Abstract
We construct new stabilizer quantum error-correcting codes from generalized monomial-Cartesian codes. Our construction uses an explicitly defined twist vector, and we present formulas for the minimum distance and dimension. Generalized monomial-Cartesian codes arise from polynomials in m variables. When our codes are MDS, and when and our lower bound for the minimum distance is 3, the codes are at least Hermitian almost MDS. For an infinite family of parameters, when we prove that our codes beat the Gilbert–Varshamov bound. We also present many examples of our codes that are better than any known code in the literature.
Keywords: error-correction, Hermitian, MDS, Gilbert-Varshamov
Introduction
Certain classically intractable problems can become feasible when approached with the computational power of quantum computers. This was demonstrated through Shor’s algorithm, which solves in polynomial time the prime factorization problem and discrete logarithm problem on quantum computers [50]. Due to this fact, researchers and companies are actively engaged in constructing quantum computers with many qubits [10, 15]. Quantum computer implementations have higher error rates than classical computers, making reliability a challenge. However, despite quantum information being unclonable [18, 56], it was shown that quantum error correction techniques can be used [49, 53]. Over the last twenty-five years, error correction has proved to be one of the main obstacles to scaling up quantum computing and quantum information processing.
There is an extensive study of quantum error-correcting codes, see for example the papers [3, 4, 11, 12, 31, 33, 52] for the binary case and [5, 6, 9, 14, 21, 24, 27, 32, 35, 40, 41, 47, 51] for the general case. Many of the known quantum error-correcting codes are stabilizer codes. Let be the complex field, let q be a prime power and let n be a positive integer. A stabilizer code is the common eigenspace of an abelian subgroup of the error group generated by a nice error basis on the space (see [36, 37] for details). The code Q has minimum distance d whenever all errors in with weight less than d can be detected, or have no effect on Q, but some errors of weight d cannot be detected. A code as above has parameters when it is a -dimensional subspace of and has minimum distance d (see, for instance, [12, 35]). Stabilizer quantum error-correcting codes have been studied by many authors because they can be constructed from classical additive codes in , which are self-orthogonal with respect to a trace symplectic form. In particular, stabilizer codes can be obtained from suitable Hermitian self-orthogonal classical linear codes (see [35] or [5, 9, 12] for details). We will utilize this construction.
Many constructions of classical codes start with a quotient polynomial ring of the form where I is an ideal. Affine variety codes were introduced by Fitzgerald and Lax in [23], with a general ideal I. Our codes (defined in the next section) are a type of generalized affine variety code, so we could use this name. However, since the codes we define are generalized monomial-Cartesian codes, introduced in [45], and although the definition is slightly different, we are going to call our codes generalized monomial-Cartesian codes.
Monomial-Cartesian codes (MCCs) are a class of evaluation codes obtained as the image of maps
where m is a positive integer larger than 1, is a Cartesian-product subset of , I is the vanishing ideal at S of , and is an -linear space generated by classes of monomials. MCCs were introduced in [45] with only algebraic tools, see also [46]. These codes have several different applications in the literature, such as quantum codes, locally recoverable codes (LRCs) with availability, polar codes and -LRCs [13, 26, 45].
Generalized monomial-Cartesian codes arise when changing the evaluation map to twist each coordinate of by nonzero elements of . In this article, we will use generalized MCCs, where the set is a certain fixed set, and we will use the same name for this construction, see Definition 2.3. We will use generalized monomial-Cartesian codes to construct Hermitian self-orthogonal classical linear codes and thereby construct stabilizer quantum codes. We present some evidence comparing our codes to codes in [8, 14, 16, 28, 38, 43, 55], which shows that they are very good quantum codes, and sometimes optimal.
Quantum MDS codes are those achieving the quantum singleton bound; there are many papers on this type of codes. (Some recent papers are [7, 19, 42].) The MDS conjecture limits the length of a q-ary quantum MDS code to be at most [35]. Thus, another goal is to obtain longer q-ary codes with good parameters. With our construction, we achieve this.
The paper is laid out as follows: After the preliminaries in Sect. 2, we present our construction in Sect. 3. Previous works using a twist vector have proved the existence of a twist vector with the required properties, whereas a feature of our construction is that we define the twist vector explicitly, see (3) in Sect. 3. We present a general construction first (Theorem 3.4) and then a more specific construction that allows us to control the minimum distance (Theorem 3.7). In Sect. 4, we will show that our construction with gives MDS codes. We also prove that when and our lower bound for the minimum distance is 3 the codes are at least Hermitian almost MDS. Section 5 contains a proof that for an infinite family of parameters when , our codes beat the Gilbert–Varshamov bound. Finally, in Sect. 6 we present some examples with small parameters that beat the best known codes in the literature.
Preliminaries
In this paper, we will assume that q is odd, although in this section the definitions hold for any q. Let us denote by the set of positive integers and by the set of nonnegative integers. For any two vectors , , their Hermitian inner product is defined as:
their Euclidean inner product is defined as:
and their * product is defined as:
Let the symbol (respectively, ) mean dual with respect to Hermitian (respectively, Euclidean) inner product. For a vector subspace (or code) C of , we let (respectively, ) denote the orthogonal vector subspace (the dual code) with respect to the Hermitian (respectively, Euclidean) inner product. We denote by the minimum distance of C. Let s be a nonnegative integer and be a codeword. We denote and
Let us denote by the Hamming weight of . We say that two codes are isometric if there exists a bijective mapping between them that preserves Hamming weights.
Theorem 2.1
([1, 35]) Let C be a linear [n, k, d] error-correcting code over the field such that . Then, there exists an stabilizer quantum code, where stands for the minimum distance of .
The idea in this paper is to construct codes that satisfy the hypotheses of Theorem 2.1. In order to do so, we fix a finite field . Let be the polynomial ring in variables over . For each element , we write for . We will refer to as an exponent and use the lexicographic order in for the exponents. That is, given , , we say if and only if or there exists such that and . Any order can be used.
Let such that . Let be the set of roots of the polynomial , which lie in . We also consider arbitrary subsets for which have cardinality greater than or equal to 2. Let for , so that . Let
which has cardinality
Let
be the monic polynomial in one variable whose roots are the elements of , then for . Let I be the ideal of generated by the polynomials and for . Let
and let
| 1 |
Given , in this paper f is going to denote both the equivalence class in R and the unique polynomial representing f in with degree in less than , . Thus, one can write any uniquely as
with . Let us denote .
Definition 2.2
Let E be as defined earlier in (1). For each nonempty subset , define .
Note that is the -vector space consisting of the -span of .
For any positive integer t, we denote by a primitive t-th root of unity. Since has elements, we choose a bijection between and the set , and this is going to give us an ordering of , . Let us represent by the elements of each set , where the subindex is given by the ordering. For , we define by
where indicates the exponent of and gives the position of the element in the ordering of , . Every element of Z has the form for some . This sets up a bijection between Z and E.
We order the set Z using the (lexicographic) order in restricted to E. That is, given , , then if and only if . Then, we can rename the points in Z as
Let , we will refer to this vector as the twist vector. We index the coordinates of by the elements of E, and we order the coordinates of in the same way as we ordered the elements of Z. That is,
The linear evaluation map in Z:
is injective by the definition of R. It provides the following class of evaluation codes.
Definition 2.3
Let be as defined in Definition 2.2. The generalized monomial-Cartesian code (GMCC) is the image of via the evaluation map , that is,
Since the order of the set Z will be fixed for the rest of the article, we will use the notation and .
Remark 2.4
Evaluation maps of our codes are defined on subsets of coordinate rings of certain affine varieties, but these codes can also be introduced with algebraic tools. Monomial-Cartesian codes were introduced in [45] using only algebraic tools. When the set is arbitrary, GMCCs extend monomial-Cartesian codes. This should be the accurate definition, but for our purposes in this paper we use this particular set , namely the -th roots of unity.
Here is a standard fact, that the dual of a GMCC is another GMCC.
Lemma 2.5
The dual code is a GMCC for some twist vector .
Proof
Consider any two codewords and . Then, the following equation holds:
| 2 |
Let be a (fixed) vector in and consider . We know that whenever , because
is a bijective mapping. We use this presentation of .
We will prove that where is defined by for all .
First we claim that for any we have that . To see this, choose and note that
using the fact that for all i, and using (2). This shows that all the vectors are in .
Finally note that
is a bijective mapping, which shows that .
The length and the dimension of a GMCC are n and , respectively. A bound for the minimum distance is provided in Corollary 2.8.
Lemma 2.6
The GMCCs and are isometric.
Proof
For any codeword , its twisted analogue codeword under the bijective mapping , has the same Hamming weight, this is because for all .
Affine variety codes admit a bound on the minimum distance, known as the footprint bound [29]. Monomial-Cartesian codes in the sense of our Definition 2.3 (the evaluation map is defined over the coordinate ring of some affine variety) are affine variety codes. This fact and Lemma 2.6 prove the next lemma, stating that this bound is also valid for GMCCs. For every exponent , we define
Lemma 2.7
Let be a GMCC and let be a codeword, . Fix a monomial ordering on and let be the leading monomial of f. Then, .
Corollary 2.8
Let be a GMCC and let d be its minimum distance. Define . Then, .
Remark 2.9
Affine variety codes were introduced in [23] for any ideal I. A classical result coming from the theory of Gröbner basis [17] implies that , where d stands for the minimum distance of an affine variety code and is the cited footprint bound [29]. Independently, inspired by the algebraic geometric codes [34] the so-called Feng–Rao bound for the minimum distance of the dual code is derived [20]. It is known that every linear code is an algebraic geometric code. A similar bound (Andersen–Geil) was also given for an algebraic geometric code [2]. It turns out that for monomial-Cartesian codes the footprint bound applied to the dual code and the Feng–Rao bound coincide [25]. Although the footprint bound is more natural for the primal code, and the Feng–Rao bound is more natural for the dual code, we will always refer to them as .
Fig. 1.

In the case , we can use a grid to represent the set E so that an exponent corresponds to the point with coordinates in the grid and that point is labelled with the integer . Exponents in the set are coloured in blue. This example shows the grid representation of E, where , , and . In this example, the lower bound for the minimum distance of the code for any is by Corollary 2.8
Lemma 2.10
Let be a GMCC. Then, and are isometric.
Proof
It is straightforward because .
Lemma 2.11
Let be a GMCC. Then and are isometric.
Proof
It follows from the fact that the family of GMCCs is closed under duality by Lemma 2.5 and by Lemma 2.6.
Corollary 2.12
Let be a GMCC. Then .
Proof
This is because and are isometric (by Lemma 2.11) and also is isometric to (by Lemma 2.10).
Stabilizer quantum codes from generalized monomial-Cartesian codes
In the present section, we construct stabilizer quantum codes by applying Theorem 2.1 to GMCCs (Definition 2.3) with a specific twist vector. Recall from Sect. 2 that q is an odd prime power, denotes a primitive -th root of unity, is such that , , for all , and . We are going to choose the twist vector defined explicitly as follows:
| 3 |
Because
it follows that
Observe that there are blocks of ’s or 1’s. Recall that the coordinates of are labelled and ordered in the same way as the points . This twist vector works as follows. For each ,
| 4 |
Notice that only depends on . The reason why we choose this specific twist vector is going to become clear in Proposition 3.1.
Self-orthogonality conditions
First we present some conditions for the evaluation vectors of monomials in R to be orthogonal for the Hermitian inner product, when our twist vector is used.
Proposition 3.1
Keep the same notations as before. Let q be an odd prime power and consider the twist vector defined in (3). Let , be exponents of two monomials , . Then, the evaluation vectors under the map of these monomials are orthogonal for the Hermitian inner product if one of the following conditions hold:
, or
.
Proof
In order to compute some conditions under which two evaluations of monomials of the quotient ring R are orthogonal for the Hermitian inner product, we have to see when the following sum vanishes:
Since only depends on , we can denote by and reorder the above sum in the following way:
We can do that because all the coordinates in that have the same have the same value. Now we study when the first factor equals 0, and we will ignore the other factors, since the first one gives enough information for the proof. Consider then
| 5 |
which is a sum over . We write each in the form where and . Using this to break (5) into blocks of size , using the fact that is a primitive -th root of unity and using the structure of the twist vector , we can write (5) as
Notice that we can do that because from (4) and the fact that we have that for all . Now using again (4) and the fact that is a primitive -th root of unity, we rewrite the last sum in the following way:
Thus, we have shown that we can write (5) as
where . The above product equals 0 if and only if one of the following conditions holds:
. That is, ; or
. Since , this is equivalent to ; or
. This is true if and only if is a -th root of unity other than 1. That is equivalent to and , which is a particular case of the first condition.
Therefore, if either of the first two conditions hold, the sum (5) equals 0 and that implies that and are orthogonal for the Hermitian inner product.
Remark 3.2
Consider the case when the twist vector is , and is the set of -th roots of unity, that is the solutions to , for every . Then for any the GMCC is an Affine Variety Code (AVC) and it is not self-orthogonal (for the Hermitian inner product). This is because when we compute the Hermitian inner product of the evaluations of any monomial with itself, one obtains that
and every factor above is
Thus, the evaluation of a monomial is not orthogonal to itself, and these codes are not self-orthogonal. However, we are able to provide a twist vector (3) to construct a self-orthogonal GMCC which is isometric to the non-self-orthogonal AVC . The problem of not getting evaluations of monomials to be self-orthogonal can happen also with other twist vectors, that is why one has to choose the twist vector carefully.
Our general construction
Before stating the theorem that is the general construction of this paper, recall the definition of the set E in the previous section. We define a subset in E which will be useful in the following.
Definition 3.3
Let .
The next theorem shows that the set introduced in Definition 3.3 is used as a reference to construct Hermitian self-orthogonal GMCCs.
Theorem 3.4
Let q be an odd prime power and let , , and , be positive integers. Let . Consider the twist vector defined in (3) and the set introduced in Definition 3.3. Let be a subset of . Then,
Therefore, there exists a stabilizer quantum code with parameters
where .
Proof
Since for all we have , the self-orthogonality follows from Proposition 3.1. The existence and parameters of the stabilizer quantum code follow from Theorem 2.1. Notice that , but from Corollary 2.12 we can conclude that .
Notice that in the above theorem we do not give an explicit bound for the minimum distance, but it can be computed using Corollary 2.8 in every particular case.
Our specific construction
Now we are going to provide a strategy [30] to choose a set so that we can control the minimum distance and it maximizes the dimension of the resulting stabilizer quantum code. To that purpose, we need the following
Definition 3.5
Let be a positive integer. Define
Some instances of the above set are represented in Fig. 2.
Fig. 2.
Sets , and , where , and . We use the same conventions as in Fig. 1
Lemma 3.6
Let be the set introduced in Definition 3.5. Then,
Proof
Using the notations in [25, Section 3], the authors define a code , where
By choosing their and equal to our and t, respectively, then we have that
so , see [25, Definition 15]. The statement follows from their equation (8) in Section 3.
Theorem 3.7
Let q be an odd prime power and let , , and , be positive integers. Let . Consider the twist vector defined in (3), a positive integer
and the set introduced in Definition 3.5. Then, the following inclusion holds
Therefore, there exists a stabilizer quantum code with parameters
Proof
Let . From , we have that . Since , then and therefore . So, from Theorem 3.4 we have that .
The existence and parameters of the stabilizer quantum code follows from Theorem 2.1. Notice that from Corollary 2.12 and Lemma 3.6, we have .
The dimension
We state a recursive formula for the dimension of the quantum code, which is shown in [30].
Let . Consider the case when for all . We define
In [30], they give the following recursive formula:
where .
Observe that , where all of are equal to . Therefore, we can use the recursive formula described above to compute , and hence the dimension of the quantum code in Theorem 3.7. For example, when
| 6 |
and when
We obtain MDS and Hermitian almost MDS quantum codes
In this section, we prove that we can obtain quantum codes that are close to the singleton bound. Let us recall first the quantum singleton bound.
Lemma 4.1
(Quantum Singleton bound [48]) If a stabilizer quantum code with parameters exists, then .
Codes attaining equality are called quantum MDS codes.
MDS
Theorem 4.2
The stabilizer quantum codes obtained from Theorem 3.7 with are quantum MDS codes.
Proof
For any given bound for the minimum distance , we have . The parameters of the stabilizer quantum code constructed from Theorem 3.7 are:
It is easily verified that the above parameters provide a quantum MDS code, because and the quantum singleton bound gives an equality.
Some sample parameters are given in Tables 3, 4, 5, 6, 7. For example, we obtain quantum MDS codes with parameters in Table 4, and in Table 5 and in Table 6. We do not claim that these examples are new.
Table 3.
A sample of codes
| m | Quantum code | Beats QGV | Comment | |||
|---|---|---|---|---|---|---|
| 1 | 4 | No | MDS | |||
| 1 | 8 | Yes | MDS | |||
| 2 | 4 | 5 | Yes | QHAMDS | ||
| 2 | 4 | 6 | Yes | QHAMDS | ||
| 2 | 4 | 7 | Yes | QHAMDS | ||
| 2 | 4 | 8 | Yes | QHAMDS, equals in [16] | ||
| 2 | 8 | 5 | Yes | QHAMDS, beats in [16] | ||
| 2 | 8 | 6 | Yes | QHAMDS, equals in [16] | ||
| 2 | 8 | 7 | Yes | QHAMDS, beats in [16] | ||
| 2 | 8 | 8 | Yes | QHAMDS, beats in [16] | ||
| 3 | 8 | 3 | 3 | Yes | Beats in [39] | |
| 3 | 4 | 8 | 4 | Yes | Length not obtained with |
Table 4.
A sample of codes
| m | Quantum Code | Beats QGV | Comment | |||
|---|---|---|---|---|---|---|
| 1 | 6 | No | MDS | |||
| 1 | 12 | Yes | MDS | |||
| 1 | 12 | Yes | MDS | |||
| 2 | 6 | 5 | No | QHAMDS, beats in [8] | ||
| 2 | 6 | 6 | No | QHAMDS | ||
| 2 | 6 | 6 | No | Length not obtained with | ||
| 2 | 6 | 7 | Yes | QHAMDS | ||
| 2 | 6 | 13 | Yes | QHAMDS, beats in [8] | ||
| 2 | 6 | 13 | Yes | Beats in [43] | ||
| 2 | 6 | 16 | Yes | Same as in [43] | ||
| 2 | 6 | 19 | Yes | Length not obtained with | ||
| 2 | 6 | 22 | Yes | Beats in [55] | ||
| 2 | 12 | 24 | Yes | QHAMDS | ||
| 2 | 12 | 24 | Yes | Beats in [28] | ||
| 3 | 24 | 13 | 2 | Yes | Same as in [28] | |
| 3 | 24 | 24 | 2 | Yes | Length not obtained with |
Table 5.
A sample of codes
| m | Quantum Code | Beats QGV | Comment | |||
|---|---|---|---|---|---|---|
| 1 | 8 | No | MDS | |||
| 1 | 16 | Yes | MDS | |||
| 1 | 16 | Yes | MDS | |||
| 1 | 16 | Yes | MDS | |||
| 1 | 24 | Yes | MDS, same as [54] | |||
| 1 | 48 | Yes | MDS | |||
| 2 | 8 | 7 | No | QHAMDS | ||
| 2 | 8 | 8 | No | QHAMDS, beats in [38] | ||
| 2 | 8 | 8 | No | Length not obtained with | ||
| 2 | 8 | 8 | No | Beats in [38] | ||
| 2 | 8 | 9 | Yes | QHAMDS, beats in [43] | ||
| 2 | 8 | 9 | No | Beats in [43] | ||
| 2 | 8 | 15 | Yes | QHAMDS, beats in [8] | ||
| 2 | 8 | 21 | Yes | QHAMDS, beats in [8] | ||
| 2 | 8 | 21 | Yes | Beats in [8] | ||
| 2 | 8 | 25 | Yes | Same as in [43] | ||
| 2 | 8 | 48 | Yes | QHAMDS, same as in [14] | ||
| 2 | 8 | 48 | Yes | Same as in [14] | ||
| 2 | 8 | 48 | Yes | Same as in [14] | ||
| 2 | 16 | 27 | Yes | Beats in [28] | ||
| 3 | 16 | 48 | 2 | Yes | Length not obtained with |
Table 6.
A sample of codes
| m | Quantum Code | Beats QGV | Comment | |||
|---|---|---|---|---|---|---|
| 1 | 10 | No | MDS | |||
| 1 | 20 | Yes | MDS | |||
| 1 | 20 | Yes | MDS | |||
| 1 | 20 | Yes | MDS | |||
| 1 | 40 | Yes | MDS | |||
| 2 | 10 | 10 | Yes | Length not obtained with | ||
| 2 | 10 | 24 | Yes | Beats in [43] | ||
| 2 | 10 | 55 | Yes | Length not obtained with | ||
| 3 | 80 | 80 | 2 | Yes | Length not obtained with |
Table 7.
A sample of codes
The article [54] recently appeared on the arxiv and has a construction of MDS codes with lengths of the form where h is an even divisor of and (their Theorems 3, 4 and 5). This article does not provide an explicit twist vector (they prove the existence of it). Our construction has an explicit twist vector and (in the case) gives codes with the same parameters.
Hermitian almost MDS
The quantum singleton defect of a parameter set n, k, d is defined to be . MDS codes have quantum singleton defect 0, by definition. Codes with quantum Singleton defect 1 are called quantum almost MDS (QAMDS) codes. However, from the statement of Theorem 2.1, one can see that the quantum singleton defect of any code constructed using Theorem 2.1 must be even, and thus, a quantum singleton defect of 1 cannot be achieved. The smallest nonzero singleton defect of a code constructed using Theorem 2.1 is therefore 2. This motivates the following definition.
Definition 4.3
A quantum code constructed from Theorem 2.1 with parameters such that is called a quantum Hermitian almost MDS (QHAMDS) code.
In Theorem 4.2, we showed that we can construct quantum MDS codes. Recall that the quantum MDS conjecture [35] states that for a quantum MDS code with parameters and q odd. Now we are going to show that we can also construct quantum codes with that are at least QHAMDS. That is, they are either QHAMDS or MDS. If the quantum MDS conjecture is true, they cannot be MDS, and therefore they would have the best possible parameters.
Theorem 4.4
The stabilizer quantum codes obtained from Theorem 3.7 with , and are at least QHAMDS.
Proof
Let , and and be as defined in Theorem 3.7 such that . We have (see Fig. 2). The parameters of the stabilizer quantum code constructed from Theorem 3.7 are
It is easily verified that the above parameters provide a code which is at least QHAMDS. This is because .
Some examples will be given in Tables 3 to 7. In [16], the authors study ternary quantum codes of minimum distance three. In that paper (their Theorem 4.4), quantum codes with parameters are shown for certain lengths n. For those lengths which are a multiple of 4 and less than 64, we can improve the dimension by 1, using the codes in Theorem 4.4. See also Table 3.
When we can beat Gilbert–Varshamov bound
In this section, we include a proof that an infinite family of codes obtained from our constructions will beat the quantum Gilbert–Varshamov bound when . We remark that the codes with can also beat the Gilbert–Varshamov bound, some examples when are presented in Tables 3, 4 and 6.
Let us recall the quantum Gilbert–Varshamov bound whose proof can be found in [22]:
Theorem 5.1
(Quantum Gilbert–Varshamov Bound) Suppose that , , and . If
| 7 |
then there exists a pure stabilizer quantum code with parameters .
We say that a parameter set n, k, d, q beats the QGV bound if the inequality (7) is not satisfied.
In the case, we have the following statement, using the codes constructed in this paper. In this statement, we are using the formula (6).
Theorem 5.2
Given an odd prime power q, and given d in the range , let n be in the interval
and have the form where and . Then, there exists a quantum code with parameters
and this code beats the quantum Gilbert–Varshamov bound.
Proof
We use the codes whose existence is proved in Theorem 3.7 in the case . The upper bounds and follow from the construction in Theorem 3.7.
Let
and let
where (this dimension formula comes from (6) which uses our construction with ). We wish to prove that under the stated hypotheses. To prove this, we are going to let
and let
and we will prove three things: that , that , and that . This will complete the proof that .
To show that , we will use the estimate for binomial coefficients . Then
To prove that , rearranging the hypothesis
yields precisely that .
To prove that , we will use the fact that if then where is the r-th harmonic number defined by . Then,
It follows that
In this theorem, we assumed that because of the constant 0.7, which is a choice. The cases and can be proved separately. They could be included in the proof above but the constant 0.7 would have to be larger. Similarly, we could have stated the theorem for and the constant would be smaller, it would be 0.68. Then, the case would need to be handled separately. As d gets larger, the constant gets smaller and approaches the Euler–Mascheroni constant.
We show Table 1 where for each q between 7 and 17 and we give the range of values of n for which the quantum Gilbert–Varshamov bound is beaten, as given by Theorem 5.2.
Table 1.
Some instances of the range of lengths of codes (from Theorem 5.2 only) that beat the quantum Gilbert–Varshamov bound
| d | q | ||||
|---|---|---|---|---|---|
| 7 | 9 | 11 | 13 | 17 | |
| 5 | 742-2304 | 1438-6400 | 2450-14400 | 3818-28224 | 7800-82944 |
| 6 | 3848-6400 | 7022-14400 | 11600-28224 | 26006-82944 | |
| 7 | None | None | 72590-82944 | ||
A separate special analysis for each d, or using better estimates in the proof, or using a computer, will give a better range of values for n than the statement of Theorem 5.2. For example, when and , computer calculations show that the Gilbert–Varshamov bound is beaten by our codes as soon as , whereas the proof of Theorem 5.2 gives . As another example, when and , the range of values of n as given by the statement of Theorem 5.2 is empty (in the table we wrote ‘none’). However, there are in fact values of n that beat the Gilbert–Varshamov bound. We state one example in Table 7.
We also remark that Theorem 5.2 is for . A similar result will hold for .
In the previous theorem, we assumed that to obtain a slightly stronger statement. We will treat the case that (and ) separately, and we will complete the analysis in detail now. We omit the case, which is similar.
Suppose . By the formula (6) we have that has 3 elements, see also Fig. 2. The two sides of the Gilbert–Varshamov bound become
and
To beat the G–V bound, we obtain a condition which is a quadratic polynomial in n, namely we require that
Solving the quadratic yields that the G–V bound is beaten when
For the largest possible n is . Therefore, for each valid n which is a multiple of between and we obtain a code of that length that beats the G–V bound.
We show Table 2 where for each q and we state the range of values of n for which Gilbert–Varshamov bound is beaten.
Table 2.
Some instances of the range of lengths of codes from Theorem 3.7 with that beat the quantum Gilbert–Varshamov bound
| q | 3 | 5 | 7 | 9 | 11 |
|---|---|---|---|---|---|
| Range of lengths | 15-64 | 38-576 | 72-2304 | 117-6400 | 174-14400 |
In the case (details omitted), the polynomial in n would be cubic instead of quadratic.
Examples
Tables 3, 4, 5, 6, 7 show some samples of small values of the parameters of the quantum codes constructed with Theorem 3.7. For their minimum distance, we give the lower bound t provided by Theorem 3.7. We remind the reader of our notation: q is an odd prime power, can be any where is a divisor of , and and can take any value between 2 and .
Note that for codes constructed from Theorem 3.7 we must have when , and when .
Recall also codes with are called MDS codes and codes with are called QHAMDS codes. We also say in the sixth column if that code beats the quantum Gilbert–Varshamov bound in the sense explained before Theorem 5.2.
In order to compare different quantum codes one may use the length extension, subcode and smaller distance propagation rules, as stated in [44] for example. We therefore say that a quantum code beats a quantum code if at least one of the following holds:
and and (length extension)
and and (subcode)
and and . (smaller distance)
In other words, decreasing n, or increasing k, or increasing d, while keeping other parameters fixed, results in a better code. This is well known, see [44] for example, where the authors say that “...all other parameters being equal, we record the smallest n, the largest k, the largest d,...”.
In the tables below we give some examples of codes that result from our construction, and compare them to the best known codes in the literature. In some cases, we improve on the best known.
It is possible to have more than one improvement. For example, a code beats a code in two ways, because it has a smaller n and also has a larger k.
Finally, the article [54] recently appeared on the arxiv and has a construction of MDS codes with lengths of the form where h is an even divisor of and (their Theorems 3, 4 and 5). Some of the MDS codes appearing in our tables may also be obtained with their construction.
Acknowledgements
This publication has emanated from research conducted with the financial support of Science Foundation Ireland under Grant number 18/CRT/6049. For the purpose of Open Access, the author has applied a CC BY public copyright licence to any Author Accepted Manuscript version arising from this submission.
The second and third authors have been partially supported by MCIN/AEI/10.13039/501100011033 and by the “European Union NextGenerationEU/PRTR”, grants TED2021-130358B-I00 and PID2022-138906NB-C22, as well as by Universitat Jaume I, grants UJI-B2021-02, GACUJIMB/2023/03 and PREDOC/2020/39.
The third author would also like to acknowledge the funding received from the UCD School of Mathematics and Statistics.
Funding
Open Access funding provided by the IReL Consortium.
Data Availability
Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.
Declarations
Conflict of interest
We declare no conflicts of interest.
Footnotes
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Aly SA, Klappenecker A, Sarvepalli PK. On quantum and classical BCH codes. IEEE Trans. Inf. Theory. 2007;53(3):1183–1188. [Google Scholar]
- 2.Andersen HE, Geil O. Evaluation codes from order domain theory. Finite Fields their Appl. 2008;14(1):92–123. [Google Scholar]
- 3.Ashikhmin A, Barg A, Knill E, Litsyn S. Quantum error-detection I: Statement of the problem. IEEE Trans. Inf. Theory. 2000;46:778–788. [Google Scholar]
- 4.Ashikhmin A, Barg A, Knill E, Litsyn S. Quantum error-detection II: bounds. IEEE Trans. Inf. Theory. 2000;46:789–800. [Google Scholar]
- 5.Ashikhmin A, Knill E. Non-binary quantum stabilizer codes. IEEE Trans. Inf. Theory. 2001;47:3065–3072. [Google Scholar]
- 6.Ashikhmin A, Litsyn S, Tsfasman MA. Asymptotically good quantum codes. Phys. Rev. A. 2001;63(3):032311. [Google Scholar]
- 7.Ball S. Some constructions of quantum MDS codes. Des. Codes Cryptogr. 2021;89:811–821. [Google Scholar]
- 8.Bhardwaj, S., Goyal, M., Raka, M.: New quantum codes from constacyclic codes over a general non-chain ring. arXiv preprint arXiv:2212.02821, (2022)
- 9.Bierbrauer J, Edel Y. Quantum twisted codes. J. Comb. Designs. 2000;8:174–188. [Google Scholar]
- 10.Brooks M. Quantum computers: what are they good for? Nature. 2023;617:S1–S3. doi: 10.1038/d41586-023-01692-9. [DOI] [PubMed] [Google Scholar]
- 11.Calderbank AR, Rains EM, Shor PW, Sloane NJA. Quantum error correction and orthogonal geometry. Phys. Rev. Lett. 1997;76:405–409. [Google Scholar]
- 12.Calderbank AR, Rains EM, Shor PW, Sloane NJA. Quantum error correction via codes over IEEE Trans. Inf. Theory. 1998;44(4):1369–1387. [Google Scholar]
- 13.Camps E, López HH, Matthews GL, Sarmiento E. Polar decreasing monomial-Cartesian codes. IEEE Trans. Inf. Theory. 2021;67(6):3664–3674. [Google Scholar]
- 14.Cao M, Cui J. Construction of new quantum codes via Hermitian dual-containing matrix-product codes. Quantum Inf. Process. 2020;19:427. [Google Scholar]
- 15.Castelvecchi D. Quantum computers ready to leap out of the lab in 2017. Nature. 2017;541(7635):9–10. doi: 10.1038/541009a. [DOI] [PubMed] [Google Scholar]
- 16.Chen G, Li R. Ternary self-orthogonal codes of dual distance three and ternary quantum codes of distance three. Des. Codes Cryptogr. 2013;69:53–63. [Google Scholar]
- 17.Cox D, Little J, O’Shea D. An Introduction to Computational Algebraic Geometry and Commutative Algebra. In: Axler S, Ribet K, editors. Ideals, Varieties, and Algorithms, Undergraduate Texts in Mathematics. New York: Springer; 2007. [Google Scholar]
- 18.Dieks D. Communication by EPR devices. Phys. Rev. A. 1982;92:271. [Google Scholar]
- 19.Fang W, Fu FW. Some new constructions of quantum MDS codes. IEEE Trans. Inf. Theory. 2019;65:7840–7847. [Google Scholar]
- 20.Feng G-L, Rao TRN. Decoding algebraic-geometric codes up to the designed minimum distance. IEEE Trans. Inf. Theory. 1993;39(1):37–45. [Google Scholar]
- 21.Feng K. Quantum error correcting codes. In: Niederreiter H, editor. Coding Theory and Cryptology. Institute for Mathematical Sciences: National University of Singapore; 2002. pp. 91–142. [Google Scholar]
- 22.Feng K, Ma Z. A finite Gilbert-Varshamov bound for pure stabilizer quantum codes. IEEE Trans. Inf. Theory. 2004;50(12):3323–3325. [Google Scholar]
- 23.Fitzgerald J, Lax RF. Decoding Affine Variety Codes Using Gröbner Basis. Des. Codes Cryptogr. 1998;13:147–158. [Google Scholar]
- 24.Galindo C, Geil O, Hernando F, Ruano D. On the distance of stabilizer quantum codes from -affine variety codes. Quantum Inf Process. 2017;164:111. [Google Scholar]
- 25.Galindo C, Geil O, Hernando F, Ruano D. Improved constructions of nested code pairs. IEEE Trans. Inf. Theory. 2018;64(4):2444–2459. [Google Scholar]
- 26.Galindo, C., Hernando, F., Martín-Cruz, H.: Optimal -LRCs from monomial-Cartesian codes and their subfield-subcodes. arXiv preprint arXiv:2205.01485, (2023)
- 27.Galindo C , Hernando F, Martín-Cruz H, Ruano D. Stabilizer quantum codes defined by trace-depending polynomials. Finite Fields their Appl. 2023;87:102138. [Google Scholar]
- 28.Galindo C, Hernando F, Ruano D. New quantum codes from evaluation and matrix-product codes. Finite Fields their Appl. 2015;36:98–120. [Google Scholar]
- 29.Geil O, Hoholdt T. Footprints or generalized Bezout’s theorem. IEEE Trans. Inf. Theory. 2000;46(2):635–641. [Google Scholar]
- 30.Geil, O., Høholdt, T.: On hyperbolic codes. In: Boztas, S., Shparlinski, I.E. (eds.) Applied Algebra. Algebraic Algorithms and Error-Correcting Codes, volume 2227 of Lecture Notes in Computer Science, pp. 159–171. Springer, Berlin, Germany (2001)
- 31.Gottesman D. Class of quantum error-correcting codes saturating the quantum Hamming bound. Phys. Rev. A. 1996;54(3):1862–1868. doi: 10.1103/physreva.54.1862. [DOI] [PubMed] [Google Scholar]
- 32.Grassl M, Beth T, Rötteler M. On optimal quantum codes. Int. J. Quantum Inf. 2004;2(1):55–64. [Google Scholar]
- 33.Grassl, M., Rötteler, M.: Quantum BCH codes. In Proc. X Int. Symp. Theor. Elec. Eng., pages 207–212, (1999)
- 34.Høholdt T, van Lint JH, Pellikaan GR. Algebraic geometry codes. In: Pless VS, Huffman WC, editors. Handbook of Coding Theory. Netherlands: Elsevier; 1998. pp. 871–961. [Google Scholar]
- 35.Ketkar A, Klappenecker A, Kumar S, Sarvepalli PK. Nonbinary stabilizer codes over finite fields. IEEE Trans. Inf. Theory. 2006;52(11):4892–4914. [Google Scholar]
- 36.Klappenecker A, Rötteler M. Beyond stabilizer codes I: nice error bases. IEEE Trans. Inf. Theory. 2002;48(8):2392–2395. [Google Scholar]
- 37.Knill, E.: Non-Binary Unitary Error Bases and Quantum Codes. Technical report, Los Alamos National Laboratory, LAUR-96-2717, (1996)
- 38.Kolotoğlu E, Sarı M. Quantum codes with improved minimum distance. Bull. Korean Math. Soc. 2019;56(3):609–619. [Google Scholar]
- 39.Kong, B., Zheng, X.: Quantum codes from constacyclic codes over . EPJ Quantum Technol., 10(3), (2023)
- 40.La Guardia GG . Construction of new families of nonbinary quantum codes. Phys. Rev. A. 2009;80:042331. [Google Scholar]
- 41.La Guardia GG. On the construction of nonbinary quantum BCH codes. IEEE Trans. Inf. Theory. 2014;60(3):1528–1535. [Google Scholar]
- 42.Liu H, Liu X. Constructions of quantum MDS codes. Quantum Inf. Process. 2021;20(14):1–3. [Google Scholar]
- 43.Liu X, Dinh HQ, Liu H, Yu L. On new quantum codes from matrix product codes. Cryptogr. Commun. 2018;10:579–589. [Google Scholar]
- 44.Luo G, Ezerman MF, Grassl M, Ling S. Constructing quantum error-correcting codes that require a variable amount of entanglement. Quantum Inf. Process. 2024;23:4. [Google Scholar]
- 45.López HH, Matthews GL, Soprunov I. Monomial-Cartesian codes and their duals, with applications to LCD codes, quantum codes, and locally recoverable codes. Des. Codes Cryptogr. 2020;88:1673–1685. [Google Scholar]
- 46.López HH, Soprunov I, Villarreal RH. The dual of an evaluation code. Des. Codes Cryptogr. 2021;89:1367–1403. [Google Scholar]
- 47.Matsumoto R, Uyematsu T. Constructing quantum error-correcting codes for -state systems from classical error-correcting codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2000;83(10):1878–1883. [Google Scholar]
- 48.Rains EM. Quantum weight enumerators. IEEE Trans. Inf. Theory. 1998;44(4):1388–1394. [Google Scholar]
- 49.Shor PW. Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A. 1995;52(4):2493–2496. doi: 10.1103/physreva.52.r2493. [DOI] [PubMed] [Google Scholar]
- 50.Shor PW. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 1997;26(5):1484–1509. [Google Scholar]
- 51.Song H, Li R, Liu Y, Guo G. New quantum codes from matrix-product codes over small fields. Quantum Inf. Process. 2020;19(226):1–22. [Google Scholar]
- 52.Steane A. Multiple-particle interference and quantum error correction. Proc. R. Soc. Lond. A. 1996;452:2551–2577. [Google Scholar]
- 53.Steane AM. Simple quantum error-correcting codes. Phys. Rev. A. 1996;54(6):4741–4751. doi: 10.1103/physreva.54.4741. [DOI] [PubMed] [Google Scholar]
- 54.Wan, R., Zhu, S.: New Quantum MDS codes from Hermitian self-orthogonal generalized Reed-Solomon codes. arXiv preprint arXiv:2302.06169, (2023)
- 55.Wang Y, Kai X, Sun Z, Zhu S. Quantum codes from Hermitian dual-containing constacyclic codes over . Quantum Inf. Process. 2021;20(122):1–17. [Google Scholar]
- 56.Wootters WK, Zurek WH. A single quantum cannot be cloned. Nature. 1982;299:802–803. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.

