This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Partially Concatenated Calderbank-Shor-Steane Codes Achieving the Quantum Gilbert-Varshamov Bound Asymptotically

Jihao Fan,  Jun Li,  Ya Wang, Yonghui Li,  Min-Hsiu Hsieh,   and Jiangfeng Du This work was supported in part by the National Natural Science Foundation of China (No. 61802175), in part by the National Natural Science Foundation of China (No. 61872184), in part by the Fundamental Research Funds for the Central Universities (No. 30921013104), and in part by Future Network Grant of Provincial Education Board in Jiangsu. (Corresponding authors: Jun Li; Min-Hsiu Hsieh.)J. Fan is with School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China (e-mail: jihao.fan@outlook.com).J. Li is with School of Electronic and Optical Engineering, Nanjing University of Science and Technology, Nanjing 210094, China (e-mail: jun.li@njust.edu.cn). Y. Wang and J. Du are with CAS Key Laboratory of Microscale Magnetic Resonance and Department of Modern Physics, University of Science and Technology of China, Hefei 230026, China (e-mail: {ywustc, qcmr}@ustc.edu.cn).Y. Li is with School of Electrical and Information Engineering, the University of Sydney, Sydney, NSW 2006, Australia (e-mail: yonghui.li@sydney.edu.au).M.H. Hsieh is with Quantum Computing Research Center, Hon Hai Research Institute, Taipei City 114, Taiwan (e-mail: min-hsiu.hsieh@foxconn.com).
Abstract

In this paper, we utilize a concatenation scheme to construct new families of quantum error correction codes achieving the quantum Gilbert-Varshamov (GV) bound asymptotically. We concatenate alternant codes with any linear code achieving the classical GV bound to construct Calderbank-Shor-Steane (CSS) codes. We show that the concatenated code can achieve the quantum GV bound asymptotically and can approach the Hashing bound for asymmetric Pauli channels. By combing Steane’s enlargement construction of CSS codes, we derive a family of enlarged stabilizer codes achieving the quantum GV bound for enlarged CSS codes asymptotically. As applications, we derive two families of fast encodable and decodable CSS codes with parameters 𝒬1=[[N,Ω(N),Ω(N)]],\mathscr{Q}_{1}=[[N,\Omega(\sqrt{N}),\Omega(\sqrt{N})]], and 𝒬2=[[N,Ω(N/logN),Ω(N/logN)/Ω(logN)]].\mathscr{Q}_{2}=[[N,\Omega(N/\log N),\Omega(N/\log N)/\Omega(\log N)]]. We show that 𝒬1\mathscr{Q}_{1} can be encoded very efficiently by circuits of size O(N)O(N) and depth O(N)O(\sqrt{N}). For an input error syndrome, 𝒬1\mathscr{Q}_{1} can correct any adversarial error of weight up to half the minimum distance bound in O(N)O(N) time. 𝒬1\mathscr{Q}_{1} can also be decoded in parallel in O(N)O(\sqrt{N}) time by using O(N)O(\sqrt{N}) classical processors. For an input error syndrome, we proved that 𝒬2\mathscr{Q}_{2} can correct a linear number of X{X}-errors with high probability and an almost linear number of Z{Z}-errors in O(N)O(N) time. Moreover, 𝒬2\mathscr{Q}_{2} can be decoded in parallel in O(log(N))O(\log(N)) time by using O(N)O(N) classical processors.

Index Terms:
Stabilizer code, Calderbank-Shor-Steane code, asymmetric quantum code, quantum Gilbert-Varshamov bound, Pauli Channel

I Introduction

Quantum systems are vulnerable to the environment noise induced by decoherence, which is one of the biggest obstacles in quantum information processing. Similar to classical systems, one feasible solution is to exploit quantum error correction codes (QECCs) to encode the primitive quantum information into a larger quantum state. It is widely believed that QECCs are necessary in realizing long-term quantum communications and in building fault-tolerant quantum computers [1, 2]. The construction and design of QECCs with excellent performance is thus one significant task. QECCs can be constructed from classical linear codes, e.g., by using the stabilizer formalism [3] or the Calderbank-Shor-Steane (CSS) construction [4, 5]. But it is not an easy task to do that straightforwardly since an additional dual-containing constraint is needed.

How to construct asymptotically good QECCs with positive rates and linear distances, is one of the key problems in quantum coding theory [5, 6]. The quantum Gilbert-Varshamov (GV) bound is an important lower bound that promises the existence of such good quantum codes [5, 7, 8, 9, 10, 11]. Compared with classical codes, it is usually much more challenging to obtain quantum codes that can attain the quantum GV bound due to the dual-containing constraint [3]. Therefore very few types of QECCs can attain the quantum GV bound up to now. In [5], it was shown that quantum codes derived from dual-containing codes can attain the quantum GV bound for CSS codes. In [5], random codes were shown to attain the quantum GV bound for binary stabilizer codes. In [9], stabilizer codes derived from self-orthogonal quaternary codes were shown to attain the quantum GV bound for binary stabilizer codes. In [12], asymptotically good concatenated quantum codes (CQCs) were constructed. In [13], it was shown that CQCs can attain the quantum GV bound for general stabilizer codes asymptotically. A finite version of the quantum GV bound was given in [14]. In [11], quantum GV bounds for asymmetric quantum codes (AQCs) were given. All the known asymptotic results about quantum GV bound rely on some random code arguments which mean that there is little structure in them.

It should be noted that, a unique phenomenon in quantum coding theory, called error degeneracy, exists, which makes degenerate codes more powerful than nondegenerate ones [15, 16]. In an extreme case, it is possible to construct asymptotically good quantum codes from asymptotically bad classical codes. We refer to such codes as extremely degenerate codes. For example, the qLDPC conjecture asks whether there exist families of asymptotically good quantum low-density parity-check (qLDPC) codes [17, 18, 19]. Recently, it was shown that asymptotically good qLDPC codes exist with high probabilities [20, 21] and the resultant qLDPC codes are extremely degenerate. The previous results about quantum GV bounds usually rely on asymptotically good classical linear codes. It was unknown whether there exist extremely degenerate codes derived from bad classical codes can attain the quantum GV bound.

In [22], an enlargement of the CSS construction was proposed to construct more efficient stabilizer codes than the standard CSS codes. In [23], the enlargement was generalized to nonbinary situations. Several asymptotic bounds for enlarged CSS codes were also given in [22, 23]. Then in [24, 25, 26], asymptotically good binary quantum algebraic geometry (AG) codes were constructed by using enlargement of the CSS construction. In [27], asymptotically good concatenated quantum AG codes were constructed by using the CSS construction and its enlargement, and these codes can be decoded efficiently in polynomial time. However, whether binary enlarged CSS codes can attain the corresponding quantum GV bound is unknown. On the other hand, it should be noted that quantum AG codes over sufficiently large field size can even beat the quantum GV bound [28, 29, 30]. However, for codes over small field size, e.g., binary codes, quantum GV bound is much better than asymptotic bounds from quantum AG codes.

In addition to the construction of QECCs with good parameters, practical QECCs need to equip with both efficient encoders and decoders. If the syndrome decoding is slower than the error accumulations, additional noise will be introduced during the syndrome decoding [31]. However, error degeneracy does not simplify the syndrome decoding of QECCs [32]. In contrast, it makes most decoding methods that are efficient for classical codes fail to fully decode QECCs, e.g., the belief-propagation (BP) algorithm [33]. How to utilize error degeneracy to correct more errors is an attractive and crucial issue, and its importance, in our opinion, is no less than the construction of good QECCs.

On the other hand, the encoding of QECCs is also significant but it has received much less attention compared to the decoding. Noise not only occurs in the transmission and decoding, but also in the encoding circuit [6]. Large-scale encoding circuit and deep encoding depth make the risk of qubits suffering from faulty gates increase rapidly. Consequently, the qubits might be corrupted even before the transmission and the computation. The encoding circuit of stabilizer codes of length NN with gg stabilizer generators generally has O(gN)O(gN) gates and O(N)O(N) depth [34]. But in many practical applications, the encoding circuits need to be with linear size and sublinear depth [35, 36].

In this work, we combine classical alternant codes with some other linear codes to construct QECCs achieving the quantum GV bound asymptotically. We use classical alternant codes as the outer code and use any linear code achieving the classical GV bound as the inner code to do the concatenation. We call the constructed codes as partially concatenated CSS (PC-CSS) codes since we only introduce concatenation in the XX-stabilizers (or the ZZ-stabilizers). We show that PC-CSS codes can attain quantum GV bounds for CSS codes and asymmetric CSS codes asymptotically. Here, our scheme can use any linear code achieving the classical GV bound to do the concatenation. Then PC-CSS codes can achieve the quantum GV bound asymptotically. In particular, if we use low-density parity-check (LDPC) codes as the component codes, we show that error degeneracy can greatly improve the minimum distance of PC-CSS codes. In such case, the minimum distance of PC-CSS codes without considering error degeneracy is constant to the block length. Yet, degenerate PC-CSS codes can achieve the quantum GV bound whose minimum distance is linear to the block length. Thus PC-CSS codes are extremely degenerate and error degeneracy has large advantages in constructing asymptotically good quantum codes. It should be noted that PC-CSS codes are not qLDPC codes since only ZZ-stabilizers of PC-CSS codes can satisfy the qLDPC constraints [37]. It is known that asymptotically good qLDPC codes has been shown to exist with high probabilities [20, 21]. However, the asymptotic bound of qLDPC codes in [20, 21] is much weaker than quantum GV bound. We show that PC-CSS codes can not only attain the quantum GV bound but also can approach the capacity of Pauli channels with large asymmetries.

TABLE I: Summary of Asymptotic Bounds for Different Quantum Codes. Let pp be a prime and let m>0m>0 be an integer. Denote by q=pmq=p^{m}. For a stabilizer code with parameters Q=[[n,k,d]]qQ=[[n,k,d]]_{q}, we denote by R=k/nR=k/n and δ=d/n\delta=d/n. For a nonstabilizer code with parameters Q=((n,K,d))qQ=((n,K,d))_{q}, we denote by R=(logqK)/nR=(\log_{q}K)/n and δ=d/n\delta=d/n. For an AQC with parameters Q=[[n,k,dX/dZ]]Q=[[n,k,d_{X}/d_{Z}]], we denote by R=k/nR=k/n, δX=dX/n\delta_{X}=d_{X}/n, and δZ=dZ/n\delta_{Z}=d_{Z}/n.
Nos. References Asymptotic Bounds
1 [3] R12H2(δ)O(1)R\geq 1-2H_{2}(\delta)-O(1)
2 [5, 9] R12H4(δ)O(1)R\geq 1-2H_{4}(\delta)-O(1)
3 [13] R12Hq2(δ)O(1)R\geq 1-2H_{q^{2}}(\delta)-O(1)
4 [24] R=112m11103mδR=1-\frac{1}{2^{m-1}-1}-\frac{10}{3}m\delta, δ[δm,δm1]\delta\in[\delta_{m},\delta_{m-1}], m=3,4,5,,m=3,4,5,\ldots, δ2=1/18\delta_{2}=1/18, δ3=3/56\delta_{3}=3/56, and δm=352m2(2m1)((2m11))\delta_{m}=\frac{3}{5}\frac{2^{m-2}}{(2^{m}-1)((2^{m-1}-1))}, m=4,5,6,m=4,5,6,\ldots
5 [25] R=1103mδ22m1R=1-\frac{10}{3}m\delta-\frac{2}{2^{m}-1}, 0<δ12m(1212m1)0<\delta\leq\frac{1}{2m}(\frac{1}{2}-\frac{1}{2^{m}-1})
6 [26] R=3t(δtδ)R=3t(\delta_{t}-\delta), δt=232t33(2t+1)(2t1)\delta_{t}=\frac{2}{3}\frac{2^{t}-3}{3(2t+1)(2^{t}-1)}, t3,t\geq 3, 0<δ<δt0<\delta<\delta_{t}
7 [12] R13(14δ/a)R\geq\frac{1}{3}(1-4\delta/a), a=H41(1/6)a=H^{-1}_{4}(1/6)
8 [27] Rtt+12t(t+1)(qt1)2tδR\geq\frac{t}{t+1}-\frac{2t}{(t+1)(q^{t}-1)}-2t\delta, t>0t>0 is an integer
9 [27] Rk0n0(12γ(2q+1)n0(q+1)d0δ),R\geq\frac{k_{0}}{n_{0}}(1-2\gamma-\frac{(2q+1)n_{0}}{(q+1)d_{0}}\delta), 0γ(qk0/22)10\leq\gamma\leq(q^{k_{0}/2}-2)^{-1}, [[n0,k0,d0]]q[[n_{0},k_{0},d_{0}]]_{q} is a quantum code
10 [28, 29] R12δ2q1R\geq 1-2\delta-\frac{2}{\sqrt{q}-1}, qq is a square
11 [28] R12δ2q1+logq(1+1q3)R\geq 1-2\delta-\frac{2}{\sqrt{q}-1}+\log_{q}(1+\frac{1}{q^{3}}), qq is a square
12 [21] 0<R<10<R<1, 0<δ<12c7/20<\delta<\frac{1}{2c^{7/2}}, c>1c>1 is an integer
13 [11] R1Hq(δX)Hq(δZ)O(1)R\geq 1-H_{q}(\delta_{X})-H_{q}(\delta_{Z})-O(1), 0δX11/q0\leq\delta_{X}\leq 1-1/q, 0δZ11/q0\leq\delta_{Z}\leq 1-1/q
14 [30] R1δXδZ2q1+logq(1+1q3)R\geq 1-\delta_{X}-\delta_{Z}-\frac{2}{\sqrt{q}-1}+\log_{q}(1+\frac{1}{q^{3}}), qq is a square
15 Theorem 1 R12Hq(δ)R\geq 1-2H_{q}(\delta)
16 Corollary 1 R1Hq(δX)Hq(δX)O(1)R\geq 1-H_{q}(\delta_{X})-H_{q}(\delta_{X})-O(1), 0δX11/q0\leq\delta_{X}\leq 1-1/q, 0δZ11/q0\leq\delta_{Z}\leq 1-1/q
17 Theorem 3 R1Hq(δ)Hq(qq+1δ)O(1)R\geq 1-H_{q}(\delta)-H_{q}(\frac{q}{q+1}\delta)-O(1)

As a special case, we construct a family of asymmetric PC-CSS codes with parameters 𝒬=[[N,Ω(N/n0),dZΩ(N/n0)/dXn0]]\mathscr{Q}=[[N,\Omega(N/n_{0}),d_{Z}\geq\Omega(N/n_{0})/d_{X}\geq n_{0}]] by using expander codes as one of the component codes, where n0>1n_{0}>1 and N>1N>1 are integers and n0|Nn_{0}|N. Let n0=Θ(N)n_{0}=\Theta(\sqrt{N}), we can derive a family of quantum codes with parameters 𝒬1=[[N,Ω(N),Ω(N)]].\mathscr{Q}_{1}=[[N,\Omega(\sqrt{N}),\Omega(\sqrt{N})]]. For an input error syndrome, 𝒬1\mathscr{Q}_{1} can correct all errors of weight smaller than half the minimum distance bound in O(N)O(N) time. 𝒬1\mathscr{Q}_{1} can also be decoded in parallel in O(N)O(\sqrt{N}) time by using O(N)O(\sqrt{N}) classical processors. We show that 𝒬1\mathscr{Q}_{1} can be fast encoded by a circuit of size O(N)O(N) and depth O(N)O(\sqrt{N}). Moreover, 𝒬1\mathscr{Q}_{1} can correct a random ZZ-error with very high probability provided pz<25%p_{z}<25\%.

If let n0=Θ(logN)n_{0}=\Theta(\log N), then we can derive a family of AQCs with parameters 𝒬2=[[N,Ω(N/logN),Ω(N/logN)/Ω(logN)]].\mathscr{Q}_{2}=[[N,\Omega(N/\log N),\Omega(N/\log N)/\Omega(\log N)]]. For an input error syndrome, 𝒬2\mathscr{Q}_{2} can correct any random X{X}-error with high probability and correct an almost linear number of Z{Z}-errors in O(N)O(N) time. Further, we show that 𝒬2\mathscr{Q}_{2} can be decoded in parallel in O(log(N))O(\log(N)) time by using O(N)O(N) classical processors. While fault-tolerant quantum computation [38] and communication [39, 6] prefer fast encodale and decodable codings, 𝒬1\mathscr{Q}_{1} and 𝒬2\mathscr{Q}_{2} are thus practical and beneficial for the future use.

We further combine our concatenation scheme with the enlarged CSS construction in [22, 23]. We show that the enlarged quantum codes can attain the quantum GV bound for enlarged CSS codes. In Table I, we give a summary of asymptotic bounds for different quantum codes.

This paper is organized as follows. We begin in Section II with Preliminaries on classical linear codes and quantum stabilizer codes. In Section III, we present the partial concatenation construction of CSS codes and show that PC-CSS codes can attain the quantum GV bound for CSS codes and AQCs asymptotically. In Section IV, we give a family of fast encodable and decodable PC-CSS codes. In Section V, we combine our concatenation scheme with Steane’s enlarged CSS construction. We show that the enlarged quantum codes can attain the quantum GV bound for enlarged CSS codes asymptotically. The discussions and conclusions are given in Section VI.

II Preliminaries

We shortly introduce some needed knowledge about classical linear codes and quantum stabilizer codes, for more details, see the literatures, e.g., [40, 5, 3, 41, 42]. In this paper, we usually neglect the index in the code parameters for binary linear codes and binary stabilizer codes provided there is no ambiguity.

II-1 Classical Alternant Codes

Let p2p\geq 2 be a prime and denote by GF(p)GF(p) a prime field. Let q=pm0q=p^{m_{0}} be a power of pp, where m0>0m_{0}>0 is an integer. Let GF(q)GF(q) be the Galois field of size qq and denote by GF(qm)GF(q^{m}) a field extension of GF(q)GF(q), where m>0m>0 is an integer. Define the trace operation from GF(q)GF(q) to GF(p)GF(p) as Tr(α)=i=0m01αpi\textrm{Tr}(\alpha)=\sum_{i=0}^{m_{0}-1}\alpha^{p^{i}}, where αGF(q)\alpha\in GF(q). We review some known results about classical alternant codes which will be used in the construction of quantum codes. Let α1,α2,,αn\alpha_{1},\alpha_{2},\ldots,\alpha_{n} be nn distinct elements of GF(qm)GF(q^{m}) and let v1,v2,,vnv_{1},v_{2},\ldots,v_{n} be nn nonzero elements of GF(qm)GF(q^{m}), where 2nqm2\leq n\leq q^{m}. Denote by 𝐚=(α1,α2,,αn)\mathbf{a}=(\alpha_{1},\alpha_{2},\ldots,\alpha_{n}) and 𝐯=(v1,v2,,vn)\mathbf{v}=(v_{1},v_{2},\ldots,v_{n}). Denote the ring of polynomials with coefficients in finite field GF(qm)GF(q^{m}) by GF(qm)[x]GF(q^{m})[x]. For any polynomial F(x)=i=0lcixiGF(qm)[x]F(x)=\sum_{i=0}^{l}c_{i}x^{i}\in GF(q^{m})[x], the degree of F(x)F(x) is denoted by degF(x)=l\deg F(x)=l. For any 1kn11\leq k\leq n-1, the generalized Reed-Solomon (GRS) code GRSk(𝐚,𝐯)\textrm{GRS}_{k}(\mathbf{a},\mathbf{v}) is defined by

GRSk(𝐚,𝐯){(v1F(α1),v2F(α2),,vnF(αn))|\displaystyle\textrm{GRS}_{k}(\mathbf{a},\mathbf{v})\equiv\big{\{}(v_{1}F(\alpha_{1}),v_{2}F(\alpha_{2}),\ldots,v_{n}F(\alpha_{n}))\ |
F(x)GF(qm)[x],degF(x)<k}.\displaystyle\ F(x)\in GF(q^{m})[x],\ \deg F(x)<k\big{\}}. (1)

\nrightarrow The parameters of GRSk(𝐚,𝐯)\textrm{GRS}_{k}(\mathbf{a},\mathbf{v}) are given by [n,k,nk+1]qm,[n,k,n-k+1]_{q^{m}}, and GRS codes are maximum-distance-separable (MDS) codes which can attain the Singleton bound in [40]. Let r=nkr=n-k. The dual of a GRS code is also a GRS code, i.e., GRSk(𝐚,𝐯)=GRSr(𝐚,𝐲)\textrm{GRS}_{k}(\mathbf{a},\mathbf{v})^{\bot}=\textrm{GRS}_{r}(\mathbf{a},\mathbf{y}), where 𝐲=(y1,y2,,yn)\mathbf{y}=(y_{1},y_{2},\ldots,y_{n}) and yivi=1/ji(αiαj)y_{i}\cdot v_{i}=1/\prod_{j\neq i}(\alpha_{i}-\alpha_{j}), for 1in1\leq i\leq n. The parity-check matrix of GRSk(𝐚,𝐯)\textrm{GRS}_{k}(\mathbf{a},\mathbf{v}) is given by

HGRSk(𝐚,𝐯)=(y1y2ynα1y1α2y2αnynα1r1y1α2r1y2αnr1yn).H_{\textrm{GRS}_{k}(\mathbf{a},\mathbf{v})}=\left(\begin{array}[]{cccc}y_{1}&y_{2}&\cdots&y_{n}\\ \alpha_{1}y_{1}&\alpha_{2}y_{2}&\cdots&\alpha_{n}y_{n}\\ \vdots&\vdots&\vdots&\vdots\\ \alpha_{1}^{r-1}y_{1}&\alpha_{2}^{r-1}y_{2}&\cdots&\alpha_{n}^{r-1}y_{n}\end{array}\right). (2)

For some given GRS code GRSk(𝐚,𝐯)\textrm{GRS}_{k}(\mathbf{a},\mathbf{v}) over GF(qm)GF(q^{m}), the alternant code over GF(q)GF(q) denoted by 𝒜r(𝐚,𝐲)\mathcal{A}_{r}(\mathbf{a},\mathbf{y}), is defined as the subfield subcode of GRSk(𝐚,𝐯)\textrm{GRS}_{k}(\mathbf{a},\mathbf{v}), i.e.,

𝒜r(𝐚,𝐲)=GRSk(𝐚,𝐯)|GF(q).\mathcal{A}_{r}(\mathbf{a},\mathbf{y})=\textrm{GRS}_{k}(\mathbf{a},\mathbf{v})|GF(q). (3)

Since 𝒜r(𝐚,𝐲)\mathcal{A}_{r}(\mathbf{a},\mathbf{y}) consists of all codewords of GRSk(𝐚,𝐯)\textrm{GRS}_{k}(\mathbf{a},\mathbf{v}) over GF(q)GF(q), the parity check matrix of 𝒜r(𝐚,𝐲)\mathcal{A}_{r}(\mathbf{a},\mathbf{y}) is given by that of GRSk(𝐚,𝐯)\textrm{GRS}_{k}(\mathbf{a},\mathbf{v}) in (2). The integer r=nkr=n-k is called the degree of the alternant code 𝒜r(𝐚,𝐲)\mathcal{A}_{r}(\mathbf{a},\mathbf{y}). In addition, 𝐚\mathbf{a} is called the support of 𝒜r(𝐚,𝐲)\mathcal{A}_{r}(\mathbf{a},\mathbf{y}), and 𝐲\mathbf{y} is called a multiplier of 𝒜r(𝐚,𝐲)\mathcal{A}_{r}(\mathbf{a},\mathbf{y}). For the dimension and minimum distance of alternant codes, there is the following result:

Lemma 1

[40] Let 𝒞=𝒜r(𝐚,𝐲)=[n,k𝒞,d𝒞]q\mathscr{C}=\mathcal{A}_{r}(\mathbf{a},\mathbf{y})=[n,k_{\mathscr{C}},d_{\mathscr{C}}]_{q} be an alternant code defined in (3). The dimension and minimum distance of 𝒞\mathscr{C} can be given by k𝒞nmrk_{\mathscr{C}}\geq n-mr and d𝒞r+1d_{\mathscr{C}}\geq r+1, respectively.

Let uu be any nonzero vector over GF(q)GF(q). Let 𝐚\mathbf{a} be a fixed vector and let 𝐯\mathbf{v} be a varying vector. According to [40, Chap. 12, Theorem 3], we know that the number of GRS codes GRSk(𝐚,𝐯)\textrm{GRS}_{k}(\mathbf{a},\mathbf{v}) containing uu is at most (qm1)k(q^{m}-1)^{k}. Therefore, the number of alternant codes 𝒜r(𝐚,𝐲)=GRSk(𝐚,𝐯)|GF(q)\mathcal{A}_{r}(\mathbf{a},\mathbf{y})=\textrm{GRS}_{k}(\mathbf{a},\mathbf{v})|GF(q) containing uu is also at most (qm1)k(q^{m}-1)^{k}. Here, it should be noted that the estimate of the number of alternant codes that contain uu does not relate to its Hamming weight.

Lemma 2

[40] For any nonzero vector uGF(q)nu\in GF(q)^{n}, the number of alternant codes 𝒜r(𝐚,𝐲)\mathcal{A}_{r}(\mathbf{a},\mathbf{y}) in (3) that contain uu is at most (qm1)nr(q^{m}-1)^{n-r}.

On the other hand, the total number of alternant codes 𝒜r(𝐚,𝐲)\mathcal{A}_{r}(\mathbf{a},\mathbf{y}) is equal to the number of choices for different 𝐲\mathbf{y} (or 𝐯\mathbf{v}), which is given by (qm1)n(q^{m}-1)^{n} [40]. Thus alternant codes form a large family of linear codes and include many important subclasses, e.g., Goppa codes and Bose-Chaudhuri-Hocquenghem codes. Further, alternant codes play a significant role in the McEliece cryptosystem [43]. Moreover, alternant codes can attain the classical GV bound asymptotically [40]. In the next section, we will show that alternant codes can be used to construct concatenated CSS codes achieving the quantum GV bound asymptotically.

For integers n,λn,\lambda, denote by Volq(n,λ)=i=0λ(ni)(q1)i\textrm{Vol}_{q}(n,\lambda)=\sum_{i=0}^{\lambda}\binom{n}{i}(q-1)^{i} the Hamming ball of radius λ\lambda. Denote by Hq(x)=xlogq(q1)xlogqx(1x)logq(1x)H_{q}(x)=x\log_{q}(q-1)-x\log_{q}x-(1-x)\log_{q}(1-x) the qq-ary entropy function. There exists the following important estimate of the Hamming ball.

Lemma 3

[44] Let qq be a power of a prime p2p\geq 2. For an integer n>1n>1 and 011/q0\leq\ell\leq 1-1/q,

q(Hq()O(1))nVolq(n,n)qHq()nq^{(H_{q}(\ell)-O(1))n}\leq\textrm{Vol}_{q}(n,\ell n)\leq q^{H_{q}(\ell)n} (4)

II-2 Quantum Stabilizer Codes

Let ξ=exp(2πi/p)\xi=\exp(2\pi i/p) be a primitive ppth root of unity and let u,vGF(q)u,v\in GF(q). Denote the unitary operators X(u)X(u) and Z(v)Z(v) on q\mathbb{C}^{q} by X(u)|a=|a+uX(u)|a\rangle=|a+u\rangle and Z(v)|a=ξTr(va)|aZ(v)|a\rangle=\xi^{\textrm{Tr}(va)}|a\rangle, respectively. Denote by the finite group

Gn,q={X(u),Z(v)|u,vGF(q)n,ifpis odd,iI,X(u),Z(v)|u,vGF(q)n,ifpis even.G_{n,q}=\left\{\begin{aligned} \langle X(\textrm{u}),Z(\textrm{v})|\textrm{u},\textrm{v}\in GF(q)^{n}\rangle,&&\textrm{if}&\ p\ \textrm{is odd},\\ \langle iI,X(\textrm{u}),Z(\textrm{v})|\textrm{u},\textrm{v}\in GF(q)^{n}\rangle,&&\textrm{if}&\ p\ \textrm{is even}.\end{aligned}\right. (5)

A stabilizer code QQ is a qkq^{k}-dimensional subspace of the Hilbert space n=qn\mathbb{H}_{n}=\mathbb{C}^{q^{n}}, i.e.,

Q={|φn|E|φ=|φ,E𝒮},Q=\{|\varphi\rangle\in\mathbb{H}_{n}\ |\ E|\varphi\rangle=|\varphi\rangle,\ \forall\ E\in\mathcal{S}\}, (6)

where 𝒮=S1,,Snk\mathcal{S}=\langle S_{1},\ldots,S_{n-k}\rangle with stabilizer generators SiS_{i}(1ink1\leq i\leq n-k) is an Abelian subgroup of Gn,qG_{n,q}. 𝒮\mathcal{S} is called the stabilizer group. By measuring the eigenvalues of the stabilizer generators, the syndrome of errors can be revealed. An error EGn,qE\in G_{n,q} is detectable if it anticommutes with some stabilizer generator Si(1ink)S_{i}(1\leq i\leq n-k). A detectable error results in a nonzero syndrome, otherwise the syndrome is zero and the error is undetectable. The minimum distance dd of code QQ is the minimum weight of an undetectable error EGn,qE\in G_{n,q}, which does not belong to the stabilizer group. We denote by Q=[[n,k,d]]qQ=[[n,k,d]]_{q}. The stabilizer code QQ is called nondegenerate if the stabilizer group 𝒮\mathcal{S} does not contain a nontrivial element whose weight is less than dd, otherwise it is degenerate.

The CSS construction in [5, 45] presents a direct way to construct stabilizer codes from two classical linear codes that satisfy the dual-containing relationship.

Lemma 4 ([5, 45])

Let C1C_{1} and C2C_{2} be two qq-ary linear codes with parameters [n,k1,d1]q[n,k_{1},d_{1}]_{q} and [n,k2,d2]q[n,k_{2},d_{2}]_{q}, respectively. If C2C1C_{2}^{\bot}\subseteq C_{1}, then there exists a stabilizer code QQ with parameters [[n,k1+k2n,dQ]]q,[[n,k_{1}+k_{2}-n,d_{Q}]]_{q}, where

dQ=min{wtH(C1\C2),wtH(C2\C1)}.d_{Q}=\min\{\text{wt}_{H}(C_{1}\backslash C_{2}^{\bot}),\text{wt}_{H}(C_{2}\backslash C_{1}^{\bot})\}. (7)

If dQ=min{d1,d2}d_{Q}=\min\{d_{1},d_{2}\}, then QQ is nondegenerate, otherwise it is degenerate.

The enlargement of CSS construction in [22, 23] can lead to more efficient stabilizer codes than the standard CSS construction.

Lemma 5 ([22, 23])

Let C=[n,k,d]qC=[n,k,d]_{q} and D=[n,k,d]qD=[n,k^{\prime},d^{\prime}]_{q} be two classical linear codes over GF(q)GF(q) such that CCDC^{\bot}\subseteq C\subseteq D and k>k+1k^{\prime}>k+1. Then there exists a stabilizer code with parameters QE=[[n,k+kn,dQE]]q,Q_{E}=[[n,k+k^{\prime}-n,d_{Q_{E}}]]_{q}, where dQE=min{d,q+1qd}d_{Q_{E}}=\min\{d,\lceil\frac{q+1}{q}d^{\prime}\rceil\}.

In most quantum channels, the dephasing errors (ZZ-errors) usually happen much more frequently than the amplitude errors (XX-errors). Asymmetric quantum codes (AQCs) are thus proposed to deal with such biased quantum noise [46, 30, 47]. Moreover, the CSS construction can be used to derive AQCs with two classical linear codes, one for correcting ZZ-errors and the other for correcting XX-errors.

Lemma 6 ([30])

Let CXC_{X} and CZC_{Z} be two qq-ary linear codes with parameters [n,k1,d1]q[n,k_{1},d_{1}]_{q} and [n,k2,d2]q[n,k_{2},d_{2}]_{q}, respectively. If CZCXC_{Z}^{\bot}\subseteq C_{X}, then there exists a QA=[[n,k1+k2n,dZ/dX]]q{Q_{A}}=[[n,k_{1}+k_{2}-n,d_{Z}/d_{X}]]_{q} AQC, where

dZ\displaystyle d_{Z} =\displaystyle= max{wtH(CX\CZ),wtH(CZ\CX)},\displaystyle\max\{\text{wt}_{H}(C_{X}\backslash C_{Z}^{\bot}),\text{wt}_{H}(C_{Z}\backslash C_{X}^{\bot})\}, (8)
dX\displaystyle d_{X} =\displaystyle= min{wtH(CX\CZ),wtH(CZ\CX)}.\displaystyle\min\{\text{wt}_{H}(C_{X}\backslash C_{Z}^{\bot}),\text{wt}_{H}(C_{Z}\backslash C_{X}^{\bot})\}. (9)

If wtH(CX\CZ)=d1\text{wt}_{H}(C_{X}\backslash C_{Z}^{\bot})=d_{1} and wtH(CZ\CX)=d2\text{wt}_{H}(C_{Z}\backslash C_{X}^{\bot})=d_{2}, then QAQ_{A} is nondegenerate, otherwise it is degenerate.

III Asymptotic Goodness of Partially Concatenated Calderbank-Shor-Steane Codes

Denote by C1=[n1,k1,d1]qC_{1}=[n_{1},k_{1},d_{1}]_{q} a linear code with the parity check and generator matrices given by H1H_{1} and G1G_{1}, respectively. Let C2=[k1,k2,d2]qC_{2}=[k_{1},k_{2},d_{2}]_{q} be another linear code with the parity check and generator matrices given by H2H_{2} and G2G_{2}, respectively. We use C1C_{1} as the inner code and C2C_{2} as the outer code, and we concatenate the generator matrix of C1C_{1} with the parity-check matrix of C2C_{2} as follows:

X=H2G1.\mathscr{H}_{{X}}=H_{2}G_{1}. (10)

Denote the null space of X\mathscr{H}_{X} by 𝒞X\mathscr{C}_{X} and we have 𝒞X=[n1,kX]q\mathscr{C}_{X}=[n_{1},k_{X}]_{q}, where kX=n1k1+k2k_{X}=n_{1}-k_{1}+k_{2}. Denote by

Z=H1and𝒞Z=C1.\mathscr{H}_{{Z}}=H_{1}\ \textrm{and}\ \mathscr{C}_{Z}=C_{1}. (11)

It is easy to see that XZT=0\mathscr{H}_{{X}}\mathscr{H}_{{Z}}^{T}=0 and 𝒞X𝒞Z\mathscr{C}_{X}^{\bot}\subseteq\mathscr{C}_{Z}. Thus we can derive a partially concatenated CSS (PC-CSS) code with parameters 𝒬=[[n1,k2]]q\mathscr{Q}=[[n_{1},k_{2}]]_{q} by using the CSS construction. We show that PC-CSS codes can attain the quantum GV bound asymptotically.

Theorem 1

There exist PC-CSS codes with parameters 𝒬=[[n𝒬,k𝒬,d𝒬]]q\mathscr{Q}=[[n_{\mathscr{Q}},k_{\mathscr{Q}},d_{\mathscr{Q}}]]_{q} achieving the quantum GV bound asymptotically. 𝒬\mathscr{Q} can achieve a quantum rate

k𝒬n𝒬12Hq(δ𝒬)O(1)\frac{k_{\mathscr{Q}}}{n_{\mathscr{Q}}}\geq 1-2H_{q}(\delta_{\mathscr{Q}})-O(1) (12)

for any block length n𝒬n_{\mathscr{Q}}\rightarrow\infty, where δ𝒬=d𝒬/n𝒬\delta_{\mathscr{Q}}=d_{\mathscr{Q}}/n_{\mathscr{Q}} is the relative minimum distance.

Proof:

Let C1=[n1,k1,d1]qC_{1}=[n_{1},k_{1},d_{1}]_{q} be any classical linear code. Let C2=[k1,k2,d2]qC_{2}=[k_{1},k_{2},d_{2}]_{q} be an alternant code. We construct a pair of dual-containing codes 𝒞X𝒞Z\mathscr{C}_{X}^{\bot}\subseteq\mathscr{C}_{Z} according to (10) and (11). By using the CSS construction, we can derive a PC-CSS code 𝒬=[[n1,k2,d𝒬]]q\mathscr{Q}=[[n_{1},k_{2},d_{\mathscr{Q}}]]_{q} with

d𝒬\displaystyle d_{\mathscr{Q}} =\displaystyle= min{wtH(c)|c(𝒞Z\𝒞X)(𝒞X\𝒞Z)}\displaystyle\min\{\text{wt}_{H}(c)|c\in(\mathscr{C}_{Z}\backslash\mathscr{C}_{X}^{\bot})\cup(\mathscr{C}_{X}\backslash\mathscr{C}_{Z}^{\bot})\} (13)
=\displaystyle= min{ω1,ω2},\displaystyle\min\{\omega_{1},\omega_{2}\},

where ω1=min{wtH(c)|c𝒞Z\𝒞X}d1\omega_{1}=\min\{\text{wt}_{H}(c)|c\in\mathscr{C}_{Z}\backslash\mathscr{C}_{X}^{\bot}\}\geq d_{1}, and ω2=min{wtH(c)|c𝒞X\𝒞Z}\omega_{2}=\min\{\text{wt}_{H}(c)|c\in\mathscr{C}_{X}\backslash\mathscr{C}_{Z}^{\bot}\}. Since 𝒞Z=C1\mathscr{C}_{Z}=C_{1} can be chosen arbitrarily, we let C1C_{1} be an asymptotically good linear code which can attain the classical GV bound, i.e.,

k1n11Hq(δ1)O(1),\frac{k_{1}}{n_{1}}\geq 1-H_{q}(\delta_{1})-O(1), (14)

where δ1=d1/n1\delta_{1}=d_{1}/n_{1} is the relative minimum distance. Next we need to determine ω2\omega_{2}. Since we know nothing about the distance of the dual code C1C_{1}^{\bot}, there maybe some (very) low weight vectors coming from C1C_{1}^{\bot}. If we do not consider error degeneracy, the minimum distance ω2\omega_{2} is unknown and maybe very small. Fortunately, vectors come from C1C_{1}^{\bot} do not affect the computation of ω2\omega_{2} because they are degenerate. For an integer 1<λX<n11<\lambda_{X}<n_{1}, let νGF(q)n1\nu\in GF(q)^{n_{1}} be any nonzero vector with Hamming weight less than λX\lambda_{{X}}. Denote by

SνG1νT.\textrm{S}_{\nu}\equiv G_{1}\nu^{T}. (15)

If Sν=0\textrm{S}_{\nu}=0, then ν\nu must belong to C1C_{1}^{\bot} and ν\nu is degenerate when we compute ω2\omega_{2}. Therefore we only need to consider the case which makes Sν0\textrm{S}_{\nu}\neq 0. Let 1fXk11\leq f_{X}\leq k_{1} and denote by kfX=k1(k1fX)/mk_{f_{{X}}}=k_{1}-(k_{1}-f_{{X}})/m, where m2m\geq 2 is an integer and m|(n1fX)m|(n_{1}-f_{{X}}).

For some given 𝐚=(α1,α2,,αk1)GF(qm)k1\mathbf{a}=(\alpha_{1},\alpha_{2},\ldots,\alpha_{k_{1}})\in GF(q^{m})^{k_{1}} and varying 𝐯=(v1,v2,,vn)GF(qm)k1\mathbf{v}=(v_{1},v_{2},\ldots,v_{n})\in GF(q^{m})^{k_{1}}, let GRSkfX(𝐚,𝐯)=[k1,kfX,k1kfX+1]qm\textrm{GRS}_{k_{f_{{X}}}}(\mathbf{a},\mathbf{v})=[k_{1},{k_{f_{{X}}}},k_{1}-{k_{f_{{X}}}}+1]_{q^{m}} be a GRS code over GF(qm)GF(q^{m}). Let

C2𝒜k1kfX(a,y)=GRSkfX(𝐚,𝐯)|GF(q)C_{2}\equiv\mathcal{A}_{k_{1}-k_{f_{X}}}(\textbf{a},\textbf{y})=\textrm{GRS}_{k_{f_{{X}}}}(\mathbf{a},\mathbf{v})|GF(q) (16)

be an alternant code, where 𝐲=(y1,y2,,yk1)\mathbf{y}=(y_{1},y_{2},\ldots,y_{k_{1}}) and yivi=1/ji(αiαj)y_{i}\cdot v_{i}=1/\prod_{j\neq i}(\alpha_{i}-\alpha_{j}), for 1ik11\leq i\leq{k_{1}}. By Lemma 1, the dimension of C2C_{2} satisfies

k2k1m(k1kfX)=fX.k_{2}\geq k_{1}-m(k_{1}-k_{f_{{X}}})=f_{{X}}. (17)

By Lemma 2, we know that the number of alternant codes that contain Sν\textrm{S}_{\nu} does not relate to the Hamming weight of Sν\textrm{S}_{\nu} and is at most

(qm1)k1(k1fX)/m.(q^{m}-1)^{k_{1}-(k_{1}-f_{{X}})/m}. (18)

On the other hand, the total number of alternant codes C2C_{2} is equal to the number of the choice of 𝐯\mathbf{v}, and it is equal to (qm1)k1(q^{m}-1)^{k_{1}} [40]. According to the counting argument in [40], if

(qm1)k1(k1fX)/mj=1λX1(q1)j(n1j)<(qm1)k1,(q^{m}-1)^{k_{1}-(k_{1}-f_{X})/m}\sum\limits_{j=1}^{\lambda_{X}-1}(q-1)^{j}\binom{n_{1}}{j}<(q^{m}-1)^{k_{1}}, (19)

then there exists an alternant code such that there does not exist any nonzero vector ν𝒞X\𝒞Z\nu\in\mathscr{C}_{X}\backslash\mathscr{C}_{Z}^{\bot} with weight less than λX\lambda_{X}. According to the estimate of Hamming ball in Lemma 3 and taking the limit as n1n_{1}\rightarrow\infty in (19), we can derive

k2n1fXn1=k1n1Hq(λXn1)O(1).\frac{k_{2}}{n_{1}}\geq\frac{f_{{X}}}{n_{1}}=\frac{k_{1}}{n_{1}}-H_{q}(\frac{\lambda_{{X}}}{n_{1}})-O(1). (20)

Combining (13), (14), and (20) above together, we have

{k1n11Hq(d1n1)O(1),k2n1k1n1Hq(λXn1)O(1),d𝒬min{d1,λX}.\left\{\begin{aligned} \frac{k_{1}}{n_{1}}&\geq 1-H_{q}(\frac{d_{1}}{n_{1}})-O(1),\\ \frac{k_{2}}{n_{1}}&\geq\frac{k_{1}}{n_{1}}-H_{q}(\frac{\lambda_{{X}}}{n_{1}})-O(1),\\ d_{\mathscr{Q}}&\geq\min\{d_{1},\lambda_{{X}}\}.\end{aligned}\right. (21)

If we let λX=d1+c\lambda_{{X}}=d_{1}+c, where cc is any constant, then we have

k𝒬n1=k2n112Hq(d𝒬n1)O(1).\frac{k_{\mathscr{Q}}}{n_{1}}=\frac{k_{2}}{n_{1}}\geq 1-2H_{q}(\frac{d_{\mathscr{Q}}}{n_{1}})-O(1). (22)

Suppose that we consider an asymmetry between ω1\omega_{1} and ω2\omega_{2} in the proof of Theorem 1, and we apply the CSS construction for AQCs in Lemma 6 to PC-CSS codes. Then asymmetric PC-CSS codes can attain the quantum GV bound for AQCs asymptotically.

Corollary 1

There exist asymptotically good asymmetric PC-CSS codes 𝒜=[[n𝒜,k𝒜,dZ/dX]]q\mathscr{A}=[[n_{\mathscr{A}},k_{\mathscr{A}},d_{Z}/d_{X}]]_{q} such that

k𝒜n𝒜1Hq(δX)Hq(δZ)O(1)\frac{k_{\mathscr{A}}}{n_{\mathscr{A}}}\geq 1-H_{q}(\delta_{X})-H_{q}(\delta_{Z})-O(1) (23)

for any block length n𝒜n_{\mathscr{A}}\rightarrow\infty, where δX=dX/n𝒜\delta_{X}=d_{X}/n_{\mathscr{A}} and δZ=dZ/n𝒜\delta_{Z}=d_{Z}/n_{\mathscr{A}} are the relative distances, and 0δXδZ11/q0\leq\delta_{X}\leq\delta_{Z}\leq 1-1/q.

It is known that there exist families of asymptotically good LDPC codes which can achieve the classical GV bound. But the dual of LDPC codes has a low-density generator matrix and thus the minimum distance is constant. If we use LDPC codes as the inner code C1C_{1}, then the minimum distance of the PC-CSS code without considering error degeneracy is constant to the block length. While considering error degeneracy, the low weight codewords in the dual of LDPC codes do not affect the counting argument in the proof of Theorem 1. Therefore, the PC-CSS code is extremely degenerate and the minimum distance is greatly improved from a constant to be linear with the block length. By applying the Evra-Kaufman-Zémor distance balancing construction [17], we show that our scheme can also lead to qLDPC codes wth non-vanishing rates and minimum distance growing with the square root of the block length [48].

In Corollary 1, PC-CSS codes are shown to attain the quantum GV bound for AQCs [11]. Moreover, we show that asymmetric PC-CSS codes can approach the capacity of asymmetric Pauli channels as the channel asymmetry goes to large. Suppose that we transmit quantum information over the Pauli channel:

ϱpIϱ+pXXϱX+pYYϱY+pZZϱZ\varrho\mapsto p_{I}\varrho+p_{X}{X}\varrho{X}+p_{Y}{Y}\varrho{Y}+p_{Z}{Z}\varrho{Z} (24)

for an input state ϱ\varrho, where {I,X,Y,Z}\{I,{X},{Y},{Z}\} are the Pauli operators, 0pI,pZ,pY,pZ10\leq p_{I},p_{Z},p_{Y},p_{Z}\leq 1, and pI+pX+pY+pZ=1p_{I}+p_{X}+p_{Y}+p_{Z}=1. Denote the total error probability by p=pX+pY+pZ\emph{{p}}=p_{X}+p_{Y}+p_{Z}. Denote by ζ=(pZ+pY)/(pX+pY)\zeta=(p_{Z}+p_{Y})/(p_{X}+p_{Y}) the asymmetry for the probabilities of Z{Z}-errors and X{X}-errors. Usually, we let pX=pYp_{X}=p_{Y}, then we have pX=p/(2ζ+1)p_{X}=\emph{{p}}/(2\zeta+1) and pZ=p(2ζ1)/(2ζ+1)p_{Z}=\emph{{p}}(2\zeta-1)/(2\zeta+1).

In Corollary 1, the inner code C1C_{1} can be chosen arbitrarily, we let it be an LDPC code, which is used to correct ZZ-errors. We use alternant codes to correct XX-errors. It is known that alternant codes can be decoded up to the GV bound under the bounded minimum distance decoder [40]. LDPC codes can approach the Shannon capacity of the binary symmetric channel under the BP decoding [49, 50]. Then the rate R𝒬R_{\mathscr{Q}} of PC-CSS codes under the asymmetric Pauli channel can approach

1H2(4pX)H2(pZ+pY)O(1).1-H_{2}(4p_{X})-H_{2}(p_{Z}+p_{Y})-O(1). (25)

In Fig. 1, we compare the the limit of PC-CSS codes in (25) with the Hashing bound given by R=1H2(p)R=1-H_{2}(\emph{{p}}) over Pauli channels with an asymmetry ζ=(pZ+pY)/(pX+pY)\zeta=(p_{Z}+p_{Y})/(p_{X}+p_{Y}). If ζ=1\zeta=1, then the channel is symmetric with pX=pY=pZ=p/3p_{X}=p_{Y}=p_{Z}=\emph{{p}}/3. As the asymmetry ζ\zeta grows, the gap between PC-CSS codes and the Hashing bound becomes increasingly smaller. In Fig. 1, when the asymmetry ζ=102\zeta=10^{2} and ζ=103\zeta=10^{3}, the code rate gaps are less than 3×1023\times 10^{-2} and 4×1034\times 10^{-3}, respectively. Therefore, PC-CSS codes can approach the Hashing bound of Pauli channels as the asymmetry grows. It should be noted that, although our codes are highly degenerate, they can not attain the bound in [15] for very noisy channels .

Refer to caption
Figure 1: The comparison of the asymptotic bound of asymmetric PC-CSS codes (solid lines) and the Hashing bound (dashed lines) with different channel asymmetries ζ=1,100,\zeta=1,100, and 10001000. The horizontal axis is the total error probability in the Pauli channel and the vertical axis is the quantum code rate.

The PC-CSS codes in Theorem 1 can also be used to prove the security of the famous BB84 quantum key distribution (QKD) protocol directly [51]. By a simple calculation, we can obtain a total qubit error rate (QBER) less than 7.56%7.56\% for the security of BB84 over Pauli channels. Although the rate is lower than the bound of 11%11\% in [51], our codes are not randomly generated and the LDPC component codes can be efficiently decoded. Since classical LDPC codes can approach the Shannon bound by using efficient BP decoders, PC-CSS codes are particularly applicable to efficient and practical QKD. Furthermore, if we consider asymmetric errors in Pauli channels, we can further improve the total QBER for the security of BB84. For example, if we admit an asymmetry ζ=100\zeta=100 between Z{Z}-errors and X{X}-errors, then the total QBER is less than 35.56%35.56\%. Our codes are competitive with quantum Polar codes in [52, 53] that can achieve the coherent information. But Ref. [52] needs some preshared entanglement assistance.

IV A Family of Fast Encodable and Decodable PC-CSS Codes

In practice, we need quantum codes to be efficiently encoded and decoded. Let the error syndrome as the input, we show that PC-CSS codes can be fast decoded. Moreover, we also show that PC-CSS codes can be fast encoded.

TABLE II: Parameters and the syndrome decoding complexity of several efficiently decodable quantum codes.
References Parameters Weight of XX-Stabilizers Weight of ZZ-Stabilizers Syndrome Decoding Complexity Parallel Syndrome Decoding Complexity
[54] [[N,Ω(N),Ω(N)]][[N,\Omega(N),\Omega(\sqrt{N})]] O(1)O(1) O(1)O(1) O(N)O(N) \\backslash
[27] [[N,Ω(N),Ω(N)]][[N,\Omega(N),\Omega({N})]] O(N)O(N) O(N)O(N) Polynomial \\backslash
[55] [[N,2,Ω(N)]][[N,2,\Omega(\sqrt{N})]] O(1)O(1) O(1)O(1) O(N3)O(N^{3}) \\backslash
[56] [[N,2,Ω(N)]][[N,2,\Omega(\sqrt{N})]] O(1)O(1) O(1)O(1) O(NlogN)O(N\log\sqrt{N}) O(logN)O(\log\sqrt{N})
[17] [[N,Ω(N/logN),Ω(NlogN)]][[N,\Omega(\sqrt{N/\log N}),\Omega(\sqrt{N\log N})]] O(1)O(1) O(1)O(1) Polynomial \\backslash
Corollary 2 [[N,Ω(N),Ω(N)]][[N,\Omega(\sqrt{N}),\Omega(\sqrt{N})]] O(N)O(\sqrt{N}) O(1)O(1) O(N)O({N}) O(N)O(\sqrt{N})
Corollary 3 [[N,Ω(N/logN),dZ/dX]][[N,\Omega(N/\log N),d_{Z}/d_{X}]] dZ=Ω(N/logN),d_{Z}=\Omega(N/\log N), dX=Ω(logN)d_{X}=\Omega(\log N) O(logN)O(\log N) O(1)O(1) O(N)O(N) O(logN)O(\log{N})
Theorem 2

Let n0>1n_{0}>1 and N>1N>1 be integers and let n0|Nn_{0}|N. There exists a family of asymmetric PC-CSS codes with parameters 𝒜=[[N,Ω(N/n0),dZΩ(N/n0)/dXn0]]\mathscr{A}=[[N,\Omega(N/n_{0}),d_{Z}\geq\Omega(N/n_{0})/d_{X}\geq n_{0}]]. The syndrome decoding of 𝒜\mathscr{A} can be done in O(N)O(N) time. Further, the parallel syndrome decoding of 𝒜\mathscr{A} can be done in O(log(N/n0)+n0)O(\log(N/n_{0})+n_{0}) time by using O(N/n0+N/n0log(N/n0))O(N/n_{0}+N/n_{0}\cdot\log(N/n_{0})) classical processors. Moreover, 𝒜\mathscr{A} can be encoded by a circuit of size O((N/n0)2+N)O((N/n_{0})^{2}+N) and depth O(N/n0+n0)O(N/n_{0}+n_{0}).

Proof:

Let C0=[n0,1,n0]C_{0}=[n_{0},1,n_{0}] be a binary repetition code whose parity check matrix and generator matrix are given by:

H0=(100101010011),andG0=(111),H_{0}=\left(\begin{array}[]{ccccc}1&0&\cdots&0&1\\ 0&1&\cdots&0&1\\ \vdots&\vdots&\ddots&\vdots&\vdots\\ 0&0&\cdots&1&1\end{array}\right),\ \textrm{and}\ G_{0}=(\begin{array}[]{ccccc}1&1&\cdots&1\end{array}), (26)

respectively. Let C1=[N,N/n0,n0]C_{1}=[N,N/n_{0},n_{0}] be a linear code with a parity check matrix H1=𝐈H0H_{1}=\mathbf{I}\otimes H_{0} and a generator matrix G1=𝐈G0G_{1}=\mathbf{I}\otimes G_{0}, where 𝐈\mathbf{I} is an identity matrix of size N/n0N/n_{0}. Let C2=[N2=N/n0,k2,d2]C_{2}=[N_{2}=N/n_{0},k_{2},d_{2}] be an asymptotically good expander code in [57] such that k2=γ2N2k_{2}=\gamma_{2}N_{2}, and d2=δ2N2d_{2}=\delta_{2}N_{2}, where 0<γ2,δ2<10<\gamma_{2},\delta_{2}<1. Let the parity check and generator matrices of C2C_{2} be H2H_{2} and G2G_{2}, respectively. Then we can construct an asymmetric PC-CSS code 𝒜=[[N,k2,dZ/dX]]\mathscr{A}=[[N,k_{2},d_{Z}/d_{X}]] with

X=H2G1,andZ=H1.\mathscr{H}_{X}=H_{2}G_{1},\ \textrm{and}\ \mathscr{H}_{Z}=H_{1}. (27)

It is not difficult to verify that dXd2d_{X}\geq d_{2} and dZn0d_{Z}\geq n_{0}.

We consider the syndrome decoding of 𝒜\mathscr{A}. For an XX-error eXe_{X}, the error syndrome is given by

SXXeXT=H2SX(1),\textrm{S}_{X}\equiv\mathscr{H}_{X}e_{X}^{T}=H_{2}\textrm{S}_{X}^{(1)}, (28)

where we denote by SX(1)=G1eXT\textrm{S}_{X}^{(1)}=G_{1}e_{X}^{T}. Suppose that wtH(eX)(d21)/2\textrm{wt}_{H}(e_{X})\leq\lfloor(d_{2}-1)/2\rfloor, then we must have wtH(SX(1))(d21)/2\textrm{wt}_{H}(\textrm{S}_{X}^{(1)})\leq\lfloor(d_{2}-1)/2\rfloor. Thus we can decode SX(1)=(SX1(1),,SXN2(1))\textrm{S}_{X}^{(1)}=(\textrm{S}_{X_{1}}^{(1)},\ldots,\textrm{S}_{X_{N_{2}}}^{(1)}) by using the expander code C2C_{2} in O(N2)O(N_{2}) time [57]. Further, C2C_{2} can also be decoded in parallel in O(log(N2))O(\log(N_{2})) time by using O(N2log(N2))O(N_{2}\cdot\log(N_{2})) classical processors [57]. Let e~X=(SX1(1),0,,SXN2(1),,0)\widetilde{e}_{X}=(\textrm{S}_{X_{1}}^{(1)},0,\ldots,\textrm{S}_{X_{N_{2}}}^{(1)},\ldots,0) be the decoded XX-error, where the 0s correspond to the redundant qubit positions in G1G_{1}. Then we have G1(eX+e~X)T=0G_{1}(e_{X}+\widetilde{e}_{X})^{T}=0 and 𝒬\mathscr{Q} is degenerate with respect to eX+e~Xe_{X}+\widetilde{e}_{X}.

Next, we use C1C_{1} to correct any ZZ-error eZe_{Z} such that wtH(eZ)(n01)/2\textrm{wt}_{H}(e_{Z})\leq\lfloor(n_{0}-1)/2\rfloor. We divide the parity check matrix H1H_{1} into n0n_{0} sub-blocks by columns, and each sub-block corresponds to a diagonal block H0H_{0} in H1H_{1}. Divide eZe_{Z} into N2N_{2} sub-blocks, i.e., eZ=(eZ1,,eZN2)e_{Z}=(e_{Z_{1}},\ldots,e_{Z_{N_{2}}}). Then there are at most (n01)/2\lfloor(n_{0}-1)/2\rfloor erroneous sub-blocks in eZe_{Z} and each erroneous sub-block has at most (n01)/2\lfloor(n_{0}-1)/2\rfloor errors. For each erroneous sub-block, we use the one-step majority-logic (OSMLG) decoding method [58] to check the error qubit that corresponds to the last column in H0H_{0}. Let e^Z=(e^Z1,,e^Zn0)\widehat{e}_{Z}=(\widehat{e}_{Z_{1}},\ldots,\widehat{e}_{Z_{n_{0}}}) be any sub-block in {eZi|1iN2}\{e_{Z_{i}}|1\leq i\leq N_{2}\}. Then we can derive the following syndrome for e^Z\widehat{e}_{Z}:

Se^Z=e^ZH0T=(e^Z1,,e^Zn01)+e^Zn0E0,S_{\widehat{e}_{Z}}=\widehat{e}_{Z}H_{0}^{T}=(\widehat{e}_{Z_{1}},\ldots,\widehat{e}_{Z_{n_{0}-1}})+\widehat{e}_{Z_{n_{0}}}E_{0}, (29)

where E0=(1,,1)E_{0}=(1,\ldots,1) is an all-ones vector of length n01n_{0}-1. If e^Zn0=0\widehat{e}_{Z_{n_{0}}}=0, then there are at most (n01)/2\lfloor(n_{0}-1)/2\rfloor ones in the vector (e^Z1,,e^Zn01)(\widehat{e}_{Z_{1}},\ldots,\widehat{e}_{Z_{n_{0}-1}}). Thus the Hamming weight of the syndrome Se^ZS_{\widehat{e}_{Z}} is at most (n01)/2\lfloor(n_{0}-1)/2\rfloor. While if e^Zn0=1\widehat{e}_{Z_{n_{0}}}=1, then there are at most (n01)/21\lfloor(n_{0}-1)/2\rfloor-1 ones in the vector (e^Z1,,e^Zn01)(\widehat{e}_{Z_{1}},\ldots,\widehat{e}_{Z_{n_{0}-1}}). Then the Hamming weight of the syndrome Se^ZS_{\widehat{e}_{Z}} is at least n0(n01)/2=(n01)/2+1n_{0}-\lfloor(n_{0}-1)/2\rfloor=\lfloor(n_{0}-1)/2\rfloor+1. Therefore we can use the OSMLG decoding to determine e^Zn0\widehat{e}_{Z_{n_{0}}}, and then (e^Z1,,e^Zn01)(\widehat{e}_{Z_{1}},\ldots,\widehat{e}_{Z_{n_{0}-1}}) can be derived from (35) directly.

The running time for deriving e^Z=(e^Z1,,e^Zn0)\widehat{e}_{Z}=(\widehat{e}_{Z_{1}},\ldots,\widehat{e}_{Z_{n_{0}}}) is determined by the computation of the Hamming weight of the syndrome Se^ZS_{\widehat{e}_{Z}}. The computation time complexity is O(n0)O(n_{0}). Thus the running time for decoding all the erroneous sub-blocks is O(N)O(N) since there are N/n0N/n_{0} sub-blocks. Here, the decoding of the n0n_{0} sub-blocks can also be carried out in parallel by using N/n0N/n_{0} classical processors. Thus the parallel syndrome decoding of the ZZ-error eZe_{Z} can be done in O(n0)O(n_{0}) time by using N/n0N/n_{0} classical processors. Overall, the syndrome decoding of 𝒜\mathscr{A} can be done in O(N/n0+N)O(N/n_{0}+N) time or can be done in parallel in O(log(N/n0)+n0)O(\log(N/n_{0})+n_{0}) time by using O(N/n0log(N/n0)+N/n0)O(N/n_{0}\cdot\log(N/n_{0})+N/n_{0}) classical processors.

Next, we consider the encoding of 𝒜\mathscr{A} and we use the standard encoding method of CSS codes in [34] to do that. We can encode the pure state as follows:

|u+𝒞Z1|𝒞Z|v𝒞Z|u+v,|u+\mathscr{C}_{Z}^{\bot}\rangle\equiv\frac{1}{\sqrt{|\mathscr{C}_{Z}^{\bot}|}}\sum_{v\in\mathscr{C}_{Z}^{\bot}}|u+v\rangle, (30)

where u𝒞X\𝒞Zu\in\mathscr{C}_{X}\backslash\mathscr{C}_{Z}^{\bot}. It is not difficult to verify that the generator matrix of 𝒞X\mathscr{C}_{X} is given by

𝒢X=(H1𝐎G2),\mathscr{G}_{X}=\left(\begin{array}[]{cccc}H_{1}\\ \mathbf{O}\ G_{2}\end{array}\right), (31)

where 𝐎\mathbf{O} is a zero matrix of size k2×(NN/n0)k_{2}\times(N-N/n_{0}), and G2=[IP2]G_{2}=[I\ P_{2}] is in the standard form. Denote by P2=[P1,,Pr2]P_{2}=[\textbf{P}_{1},\ldots,\textbf{P}_{r_{2}}], where each Pi(1ir2)\textbf{P}_{i}(1\leq i\leq r_{2}) is a column of P2P_{2} and r2=N/n0k2r_{2}=N/n_{0}-k_{2}. Then the encoding circuit of the PC-CSS code 𝒜\mathscr{A} is given in Fig. LABEL:EncodingCircuitBacon. In Stage I of the encoding circuit, the number of gates is determined by the density of P2P_{2} and it is at most O((N/n0)2)O((N/n_{0})^{2}). It is easy to see that the depth of Stage I is k2k_{2}. While in Stage II, the number of C-NOT gates is exactly NN/n0N-N/n_{0} and the depth is n0n_{0}. Therefore the size of the encoding circuit is O((N/n0)2+N)O((N/n_{0})^{2}+N) and the depth is k2+n0=O(N/n0+n0)k_{2}+n_{0}=O(N/n_{0}+n_{0}). ∎

Notice that the last column in H0H_{0} in the proof of Theorem 2 is quite dense and then H1H_{1} is also dense. However, we can transform H0H_{0} into a sparse matrix by multiplying a series of elementary matrices in the left. Therefore the Z{Z}-stabilizer generators of 𝒜\mathscr{A} satisfy the qLDPC constraint [37] . In the fault tolerant settings, we require quantum codes to correct a linear number of random errors. We consider the correction of random errors by using PC-CSS codes. We assume that the noise model used is the independent error model in [59, 38, 60]. Denote by pzp_{z} the probability of each ZZ-error. It is shown that the PC-CSS code 𝒜\mathscr{A} in Theorem 2 can correct any adversarial ZZ-error eZe_{Z} of weight less than half the ZZ distance bound. We count all the uncorrectable errors of weight larger than half the minimum distance bound. It is easy to see that if there is at least one sub-block that has ZZ-errors of weight larger than d0=(n01)/2d_{0}=\lfloor(n_{0}-1)/2\rfloor, then eZe_{Z} is undetectable. All the uncorrectable ZZ-errors are counted as follows in equations (32) - (34).

𝒫Z\displaystyle\mathcal{P}_{Z} \displaystyle\leq CN21Cn0d0+1(pzd0+1(1pz)Nd01+CNd011pzd0+2(1pz)Nd02++CNd01Nd01pzN)\displaystyle C_{N_{2}}^{1}C_{n_{0}}^{d_{0}+1}(p_{z}^{d_{0}+1}(1-p_{z})^{N-d_{0}-1}+C_{N-d_{0}-1}^{1}p_{z}^{d_{0}+2}(1-p_{z})^{N-d_{0}-2}+\cdots+C_{N-d_{0}-1}^{N-d_{0}-1}p_{z}^{N}) (32)
=\displaystyle= CN21Cn0d0+1pzd0+1i=0Nd01CNd01ipzi(1pz)Nd01i\displaystyle C_{N_{2}}^{1}C_{n_{0}}^{d_{0}+1}p_{z}^{d_{0}+1}\sum_{i=0}^{N-d_{0}-1}C_{N-d_{0}-1}^{i}p_{z}^{i}(1-p_{z})^{N-d_{0}-1-i} (33)
\displaystyle\leq N22n01pzd0+1,\displaystyle N_{2}2^{n_{0}-1}p_{z}^{d_{0}+1}, (34)

We denote by 𝒫Z\mathcal{P}_{Z} the probability of uncorrectable ZZ-errors and denote by N2=N/n0N_{2}=N/n_{0}. Let c>0c>0 be any constant. If we let n0=Ω(logN)n_{0}=\Omega(\log N) and let pz<1/4c+1p_{z}<1/4^{c+1}, then Nc𝒫ZN^{c}\mathcal{P}_{Z} vanishes as NN\rightarrow\infty. If we let n0=Θ(Nc0)n_{0}=\Theta(N^{c_{0}}), where 0<c0<10<c_{0}<1 is constant, then Nc𝒫ZN^{c}\mathcal{P}_{Z} vanishes when pz<25%p_{z}<25\% as NN\rightarrow\infty. Therefore the PC-CSS code 𝒜\mathscr{A} in Theorem 2 can correct a linear number of random ZZ-errors with high probability in O(n0)O(n_{0}) time as long as n0=Ω(logN)n_{0}=\Omega(\log N). However, for the correction of random Z{Z}-errors, we cannot get a non vanishing threshold.

If we let n0=Θ(N)n_{0}=\Theta(\sqrt{N}) or n0=Θ(logN)n_{0}=\Theta(\log N), we can derive the following two families of fast encodable and decodable quantum codes.

Corollary 2

There exists a family of quantum codes with parameters 𝒬1=[[N,Ω(N),Ω(N)]].\mathscr{Q}_{1}=[[N,\Omega(\sqrt{N}),\Omega(\sqrt{N})]]. For an input error syndrome, 𝒬1\mathscr{Q}_{1} can correct all errors of weight smaller than half the minimum distance bound in O(N)O({N}) time. 𝒬1\mathscr{Q}_{1} can also be decoded in parallel in O(N)O(\sqrt{N}) time by using O(N)O(\sqrt{N}) classical processors. We show that 𝒬1\mathscr{Q}_{1} can be encoded efficiently by a circuit of size O(N)O(N) and depth O(N)O(\sqrt{N}). Moreover, 𝒬1\mathscr{Q}_{1} can correct a random ZZ-error with very high probability provided pz<25%p_{z}<25\%.

Corollary 3

There exists a family of quantum codes with parameters 𝒬2=[[N,Ω(N/logN),Ω(N/logN)/Ω(logN)]].\mathscr{Q}_{2}=[[N,\Omega(N/\log N),\Omega(N/\log N)/\Omega(\log N)]]. For an input error syndrome, 𝒬2\mathscr{Q}_{2} can correct an almost linear number of Z{Z}-errors and can also correct a linear number of X{X}-errors with high probability in O(N)O(N) time. Further, 𝒬2\mathscr{Q}_{2} can be decoded in parallel in O(log(N))O(\log(N)) time by using O(N)O(N) classical processors.

In [27], families of concatenated quantum AG codes were constructed and decoded efficiently in polynomial time, while our codes in Theorem 2 can be decoded in linear time. Therefore our codes are more efficient than concatenated quantum AG codes in [27]. In particular, the parallel syndrome decoding of Corollary 2 can be carried out in sublinear time, and that of Corollary 3 can be carried out in logarithmic time. In Table II, we compare the parameters and decoding complexity of several efficiently decodable quantum codes.

V Enlargement of PC-CSS Codes Achieving the Quantum GV Bound for Enlarged CSS Codes Asymptotically

In [22, 23], an enlargement construction of CSS codes was proposed by enlarging the dual-containing codes. Further, several upper and lower bounds for the enlargement of CSS codes were given in [22, 23]. Among them, whether enlargement of CSS codes can attain the quantum GV bound for enlarged CSS codes is unknown. In this work, we show that enlarged PC-CSS codes can attain the quantum GV bound asymptotically.

Theorem 3

There exist a family of enlarged stabilizer codes with parameters 𝒬=[[n𝒬,k𝒬,d𝒬]]q\mathscr{Q}=[[n_{\mathscr{Q}},k_{\mathscr{Q}},d_{\mathscr{Q}}]]_{q} achieving the quantum GV bound for enlarged CSS codes asymptotically. 𝒬\mathscr{Q} can achieve a quantum rate

k𝒬n𝒬1Hq(δ𝒬)Hq(qq+1δ𝒬)O(1)\frac{k_{\mathscr{Q}}}{n_{\mathscr{Q}}}\geq 1-H_{q}(\delta_{\mathscr{Q}})-H_{q}(\frac{q}{q+1}\delta_{\mathscr{Q}})-O(1) (35)

for any block length n𝒬n_{\mathscr{Q}}\rightarrow\infty, where δ𝒬=d𝒬/n𝒬\delta_{\mathscr{Q}}=d_{\mathscr{Q}}/n_{\mathscr{Q}} is the relative minimum distance.

Proof:

Suppose that C1=[n1,k1,d1]qC_{1}=[n_{1},k_{1},d_{1}]_{q} is a dual-containing code, i.e., C1C1C_{1}^{\bot}\subseteq C_{1}. Denote the parity check and generator matrices of C1C_{1} by H1H_{1} and G1G_{1}, respectively. We begin with a family of dual-containing codes. It is known that there exists asymptotically good dual-containing codes C1C1C_{1}^{\bot}\subseteq C_{1} achieving the quantum GV bound [61, 9], i.e.,

k1n11Hq(δ1)O(1),n1,\frac{k_{1}}{n_{1}}\geq 1-H_{q}(\delta_{1})-O(1),\ n_{1}\rightarrow\infty, (36)

where δ1=d1/n1\delta_{1}=d_{1}/n_{1} is the relative distance of C1C_{1}. Let r1=n1k1r_{1}=n_{1}-k_{1} and let C2=[r1,k2,d2]qC_{2}=[r_{1},k_{2},d_{2}]_{q} be an alternant code. Denote the parity check and generator matrices of C2C_{2} by H2H_{2} and G2G_{2}, respectively. We construct a linear code C3=[n1,k1+k2,d3]qC_{3}=[n_{1},k_{1}+k_{2},d_{3}]_{q} with a parity check matrix given by

H3=H2H1.H_{3}=H_{2}H_{1}. (37)

Then there is C1C1C3C_{1}^{\bot}\subseteq C_{1}\subseteq C_{3}. According to the enlarged CSS construction in Lemma 5, we can derive a stabilizer code with parameters 𝒬=[[n1,k𝒬=2k1+k2n1,d𝒬=min{d1,ω2}]]q,\mathscr{Q}=[[n_{1},k_{\mathscr{Q}}=2k_{1}+k_{2}-n_{1},d_{\mathscr{Q}}=\min\{d_{1},\omega_{2}\}]]_{q}, where ω2=q+1qd3\omega_{2}=\lceil\frac{q+1}{q}d_{3}\rceil. We need to determine ω2\omega_{2} and we chose C2=[r1,k2,d2]qC_{2}=[r_{1},k_{2},d_{2}]_{q} as an alternant code.

Let 1fAr11\leq f_{A}\leq r_{1} and denote by kfA=r1(r1fA)/mk_{f_{A}}=r_{1}-(r_{1}-f_{A})/m, where m2m\geq 2 is an integer and m|(n1fA)m|(n_{1}-f_{A}). For some given 𝐛=(β1,β2,,βr1)GF(qm)r1\mathbf{b}=(\beta_{1},\beta_{2},\ldots,\beta_{r_{1}})\in GF(q^{m})^{r_{1}} and varying 𝐮=(u1,u2,,ur1)GF(qm)r1\mathbf{u}=(u_{1},u_{2},\ldots,u_{r_{1}})\in GF(q^{m})^{r_{1}}, let GRSkfA(𝐛,𝐮)=[r1,kfA,r1kfA+1]qm\textrm{GRS}_{k_{f_{A}}}(\mathbf{b},\mathbf{u})=[r_{1},{k_{f_{A}}},r_{1}-{k_{f_{A}}}+1]_{q^{m}} be a GRS code over GF(qm)GF(q^{m}). Let

C2𝒜r1kfA(b,z)=GRSkfA(𝐛,𝐮)|GF(q)C_{2}\equiv\mathcal{A}_{r_{1}-k_{f_{A}}}(\textbf{b},\textbf{z})=\textrm{GRS}_{k_{f_{A}}}(\mathbf{b},\mathbf{u})|GF(q) (38)

be an alternant code, where 𝐳=(z1,z2,,zr1)\mathbf{z}=(z_{1},z_{2},\ldots,z_{r_{1}}) and ziui=1/ji(βiβj)z_{i}\cdot u_{i}=1/\prod_{j\neq i}(\beta_{i}-\beta_{j}), for 1ir11\leq i\leq r_{1}. By Lemma 1, the dimension of C2C_{2} satisfies

k2r1m(r1kfA)=fA.k_{2}\geq r_{1}-m(r_{1}-k_{f_{A}})=f_{A}. (39)

Let 1<λA<n11<\lambda_{A}<n_{1} be an integer. Let υGF(q)n1\upsilon\in GF(q)^{n_{1}} be any nonzero vector with Hamming weight less than λA\lambda_{A}. Denote by Sυ=H1υT\textrm{S}_{\upsilon}=H_{1}\upsilon^{T}. If λA<d1\lambda_{A}<d_{1}, then we must have Sυ0\textrm{S}_{\upsilon}\neq 0. If υC3\upsilon\in C_{3}, then we have H2Sυ=H2H1υT=0H_{2}\textrm{S}_{\upsilon}=H_{2}H_{1}\upsilon^{T}=0. By Lemma 2, we know that the number of alternant codes that contain the nonzero vector Sυ\textrm{S}_{\upsilon} does not relate to the Hamming weight of Sυ\textrm{S}_{\upsilon} and is at most

(qm1)r1(r1fA)/m.(q^{m}-1)^{r_{1}-(r_{1}-f_{A})/m}. (40)

On the other hand, the total number of alternant codes C2C_{2} is equal to the number of the choice of 𝐮\mathbf{u}, and it is equal to (qm1)r1(q^{m}-1)^{r_{1}}. According to the counting argument in [40], if

(qm1)r1(r1fA)/mj=1λA1(q1)j(n1j)<(qm1)r1,(q^{m}-1)^{r_{1}-(r_{1}-f_{A})/m}\sum\limits_{j=1}^{\lambda_{A}-1}(q-1)^{j}\binom{n_{1}}{j}<(q^{m}-1)^{r_{1}}, (41)

then there exists an alternant code such that there does not exist any nonzero vector υC3\upsilon\in C_{3} with weight less than λA\lambda_{A}. Therefore we have d3λAd_{3}\geq\lambda_{A}. According to the estimate of Hamming ball in Lemma 3 and taking the limit as n1n_{1}\rightarrow\infty in (41), we can derive

k2n1fAn1=r1n1Hq(λAn1)O(1).\frac{k_{2}}{n_{1}}\geq\frac{f_{A}}{n_{1}}=\frac{r_{1}}{n_{1}}-H_{q}(\frac{\lambda_{A}}{n_{1}})-O(1). (42)

Combining (36), (42), and the parameters of 𝒬\mathscr{Q} above together, we have

{k1n11Hq(d1n1)O(1),k2n1r1n1Hq(λAn1)O(1),d𝒬min{d1,q+1qλA},d1>λA.\left\{\begin{aligned} \frac{k_{1}}{n_{1}}&\geq 1-H_{q}(\frac{d_{1}}{n_{1}})-O(1),\\ \frac{k_{2}}{n_{1}}&\geq\frac{r_{1}}{n_{1}}-H_{q}(\frac{\lambda_{A}}{n_{1}})-O(1),\\ d_{\mathscr{Q}}&\geq\min\{d_{1},\lceil\frac{q+1}{q}\lambda_{A}\rceil\},\\ d_{1}&>\lambda_{A}.\end{aligned}\right. (43)

Then there is

{k𝒬n11Hq(d1n1)Hq(λAn1)O(1),d𝒬min{d1,q+1qλA},d1>λA.\left\{\begin{aligned} \frac{k_{\mathscr{Q}}}{n_{1}}&\geq 1-H_{q}(\frac{d_{1}}{n_{1}})-H_{q}(\frac{\lambda_{A}}{n_{1}})-O(1),\\ d_{\mathscr{Q}}&\geq\min\{d_{1},\lceil\frac{q+1}{q}\lambda_{A}\rceil\},\\ d_{1}&>\lambda_{A}.\end{aligned}\right. (44)

If we let d1=q+1qλAd_{1}=\lceil\frac{q+1}{q}\lambda_{A}\rceil, then we have

k𝒬n11Hq(d𝒬n1)Hq(qq+1d𝒬n1)O(1).\frac{k_{\mathscr{Q}}}{n_{1}}\geq 1-H_{q}(\frac{d_{\mathscr{Q}}}{n_{1}})-H_{q}(\frac{q}{q+1}\cdot\frac{d_{\mathscr{Q}}}{n_{1}})-O(1). (45)

VI Discussions and Conclusions

Constructing asymptotically good QECCs is one central problem in quantum coding theory. In this paper, we have proposed a partial concatenation construction of CSS codes by using alternant codes as the outer code and any linear code achieving the GV bound as the inner code. We show that PC-CSS codes can attain the quantum GV bound for CSS codes and AQCs asymptotically. Further, we show that PC-CSS codes can approach the Hashing bound for asymmetric Pauli channels with a large asymmetry. In addition, PC-CSS codes can be used to prove the security of the BB84 QKD protocol. Moreover, the concatenation scheme can asymptotically attain the quantum GV bound for enlarged CSS codes by using Steane’s enlargement construction of CSS codes.

We derive a family of PC-CSS codes that can be encoded by a circuit of linear size and sublinear depth, and the syndrome decoding of PC-CSS codes can be done in linear time. Moreover, we show that the parallel syndrome decoding of the family of PC-CSS codes can be done in sublinear time. We derive a family of PC-CSS codes that can correct a linear number of X{X}-errors with high probability and an almost linear number of Z{Z}-errors in linear time. The parallel syndrome decoding of the family of PC-CSS codes can be done in logarithmic time. One interesting future work is how to compute the threshold of PC-CSS codes for correcting random quantum errors.

Acknowledgment

The authors would like to thank the anonymous referees and the Associate Editor for their valuable comments and helpful suggestions.

References

  • [1] I. H. Deutsch, “Harnessing the power of the second quantum revolution,” PRX Quantum, vol. 1, no. 2, p. 020101, 2020.
  • [2] J. Preskill, “Quantum computing in the NISQ era and beyond,” Quantum, vol. 2, p. 79, 2018.
  • [3] A. Calderbank, E. Rains, P. Shor, and N. Sloane, “Quantum error correction via codes over GF(4),” IEEE Trans. Inf. Theory, vol. 44, no. 4, pp. 1369–1387, 1998.
  • [4] P. W. Shor, “Scheme for reducing decoherence in quantum computer memory,” Phys. Rev. A, vol. 52, no. 4, p. R2493, 1995.
  • [5] A. R. Calderbank and P. W. Shor, “Good quantum error-correcting codes exist,” Phys. Rev. A, vol. 54, no. 2, p. 1098, 1996.
  • [6] M. Christandl and A. Müller-Hermes, “Fault-tolerant coding for quantum communication,” arXiv preprint arXiv:2009.07161, 2020.
  • [7] A. Ekert and C. Macchiavello, “Quantum error correction for communication,” Phys. Rev. Lett., vol. 77, no. 12, p. 2585, 1996.
  • [8] A. R. Calderbank, E. M. Rains, P. W. Shor, and N. J. Sloane, “Quantum error correction and orthogonal geometry,” Phys. Rev. Lett., vol. 78, no. 3, p. 405, 1997.
  • [9] A. E. Ashikhmin, A. M. Barg, E. Knill, and S. N. Litsyn, “Quantum error detection. II. bounds,” IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 789–800, 2000.
  • [10] A. Ashikhmin and E. Knill, “Nonbinary quantum stabilizer codes,” IEEE Trans. Inf. Theory, vol. 47, no. 7, pp. 3065–3072, 2001.
  • [11] R. Matsumoto, “Two Gilbert-Varshamov-type existential bounds for asymmetric quantum error-correcting codes,” Quantum Inf. Process., vol. 16, no. 12, p. 285, 2017.
  • [12] Z. Li, L. Xing, and X. Wang, “A family of asymptotically good quantum codes based on code concatenation,” IEEE Trans. Inf. Theory, vol. 55, no. 8, pp. 3821–3824, 2009.
  • [13] Y. Ouyang, “Concatenated quantum codes can attain the quantum Gilbert-Varshamov bound,” IEEE Trans. Inf. Theory, vol. 60, no. 6, pp. 3117–3122, 2014.
  • [14] K. Feng and Z. Ma, “A finite Gilbert-Varshamov bound for pure stabilizer quantum codes,” IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3323–3325, 2004.
  • [15] D. P. DiVincenzo, P. W. Shor, and J. A. Smolin, “Quantum-channel capacity of very noisy channels,” Phys. Rev. A, vol. 57, pp. 830–839, Feb 1998.
  • [16] J. Fan, J. Li, Y. Zhou, M.-H. Hsieh, and H. V. Poor, “Entanglement-assisted concatenated quantum codes,” Proceedings of the National Academy of Sciences, vol. 119, no. 24, p. e2202235119, 2022.
  • [17] S. Evra, T. Kaufman, and G. Zémor, “Decodable quantum LDPC codes beyond the square root distance barrier using high dimensional expanders,” in 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS).   IEEE, 2020, pp. 218–227.
  • [18] M. B. Hastings, J. Haah, and R. O’Donnell, “Fiber bundle codes: breaking the n1/2n^{1/2}polylog(nn) barrier for quantum LDPC codes,” in Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing.   ACM, 2021, pp. 1276–1288.
  • [19] N. P. Breuckmann and J. N. Eberhardt, “Quantum low-density parity-check codes,” PRX Quantum, vol. 2, no. 4, p. 040101, 2021.
  • [20] P. Panteleev and G. Kalachev, “Quantum LDPC codes with almost linear minimum distance,” IEEE Trans. Inf. Theory, 2021.
  • [21] ——, “Asymptotically good quantum and locally testable classical LDPC codes,” arXiv preprint arXiv:2111.03654, 2021.
  • [22] A. Steane, “Enlargement of Calderbank-Shor-Steane quantum codes,” IEEE Trans. Inf. Theory, vol. 45, no. 7, pp. 2492–2495, 1999.
  • [23] S. Ling, J. Luo, and C. Xing, “Generalization of Steane’s enlargement construction of quantum codes and applications,” IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 4080–4084, 2010.
  • [24] A. Ashikhmin, S. Litsyn, and M. A. Tsfasman, “Asymptotically good quantum codes,” Phys. Rev. A, vol. 63, no. 3, p. 032311, 2001.
  • [25] R. Matsumoto, “Improvement of Ashikhmin-Litsyn-Tsfasman bound for quantum codes,” IEEE Trans. Inf. Theory, vol. 48, no. 7, pp. 2122–2124, 2002.
  • [26] H. Chen, S. Ling, and C. Xing, “Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound,” IEEE Trans. Inf. Theory, vol. 47, no. 5, pp. 2055–2058, 2001.
  • [27] M. Hamada, “Concatenated quantum codes constructible in polynomial time: efficient decoding and error correction,” IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5689–5704, 2008.
  • [28] K. Feng, S. Ling, and C. Xing, “Asymptotic bounds on quantum codes from algebraic geometry codes,” IEEE Trans. Inf. Theory, vol. 52, no. 3, pp. 986–991, 2006.
  • [29] A. Niehage, “Nonbinary quantum Goppa codes exceeding the quantum Gilbert-Varshamov bound,” Quantum Inf. Process., vol. 6, no. 3, pp. 143–158, 2007.
  • [30] L. Wang, K. Feng, S. Ling, and C. Xing, “Asymmetric quantum codes: characterization and constructions,” IEEE Trans. Inf. Theory, vol. 56, no. 6, pp. 2938–2945, 2010.
  • [31] A. Holmes, M. R. Jokar, G. Pasandi, Y. Ding, M. Pedram, and F. T. Chong, “NISQ+: boosting quantum computing power by approximating quantum error correction,” in 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA).   IEEE, 2020, pp. 556–569.
  • [32] M.-H. Hsieh and F. Le Gall, “NP-hardness of decoding quantum error-correction codes,” Phys. Rev. A, vol. 83, no. 5, p. 052331, 2011.
  • [33] D. Poulin and Y. Chung, “On the iterative decoding of sparse quantum codes,” Quantum Info. Comput., vol. 8, no. 10, pp. 987–1000, 2008.
  • [34] R. Cleve and D. Gottesman, “Efficient computations of encodings for quantum error correction,” Phys. Rev. A, vol. 56, no. 1, p. 76, 1997.
  • [35] E. Dennis, A. Kitaev, A. Landahl, and J. Preskill, “Topological quantum memory,” J. Math. Phys., vol. 43, no. 9, pp. 4452–4505, 2002.
  • [36] O. Higgott, M. Wilson, J. Hefford, J. Dborin, F. Hanif, S. Burton, and D. E. Browne, “Optimal local unitary encoding circuits for the surface code,” arXiv preprint arXiv:2002.00362, 2020.
  • [37] M. Hastings, “On quantum weight reduction,” arXiv preprint arXiv:2102.10030, 2021.
  • [38] D. Gottesman, “Fault-tolerant quantum computation with constant overhead,” Quantum Inf. Comput., vol. 14, no. 15-16, pp. 1338–1372, 2014.
  • [39] S. Muralidharan, J. Kim, N. Lütkenhaus, M. D. Lukin, and L. Jiang, “Ultrafast and fault-tolerant quantum communication across long distances,” Phys. Rev. Lett., vol. 112, no. 25, p. 250501, 2014.
  • [40] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes.   Amsterdam: The Netherlands: North-Holland, 1981.
  • [41] A. Ketkar, A. Klappenecker, S. Kumar, and P. K. Sarvepalli, “Nonbinary stabilizer codes over finite fields,” IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 4892–4914, 2006.
  • [42] P. K. Sarvepalli, A. Klappenecker, and M. Rötteler, “Asymmetric quantum codes: constructions, bounds and performance,” in Proc. Roy. Soc. A, vol. 465, 2009, pp. 1645–1672.
  • [43] J.-C. Faugere, A. Otmani, L. Perret, F. De Portzamparc, and J.-P. Tillich, “Folding alternant and Goppa codes with non-trivial automorphism groups,” IEEE Trans. Inf. Theory, vol. 62, no. 1, pp. 184–198, 2015.
  • [44] V. Guruswami, “Introduction to coding theory,” https://www.cs.cmu.edu/ venkatg/teaching/codingtheory/, 2010.
  • [45] A. M. Steane, “Simple quantum error-correcting codes,” Phys. Rev. A, vol. 54, no. 6, p. 4741, 1996.
  • [46] L. Ioffe and M. Mézard, “Asymmetric quantum error-correcting codes,” Phys. Rev. A, vol. 75, p. 032345, 2007.
  • [47] J. Fan, J. Li, J. Wang, Z. Wei, and M.-H. Hsieh, “Asymmetric quantum concatenated and tensor product codes with large ZZ-distances,” IEEE Trans. Commun., vol. 69, no. 6, pp. 3971–3983, 2021.
  • [48] J. Fan, J. Li, Y. Wang, Y. Li, M.-H. Hsieh, and J. Du, “From generalization of Bacon-Shor codes to high performance quantum LDPC codes,” arXiv preprint arXiv:2107.05174, 2021.
  • [49] D. J. MacKay, Information theory, inference and learning algorithms.   Cambridge university press, 2003.
  • [50] T. J. Richardson and R. L. Urbanke, “The capacity of low-density parity-check codes under message-passing decoding,” IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 599–618, 2001.
  • [51] P. W. Shor and J. Preskill, “Simple proof of security of the BB84 quantum key distribution protocol,” Phys. Rev. Lett., vol. 85, no. 2, p. 441, 2000.
  • [52] J. M. Renes, F. Dupuis, and R. Renner, “Efficient Polar coding of quantum information,” Phys. Rev. Lett., vol. 109, no. 5, p. 050504, 2012.
  • [53] J. M. Renes, D. Sutter, F. Dupuis, and R. Renner, “Efficient quantum polar codes requiring no preshared entanglement,” IEEE Trans. Inf. Theory, vol. 61, no. 11, pp. 6395–6414, 2015.
  • [54] A. Leverrier, J.-P. Tillich, and G. Zémor, “Quantum expander codes,” in 2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS).   IEEE, 2015, pp. 810–824.
  • [55] A. Y. Kitaev, “Fault-tolerant quantum computation by anyons,” Ann. Phys., vol. 303, no. 1, pp. 2–30, 2003.
  • [56] G. Duclos-Cianci and D. Poulin, “Fast decoders for topological quantum codes,” Phys. Rev. Lett., vol. 104, no. 5, p. 050504, 2010.
  • [57] M. Sipser and D. A. Spielman, “Expander codes,” IEEE Trans. Inf. Theory, vol. 42, no. 6, pp. 1710–1722, 1996.
  • [58] S. Lin and D. J. Costello, Error Control Coding: Fundamentals and Applications, 2nd ed.   Upper Saddle River, NJ: Prentice-Hall, Inc., 2004.
  • [59] O. Fawzi, A. Grospellier, and A. Leverrier, “Efficient decoding of random errors for quantum expander codes,” in Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018, pp. 521–534.
  • [60] I. Dumer, A. A. Kovalev, and L. P. Pryadko, “Thresholds for correcting errors, erasures, and faulty syndrome measurements in degenerate quantum codes,” Phys. Rev. Lett., vol. 115, no. 5, p. 050502, 2015.
  • [61] A. E. Ashikhmin, A. M. Barg, E. Knill, and S. N. Litsyn, “Quantum error detection. I. statement of the problem,” IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 778–788, 2000.
Jihao Fan received the B.S. degree in Mathematics and Applied Mathematics from Lanzhou University, Lanzhou, China, in 2009, and the Ph.D. degree in Computer Software and Theory from Southeast University, Nanjing, China, in 2016. He is currently an Associate Professor with the Nanjing University of Science and Technology, Nanjing, China. His research interests include classical and quantum coding theory, information theory, and machine learning.
Jun Li (M’09-SM’16) received Ph. D degree in Electronic Engineering from Shanghai Jiao Tong University, Shanghai, P. R. China in 2009. From January 2009 to June 2009, he worked in the Department of Research and Innovation, Alcatel Lucent Shanghai Bell as a Research Scientist. From June 2009 to April 2012, he was a Postdoctoral Fellow at the School of Electrical Engineering and Telecommunications, the University of New South Wales, Australia. From April 2012 to June 2015, he was a Research Fellow at the School of Electrical Engineering, the University of Sydney, Australia. From June 2015 to now, he is a Professor at the School of Electronic and Optical Engineering, Nanjing University of Science and Technology, Nanjing, China. He was a visiting professor at Princeton University from 2018 to 2019. His research interests include network information theory, game theory, distributed intelligence, multiple agent reinforcement learning, and their applications in ultra-dense wireless networks, mobile edge computing, network privacy and security, and industrial Internet of things. He has co-authored more than 200 papers in IEEE journals and conferences, and holds 1 US patents and more than 10 Chinese patents in these areas. He is serving as an editor of IEEE Transactions on Wireless Communication and TPC member for several flagship IEEE conferences.
Ya Wang received the Ph.D. degree in Physics from the University of Science and Technology of China (USTC) in 2012. From August 2012 to July 2016, he was a Postdoctoral Fellow at Stuttgart University. From July 2016 to March 2018, he was a Research Fellow at the University of Science and Technology of China. From April 2018 to now, he has been a professor with the School of Physical Sciences of USTC. His research interests include spin-based quantum devices, spin quantum control, and their applications in quantum science. He currently focuses on diamond quantum device engineering and applications in quantum technologies.
Yonghui Li (M’04-SM’09-F’19) received his PhD degree in November 2002 from Beijing University of Aeronautics and Astronautics. Since 2003, he has been with the Centre of Excellence in Telecommunications, the University of Sydney, Australia. He is now a Professor and Director of Wireless Engineering Laboratory in School of Electrical and Information Engineering, University of Sydney. He is the recipient of the Australian Queen Elizabeth II Fellowship in 2008 and the Australian Future Fellowship in 2012. He is a Fellow of IEEE. His current research interests are in the area of wireless communications, with a particular focus on MIMO, millimeter wave communications, machine to machine communications, coding techniques and cooperative communications. He holds a number of patents granted and pending in these fields. He is now an editor for IEEE transactions on communications, IEEE transactions on vehicular technology. He also served as the guest editor for several IEEE journals, such as IEEE JSAC, IEEE Communications Magazine, IEEE IoT journal, IEEE Access. He received the best paper awards from IEEE International Conference on Communications (ICC) 2014, IEEE PIRMC 2017 and IEEE Wireless Days Conferences (WD) 2014.
Min-Hsiu Hsieh received the B.S. and M.S. degrees in electrical engineering from National Taiwan University in 1999 and 2001, respectively, and the Ph.D. degree in electrical engineering from the University of Southern California at Los Angeles, Los Angeles, CA, USA, in 2008. From 2008 to 2010, he was a Researcher with the ERATO-SORST Quantum Computation and Information Project, Japan Science and Technology Agency, Tokyo, Japan. From 2010 to 2012, he was a Post-Doctoral Researcher with the Statistical Laboratory, the Centre for Mathematical Sciences, The University of Cambridge, U.K. From 2012 to 2020, he was an Australian Research Council (ARC) Future Fellow and an Associate Professor with the Centre for Quantum Software and Information, Faculty of Engineering and Information Technology, University of Technology Sydney, Ultimo, NSW, Australia. He is currently the Director of the Hon Hai (Foxconn) Quantum Computing Center. His scientific research interests include quantum information, quantum learning, and quantum computation.
Jiangfeng Du received the Ph.D. degree in Physics from the University of Science and Technology of China (USTC) in 2000. Since 2004, he has been a professor with the School of Physical Sciences of USTC. He is an expert in the area of spin quantum physics and its applications. His research interests are interdisciplinary. He currently focuses on quantum computation, quantum simulation and quantum sensing, and the development of new technologies for medical applications.