-
Codes approaching the Shannon limit with polynomial complexity per information bit
Abstract: We consider codes for channels with extreme noise that emerge in various low-power applications. Simple LDPC-type codes with parity checks of weight 3 are first studied for any dimension $m\rightarrow\infty.$ These codes form modulation schemes: they improve the original channel output for any $SNR>$ $-6$ dB (per information bit) and gain $3$ dB over uncoded modulation as $SNR$ grows. However, the… ▽ More
Submitted 25 January, 2021; originally announced January 2021.
Comments: 18 pages, 3 figures
-
Duality and free energy analyticity bounds for few-body Ising models with extensive homology rank
Abstract: We consider pairs of few-body Ising models where each spin enters a bounded number of interaction terms (bonds), such that each model can be obtained from the dual of the other after freezing $k$ spins on large-degree sites. Such a pair of Ising models can be interpreted as a two-chain complex with $k$ being the rank of the first homology group. Our focus is on the case where $k$ is extensive, tha… ▽ More
Submitted 8 May, 2018; v1 submitted 2 May, 2018; originally announced May 2018.
Comments: 18 pages, 6 figures
-
Numerical and analytical bounds on threshold error rates for hypergraph-product codes
Abstract: We study analytically and numerically decoding properties of finite rate hypergraph-product quantum LDPC codes obtained from random (3,4)-regular Gallager codes, with a simple model of independent X and Z errors. Several non-trival lower and upper bounds for the decodable region are constructed analytically by analyzing the properties of the homological difference, equal minus the logarithm of the… ▽ More
Submitted 13 June, 2018; v1 submitted 5 April, 2018; originally announced April 2018.
Comments: 14 pages, 5 figures
Journal ref: Phys. Rev. A 97, 062320 (2018)
-
An elementary description of polarization process
Abstract: We analyze successive cancellation (SC) decoder by using two random functions. The first function is related to the likelihoods of 0 and 1 in each code position, while the second gives the difference between their posterior probabilities. We then study the second power moments of both functions. We show that these moments are being squared in channel transformations, while their product tends to 0… ▽ More
Submitted 23 May, 2020; v1 submitted 21 June, 2017; originally announced June 2017.
Comments: The paper employs wrong equation (14) in Section 5. This equation is then used in Sections 6 and 7. In particular, Theorem 1 of Section 6 contains incorrect proof
-
arXiv:1703.05307 [pdf, ps, other]
On decoding algorithms for polar codes
Abstract: We survey the known list decoding algorithms for polar codes and compare their complexity. Index terms: Polar codes; Reed-Muller codes; successive cancellation decoding.
Submitted 17 March, 2017; v1 submitted 14 March, 2017; originally announced March 2017.
Comments: 4 pages, 2 figures
-
arXiv:1703.05306 [pdf, ps, other]
Recursive Decoding and Its Performance for Low-Rate Reed-Muller Codes
Abstract: Recursive decoding techniques are considered for Reed-Muller (RM) codes of growing length $n$ and fixed order $r.$ An algorithm is designed that has complexity of order $n\log n$ and corrects most error patterns of weight up to $n(1/2-\varepsilon)$ given that $\varepsilon$ exceeds $n^{-1/2^{r}}.$ This improves the asymptotic bounds known for decoding RM codes with nonexponential complexity.
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: IEEE Trans. Info. Theory, vol. 50, pp. 811-823, 2004
-
arXiv:1703.05305 [pdf, ps, other]
Soft decision decoding of Reed-Muller codes: recursive lists
Abstract: Recursive list decoding is considered for Reed-Muller (RM) codes. The algorithm repeatedly relegates itself to the shorter RM codes by recalculating the posterior probabilities of their symbols. Intermediate decodings are only performed when these recalculations reach the trivial RM codes. In turn, the updated lists of most plausible codewords are used in subsequent decodings. The algorithm is fur… ▽ More
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: IEEE Trans. Info. Theory, vol. 52, no. 3, pp. 1260-1266, 2006
-
Recursive List Decoding for Reed-Muller Codes
Abstract: We consider recursive decoding for Reed-Muller (RM) codes and their subcodes. Two new recursive techniques are described. We analyze asymptotic properties of these algorithms and show that they substantially outperform other decoding algorithms with nonexponential complexity known for RM codes. Decoding performance is further enhanced by using intermediate code lists and permutation procedures. Fo… ▽ More
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: "Information, Coding and Mathematics", ed. M. Blaum, P. Farrell, and H.C.A. van Tilborg, Kluwer, Boston, 2002, pp. 279-298
-
arXiv:1703.05303 [pdf, ps, other]
Recursive decoding of Reed-Muller codes
Abstract: New soft- and hard decision decoding algorithms are presented for general Reed-Muller codes $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ of length $2^{m}$ and distance $2^{m-r}$. We use Plotkin $(u,u+v)$ construction and decompose code $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ onto subblocks $u\in\left\{\genfrac{}{}{0pt}{}{m-1}{r}\right\} $ and… ▽ More
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: Proc. 37th Allerton Conf. on Commun., Control, and Computing, Monticello, IL, USA, 1999, pp. 61-69
-
arXiv:1703.05302 [pdf, ps, other]
Recursive constructions and their maximum likelihood decoding
Abstract: We consider recursive decoding techniques for RM codes, their subcodes, and newly designed codes. For moderate lengths up to 512, we obtain near-optimum decoding with feasible complexity.
Submitted 14 March, 2017; originally announced March 2017.
Journal ref: Proc. 38th Allerton Conf. Communication, Control, and Computing, Monticello, IL, USA, 2000, pp. 71-80
-
arXiv:1702.04886 [pdf, ps, other]
Polar codes with a stepped boundary
Abstract: We consider explicit polar constructions of blocklength $n\rightarrow\infty$ for the two extreme cases of code rates $R\rightarrow1$ and $R\rightarrow0.$ For code rates $R\rightarrow1,$ we design codes with complexity order of $n\log n$ in code construction, encoding, and decoding. These codes achieve the vanishing output bit error rates on the binary symmetric channels with any transition error p… ▽ More
Submitted 16 February, 2017; originally announced February 2017.
Comments: This article has been submitted to ISIT 2017
-
Distance verification for classical and quantum LDPC codes
Abstract: The techniques of distance verification known for general linear codes are re-applied to quantum stabilizer codes. Then distance verification is addressed for classical and quantum LDPC codes. New complexity bounds for distance verification with provable performance are derived using the average weight spectra of the ensembles of LDPC codes. These bounds are expressed in terms of the erasure-corre… ▽ More
Submitted 22 November, 2016; originally announced November 2016.
Comments: 16 pages, 2 figures
-
Distance verification for LDPC codes
Abstract: The problem of finding code distance has been long studied for the generic ensembles of linear codes and led to several algorithms that substantially reduce exponential complexity of this task. However, no asymptotic complexity bounds are known for distance verification in other ensembles of linear codes. Our goal is to re-design the existing generic algorithms of distance verification and derive… ▽ More
Submitted 8 May, 2016; originally announced May 2016.
Comments: 5 pages, 1 figure, to appear in Proceedings of ISIT 2016 - IEEE International Symposium on Information Theory, Barcelona
-
Thresholds for correcting errors, erasures, and faulty syndrome measurements in degenerate quantum codes
Abstract: We suggest a technique for constructing lower (existence) bounds for the fault-tolerant threshold to scalable quantum computation applicable to degenerate quantum codes with sublinear distance scaling. We give explicit analytic expressions combining probabilities of erasures, depolarizing errors, and phenomenological syndrome measurement errors for quantum LDPC codes with logarithmic or larger dis… ▽ More
Submitted 18 December, 2014; originally announced December 2014.
Comments: 10 pages, 2 figures
Journal ref: Phys. Rev. Lett. 115, 050502 (2015)
-
Numerical Techniques for Finding the Distances of Quantum Codes
Abstract: We survey the existing techniques for calculating code distances of classical codes and apply these techniques to generic quantum codes. For classical and quantum LDPC codes, we also present a new linked-cluster technique. It reduces complexity exponent of all existing deterministic techniques designed for codes with small relative distances (which include all known families of quantum LDPC codes)… ▽ More
Submitted 2 May, 2014; originally announced May 2014.
Comments: 5 pages, 1 figure, to appear in Proceedings of ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu
-
Linked-Cluster Technique for Finding the Distance of a Quantum LDPC Code
Abstract: We present a linked-cluster technique for calculating the distance of a quantum LDPC code. It offers an advantage over existing deterministic techniques for codes with small relative distances (which includes all known families of quantum LDPC codes), and over the probabilistic technique for codes with sufficiently high rates.
Submitted 7 February, 2013; originally announced February 2013.
Comments: 5.5 pages
-
arXiv:1108.5490 [pdf, ps, other]
Low-complexity quantum codes designed via codeword-stabilized framework
Abstract: We consider design of the quantum stabilizer codes via a two-step, low-complexity approach based on the framework of codeword-stabilized (CWS) codes. In this framework, each quantum CWS code can be specified by a graph and a binary code. For codes that can be obtained from a given graph, we give several upper bounds on the distance of a generic (additive or non-additive) CWS code, and the lower Gi… ▽ More
Submitted 27 August, 2011; originally announced August 2011.
Comments: 12 pages, 3 figures, 1 table
Journal ref: Phys. Rev. A 84, 062319 (2011)
-
arXiv:0912.3245 [pdf, ps, other]
Structured Error Recovery for Codeword-Stabilized Quantum Codes
Abstract: Codeword stabilized (CWS) codes are, in general, non-additive quantum codes that can correct errors by an exhaustive search of different error patterns, similar to the way that we decode classical non-linear codes. For an n-qubit quantum code correcting errors on up to t qubits, this brute-force approach consecutively tests different errors of weight t or less, and employs a separate n-qubit meas… ▽ More
Submitted 8 March, 2010; v1 submitted 16 December, 2009; originally announced December 2009.
Comments: 13 pages, 9 eps figures
Journal ref: Phys. Rev. A 81, 052337 (2010)
-
arXiv:0907.2038 [pdf, ps, other]
Clustered Error Correction of Codeword-Stabilized Quantum Codes
Abstract: Codeword stabilized (CWS) codes are a general class of quantum codes that includes stabilizer codes and many families of non-additive codes with good parameters. For such a non-additive code correcting all t-qubit errors, we propose an algorithm that employs a single measurement to test all errors located on a given set of t qubits. Compared with exhaustive error screening, this reduces the tota… ▽ More
Submitted 8 March, 2010; v1 submitted 12 July, 2009; originally announced July 2009.
Comments: 4 pages, 2 figures, revtex4; number of editorial changes in v4
-
arXiv:cs/0612073 [pdf, ps, other]
On the Fingerprinting Capacity Under the Marking Assumption
Abstract: We address the maximum attainable rate of fingerprinting codes under the marking assumption, studying lower and upper bounds on the value of the rate for various sizes of the attacker coalition. Lower bounds are obtained by considering typical coalitions, which represents a new idea in the area of fingerprinting and enables us to improve the previously known lower bounds for coalitions of size t… ▽ More
Submitted 20 February, 2008; v1 submitted 14 December, 2006; originally announced December 2006.
Comments: final version, 12 pages, 2 figures, to appear in IEEE Trans. on Inform. Theory - Special Issue on Information-theoretic Security, Jun 2008, simplified proofs in Sections II and III, changes in Theorem 4.1
-
arXiv:math/0606002 [pdf, ps, other]
Covering spheres with spheres
Abstract: Given a sphere of any radius $r$ in an $n$-dimensional Euclidean space, we study the coverings of this sphere with solid spheres of radius one. Our goal is to design a covering of the lowest covering density, which defines the average number of solid spheres covering a point in a bigger sphere. For a growing dimension $n,$ we design a covering that has covering density of order $(n\ln n)/2$ for th… ▽ More
Submitted 20 May, 2018; v1 submitted 31 May, 2006; originally announced June 2006.
Comments: 11 pages, 1 figure
Journal ref: Discrete Computational Geometry, vol. 38, pp. 665--679, 2007
-
Non-Holonomic Control IV : Coherence Protection in a Rubidium isotope
Abstract: In this paper, we present a realistic application of the coherence protection method proposed in the previous article. A qubit of information encoded on the two spin states of a Rubidium isotope is protected from the action of electric and magnetic fields.
Submitted 16 July, 2005; originally announced July 2005.
-
Non-Holonomic Control III : Coherence Protection by the Quantum Zeno Effect and Non-Holonomic Control
Abstract: In this paper, we present a coherence protection method based upon a multidimensional generalization of the Quantum Zeno Effect, as well as ideas from the coding theory. The non-holonomic control technique is employed as a physical tool which allows its effective implementation. The two limiting cases of small and large quantum systems are considered.
Submitted 16 July, 2005; originally announced July 2005.
-
Non-holonomic Control II : Non-holonomic Quantum Devices
Abstract: In this paper, we show how the non-holonomic control technique can be employed to build completely controlled quantum devices. Examples of such controlled structures are provided.
Submitted 16 July, 2005; originally announced July 2005.
-
Non-Holonomic Control I
Abstract: In this paper, we present a universal control technique, the non-holonomic control, which allows us to impose any arbitrarily prescribed unitary evolution to any quantum system through the alternate application of two well-chosen perturbations.
Submitted 16 July, 2005; originally announced July 2005.
-
arXiv:cs/0406039 [pdf, ps, other]
Long Nonbinary Codes Exceeding the Gilbert - Varshamov Bound for any Fixed Distance
Abstract: Let A(q,n,d) denote the maximum size of a q-ary code of length n and distance d. We study the minimum asymptotic redundancy ρ(q,n,d)=n-log_q A(q,n,d) as n grows while q and d are fixed. For any d and q<=d-1, long algebraic codes are designed that improve on the BCH codes and have the lowest asymptotic redundancy ρ(q,n,d) <= ((d-3)+1/(d-2)) log_q n known to date. Prior to this work, codes of fixe… ▽ More
Submitted 23 June, 2004; v1 submitted 21 June, 2004; originally announced June 2004.
Comments: Submitted to IEEE Trans. on Info. Theory
-
Coherence protection by the quantum Zeno effect and non-holonomic control in a Rydberg Rubidium isotope
Abstract: The protection of the coherence of open quantum systems against the influence of their environment is a very topical issue. A scheme is proposed here which protects a general quantum system from the action of a set of arbitrary uncontrolled unitary evolutions. This method draws its inspiration from ideas of standard error-correction (ancilla adding, coding and decoding) and the Quantum Zeno Effe… ▽ More
Submitted 3 October, 2005; v1 submitted 30 March, 2004; originally announced March 2004.
Comments: 17 pages, 6 figures
Journal ref: Phys. Rev. A 71, 052311 (2005)
-
Decoherence Correction by the Zeno Effect and Non-Holonomic Control
Abstract: We show that multidimensional Zeno effect combined with non-holonomic control allows to efficiently protect quantum systems from decoherence by a method similar to classical coding. Contrary to the conventional approach, our method is applicable to arbitrary error-inducing Hamiltonians and general quantum systems. We also propose algorithms of finding encoding that approaches the Hamming upper b… ▽ More
Submitted 31 October, 2002; originally announced November 2002.
Comments: 4 revtex pages
Journal ref: Europhys. Lett. 66, 157 (2004); J. Opt. B: Quantum Semiclass. Opt. 7, S353 (2005)