Approaching the Quantum Singleton Bound
with Approximate Error Correction
Abstract
It is well known that no quantum error correcting code of rate can correct adversarial errors on more than a fraction of symbols. But what if we only require our codes to approximately recover the message?
In this work, we construct efficiently-decodable approximate quantum codes against adversarial error rates approaching the quantum Singleton bound of , for any constant rate . Specifically, for every and , we construct codes of rate , message length , and alphabet size , that are efficiently decodable against a fraction of adversarial errors and recover the message up to inverse-exponential error .
At a technical level, we use classical robust secret sharing and quantum purity testing to reduce approximate quantum error correction to a suitable notion of quantum list decoding. We then instantiate our notion of quantum list decoding by (i) defining and constructing folded quantum Reed-Solomon codes, and (ii) applying a new, quantum version of distance amplification.
1 Introduction
There are several models of noise in quantum error correction. One of the weakest noise models is erasures, where some known subset of symbols are removed. The number of erasure errors that a code can tolerate is the distance of the code. At the other extreme there are adversarial errors, where an adversary is allowed to tamper arbitrarily with a subset of symbols (and the decoder doesn’t know which symbols were corrupted). The number of symbols that an adversary can be allowed to corrupt without sacrificing correctness of the decoded message is the decoding radius.
The quantum Singleton bound imposes an information-theoretic limit on the distance of a quantum code: No code of rate can correct from more than a fraction of erasures. But how far can we push the decoding radius? For the case of exact quantum error correction, it is a well-known consequence of the KL conditions [KL97] that any code of distance has decoding radius at most . Combined with the quantum Singleton bound, it follows that quantum codes cannot achieve decoding radius beyond a fraction of the block length.
However, in [CGS05] it was shown that, by relaxing the definition of quantum error correction to allow even exponentially-small error in the recovered state, one can design certain codes where the decoding radius essentially matches the quantum Singleton bound for very small (asymptotically decaying) rates. Unfortunately, that construction requires an exponentially large alphabet and is therefore unlikely to be useful for communicating over a noisy channel.
Still, the codes of [CGS05] indicate that the distance and the decoding radius might not be inherently far apart in approximate quantum error correction! This is in stark contrast to the classical setting, where it is impossible to build codes with decoding radius nearly matching the classical Singleton bound of for small rates111Indeed, given half of a codeword, an adversary could always substitute it with half of a fresh encoding of an arbitrary message. Therefore, decoding from adversarial errors up to the classical Singleton bound is impossible for .. Whether the quantum phenomenon was an artefact of the non-standard exponential alphabet used by [CGS05], or an exciting possibility for practical quantum error correcting codes, has essentially remained open.
In this work we construct the first efficiently-decodable approximate quantum error correcting codes over constant-sized alphabets with decoding radius approaching the quantum Singleton bound for all rates. Our codes have error that decays exponentially with the message size, and conclusively show that even a slight relaxation of standard quantum error correction permits the design of codes where the the distance and decoding radius are nearly identical.
1.1 Our Contributions
Main results.
Our main results are constructions of efficient approximate quantum error-correcting codes (AQECCs) approaching the quantum Singleton bound. We present two constructions, one in Corollary 4.8 and the other in Corollary 7.6, based on different approaches and with qualitatively slightly different guarantees. Either construction yields the following main result. We use the notation to refer to a quantum code which has block length , message length , and alphabet size (i.e., local dimension) .
Theorem 1.1 (Restatement of Corollary 4.8 and Corollary 7.6).
For any and , there exists a family of approximate quantum codes with constant alphabet size that correct errors acting on registers, up to a recovery error of .
All of the codes we construct come with efficient algorithms for encoding and decoding. In Section 4 we present a general compiler that builds AQECCs from
-
•
quantum list-decodable codes,
-
•
purity testing codes, and
-
•
classical robust secret sharing schemes.
The purity testing codes of [BCG+02] and robust secret sharing schemes of [CDD+15] are sufficient for our purposes. Constructing good quantum list-decodable codes is the main technical part of this work. We define a quantum stabilizer code to be quantum list-decodable if each error syndrome is compatible with at most logically-equivalent Pauli errors of weight (Definition 3.2).
We construct CSS codes which are efficiently list-decodable up to the quantum Singleton bound by introducing folded quantum Reed-Solomon codes, a quantum version of the codes from [GR08].
Theorem 1.2 (Restatement of Theorem 3.8).
For any and , there exists a family of quantum stabilizer codes with alphabet size which is quantum list-decodable.
As in [GR08], the alphabet size of our folded codes scales with the block-length . To reduce the alphabet size to a constant, we introduce a quantum version of the expander-based distance amplification and alphabet reduction techniques of Alon, Edmonds, and Luby [AEL95]. This yields the following theorem.
Theorem 1.3 (Restatement of Theorem 6.1).
For any and , there exists a family of quantum stabilizer codes with constant alphabet size which is quantum list-decodable.
Together with our compiler, Theorem 1.3 allows us to obtain our main result Theorem 1.1.
Additional results.
We find our quantum version of distance amplification useful for three additional purposes. First, using recent constructions of good quantum LDPC codes [PK22, LZ22c, LZ22a, DHLV22, GPT22, LZ22b] we obtain quantum LDPC codes with distance approaching the quantum Singleton bound:
Theorem 1.4 (Restatement of Corollary 5.3).
For any and , there exists a family of quantum LDPC stabilizer codes with constant alphabet size .
Note that these codes are exact quantum error correcting codes, and are therefore only unique-decodable from errors on fraction of registers.
Second, applying a more involved construction using AEL and quantum list decoding, we obtain the following LDPC version of Theorem 1.1, assuming access to a classical side-channel.
Theorem 1.5 (Restatement of Corollary 7.2).
For any and , there exists a family of classical side-channel assisted approximate quantum LDPC stabilizer codes with constant alphabet size that can correct errors acting on registers, up to a recovery error of .
Third, we obtain alternative codes satisfying Theorem 1.1 in Corollary 7.6.
1.2 Technical Overview
We begin by defining AQECCs in Section 1.2.1. Then we present our definition of quantum list-decoding for stabilizer codes in Section 1.2.2, along with constructions in Section 1.2.3. In Section 1.2.4 we tie these ideas together to construct AQECCs from quantum list-decodable codes, purity testing codes, and robust secret sharing schemes.
We then turn to our quantum version of distance amplification in Section 1.2.5. Finally, we outline our use of these techniques to construct private LDPC codes in Section 1.2.6.
The discussion below assumes familiarity with basic notions of quantum error correction. The reader is referred to Section 2 or [Got97] for a review.
1.2.1 Approximate Quantum Error Correction
An approximate quantum error correcting code should encode message states into (possibly mixed) code-states, with the guarantee that the original messages are recoverable up to a high fidelity even when an adversary is allowed to tamper with a bounded number of registers. First, we define the syntax of a quantum code.
Definition 1.1.
An quantum code is a pair of quantum channels on qudits of local dimension such that
-
1.
encodes a qudit message register into an qudit code-state register , and
-
2.
decodes a received code-state register into a qudit message register .
The code is said to be efficient if can be implemented in polynomial time in . If the code-state register is defined on qudits, then the weight of an error channel acting on is the number of qudits of which the channel acts non-trivially on.
Definition 1.2 ([CGS05]).
A quantum code is said to be a -AQECC (Approximate Quantum Error Correcting Code) if, for all adversarial channels of weight ,
We refer the reader to Section 2 for a review of distance measures between quantum states and channels.
While the ordinary quantum Singleton bound only applies to exact quantum error correcting codes, more robust versions for AQECCs also hold. Specifically, [MW22, Theorem 5] provides a general quantum Singleton bound for hybrid quantum/classical/entanglement-assisted codes with approximate or exact recovery.
Theorem 1.6 ([MW22]).
If a -AQECC of local dimension has rate , then
where .
This bound also holds for AQECCs with side-information, or “private AQECCs” (Definition 1.5).
1.2.2 Defining Quantum List-Decodable Codes
Recall that stabilizer codes [Got97] are a subspace of -qudit states, defined as the joint eigenspace of a set of commuting operators called the stabilizer generators. Given a corrupted code-state, the syndrome measurement is the projective measurement of the eigenvalues of the stabilizer generators. The measurement outcome (a list of eigenvalues) is referred to as the syndrome, and is the quantum analogue of a classical parity check syndrome.
In classical coding theory, a code is said to be list-decodable [Woz58, Eli57] if there are at most codewords of in any hamming ball of radius in . To understand our quantum analogue, observe that for linear codes this classical notion is exactly equivalent to requiring that there are at most errors of weight at most consistent with each possible parity check syndrome.
Perhaps the most direct quantum translation would be the following: A stabilizer code could be quantum list-decodable if for every possible syndrome , there are at most Pauli operators of weight at most that are consistent with the syndrome . However, if the code has many low-weight stabilizers (such as concatenated codes) then the list of errors consistent with a given syndrome could contain exponentially many logically-equivalent Pauli operators. Since such logically-equivalent errors by definition have the same action on codewords, we instead use a slightly relaxed definition where we only count logically-distinct operators in the list.
Definition 1.3 (Restatement of Definition 3.2).
A stabilizer code is quantum list-decodable (QLD) if for every possible syndrome , there are at most logically-distinct Pauli operators of weight at most that are consistent with the syndrome .
Therefore, after measuring the syndrome, quantum list-decoding is the entirely classical task of computing the list of possible corrections for the given syndrome.
1.2.3 Constructions of Quantum List-Decodable Codes
Our main tool for designing these quantum list-decodable codes is a reduction to classical list-decoding via CSS codes.
Claim 1.7.
If are two -linear classical codes which are list-decodable and , then there exists a CSS code CSS which is quantum list-decodable. Moreover, if the classical codes are efficiently list-decodable, then the CSS code is as well.
This follows from the fact that correcting errors on a code-state of a CSS code simply consists of correcting the and errors.222Technically we consider generalized Paulis, the “shift” and “phase” operators. We refer the reader to Section 2 or [AK01] for a review of stabilizer codes over finite fields.
The central insight behind our quantum code construction — and later the quantum distance amplification in Section 1.2.5 — is that syntactic or physical operations on the registers of a quantum code are not only well-defined, but behave similarly to their classical counterparts. For instance, folding a quantum CSS code (i.e., bundling together consecutive qudits into a larger qudit) induces folded component classical codes:
Claim 1.8 (Informal statement of 3.7).
If is the CSS code of two linear classical codes , then the -folded quantum code is a CSS code of the two -linear -folded classical codes .
This follows from the fact that folding operation automatically bundles the qudits in both bases, so error correction in each basis can leverage folding. Instantiating 1.8 with the folded Reed-Solomon codes of [GR08], we obtain explicit quantum list-decodable codes tolerating errors up to the quantum Singleton bound:
Theorem 1.9 (Restatement of Theorem 3.8).
For any and , there exists a family of quantum stabilizer codes with alphabet size which is quantum list-decodable.
Unfortunately, these folded quantum codes have alphabet size rather than constant. [GR08] reduce the alphabet size by showing that their codes can be used for the related task of list-recovery, and combining their ideas with the distance amplification and alphabet reduction techniques of [AEL95]. The main technical component of this work is to show that an analogous quantum list-recovery task can be used in combination with a quantum analog of the distance amplification techniques by [AEL95]. We outline quantum distance amplification in Section 1.2.5.
Using quantum distance amplification, we present a randomized construction of quantum stabilizer codes on constant sized alphabets, with list decoding radius approaching the quantum Singleton bound.
Theorem 1.10 (Restatement of Theorem 6.1).
For any and , there exists a family of quantum stabilizer codes with constant alphabet size which is quantum list-decodable. Moreover, there exists an efficient randomized algorithm to construct a classical description of the stabilizers of the code, which succeeds with high probability.
1.2.4 Construction of AQECCs from Quantum List-Decodable Codes
Quantum list decoding enables us to find a short list of possible errors which match a syndrome measurement. If we had some way of tagging valid messages, then we could filter through the list for the true error and obtain unique decoding.
We find that purity testing codes (PTCs) [BCG+02] are well-suited for this task. A PTC is a collection of stabilizer codes which is able to faithfully detect a Pauli error with high probability over keys . They were originally introduced to construct quantum authentication schemes, but it turns out that we do not need full quantum authentication for our purposes.
Definition 1.4 (Purity testing codes, [BCG+02]).
A stabilizer purity testing code with error (-PTC) is a set of stabilizer codes such that, for all Pauli errors ,
where is the stabilizer group of and is the normalizer group.
We construct private AQECCs by first encoding the message in a PTC , and subsequently encoding in a quantum list-decodable code . As long as the keys are kept secret from the channel, the probability that an undetectable error appears in the list is at most by a union bound. Therefore a recipient who knows can uniquely recover the message with probability .
Of course, this construction gives a collection of codes rather than a single code. Since the channel cannot be allowed to see the keys , we only obtain a relaxed version of AQECCs where the sender and receiver have shared private randomness (unknown to the error channel). We call such codes private AQECCs in analogy to the classical private codes of [Lan04, Gur03b].
Definition 1.5.
A set of quantum codes is said to be a private AQECC with keys if, for all adversarial channels of weight ,
By using as the shared private randomness, we obtain the following theorem.
Lemma 1.11 (Restatement of Lemma 4.1).
Let be an -PTC where each is an stabilizer code, and let be a stabilizer code which is quantum list-decodable. Then is a private AQECC.
In this construction, it becomes important that the adversary cannot choose the error according to the key . The local indistinguishability of protects against such attacks, by ensuring that the adversary’s view consisting of fewer than components of a code-state of is the same regardless of the value of .
To convert a private AQECC into an AQECC, we incorporate the classical key information into the quantum registers. The key tool for this conversion is a classical robust secret sharing schemes (RSSs) [CDD+99, CDF01, CDF+08, CDD+15]333Also known as an Error Tolerant Secret Sharing scheme (ETSS)., which ensures that the hidden secret key looks uniformly random to the adversary while still allowing the receiver to reconstruct the key with high probability. [CGS05] used a combination of classical secret sharing and classical authentication from [CDF01] to construct such an RSS. We need to be more careful with our choice of classical secret sharing scheme, in order to ensure that the resulting quantum code still lies roughly on the quantum Singleton bound and maintains constant alphabet. In Section 4, we use a more recent RSS construction of [CDD+15] to prove the following theorem.
Theorem 1.12 (Informal statement of Theorem 4.7).
For any code that is a private AQECC with sufficiently short keys, there is a code that is a AQECC.
1.2.5 Distance Amplification for Quantum Codes
In order to decrease the alphabet size of our quantum code constructions and improve on their encoding/decoding efficiency, we develop a quantum analog of the seminal distance amplification techniques for classical error correcting codes by Alon, Edmonds and Luby [AEL95]. Their ideas hinged on using code concatenation and a careful redistribution (or permutation) of the symbols of the code, in order define a new code with a larger distance and/or smaller alphabet (and slightly lower rate). These techniques have found extensive use in classical coding theory, such as the construction of linear time encodable/decodable codes [GI02], the construction of list-decodable codes from list-recoverable codes [GI03, GR08], high-rate locally testable codes [KMRZS15, GKO+18, HRZW19], and many other applications.
The simplest formulation of the quantum analog we study can be understood as physically permuting and re-grouping the qudits of a concatenated quantum code [KL96]444See Definition 2.5 for a review of quantum code concatenation.. Starting with an outer stabilizer code , and an inner stabilizer code , their quantum code concatenation is the stabilizer code . Consider a physical depiction of as a table of -ary qudits. The final step is to use an -biregular expander graph on two partitions of nodes, to redistribute the qudits of into another stabilizer code . To do so, if the th edge incident to equals the th edge incident to , then the th -ary qudit of the th inner block of is placed into the th -ary qudit of the th inner block of . In other words, the table associated to is permuted into another by table for , and each of its rows represents a -ary qudit. Qualitatively, this qudit redistribution ensures that any -ary Pauli (represented as a tensor product of -ary Pauli’s) supported on roughly a fraction of the rows of , after unpermuting , is then almost uniformly spread out among the inner blocks/rows of such that most inner blocks have less than fraction of errors. If the fraction of the ‘high weight’ inner blocks is less than , then is a perfectly correctable error for , and thus has relative distance roughly .
Theorem 1.13 (Informal statement of Proposition 5.1).
If is an -pseudorandom expander graph (Definition 5.1), then has relative distance .
In Section 5 we argue that the insights from [AEL95] translate remarkably well into the quantum setting. We analogously adapt these ideas, and the intuition above to decrease the alphabet of our quantum codes, construct quantum list decodable codes from a suitable analog of quantum list recoverable codes, and to construct private AQECC’s which are LDPC and encodable/decodable in linear time.
1.2.6 Private LDPC AQECCs with Linear-Time Decoding
Recall that the construction of efficient private AQECCs described in Section 1.2.4 first constructs efficient quantum list-decodable codes using AEL amplification with inefficient but small quantum list-decodable inner codes, and then composes these AEL-amplified codes with PTCs to obtain the desired private AQECCs. Therefore while this construction provides a general recipe for AQECCs, as mentioned previously the outer code of the AEL concatenation must satisfy an appropriate form of quantum list-recoverability, which we only know how to achieve with folded quantum Reed-Solomon codes.
In Section 7, we present a construction of efficient private AQECCs that permits more flexibility in the code properties by combining the same ingredients described above in an alternative manner. Specifically, if we instead apply AEL amplification with a certain class of inefficient but small private AQEC inner codes, the outer code may be chosen to be any asymptotically good efficient quantum code . The resulting construction will be an efficient private AQECC that inherents some of the properties of , such as its locality and decoding time. Thus choosing the outer code from a family of good quantum LDPC codes [PK22, LZ22c, LZ22a, DHLV22, GPT22, LZ22b], we obtain the efficient private LDPC AQECCs of Theorem 1.5.
1.3 Related Work
The idea of using approximate quantum error correction to build better quantum codes goes back to [LNCY97], who construct a 4-qubit AQECC encoding one qubit that tolerates a specific noise model.
A more closely related result is that of [CGS05], who construct AQECCs with a decoding radius of for codes of block length . Their construction is based on a combination of quantum error correction, quantum message authentication, and classical secret sharing. However, the code in [CGS05] has asymptotically decaying rate, and is defined on qudits with exponentially large local dimension. To go beyond the exponential-alphabet regime we use quantum list decoding.
A related notion of quantum list decoding was introduced by [LS08], who show that random stabilizer codes on qubits are quantum list-decodable with high probability. They use these codes to construct private AQECCs on qubits with rates up to (where is the decoding radius).
Compared to this work, [LS08] have a slightly different definition of quantum list decoding and do not construct codes with efficient decoding procedures. In fact, we expect that an efficient decoding algorithm for random stabilizer codes should not exist. Moreover, their codes do not approach the quantum Singleton bound because they restrict to binary alphabets. While extending their results to larger (but still constant) alphabets would yield codes that do approach the quantum Singleton bound, the problem of efficient decoding would remain.
Several works have studied conditions in which approximate quantum error correction is possible [BK00, SW02, Dev05, KSW08, Bén09, NM10, MN12, BO10, HP17]. For instance, [SW02, KSW08, Bén09, BO10] were interested in characterizing when information can be sent over a noisy quantum channel, with or without prior knowledge of the input state and the noise model. [NM10, MN12] studied the efficacy and optimality of the transpose channel as a recovery map, when the noise process is known. [Dev05, HP17] studied applications of approximate quantum error correction to quantum and classical communication, including to the tasks of state merging, entanglement distillation, quantum identification and remote state preparation.
[BDH06] introduced the concept of an entanglement-assisted quantum error correcting code (EAQECC), when the sender and receiver have access to an unbounded supply of pre-shared EPR pairs. A number of results [LBW13, LB13, WHB11] studied properties of EAQECCs, and discussed their construction from classical linear codes. While no pure quantum code can bypass the quantum Singleton bound, quite remarkably, recently EAQECCs were shown to be able to transmit quantum information up to the classical Singleton bound [Gra20] in certain parameter regimes. [DS03, HW08, GHW22, MW22] proved Singleton bounds and other upper bounds on the capacity of entanglement-assisted and private quantum codes.
1.4 Discussion and Open Problems
The folded Reed-Solomon codes [GR08] are a family of deterministic, polynomial-time constructible classical codes which approach the information-theoretic list-decoding limit. Since their result, a number of (explicit) codes have improved on their alphabet and list sizes [Gur10, GX20, GRZ22], without the need of expander-based distance amplification [AEL95]. However, it seems unclear how to use these codes to design quantum codes, as their duals aren’t necessarily explicit, or they require pre-encoding with certain subspace-evasive sets [DL12, GXY17] to reduce their list sizes. We leave for future work the design of explicit quantum codes approaching the list-decoding capacity at small qudit local dimensions.
We note that the techniques in this work can be used to formalize a quantum analog of list-decoding from erasures, where the receiver is tasked with producing a list of correction operators to a reduced density matrix of some code-state. This task has been extensively studied in the classical setting [GI01, Gur03a, GI03, GI04, RZWZ20], where it is well known that random binary linear codes are efficiently erasure list-decodable even when all but a small fraction of symbols have been erased. One could ask an analogous question for quantum codes on qubits: For fixed rate , what is the maximum number of erasures for which one can still efficiently list-decode (or approximately unique-decode) the quantum state?
1.5 Organization
We organize the rest of this work as follows. In Section 2 we review the necessary background on quantum error correction. In Section 3 we present our definition of quantum list decoding and our results on list-decodable CSS codes, including our explicit construction of folded quantum Reed-Solomon codes. In Section 4 we show how to reduce approximate quantum error correction to quantum list decoding. In Section 5 we describe our quantum distance amplification and alphabet reduction techniques. We apply this AEL amplification in Section 6 to construct efficient quantum list-decodable codes approaching the quantum Singleton bound over constant alphabets. We apply AEL in an alternative manner in Section 7 to construct private LDPC AQECCs with linear-time decoders, which as a byproduct gives another construction of efficient AQECCs.
In Appendix A we discuss the list decodability and other simple properties of random CSS codes, which follow easily from their classical counterparts. For completeness, in Appendix B we introduce a quantum notion of list recoverability and a “fully-quantum” proof of the construction of quantum list decodable codes on smaller alphabets from quantum list recoverable codes and distance amplification.
2 Preliminaries
2.1 Notation
Norms and Distances We use three notions of distance between quantum states and quantum channels. The trace distance between two mixed states captures their distinguishability, and is defined in terms of the trace norm (or Shatten 1-norm) . The fidelity , and can be written simply as when is a pure state.
Finally, the diamond norm distance between two quantum channels , quantifies their distinguishability even in the presence of entanglement
| (1) |
where .
Finite Fields Let be a power of a prime , and denote by to be the Galois field of elements. We refer to the functional as the trace function, where . If is a basis of over , then one can express as for . We refer to a pair of bases , of as dual bases if . If is expressed as , in the dual bases respectively, then the inner product over the basis representation becomes the trace:
| (2) |
Error Basis To connect these notions to quantum codes, we define an explicit error basis for -ary quantum systems. Fix . Let be the ‘shift’ and ‘phase’ operators on , defined by
| (3) |
The operators , form the Weyl-Heisenberg operators, an orthonormal basis of operators over . If , with representations , in the dual bases respectively, then one can define an o.n. basis of operators over :
| (4) |
Finally, if , then one can define operators acting on via . The error group is the group generated by the and the phase . The weight is the number of locations where either are non-zero, and is the set of operators in the error group of weight less than .
2.2 Quantum Error Correction
Definition 2.1 ([KL97]).
An QECC (quantum error correcting code) is a subspace of dimension . Let be the projection onto . If for all operators of weight , we have
| (5) |
where only depends on , then is said to have distance .
Quantum stabilizer codes are a class of QECCs defined as the joint eigenspace of a set of commuting operators, the stabilizers. We discuss a presentation of stabilizer codes over finite fields by [AK01].
Definition 2.2 (Stabilizer Codes over Finite Fields, [AK01]).
Let be a prime power. Let the set of operators generate a commutative subgroup of . Then the subspace defined by
| (6) |
forms a QECC.
We refer to the stabilizer group of a code as . Associated to a stabilizer group is the normalizer group , the set of operators in the error group which commute with all the elements of . The elements of 555By which we mean the set difference, to distinguish from the quotient group. are the ‘undetectable errors’ on , as they map code-states to distinct code-states, and the quotient group are the logical operators on . The distance of is the lowest weight of any operator in . The class of ‘detectable’ errors of are the operators outside , which we detect by measuring the syndrome vector:
Definition 2.3.
For any operator , we refer to the syndrome of the operator on the stabilizer code as the phases defined by for .
Note that if , then the syndrome is 0, . Moreover, the syndrome is additive: if , then , and .
We instantiate most of our constructions in this work using the CSS codes introduced by [CS96, Ste96], and their extensions to non-binary fields [KKKS06, RGB04, KW08].
Theorem 2.1 (Galois-qudit CSS codes).
Fix two linear classical codes of dimension , where and both have distance at least . Let CSS be the stabilizer code defined by the stabilizers , . Then CSS is a QECC.
Moreover, the normalizer group of CSS are (up to a global phase) the operators , . While a seemingly minor modification, it will later be relevant to discuss CSS codes over vector spaces as well. As the authors haven’t found such a pre-existing definition in the literature, we discuss a short self-contained proof below, which follows immediately from the techniques by [AK01].
Theorem 2.2.
Fix two -linear classical codes of dimension , where and both have distance at least . Let CSS be the stabilizer code defined by the stabilizers , . Then CSS is a QECC.
Proof.
We view the codewords of as elements of , and define the set of operators using the same expansion as the Galois-qudit construction. By design, these operators are commuting and thus define a stabilizer code over , which we view as a code over . ∎
2.3 Composition and Concatenation of Quantum Codes
If is a stabilizer code, then let be the isometry which encodes into . Recall that is a Clifford circuit, such that if is a operator in the Pauli group on qudits, then we let
| (7) |
refer to the encoding of on .
Definition 2.4.
Let be an stabilizer code, and an stabilizer code. Then the composition of is the stabilizer code defined by encoding any message as
| (8) |
Since are stabilizer codes, can alternatively be characterized in terms of its stabilizers:
Fact 2.1.
If and are the stabilizer generators of respectively, then the stabilizer generators of are those of together with those of encoded into :
| (9) |
The notion of concatenated (classical) codes was developed in a seminal work by Forney in 1966 [For09], and later introduced into a quantum setting by Knill and Laflamme [KL96] and Gottesman [Got97].
Definition 2.5.
Let be an ‘outer’ stabilizer code, and be a ‘inner’ stabilizer code. Then the quantum code concatenation is the stabilizer code defined by encoding any message as
| (10) |
That is, each qudit of the outer code is encoded into the inner code. Much like the case of code composition, the stabilizer generators of a concatenated quantum code can be expressed in terms of the stabilizers of the inner code , and the encoding of stabilizers of the outer code .
Fact 2.2.
If and are the stabilizer generators of respectively, then the stabilizer group of is generated by the following set of operators:
| (11) |
where the second set above corresponds to applying the th stabilizer of to the th inner block of the concatenated code.
CSS codes have a particular nicely behaved form of concatenation. Recall that concatenation requires specifying an encoding function for the inner code; we now describe how this can be done while preserving the CSS structure. Let and be and CSS codes respectively. Assume that , and that all four classical codes are -linear for some . Letting , so that , then observe that and are both dual pairs of -dimensional vector spaces over . Thus there exists a pair of -linear isomorphisms
that are duality-preserving in the sense that for all .
Claim 2.3.
Let and be as above. Then there is a well defined CSS concatenation given by
where is the union of all the cosets in , and is the union of all the cosets in .
Proof.
Let and . It suffices to show that
We will show the first equality above; the proof of the second is analogous. By definition, if , then for all ,
so . For the converse, assume that . Because , we must have . Thus is well defined, so for all ,
Therefore belongs to the (coset specified by the) encoding under of a vector that is orthogonal to all elements of , that is, . ∎
3 Quantum List Decodable Codes
Let be a stabilizer code of distance , defined with respect to a basis of operators on single-qudits . Consider any adversarial quantum channel acting on a (unknown) set of qudits of a code-state of . If the support of the attack has size , then, by measuring the syndrome of , one collapses into a mixture of single errors in the basis:
| (12) |
Informally, this occurs since if any two distinct -qudit operators had the same small support and the same syndrome, then their product must be a stabilizer of . But if is a stabilizer, then corrupt code-states in essentially the same way: For any , for some phase .
In this fashion, to decode it suffices to identify from the syndrome measurement . When the support of is , then there in fact exists a single (up to a stabilizer of ) which matches the syndrome, and one can unique-decode. When the support of is larger, all bets are off: In this sense, the notion of list-decoding for stabilizer codes we consider is simply the number of operators which match the measured syndrome - and are all distinct up to a stabilizer of .
Definition 3.1.
If is a stabilizer group, then any pair of operators is said to be -stabilizer equivalent if for some , and stabilizer-distinct otherwise.
In other words, is in the coset . When the set of stabilizers is implicit, we simply refer to the pair of operators as ‘stabilizer-equivalent’ or ‘stabilizer-distinct’. We note that this relation defines equivalence classes over the Pauli group , since if and are both stabilizer equivalent, then so are and . More importantly, if is the quantum code stabilized by , then stabilizer-equivalent operators acting on the code-space give rise to the same state:
| (13) |
where is some global phase. Moreover, given a description of the stabilizer generators and , one can test stabilizer-equivalence efficiently via row reduction.
Equipped with this notion, we discuss the following definition of list decoding for stabilizer codes. Conceptually, after measuring the syndrome of the quantum code, we consider enumerating all the operators in a given class of errors which agree with the syndrome measurement. However, note that many of these operators could be stabilizer-equivalent, corresponding essentially to the same state. The definition we study filters out this degeneracy, by considering the size of any list of stabilizer-distinct operators which agrees with .
Definition 3.2.
Let be an stabilizer QECC with stabilizer group , and let be a set of errors. is said to be -QLD (Quantum List Decodable) for if, for every error , there exists at most stabilizer-distinct operators which agree with the syndrome of .
Of particular attention is the class of qudit Pauli errors of bounded weight , and we refer to a quantum code as -QLD if it is an -QLD for .
The immediate reason that this particular definition of list-decoding for quantum codes is useful is that the list can be viewed as a list of “correction operators.” For instance, if is a code state of an -QLD , and an adversary corrupts it with an error of syndrome , let the list of operators be those guaranteed by Definition 3.2. We note that by applying on the corrupted code state , we return it to the code space : . In fact, we can produce a next candidate code state by applying , and so on. Naturally, we won’t know which code state we are in, but by definition at least one correction recovers the original state.
This description of list-decoding in terms of the syndrome measurements can alternatively be characterized through the normalizers and logical operators on the stabilizer code.
Claim 3.1.
If is a stabilizer code with stabilizer group and normalizer group , then for any of syndrome , any list of operators in which agrees with satisfies
| (14) |
Proof.
If two operators have the same syndrome, then has null syndrome vector and thus . In this manner, can be written as the product of and an element of the normalizer. ∎
While the characterization above is a structural constraint on the stabilizers and normalizers of the quantum error correcting code, perhaps its main advantage is that one can cast the list-decoding task as an entirely classical process, without any modification to the encoding of the quantum code. As we will see shortly, this description allows us to draw a connection between CSS codes which are QLD and classical codes which are (classically) LD. Beforehand, we need to describe what it means to efficiently list-decode these stabilizer codes.
We refer to an -QLD code as efficiently list decodable for if, given the syndrome , one can produce in time polynomial in a classical description of a list of operators with the following stipulations: contains only stabilizer distinct operators with syndrome ; and moreover, for each element of of syndrome , there is an operator in stabilizer-equivalent to it. That is, the list-decoding algorithm is allowed to output extraneous list elements that are not stabilizer-equivalent to any error in , as long as they still act as corrections, and the overall list size is . We emphasize that these “unpruned” lists arise because it can be intractable to determine if a given Pauli operator is stabilizer-equivalent to an element of .
The main contribution of this section is a recipe to construct quantum list-decodable codes from classical list-decodable codes. For conciseness and to fit our applications, we present a discussion for CSS codes based on the Galois-qudit construction, which we review in Theorem 2.1.
Definition 3.3.
Given an -linear classical code and a subcode , let the quotient be list-decodable if for every , there exist at most cosets in that intersect the Hamming ball of radius centered at .
We say that is efficiently list-decodable if there exists a time algorithm that outputs a list consisting of a representative of each coset in that intersects .
By definition if is (efficiently) list-decodable then so is , as we may remove redundant list elements differing by an element of using row reduction.
Theorem 3.2.
Let be a CSS codes. If and are both (efficiently) list-decodable, then is (efficiently) list-decodable.
Proof.
Fix an error on the CSS code, of syndrome . The normalizers of the CSS code are the operators , . Recall from the definition in Theorem 2.2 that we implicitly view as an element . From the previous claim, any list is contained in the set of operators where and . Furthermore, and are stabilizer equivalent if and only if and . Because is -LD, the number of cosets with and is . Similarly, because is -LD, the number of cosets with and is . It follows that the total number of pairs in the list is at most .
It remains to be shown that efficiency of the classical list-decoding for and implies efficiency for the quantum list-decoding of . Let be any Pauli operator with the syndrome , so that and are the parity check syndromes of and for and respectively. One can find such a pair by finding any solution to the underlying linear system in polynomial time via Gaussian elimination (note that here, we don’t restrict to be low weight). We call the classical list decoding algorithm for on , and for on , obtaining lists and of classical errors of weight . We claim that any stabilizer distinct operator of weight that matches is stabilizer equivalent to an operator , , output by this algorithm. Indeed, for every operator of weight and of syndrome , then and both have weight and have parity check syndromes and for and respectively, so by definition the list-decoding algorithm must output an operator that is stabilizer-equivalent to . ∎
3.1 Explicit Constructions and Folded Quantum Codes
In this subsection we discuss explicit constructions of quantum list-decodable codes from classical list decodable codes, using Theorem 3.2. We use the well known classical Reed-Solomon codes, and the Folded Reed-Solomon codes from the breakthrough result of [GR08], to construct quantum codes which are efficiently list decodable up to the quantum Singleton bound (Theorem 3.8). While in principle we could approach the quantum Singleton bound using even random CSS codes, unfortunately these wouldn’t be explicit, nor efficiently decodable. Thus for conciseness, we dedicate Appendix A to a collection of their properties which we later use in our concatenated constructions. Before diving into the explicit constructions, let us briefly overview the necessary background on these classical codes and related quantum codes.
Definition 3.4 (Generalized Reed-Solomon Codes).
Let be a prime power. Fix , a primitive element of , and a set of ‘multipliers’ . The degree GRS code is the set
| (15) |
Each codeword of a Reed-Solomon code corresponds to the evaluation of a distinct polynomial over . The codewords of the Generalized RS code defined above, are RS codewords multiplied element-wise by scalars. The following properties don’t depend on the choice of primitive or subset of :
Fact 3.1.
is a code.
Fact 3.2.
The dual code , for certain choice of multipliers . When , .
Lemma 3.3 ([GS98]).
is efficiently -LD.
The Quantum GRS codes, or Galois-qudit RS codes [ABO08, JX14], are quantum codes based on the Galois-Qudit CSS construction of the classical codes above. They are a class of quantum codes which meets the quantum Singleton bound, but at the cost of a large local qudit dimension:
Theorem 3.4 (Quantum GRS codes [LXW08]).
Fix a constant . Let be two GRS codes of block length and dimension respectively, with the same evaluation points . The Quantum GRS code CSS is a QECC.
One can interpret the QGRS encoding as a superposition of polynomial evaluations, where the high degree coefficients are defined by the message. By combining our insights in the previous section with the result by [GS98], we obtain a quantum adaptation of a well known family of classically list decodable codes:
Corollary 3.5.
The Quantum GRS codes of Theorem 3.4 of rate and block-length are -QLD. For small , this approaches radius .
Proof.
Note that the classical codes in Theorem 3.4 both have rate , and are efficiently LD up to a radius [GS98]. Theorem 3.2 concludes the proof. ∎
In their seminal work Guruswami and Rudra [GR08] introduced Folded Reed-Solomon codes, which are efficiently list decodable up to almost the Singleton bound. Informally, they are defined by ‘bundling’ or ‘folding’ together groups of consecutive symbols of the RS code, into a symbol of a code on a larger alphabet.
Definition 3.5 (-folded codes).
If is an linear code, then the -folded code is an -linear code defined by the codewords
| (16) |
Indeed, note that the code itself hasn’t truly changed, we are simply viewing it as a code over a larger alphabet. Moreover, observe .
Definition 3.6 (-folded Reed-Solomon codes [GR08]).
Fix a primitive element of , integers where and divides . The -folded RS code is an -linear code defined over alphabet which encodes a polynomial of degree as
| (17) |
Theorem 3.6 ([GR08]).
For any , there exists a choice of such that the -folded RS code of rate is efficiently -LD.
By multiplying element-wise the RS codes above by scalars , one defines Folded Generalized RS codes. Our starting point for efficiently list decodable quantum codes is an analogous bundling for the physical qudits of any stabilizer code.
Definition 3.7.
Let define a set of generators for an stabilizer code . Then the -folded quantum code is the stabilizer code defined by the stabilizer generators , where
| (18) |
where each generator is expressed as a tensor product of operators acting on .
Analogously to the classical construction, we are folding the physical qudits together, and we view the stabilizers as operators acting on a larger local dimension. We emphasize however that they are the same stabilizers, and the syndromes of operators acting on the code are measured in the same way as before. The key distinction is that now the notion of the ‘weight’ of an operator acting on , is the number of distinct ‘bundles’ that acts non-trivially on. A simple claim allows us to use the list decoding algorithms of folded classical codes on folded quantum codes, when is a CSS code.
Claim 3.7.
If is the Galois-qudit CSS code of two linear classical codes , then is the vector-space CSS code of the two -linear folded classical codes .
See the definitions in Theorem 2.1 and Theorem 2.2 for the distinctions between these CSS constructions.
Proof.
As defined in Theorem 2.2, the vector space CSS code of is the subspace of stabilized by the operators , where are viewed as elements of . Since as an element of is the ‘unfolded’ element , we arrive at precisely the definition of . ∎
Equipped with this notion of folding, we can now consider folding the Quantum GRS codes of Theorem 3.4.
Definition 3.8 (Folded Quantum Reed-Solomon Code).
For , fix a primitive element and integer block length , and define integers dimension and with . The -folded Quantum RS code is an quantum error correcting code defined over qudits of local dimension , which encodes a computational basis state , through the superposition :
| (19) |
Where in the above corresponds to the evaluation at of the polynomial defined by as the low degree coefficients , and as the high degree coefficients within and . The bracket notation corresponds to the tensor product state in
| (20) |
The main theorem of this section is that these -folded QRS codes are QLD up to essentially the distance of the quantum code.
Theorem 3.8.
The FQRS of Definition 3.8 is -QLD for a choice of .
Proof.
From 3.7, we understand the FQRS codes as the vector space CSS codes (Theorem 2.2) of two classical folded GRS codes. These are classically -LD from Theorem 3.6, [GR08]. Finally, since the folded GRS codes are -linear, from Theorem 3.2 we conclude the FQRS codes are -QLD as well. ∎
4 Approximate Quantum Error Correction
In this section we construct approximate quantum error correcting codes (AQECCs) that approach the quantum Singleton bound. In Section 4.1 we construct private AQECCs — which use a private classical side-channel — from quantum list decodable codes and purity testing codes. In Section 4.2 we show how to use a classical robust secret sharing scheme to remove the need for the classical side-channel, at the cost of slightly increasing the alphabet size.
4.1 Private AQEC from Quantum List Decoding and Purity Testing
Recall our definition of a private AQECC, where the sender and receiver have access to a private classical side-channel.
Definition 4.1 (Definition 1.5, restatement).
A set of pairs of quantum channels is said to be a -private AQECC with keys if for all adversarial channels of weight ,
We now describe a construction of private AQECCs from list decodable quantum codes (QLDs) and purity testing codes (PTCs). Recall that a -QLD stabilizer code produces a list of possible corrections of size , given any codestate that has been adversarially corrupted on up to a fraction of symbols (see Definition 3.2). Roughly, an -PTC detects any fixed Pauli error with probability (see Definition 1.4).
Given an QLD and PTC , our private AQECC is defined by channels that encode a message state into and then into :
| (21) |
To decode the quantum code composition 666See Definition 2.4 and 2.2 for the properties of the composition of quanutm codes., we use Algorithm 1.
The main result of this subsection is the following lemma, which states that the composition above forms a private AQECC.
Lemma 4.1.
Let be an -PTC, where each is an stabilizer code, and let be a stabilizer code which is -QLD and has distance . Then is an ensemble of stabilizer codes, and a private AQECC.
We instantiate Lemma 4.1 with the family of , -QLD codes on alphabets of size guaranteed by Theorem 6.1 or Theorem B.7, together with a family of particularly randomness-efficient PTC’s from the work of [BCG+02].
Theorem 4.2 ([BCG+02]).
For every prime power and every with , there exists a stabilizer -PTC on qudits of local dimension and key size bits, encoding qudits into qudits, where .
With and , we obtain:
Corollary 4.3.
For any and , there exists a family of private AQECCs of rate , block length , key size bits, and local dimension . Furthermore, there is an efficient randomized algorithm to construct these codes with failure probability , as well as efficient encoding and decoding algorithms.
We leverage two key ideas to prove Lemma 4.1. First, recall the discussion in Section 3: If has distance , then the syndrome measurement in step 1 of Algorithm 1 of any adversarial channel of support at most collapses the corruption on the code state down to a single Pauli error . Moreover, the local indistinguishability of the stabilizer code guarantees that an adversary can’t learn any information about the secret key , and thus is independent of the random choice of . We formalize this idea in 4.1, and for conciseness, defer to C.2 in Appendix C a proof of a more general version even in the presence of adversaries with entangled side information.
Next, the list decodability of enables us to write down a short list of errors associated to the syndrome measurement of . We argue in 4.4 that if any candidate error has the same PTC syndrome as the syndrome measurement , then with high probability it exactly corrects the error . Finally, in 4.5 we tie these ideas together and conclude the proof of Lemma 4.1.
Fact 4.1.
Let be be a stabilizer code. Let be an arbitrary adversarial error channel acting on some subset of code components. For an arbitrary corrupted code state , let denote the random variable for the syndrome of . Then the distribution of is the same for all .
In this manner, if we pre-encode a message with an ‘inner’ PTC code (for a random choice of key ) before encoding it into a stabilizer code , then the syndrome measurement must be independent of .
4.4 below reasons that if an operator is an undetectable error of (i.e., ), then with high probability over the choice of , is not an undetectable error of the composition . Later, we use this claim to show the PTC indeed eliminates all but one list element (up to stabilizer-equivalence) with high probability.
Claim 4.4.
Let satisfy . If forms an -PTC, then
| (22) |
Proof.
Since , is equivalent up to a stabilizer (of ) to some encoded operator on . Let be the operator acting on the message space of corresponding to . If we could prove that iff , we would be done, as therefore since is fixed,
| (23) |
by definition of the -PTC. To prove our claim, we consider two cases on : If , then is simply a stabilizer of the composed code. If , then doesn’t commute with some stabilizer of . That implies their encodings in the composed code , also don’t commute. Thus , and therefore . We conclude iff as intended. ∎
Let us now tie these ideas together, and prove that Algorithm 1 approximately decodes the code composition. 4.5 below reasons that the density matrix produced at the end of the decoding Algorithm 1 has uniquely decoded the adversarial error with high probability over the random choice of key , and the outcome of the syndrome measurement.
Claim 4.5.
For any adversarial channel acting on code components, and any syndrome measurement , there exists a large subset of PTC keys , , such that the density matrix describing the outcome of step 4 in Algorithm 1 in expectation over can be written as
| (24) |
where denotes the probability of the syndrome measurement , and are arbitrary qudit density matrices. Thus, Algorithm 1 uniquely recovers the encoded state with probability (and fidelity) , and moreover forms a private AQECC.
Proof.
From 4.1, we know that the syndrome measurement of in step 1 of Algorithm 1 collapses the state into a mixture of single Pauli errors
| (25) |
where each Pauli is a function only of and the support of . Note that the syndrome measurement of does not further collapse the state.
Given , if is the list of candidate corrections to produced in step 3, then at least some corrects , i.e. . Moreover, the decoding algorithm fails to produce if there exists some other of PTC syndrome which fails to correct , i.e.
| (26) |
From 4.4, the probability over this occurs is at most by a union bound. Thereby, for every syndrome measurement , there exists a subset of PTC keys , where any in the list with PTC syndrome exactly recovers . If , we have no guarantees on the returned state .
To conclude the proof, let us trace out the syndrome measurement and choice of key in . For any encoded state , , where and . Thus,
4.2 AQECC from Private AQEC and Robust Secret Sharing
Recall the definition of an AQECC.
Definition 4.2.
A pair of quantum channels is said to be a -AQECC if, for all adversarial channels of weight ,
The following definition of robust secret sharing is taken from [CDD+15], except that we do not restrict to linear schemes and we do not include separate parameters for privacy and reconstructability. We also require the algorithms in the scheme to be efficient.
Definition 4.3 (Robust secret sharing).
For integers and , an -robust secret sharing scheme consists of two efficient algorithms and . For every , outputs a vector of shares . We require the following two properties:
-
•
Privacy: For all and every of size , the restrictions and of and to the coordinates in have the same probability distribution.
-
•
Reconstructability: For every and every of size , if and is such that and only depends on , then except with probability .
The following result is from [CDD+15], with the explicit choice of alphabet size from [GX14]. Concretely, we use the fact that .
Theorem 4.6 ([CDD+15], Theorem 7).
For any and , there exists an efficient family of -robust secret sharing schemes on shares of alphabet size .
Given any -robust secret sharing scheme , and a private -approximate quantum code defined by , we build an -approximate code by secret sharing the private keys with and appending the shares to the symbols of .
Formally, for works as follows:
-
1.
Sample .
-
2.
Apply to , and call the resulting register .
-
3.
Compute , and store the (classical) result on register .
-
4.
Use as the codestate, where register is the -dimensional register .
To decode , we recover the private keys using the reconstruction algorithm of and then apply the decoder for to the register:
-
1.
Measure register and apply to the result, obtaining .
-
2.
Apply to , and output the resulting decoded message.
Theorem 4.7.
Given
-
1.
any -robust secret sharing scheme , and
-
2.
any -approximate private quantum code with key space ,
the construction of above is an -approximate quantum code.
Proof.
Let be any message. Partition the registers of into , where are the private AQECC part and are the RSS part, and the error channel acts only on . Let denote the error channel. By the secrecy guarantee of the RSS against any subset of symbols, we have
and thereby the adversary gains no information about the encryption key. By the recoverability guarantee of the RSS, will use the correct private keys with probability , so
Using the private AQECC of Corollary 4.3 and the robust secret sharing scheme of [CDD+15], we are able to instantiate Theorem 4.7 to obtain the following result.
Corollary 4.8.
For any constant and , there exists a family of -approximate quantum codes on alphabets of size . Furthermore, there is an efficient randomized algorithm to construct these codes with failure probability , as well as efficient encoding and decoding algorithms.
Proof.
By Corollary 4.3, for any fixed there exist private -approximate quantum error correcting codes with -bit keys and alphabet size , with the desired efficiency and construction guarantees. By Theorem 4.6, there exist -robust secret sharing schemes, for .
So long as the private AQECC key length is smaller than the secret size for the RSS scheme of Theorem 4.6, it can be secret shared into the RSS. This occurs if , i.e., . From [GX14], we have , and thus we pick . Theorem 4.7 then yields an AQECC with decoding radius , and its rate is
and it only remains to pick . By inspection, there is a function such that whenever , the rate above is at least . We can now divide into cases on to determine the decoding radius. If , pick , and if we pick . In either case, the alphabet size is , and the decoding radius is at least .
To conclude, let us set , and . We may assume that because ; otherwise the decoding radius in the theorem statement is . The overall rate is then as intended. Since , we have , and thus the resulting decoding radius is at least . ∎
5 Distance Amplification and Alphabet Reduction for Quantum Codes
In this section, we describe how we apply Alon-Edmonds-Luby (AEL) distance amplification [AEL95] to quantum codes. This technique has seen extensive use in classical coding theory [GI01, GI02, GI03, GR08, HW18, KMRZS15, GKO+18, HRZW19], as it allows for amplifying the distance of a code while reducing alphabet size and preserving properties such as decodability and local testability and correctability.
To the best of our knowledge, AEL amplification has not previously been used in the quantum setting. However, as shown below, this technique translates almost flawlessly to quantum codes. This observation immediately yields some new results that will be discussed below, such as efficiently decodable quantum codes approaching the quantum Singleton bound over constant sized alphabets. In fact, such codes can be made LDPC using recent asymptotically good quantum LDPC constructions [PK22, LZ22c], some of which permit efficient decoding [LZ22a, DHLV22, GPT22, LZ22b].
Both of our constructions of AQECCs approaching the quantum Singleton bound apply the AEL construction. Specifically, we instantiate the AQECC construction described in Section 4 using quantum list-decodable codes approaching the quantum Singleton bound with constant alphabet size that we will construct in Section 6 by applying AEL to reduce the alphabet size of folded quantum Reed-Solomon codes. Then in Section 7, we provide another construction of AQECCs by applying AEL amplification directly with inner codes that are themselves appropriately chosen AQECCs.
At a high level, the AEL construction amplifies the distance of a code by concatenating with a small inner code of good distance, and then permuting the symbols of the concatenated code using an expander graph. If the outer code is chosen to have high rate and constant relative distance, then the resulting construction inherits the rate and distance of the inner code, up to a small loss. This procedure in fact works for arbitrary quantum codes; we do not even need to restrict attention to stabilizer codes below.
We first define the appropriate notion of expansion.
Definition 5.1.
An -regular bipartite graph with is said to be -pseudorandom if it holds for every and that
By the well-known expander mixing lemma, the 2-lift of any -spectral expander graph is -pseudorandom. Thus in particular, the 2-lift of a -regular Ramanujan graph is -pseudorandom for . It follows that there exist explicit families of -regular -pseudorandom graphs for all .
We now present the AEL construction in the quantum setting. We first present a basic version that amplifies distance without decreasing the alphabet size. We will then explain how the alphabet size can also be reduced. The analysis of the quantum version of the AEL construction in Proposition 5.1 and Proposition 5.4 below directly adapts the well-known analogous results for classical codes dating back to [AEL95]. However, to the best of our knowledge the application to the quantum setting is new, as are the corollaries below providing quantum codes approaching the quantum Singleton bound that are efficiently unique-decodable up to half their distance.
5.1 Distance Amplification without Alphabet Reduction
We first describe a simple version of AEL amplification that does not reduce alphabet size. Let and be and quantum codes respectively such that . Let denote the concatenated code. The key step is now to permute the components of according to the edges of an -regular bipartite expander, and to block the -ary components into -ary components. Specifically, let be an -regular -pseudorandom bipartite graph, and assume that the edges at each vertex have an arbitrary labeling by elements of . Let be the permutation that maps to the unique pair such that the th outgoing edge in from vertex lands on , and is the label that vertex assigns to this edge . Define to be the code obtained by applying the permutation to the components of , and then regrouping each resulting block of components to a single -ary symbol. Observe that has the same rate as .
Proposition 5.1.
The code defined above has relative distance .
More generally, for every , if a codeword of experiences an error on fraction of its (-ary) components, then after applying , fewer than fraction of the resulting inner code blocks experience errors on at least fraction of their (-ary) components.
Proposition 5.1 follows directly from the following lemma, which captures the key property of the permutation .
Lemma 5.2.
Let be an -regular -pseudorandom bipartite graph, and define as above. Then for every , and for every of size , there are fewer than vertices for which
| (27) |
Proof.
The proof is a direct application of the definition of -pseudorandomness. Let be the set of vertices for which Equation 27 holds. Then by definition
Meanwhile by the -pseudorandomness of ,
where the second inequality above applies the fact that . The above inequalities give a contradiction whenever , so we must have , as desired. ∎
To apply Lemma 5.2 to an AEL code , we will typically choose and to be the decoding radii of and respectively. Then if experiences errors on fraction of its components, we may apply the natural decoding algorithm , and Lemma 5.2 guarantees that fewer than fraction of the inner decodings fail, so that the outer decoding will succeed. The following proof of Proposition 5.1 formalizes this idea for unique decoding for both the inner and outer codes. We will subsequently follow [GR08] in applying the same idea with list decoding for the inner code and list recovery for the outer code.
Proof of Proposition 5.1.
The second statement in the proposition is equivalent to Lemma 5.2, so we just need to show the first statement. For this purpose, it suffices to show that can be decoded from errors acting on at most fraction of the components. Assume some error acts on some subset of the code components with . Let be the set of blocks in inside which at least of the qudits are mapped by to blocks in . Lemma 5.2 with and gives that , so the natural decoding algorithm is guaranteed to successfully correct the error, as all inner decodings in blocks outside of must succeed. ∎
Below we show how applying AEL amplification to asymptotically good quantum LDPC codes with a constant sized random inner code yields efficiently decodable quantum LDPC codes approaching the quantum Singleton bound over constant sized alphabets. To the best of our knowledge, such a family of quantum codes was not previously known even without the LDPC requirement.
Corollary 5.3.
For every and , there exists some such that there exists an explicit infinite family of quantum LDPC CSS codes of rate , relative distance , and alphabet size that are decodable in time up to errors on fraction of the components.
Proof.
We may assume that , as otherwise and the result holds trivially. We may also assume that , as otherwise we may simply construct an AQECC of larger rate using the argument below for updated parameters and . By [PK22, LZ22c, LZ22a, DHLV22, GPT22, LZ22b], there exist explicit infinite families of qLDPC CSS codes of rate over a binary alphabet that are decodable in linear time (for fixed ) up to some constant fraction of errors. Here we do not need to let or the decoding runtime depend directly on because by assumption.
Futhermore, by A.2, there exist sufficiently large and such that for every , a random CSS code of rate , block length , and alphabet size will with positive probability have relative distance . Here we may assume that for some , so the classical codes making up the random CSS code are linear over , and therefore are also -linear.
Now set , and set . Let denote the concatenated code, where before concatenating we first block together groups of qubits in to obtain a code with the same rate and decoding radius over the alphabet . Finally, for some -regular -pseudorandom bipartite graph , let . Such a graph exists because by assumption.
Thus we have constructed an infinite family of quantum codes of rate over the alphabet . By Proposition 5.1, these codes are decodable up to errors acting on fraction of the components. The proof of Proposition 5.1 in fact implies that the natural decoding algorithm decodes up to this radius. For fixed , this algorithm runs in time linear in the block length because by assumption runs in linear time, and is a constant size CSS code and thus can be decoded in constant time via brute force. Also observe that for fixed , then is an explicit LDPC CSS code, and is a constant sized CSS code that can be constructed in constant time via a brute force search. Thus and therefore is an explicit quantum LDPC CSS code. ∎
5.2 Distance Amplification with Alphabet Reduction
We now show how the AEL construction can simultaneously amplify the distance and reduce the alphabet size of the outer code. Again let and be and quantum codes respectively such that . Let denote the concatenated code. As in Section 5.1, we will permute the components of according to an appropriate expander graph and reblock into larger symbols. However, we will now reblock into smaller symbols than before.
Specifically, for some , we partition the code components into groups of -ary symbols, each of which we block into a -ary symbol. To avoid rounding issues, for simplicity assume that divides , and let . Let be an -regular -pseudorandom bipartite graph, and assume that the edges at each vertex have an arbitrary labeling by elements of . Similarly as in Section 5.1, let be the permutation that maps to the unique pair such that the th outgoing edge in from vertex lands on , and is the label that vertex assigns to this edge . Define to be the code obtained by applying the permutation to the components of , and then regrouping each consecutive block of -ary components into a single -ary component. As before, has the same rate as . However, now the alphabet size of does not depend on the inner code’s block length .
Proposition 5.4.
The code defined above has relative distance .
More generally, for every , if a codeword of experiences an error on fraction of its (-ary) components, then after applying , fewer than fraction of the resulting inner code blocks experience errors on at least fraction of their (-ary) components.
Proof.
We will prove the second statement in the proposition, as the first statement then follows by letting and analogously as in Proposition 5.1. Let . Then experiences an error on fraction of its components, so Lemma 5.2 implies that fewer than fraction of the components of (each of which is itself a length- block of -ary symbols) experience an error acting on at least fraction of its symbols. Now recall that each inner code block of consists of of these length- blocks with . Thus for a given inner code block, if at most fraction of the length- blocks experience an error acting on at least symbols, then the number of symbols in the entire inner block that experience an error is at most . Thus an inner code block can only experience errors on fraction of its symbols if fraction of its length- blocks experience errors on at least fraction of their symbols. Therefore if at least fraction of the inner code blocks experience errors on at least fraction of their components, then more than fraction of the length- blocks in the entire code must experience errors on fraction of their symbols. But as described above, Lemma 5.2 implies that this latter statement cannot occur, so fewer than fraction of the inner code blocks can experience errors on at least fraction of their components, as desired. ∎
We will typically apply Proposition 5.4 with an outer code of growing alphabet size , such as quantum Reed-Solomon or folded Reed-Solomon, and an inner code of fixed alphabet size , such as a random CSS code.
6 Constant-Alphabet Quantum List Decodable Codes Near the Singleton Bound
In this section, we apply the AEL distance amplification and alphabet reduction construction described in Section 5 to the folded quantum Reed-Solomon codes described in Section 3.1. This construction is a quantum analogue of the classical construction of [GR08]. As in the classical case, the resulting quantum codes have constant alphabet size and are efficiently list-decodable with polynomial list size for a fraction of adversarial errors approaching the Singleton bound.
Theorem 6.1.
For every and , there exists an infinite family of quantum CSS codes of rate , relative distance at least , and alphabet size that are list-decodable in time , where denotes the block length of . Furthermore, there exists a randomized algorithm that constructs in time with failure probability .
The proof of Theorem 6.1 concatenates a folded quantum Reed-Solomon outer code (see Section 3.1) with a list-decodable random CSS inner code and then reduces the alphabet size using AEL. To list-decode such a concatenation, we typically want to use a list-recoverable outer code as defined below.
Definition 6.1.
A code is -LR (list-recoverable) if , with ,
| (28) |
The following result of [GR08] shows that folded Reed-Solomon codes have this property.
Theorem 6.2 ([GR08]).
For every , and , , and , the -folded Reed-Solomon codes over of block length are
list-recoverable in time for all choices of integers and satisfying .
In Theorem 6.2, we will typically have growing with the block length while are fixed, so the condition that trivially holds. Then for and we may choose sufficiently large to obtain list-recovery up to a radius lying within of the Singleton bound.
Proof of Theorem 6.1.
The code is an instantiation of the AEL construction described in Section 5.2 with the following parameters. Note that we may assume that , as if we may simply instead construct a code of greater rate , and if then the desired relative distance satisfies , which is trivially achievable. For completeness below we give explicit constants, which we do not attempt to optimize.
-
•
Let be a quantum Reed-Solomon code of rate and relative distance . We may assume that , for instance by choosing to be a field of characteristic so that we may take .
- •
-
•
Let be a CSS code of rate and dimension that has relative distance and consists of two classical list-decodable codes, so that list-decodable. By A.2, a random CSS code satisfies these properties with probability .
-
•
Let , , and let be an -regular -pseudorandom bipartite graph.
-
•
As described in Section 5.2, let , and let be our final construction.
A direct application of Proposition 5.4 implies that has relative distance . We now show that is efficiently list-decodable. For this purpose, observe that is the concatenation of the CSS codes and , and thus by 2.3,
Therefore by Theorem 3.2, it suffices to show that and above are efficiently list-decodable in the sense of Definition 3.3. By symmetry of the construction, it suffices to consider , as is identical. Then our goal is to show that given a corrupted codeword of , there exists an efficient algorithm that outputs a list of size containing a representative of every coset in that intersects the Hamming ball of radius centered at . Recall that then subtracting from each list element yields the desired list of stabilizer-distinct error operators for quantum list-decoding as stated in Definition 3.2; the error operators are obtained by analogously list-decoding .
The desired list-decoding algorithm is as follows. Let and . First, for each , we apply a brute force search to compute the list of all inner code messages whose encodings differ from the th inner code block of in at most -fraction of positions. Then we apply the list-recovery algorithm given by Theorem 6.1 to , and output the (encodings into of the) returned list. Recall that when we re-encode the inner code, we apply the maps and described in Section 2.3 that send outer code symbols to cosets, and then we may select an arbitrary element from each coset.
The brute force searches over the inner code together take time, and the outer list-recovery takes time, so the overall runtime is .
To show correctness, assume that is obtained by corrupting at most -fraction of the symbols in some codeword . It suffices to show that the list returned by the above algorithm includes an element of the coset . By Proposition 5.4 and by the list-decodability of , at most -fraction of the inner decodings return a list that does not contain the respective component of . Thus by Theorem 6.2, the final list returned by the algorithm will contain , up to addition by some element of from the re-encoding step described above. Also observe that by Theorem 6.2, the returned list will have size at most .
It remains to be shown that can be constructed in time with failure probability . The folded Reed-Solomon code is explicit, so the construction algorithm simply needs to find an appropriate inner CSS code . By A.2, a random choice of works with probability , so trying random codes and checking the distance and list-decodability of each one by brute force gives the desired construction algorithm. ∎
7 AQEC without List Recovery
This section presents a construction of efficient AQECCs that avoid the need for list recovery. In fact, the only algorithmic ingredient this construction relies on is an efficient unique-decoder for an asymptotically good code, as the construction only performs list-decoding on a small inner code where a brute force search is sufficient.
The main idea of this construction is to concatenate an outer high-rate constant-distance unique-decodable QECC with an inner AQECC that permits exact unique decoding with high probability almost up to the Singleton bound. Specifically, for the inner code we use the concatenation of a quantum list-decodable code near the Singleton bound with a PTC, to ensure (inefficient) unique decodability near the Singleton bound with high probability for any fixed error. The inefficiency here is not a concern due to the small block length of the inner code. We then apply AEL distance amplification to boost the distance of the concatenated code almost to the Singleton bound.
We now show how to construct private AQECCs approaching the Singleton bound. Theorem 4.7 then gives the desired non-private AQECCs.
Theorem 7.1.
For any given and , let be such that there is an infinite explicit family of stabilizer codes of rate and alphabet size that are unique-decodable from errors acting on fraction of the components in time for some increasing function , where denotes the block length.
Then there exists an infinite explicit family of private -AQECCs of rate , alphabet size , private key length bits, and decoding time , where denotes the block length.
Proof.
We may assume that , as otherwise the decoding radius in the theorem statement is . We may also assume that , as otherwise we may simply construct an AQECC of larger rate using the argument below for updated parameters and ; such a change only affects the resulting code’s parameters by constant factors in the and coefficients.
We construct as follows. Below, we ignore rounding issues when choosing integer-valued parameters for ease of presentation; such rounding only affects the resulting bounds by constant factors. For completeness we give explicit constants, which we do not attempt to optimize.
-
•
Let , , , . Let be an CSS code of rate and relative distance that is quantum list-decodable. By A.2, a random CSS code satisfies these properties with probability . Such a code can be found via a brute force search in time , which is constant with respect to .
-
•
Let be a -PTC of block length , rate , (so message length is ), alphabet size , and private key set of size for . Such a PTC was constructed by [BCG+02], as stated in Theorem 4.2.
-
•
Let , and let be the code of rate obtained by reblocking (that is, folding) the code defined in the theorem statement to increase the alphabet size from to .
-
•
Let , and for every , define the code . That is, has encoding map . Here takes as input a message state and the classical private key , the latter of which consists of independent private keys for the respective calls to .
-
•
Let be an -regular -pseudorandom bipartite graph, and for let , where is the permutation specified by as described in Section 5.1.
We now show that the private code defined above has the desired properties. By definition, has rate , alphabet size , and private key length , where this final inequality uses the fact that by the quantum Singleton bound for , and the fact that with .
It remains to be shown that has a decoding algorithm with the desired error and efficiency parameters. We define the following natural decoding algorithm . Let be the brute force decoding algorithm for the composed stabilizer code . Here first performs a syndrome measurement for and finds all stabilizer-distinct errors of weight consistent with the syndrome. If there is a unique such error (up to multiplication by stabilizers), the algorithm applies to the measured state to correct the error; otherwise, it fails and gives an arbitrary output. Let denote the unique-decoding algorithm for provided by the theorem statement. Then we let .
As is the concatenation of stabilizer codes, the decoding algorithm described above can be implemented as a single syndrome measurement followed by a classical algorithm that computes a Pauli error, whose inverse can then be applied to the measured state to restore the initial code state with high probability. However, for the purpose of our analysis, it is helpful to assume that the inner code syndromes are measured before the outer code syndrome, as then we can apply Lemma 4.1 (and its composable generalization in Theorem C.1) to the inner codes.
Each of the inner decodings runs in time because the brute force search may simply iterate through all possible Pauli errors. Thus the overall runtime of is .
It remains to be shown that is a private -AQECC for . For this purpose, we will show that for every error channel acting on some subset of the code components with , it holds with probability over the uniformly random choice of key and over the randomness from measurements in the decoding algorithm that for every message , we have
| (29) |
As a point of notation, above we are viewing the channel as a procedure that outputs a classical ensemble of pure quantum states. Thus in the notation of density matrices, we would equivalently like to show that
for some and some density matrix .
Note that we allow the message to be an arbitrary pure state on the joint system consisting of the message register and an arbitrarily large side register, to which none of the encoding, decoding, or error channels have access. Allowing to be entangled with a side register in this way implies that our proof gives the desired diamond norm bound in Definition 1.5. However, the side register effictively has no effect in the argument below, so we will not need to reference it further.
Letting and , then (29) is equivalent to
Recall that we may decompose
where ranges over a set of orthonormal environment states, and the are some operators such that . Then it suffices to show for each , with probability we have
| (30) |
Define by . Because , Lemma 5.2 implies that the set
has . That is, the fraction of inner blocks with have error rate from below the list decoding radius of .
Fix . Let denote the set of Paulis supported inside . Then we may decompose for some coefficeints .
As the left hand side of Equation 30 does not depend on the order in which the inner blocks are decoded, assume that we first sequentially apply to the inner code blocks of . Then for a given such , is applied to the th block of . We may let
for some coefficients , which are random variables depending on the choices of as well as on the outcomes of measurements in for with . Note that for a fixed , the random variables over may be correlated.
For every , since and therefore acts on fewer than fraction of the components in block , local indistinguishability guarantees (C.2) that the distribution of the coefficients does not depend on the message encoded by in block . Thus in particular, the distribution of does not depend on the choice of .
For an inner code block , if is such that for every with th block not equal to the identity, we say that block is error-free in . Recall the definition of in Algorithm 1. By Lemma 4.1 and its composable generalization in Theorem C.1, for each , conditioned on the values of , it holds with probability over the randomness in and in the syndrome measurement that successfully corrects the error on inner code block , meaning that block is error-free in . Furthermore, by Remark C.1, if block is error-free in , then block is error-free in for all , so that in particular block is error-free in . It follows that
where the final inequality above follows from the Chernoff bound. Thus because by definition , it follows that with probability , the state
is equal to for some operator that acts as the identity on fraction of the components . In this case we are guaranteed that , so Equation 30 holds with probability , as desired.
∎
The following corollary instantiates Theorem 7.1 with two examples of suitable outer codes, namely distance-amplified concatenated Reed-Solomon codes and asymptotically good quantum LDPC codes.
Corollary 7.2.
For every and , we have:
-
1.
There exists an infinite explicit family of private -AQECCs of rate , alphabet size , block length , private key length bits, and decoding time .
-
2.
For sufficiently small , there exists an infinite explicit family of private LDPC -AQECCs of rate , alphabet size , private key length bits, and decoding time .
For the first item in Corollary 7.2, we will concatenate a Reed-Solomon outer code with an inner code from the ensemble of codes given below.
Lemma 7.3.
For a prime power and positive integers , let be -dimensional subspaces chosen uniformly at random subject to the constraint that . Let be the CSS code of block length , rate , and local dimension obtained by associating . Then for every , it holds with probability that has relative distance at least , where denotes the -ary entropy function.
Proof.
By definition for , the code contains any given with probability . Therefore the chance that contains some of Hamming weight is at most . Union bounding over , it follows that both , and therefore , has relative distance at least with probability . ∎
The codes in Lemma 7.3 may be viewed as a quantum analogue of the Wozencraft ensemble, as they provide a derandomization of random CSS codes that still approach the quantum Singleton bound over large alphabets.
Lemma 7.4.
For every , there exists an explicit infinite family of codes of rate , local dimension , and block length that are unique-decodable from errors acting on fraction of the components in time .
Proof.
We construct by applying the AEL construction in Proposition 5.4 to the concatenation of an outer Reed-Solomon code of rate with an inner code of rate from the ensemble in Lemma 7.3. Specifically, let be a code from the ensemble in Lemma 7.3 of rate , local dimension , and relative distance . As described in Lemma 7.3, each of is specified by a single parity check vector in up to scalar multiplication by . Therefore there are at most possible choices for each of , so there are at most possible choices for . Computing the distance of each of by brute force takes time, so a brute force search to find takes time.
Now let be a quantum Reed-Solomon code of rate , and block length and local dimension . Then Proposition 5.4 implies that we may choose , , and an -regular -pseudorandom bipartite graph such that the code has local dimension and is decodable from adversarial errors acting on fraction of the components. Furthermore, the decoding algorithm simply decodes the inner codes and then decodes the outer code. Brute force decoding in all inner code blocks takes time , and decoding the Reed-Solomon outer code can be done in time . Thus the overall decoding algorithm takes time as desired.
Furthermore, is explicit as we showed above that the inner code can be constructed by a brute force search in time , and the quantum Reed-Solomon code is explicit. ∎
Proof of Corollary 7.2.
-
1.
The result follows from Theorem 7.1 by letting be a code of rate and alphabet size that is unique-decodable from errors acting on fraction of the components in time , as given in Lemma 7.4.
-
2.
The result follows form Theorem 7.1 by letting be a family of asymptotically good quantum LDPC codes of local dimension that permits linear-time decoding. For instance, the codes of [PK22, LZ22c] have such a decoding algorithm [LZ22a].
∎
As described in Section 4.2, the private key of a private AQECC can be incorporated into the code using a classical robust secret sharing scheme. Specifically, Theorem 4.6 and Theorem 4.7 imply that the statement of Theorem 7.1 still holds when we remove the condition that the AQECC is private.
Corollary 7.5.
Define as in Theorem 7.1, and assume that so that permits efficient decoding. Then there exists an infinite explicit family of -AQECCs of rate , alphabet size that has efficient encoding and decoding algorithms.
Proof.
The result follows directly by applying the private AQECCs of Theorem 7.1 with the robust secret sharing schemes of Theorem 4.6 in Theorem 4.7. Specifically, as in the proof of Theorem 7.1, we may assume that . Let be the private -AQECC from Theorem 7.1 of rate , block length , local dimension , and with for a sufficiently small constant such that has private key length at most . Let be the -robust secret sharing scheme from Theorem 4.6 of rate , block length (number shares) , share size , and with . Note that we may choose because the quantum Singleton bound implies that , so , and thus is at least as large as the share size given by Theorem 4.6.
Then applying Theorem 4.7 with and yields an AQECC with the desired parameters. Specifically, because by construction the number of bits in the RSS message is , which is at least as large as the private key length of , we may indeed apply Theorem 4.7 to obtain a -AQECC of rate and alphabet size . ∎
Thus in particular we immediately obtain the following non-private analogue of Item 1 of Corollary 7.2, again by letting be the code from Lemma 7.4.
Corollary 7.6.
For every and , there exists an infinite explicit family of -AQECCs of rate , alphabet size and block length that has efficient encoding and decoding algorithms.
Acknowledgements
We thank Venkatesan Guruswami, Andrea Coladangelo, Omar Alrabiah, Debbie Leung, James Bartusek and Umesh Vazirani for fruitful discussions. We also thank Fermi Ma, Markus Grassl, and Andreas Winter for helpful comments on earlier drafts of the paper.
TB and LG acknowledge support by the National Science Foundation Graduate Research Fellowship under Grant No. DGE 2146752.
References
- [ABO08] Dorit Aharonov and Michael Ben-Or. Fault-tolerant quantum computation with constant error rate. SIAM J. Comput., 38:1207–1282, 2008.
- [AEL95] N. Alon, J. Edmonds, and M. Luby. Linear time erasure codes with nearly optimal recovery. In Proceedings of the 36th Annual Symposium on Foundations of Computer Science, FOCS ’95, page 512, USA, 1995. IEEE Computer Society.
- [AG06] Andris Ambainis and Daniel Gottesman. The minimum distance problem for two-way entanglement purification. IEEE Transactions on Information Theory, 52:748–753, 2006.
- [AK01] Alexei E. Ashikhmin and Emanuel Knill. Nonbinary quantum stabilizer codes. IEEE Trans. Inf. Theory, 47:3065–3072, 2001.
- [Aud06] Koenraad MR Audenaert. A sharp fannes-type inequality for the von Neumann entropy. arXiv preprint quant-ph/0610146, 2006.
- [BCG+02] Howard Barnum, Claude Crépeau, Daniel Gottesman, Adam Smith, and Alain Tapp. Authentication of quantum messages. In The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., pages 449–458. IEEE, 2002.
- [BDH06] Todd A. Brun, Igor Devetak, and Min-Hsiu Hsieh. Correcting quantum errors with entanglement. Science, 314:436 – 439, 2006.
- [Bén09] Cédric Bény. Conditions for the approximate correction of algebras. In TCQ, 2009.
- [BK00] Howard Barnum and Emanuel Knill. Reversing quantum dynamics with near-optimal quantum and classical fidelity. Journal of Mathematical Physics, 43:2097–2106, 2000.
- [BKN00] Howard Barnum, Emanuel Knill, and Michael A. Nielsen. On quantum fidelities and channel capacities. IEEE Trans. Inf. Theory, 46:1317–1329, 2000.
- [BO10] Cédric Bény and Ognyan Oreshkov. General conditions for approximate quantum error correction and near-optimal recovery channels. Physical review letters, 104(12):120501, 2010.
- [CDD+99] Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations secure against an adaptive adversary. In EUROCRYPT, 1999.
- [CDD+15] Ronald Cramer, Ivan Bjerre Damgård, Nico Döttling, Serge Fehr, and Gabriele Spini. Linear secret sharing schemes from error correcting codes and universal hash functions. In Elisabeth Oswald and Marc Fischlin, editors, Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II, volume 9057 of Lecture Notes in Computer Science, pages 313–336. Springer, 2015. doi:10.1007/978-3-662-46803-6\_11.
- [CDF01] Ronald Cramer, Ivan Damgård, and Serge Fehr. On the cost of reconstructing a secret, or VSS with optimal reconstruction phase. In CRYPTO, 2001.
- [CDF+08] Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, and Daniel Wichs. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. In EUROCRYPT, 2008.
- [CGL99] Richard Cleve, Daniel Gottesman, and Hoi-Kwong Lo. How to share a quantum secret. Physical Review Letters, 83:648–651, 1999.
- [CGS05] Claude Crépeau, Daniel Gottesman, and Adam Smith. Approximate quantum error-correcting codes and secret sharing schemes. In Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT’05, page 285–301, Berlin, Heidelberg, 2005. Springer-Verlag. doi:10.1007/11426639_17.
- [CS96] Calderbank and Shor. Good quantum error-correcting codes exist. Physical review. A, Atomic, molecular, and optical physics, 54 2:1098–1105, 1996.
- [Dev05] Igor Devetak. The private classical capacity and quantum capacity of a quantum channel. IEEE Transactions on Information Theory, 51:44–55, 2005.
- [DHLV22] Irit Dinur, Min-Hsiu Hsieh, Ting-Chun Lin, and Thomas Vidick. Good quantum LDPC codes with linear time decoders. arXiv preprint arXiv:2206.07750, 2022.
- [DJX14] Yang Ding, Lingfei Jin, and Chaoping Xing. Erasure list-decodable codes from random and algebraic geometry codes. IEEE Transactions on Information Theory, 60:3889–3894, 2014.
- [DL12] Zeev Dvir and Shachar Lovett. Subspace evasive sets. Electron. Colloquium Comput. Complex., TR11, 2012.
- [DS03] Igor Devetak and Peter W. Shor. The capacity of a quantum channel for simultaneous transmission of classical and quantum information. Communications in Mathematical Physics, 256:287–303, 2003.
- [Eli57] Peter Elias. List decoding for noisy channels. In Technical Report 335. Research Laboratory of Electronics, MIT, 1957.
- [For09] G. David Forney. Concatenated codes. Scholarpedia, 4:8374, 2009.
- [GHW22] Markus Grassl, Felix Huber, and Andreas Winter. Entropic proofs of Singleton bounds for quantum error-correcting codes. IEEE Transactions on Information Theory, 2022.
- [GI01] Venkatesan Guruswami and Piotr Indyk. Expander-based constructions of efficiently decodable codes. In Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pages 658–667. IEEE, 2001.
- [GI02] Venkatesan Guruswami and Piotr Indyk. Near-optimal linear-time codes for unique decoding and new list-decodable codes over smaller alphabets. In STOC ’02, 2002.
- [GI03] Venkatesan Guruswami and Piotr Indyk. Linear time encodable and list decodable codes. In Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, pages 126–135, 2003.
- [GI04] Venkatesan Guruswami and Piotr Indyk. Linear-time list decoding in error-free settings: (extended abstract). In ICALP, 2004.
- [GKO+18] Sivakanth Gopi, Swastik Kopparty, Rafael Oliveira, Noga Ron-Zewi, and Shubhangi Saraf. Locally testable and locally correctable codes approaching the Gilbert-Varshamov bound. IEEE Transactions on Information Theory, 64(8):5813–5831, 2018.
- [Got97] Daniel Gottesman. Stabilizer codes and quantum error correction. arXiv: Quantum Physics, 1997.
- [GPT22] Shouzhen Gu, Christopher A Pattison, and Eugene Tang. An efficient decoder for a linear distance quantum LDPC code. arXiv preprint arXiv:2206.06557, 2022.
- [GR08] Venkatesan Guruswami and Atri Rudra. Explicit codes achieving list decoding capacity: Error-correction with optimal redundancy. IEEE Transactions on Information Theory, 54:135–150, 2008.
- [Gra20] Markus Grassl. Entanglement-assisted quantum communication beating the quantum Singleton bound. ArXiv, abs/2007.01249, 2020.
- [GRZ22] Zeyu Guo and Noga Ron-Zewi. Efficient list-decoding with constant alphabet and list sizes. IEEE Transactions on Information Theory, 68:1663–1682, 2022.
- [GS98] Venkatesan Guruswami and Madhu Sudan. Improved decoding of Reed-Solomon and algebraic-geometric codes. Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280), pages 28–37, 1998.
- [Gur01] Venkatesan Guruswami. List decoding of error correcting codes. PhD thesis, Massachusetts Institute of Technology, 2001.
- [Gur03a] Venkatesan Guruswami. List decoding from erasures: bounds and code constructions. 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings., 49:2826–2833, 2003.
- [Gur03b] Venkatesan Guruswami. List decoding with side information. 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings., pages 300–309, 2003.
- [Gur10] Venkatesan Guruswami. Cyclotomic function fields, Artin–Frobenius automorphisms, and list error correction with optimal rate. Algebra & Number Theory, 4:433–463, 2010.
- [GW13] Venkatesan Guruswami and Carol Wang. Linear-algebraic list decoding for variants of Reed-Solomon codes. IEEE Transactions on Information Theory, 59(6):3257–3268, 2013.
- [GX14] Venkatesan Guruswami and Chaoping Xing. Optimal rate list decoding of folded algebraic-geometric codes over constant-sized alphabets. Electron. Colloquium Comput. Complex., TR13, 2014.
- [GX20] Venkatesan Guruswami and Chaoping Xing. Optimal rate list decoding over bounded alphabets using algebraic-geometric codes. ACM Journal of the ACM (JACM), 69:1 – 48, 2020.
- [GXY17] Venkatesan Guruswami, Chaoping Xing, and Chen Yuan. Subspace designs based on algebraic function fields, 2017. URL: https://arxiv.org/abs/1704.05992, doi:10.48550/ARXIV.1704.05992.
- [HP17] Patrick M. Hayden and Geoffrey Penington. Approximate quantum error correction revisited: introducing the alpha-bit. Communications in Mathematical Physics, 374:369–432, 2017.
- [HRZW19] Brett Hemenway, Noga Ron-Zewi, and Mary Wootters. Local list recovery of high-rate tensor codes and applications. SIAM Journal on Computing, 49(4):FOCS17–157, 2019.
- [HW08] Min-Hsiu Hsieh and Mark M. Wilde. Entanglement-assisted communication of classical and quantum information. IEEE Transactions on Information Theory, 56:4682–4704, 2008.
- [HW18] Brett Hemenway and Mary Wootters. Linear-time list recovery of high-rate expander codes. Information and Computation, 261:202–218, 2018.
- [JX14] Lingfei Jin and Chaoping Xing. A construction of new quantum MDS codes. IEEE Transactions on Information Theory, 60:2921–2925, 2014.
- [KKKS06] Avanti Ketkar, Andreas Klappenecker, Santosh Kumar, and Pradeep Kiran Sarvepalli. Nonbinary stabilizer codes over finite fields. IEEE Transactions on Information Theory, 52:4892–4914, 2006.
- [KL96] Emanuel Knill and Raymond Laflamme. Concatenated quantum codes. arXiv: Quantum Physics, 1996.
- [KL97] Emanuel Knill and Raymond Laflamme. Theory of quantum error-correcting codes. Physical Review A, 55:900–911, 1997.
- [KMRZS15] Swastik Kopparty, Or Meir, Noga Ron-Zewi, and Shubhangi Saraf. High-rate locally-correctable and locally-testable codes with sub-polynomial query complexity. Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, 2015.
- [KRRZ+19] Swastik Kopparty, Nicolas Resch, Noga Ron-Zewi, Shubhangi Saraf, and Shashwat Silas. On list recovery of high-rate tensor codes. IEEE Transactions on Information Theory, 67:296–316, 2019.
- [KSW08] Dennis Kretschmann, Dirk Schlingemann, and Reinhard F. Werner. The information-disturbance tradeoff and the continuity of Stinespring’s representation. IEEE Transactions on Information Theory, 54:1708–1717, 2008.
- [KW08] Jon-Lark Kim and Judy L. Walker. Nonbinary quantum error-correcting codes from algebraic curves. Discret. Math., 308:3115–3124, 2008.
- [Lan04] M. Langberg. Private codes or succinct random codes that are (almost) perfect. In 45th Annual IEEE Symposium on Foundations of Computer Science, pages 325–334, 2004. doi:10.1109/FOCS.2004.51.
- [LB13] C. Lai and Todd A. Brun. Entanglement increases the error-correcting ability of quantum error-correcting codes. Physical Review A, 88:012320, 2013.
- [LBW13] C. Lai, Todd A. Brun, and Mark M. Wilde. Duality in entanglement-assisted quantum error correction. IEEE Transactions on Information Theory, 59:4020–4024, 2013.
- [LNCY97] Debbie W Leung, Michael A Nielsen, Isaac L Chuang, and Yoshihisa Yamamoto. Approximate quantum error correction can lead to better codes. Physical Review A, 56(4):2567, 1997.
- [LS08] D. Leung and G. Smith. Communicating over adversarial quantum channels using quantum list codes. IEEE Trans. Inf. Theor., 54(2):883–887, feb 2008. URL: https://arxiv.org/pdf/quant-ph/0605086.pdf, doi:10.1109/TIT.2007.913433.
- [LXW08] Zhuo Li, Lijuan Xing, and Xinmei Wang. Quantum generalized Reed-Solomon codes: unified framework for quantum MDS codes. ArXiv, abs/0812.4514, 2008.
- [LZ22a] Anthony Leverrier and Gilles Zémor. Efficient decoding up to a constant fraction of the code length for asymptotically good quantum codes. arXiv preprint arXiv:2206.07571, 2022.
- [LZ22b] Anthony Leverrier and Gilles Zémor. A parallel decoder for good quantum LDPC codes. arXiv preprint arXiv:2208.05537, 2022.
- [LZ22c] Anthony Leverrier and Gilles Zémor. Quantum Tanner codes. arXiv preprint arXiv:2202.13641, 2022.
- [MN12] Prabha Mandayam and Hui Khoon Ng. Towards a unified framework for approximate quantum error correction. Phys. Rev. A, 86:012335, Jul 2012. URL: https://link.aps.org/doi/10.1103/PhysRevA.86.012335, doi:10.1103/PhysRevA.86.012335.
- [MW22] Manideep Mamindlapally and Andreas J. Winter. Singleton bounds for entanglement-assisted classical and quantum error correcting codes. 2022 IEEE International Symposium on Information Theory (ISIT), pages 85–90, 2022.
- [NM10] Hui Khoon Ng and Prabha Mandayam. Simple approach to approximate quantum error correction based on the transpose channel. Phys. Rev. A, 81:062342, Jun 2010. URL: https://link.aps.org/doi/10.1103/PhysRevA.81.062342, doi:10.1103/PhysRevA.81.062342.
- [PK22] Pavel Panteleev and Gleb Kalachev. Asymptotically good quantum and locally testable classical LDPC codes. In Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, pages 375–388, 2022.
- [RGB04] Martin Rötteler, Markus Grassl, and Thomas Beth. On quantum MDS codes. International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., pages 356–356, 2004.
- [RSTW78] I Reed, R Scholtz, Treiu-Kien Truong, and L Welch. The fast decoding of Reed-Solomon codes using Fermat theoretic transforms and continued fractions. IEEE Transactions on Information Theory, 24(1):100–106, 1978.
- [Rud07] Atri Rudra. List decoding and property testing of error correcting codes. PhD thesis, University of Washington, 2007.
- [RZWZ20] Noga Ron-Zewi, Mary Wootters, and Gilles Zémor. Linear-time erasure list-decoding of expander codes, 2020. URL: https://arxiv.org/abs/2002.08579, doi:10.48550/ARXIV.2002.08579.
- [Ste96] Steane. Simple quantum error-correcting codes. Physical review. A, Atomic, molecular, and optical physics, 54 6:4741–4751, 1996.
- [Sud00] Madhu Sudan. List decoding: algorithms and applications. In SIGA, 2000.
- [SW02] Benjamin Schumacher and Michael D. Westmoreland. Approximate quantum error correction. Quantum Inf. Process., 1(1-2):5–12, 2002. doi:10.1023/A\%3A1019653202562.
- [Wer98] R. F. Werner. Optimal cloning of pure states. Phys. Rev. A, 58:1827–1832, Sep 1998. URL: https://link.aps.org/doi/10.1103/PhysRevA.58.1827, doi:10.1103/PhysRevA.58.1827.
- [WHB11] Mark M. Wilde, Min-Hsiu Hsieh, and Zunaira Babar. Entanglement-assisted quantum turbo codes. IEEE Transactions on Information Theory, 60:1203–1222, 2011.
- [Woz58] J. M. Wozencraft. List decoding. Quarterly Progress Report, Research Laboratory of Electronics, MIT, page 48:90–95, 1958.
- [Yam06] Tomoyuki Yamakami. Quantum list decoding of classical block codes of polynomially small rate from quantumly corrupted codewords. Balt. J. Mod. Comput., 4, 2006.
Appendix A Properties of Random CSS Codes
In this section, we briefly discuss the list decodability and other properties of random CSS codes, which we apply in for the construction of concatenated codes. These properties follow from straightforward applications of their well known classical counterparts, and so for conciseness we simply refer to the necessary statements. That is, we construct random CSS codes from correlated random classical linear codes. Therefore, by a union bound, any property that holds with high probability for these classical codes also holds with high probability for the CSS code.
We generate a random CSS code as follows. First, sample random linearly independent vectors in . Let be the matrix defined by the sampled vectors and to be the first columns of . We define to be the classical linear code defined by using as a generator matrix, and to be the classical linear code defined by using as the parity check matrix, such that by construction. We now consider the random Galois-Qudit CSS code CSS, where is the rate .
First, by assumption with high probability both are full rank. Thereby, we have are classical codes, and CSS is a QECC. A standard exercise in coding theory is to prove random generator matrices (and parity check matrices) of columns (resp. rows) have distances approaching the Gilbert-Varshamov bound of with exponentially high probability, where denotes the -ary entropy function. A similar statement also holds for list-decodability, as shown in [Gur01, Theorem 5.3] and stated below.
Lemma A.1 (Well known).
Let be a random classical linear code of rate . Then for every ,
-
•
has relative distance with probability
-
•
For every , is list-decodable with probability .
In particular, Lemma A.1 implies that given , we can choose , , and , and the random linear code will be list-decodable and have relative distance with probability . Union bounding over the two classical codes making up a random CSS code, Lemma A.1 and Theorem 3.2 immediately imply the following.
Claim A.2.
Let be a random CSS code of rate and block length over . Then for every ,
-
•
has relative distance with probability
-
•
For every , is list-decodable with probability .
Similarly as in the classical case, given , we can choose , , and , and the random CSS code will be list-decodable and have relative distance with probability .
Appendix B List-Recoverable Quantum Codes
In this section, we discuss a quantum analog of a certain extension to list-decoding, the problem of list-recovery. While, at a high level, list-decoding requests the codewords of a certain code around a given point, the problem of list-recovery requests the codewords whose individual symbols come from a small set of ‘candidate’ symbols:
Definition B.1.
A code is -LR (list-recoverable) if , with ,
| (31) |
This would suggest that once one fixes sets of candidate symbols , there aren’t many codewords which agree with the subsets at most . We emphasize that the special case -LR is equivalent to -LD. This is since if is -LR, for any vector , one can pick (such that ) and the number of codewords which agree with on at least locations is the number of codewords in a ball of radius around . Finally, is said to be efficiently list-recoverable if there exists an efficient algorithm to find these codewords.
Below, we discuss an analogous notion of list recoverability for the normalizer group of a stabilizer QECC. Informally, it corresponds to enumerating the logical operators of the quantum code whose single-qudit components are selected from candidate lists of single-qudit operators.
Definition B.2.
A stabilizer code with stabilizer group is -QLR (Quantum List Recoverable) if, for all subsets of single-qudit operators with , any list of logically-distinct operators in the normalizer group where
| (32) |
has size bounded by .
This means that there don’t exist many logical operators which match the at most locations . We expect this to naturally reduces to the QLD definition when . Indeed,
Claim B.1.
If a stabilizer QECC is -QLR, then it is -QLD.
Proof.
Fix . Recall the set of operators such that is a logical operator, is equivalent to the set for . Thus has weight if for at least locations. Let . Since is -QLR, there are at most such choices of . ∎
We note that the characterization above of quantum list-recovery can be cast in terms of an analogous classical question about syndromes of the stabilizer code.
Claim B.2.
Let be -QLR, let be any error on of syndrome , and consider any set of subsets of single-qudit operators with . Then any set of logically-distinct operators of syndrome and which agree with the on at least qudits , has size bounded by .
Proof.
Given any such set , consider the set defined by shifting the elements of the former by . Also, for each , ‘shift’ each list of single qudit operators by . Note that , and . Since each has the same syndrome as , and thus the elements of are logically-distinct operators in . Moreover, for most . By the definition of QLR, we must have , which concludes the proof. ∎
Much like the case for quantum list decoding, we show that one can devise quantum codes with good list recovery properties from the CSS construction of two classically list recoverable codes.
Claim B.3.
If are two -linear classical codes with and are -LR, then the Galois-qudit CSS is -QLR.
Proof.
The elements in the normalizer of CSS are the operators , . Now, fix arbitrary sets of size . We can write each single qudit operator in the th set into a Pauli basis: . We can thereby define sets of ‘X’ symbols , and ‘Z’ symbols , for each location .
If , and for most , then we have that and for most . However, is -LR, so there exist at most such valid codewords of . Analogously, there exist at most valid choices of . The set of of valid elements is at most the number of pairs of valid elements. ∎
By casting this notion of list recovery as a classical problem, we inherit the efficiency of classical list decoding algorithms.
Claim B.4.
If with are efficiently -LR, then given any syndrome of the quantum code CSS and subsets of single-qudit operators with , there exists a polynomial time classical algorithm to find a list of logically-distinct operators of syndrome and for at least symbols .
Proof.
If are the syndrome measurements of the X and Z checks, respectively, then let be any Pauli operator with the same syndrome. Given the sets of single qudit operators , then consider the sets of -ary symbols
| (33) |
We call the classical list decoding algorithm for on the and on the , obtaining lists of codewords and respectively. We note that each ‘correction’ , for , defines a Pauli operator with the same syndrome as . Moreover, agrees with in at least locations . Thus a subset of the operators satisfy the claim. ∎
By combining the above with known results on the list-recoverability of folded Reed-Solomon codes (the below is a corollary of Theorem 6.2 of [GR08] stated previously),
Theorem B.5 ([GR08]).
For every integer , rates , , and prime , there exists -folded RS codes (Definition 3.6) over fields of characteristic of rate and block length which are -LR, where , , and alphabet size .
We arrive at an exact analog:
Corollary B.6.
For every integer , rates , , and prime , there exists -folded QRS codes (Definition 3.8) over fields of characteristic of rate and block length which are -QLR, where , , and local dimension .
B.1 List Decodable Codes from List Recovery and Distance Amplification
In this section, we discuss an application of a classical technique to devise codes over smaller alphabets with better list-decoding properties, using the distance amplification techniques in [AEL95]. To do so, we discuss a quantum adaptation of the approach in [GR08], who concatenated Folded RS codes with list decodable inner codes, to reduce the large alphabet size of the RS construction, and approach list decoding capacity on constant size alphabets (with efficient decoding). The theorem below is the main result of this section, on the construction of list decodable quantum codes up to the Singleton bound from the concatenation and distance amplification of list recoverable and list decodable quantum codes.
Theorem B.7.
Fix . There exists a stabilizer code which is -QLD on local dimension . Moreover, can be list-decoded efficiently.
B.1.1 The Construction
We build the quantum code in the theorem above using the concatenation of two stabilizer codes . Informally, the ‘outer’ quantum code is chosen to be a high rate, large alphabet, quantum list recoverable code, of size and local dimension . In particular, a QECC which is -QLR. In turn, the ‘inner’ code has rate near the target rate and is near list decoding capacity, i.e. with decoding radius approaching the quantum singleton bound, . Formally, is a QECC and -QLD, where . Their concatenation is a code on qudits of local dimension and rate
To conclude the construction, the physical qudits of the resulting concatenated code are permuted and re-grouped, using the AEL alphabet-reducing distance amplification techniques discussed in Section 5. Intuitively, as before this permutation is used to ‘spread out’ errors on the inner code, such that any error on the final code doesn’t corrupt most inner blocks beyond repair. Formally, we pick an -pseudorandom -biregular bipartite graph , with and degree , and use it to define a permutation . The final code is defined by , and is defined on qudits of local dimension .
B.1.2 Analysis
We present a lemma on the distance amplification of generic list recoverable and list decodable quantum codes, and then instantiate the lemma with a particular choice of quantum codes to prove Theorem B.7.
Lemma B.8.
Fix and sufficiently small . Let be a QECC and -QLR, be a QECC and -QLD, and be a -pseudorandom bipartite expander graph of size and degree . Then is -QLD.
If is an operator on the code , then we refer to as the ‘unpermuted’ operator acting on the concatenated code . We emphasize here that we restrict our attention to a basis of operators which factorizes as a tensor product of operators on the individual qudits of local dimension . Since is a concatenated code, recall that its syndrome measurement corresponds to the syndromes of the inner codes, as well as the syndrome measurement of the encoding of the stabilizers of the outer code, see 2.2.
To prove the lemma above, it suffices to show that there aren’t many low weight, logically-distinct, operators on , which agree with both of the syndrome measurements. To do so, we divide the proof into two key steps. First, we measure the syndrome of the inner blocks, and argue that their list-decodability and the expansion of produces small lists of candidate ‘correction’ operators acting on the inner blocks. Then, we measure the syndrome of the outer code, and use its list-recoverability to infer that there can’t be many global operators matching the elements of these inner-block lists.
Claim B.9.
Let be any syndrome measurements of the inner code blocks, and let each , for , correspond to a list of operators on of relative weight which match and are all distinct up to a stabilizer of . Let be any operator of relative weight on , where , and is supported on the th inner block. Then, if has syndrome on the th block for ,
| (34) |
Proof.
Let be any operator of relative weight on . From Proposition 5.4, the expansion of tells us that at least inner blocks have wt. We refer to these inner blocks as ‘Good’ blocks. Via the list decodability of , if is Good, then is equivalent up to a stabilizer of , to some element of . Moreover, . ∎
Now, let us measure the syndrome of the outer code, by means of the encoded stabilizers of . Please refer to 2.2 for a description of the stabilizers of concatenated codes. From B.9 it suffices to argue that there aren’t many operators on the concatenated code with outer syndrome and where for most . This resembles a statement about list-recoverability, but about operators on the concatenated code, not the outer code. The claim below formalizes how to reduce that statement to the list recoverability of the outer code.
Claim B.10.
There are at most operators which are distinct up to a stabilizer of the concatenated code and have outer syndrome , inner syndromes , where is an operator on the distance amplified code of relative weight .
As an immediate corollary of the above, we recover Lemma B.8.
Corollary B.11.
is -QLD.
Proof of B.10.
The proof proceeds by using the elements of the lists to construct operators acting on each symbol of the outer code, for which we then invoke list-recoverability. Consider, WLOG, the first element in the list of the th inner block. For each , we construct a list of inner code normalizers
| (35) |
Note that each element of is -logically-equivalent to a logical operator , defined by quotienting out the stabilizer group of . Thus, one can derive from a list of operators acting on the th qudit of the outer code:
| (36) |
Note that , and that the identity operator is in (since it was in as well). Let denote the syndrome of the operator on the encoded stabilizers of the outer code. Now, we invoke the list recoverability of the outer code to find a list of at most -logically-distinct operators acting on the outer code where for qudits , and has syndrome . Each element of can now be represented as an operator acting on the concatenated code, by re-encoding into , and to conclude we shift back the rotation by :
| (37) |
To conclude the proof, we argue correctness of the produced list. It suffices to prove that any operator with bounded weight on the distance-amplified code with syndromes is -stabilizer equivalent to an element of . For the purposes of contradiction, assume otherwise and let one such operator be on . By construction, has syndrome 0 on all inner code blocks, since , and thereby is -stabilizer equivalent to some encoded operator , for . Moreover, for at least locations , and the outer code syndrome of is the same as that of . Since the outer code syndrome of is precisely , must be -logically-equivalent to some element returned by the list recovery, concluding the proof. ∎
To conclude this section, we make an explicit choice of codes and parameters. Let , and pick to be a random -ary CSS code of rate which is -QLD, see A.2. By picking in Theorem 3.8, we let be the -Folded Quantum RS code of Definition 3.8 of rate , and blocklength , folding parameter , which is -QLR. Naturally are defined over a field of the same characteristic, and we let the alphabet size of be any composite where , such that the block-length of is . The resulting alphabet size is , and list size . We list decode the resulting code by brute force decoding the inner codes in time , and list recover in time , resulting in an efficient decoding.
Appendix C Generalization of Lemma 4.1
In this section we prove a particular parallel composability property of the private AQECCs of Lemma 4.1 presented in Section 5. For simplicity, we simply discuss the main modifications from Lemma 4.1. We later apply this composability to study the concatenation of AQECCs.
In our proof of Lemma 4.1, we actually showed the slightly stronger statement that uniquely decodes an arbitrary adversarial error with high probability over the choice of private key . In this section, we show that this stronger property continues to hold when the adversary is allowed access to a side-register entangled with the encoded message.
Consider the following setting, where Alice and Eve hold a bipartite quantum state , and Alice desires to send the register to a third party, Bob. To do so, Alice has access to an adversarial quantum communication channel , where Eve can adversarially tamper with up to a fraction of the registers of the sent message, in addition to their half of . Before doing so, Alice picks a random key , and encodes her half of the state using the private AQECC , and then sends her half over the channel. After receiving the corrupted code-state (and with knowledge of ), Bob attempts to decode using the channel defined in Algorithm 1. The density matrix produced by Bob can be written as
| (38) |
Theorem C.1 below is a generalization of 4.5, which states that with high probability over the choice of (and the syndrome measurement outcomes), the quantum state Bob recovers is simply as if Eve had corrupted their register without touching the register at all: i.e. , for some CP operator acting only on .
Theorem C.1.
Let be the private -AQECC of Lemma 4.1, defined via the composition of a -QLD code and an -PTC with keys . Let be a bipartite quantum state, and for let be the encoding of the half of into the AQECC. If is an arbitrary CP error operator supported on and a set of at most code registers, then for a random choice of the decoding algorithm of Algorithm 1 produces the density matrix
| (39) |
That is, for each syndrome of the stabilizer code , is measured with probability , is a CP operator acting only on the register , are generic bipartite PSD matrices, and is a large subset of the PTC keys of size .
In other words, even if the adversary can corrupt a sideregister entangled with the message, with probability at least Bob recovers the half of the original bipartite state uncorrupted.
Remark C.1.
We remark that the proof of Theorem C.1 below holds even if the state is entangled with a third environment register to which none of the encoder, decoder, or error operators have access.
To prove the theorem above, we present a generalization of 4.1 and the intuition in Section 3. Qualititatively, it formalizes that the local indistinguishability of the stabilizer code ensures Eve learns nothing about the private encryption key , even if Eve has prior entanglement with the message. Thus, if Bob performs a syndrome measurement upon receiving the corrupted codestate, he will collapse the state into a mixture of Pauli errors acting on his half of the state, and generic operators acting on Eve’s half. Together with 4.4 and 4.5, C.2 below directly implies Theorem C.1.
Claim C.2.
Let be be a stabilizer code, let be any bipartite quantum state, and let be the encoding of half of into the code . If is an arbitrary CP error operator supported on and a set of fewer than code registers, then the syndrome measurement collapses the corrupted state into the mixture
| (40) |
That is, the syndrome is measured with probability and the resulting state is collapsed a single Pauli error on the code , and a CP operator supported only on the non-encoded half .
If is CPTP, then . We emphasize that the distribution over syndrome measurements, , doesn’t depend on the encoded half of , only on the choice of error operator and .
Proof.
Consider a decomposition of the CP map into Krauss operators . Let us further decompose each operator into a Pauli basis. The POVM is comprised of projectors for each syndrome , which we observe to collapse into Pauli’s on of syndrome :
| (41) |
However, each in the sum above is supported on and they all have the same syndrome , and thereby must all be stabilizer-equivalent to an operator supported on . One can thereby re-arrange the above
| (42) |
To conclude, we denote as , which is only a function of and .
∎