Skip to main content

ORIGINAL RESEARCH article

Front. Phys., 24 February 2023
Sec. Quantum Engineering and Technology
This article is part of the Research Topic Multiparty Quantum Communication and Quantum Cryptography View all 7 articles

Construction of quaternary quantum error-correcting codes via orthogonal arrays

Shanqi Pang
Shanqi Pang1*Fuyuan YangFuyuan Yang1Rong YanRong Yan1Jiao Du,
Jiao Du1,2*Tianyin Wang,
Tianyin Wang3,4*
  • 1College of Mathematics and Information Science, Henan Normal University, Xinxiang, China
  • 2State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
  • 3School of Mathematical Science, Luoyang Normal University, Luoyang, China
  • 4Guangxi key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China

This paper presents a method based on orthogonal arrays of constructing pure quaternary quantum error-correcting codes. As an application of the method, some infinite classes of quantum error-correcting codes with distances 2, 3, and 4 can be obtained. Moreover, the infinite class of quantum codes with distance 2 is optimal. The advantage of our method also lies in the fact that the quantum codes we obtain have less items for a basis quantum state than existing ones.

1 Introduction

Quantum systems are more fragile than classical systems. When quantum information travels across a noisy channel, errors are unavoidable [13]. The primary tool to deal with different types of quantum noises is quantum error-correcting codes (QECCs) [1, 2, 4, 5]. They play an important role in quantum information tasks, such as in entanglement purification, quantum key distribution, fault-tolerant quantum computation, and so on [68]. Since its discovery, code construction has come a long way [916]. Plenty of binary QECCs have been obtained, some of which from classical error-correcting codes (CECCs) [1619]. Relatively speaking, there are still less studies on quaternary QECCs. We are motivated by the fact that CECCs are one-to-one connected to orthogonal arrays (OAs) [20]. It would be interesting to see if OAs can reciprocate and help QECCs, especially, quaternary ones. Therefore, the main aim of this work is to construct quaternary QECCs from OAs.

If L is an r × N array with elements from S = {0, 1, …, s − 1} and every r × k subarray of L contains each k-tuple based on S as a row with same frequency, then the array is said to be an orthogonal array of strength k (for some k in the range 0 ≤ kN). We will use OA (r, N, s, k) to denote such an array [21]. The theory of OAs has been developed significantly since the seminal work of Rao [22]. In particular, in recent years many new methods for constructing strength k OAs have been proposed, and a lot of new classes of OAs have been presented [2329]. An OA (r, N, s, k) is said to be an irredundant orthogonal array (IrOA), if every row in any r × (Nk) subarray is unique [20]. If all of a pure quantum state’s reductions to k qudits are maximally mixed, it is said to be k-uniform. And this state consists of N subsystems with d levels. A connection between a k-uniform state and an irredundant orthogonal array (IrOA) was established by Goyeneche et al. [20]. For simplicity, the normalization factors are omitted from this paper.

Lemma 1. [20] If L=s11s21sN1s12s22sN2s1rs2rsNr is an IrOA(r, N, s, k), then the superposition of r product states,

|Φ=|s11s21sN1+|s12s22sN2++|s1rs2rsNr

is a k-uniform state.By using this connection in Lemma 1, a lot of k-uniform states have been constructed from OAs [20, 3037]. This kind of k-uniform states is closely related to QECCs [12, 20]. Usually, quantum information theory benefits from OAs [3843]. These new developments in OAs and uniform states provide a higher possibility to construct infinite classes of QECCs from OAs [35, 36].In this work, we present a method based on OAs of constructing pure quaternary QECCs. As an application of the method, some infinite classes of QECCs with distances 2, 3, and 4 can be obtained. We know that quantum bound reflects the optimality of QECCs and is a key parameter to judge whether a construction method is effective or not. Moreover, the resulting infinite class of quantum codes with distance 2 is optimal. The advantage of our method also lies in the fact that the constructed QECCs have less items in each basis state than existing ones.This paper is organized as follows. After introducing symbols, definitions, and required lemmas in Section 2, Section 3 presents the main results. The conclusion is drawn in Section 4.

2 Preliminaries

We introduce several symbols, definitions and lemmas used in this paper.

Let F4n denote the n dimensional space over a Galois field F4=F2(ω)={0,1,ω,ω̄=ω2}, ω2 = ω + 1. For the convenience of codeword expression, we use F4={0,1,2,3}. AT is the transposition of matrix A. (s)=(0,1,,s1)1×sT, and 0r and 1r represent the r × 1 vector of 0s and 1s, respectively. We define the Kronecker product AB and the Kronecker sum AB as AB=(aijB)mu×nv and AB=(aij+B)mu×nv, respectively, if A=(aij)m×n and B=(brs)u×v with entries from a finite field with binary operations (+ and ⋅). Here, aij + B denotes the u × v matrix with elements aij + brs (1 ≤ ru, 1 ≤ sv). And if necessary, matrix A can always be viewed as a set of its row vectors. The strength of an orthogonal array L is denoted by t(L). We also use a k-strength OA to denote an OA of strength k for k ≥ 0. Let (C4)N=C4C4C4N.

Definition 1. [44] Suppose Sl = {(u1, …, ul)|uiS, i = 1, 2, …, l}. The number of positions in which two vectors v = (v1, …, vl), u = (u1, …, ul) ∈ Sl differ from one another is defined as the Hamming distance HD(u, v) between them. Let HD(L) represents all possible values of the Hamming distance between two distinct rows of an OA L. The minimal distance of a matrix A means the minimal Hamming distance between its distinct rows and denoted by MD(A).Let k ≥ 1 and Ak represent the additive group of order sk which consists all k-tuples of elements from A. The typical vector addition is used as the binary operation. If A0k={(x1,x2,,xk):x1==xkA}, A0k is a subgroup of Ak of order s, and Aik, i = 1, …, sk−1–1 will be used to denoted its cosets.

Definition 2. [44] Let D be an r × c matrix with elements from A. For every r × k submatrix of D, its rows are seen as entries of Ak. If in the submatrix each set Aik, i = 0, 1, …, sk−1–1, is represented equally frequently, then the D is said to be a difference scheme of strength k. We use Dk(r, c, s) to denote such a matrix. When k = 2, we denote Dk(r, c, s) by D(r, c, s).

Definition 3. [29] Let L be an OA(r, N, s, k). Suppose the rows of L can be partitioned into u submatrices {L1, L2, …, Lu} such that each Li is an OA(ru,N,s,k1) with k1 ≥ 0. Then the set {L1, L2, …, Lu} is called an orthogonal partition of strength k1 of L. In particular, {L1, L2, …, Lu} is called a strength k1 orthogonal partition of a space Fpn if L=Fpn .

Definition 4. Let D = Dk(r, c, s). A set of difference schemes {D1, D2, …, Du} is called a k1-strength orthogonal partition of D, if DiDj = ø for ij and i=1uDi=D.

Lemma 2. [44] If s≢2 (mod  4), and sk, then the difference scheme Dk(sk−1, k + 1, s) exists.

Lemma 3. [34] If L = OA(sk, N, s, k), then MD(L) = Nk + 1.

Lemma 4. [45] (1) Let D = Dk(r, c, s). Then D ⊕ (s) = OA(rs, c, s, k).(2) Let D = Dk (m, n, s) and L = OA (r, N, s, k) for k = 2, 3. Then DL = OA (mr, nN, s, k).

Lemma 5. [36] (Expansive replacement method) Assume that LA is a k-strength OA with s levels in factor 1 and that LB is a k-strength OA with s rows. After building a one-to-one mapping between the levels of factor 1 in LA and the rows of LB, we may construct an OA of strength k by substituting each level of factor 1 in LA with the matching row from LB .

Lemma 6. [44] For a prime power s ≥ 2, an OA(sk, s + 1, s, k) exists if sk − 1 ≥ 0.

Lemma 7. [12] If the reductions of all states in a subspace Q of (Cs)N to any given k parties are equal, then Q is an ((N,K,k + 1))s QECC, and vice versa. Furthermore, if any state in Q is k-uniform, then Q is pure, and vice versa.We can also define a QECC ((N,K,k + 1))s according to Lemma 7, where N denotes the code length, K is the dimension of the encoding state, k + 1 denotes the distance, and s denotes the levels number. For s = 2, it is simply ((N, K, k + 1)).

Lemma 8. [46] (quantum Singleton bound) If K > 1 in an ((N,K,k + 1))s then KsN−2k. Similarly, a pure ((N,1,k + 1))s satisfies 2kN.

Definition 5. A QECC such that the equality in Lemma 8 holds is called optimal.

3 Construction of ((N,K,k + 1))4 QECC

This section provides a construction method of quaternary quantum error-correcting codes (QECCs) from orthogonal arrays (OAs). In Theorem 1, we use Lemma 4 (2) to construct QECCs with distance 2. Theorems 2 and 3 produce QECCs with distances 3 and 4 from the OAs with orthogonal partitions. In Theorem 4, we study the existence of QECCs with any distance by using a special construction of OAs.

Theorem 1. For every N ≥ 2, there is a QECC ((N,K,2))4 for each integer 1 ≤ K ≤ 4N−2 where the ((N,4N2,2))4 code is optimal.Proof. When N ≥ 5, a difference scheme D = DN−1(4N−2, N, 4) exists by Lemma 2. Let L = D ⊕ (4) = OA (4N−1, N, 4, N − 1). By Lemma 3, MD(L) = N − (N − 1) + 1 = 2. Set D=d1d2d4N2. Let Li = di ⊕ (4) = OA (4, N, 4, 1) for i = 1, 2, …, 4N−2. Then t (Li) = 1, MD (Li) = N.From Lemma 1, L1,L2,,L4N2 can generate 4N−2 1-uniform states |φ1,|φ2,,|φ4N2. They can be used as a set of orthogonal basis to generate a subspace Q of (C4)N. Thus Q is an optimal ((N,4N2,2))4 code by Lemma 7 and Definition 5.In addition, for any integer 1 ≤ K ≤ 4N−2–1, if QK is the subspace spanned by |φ1⟩, …, |φK⟩, then it is a ((N,K,2))4 code.When 1 < N < 5, we can construct the following QECCs ((N,4N2,2))4.When N = 2, an optimal ((2,1,2))4 code can be generated with a basis |φ⟩ = |01⟩ + |12⟩ + |23⟩ + |30⟩.When N = 3, take D(4,3,4)=000012023031=d1d2d3d4. Let Ai = di ⊕ (4) and A=A1A2A3A4. Obviously, A and Ai are OAs for i = 1, 2, 3, 4. From Lemma 3, MD(A) = 2, and by Lemma 7, an optimal ((3,4,2))4 QECC can be obtained from A1, …, A4.When N = 4, take D(4,2,4)=00010203=d1d2d3d4. Then B4(i−1)+j = di ⊕ ((4) (j − 1) ⊕ (4)) is an OA (4, 4, 4, 1) for i, j = 1, 2, 3, 4 and B=B1B2B16=D(4,2,4)F42 is an OA (64, 4, 4, 2). By simple calculation, we have MD(B) = 2. By Lemma 7, an optimal ((4,16,2))4 QECC can be obtained from B1, …, B16.Remark. The quantum codes obtained by Theorem 1 have less items in a basis state than existing ones. For example, every basis states of the ((3,4,2))4 code has four items. It has far less number of items for a basis state than the ((3,4,2))4 in [13]. Compared with the codes [[N,N − 2,2]]4 in [47] for N = 9 + 6m with 0 ≤ m ≤ 165, we have the codes for all N ≥ 2.

Theorem 2. Suppose L is an OA(r, N, 4, 2) with MD(L) ≥ 3. A QECC ((N,K,3))4 exists, if there are vectors b1, b2, …, bK in Z4N that fulfill HD(bu, bv) ≥ 3 and |HD(bu, bv) − HD(L)|≥ 3 for uv.Proof: Let X=X1X2XK, where Xu = 1rbu + L for 1 ≤ uK. Both X and Xu are 2-strength OAs. Let x1 = bu + l1, x2 = bv + l2X for l1, l2L. Then we can compute the Hamming distance (HD) between x1 and x2 and the minimum distance (MD) of X.

(1) HD (x1, x2) = MD(L) ≥ 3, if u = v, l1l2.

(2) HD (x1, x2) = HD (bu, bv) ≥ 3, if uv, l1 = l2.

(3) If uv and l1l2, we have HD (x1, x2) ≥HD (bu + l2, x2) − HD (bu + l2, x1) or HD (x1, x2) ≥HD (bu + l2, x1) − HD (bu + l2, x2), hence HD (x1, x2) ≥|HD (bu, bv) − HD(L)|≥ 3.

Therefore, MD(X) ≥ 3. We can obtain K states from {X1, X2, …, XK} and Lemma 1. Let Q be a subspace of (C4)N with the K states to be an orthogonal basis. Thus Q is a QECC ((N,K,3))4 by Lemma 7.

Theorem 3. There exists a QECC ((3p,4pn+1,3))4 with 4n1+23p4n13 for n ≥ 3 and with 3 ≤ p ≤ 5 for n = 2.Proof. Let {D1, D2, D3, D4} be orthogonal partition of the difference scheme D (16, 3, 4) = (016, (4) ⊕ 04, 04 ⊕ (4)) and {L1,L2,,L4pn} be an orthogonal partition of strength two of F4p. Let Yi denote the ith row of F4pn with 4n1+23p4n13 for n ≥ 3. Take

M=D1L1D1L4pnD2L1D4L4pn=M1M4pnM4pn+1M4pn+1,

where Li = (a1,,an,((an+1,,ap)+14nYi)) for i = 1, 2, …, 4pn and (a1, a2, …, ap) is an OA (4n, p, 4, 2).Because Dj is a 2-strength difference scheme and Li is a 2-strength OA, it follows from Lemma 4 that Mk = DjLi is a 2-strength OA for k = 1, 2, …, 4pn+1. Let m1 = d1l1, m2 = d2l2Mk for d1, d2Dj, l1, l2Li. Then we have

HDm1,m2=3HDl1,l2,ifd1=d2,pHDd1,d2,ifl1=l2,3HDd1,d2HDl1,l2+pHDl1,l2HDd1,d2,ifd1d2,l1l2.

Therefore, MD (Mk) ≥ 3 and Mk is an IrOA for any k. Furthermore, M is an OA and has strength two because it is equal to D(16,3,4)F4p after row permutations. Similarly, we can obtain MD(M) ≥ 3. From Lemma 1, M1, M2, …, M4pn+1 can generate 4pn+1 states. They can be used as a basis to form a subspace Q of (C4)3p. From Lemma 7, Q is a QECC ((3p,4pn+1,3))4.Similarly, when 3 ≤ p ≤ 5 and n = 2, we can construct a ((3p,4p1,3))4 QECC.

Example 1. Let the following + be the operation in F4. Let D1=000012023031, D2=003011020032, D3=002010021033, D4=001013022030. In Theorem 3, we take 3 ≤ p ≤ 5 and n = 2. Let (a1, a2, …, ap) be an OA (16, p, 4, 2) and Li=(a1, a2, (a3, …, ap) + 116Yi), where Yi denotes the ith row of F4p2 for i = 1, 2, …, 4p−2. Then {L1,L2,,L4p2} is an orthogonal partition of strength 2 of F4p. We can obtain QECCs ((9,42,3))4, ((12,43,3))4 and ((15,44,3))4. With 6 ≤ p ≤ 21 for n = 3, Theorem 3 produces QECCs ((18,44,3))4,((21,45,3))4,,((63,419,3))4.

Theorem 4. If an OA(4n, p, 4, 3) exists for p > n ≥ 3, then there is a ((4p,4pn+1,4))4 QECC.Proof. This can be proved in the same way as Theorem 3.

Example 2. Let D1 = (016, (4) ⊕ 04, 04 ⊕ (4), (4) ⊕ (4)), D2 = (016, (4) ⊕ 04, 04 ⊕ (4), 1 + (4) ⊕ (4)), D3 = (016, (4) ⊕ 04, 04 ⊕ (4), 2 + (4) ⊕ (4)), D4 = (016, (4) ⊕ 04, 04 ⊕ (4), 3 + (4) ⊕ (4)). Then the difference scheme D3(64, 4, 4) = (064, (4) ⊕ 016, 04 ⊕ (4) ⊕ 04, 016 ⊕ (4)) has a 3-strength orthogonal partition {D1, D2, D3, D4}. Take p = 5, 6 and n = 3 in Theorem 4. Let (a1, a2, …, ap) be an OA(64, p, 4, 3) and Li=(a1, a2, a3, (a4, …, ap) + 164Yi), where Yi denotes the ith row of F4p3 for i = 1, 2, …, 4p−3. Then {L1,L2,,L4p3} is an orthogonal partition strength 3 of F4p. By Theorem 4, two new QECCs ((20,43,4))4 and ((24,44,4))4 can be obtained.

Theorem 5. Let LN denote an OA(r, N, 4, k). Let Y=[0sLN1,(s)LN2] for s ≤ 4 and N1 + N2N. If MD(Y) ≥ k + 1, then there exists an ((N1+N2,s,k+1))4 QECC.Proof. Let Yi=[LN1,i1+LN2] for i = 1, 2, …, s. Since Yi is isomorphic to Y1, Yi is an OA and t (Yi) = k. And we have Y=Y1Y2Ys. If MD(Y) ≥ k + 1, then Yi is an IrOA (r, N1 + N2, 4, k). By Lemma 7, an ((N1+N2,s,k+1))s QECC exists.

Example 3. As illustrations for small size codes, we obtain ((6,2,3))4, ((7,4,3))4 and ((5,4,3))4.Take an OA (32, 7, 4, 2) = (a1, a2, …, a7) in [48]. For the case s = 2, take Y = (02 ⊕ (a5, a6), (2) ⊕ (a2, a3, a4, a7)). Then MD(Y) = 3. Application of Theorem 5 yields a new ((6,2,3))4 code.Let s = 4 and Y = (04 ⊕ (a4, a5, a6), (4) ⊕ (a1, a2, a3, a7)). Then MD(Y) = 3. By Theorem 5, we can construct a ((7,4,3))4 code in [47].Let L5 = (a1, a2, …, a5) be an OA (16, 5, 4, 2) and Y = (04 ⊕ (a2, a3), (4) ⊕ (a1, a4, a5)). Then MD(Y) = 3 and we obtain an optimal ((5,4,3))4 code from Theorem 5. Every basis states of the ((5,4,3))4 code has 64 items. Compared to ((5,4,3))4 in [14], it includes less items for its base states.

Theorem 6. Let L = OA(r, N, 4, k) with MD(L) ≥ k + 1. We can construct a QECC ((N,K,k + 1))4 if there are vectors b1, b2, …, bK in Z4N such that MD1rb1+L1rb2+L1rbK+Lk+1.Proof: Let M=M1M2MK=1rb1+L1rb2+L1rbK+L. Evidently, MD(M) ≥ k + 1 and Mi is an OA (r, N, 4, k). By Lemma 7, there is a QECC ((N,K,k + 1))4.

Example 4. For N = 7 and r = 32, take L = OA(32, 7, 4, 2) in [48]. We can get b1,b2,,b10Z47 which meet the requirements in Theorem 6 where b1 = (0000000), b2 = (0001103), b3 = (0011332), b4 = (0012030), b5 = (0013200), b6 = (0020021), b7 = (0022113), b8 = (0023323), b9 = (0030210), b10 = (0031313). Then we can construct a new ((7,10,3))4 QECC, which is better than the code ((7,4,3))4 in [47].

Theorem 7. If m is an integer satisfying 4m−1 + 3 < 2d ≤ 4m + 3, then there exists a QECC ((nd,1,d))4 for 2m(d − 1) ≤ nd ≤ (4m + 1)m.Proof: Let q = 4m. From Lemma 6, there exists LB = OA (qd−1, q + 1, q, d − 1). By Lemma 3, MD (LB) = qd + 3. When the q levels, 0, 1, …, q − 1, are replaced respectively by distinct rows of Z4m, we can construct LC = OA (qd−1 (q + 1)m, 4, d − 1). Removing the last 0, 1, 2, …, (q − 2d + 3)m columns from LC, an L = OA (qd−1, nd, 4, d − 1) for 2m (d − 1) ≤ nd ≤ (4m + 1)m can be obtained and MD(L) ≥ d. By Lemma 7, the desired QECC ((nd,1,d))4 exists.Remark. When m = 1, two optimal QECCs ((2,1,2))4 and ((4,1,3))4 can be obtained.

Example 5. By giving different values to d in Theorem 7, some new QECCs with larger distances can be obtained, which are listed in Table 1.

TABLE 1
www.frontiersin.org

TABLE 1. Some new QECCs with larger distance by Theorem 7.

Theorem 8. Construction of new codes ((16,1,6))4, ((24,1,8))4, ((23,81,5))4, ((15,4,5))4, ((14,16,4))4, ((23,4,7))4, ((20,256,4))4 and ((6,1,4))4 from Lemma 7.Proof: An IrOA (48, 16, 4, 5) with MD = 6 obtained by using product of two OA (28, 16, 2, 5)s in [49] and an IrOA (412, 24, 4, 7) with MD = 8 obtained by using product of two OA (212, 24, 2, 7)s in [49] can generate two new QECCs ((16,1,6))4 and ((24,1,8))4 respectively. By using product of two OA (4608,23,2,4)s obtained from the ((23,9,5)) QECC in Example 7 in [15], we can get an OA (46082, 23, 4, 4) with an orthogonal partition {C1, C2, …, C81} of strength 4 which can generate a new QECC ((23,81,5))4.An IrOA (48, 15, 4, 5) with an orthogonal partition {A1, A2, A3, A4} of strength 4, an IrOA (48, 14, 4, 5) with an orthogonal partition {B1, B2, …, B16} of strength 3, an IrOA (412, 23, 4, 7) with an orthogonal partition {E1, E2, E3, E4} of strength 6 and an IrOA (412, 20, 4, 7) with an orthogonal partition {F1, F2, …, F256} of strength 3 produce four new QECCs ((15,4,5))4, ((14,16,4))4, ((23,4,7))4 and ((20,256,4))4 respectively. In particular, an IrOA (64,6,4,3) in [48] yields an optimal QECC ((6,1,4))4 in [50].

4 Conclusion

Binary QECCs have been widely studied, but the research on quaternary QECCs is still rare. In the study, from OAs we construct a large number of pure quaternary QECCs, some of which are optimal. The advantage of the method presented is that the quantum codes we obtain have fewer items for a basis quantum state compared with the existing ones. In future, we intend to construct more optimal QECCs with the distance 3 and investigate the q-ary QECCs for other prime powers and non-primes q from OAs.

Data availability statement

The raw data supporting the conclusion of this article will be made available by the authors, without undue reservation.

Author contributions

Supervision, SP; conceptualization, SP and FY; investigation, SP, FY, RY, JD, and TW; methodology, FY and RY; validation, FY, RY, JD, and TW; writing—original draft, FY; writing—review and editing, SP and FY All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by National Natural Science Foundation of China (Grant Nos. 11971004, 622722 08, 62172196); Open Foundation of State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications (Grant No. SKLNST-2022-1-01); Science and Tech-nology Research Project of Henan Province (202102210163); The Open Foundation of Guangxi Key Laboratory of Trusted Software (Grant No. KX202040).

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Peter W. Scheme for reducing decoherence in quantum computer memory. Phys Rev A (1995) 52:R2493–6. –R2496. doi:10.1103/physreva.52.r2493

PubMed Abstract | CrossRef Full Text | Google Scholar

2. Knill E, Laflamme R. Theory of quantum error-correcting codes. Phys Rev A (1997) 55:900–11. 900–911. doi:10.1103/physreva.55.900

CrossRef Full Text | Google Scholar

3. Knill E, Laflamme R, Viola L. Theory of quantum error correction for general noise. Phys Rev Lett (2000) 84:2525–8. doi:10.1103/physrevlett.84.2525

PubMed Abstract | CrossRef Full Text | Google Scholar

4. Charles H, Bennett D, DiVincenzo P, John AS, Wootters WK. Mixed-state entanglement and quantum error correction. Phys Rev A (1996) 54:3824–51. doi:10.1103/physreva.54.3824

PubMed Abstract | CrossRef Full Text | Google Scholar

5. Steane AM. Error correcting codes in quantum theory. Phys Rev Lett (1996) 77:793–7. doi:10.1103/physrevlett.77.793

PubMed Abstract | CrossRef Full Text | Google Scholar

6. Glancy S, Knill E, Vasconcelos HM. Entanglement purification of any stabilizer state. Phys Rev A (2006) 74:032319. doi:10.1103/physreva.74.032319

CrossRef Full Text | Google Scholar

7. Artur K. Ekert. Quantum Cryptography and bell’s Theorem. Boston, MA: Springer US (1992).

Google Scholar

8. Gottesman D. Theory of fault-tolerant quantum computation. Phys Rev A (1998) 57:127–37. doi:10.1103/physreva.57.127

CrossRef Full Text | Google Scholar

9. Keqin F. Quantum codes [[6,2,3]]p and [[7,3,3]]p exist. IEEE Trans Inf Theor (2002) 48(8):2384–91. doi:10.1109/TIT.2002.800469

CrossRef Full Text | Google Scholar

10. Keqin F, Ma Z. A finite gilbert-varshamov bound for pure stabilizer quantum codes. IEEE Trans Inf Theor (2004) 50(12):3323–5. doi:10.1109/tit.2004.838088

CrossRef Full Text | Google Scholar

11. Keqin F, Xing C. A new construction of quantum error-correcting codes. Trans Am Math Soc (2008) 360(4):2007–19. doi:10.1090/s0002-9947-07-04242-0

CrossRef Full Text | Google Scholar

12. Shi F, Mao-Sheng L, Lin C, Zhang X. k-uniform quantum information masking. Phys Rev A (2021) 104:032601. doi:10.1103/PhysRevA.104.032601

CrossRef Full Text | Google Scholar

13. Wang Z, Yu S, Fan H, Oh CH. Quantum error-correcting codes over mixed alphabets. Phys Rev A (2013) 88:022328. doi:10.1103/physreva.88.022328

CrossRef Full Text | Google Scholar

14. Hu D, Tang W, Zhao M, Chen Q, Yu S, Oh CH. Graphical nonbinary quantum error-correcting codes. Phys Rev A (2008) 78:012306. doi:10.1103/physreva.78.012306

CrossRef Full Text | Google Scholar

15. Pang S, Xu H, Chen M. Construction of binary quantum error-correcting codes from orthogonal array. Entropy (2022) 24(7):1000. doi:10.3390/e24071000

PubMed Abstract | CrossRef Full Text | Google Scholar

16. Grassl M. Bounds on the minimum distance of additive quantum codes (2014). Availabe at: http://www.codetables.de

Google Scholar

17. Grassl M, Beth T. Relations between classical and quantum errorcorrecting codes. In: Proceedings Workshop “Physik und Informatik”; Heidelberg, Mrz (1999).

Google Scholar

18. Grassl M, Beth T. A note on non-additive quantum codes (1997). arXiv preprint quant-ph/9703016.

Google Scholar

19. Beth T, Grassl M. The quantum hamming and hexacodes. Fortschritte der Physik (1998) 46(4-5):459–91. doi:10.1002/(sici)1521-3978(199806)46:4/5<459::aid-prop459>3.0.co;2-h

CrossRef Full Text | Google Scholar

20. Dardo G, Karol Ż. Genuinely multipartite entangled states and orthogonal arrays. Phys Rev A (2014) 90:022316. doi:10.1103/physreva.90.022316

CrossRef Full Text | Google Scholar

21. Pang S, Zhang Y, Liu S. Further results on the orthogonal arrays obtained by generalized hadamard product. Stat Probab Lett (2004) 68(1):17–25. doi:10.1016/j.spl.2004.03.001

CrossRef Full Text | Google Scholar

22. Rao CR. Hypercubes of strength ‘d’ leading to confounded designs in factorial experiments. Karnataka: Indian Academy of Science (1946).

Google Scholar

23. Ji L, Yin J. Constructions of new orthogonal arrays and covering arrays of strength three. J Comb Theor Ser A (2010) 117(3):236–47. doi:10.1016/j.jcta.2009.06.002

CrossRef Full Text | Google Scholar

24. Yin J, Wang J, Ji L, Yang L. On the existence of orthogonal arrays OA(3, 5, 4n + 2). J Comb Theor Ser A (2011) 118(1):270–6. doi:10.1016/j.jcta.2010.03.013

CrossRef Full Text | Google Scholar

25. Pang S, Zhu Y, Wang Y. A class of mixed orthogonal arrays obtained from projection matrix inequalities. J Inequalities Appl (2015) 2015:241. –9. doi:10.1186/s13660-015-0765-6

CrossRef Full Text | Google Scholar

26. Pang S, Chen L. Generalized Latin matrix and construction of orthogonal arrays. Acta Mathematicae Applicatae Sinica, English Ser (2017) 33(4):1083–92. doi:10.1007/s10255-017-0720-z

CrossRef Full Text | Google Scholar

27. Pang S, Xiao L, Wang J. Construction of asymmetric orthogonal arrays of strength <i&gt;t&lt;/i&gt; from orthogonal partition of small orthogonal arrays. IEICE Trans Fundamentals Electron Commun Comp Sci (2018) 101(8):1267–72. doi:10.1587/transfun.e101.a.1267

CrossRef Full Text | Google Scholar

28. Pang S, Xu W, Chen G, Wang Y. Construction of symmetric and asymmetric orthogonal arrays of strength t from orthogonal partition. Indian J Pure Appl Math (2018) 49(4):663–9. doi:10.1007/s13226-018-0293-4

CrossRef Full Text | Google Scholar

29. Pang S, Wang J, Dennis K, Lin J, Liu M. Construction of mixed orthogonal arrays with high strength. Ann Stat (2021) 49(5):2870–84. doi:10.1214/21-aos2063

CrossRef Full Text | Google Scholar

30. Dardo G, Daniel A, Latorre José I, Riera A, Życzkowski K. Absolutely maximally entangled states, combinatorial designs, and multiunitary matrices. Phys Rev A (2015) 92:032316. doi:10.1103/physreva.92.032316

CrossRef Full Text | Google Scholar

31. Dardo G, Jakub B, Karol Ż. Multipartite entanglement in heterogeneous systems. Phys Rev A (2016) 94:012346. doi:10.1103/physreva.94.012346

CrossRef Full Text | Google Scholar

32. Dardo G, Zahra R, Di Martino S, Karol Ż. Entanglement and quantum combinatorial designs. Phys Rev A (2018) 97:062326. doi:10.1103/physreva.97.062326

CrossRef Full Text | Google Scholar

33. Huber F, Otfried G, Jens S. Absolutely maximally entangled states of seven qubits do not exist. Phys Rev Lett (2017) 118:200502. doi:10.1103/physrevlett.118.200502

PubMed Abstract | CrossRef Full Text | Google Scholar

34. Pang S, Zhang X, Xiao L, Zhang Q. Two and three-uniform states from irredundant orthogonal arrays. npj Quan Inf (2019) 5(1):52–10. doi:10.1038/s41534-019-0165-8

CrossRef Full Text | Google Scholar

35. Pang S, Zhang X, Du J, Wang T. Multipartite entanglement states of higher uniformity. J Phys A: Math Theor (2020) 54(1):015305. doi:10.1088/1751-8121/abc9a4

CrossRef Full Text | Google Scholar

36. Pang S, Zhang X, Fei S, Zheng Z. Quantum k-uniform states for heterogeneous systems from irredundant mixed orthogonal arrays. Quan Inf Process (2021) 20(4):156–46. doi:10.1007/s11128-021-03040-0

CrossRef Full Text | Google Scholar

37. Scott AJ. Multipartite entanglement, quantum-error-correcting codes, and entangling power of quantum evolutions. Phys Rev A (2004) 69:052330. doi:10.1103/physreva.69.052330

CrossRef Full Text | Google Scholar

38. Werner RF. All teleportation and dense coding schemes. J Phys A: Math Gen (2001) 34(35):7081–94. doi:10.1088/0305-4470/34/35/332

CrossRef Full Text | Google Scholar

39. Rotteler M, Wocjan P. Equivalence of decoupling schemes and orthogonal arrays. IEEE Trans Inf Theor (2006) 52(9):4171–81. doi:10.1109/tit.2006.880059

CrossRef Full Text | Google Scholar

40. Pang S, Wang X, Wang J, Du J, Miao F. Construction and count of 1-resilient rotation symmetric boolean functions. Inf Sci (2018) 450:336–42. doi:10.1016/j.ins.2018.03.052

CrossRef Full Text | Google Scholar

41. Zhang Y, Lu Y, Pang S. Orthogonal arrays obtained by orthogonal decomposition of projection matrices. Stat Sinica (1999) 9(2):595–604.

Google Scholar

42. Zhang Y, Pang S, Wang Y. Orthogonal arrays obtained by generalized hadamard product. Discrete Math (2001) 238(1):151–70. The Third Shanghai Conference. doi:10.1016/s0012-365x(00)00421-0

CrossRef Full Text | Google Scholar

43. Pang S, Yan R, Sen L. Schematic saturated orthogonal arrays obtained by using the contractive replacement method. Commun Statistics-Theory Methods (2017) 46(18):8913–24. doi:10.1080/03610926.2016.1197253

CrossRef Full Text | Google Scholar

44. Samad HA, Sloane N, James A, John S. Orthogonal arrays: Theory and applications. Berlin, Germany: Springer Science and Business Media (1999).

Google Scholar

45. Chen G, Lei J. Constructions of mixed orthogonal arrays of strength three. SCIENTIA SINICA Mathematica (2017) 47:545–64. doi:10.1360/012016-23

CrossRef Full Text | Google Scholar

46. Rains EM. Nonbinary quantum codes. IEEE Trans Inf Theor (1999) 45(6):1827–32. doi:10.1109/18.782103

CrossRef Full Text | Google Scholar

47. Edel Y. Some good quantum twisted codes (2020). Available at: https://www.mathi.uni-heidelberg.de/yves/Matritzen/QTBCH/QTBCHIndex.html.

48. Eendebak P, Schoen E Complete series of non-isomorphic orthogonal arrays (2021). Available at: http://www.pietereendebak.nl/oapackage/series.html.

49. Sloane NJA A library of orthogonal arrays (2022). Available at: http://neilsloane.com/oadir/index.html.

50. Huber F, Markus G. Quantum codes of maximal distance and highly entangled subspaces. Quantum (2020) 4:284. doi:10.22331/q-2020-06-18-284

CrossRef Full Text | Google Scholar

Keywords: quantum error-correcting codes, orthogonal arrays, k-uniform states, orthogonal partition, difference scheme

Citation: Pang S, Yang F, Yan R, Du J and Wang T (2023) Construction of quaternary quantum error-correcting codes via orthogonal arrays. Front. Phys. 11:1148398. doi: 10.3389/fphy.2023.1148398

Received: 20 January 2023; Accepted: 15 February 2023;
Published: 24 February 2023.

Edited by:

Nanrun Zhou, Shanghai University of Engineering Sciences, China

Reviewed by:

Mingxing Luo, Southwest Jiaotong University, China
Ma Hongyang, Qingdao University of Technology, China

Copyright © 2023 Pang, Yang, Yan, Du and Wang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Shanqi Pang, c2hhbnFpcGFuZ0AxMjYuY29t; Jiao Du, amlhb2R1ZGpAMTI2LmNvbQ==; Tianyin Wang, d2FuZ3RpYW55aW43OUAxNjMuY29t

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.