<<

Quantum Meas. Quantum Metrol. 2016; 3:1–8

Research Article Open Access

Ronald J. Sadlier and Travis S. Humble* Superdense Coding Interleaved with Forward Error Correction

DOI 10.1515/qmetro-2016-0001 A limitation on SDC performance in realistic settings Received January 19, 2016; accepted April 23, 2016 is the presence of channel noise, which corrupts the trans- mitted state. Channel noise reduces the rate that informa- Abstract: Superdense coding promises increased classical tion is reliably transmitted and has the potential to com- capacity and communication security but this advantage pletely undermine the expected benets from SDC [9]. Pre- may be undermined by noise in the . We viously, Shadman et al. have investigated the classical ca- present a numerical study of how forward error correc- pacity for SDC when transmitting in the presence of de- tion (FEC) applied to the encoded classical message can be polarizing noise [10–12]. Their results quantied the de- used to mitigate against quantum channel noise. By study- crease in capacity for single-sided and double-sided trans- ing the bit error rate under dierent FEC codes, we identify missions, in which noise acts on one and both particles, re- the unique role that burst errors play in superdense cod- spectively. Notably, Shadman et al. found a crossover point ing, and we show how these can be mitigated against by in the depolarizing noise model for which double-sided interleaving the FEC codewords prior to transmission. We noise does no better than direct quantum transmission. conclude that classical FEC with interleaving is a useful This cross-over point represents the condition for which method to improve the performance in near-term demon- the classical SDC capacity was smaller than when using strations of superdense coding. direct quantum transmission. The presence of noise in experimental realizations of SDC raises the question as to how this type of communi- 1 Introduction cation can benet from the use of error correction tech- niques. Both quantum and classical error correction codes Entanglement is a versatile resource that enables many could in principle oer protection to the transmission of new methods of communication including teleportation, information. Quantum error-correction (QEC) codes use quantum secret sharing, and superdense coding [1, 2]. Su- ancillary to construct a higher-dimensional code perdense coding (SDC), in particular, enables a sender Al- space that can detect errors in the logical code words ice to transmit a two-bit message to a receiver Bob by send- [13]. There have been several experimental demonstra- ing only one member of a shared bipartite entangled quan- tions that show the benets of QEC for protecting against tum state [3]. This is twice the expected sources of channel noise, including demonstration using from direct transmission of a single unentangled . In optically encoded qubits [14, 15]. However, the require- addition to increased capacity, correlations within the en- ment of using additional ancilla is at odds with experimen- tangled state provide the added benet that an eavesdrop- tal limitations on the number of simultaneously generated per cannot recover the message by simply intercepting the photon states, which make it dicult to prepare codeword single transmitted particle. These unique features of SDC states for existing QEC codes. have been demonstrated by several dierent experiments Classical forward error correction (FEC) oers an alter- and shown to provide both greater channel capacity and native to QEC that is more easily realized by existing quan- security relative to direct communication techniques [4– tum communication technology. In this setting, FEC codes 8]. rely on classical ancilla to redundantly encode the state of an input bit string. When used in conjunction with SDC, the resulting classical codewords are encoded into quan- tum states and transmitted across a noisy quantum chan- *Corresponding Author: Travis S. Humble: nel. These received states are detected and then decoded Institute, Oak Ridge National Laboratory, Oak Ridge, TN, USA, into classical strings representing the original message. An E-mail: [email protected]; [email protected] immediate advantage of this approach is that it does not re- Ronald J. Sadlier: Quantum Computing Institute, Oak Ridge Na- tional Laboratory, Oak Ridge, TN, USA quire additional entanglement in quantum resources. The

© 2016 Ronald J. Sadlier and Travis S. Humble, published by De Gruyter Open. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License. 2 Ë Ronald J. Sadlier and Travis S. Humble use of FEC codes also does not require changes to exist- where 0 and 1 denote the eigenstates of the Pauli Z oper- ing quantum hardware for implementation, but rather can ator and A and B label the dierent subsystems [18]. For integrate with the software systems that manage existing concreteness, let the shared initial state be Φ(+) and the hardware [16]. corresponding initial density matrix be dened as ρ(+). Al- However, the noisy quantum channels that lead to er- ice uses this ducial state to transmit a two-bit message b rors in the received codewords are not always equivalent to Bob by encoding the binary coecients b0 and b1 of the to well-studied classical channels, and the performance of message into the state. The message is encoded by apply- an FEC code for SDC depends on the details of the quan- ing the unitary operator tum channel. Indeed, this point has been emphasized in O (b) = O (b , b ) = Xb0 Zb1 (2) recent work by Boyd et al. who found that binary codes are A A 0 1 A A limited in the capacity that is achievable [17]. This limita- to subsystem A. Each of the four possible operators maps tion was traced back to the distinction between quantum the initial state uniquely into one of the maximally entan- states as soft symbols and the measured bits as hard sym- gled Bell states and we will use the shorthand notation (+) † bols. Boyd et al. have shown that non-binary classical er- ρb = OA(b)ρABOA(b) to denote the state encoding the ror correction codes can oer better performance and may message b. be viewed though the lens of a d-ary memory-less classical After encoding the message, Alice transmits subsys- model for entanglement-assisted communication [17]. tem A to Bob, who performs a projective measurement in In this paper, we investigate the performance of sev- the Bell basis to identify the state prepared by Alice [19]. eral binary FEC codes for mitigating errors from super- The complete set of Bell-state measurements may be mod- dense coding over noisy quantum channels. In particular, eled by the set of projection operators Π(b) = ρb, where we calculate the bit-error rate (BER) for nite-length mes- b = {0, 1, 2, 3} uniquely labels the measurement out- sages over a Pauli channel using numerical simulations come. The probability of measuring b0 given the of the transmission. We calculate the decoded BER for the encoded value b is given as repetition, Hamming, and Golay FEC codes in the presence 0 Prob(b |b) = Tr[Π 0 ρ ]. (3) of depolarizing noise. We then investigate the use of data b b 0 interleaving to mitigate against the structure of these Pauli For the noiseless protocol, Prob(b |b) = δb0 ,b, and Bob operator errors. We present results from numerical simula- may translate the detected state to recover the two-bit mes- tions of these dierent system designs and we identify the sage according to map generated by Eq. (2). Thus, in the relative performance under the Pauli noise model. absence of noise, each two-bit message is faithfully trans- The remainder of the paper is organized as follows. mitted using a pure state and the capacity of each channel In Sec. 2, we review the superdense coding protocol and use is two bits. present a model for noisy transmission. In Sec. 3, we in- The idealized SDC protocol neglects several sources of troduce notation for FEC codes and provide an example noise that may be encountered in a realistic implementa- of how FEC coding aects the bit-error rate. In Sec. 4, tion. First, the preparation of the initial state shared by Al- we present numerical simulation results for FEC encoded ice and Bob may deviate from the protocol specication. SDC, and in Sec. 5 we analyze the impact of interleaving In particular, it may be represented by a nonmaximally- for protecting entangled pair states from some Pauli errors. entangled mixture of bipartite states. This deviation from Our conclusions are then presented in Sec. 6. the protocol may be due to environmental induced deco- herence of the initially pure state or to noisy preparation of the entangled pair. Second, Alice’s encoding operations 2 Noisy Superdense Coding may be faulty from imprecise application of the Pauli op- erators X, Z, and XZ. This also leads to less than maxi- mally entangled Bell states with the eect that the result- The superdense coding (SDC) protocol begins by assuming ing measurement statistics will not be perfectly correlated that users Alice and Bob share a pair of qubits prepared with the input message. Third, the transmission of sub- in a known entangled state. We will consider this state to system A from Alice to Bob may encounter channel noise belong to one of the four Bell states, that introduces errors in the amplitude and phase of the (±) 1 state. Additional possible errors include loss, whereby the |Φ i = √ (|0A , 0Bi ± |1A , 1Bi) AB 2 (1) transmitted particle is not received by Bob, and leakage, (±) 1 in which the particle is perturbed into a state not detected |ΨABi = √ (|0A , 1Bi ± |1A , 0Bi) 2 by Bob’s measurement apparatus. Superdense Coding Interleaved with Forward Error Correction Ë 3

We will consider a model of noisy SDC given by the Alice’s bits are one-sided Pauli channel  2p 2 0 0 (1 − 3 ) b0b1 = b0b1 3   2p 2p 0 0 ¯ X †  (1 − ) b b = b0b1 E(ρb) = pjOA(j)ρbOA(j) (4) 0 0 3 3 0 1 ProbDirect(b0b1|b0b1) = 2p 2p 0 0 (8) j=0 (1 − ) b b = b b¯  3 3 0 1 0 1  2  2p b0 b0 = b¯ b¯ with p0 ∈ [0, 1] and p1,2,3 ∈ [0, 1/3] constrained by 3 0 1 0 1 P pj = 1 and the operator OA(j) dened in Eq. (2). The j In this case, the BER also evaluates to quantum channel E serves as an eective model to account for a variety of noise sources including transmission noise, 2p BER = (9) state preparation noise, and detection errors. Equation (4) Direct 3 also has the property that it maps every Bell-state to a mix- Although the BER for SDC and direct transmission are ture of Bell states and, consequently, this is a covariant the same in the case of a depolarizing channel, the classi- channel with respect to the Pauli basis dened by Eq. (2). cal channel capacities are not. In particular, the classical We will limit subsequent analysis to the case p0 = 1 − p capacity for SDC in the presence of depolarizing noise has and p1 = p2 = p3 = p/3 for p ∈ [0, 1], which is known as been given previously as [9] the depolarizing noise limit for noise parameter p [18]. p While the probability to receive the incorrect quantum C (p) = 2 + (1 − p) log (1 − p) + p log (10) SDC 3 state is 1 − p0, the probability to receive the incorrect clas- sical message is slightly less. This is because the message while the corresponding capacity for a single use of direct encoded in a received Bell state will have either one, two, transmission is or no bits corrupted. Given the output state of the channel C (p) = 1 + (1 − p) log (1 − p) + p log p, (11) in Eq. (4), the probability that Bob observes the message Direct 0 b when Alice sent the message b is formally which is less than half of the former. 0 Finally, it is useful to compare the capacity for super- ProbSDC(b |b) = Tr[Π 0 E(ρ )] (5) b b dense coding with that of a 4-ary classical communica- For the depolarizing channel, the corresponding transi- tion system. Both communication methods are capable of tion probabilities are given as transmitting 4 distinct symbols, although SDC leverages the non-local correlations between Alice and Bob for this  0 0 1 − p b b = b0b1 purpose. Bennett et al. have previously shown that the ca-  0 1  p 0 0  b b = b¯0b1 pacity for both systems is the same under the symmetric Prob (b0|b) = 3 0 1 (6) SDC p 0 0 channel [9].  b b = b0b¯1  3 0 1  p 0 0 ¯ ¯  3 b0b1 = b0b1 ¯ with bj the binary conjugate of bj. The bit error rate (BER) 3 SDC with Forward Error measures the ratio of incorrect bits to the number of bits transmitted. For the one-sided SDC depolarizing channel, Correction the frequency with which the binary message is incorrectly Forward error correction (FEC) codes increase the relia- decoded is given by bility of transmission over a noisy channel by encoding 2p the message such that a transmission contains redundant BERSDC = (7) 3 information. The receiver may detect a transmission er- As a point of comparison, consider the case that Alice ror and correct it without the involvement of the sender, and Bob use direct quantum transmission instead of en- making forward error correction codes useful on simplex tanglement for communication. Alice then uses the noisy (i.e., one-way) communication channels. For a SDC chan- quantum channel twice to transmit a single qubit correctly nel, these codes are applied to the classical message be- with probability p. However, the action of the Pauli Z op- fore being encoded to quantum symbols. In addition, the erator changes only the phase of the qubit and, therefore, measured classical symbols by Bob are then decoded ac- does not lead to an incorrect bit. The corresponding tran- cording to the FEC code. An FEC code with distance d can sition probabilities for Bob to successfully recover both of detect up to (d − 1) errors in the received message and cor- rect any message with (d − 1)/2 errors or less. 4 Ë Ronald J. Sadlier and Travis S. Humble

Formally, we will represent an [n, k, d] code by the n- Table 1: Properties of FEC codes tested by-k generator matrix G, which transforms an input binary vector b into a codeword c, i.e., Coding Distance Rate No FEC 0 1 c = Gb (12) n k Repetition [n = {3, 5, 7}, k = 1] 2 n Hamming [n = 7, k = 4] 1 4 encodes k input bits into an n-bit codeword c. These n bits 7 Golay [n = 24, k = 12] 3 1 will then be transmitted pairwise using the SDC protocol. 2 If n is odd, we concatenate two consecutive codewords for transmission of a 2n-bit message. Alternatively, the code- we rst provide an example using the Hamming [7, 4, 3] word may also be padded with an extra bit. In either case, code. Consider the explicit example that Alice sends Bob consecutive bit pairs are mapped into the Bell states ac- the 4-bit message b = {1, 0, 0, 1} using the Hamming [7, cording to Eq. (2). Applying FEC to the original classical 4] code. The FEC encoder using the Hamming [7, 4] en- message increases the size of the transmitted information coding prepares the codeword c = {0, 0, 1, 1, 0, 0, 1, 0}, by a factor n/k, the inverse of the code rate. An input mes- where we have appended an extra 0 to make the codeword sage b of size 2k is encoded by FEC as the codeword vector even. These 8 bits are then sent to the quantum encoder, c of size 2n and then transmitted by the ensemble of states which translates the each pair into a Bell-state symbol, i.e., Φ(+), Ψ(−), Φ(+), and Ψ(+). n−1 Y † During transmission, each of these states will experi- ρc = OA(c2i , c2i+1)ρ0OA(c2i , c2i+1) (13) i=0 ence noise according to the probabilistic model given by Eq. (4). The eect of the noise depends on both the state where ci is the i-th bit as dened by Eq. (12). Detection of n quantum states sent by Alice leaves Bob and the error operator. For example, an X error will trans- (+) (+) with the received message d = c+e, where e represents the form Ψ to Φ and Bob’s measurement results will be error imparted by the noisy channel. Forward error correc- mapped to the bit pair (0, 0) according to Eq. (2). This bi- tion codes will permit decoding of the error provided its nary error can be corrected however using the Hamming weight (Hamming distance) is within the bound previously code. Assuming no other errors during the transmission mentioned. If so, then the error can be decoded using the of four consecutive Bell states, the complete message that parity matrix H for the [n, k, d] code, which satises Bob receives in this example is {0, 0, 1, 1, 0, 0, 0, 0}. Fol- lowing decoding of the received message, the original mes- b0 = Hd. (14) sage is recovered as {1, 0, 0, 1} and the resulting BER is 0. The FEC succeeds in this example because the single Whenever Hd ≠ 0, an error has occurred. However, the binary error resulting from corruption of the transmitted error can be identied only if the weight is less than the quantum codeword is correctable when using the Ham- distance of the code. Thus, the probability for a given bit ming code. Similarly, any other weight-one binary error in pair to be correctly decoded is given by the number of ways the message can be corrected following measurement of in which a correctable error may be received by Bob. the complete encoded message. However, weight-two and For example, an FEC code with distance d = 3 corrects higher binary errors cannot be corrected by the Hamming up to a single error in the received codeword. From Eq. (6), code. Moreover, these errors may be mistakenly character- the corresponding probability that the original message is ized as weight-one errors and the resulting attempt to cor- correctly received following error correction under the de- rect the message will corrupt it further. It is notable that polarizing channel is the bit error rate (BER) the binary errors in the received message trace back to the 2p quantum noise operations that act on the transmitted Bell BER = (1 − p)n + (1 − p)(n−1), (15) SDC 3 state. which measures the number of incorrectly decoded code- words. The BER is useful for assessing the impact of the FEC as it measures errors remaining after error correc- 4 Numerical Simulations of Noisy tion. It also permits errors to be isolated to the individ- ual codewords that contain them. We have tested the per- SDC Transmission formance of SDC when using several dierent FEC codes Numerical simulations of the noisy SDC transmission to protect against depolarizing noise. We will present nu- model presented in Sec. 2 were used to investigate the in- merical results of these studies in the next section but Superdense Coding Interleaved with Forward Error Correction Ë 5

We use a numerical simulator that takes advantage of the algebraic structure of both the Bell states and the Pauli channel for noisy transmission. In particular, we model Bob’s detectors as projective measurements in the Bell ba- sis as given by Eq. (5). These measurements are there- fore equivalent to sampling of the Pauli channel. We then Figure 1: (top) Alice’s qitkat application implements FEC and SDC use a Monte Carlo method to sample the simulated trans- encoding steps before pushing data to the middleware layer to mission and chose a specic outcome for each measure- transmit the specied Bell states. (bottom) Similarly, Bob’s applica- ment. The sampling is biased according to the error rates tion gets measurement results from the receiver middleware layer {px , py , pz} with random instances drawn using a pseudo- and performs the SDC and FEC decoding operations. random number generator. For the symmetric depolariz- ing noise, we consider the noise parameter p within the uence of FEC codes on BER. We use the QITAKT frame- range [0, 0.1] as suggested by recent experimental results work for software-dened quantum communication sys- [22]. tems that has been presented previously [16]. Briey, the We calculate the BER after simulated transmission by QITKAT library is an extension of the GNU Radio real- performing a comparison between the decoded bit stream time signal processing framework that adds primitives for and the original input message. We use a nominal input applications. The GNU Radio frame- of approximately 1 million bits, where slight adjustments work provides a run-time manager and a large variety of are made to accommodate the number of bits required per conventional communication methods that can be easily classical FEC symbol. The baseline case of SDC transmis- integrated into a graphical work ow and deployed to in- sion through the depolarizing noise channel with no FEC teract with hardware components [20]. We leverage the coding is shown in Fig. 2 alongside the case of direct quan- GNU Radio framework using the QITKAT library to con- tum transmission. As expected from our earlier results, the struct quantum communication applications that can be rate at which errors occur is the the same for both proto- either deployed directly to hardware or simulated using cols. numerical methods [21]. In the present study, we use nu- merical simulation methods to investigate the behavior FEC codes under the Pauli noise model. Example QITKAT applications are shown for Alice and Bob in Fig. 1. These applications represent pre-processing steps that prepare messages to be sent to the communi- cation middleware layer. For Alice’s application, an input le source feeds a stream of bits to the FEC code block (the repetition code is shown in the example). The out- put from the FEC encoder passes through the SDC encoder, which converts each pair of consecutive bits to a transmis- sion symbol that is then sent to the quantum transmitter. The quantum transmitter consists of both hardware that prepares and measures the entangled quantum states as well as middleware that manages these processes. In our case studies, we have replaced hardware instances with a numerical simulator that interprets the middleware con- trol signals and prepares a numerical representation of the [16]. The simulator uses a model of the quantum channel to generate a representation of the mea- surement results that is observed by Bob’s receiver. The re- Figure 2: BER average versus noise parameter p for non-FEC en- ceiver middleware interprets the measurement results and coded transmissions through a depolarizing channel. Points cor- performs decoding of the transmission. As shown in Fig. 1, respond to single-sided superdense coding (SDC) and direct trans- the decoding steps mirror the encoding performed by Al- missions of single qubits. ice. 6 Ë Ronald J. Sadlier and Travis S. Humble

In comparison, simulation results for the average of and the presence of correlated errors can undermine per- FEC encoded transmissions are presented in Fig. 3. These formance. This under performance results in a higher BER curves show distinct behavior for the three types of FEC than arises for direct transmission, which cannot incur codes considered in Table 1, which all perform better than such correlated errors. the unencoded transmission schemes. The Golay code, which can correct up to weight-3 errors, performs the best when transmitting by SDC. However, there is a crossover 5 Interleaving with the direction transmission scheme using a repetition code. The Hamming code produces a similar curve for both In classical communication, data interleaving is fre- SDC and direct transmission. Scatter in the plots for small quently used to mitigate against correlated errors, also values of p are due to the increases in BER variance that known as burst errors. Prior to transmission, binary ele- arise from nite sampling. ments of codewords output from the FEC encoder are in- terleaved with respect to transmission order while the re- ceived symbols are deinterleaved in the reverse order. Al- though burst errors still occur during transmission, any correlated errors are eectively dispersed across the mul- tiple, interleaved codewords. As an example of interleaving, consider a two-bit input message {b0, b1} protected by a repetition [3, 1] code. Encoding generates the binary string c = {b0, b0, b0, b1, b1, b1} which maps to the joint quantum state ⊗ ⊗ ρc = ρ(b0 ,b0) ρ(b0 ,b1) ρ(b1 ,b1) (16) The simulation of transmission of this sequence using SDC through the depolarizing channel samples all 64 possible combinations of Pauli noise operators. After detection and decoding, the resulting BER is 1 7 2 BER = p + p2 + p3 (17) [3,1] 3 18 27 which has a leading order term that is linear in the noise parameter p. Figure 3: BER averages versus noise parameter p for FEC-encoded, We contrast this non-interleaved result with a trans- non-interleaved transmission with either SDC or direct transmis- sion. Curves correspond to Hamming [7,4], Golay [24,12], and repe- mission scheme in which the output of the encoder is in- tition [3,1] codes. terleaved. In the current example, we will consider an in- terleaving pattern that alternates between the rst and sec- ond codewords, i.e., we prepare the interleaved binary se- In Fig. 3, the behavior of the SDC and direct communi- 0 quence c = {b0, b1, b0, b1, b0, b1}, which is mapped into cation schemes are notably dierent even though they are the joint quantum state both subject to the same noisy channel parameters. The reason for this dierence traces back to the eect of the 0 ⊗ ⊗ ρc = ρ(b0 ,b1) ρ(b0 ,b1) ρ(b0 ,b1) (18) Pauli noise operators on the Bell states. In particular, the transmission of FEC codewords under depolarizing noise Although the noisy channel operator is the same, the prob- is susceptible to binary errors with weight greater than 1. ability for a burst error is greatly decreased by the inter- For the single-sided Pauli noise mode, these errors arise leaving and the overall BER is when a transmitted Bell-state symbol is mapped into its 4 16 BERinterleaved = p2 − p3 (19) exact opposite in terms of the 4-ary encoding. Moreover, [3,1] 3 27 these Pauli error operators yield correlated bit errors with respect to the subsequent decoding. However, many FEC In particular, the leading order term is now quadratic in codes work best with an independent random error model the noise parameter p, which is an improvement over the non-interleaved results. Comparative plots of the BER for Superdense Coding Interleaved with Forward Error Correction Ë 7

Figure 4: BER average versus noise parameter p for repetition en- Figure 5: BER average versus noise parameter p for FEC-encoded, coded transmission with and without interleaving. The non-FEC interleaved SDC transmission. Points correspond to FEC using Ham- encoded transmission is plotted for comparison. ming [7,4], Golay [24,12], and repetition [3,1] codes. interleaved and non-interleaved cases are shown in Fig. 5. found to be 2p/3 with p the channel error rate. However, the eectiveness of the error correction depends subtly on We also present results for the BER obtained using in- the specic encoding and interleaving method used dur- terleaving for the Hamming and Golay codes in Fig. 5. ing transmission. For example, when X errors on a trans- mitted entangled state lead to single-bit errors then Z er- rors will yield weight-two errors on the classical message. 6 Conclusion The relative signicance of these errors depends not only on the distance of the FEC code but also the position of the errors in the codeword. We have shown that interleaving We have presented a numerical study of how classical for- is eective for mitigating against those higher-weight er- ward error correction techniques can be used with super- rors that would otherwise lead to uncorrectable states of dense coding. We have calculated the bit error rates for the code. one-sided SDC using a Pauli channel model. Our simu- Our use of classical FEC was motivated by a need to lations show the relative change in the BER when using improve the reliability of quantum communication. While Hamming, Golay, and repetition codes for both direct and future QEC codes are likely to oer more error correction superdense coding transmissions with respect to channel benets, they will also require higher dimensional entan- noise. These results are explained in terms of the varying gled quantum resources. Current limitations on quantum distance of the FEC codes as well as the correlated noise state preparation represent a bottleneck for using QEC to that arises within the context of superdense coding. We improve the quality of service in quantum communication have studied how to mitigate the inuence of the corre- systems. We have shown that FEC codes with proper in- lated errors by using interleaving, in which reordering of terleaving oers an eective method that may be imme- the transmitted data is found to improve the ability of the diately employed with existing quantum communication code to protect against noise. This is shown to be due to the hardware. We expect follow-on studies of other FEC codes combined eects of Pauli errors on FEC codewords and the will prove especially interesting for quantum communica- decoding method. tion systems, including polar codes for eciency and era- Our results for the BER conrm the behavior expected sure codes for additional noise models. for the entangled channel in the presence of isotropic Pauli More generally, future applications for FEC in quan- noise, i.e., depolarizing noise. The eective bit-error rate is tum communication include superdense coding as well 8 Ë Ronald J. Sadlier and Travis S. Humble as , especially in the context [8] B.-H. Liu, X.-M. Hu, Y.-F. Huang, C.-F. Li, G.-C. Guo, A. Karlsson, of multi-user communication networks that may require E.-M. Laine, S. Maniscalco, C. Macchiavello, and J. Piilo, Euro- codes specialized to dierent channel modes [23]. The FEC physics Letters, 114, 10005 (2016) methods may also be useful for improving the detection of [9] C. H. Bennett, P. W. Shor, J. A. Smolin, and A. V. Thapliyal, Phys. Rev. Lett. 83, 3081 (1999). unmodulated states in tamper-indicating quantum seals [10] Z. Shadman, H. Kampermann, C. Macchiavello, and D. Bruß, [24]. However, we must expect that QEC codes will ulti- New J. Phys. 12, 073042 (2010). mately be necessary for any full-scale - [11] Z. Shadman, H. Kampermann, D. Bruß, and C. Macchiavello, ing environment. Protocols that do not communicate clas- Phys. Rev. A 84, 042309 (2011). sical information should perform better with QEC than [12] Z. Shadman, H. Kampermann, C. Macchiavello, and D. Bruß, Quantum Meas. Quantum Metrol. 1, 21 (2013). with FEC, since only QEC can be used to correct errors [13] F. Gaitan, and fault tolerant quantum in the quantum state itself. This includes applications in computing (CRC Press, 2008). multi-user quantum communication protocols that tele- [14] T. B. Pittman, B. C. Jacobs, and J. D. Franson, Phys. Rev. A 71, port quantum information [25–27] or swap entanglement 052332 (2005). between communication channels [28]. A promising ap- [15] B. A. Bell, D. A. Herrera-Martí, M. S. Tame, D. Markham, W. J. 5 proach to reconguring networks between FEC and QEC Wadsworth, and J. G. Rarity, Nat. Comm. (2014). [16] T. S. Humble and R. J. Sadlier, Opt. Eng. 53, 086103 (2014). encoding methods is to exploit programmable nodes [29], [17] C. Boyd, R.-A. Pitaval, U. Parts, and O. Tirkkonen, in Communi- in which the error correction scheme is determined by an cations (ICC), 2015 IEEE International Conference on (2015) pp. external application based on channel diagnostics. 4060–4065. [18] M. A. Nielsen and I. L. Chuang, Quantum Computation and Acknowledgement: This work was supported by the De- Quantum Information: 10th Anniversary Edition (Cambridge Uni- versity Press, 2011). fense Threat Reduction Agency Basic Research, the Army [19] A. Barenco and A. K. Ekert, J. Mod. Opt. 42, 1253 (1995). Research Laboratory, and the Department of Energy HERE [20] GNU Radio Website. www.gnuradio.org. (accessed June 2015) . program. This manuscript has been authored by UT- [21] R. C. Pooser, D. D. Earl, P. G. Evans, B. Williams, J. Schaake, and Battelle, LLC, under Contract No. DE-AC0500OR22725 with T. S. Humble, J. Mod. Opt. 59, 1500 (2012). the U.S. Department of Energy. The United States Gov- [22] C. Schuck, G. Huber, C. Kurtsiefer, and H. Weinfurter, Phys. Rev. 96 ernment retains and the publisher, by accepting the arti- Lett. , 190501 (2006). [23] W. Grice, R. Bennink, D. Earl, P. Evans, T. Humble, R. Pooser, cle for publication, acknowledges that the United States J. Schaake, and B. Williams, in SPIE Optical Engineering+ Ap- Government retains a non-exclusive, paid-up, irrevocable, plications (International Society for Optics and Photonics, 2011) world-wide license to publish or reproduce the published pp. 81630B–81630B. form of this manuscript, or allow others to do so, for the [24] B. P. Williams, K. A. Britt, and T. S. Humble, Phys. Rev. Appl. 5, United States Government purposes. The Department of 014001 (2016). [25] T. S. Humble, Phys. Rev. A 81, 062339 (2010). Energy will provide public access to these results of feder- [26] T. S. Humble, in SPIE Defense, Security, and Sensing (Inter- ally sponsored research in accordance with the DOE Public national Society for Optics and Photonics, 2011) pp. 80570J– Access Plan. 80570J. [27] T. S. Humble, R. S. Bennink, and W. P. Grice, J. Mod. Opt. 58, 288 (2011). [28] T. S. Humble and W. P. Grice, Phys. Rev. A 77, 022312 (2008). References [29] V. R. Dasari and T. S. Humble, arXiv:1512.08545 (2015).

[1] S. Imre and F. Balazs, Quantum Computing and Communica- tions: an engineering approach (John Wiley & Sons, 2005). [2] M. M. Wilde, Quantum information theory (Cambridge Univer- sity Press, 2013). [3] C. H. Bennett and S. J. Wiesner, Phys. Rev. Lett. 69, 2881 (1992). [4] K. Mattle, H. Weinfurter, P.G. Kwiat, and A. Zeilinger, Phys. Rev. Lett. 76, 4656 (1996). [5] X. Li, Q. Pan, J. Jing, J. Zhang, C. Xie, and K. Peng, Phys. Rev. Lett. 88, 047904 (2002). [6] J. T. Barreiro, T.-C. Wei, and P. G. Kwiat, Nature Phys. 4, 282 (2008). [7] A. Chiuri, S. Giacomini, C. Macchiavello, and P. Mataloni, Phys. Rev. A 87, 022333 (2013).