given by

H𝒞𝒯([H1Bt]𝐆1A[H2Bt]𝐆2A[HLBt]𝐆LA)H_{\mathcal{C}_{\mathcal{T}}}\equiv\left(\begin{array}[]{c}[H^{B^{t}}_{1}]\otimes\mathbf{G}^{A}_{1}\\ [H^{B^{t}}_{2}]\otimes\mathbf{G}^{A}_{2}\\ \vdots\\ [H^{B^{t}}_{L}]\otimes\mathbf{G}^{A}_{L}\end{array}\right) (55)

According to Ref. [35] and Ref. [45], we know the following two properties about the cdm of G1AG_{1}^{A}:

  • H^A𝐆At=0\hat{H}_{\ell}^{A}\mathbf{G}^{A^{t}}_{\hbar}=0, for all 1L+11\leq\ell\leq L+1, 1L1\leq\hbar\leq{L} and \ell\neq\hbar.

  • H^A𝐆At\hat{H}_{\ell}^{A}\mathbf{G}^{A^{t}}_{\ell} is of full rank, for all 1L1\leq\ell\leq L.

Since H^A𝐆At\hat{H}_{\ell}^{A}\mathbf{G}^{A^{t}}_{\ell} is of full rank, we can always find an invertible matrix UU_{\ell} such that UH^A𝐆AtU_{\ell}\hat{H}_{\ell}^{A}\mathbf{G}^{A^{t}}_{\ell} is an identity matrix, for 1L1\leq\ell\leq L. If BCB_{\ell}^{\bot}\subseteq C_{\ell}, which means that [HC][HBt]T=0[H_{\ell}^{C}][H_{\ell}^{B^{t}}]^{T}=0 for all 1L1\leq\ell\leq L, then there is H𝒞𝒞H𝒞𝒯T=0H_{\mathcal{C}_{\mathcal{C}}}H_{\mathcal{C}_{\mathcal{T}}}^{T}=0 and we have 𝒞𝒯𝒞𝒞\mathcal{C}_{\mathcal{T}}^{\bot}\subseteq\mathcal{C}_{\mathcal{C}}. ∎

Theorem III.2

There exist generalized AQCTPCs with parameters

𝒬=[[NBnA,=1L(K+MNB)kA,dZ/dX]]q,\mathcal{Q}=[[N_{B}n_{A},\sum_{\ell=1}^{L}(K_{\ell}+M_{\ell}-N_{B})k_{\ell}^{A},d_{Z}/d_{X}]]_{q}, (56)

where dZmin{D1d1,,DLdL}d_{Z}\geq\min\{D_{1}d_{1},\ldots,D_{L}d_{L}\}, dXmin{E1,,EL}d_{X}\geq\min\{E_{1},\ldots,E_{L}\}.

Proof:

By combining Lemma II.1 and Lemma III.1, we can obtain the generalized AQCTPCs with parameters

𝒬=[[NBnA,=1L(K+MNB)kA,dZ/dX]]q.\mathcal{Q}=[[N_{B}n_{A},\sum_{\ell=1}^{L}(K_{\ell}+M_{\ell}-N_{B})k_{\ell}^{A},d_{Z}/d_{X}]]_{q}. (57)

We use the GCCs to correct ZZ-errors and thus the ZZ-distance dZd_{Z} of the generalized AQCTPC 𝒬\mathcal{Q} is given by dZmin{D1d1,,DLdL}d_{Z}\geq\min\{D_{1}d_{1},\ldots,D_{L}d_{L}\}. Next we need to compute the XX-distance dXd_{X} of 𝒬\mathcal{Q}. Suppose that there is an XX-error eXe_{X} of length NBnAN_{B}n_{A} in the encoded codeword. Denote

ΦX\displaystyle\Phi_{X} \displaystyle\equiv H𝒞𝒯eXT\displaystyle H_{\mathcal{C}_{\mathcal{T}}}e_{X}^{T} (62)
=\displaystyle= ([H1Bt]𝐆1AeXT[H2Bt]𝐆2AeXT[HLBt]𝐆LAeXT)\displaystyle\left(\begin{array}[]{c}[H^{B^{t}}_{1}]\otimes\mathbf{G}^{A}_{1}\cdot e_{X}^{T}\\ [H^{B^{t}}_{2}]\otimes\mathbf{G}^{A}_{2}\cdot e_{X}^{T}\\ \vdots\\ [H^{B^{t}}_{L}]\otimes\mathbf{G}^{A}_{L}\cdot e_{X}^{T}\end{array}\right)

by the syndrome information obtained by measuring the ancilla and let ΦX[H1Bt]𝐆AeXT\Phi_{\textrm{X}_{\ell}}\equiv[H^{B^{t}}_{1}]\otimes\mathbf{G}^{A}_{\ell}\cdot e_{X}^{T}, 1L1\leq\ell\leq L. Suppose that for some 1ıL1\leq\imath\leq L, we have Eı=min{E1,,EL}E_{\imath}=\min\{E_{1},\ldots,E_{L}\}. Similar to the proof of Theorem III.1, if wt(eX)Eı1\textrm{wt}(e_{X})\leq E_{\imath}-1, then we must have ΦXı0\Phi_{\textrm{X}_{\imath}}\neq 0 and then the error can be detected or ΦXı=0\Phi_{\textrm{X}_{\imath}}=0 but the error is degenerate. Therefore we have dXmin{E1,,EL}d_{X}\geq\min\{E_{1},\ldots,E_{L}\}. ∎

It should be noticed in the proof of Theorem III.2 that, we only give a minimum limit of the distance dXd_{X}. In the practical error correction, e.g., in [50] for classical GCCs, we have LL syndrome information ΦX(1L)\Phi_{\textrm{X}_{\ell}}(1\leq\ell\leq L) to be used for the decoding and then the generalized AQCTPCs can correct many more XX-errors beyond the minimum distance limit in Theorem III.2 in practice.

IV Families of AQCTPCs

In this section, we provide examples of AQCTPCs that outperform best-known AQCs in the literature. Since the inner constituent codes C1C_{1} in AQCTPCs can be chosen arbitrarily, we can get varieties of AQCTPCs by using different types of the constituent codes. Although the construction of AQCTPCs is not restricted by the field size qq, in this section, we mainly focus on binary codes which may be more practical in the future application. For simplicity, if q=2q=2, we omit the subscript in the parameters of quantum and classical codes.

Firstly we use classical single-parity-check codes [9] as the inner constituent codes and we have the following result.

Corollary IV.1

There exists a family of binary AQCTPCs with parameters

𝒬=[[NQ,K𝒬,dZ2d3/dXd2]],\mathcal{Q}=[[N_{Q},K_{\mathcal{Q}},d_{Z}\geq 2d_{3}/d_{X}\geq d_{2}]], (63)

where NQ=(m1+1)n2N_{Q}=(m_{1}+1)n_{2}, K𝒬=m1(n2d2d3+2)K_{\mathcal{Q}}=m_{1}(n_{2}-d_{2}-d_{3}+2), m12m_{1}\geq 2, 2n22m1+12\leq n_{2}\leq 2^{m_{1}}+1, and 2d2+d3n2+22\leq d_{2}+d_{3}\leq n_{2}+2 are all integers.

Proof:

Let C1=[m1+1,m1,2]C_{1}=[m_{1}+1,m_{1},2] be a binary single-parity-check code with even codewords, and let C2=[n2,k2,d2]2m1C_{2}=[n_{2},k_{2},d_{2}]_{2^{m_{1}}} and C3=[n2,k3,d3]2m1C_{3}=[n_{2},k_{3},d_{3}]_{2^{m_{1}}} be two classical GRS codes. It is shown in [64] that if 2n22m1+12\leq n_{2}\leq 2^{m_{1}}+1 and 2d2+d3n2+22\leq d_{2}+d_{3}\leq n_{2}+2, there exists C3C2C_{3}^{\bot}\subseteq C_{2}. ∎

In Corollary IV.1, if we let d2=2d3d_{2}=2d_{3}, then we can also obtain a family of symmetric quantum codes with parameters

𝒬=[[N𝒬,K𝒬,d𝒬d2]],\mathcal{Q}=[[N_{\mathcal{Q}},K_{\mathcal{Q}},d_{\mathcal{Q}}\geq d_{2}]], (64)

where N𝒬=(m1+1)n2N_{\mathcal{Q}}=(m_{1}+1)n_{2}, K𝒬=m1(n23d2/2+2)K_{\mathcal{Q}}=m_{1}(n_{2}-3d_{2}/2+2), 2d22(n2+2)/32\leq d_{2}\leq 2(n_{2}+2)/3. We first compare (64) with QBCH codes in [65]. It is known that the minimum distance of QBCH codes of length Θ(N𝒬)\Theta(N_{\mathcal{Q}}) is upper bounded by cN𝒬c\sqrt{N_{\mathcal{Q}}} (c>0c>0 is a constant). On the other hand, the minimum distance of our codes is upper bounded by 2(n2+2)/32(n_{2}+2)/3 which is larger than cN𝒬c\sqrt{N_{\mathcal{Q}}} provided that n29c2(m1+1)/44n_{2}\geq 9c^{2}(m_{1}+1)/4-4.

For example, let n2=2m1+1n_{2}=2^{m_{1}}+1, then the minimum distance of our codes can be as large as 2N𝒬/(3log(N𝒬))2N_{\mathcal{Q}}/(3\log(N_{\mathcal{Q}})), which is almost linear to the length N𝒬N_{\mathcal{Q}}, while the dimension is larger than log(N𝒬)\log(N_{\mathcal{Q}}). If we let d2=O((N𝒬)c1),d_{2}=O((N_{\mathcal{Q}})^{c_{1}}), where 1/2<c1<11/2<c_{1}<1 is any constant, then the rate of our codes

R𝒬=K𝒬N𝒬=m1m1+1(13d22n2+2n2)R_{\mathcal{Q}}=\frac{K_{\mathcal{Q}}}{N_{\mathcal{Q}}}=\frac{m_{1}}{m_{1}+1}(1-\frac{3d_{2}}{2n_{2}}+\frac{2}{n_{2}}) (65)

is equal to 11 as n2=2m1+1n_{2}=2^{m_{1}}+1 goes to infinity and d𝒬d2=O((N𝒬)c1)d_{\mathcal{Q}}\geq d_{2}=O((N_{\mathcal{Q}})^{c_{1}}). In [65], the rate of binary QBCH codes of CSS type is given by

RQBCH=1m(δ1)N,R_{QBCH}=1-\frac{m(\delta-1)}{N}, (66)

where NN is the block length, m=ordN(2)m=\textrm{ord}_{N}(2) is the multiplicative order of 22 modulo NN, and 2δN(2m/21)/(2m1)=O(N)2\leq\delta\leq N(2^{\lceil m/2\rceil}-1)/(2^{m}-1)=O(\sqrt{N}). It is easy to see that RQBCHR_{QBCH} is also asymptotic to 11 as NN goes to infinity. However our codes have much better minimum distance upper bound than QBCH codes.

TABLE I: Comparison of binary AQCTPCs with the binary extension of asymmetric QRS codes in [29]. The AQCTPCs are derived from Corollary IV.1. The ``"``-" in the table means that there do not exist AQCs with comparable parameters in Ref. [29]. In quantum codes, an AQC with parameters [[n,0,dZ/dX]][[n,0,d_{Z}/d_{X}]] of dimension 11 is a pure state which can correct all XX-errors of weight up to (dX1)/2\lfloor(d_{X}-1)/2\rfloor and all ZZ-errors of weight up to (dZ1)/2\lfloor(d_{Z}-1)/2\rfloor [66, 27]. To facilitate notation, the numbers of ZZ- and XX-distance of the AQCs are the lower bound.
m1m_{1} AQCTPCs Ref. [29] m1m_{1} AQCTPCs Ref. [29] m1m_{1} AQCTPCs Ref. [29]
66 [[378,6,104/3]][[378,6,104/3]] - 77 [[888,7,218/3]][[888,7,218/3]] - 88 [[2034,8,448/3]][[2034,8,448/3]] -
66 [[378,12,102/3]][[378,12,102/3]] - 77 [[888,14,216/3]][[888,14,216/3]] - 88 [[2034,16,446/3]][[2034,16,446/3]] -
66 [[378,132,62/3]][[378,132,62/3]] [[378,0,62/3]][[378,0,62/3]] 77 [[888,329,126/3]][[888,329,126/3]] [[889,0,126/3]][[889,0,126/3]] 88 [[2034,784,254/3]][[2034,784,254/3]] [[2040,0,254/3]][[2040,0,254/3]]
66 [[378,138,60/3]][[378,138,60/3]] [[378,12,60/3]][[378,12,60/3]] 77 [[888,336,124/3]][[888,336,124/3]] [[889,14,124/3]][[889,14,124/3]] 88 [[2034,792,252/3]][[2034,792,252/3]] [[2040,16,252/3]][[2040,16,252/3]]
\vdots \vdots \vdots \vdots \vdots \vdots \vdots \vdots \vdots
66 [[378,258,20/3]][[378,258,20/3]] [[378,252,20/3]][[378,252,20/3]] 77 [[888,651,34/3]][[888,651,34/3]] [[889,644,34/3]][[889,644,34/3]] 88 [[2034,1560,60/3]][[2034,1560,60/3]] [[2040,1552,60/3]][[2040,1552,60/3]]
66 [[378,6,100/5]][[378,6,100/5]] - 77 [[888,7,214/5]][[888,7,214/5]] - 88 [[2034,8,444/5]][[2034,8,444/5]] -
66 [[378,12,98/5]][[378,12,98/5]] - 77 [[888,14,212/5]][[888,14,212/5]] - 88 [[2034,16,442/5]][[2034,16,442/5]] -
66 [[378,126,60/5]][[378,126,60/5]] [[378,0,60/5]][[378,0,60/5]] 77 [[888,322,124/5]][[888,322,124/5]] [[889,0,124/5]][[889,0,124/5]] 88 [[2034,776,252/5]][[2034,776,252/5]] [[2040,0,252/5]][[2040,0,252/5]]
66 [[378,132,58/5]][[378,132,58/5]] [[378,12,58/5]][[378,12,58/5]] 77 [[888,329,122/5]][[888,329,122/5]] [[889,14,122/5]][[889,14,122/5]] 88 [[2034,784,250/5]][[2034,784,250/5]] [[2040,16,250/5]][[2040,16,250/5]]
\vdots \vdots \vdots \vdots \vdots \vdots \vdots \vdots \vdots
66 [[378,246,20/5]][[378,246,20/5]] [[378,240,20/5]][[378,240,20/5]] 77 [[888,637,34/5]][[888,637,34/5]] [[889,630,34/5]][[889,630,34/5]] 88 [[2034,1544,60/5]][[2034,1544,60/5]] [[2040,1536,60/5]][[2040,1536,60/5]]

Then we compare AQCTPCs in Corollary IV.1 with the extension of asymmetric quantum MDS codes in [29]. For simplicity, we consider the extension of binary asymmetric QRS codes in [29] with parameters

[[N~𝒬,K~𝒬,d~Zd~1/d~Xd~2]],[[\widetilde{N}_{\mathcal{Q}},\widetilde{K}_{\mathcal{Q}},\widetilde{d}_{Z}\geq\widetilde{d}_{1}/\widetilde{d}_{X}\geq\widetilde{d}_{2}]], (67)

where N~𝒬=m1(2m11)\widetilde{N}_{\mathcal{Q}}=m_{1}(2^{m_{1}}-1), K~𝒬=m1(2m1d~1d~2+1)\widetilde{K}_{\mathcal{Q}}={m_{1}}(2^{m_{1}}-\widetilde{d}_{1}-\widetilde{d}_{2}+1), 2d~1+d~22m1+12\leq\widetilde{d}_{1}+\widetilde{d}_{2}\leq 2^{m_{1}}+1. In order to make a fair comparison between them, we let n2=m1(2m11)/(m1+1)n_{2}=\lfloor m_{1}(2^{m_{1}}-1)/(m_{1}+1)\rfloor in Corollary IV.1 so that they have an equal or a similar block length. Let d~1=2d3\widetilde{d}_{1}=2d_{3} and d~2=d2\widetilde{d}_{2}=d_{2}, then it is easy to see that if d3(2m11)/(m1+1)d_{3}\geq(2^{m_{1}}-1)/(m_{1}+1), the dimension of AQCTPCs in (63) is larger than that of AQCs in (67). Further, AQCTPCs of length NQ=Θ(m1(2m11))N_{Q}=\Theta(m_{1}(2^{m_{1}}-1)) in Corollary IV.1 can be decoded efficiently in polynomial time and we have the following result.

Corollary IV.2

There exist AQCTPCs of length NQ=Θ(m1(2m11))N_{Q}=\Theta(m_{1}(2^{m_{1}}-1)) which can be decoded in O(NQ2/logNQ)O(N_{Q}^{2}/\log N_{Q}) arithmetic operations.

Proof:

First we consider the complexity of the decoding of XX-errors. The IDC of TPCs is O(2m1)O(2^{m_{1}}) according to the proof of Theorem III.1. It is known that GRS codes of length n2=Θ(2m1)n_{2}=\Theta(2^{m_{1}}) can be decoded in O(n22)O(n_{2}^{2}) field operations by using the BM algorithm [9, 67]. Therefore the total decoding of TPCs requires O(n22)O(n_{2}^{2}) arithmetic operations.

Then we consider the decoding of ZZ-errors by using the CC. If we use Algorithm 2 to do the decoding, we can only decode up to (2d31)/4\lfloor(2d_{3}-1)/4\rfloor numbers of ZZ-errors. In order to decode any ZZ-error of weight smaller than half the minimum distance 2d32d_{3}, we use the inner code C1=[m1+1,m1,2]C_{1}=[m_{1}+1,m_{1},2] to do the error detection for each sub-block of the CC. Suppose we can detect t1t_{1} erroneous sub-blocks and suppose that there exist t2t_{2} erroneous sub-blocks which are undetectable. As a result, there are t1t_{1} erroneous positions which are known in the error sequence 𝐞Z\mathbf{e}_{Z} that corresponds to the outer code and, t2t_{2} erroneous positions that are unknown. It is easy to see that if the weight of the ZZ-error is smaller than d3d_{3}, we must have 0t1+2t22d310\leq t_{1}+2t_{2}\leq 2d_{3}-1. Then we can decode the error sequence 𝐞Z\mathbf{e}_{Z} with t1t_{1} errors in known locations and t2t_{2} errors which are unknown by using the BM algorithm in O(n22)O(n_{2}^{2}) arithmetic operations [9, 68]. Therefore the total complexity of decoding ZZ-errors is O(n22)O(n_{2}^{2}). Overall, the whole decoding of AQCTPCs of length NQ=Θ(m1(2m11))N_{Q}=\Theta(m_{1}(2^{m_{1}}-1)) can be fulfilled in O(NQ2/logNQ)O(N_{Q}^{2}/\log N_{Q}) arithmetic operations. ∎

In Table I, we make a comparison between parameters of AQCTPCs and the results in [29]. It is shown that AQCTPCs have a relatively large ZZ-distance and can have much better parameters than the codes in [29]. Further, the decoding complexity of AQCs in [29] of length N~Q=m1(2m11)\widetilde{N}_{Q}=m_{1}(2^{m_{1}}-1) is dominated by the RS code decoding whose complexity scales as O(n~22)O(\widetilde{n}_{2}^{2}) by using the BM decoder, where n~2=2m11\widetilde{n}_{2}=2^{m_{1}}-1. Then the decoding complexity of AQCs in [29] is O(N~Q2/logN~Q)O(\widetilde{N}_{Q}^{2}/\log\widetilde{N}_{Q}). It is shown that both AQCTPCs in Corollary IV.2 and AQCs in [29] can be decoded efficiently in polynomial arithmetic operations. However, our codes have much better parameters than the codes in [29].

Next we use classical Simplex codes [9] that have a large minimum distance as the inner constituent codes. We show that Simplex codes can result in AQCTPCs with a large ZZ-distance dZd_{Z}.

Corollary IV.3

There exists a family of binary AQCTPCs with parameters

𝒬=[[N𝒬,K𝒬,dZ2m11d3/dXd2]],\mathcal{Q}=[[N_{\mathcal{Q}},K_{\mathcal{Q}},d_{Z}\geq 2^{m_{1}-1}d_{3}/d_{X}\geq d_{2}]], (68)

where N𝒬=(2m11)n2N_{\mathcal{Q}}=(2^{m_{1}}-1)n_{2}, K𝒬=m1(n2d2d3+2),K_{\mathcal{Q}}=m_{1}(n_{2}-d_{2}-d_{3}+2),m12m_{1}\geq 2, 2n22m1+12\leq n_{2}\leq 2^{m_{1}}+1, and 2d2+d3n2+22\leq d_{2}+d_{3}\leq n_{2}+2.

Proof:

The proof proceeds in the same way as in Corollary IV.1 except we use classical Simplex codes C1=[2m11,m1,2m11]C_{1}=[2^{m_{1}}-1,m_{1},2^{m_{1}-1}] as the inner constituent code. ∎

In particular, if we take n2=2m1+1n_{2}=2^{m_{1}}+1 and let d2=O(2cm1)d_{2}=O(2^{cm_{1}}) and d3=2m1+2d2d_{3}=2^{m_{1}}+2-d_{2}, where 0<c<10<c<1 is a constant, then we have

𝒬=[[N𝒬,m1,dZ/dX]],\mathcal{Q}=[[N_{\mathcal{Q}},m_{1},d_{Z}/d_{X}]], (69)

where N𝒬=22m11N_{\mathcal{Q}}=2^{2m_{1}}-1, dZ2m11(2m1+2d2)d_{Z}\geq 2^{m_{1}-1}(2^{m_{1}}+2-d_{2}), and dXd2d_{X}\geq d_{2}. It is easy to see that dZ/N𝒬1/2d_{Z}/N_{\mathcal{Q}}\rightarrow 1/2 as m1m_{1}\rightarrow\infty and 𝒬\mathcal{Q} can meet the quantum Gilbert-Varshamov (GV) bound for AQCs in [69]. Therefore we get a family of AQCTPCs with a very large ZZ-distance dZd_{Z} which is of approximately half the block length, at the same time, the dimension and the XX-distance dXd_{X} can continue increasing as the block length goes to infinity. In Table II, we list several AQCTPCs with a large ZZ-distance dZd_{Z} which is of approximately half the block length. In particular, if dX=2d_{X}=2, then the ZZ-distance dZd_{Z} of AQCTPCs in Corollary IV.3 could be larger than half the block length.

TABLE II: Construction of binary AQCTPCs whose ZZ-distance dZd_{Z} is approximately half of the block length by using binary Simplex codes as inner codes C1C_{1}. The outer codes C2C_{2} and C3C_{3} are dual-containing MDS codes derived from [64]. To facilitate notation, the numbers of ZZ- and XX-distance of the AQCTPCs are the lower bound.
m1m_{1} d2d_{2} AQCTPCs m1m_{1} d2d_{2} AQCTPCs
22 22 [[15,2,8/2]][[15,2,8/2]] 66 44 [[4095,6,1984/4]][[4095,6,1984/4]]
22 33 [[15,2,6/3]][[15,2,6/3]] 66 55 [[4095,6,1952/5]][[4095,6,1952/5]]
33 22 [[63,3,32/2]][[63,3,32/2]] 66 66 [[4095,6,1920/6]][[4095,6,1920/6]]
44 22 [[255,4,128/2]][[255,4,128/2]] 66 77 [[4095,6,1888/7]][[4095,6,1888/7]]
55 22 [[1023,5,512/2]][[1023,5,512/2]] 77 22 [[16383,7,8192/2]][[16383,7,8192/2]]
55 33 [[1023,5,496/3]][[1023,5,496/3]] 77 33 [[16383,7,8128/3]][[16383,7,8128/3]]
55 44 [[1023,5,480/4]][[1023,5,480/4]] 77 44 [[16383,7,8064/4]][[16383,7,8064/4]]
55 55 [[1023,5,464/5]][[1023,5,464/5]] 77 55 [[16383,7,8000/5]][[16383,7,8000/5]]
66 22 [[4095,6,2048/2]][[4095,6,2048/2]] 77 66 [[16383,7,7936/6]][[16383,7,7936/6]]
66 33 [[4095,6,2016/3]][[4095,6,2016/3]] 77 77 [[16383,7,7827/7]][[16383,7,7827/7]]

In addition, if we use linear codes in [47] with best known parameters as the inner codes, we can get many new AQCTPCs with a relatively large ZZ-distance dZd_{Z} and very flexible code parameters. We list some of them in Table III. The ZZ-distances of the last four codes in Table III are much larger than half the block length, respectively. All the AQCTPCs in Table II and Table III have the largest ZZ-distance dZd_{Z} compared to existed AQCs with comparable block length and XX-distance dXd_{X}.

TABLE III: Construction of binary AQCTPCs with a large ZZ-distance by using some best known linear codes in Ref. [47] as inner codes. The outer codes C2=[n2,k2,d2]2k1C_{2}=[n_{2},k_{2},d_{2}]_{2^{k_{1}}} and C3=[n2,k3,d3]2k1C_{3}=[n_{2},k_{3},d_{3}]_{2^{k_{1}}} are dual-containing MDS codes with optimal parameters in [64], respectively. To facilitate notation, the numbers of ZZ- and XX-distance of the AQCTPCs in this table are the lower bound.
C1C_{1} in Ref. [47] {n2,d2,d3}\{n_{2},d_{2},d_{3}\} in Theorem III.1 AQCTPCs
[7,3,4][7,3,4] {9,3,7}\{9,3,7\} [[63,3,28/3]][[63,3,28/3]]
[7,3,4][7,3,4] {9,5,5}\{9,5,5\} [[63,3,20/5]][[63,3,20/5]]
[8,4,4][8,4,4] {17,3,15}\{17,3,15\} [[136,4,60/3]][[136,4,60/3]]
[8,4,4][8,4,4] {17,5,13}\{17,5,13\} [[136,4,52/5]][[136,4,52/5]]
[12,4,6][12,4,6] {17,3,15}\{17,3,15\} [[204,4,90/3]][[204,4,90/3]]
[12,4,6][12,4,6] {17,5,13}\{17,5,13\} [[204,4,78/5]][[204,4,78/5]]
[15,4,8][15,4,8] {17,3,15}\{17,3,15\} [[255,4,120/3]][[255,4,120/3]]
[15,4,8][15,4,8] {17,5,13}\{17,5,13\} [[255,4,104/5]][[255,4,104/5]]
[16,5,8][16,5,8] {33,3,31}\{33,3,31\} [[528,5,248/3]][[528,5,248/3]]
[16,5,8][16,5,8] {33,5,29}\{33,5,29\} [[528,5,232/5]][[528,5,232/5]]
[21,5,10][21,5,10] {33,3,31}\{33,3,31\} [[693,5,310/3]][[693,5,310/3]]
[21,5,10][21,5,10] {33,5,29}\{33,5,29\} [[693,5,290/5]][[693,5,290/5]]
[22,6,9][22,6,9] {65,3,63}\{65,3,63\} [[1430,6,567/3]][[1430,6,567/3]]
[22,6,9][22,6,9] {65,5,61}\{65,5,61\} [[1430,6,549/5]][[1430,6,549/5]]
[24,7,10][24,7,10] {129,3,127}\{129,3,127\} [[3096,7,1270/3]][[3096,7,1270/3]]
[24,7,10][24,7,10] {129,5,125}\{129,5,125\} [[3096,7,1250/5]][[3096,7,1250/5]]
[63,3,36][63,3,36] {9,2,8}\{9,2,8\} [[567,3,288/2]][[567,3,288/2]]
[127,3,72][127,3,72] {9,2,8}\{9,2,8\} [[1143,3,576/2]][[1143,3,576/2]]
[255,3,145][255,3,145] {9,2,8}\{9,2,8\} [[2295,3,1160/2]][[2295,3,1160/2]]
[255,4,136][255,4,136] {17,2,16}\{17,2,16\} [[4335,4,2176/2]][[4335,4,2176/2]]

If we use asymptotically good linear codes that can attain the classical GV bound as the inner codes C1C_{1}, we can get the following asymptotic result about AQCTPCs.

Corollary IV.4

There exists a family of qq-ary AQCTPCs with parameters

𝒬=[[N𝒬=n1n2,K𝒬,dZ/dX]]q\mathcal{Q}=[[N_{\mathcal{Q}}=n_{1}n_{2},K_{\mathcal{Q}},d_{Z}/d_{X}]]_{q} (70)

such that

K𝒬N𝒬\displaystyle\frac{K_{\mathcal{Q}}}{N_{\mathcal{Q}}} \displaystyle\geq (1Hq(d1n1))(1d2n2d3n2),\displaystyle\left(1-H_{q}\left(\frac{d_{1}}{n_{1}}\right)\right)\left(1-\frac{d_{2}}{n_{2}}-\frac{d_{3}}{n_{2}}\right), (71)
dZ\displaystyle d_{Z} \displaystyle\geq d1d3,\displaystyle d_{1}d_{3}, (72)
dX\displaystyle d_{X} \displaystyle\geq d2,\displaystyle d_{2}, (73)

where

Hq(x)=xlogq(q1)xlogqx(1x)logq(1x)H_{q}(x)=x\log_{q}(q-1)-x\log_{q}x-(1-x)\log_{q}(1-x) (74)

is the qq-ary entropy function, 2d1n12\leq d_{1}\leq n_{1}, 2d2+d3n22\leq d_{2}+d_{3}\leq n_{2}, and n1,n2n_{1},n_{2}\rightarrow\infty.

Proof:

We choose C1=[n1,k1,d1]qC_{1}=[n_{1},k_{1},d_{1}]_{q} to be asymptotically good linear codes meeting the GV bound, i.e.,

k1n11Hq(d1n1).\frac{k_{1}}{n_{1}}\geq 1-H_{q}(\frac{d_{1}}{n_{1}}). (75)

Let C2=[n2,k2,d2]qk1C_{2}=[n_{2},k_{2},d_{2}]_{q^{k_{1}}} and C3=[n2,k3,d3]qk1C_{3}=[n_{2},k_{3},d_{3}]_{q^{k_{1}}} be two MDS codes such that C2C3C_{2}^{\bot}\subseteq C_{3}. Denote by N𝒬=n1n2N_{\mathcal{Q}}=n_{1}n_{2}, K𝒬=k1(k2+k3n2)K_{\mathcal{Q}}=k_{1}(k_{2}+k_{3}-n_{2}), dZ=d1d3d_{Z}=d_{1}d_{3} and dX=d2d_{X}=d_{2}. According to Theorem III.1, we can get the asymptotic result in (71) as n1,n2n_{1},n_{2}\rightarrow\infty. ∎

On the other hand, besides using MDS codes as the outer constituent codes, we can also use AG codes that satisfy the dual-containing constraint [70, 44]. We will adopt the notation of AG codes used in [71, 44].

Theorem IV.1 ([44])

Let 𝒳\mathcal{X} be an algebraic curve over 𝔽q\mathbb{F}_{q} of genus gg with at least nn rational points. For any 2g2<s<l<n2g-2<s<l<n, there exist two qq-ary AG codes C1=[n,k1,d1]qC_{1}=[n,k_{1},d_{1}]_{q} and C2=[n,k2,d2]qC_{2}=[n,k_{2},d_{2}]_{q} with k1=nk2+lsk_{1}=n-k_{2}+l-s such that C2C1C_{2}^{\bot}\subset C_{1}, where d1s2g+2d_{1}\geq s-2g+2 and d2nld_{2}\geq n-l.

For q=2m(m2)q=2^{m}(m\geq 2), there is the following asymptotic result about asymmetric QAG codes in [44].

Theorem IV.2 ([44])

Let q=2mq=2^{m} and let 0δx,δz10\leq\delta_{x},\delta_{z}\leq 1 such that δx+δz12/(2m1)\delta_{x}+\delta_{z}\leq 1-2/(\sqrt{2^{m}}-1), then there exists a family of asymptotically good asymmetric QAG codes 𝒬\mathcal{Q} satisfying

R𝒬(δx,δz)1δxδz22m1.R_{\mathcal{Q}}(\delta_{x},\delta_{z})\geq 1-\delta_{x}-\delta_{z}-\frac{2}{\sqrt{2^{m}}-1}. (76)

By using similar code extension methods in [70] and the CSS construction of AQCs, one can obtain asymptotically good binary extensions of asymmetric QAG codes as follows.

Corollary IV.5

Let q=2mq=2^{m} and let 0δx,δz10\leq\delta_{x},\delta_{z}\leq 1 such that δx+δz12/(2m1)\delta_{x}+\delta_{z}\leq 1-2/(\sqrt{2^{m}}-1), then there exists a family of asymptotically good binary asymmetric QAG codes 𝒬\mathcal{Q} satisfying

R𝒬(δx,δz)1mδxmδz22m1.R_{\mathcal{Q}}(\delta_{x},\delta_{z})\geq 1-m\delta_{x}-m\delta_{z}-\frac{2}{\sqrt{2^{m}}-1}. (77)
Proof:

The asymptotic bound in (77) can be obtained from Ref. [70] and Theorem IV.2. ∎

Denote by C1=[n1,k1,d1]C_{1}=[n_{1},k_{1},d_{1}] a binary linear code and let 𝒳\mathcal{X} be an algebraic curve over 𝔽2k1\mathbb{F}_{2^{k_{1}}} of genus gg with at least n2n_{2} rational points. Then we have the following result for constructing AQCTPCs by using AG codes as outer codes.

Proposition IV.1

There exists a family of binary AQCTPCs with parameters

𝒬=[[N𝒬,K𝒬,dZd1d3/dXd2]],\mathcal{Q}=[[N_{\mathcal{Q}},K_{\mathcal{Q}},d_{Z}\geq d_{1}d_{3}/d_{X}\geq d_{2}]], (78)

where N𝒬=n1n2N_{\mathcal{Q}}=n_{1}n_{2}, K𝒬=k1(ls)K_{\mathcal{Q}}=k_{1}(l-s), 2g2<s<l<n22g-2<s<l<n_{2}, d2s2g+2d_{2}\geq s-2g+2 and d3n2ld_{3}\geq n_{2}-l. As n2n_{2} goes to infinity, the following asymptotic bound of AQCTPCs holds

R𝒬k1n1(1n1d1δzn1δx22k11),R_{\mathcal{Q}}\geq\frac{k_{1}}{n_{1}}\left(1-\frac{n_{1}}{d_{1}}\delta_{z}-n_{1}\delta_{x}-\frac{2}{\sqrt{2^{k_{1}}}-1}\right), (79)

where R𝒬=K𝒬/N𝒬R_{\mathcal{Q}}=K_{\mathcal{Q}}/N_{\mathcal{Q}}, δX\delta_{X} and δZ\delta_{Z} are the relatively minimum distance of 𝒬\mathcal{Q}.

Proof:

According to Theorem IV.1, we know that there exist two 2k12^{k_{1}}-ary AG codes C2=[n2,k2,d2]2k1C_{2}=[n_{2},k_{2},d_{2}]_{2^{k_{1}}} and C3=[n2,k3,d3]2k1C_{3}=[n_{2},k_{3},d_{3}]_{2^{k_{1}}} such that C2C3C_{2}^{\bot}\subseteq C_{3}, where k2=n2k3+lsk_{2}=n_{2}-k_{3}+l-s and 2g2<s<l<n22g-2<s<l<n_{2}. Then from Theorem III.1, we can construct a family of binary AQCTPCs with parameters 𝒬=[[N𝒬=n1n2,K𝒬=k1(ls),dZd1d3/dXd2]]\mathcal{Q}=[[N_{\mathcal{Q}}=n_{1}n_{2},K_{\mathcal{Q}}=k_{1}(l-s),d_{Z}\geq d_{1}d_{3}/d_{X}\geq d_{2}]], where d2s2g+2d_{2}\geq s-2g+2 and d3n2ld_{3}\geq n_{2}-l. Denote by δX\delta_{X} and δZ\delta_{Z} the relatively minimum distance of 𝒬\mathcal{Q}, i.e., δX=dX/N𝒬\delta_{X}=d_{X}/N_{\mathcal{Q}} and δZ=dZ/N𝒬\delta_{Z}=d_{Z}/N_{\mathcal{Q}}. The asymptotic result can be obtained by Theorem IV.2. ∎

In Fig. 22, we compare the asymptotic bound of AQCTPCs in (79) with that of asymmetric QAG codes in (77). We also give the GV bound of CSS codes for comparisons. In order to get as good as possible asymptotic curves for AQCTPCs, we use different inner constituent codes to generate several piecewise asymptotic curves and then joint them together. In Fig. 22(a), we can see that the asymptotic bound of AQCTPCs is better than that for asymmetric QAG codes when the relative minimum distance 0.02<δZ<0.060.02<\delta_{Z}<0.06. As the the asymmetry θ=dZ/dX\theta=d_{Z}/d_{X} grows, it is shown in Fig. 22(b) and Fig. 22(c) that AQCTPCs perform much better than asymmetric QAG codes.

Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Figure 2: The comparison among the asymptotic bound for AQCTPCs, the GV bound for CSS codes and the asymptotic bound for asymmetric QAGs. The asymmetry parameter θ=dZ/dX\theta=d_{Z}/d_{X} is chosen as 1,10,1001,10,100 in (a), (b), and (c), respectively. We use the relative minimum distance δz=dZ/N\delta_{z}=d_{Z}/N as the horizontal axis and use code rate R=K/NR=K/N as the vertical axis. In order to optimize the asymptotic curves for AQCTPCs, we use different constituent code parameters in Ref. [47] to generate several piecewise asymptotic curves for AQCTPCs and then we joint them together.

V Conclusions and Discussions

In this paper, we proposed the construction of asymmetric quantum concatenated and tensor product codes that combine the classical CCs and TPCs. The CCs correct the ZZ-errors and the TPCs correct the XX-errors. Compared to concatenation schemes like CQCs and QTPCs, the AQCTPC construction only requires that the outer constituent codes satisfy the dual-containing constraint; the inner constituent codes can be chosen freely. Further, AQCTPCs are highly degenerate codes and, as a result, they passively correct many XX-errors. To avoid issues with decoding, we present efficient syndrome-based decoding algorithms and show that if the inner and outer constituent codes are efficiently decodable, then the AQCTPC is also efficiently decodable. Particularly, the inner decoding complexity of TPCs is significantly reduced to O(n2)O(n_{2}) in general. Further, we generalized the AQCTPC concatenation scheme by using GCCs and GTPCs.

To showcase the power of the method, we constructed many state-of-the-art AQCs. Through these constructions, we demonstrate how AQCTPCs can be superior to QBCH codes or asymmetric QAG codes as the block length goes to infinity; how they can have better parameters than the binary extension of asymmetric QRS codes; and how varieties of AQCTPCs with a large ZZ-distance dZd_{Z} can be designed by using some best known linear codes in [47]. In particular, we constructed a family of AQCTPCs with a ZZ-distance dZd_{Z} of approximately half the block length, and meanwhile with dimension and XX-distance dXd_{X} that continue to increase as the block length goes to infinity. If dX=2d_{X}=2, we obtain the first family of binary AQCs with the ZZ-distance larger than half the block length.

Our codes are practical to quantum communication channels with a large asymmetry and may be used in fault-tolerant quantum computation to deal with highly biased noise. In the next work, we may consider the construction and decoding of AQCTPCs by using some other constituent codes, e.g., the Polar codes.

Acknowledgment

The authors would like to thank the Editor and the referees for their valuable comments that are helpful to improve the presentation of their article. J. Fan thanks Prof. Yonghui Li and Prof. Martin Bossert for some earlier communications about tensor product codes.

References

  • [1] L. Ioffe and M. Mézard, “Asymmetric quantum error-correcting codes,” Phys. Rev. A, vol. 75, p. 032345, 2007.
  • [2] D. K. Tuckett, S. D. Bartlett, and S. T. Flammia, “Ultrahigh error threshold for surface codes with biased noise,” Phys. Rev. Lett., vol. 120, no. 5, p. 050505, 2018.
  • [3] H. Häffner, C. F. Roos, and R. Blatt, “Quantum computing with trapped ions,” Phys. Rep., vol. 469, no. 4, pp. 155–203, 2008.
  • [4] H. O. H. Churchill, F. Kuemmeth, J. W. Harlow, A. J. Bestwick, E. I. Rashba, K. Flensberg, C. H. Stwertka, T. Taychatanapat, S. K. Watson, and C. M. Marcus, “Relaxation and dephasing in a two-electron C13{}^{13}\textbf{C} nanotube double quantum dot,” Phys. Rev. Lett., vol. 102, no. 16, p. 166802, 2009.
  • [5] A. M. Steane, “Simple quantum error-correcting codes,” Phys. Rev. A, vol. 54, no. 6, p. 4741, 1996.
  • [6] P. Aliferis and J. Preskill, “Fault-tolerant quantum computation against biased noise,” Phys. Rev. A, vol. 78, p. 052331, 2008.
  • [7] P. K. Sarvepalli, A. Klappenecker, and M. Rötteler, “Asymmetric quantum codes: constructions, bounds and performance,” in Proc. Roy. Soc. A, vol. 465, 2009, pp. 1645–1672.
  • [8] P. Brooks and J. Preskill, “Fault-tolerant quantum computation with asymmetric Bacon-Shor codes,” Phys. Rev. A, vol. 87, no. 3, p. 032310, 2013.
  • [9] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes.   Amsterdam: The Netherlands: North-Holland, 1981.
  • [10] S. Lin and D. J. Costello, Error Control Coding: Fundamentals and Applications, 2nd ed.   Upper Saddle River, NJ: Prentice-Hall, Inc., 2004.
  • [11] M. H. Azmi, J. Li, J. Yuan, and R. Malaney, “LDPC codes for soft decode-and-forward in half-duplex relay channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 8, pp. 1402–1413, 2013.
  • [12] J. Li, W. Chen, Z. Lin, and B. Vucetic, “Design of physical layer network coded LDPC code for a multiple-access relaying system,” IEEE Commun. Lett., vol. 17, no. 4, pp. 749–752, 2013.
  • [13] Y. Yu, W. Chen, J. Li, X. Ma, and B. Bai, “Generalized binary representation for the nonbinary LDPC code with decoder design,” IEEE Trans. Commun., vol. 62, no. 9, pp. 3070–3083, 2014.
  • [14] J. Li, J. Yuan, R. Malaney, M. H. Azmi, and M. Xiao, “Network coded LDPC code design for a multi-source relaying system,” IEEE Trans. Wirel. Commun., vol. 10, no. 5, pp. 1538–1551, 2011.
  • [15] C. Galindo, F. Hernando, R. Matsumoto, and D. Ruano, “Asymmetric entanglement-assisted quantum error-correcting codes and BCH codes,” IEEE Access, vol. 8, pp. 18 571–18 579, 2020.
  • [16] T. Brun, I. Devetak, and M.-H. Hsieh, “Correcting quantum errors with entanglement,” Science, vol. 314, no. 5798, pp. 436–439, 2006.
  • [17] M.-H. Hsieh, W.-T. Yen, and L.-Y. Hsu, “High performance entanglement-assisted quantum LDPC codes need little entanglement,” IEEE Trans. Inf. Theory, vol. 57, no. 3, pp. 1761–1769, 2011.
  • [18] M. M. Wilde, M.-H. Hsieh, and Z. Babar, “Entanglement-assisted quantum Turbo codes,” IEEE Trans. Inf. Theory, vol. 60, no. 2, pp. 1203–1222, 2013.
  • [19] M.-H. Hsieh and M. M. Wilde, “Entanglement-assisted communication of classical and quantum information,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4682–4704, 2010.
  • [20] M.-H. Hsieh, T. A. Brun, and I. Devetak, “Entanglement-assisted quantum quasicyclic low-density parity-check codes,” Phys. Rev. A, vol. 79, no. 3, p. 032340, 2009.
  • [21] J. Fan, H. Chen, and J. Xu, “Constructions of qq-ary entanglement-assisted quantum MDS codes with minimum distance greater than qq+ 1,” Quantum Inf. Comput., vol. 16, no. 5-6, pp. 423–434, 2016.
  • [22] D. K. Tuckett, S. D. Bartlett, S. T. Flammia, and B. J. Brown, “Fault-tolerant thresholds for the surface code in excess of 5%\% under biased noise,” Phys. Rev. Lett., vol. 124, p. 130501, 2020.
  • [23] D. K. Tuckett, A. S. Darmawan, C. T. Chubb, S. Bravyi, S. D. Bartlett, and S. T. Flammia, “Tailoring surface codes for highly biased noise,” Phys. Rev. X, vol. 9, no. 4, p. 041031, 2019.
  • [24] J. P. Bonilla-Ataides, D. K. Tuckett, S. D. Bartlett, S. T. Flammia, and B. J. Brown, “The XZZX surface code,” arXiv:2009.07851, 2020.
  • [25] S. A. Aly, “Asymmetric quantum BCH codes,” in Proc. IEEE Int. Conf. Comput. Eng. System, Cairo, Egypt, Nov. 2008, pp. 157–162.
  • [26] R. Li, G. Xu, and L. Guo, “On two problems of asymmetric quantum codes,” Int. J. Mod. Phys. B, vol. 28, no. 06, p. 1450017, 2014.
  • [27] M. F. Ezerman, S. Jitman, S. Ling, and D. V. Pasechnik, “CSS-like constructions of asymmetric quantum codes,” IEEE Trans. Inf. Theory, vol. 59, no. 10, pp. 6732–6754, 2013.
  • [28] J. Cannon, W. Bosma, C. Fieker, and A. Steel, Handbook of Magma Functions, Sydney, 2008. [Online]. Available: https://magma.maths.usyd.edu.au/magma/handbook/
  • [29] G. G. La Guardia, “Asymmetric quantum Reed-Solomon and generalized Reed-Solomon codes,” Quantum Inf. Process., vol. 11, no. 2, pp. 591–604, 2012.
  • [30] C. Galindo, O. Geil, F. Hernando, and D. Ruano, “Improved constructions of nested code pairs,” IEEE Trans. Inf. Theory, vol. 64, no. 4, pp. 2444–2459, 2017.
  • [31] G. G. La Guardia, “On the construction of asymmetric quantum codes,” Int. J. Theor. Phys., vol. 53, no. 7, pp. 2312–2322, 2014.
  • [32] G. D. Forney Jr, “Concatenated codes.” Ph.D. dissertation, Massachusetts Institute of Technology, 1965.
  • [33] J. K. Wolf, “On codes derivable from the tensor product of check matrices,” IEEE Trans. Inf. Theory, vol. 11, no. 2, pp. 281–284, 1965.
  • [34] ——, “An introduction to tensor product codes and applications to digital storage systems,” in Proc. IEEE ITW, Chengdu, China, Oct. 2006, pp. 6–10.
  • [35] J. Maucher, V. V. Zyablov, and M. Bossert, “On the equivalence of generalized concatenated codes and generalized error location codes,” IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 642–649, 2000.
  • [36] E. Knill and R. Laflamme, “Concatenated quantum codes,” arXiv preprint quant-ph/9608012, 1996.
  • [37] D. Gottesman, “Stabilizer codes and quantum error correction,” Ph.D. dissertation, California Institute of Technology, 1997.
  • [38] M. Grassl and M. Rötteler, “Quantum block and convolutional codes from self-orthogonal product codes,” in Proc. IEEE Int. Symp. Inf. Theory, Adelaide, SA, Australia, Sept. 2005, pp. 1018–1022.
  • [39] J. Fan, Y. Li, M.-H. Hsieh, and H. Chen, “On quantum tensor product codes,” Quantum Inf. Comput., vol. 17, no. 13&\&14, pp. 1105–1122, 2017.
  • [40] G. G. La Guardia, “Asymmetric quantum product codes,” Int. J. Quantum Inf., vol. 10, no. 01, p. 1250005, 2012.
  • [41] P. J. Nadkarni and S. S. Garani, “Entanglement assisted binary quantum tensor product codes,” in Proc. IEEE ITW.   Kaohsiung, Taiwan: IEEE, Nov. 2017, pp. 219–223.
  • [42] M.-H. Hsieh and F. Le Gall, “NP-hardness of decoding quantum error-correction codes,” Phys. Rev. A, vol. 83, no. 5, p. 052331, 2011.
  • [43] A. R. Calderbank and P. W. Shor, “Good quantum error-correcting codes exist,” Phys. Rev. A, vol. 54, no. 2, p. 1098, 1996.
  • [44] L. Wang, K. Feng, S. Ling, and C. Xing, “Asymmetric quantum codes: characterization and constructions,” IEEE Trans. Inf. Theory, vol. 56, no. 6, pp. 2938–2945, 2010.
  • [45] J. Fan and H. Chen, “Comments on and Corrections to “On the equivalence of generalized concatenated codes and generalized error location codes”,” IEEE Trans. Inf. Theory, vol. 63, no. 8, pp. 5437–5439, 2017.
  • [46] H. Imai and H. Fujiya, “Generalized tensor product codes,” IEEE Trans. Inf. Theory, vol. 27, no. 2, pp. 181–187, 1981.
  • [47] M. Grassl, “Bounds on the minimum distance of linear codes and quantum codes,” Online available at http://www.codetables.de, 2007.
  • [48] D. J. Costello and G. D. Forney, “Channel coding: The road to channel capacity,” Proc. IEEE, vol. 95, no. 6, pp. 1150–1177, 2007.
  • [49] I. Zhilin, P. Rybin, and V. Zyablov, “High-rate codes for high-reliability data transmission,” in Proc. IEEE Int. Symp. Inf. Theory.   Hong Kong, China: IEEE, Jun. 2015, pp. 256–260.
  • [50] J. Spinner, J. Freudenberger, and S. Shavgulidze, “A soft input decoding algorithm for generalized concatenated codes,” IEEE Trans. Commun., vol. 64, no. 9, pp. 3585–3595, 2016.
  • [51] M. Rajab, S. Shavgulidze, and J. Freudenberger, “Soft-input bit-flipping decoding of generalised concatenated codes for application in non-volatile Flash memories,” IET Commun., vol. 13, no. 4, pp. 460–467, 2018.
  • [52] H. Alhussien and J. Moon, “An iteratively decodable tensor product code with application to data storage,” IEEE J. Sel. Areas Commun., vol. 2, no. 28, pp. 228–240, 2010.
  • [53] P. Chaichanavong and P. H. Siegel, “Tensor-product parity code for magnetic recording,” IEEE Trans. Magn., vol. 42, no. 2, pp. 350–352, 2006.
  • [54] ——, “Tensor-product parity codes: Combination with constrained codes and application to perpendicular recording,” IEEE Trans. Magn., vol. 42, no. 2, pp. 214–219, 2006.
  • [55] A. Fahrner, H. Griesser, R. Klarer, and V. V. Zyablov, “Low-complexity GEL codes for digital magnetic storage systems,” IEEE Trans. Magn., vol. 40, no. 4, pp. 3093–3095, 2004.
  • [56] R. Gabrys, E. Yaakobi, and L. Dolecek, “Graded bit-error-correcting codes with applications to Flash memory,” IEEE Trans. Inf. Theory, vol. 59, no. 4, pp. 2315–2327, 2013.
  • [57] M. N. Kaynak, P. R. Khayat, and S. Parthasarathy, “Classification codes for soft information generation from hard Flash reads,” IEEE J. Sel. Areas Commun., vol. 32, no. 5, pp. 892–899, 2014.
  • [58] P. Huang, E. Yaakobi, H. Uchikawa, and P. H. Siegel, “Linear locally repairable codes with availability,” in Proc. IEEE Int. Symp. Inf. Theory, Hong Kong, China, Jun. 2015, pp. 1871–1875.
  • [59] ——, “Binary linear locally repairable codes,” arXiv preprint arXiv:1511.06960, 2015.
  • [60] M. Blaum, “Extended integrated interleaved codes over any field with applications to locally recoverable codes,” IEEE Trans. Inf. Theory, vol. 66, no. 2, pp. 936–956, 2019.
  • [61] P. Trifonov, V. Miloslavskaya, C. Chen, and Y. Wang, “Fast encoding of polar codes with Reed-Solomon kernel,” IEEE Trans. Commun., vol. 64, no. 7, pp. 2746–2753, 2016.
  • [62] M. Grassl, W. Geiselmann, and T. Beth, “Quantum Reed-Solomon codes,” in Applied Algebra, Algebraic Algorithms and Error-correcting Codes.   Springer, 1999, pp. 231–244.
  • [63] M. Grassl, T. Beth, and M. Rötteler, “On optimal quantum codes,” Int. J. Quant. Inf., vol. 2, no. 01, pp. 55–64, 2004.
  • [64] M. F. Ezerman, S. Jitman, H. M. Kiah, and S. Ling, “Pure asymmetric quantum MDS codes from CSS construction: A complete characterization,” Int. J. Quantum Inf., vol. 11, no. 03, p. 1350027, 2013.
  • [65] S. A. Aly, A. Klappenecker, and P. K. Sarvepalli, “On quantum and classical BCH codes,” IEEE Trans. Inf. Theory, vol. 53, no. 3, pp. 1183–1188, 2007.
  • [66] A. R. Calderbank, E. M. Rains, P. Shor, and N. J. Sloane, “Quantum error correction via codes over GF(4),” IEEE Trans. Inf. Theory, vol. 44, no. 4, pp. 1369–1387, 1998.
  • [67] D. V. Sarwate, “On the complexity of decoding Goppa codes (Corresp.),” IEEE Transactions on Information Theory, vol. 23, no. 4, pp. 515–516, 1977.
  • [68] G. Forney, “Generalized minimum distance decoding,” IEEE Transactions on Information Theory, vol. 12, no. 2, pp. 125–131, 1966.
  • [69] R. Matsumoto, “Two Gilbert-Varshamov-type existential bounds for asymmetric quantum error-correcting codes,” Quantum Inf. Process., vol. 16, no. 12, p. 285, 2017.
  • [70] A. Ashikhmin, S. Litsyn, and M. A. Tsfasman, “Asymptotically good quantum codes,” Phys. Rev. A, vol. 63, no. 3, p. 032311, 2001.
  • [71] M. Tsfasman and S. Vlăduţ, Algebraic-Geometric Codes.   Dordrecht: Kluwer, 1991.