-
Generalizations and Extensions to Lifting Constructions for Coded Caching
Authors:
V. R. Aravind,
Pradeep Kiran Sarvepalli,
Andrew Thangaraj
Abstract:
Coded caching is a technique for achieving increased throughput in cached networks during peak hours. Placement delivery arrays (PDAs) capture both placement and delivery scheme requirements in coded caching in a single array. Lifting is a method of constructing PDAs, where entries in a small base PDA are replaced with constituent PDAs that satisfy a property called Blackburn-compatibility. We pro…
▽ More
Coded caching is a technique for achieving increased throughput in cached networks during peak hours. Placement delivery arrays (PDAs) capture both placement and delivery scheme requirements in coded caching in a single array. Lifting is a method of constructing PDAs, where entries in a small base PDA are replaced with constituent PDAs that satisfy a property called Blackburn-compatibility. We propose two new constructions for Blackburn-compatible PDAs including a novel method for lifting Blackburn-compatible PDAs to obtain new sets of Blackburn-compatible PDAs. Both of these constructions improve upon previous tradeoffs between rate, memory and subpacketization. We generalize lifting constructions by defining partial Blackburn-compatibility between two PDAs w.r.t. a third PDA. This is a wider notion of Blackburn-compatibility making the original definition a special case. We show that some popular coded caching schemes can be defined as lifting constructions in terms of this extended notion.
△ Less
Submitted 10 May, 2023;
originally announced May 2023.
-
Concatenating Extended CSS Codes for Communication Efficient Quantum Secret Sharing
Authors:
Kaushik Senthoor,
Pradeep Kiran Sarvepalli
Abstract:
Recently, a class of quantum secret sharing schemes called communication efficient quantum threshold secret sharing schemes (CE-QTS) was introduced. These schemes reduced the communication cost during secret recovery. In this paper, we introduce a general class of communication efficient quantum secret sharing schemes (CE-QSS) which include both threshold and non-threshold schemes. We propose a fr…
▽ More
Recently, a class of quantum secret sharing schemes called communication efficient quantum threshold secret sharing schemes (CE-QTS) was introduced. These schemes reduced the communication cost during secret recovery. In this paper, we introduce a general class of communication efficient quantum secret sharing schemes (CE-QSS) which include both threshold and non-threshold schemes. We propose a framework for constructing CE-QSS schemes to generalize the earlier construction of CE-QTS schemes which was based on the staircase codes. The main component in this framework is a class of quantum codes which we call the extended Calderbank-Shor-Steane codes. These extended CSS codes could have other applications. We derive a bound on communication cost for CE-QSS schemes. Finally, we provide a construction of CE-QSS schemes meeting this bound using the proposed framework.
△ Less
Submitted 13 November, 2022;
originally announced November 2022.
-
Theory of Communication Efficient Quantum Secret Sharing
Authors:
Kaushik Senthoor,
Pradeep Kiran Sarvepalli
Abstract:
A $((k,n))$ quantum threshold secret sharing (QTS) scheme is a quantum cryptographic protocol for sharing a quantum secret among $n$ parties such that the secret can be recovered by any $k$ or more parties while $k-1$ or fewer parties have no information about the secret. Despite extensive research on these schemes, there has been very little study on optimizing the quantum communication cost duri…
▽ More
A $((k,n))$ quantum threshold secret sharing (QTS) scheme is a quantum cryptographic protocol for sharing a quantum secret among $n$ parties such that the secret can be recovered by any $k$ or more parties while $k-1$ or fewer parties have no information about the secret. Despite extensive research on these schemes, there has been very little study on optimizing the quantum communication cost during recovery. Recently, we initiated the study of communication efficient quantum threshold secret sharing (CE-QTS) schemes. These schemes reduce the communication complexity in QTS schemes by accessing $d\geq k$ parties for recovery; here $d$ is fixed ahead of encoding the secret. In contrast to the standard QTS schemes which require $k$ qudits for recovering each qudit in the secret, these schemes have a lower communication cost of $\frac{d}{d-k+1}$ for $d>k$. In this paper, we further develop the theory of communication efficient quantum threshold schemes. Here, we propose universal CE-QTS schemes which reduce the communication cost for all $d\geq k$ simultaneously. We provide a framework based on ramp quantum secret sharing to construct CE-QTS and universal CE-QTS schemes. We give another construction for universal CE-QTS schemes based on Staircase codes. We derived a lower bound on communication complexity and show that our constructions are optimal. Finally, an information theoretic model is developed to analyse CE-QTS schemes and the lower bound on communication complexity is proved again using this model.
△ Less
Submitted 30 May, 2023; v1 submitted 29 January, 2021;
originally announced January 2021.
-
Lifting Constructions of PDAs for Coded Caching with Linear Subpacketization
Authors:
V R Aravind,
Pradeep Kiran Sarvepalli,
Andrew Thangaraj
Abstract:
Coded caching is a technique where multicasting and coding opportunities are utilized to achieve better rate-memory tradeoff in cached networks. A crucial parameter in coded caching is subpacketization, which is the number of parts a file is to be split into for coding purposes. The original Maddah-Ali-Niesen scheme has order-optimal rate at a subpacketization growing exponentially with the number…
▽ More
Coded caching is a technique where multicasting and coding opportunities are utilized to achieve better rate-memory tradeoff in cached networks. A crucial parameter in coded caching is subpacketization, which is the number of parts a file is to be split into for coding purposes. The original Maddah-Ali-Niesen scheme has order-optimal rate at a subpacketization growing exponentially with the number of users. In contrast, placement and delivery schemes in coded caching, designed using placement delivery arrays (PDAs), can have linear subpacketization with a penalty in rate. In this work, we propose several constructions of efficient PDAs through lifting, where a base PDA is expanded by replacing each entry by another PDA. By proposing and using the notion of Blackburn-compatibility of PDAs, we provide multiple lifting constructions with increasing coding gains. We compare the constructed coded caching schemes with other existing schemes for moderately high number of users and show that the proposed constructions are versatile and achieve a good rate-memory tradeoff at low subpacketizations.
△ Less
Submitted 5 April, 2022; v1 submitted 15 July, 2020;
originally announced July 2020.
-
Quantum Bicyclic Hyperbolic Codes
Authors:
Sankara Sai Chaithanya Rayudu,
Pradeep Kiran Sarvepalli
Abstract:
Bicyclic codes are a generalization of the one dimensional (1D) cyclic codes to two dimensions (2D). Similar to the 1D case, in some cases, 2D cyclic codes can also be constructed to guarantee a specified minimum distance. Many aspects of these codes are yet unexplored. Motivated by the problem of constructing quantum codes, in this paper, we study some structural properties of certain bicyclic co…
▽ More
Bicyclic codes are a generalization of the one dimensional (1D) cyclic codes to two dimensions (2D). Similar to the 1D case, in some cases, 2D cyclic codes can also be constructed to guarantee a specified minimum distance. Many aspects of these codes are yet unexplored. Motivated by the problem of constructing quantum codes, in this paper, we study some structural properties of certain bicyclic codes. We show that a primitive narrow-sense bicyclic hyperbolic code of length $n^2$ contains its dual if and only if its design distance is lower than $n-Δ$, where $Δ=\mathcal{O}(\sqrt{n})$. We extend the sufficiency condition to the non-primitive case as well. We also show that over quadratic extension fields, a primitive bicyclic hyperbolic code of length $n^2$ contains Hermitian dual if and only if its design distance is lower than $n-Δ_h$, where $Δ_h=\mathcal{O}(\sqrt{n})$. Our results are analogous to some structural results known for BCH and Reed-Solomon codes. They further our understanding of bicyclic codes. We also give an application of these results by showing that we can construct two classes of quantum bicyclic codes based on our results.
△ Less
Submitted 25 September, 2019;
originally announced September 2019.
-
Neural Decoder for Topological Codes using Pseudo-Inverse of Parity Check Matrix
Authors:
Chaitanya Chinni,
Abhishek Kulkarni,
Dheeraj M. Pai,
Kaushik Mitra,
Pradeep Kiran Sarvepalli
Abstract:
Recent developments in the field of deep learning have motivated many researchers to apply these methods to problems in quantum information. Torlai and Melko first proposed a decoder for surface codes based on neural networks. Since then, many other researchers have applied neural networks to study a variety of problems in the context of decoding. An important development in this regard was due to…
▽ More
Recent developments in the field of deep learning have motivated many researchers to apply these methods to problems in quantum information. Torlai and Melko first proposed a decoder for surface codes based on neural networks. Since then, many other researchers have applied neural networks to study a variety of problems in the context of decoding. An important development in this regard was due to Varsamopoulos et al. who proposed a two-step decoder using neural networks. Subsequent work of Maskara et al. used the same concept for decoding for various noise models. We propose a similar two-step neural decoder using inverse parity-check matrix for topological color codes. We show that it outperforms the state-of-the-art performance of non-neural decoders for independent Pauli errors noise model on a 2D hexagonal color code. Our final decoder is independent of the noise model and achieves a threshold of $10 \%$. Our result is comparable to the recent work on neural decoder for quantum error correction by Maskara et al.. It appears that our decoder has significant advantages with respect to training cost and complexity of the network for higher lengths when compared to that of Maskara et al.. Our proposed method can also be extended to arbitrary dimension and other stabilizer codes.
△ Less
Submitted 24 January, 2019; v1 submitted 21 January, 2019;
originally announced January 2019.
-
Efficiently decoding the 3D toric codes and welded codes on cubic lattices
Authors:
Abhishek Kulkarni,
Pradeep Kiran Sarvepalli
Abstract:
The recent years have seen a growing interest in quantum codes in three dimensions (3D). One of the earliest proposed 3D quantum codes is the 3D toric code. It has been shown that 3D color codes can be mapped to 3D toric codes. The 3D toric code on cubic lattice is also a building block for the welded code which has highest energy barrier to date. Although well known, the performance of the 3D tor…
▽ More
The recent years have seen a growing interest in quantum codes in three dimensions (3D). One of the earliest proposed 3D quantum codes is the 3D toric code. It has been shown that 3D color codes can be mapped to 3D toric codes. The 3D toric code on cubic lattice is also a building block for the welded code which has highest energy barrier to date. Although well known, the performance of the 3D toric code has not been studied extensively. In this paper, we propose efficient decoding algorithms for the 3D toric code on a cubic lattice with and without boundaries and report their performance for various quantum channels. We observe a threshold of $\gtrsim 12\%$ for the bit flip errors, $\approx 3\%$ for phase flip errors and $ 24.8\%$ for erasure channel. We also study the performance of the welded 3D toric code on the quantum erasure channel. We did not observe a threshold for the welded code over the erasure channel.
△ Less
Submitted 9 August, 2018;
originally announced August 2018.
-
Decoding Algorithms for Hypergraph Subsystem Codes and Generalized Subsystem Surface Codes
Authors:
Vinuta V. Gayatri,
Pradeep Kiran Sarvepalli
Abstract:
Topological subsystem codes can combine the advantages of both topological codes and subsystem codes. Suchara et al. proposed a framework based on hypergraphs for construction of such codes. They also studied the performance of some subsystem codes. Later Bravyi et al. proposed a subsystem surface code. Building upon these works, we propose efficient decoding algorithms for large classes of subsys…
▽ More
Topological subsystem codes can combine the advantages of both topological codes and subsystem codes. Suchara et al. proposed a framework based on hypergraphs for construction of such codes. They also studied the performance of some subsystem codes. Later Bravyi et al. proposed a subsystem surface code. Building upon these works, we propose efficient decoding algorithms for large classes of subsystem codes on hypergraphs and surfaces. We also propose a construction of the subsystem surface codes that includes the code proposed by Bravyi et al. Our simulations for the subsystem code on the square octagon lattice resulted in a noise threshold of 1.75%. This is comparable to previous result of 2% by Bombin et al. who used a different algorithm.
△ Less
Submitted 31 May, 2018;
originally announced May 2018.
-
Communication Efficient Quantum Secret Sharing
Authors:
Kaushik Senthoor,
Pradeep Kiran Sarvepalli
Abstract:
In the standard model of quantum secret sharing, typically, one is interested in minimal authorized sets for the reconstruction of the secret. In such a setting, reconstruction requires the communication of all the shares of the corresponding authorized set. If we allow for non-minimal authorized sets, then we can trade off the size of the authorized sets with the amount of communication required…
▽ More
In the standard model of quantum secret sharing, typically, one is interested in minimal authorized sets for the reconstruction of the secret. In such a setting, reconstruction requires the communication of all the shares of the corresponding authorized set. If we allow for non-minimal authorized sets, then we can trade off the size of the authorized sets with the amount of communication required for reconstruction. Based on the staircase codes, proposed by Bitar and El Rouayheb, we propose a class of quantum threshold secret sharing schemes that are also communication efficient. We call them $((k,2k-1,d))$ communication efficient quantum secret sharing schemes where $k\leq d\leq2k-1$. Using the proposed construction, we can recover a secret of $d-k+1$ qudits by communicating $d$ qudits whereas using the standard $((k,2k-1))$ quantum secret sharing requires $k(d-k+1)$ qudits to be communicated. In other words, to share a secret of one qudit, the standard quantum secret sharing requires $k$ qudits whereas the proposed schemes communicate only $\frac{d}{d-k+1}$ qudits per qudit in the communication complexity. Proposed schemes can reduce communication overheads by a factor $O(k)$ with respect to standard schemes, when $d$ equals $2k-1$. Further, we show that our schemes have optimal communication cost for secret reconstruction.
△ Less
Submitted 16 May, 2019; v1 submitted 29 January, 2018;
originally announced January 2018.
-
Asymmetric Quantum LDPC Codes
Authors:
Pradeep Kiran Sarvepalli,
Martin Roetteler,
Andreas Klappenecker
Abstract:
Recently, quantum error-correcting codes were proposed that capitalize on the fact that many physical error models lead to a significant asymmetry between the probabilities for bit flip and phase flip errors. An example for a channel which exhibits such asymmetry is the combined amplitude dam** and dephasing channel, where the probabilities of bit flips and phase flips can be related to relaxa…
▽ More
Recently, quantum error-correcting codes were proposed that capitalize on the fact that many physical error models lead to a significant asymmetry between the probabilities for bit flip and phase flip errors. An example for a channel which exhibits such asymmetry is the combined amplitude dam** and dephasing channel, where the probabilities of bit flips and phase flips can be related to relaxation and dephasing time, respectively. We give systematic constructions of asymmetric quantum stabilizer codes that exploit this asymmetry. Our approach is based on a CSS construction that combines BCH and finite geometry LDPC codes.
△ Less
Submitted 27 April, 2008;
originally announced April 2008.
-
Quantum Convolutional BCH Codes
Authors:
Salah A. Aly,
Markus Grassl,
Andreas Klappenecker,
Martin Roetteler,
Pradeep Kiran Sarvepalli
Abstract:
Quantum convolutional codes can be used to protect a sequence of qubits of arbitrary length against decoherence. We introduce two new families of quantum convolutional codes. Our construction is based on an algebraic method which allows to construct classical convolutional codes from block codes, in particular BCH codes. These codes have the property that they contain their Euclidean, respective…
▽ More
Quantum convolutional codes can be used to protect a sequence of qubits of arbitrary length against decoherence. We introduce two new families of quantum convolutional codes. Our construction is based on an algebraic method which allows to construct classical convolutional codes from block codes, in particular BCH codes. These codes have the property that they contain their Euclidean, respectively Hermitian, dual codes. Hence, they can be used to define quantum convolutional codes by the stabilizer code construction. We compute BCH-like bounds on the free distances which can be controlled as in the case of block codes, and establish that the codes have non-catastrophic encoders.
△ Less
Submitted 9 April, 2007; v1 submitted 13 March, 2007;
originally announced March 2007.
-
Quantum Convolutional Codes Derived From Reed-Solomon and Reed-Muller Codes
Authors:
Salah A. Aly,
Andreas Klappenecker,
Pradeep Kiran Sarvepalli
Abstract:
Convolutional stabilizer codes promise to make quantum communication more reliable with attractive online encoding and decoding algorithms. This paper introduces a new approach to convolutional stabilizer codes based on direct limit constructions. Two families of quantum convolutional codes are derived from generalized Reed-Solomon codes and from Reed- Muller codes. A Singleton bound for pure co…
▽ More
Convolutional stabilizer codes promise to make quantum communication more reliable with attractive online encoding and decoding algorithms. This paper introduces a new approach to convolutional stabilizer codes based on direct limit constructions. Two families of quantum convolutional codes are derived from generalized Reed-Solomon codes and from Reed- Muller codes. A Singleton bound for pure convolutional stabilizer codes is given.
△ Less
Submitted 22 January, 2007; v1 submitted 8 January, 2007;
originally announced January 2007.
-
Duadic Group Algebra Codes
Authors:
Salah A. Aly,
Andreas Klappenecker,
Pradeep Kiran Sarvepalli
Abstract:
Duadic group algebra codes are a generalization of quadratic residue codes. This paper settles an open problem raised by Zhu concerning the existence of duadic group algebra codes. These codes can be used to construct degenerate quantum stabilizer codes that have the nice feature that many errors of small weight do not need error correction; this fact is illustrated by an example.
Duadic group algebra codes are a generalization of quadratic residue codes. This paper settles an open problem raised by Zhu concerning the existence of duadic group algebra codes. These codes can be used to construct degenerate quantum stabilizer codes that have the nice feature that many errors of small weight do not need error correction; this fact is illustrated by an example.
△ Less
Submitted 8 January, 2007;
originally announced January 2007.
-
Subsystem Codes
Authors:
Salah A. Aly,
Andreas Klappenecker,
Pradeep Kiran Sarvepalli
Abstract:
We investigate various aspects of operator quantum error-correcting codes or, as we prefer to call them, subsystem codes. We give various methods to derive subsystem codes from classical codes. We give a proof for the existence of subsystem codes using a counting argument similar to the quantum Gilbert-Varshamov bound. We derive linear programming bounds and other upper bounds. We answer the que…
▽ More
We investigate various aspects of operator quantum error-correcting codes or, as we prefer to call them, subsystem codes. We give various methods to derive subsystem codes from classical codes. We give a proof for the existence of subsystem codes using a counting argument similar to the quantum Gilbert-Varshamov bound. We derive linear programming bounds and other upper bounds. We answer the question whether or not there exist [[n,n-2d+2,r>0,d]]<sub>q</sub> subsystem codes. Finally, we compare stabilizer and subsystem codes with respect to the required number of syndrome qudits.
△ Less
Submitted 18 October, 2006;
originally announced October 2006.
-
Clifford Code Constructions of Operator Quantum Error Correcting Codes
Authors:
Andreas Klappenecker,
Pradeep Kiran Sarvepalli
Abstract:
Recently, operator quantum error-correcting codes have been proposed to unify and generalize decoherence free subspaces, noiseless subsystems, and quantum error-correcting codes. This note introduces a natural construction of such codes in terms of Clifford codes, an elegant generalization of stabilizer codes due to Knill. Character-theoretic methods are used to derive a simple method to constru…
▽ More
Recently, operator quantum error-correcting codes have been proposed to unify and generalize decoherence free subspaces, noiseless subsystems, and quantum error-correcting codes. This note introduces a natural construction of such codes in terms of Clifford codes, an elegant generalization of stabilizer codes due to Knill. Character-theoretic methods are used to derive a simple method to construct operator quantum error-correcting codes from any classical additive code over a finite field.
△ Less
Submitted 18 October, 2006; v1 submitted 21 April, 2006;
originally announced April 2006.
-
Nonbinary stabilizer codes over finite fields
Authors:
Avanti Ketkar,
Andreas Klappenecker,
Santosh Kumar,
Pradeep Kiran Sarvepalli
Abstract:
One formidable difficulty in quantum communication and computation is to protect information-carrying quantum states against undesired interactions with the environment. In past years, many good quantum error-correcting codes had been derived as binary stabilizer codes. Fault-tolerant quantum computation prompted the study of nonbinary quantum codes, but the theory of such codes is not as advanc…
▽ More
One formidable difficulty in quantum communication and computation is to protect information-carrying quantum states against undesired interactions with the environment. In past years, many good quantum error-correcting codes had been derived as binary stabilizer codes. Fault-tolerant quantum computation prompted the study of nonbinary quantum codes, but the theory of such codes is not as advanced as that of binary quantum codes. This paper describes the basic theory of stabilizer codes over finite fields. The relation between stabilizer codes and general quantum codes is clarified by introducing a Galois theory for these objects. A characterization of nonbinary stabilizer codes over GF(q) in terms of classical codes over GF(q^2) is provided that generalizes the well-known notion of additive codes over GF(4) of the binary case. This paper derives lower and upper bounds on the minimum distance of stabilizer codes, gives several code constructions, and derives numerous families of stabilizer codes, including quantum Hamming codes, quadratic residue codes, quantum Melas codes, quantum BCH codes, and quantum character codes. The puncturing theory by Rains is generalized to additive codes that are not necessarily pure. Bounds on the maximal length of maximum distance separable stabilizer codes are given. A discussion of open problems concludes this paper.
△ Less
Submitted 17 August, 2005; v1 submitted 8 August, 2005;
originally announced August 2005.
-
Primitive Quantum BCH Codes over Finite Fields
Authors:
Salah Aly,
Andreas Klappenecker,
Pradeep Kiran Sarvepalli
Abstract:
An attractive feature of BCH codes is that one can infer valuable information from their design parameters (length, size of the finite field, and designed distance), such as bounds on the minimum distance and dimension of the code. In this paper, it is shown that one can also deduce from the design parameters whether or not a primitive, narrow-sense BCH contains its Euclidean or Hermitian dual c…
▽ More
An attractive feature of BCH codes is that one can infer valuable information from their design parameters (length, size of the finite field, and designed distance), such as bounds on the minimum distance and dimension of the code. In this paper, it is shown that one can also deduce from the design parameters whether or not a primitive, narrow-sense BCH contains its Euclidean or Hermitian dual code. This information is invaluable in the construction of quantum BCH codes. A new proof is provided for the dimension of BCH codes with small designed distance, and simple bounds on the minimum distance of such codes and their duals are derived as a consequence. These results allow us to derive the parameters of two families of primitive quantum BCH codes as a function of their design parameters.
△ Less
Submitted 17 January, 2006; v1 submitted 22 January, 2005;
originally announced January 2005.