Some good quantum error-correcting codes from algebraic-geometric codes

2001 ◽  
Vol 47 (5) ◽  
pp. 2059-2061 ◽  
Author(s):  
Hao Chen
2021 ◽  
pp. 55-74
Author(s):  
V. M. Deundyak ◽  
◽  
D. V. Zagumennov ◽  
◽  

Broadcast encryption is a data distribution protocol which can prevent malefactor parties from unauthorized accessing or copying the distributed data. It is widely used in distributed storage and network data protection schemes. To block the socalled coalition attacks on the protocol, classes of error-correcting codes with special properties are used, namely c-FP and c-TA properties. We study the problem of evaluating the lower and the upper boundaries on coalition power, within which the algebraic geometry codes possess these properties. Earlier, these boundaries were calculated for single-point algebraic-geometric codes on curves of the general form. Now, we clarified these boundaries for single-point codes on curves of a special form; in particular, for codes on curves on which there are many equivalence classes after factorization by equality of the corresponding points coordinates relation.


2020 ◽  
Vol 27 (1) ◽  
pp. 22-38
Author(s):  
Vladimir M. Deundyak ◽  
Denis V. Zagumennov

Traceability schemes which are applied to the broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme a distributor broadcasts the encrypted data and gives each authorized user unique key and identifying word from selected error-correcting code for decrypting. The following attack is possible in these schemes: groups of c malicious users are joining into coalitions and gaining illegal access to the data by combining their keys and identifying codewords to obtain pirate key and codeword. To prevent this attacks, classes of error-correcting codes with special c-FP and c-TA properties are used. In particular, c -FP codes are codes that make direct compromise of scrupulous users impossible and c -TA codes are codes that make it possible to identify one of the a‹ackers. We are considering the problem of evaluating the lower and the upper boundaries on c, within which the L-construction algebraic geometric codes have the corresponding properties. In the case of codes on an arbitrary curve the lower bound for the c-TA property was obtained earlier; in this paper, the lower bound for the c-FP property was constructed. In the case of curves with one infinite point, the upper bounds for the value of c are obtained for both c-FP and c-TA properties. During our work, we have proved an auxiliary lemma and the proof contains an explicit way to build a coalition and a pirate identifying vector. Methods and principles presented in the lemma can be important for analyzing broadcast encryption schemes robustness. Also, the c-FP and c-TA boundaries monotonicity by subcodes are proved.


2008 ◽  
Vol 25 (4) ◽  
pp. 519-522
Author(s):  
Yongjun Du ◽  
Yuefei Ma

2021 ◽  
Vol 103 (6) ◽  
Author(s):  
Stefanie J. Beale ◽  
Joel J. Wallman

2014 ◽  
Vol 28 (06) ◽  
pp. 1450017 ◽  
Author(s):  
RUIHU LI ◽  
GEN XU ◽  
LUOBIN GUO

In this paper, we discuss two problems on asymmetric quantum error-correcting codes (AQECCs). The first one is on the construction of a [[12, 1, 5/3]]2 asymmetric quantum code, we show an impure [[12, 1, 5/3 ]]2 exists. The second one is on the construction of AQECCs from binary cyclic codes, we construct many families of new asymmetric quantum codes with dz> δ max +1 from binary primitive cyclic codes of length n = 2m-1, where δ max = 2⌈m/2⌉-1 is the maximal designed distance of dual containing narrow sense BCH code of length n = 2m-1. A number of known codes are special cases of the codes given here. Some of these AQECCs have parameters better than the ones available in the literature.


Author(s):  
Axel Dahlberg ◽  
Stephanie Wehner

Stabilizer states form an important class of states in quantum information, and are of central importance in quantum error correction. Here, we provide an algorithm for deciding whether one stabilizer (target) state can be obtained from another stabilizer (source) state by single-qubit Clifford operations (LC), single-qubit Pauli measurements (LPM) and classical communication (CC) between sites holding the individual qubits. What is more, we provide a recipe to obtain the sequence of LC+LPM+CC operations which prepare the desired target state from the source state, and show how these operations can be applied in parallel to reach the target state in constant time. Our algorithm has applications in quantum networks, quantum computing, and can also serve as a design tool—for example, to find transformations between quantum error correcting codes. We provide a software implementation of our algorithm that makes this tool easier to apply. A key insight leading to our algorithm is to show that the problem is equivalent to one in graph theory, which is to decide whether some graph G ′ is a vertex-minor of another graph G . The vertex-minor problem is, in general, -Complete, but can be solved efficiently on graphs which are not too complex. A measure of the complexity of a graph is the rank-width which equals the Schmidt-rank width of a subclass of stabilizer states called graph states, and thus intuitively is a measure of entanglement. Here, we show that the vertex-minor problem can be solved in time O (| G | 3 ), where | G | is the size of the graph G , whenever the rank-width of G and the size of G ′ are bounded. Our algorithm is based on techniques by Courcelle for solving fixed parameter tractable problems, where here the relevant fixed parameter is the rank width. The second half of this paper serves as an accessible but far from exhausting introduction to these concepts, that could be useful for many other problems in quantum information. This article is part of a discussion meeting issue ‘Foundations of quantum mechanics and their impact on contemporary society’.


1997 ◽  
Vol 55 (2) ◽  
pp. 900-911 ◽  
Author(s):  
Emanuel Knill ◽  
Raymond Laflamme

Sign in / Sign up

Export Citation Format

Share Document