Basic Probability Theory A

Total Page:16

File Type:pdf, Size:1020Kb

Basic Probability Theory A Basic Probability Theory A In order to follow many of the arguments in these notes, especially when talking about entropies, it is necessary to have some basic knowledge of probability theory. Therefore, we review here the most important tools of probability theory that are used. One of the basic notions of probability theory that also frequently appears throughout these notes is that of a discrete random variable. A random variable X can take one of several values, the so-called realizations x,givenbythealphabet X. The probability that a certain realization x ∈ X occurs is given by the probability distribution pX(x). We usually use upper case letters to denote the random variable, lower case letters to denote realizations thereof, and calligraphic letters to denote the alphabet. Suppose we have two random variables X and Y , which may depend on each other. We can then define the joint probability distribution pX,Y (x, y) of X and Y that tells you the probability that Y = y and X = x. This notion (and the following definition) can be expanded to n random variables, but we restrict ourselves to the case of pairs X, Y here to keep the notation simple. Given the joint probability distribution of the pair X, Y , we can derive the marginal distribution PX(x) by pX(x) = pX,Y (x, y) ∀ x ∈ X (A.1) y∈Y and analogously for PY (y). The two random variables X and Y are said to be independent if pX,Y (x, y) = pX(x)pY (y). (A.2) © The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 219 R. Wolf, Quantum Key Distribution, Lecture Notes in Physics 988, https://doi.org/10.1007/978-3-030-73991-1 220 A Basic Probability Theory Furthermore, we can define the conditional probability that Y takes the value y ∈ Y, given that X takes the value x ∈ X: pX,Y (x, y) pY |X(y|x) = . (A.3) pX(x) To avoid complications, we use the convention that pX,Y (x, y) = 0ifpX(x) = 0. If X and Y are independent, pY |X(x|y) = pY (y) for all y ∈ Y. Using the definition of the conditional probability, (A.1) can be rewritten as pX(x) = pX|Y (x|y)pY (y) ∀ x ∈ X. (A.4) y∈Y In this form it is also called the law of total probability. Another important rule that relates different conditional probabilities is Bayes’ rule: pX(x) pX|Y (x|y) = pY |X(y|x) . (A.5) pY (y) This rule can be proved as follows: Note that (A.3) can be rewritten as pX,Y (x, y) = pY |X(y|x)pX(x). (A.6) It follows that pX,Y (x, y) pX(x) pX|Y (x|y) = = pY |X(y|x) . (A.7) pY (y) pY (y) Calderbank–Shor–Steane Codes B Calderbank–Shor–Steane (CSS) codes are a large class of quantum error cor- rection codes that exploit ideas from classical linear error correction codes. In entanglement-based QKD protocols, they can be used to correct errors that occur during the distribution of entangled states. B.1 Classical Linear Codes Before we can understand CSS codes, we need to make a short detour into the theory of classical linear codes. A linear code C that encodes k bits into an n bit code space (with n>k)isasetof2k codewords, where each codeword is a binary vector of length n. We call such a code an [n, k] code. It is specified by a n × k generator matrix G with elements in {0, 1}. G maps messages to their equivalent in the code space, for instance, a k bit message x (which is represented by a column vector) is encoded as y = Gx. Note that all arithmetic operations (especially multiplications and additions) are done modulo 2. As a simple example, consider the [3, 1] repetition code that encodes 1 bit messages into three copies of them: 0 is mapped to (0, 0, 0)T and 1 is mapped to (1, 1, 1)T . Hence, the generator matrix G is ⎛ ⎞ 1 G = ⎝1⎠ . (B.1) 1 To connect this definition of classical codes to error correction, we have to introduce a different formulation of linear codes, the parity check matrices. In this formulation, an [n, k] code is defined as all vectors x of length n with entries from {0, 1} such that Hx = 0, (B.2) © The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 221 R. Wolf, Quantum Key Distribution, Lecture Notes in Physics 988, https://doi.org/10.1007/978-3-030-73991-1 222 B Calderbank–Shor–Steane Codes where H is an (n − k) × n matrix with entries in {0, 1} called the parity check matrix. To construct the parity matrix H from a generator matrix G, one has to pick out n − k linearly independent vectors orthogonal to the columns of G.The corresponding parity check matrix for the [3, 1] repetition code with G given in (B.1)isthen 110 H = . (B.3) 011 In the language of parity check matrices, it is quite easy to see how error detection and correction work. Suppose we have a message x that we encode as y = Gx.If an error e occurs, the codeword y is transformed into the corrupted codeword y = y + e. Because Hy = 0 for all codewords y, it follows that Hy = Hy+ He = He. This is called the error syndrome. If the syndrome is 0, we know that no error has occurred. Otherwise, it contains information about the error because of the way the parity check matrix H was constructed. In the example of the [3, 1] repetition code, every codeword has a length of 3 bits. Therefore, errors can occur at three different positions. Denote by ei an error in the ith bit, i.e., a vector with a 1 at position i. Then for all codewords y,wehave that Hy = Hei; hence, the three different syndromes are 1 0 1 He = ,He= ,He= . (B.4) 1 0 2 1 3 1 This makes it possible to read off the position of the error from the syndromes. Note that this procedure is only successful if we know that an error has occurred for at most one bit. Hence, the [3, 1] repetition code can correct one error. More general linear error correction codes can be obtained using the concepts of Hamming distance. The Hamming distance d(x,y) between two binary vectors x and y is defined as the number of positions in which the two bit strings differ. For example, d((1, 1, 0, 0)T ,(1, 0, 0, 1)T ) = 2, because the vectors differ in the 2nd and 4th positions. Error correction now works as follows: suppose we have a codeword y = Gx that is corrupted such that the resulting vector is y = y + e.If 1 the probability that an error occurs is less than 2 , the most likely codeword to have been encoded is the one that minimizes the Hamming distance to y, i.e., d(y,y), since this is the one with the least amount of bit flips. How many errors can such a code correct? This can also be analysed in terms of the Hamming distance: We define the distance of a code C to be the minimum Hamming distance between any of its codewords: d(C) = min d(x,y). (B.5) x,y∈C, x=y We use the notation d = d(C) and call C an [n, k, d] code. With a little bit of thinking one can see that a code with distance 2t + 1 for some integer t can be used B Calderbank–Shor–Steane Codes 223 to correct up to t errors, simply by decoding the corrupted message y as the unique codeword y that satisfies d(y,y) ≤ t. If more than t errors occur, this codeword is no longer unique and therefore, errors cannot be reliably detected and corrected. The last concept we need from classical linear codes is duality. Suppose we have a linear [n, k] code C with generator matrix G and parity check matrix H . We can then construct another code, the dual code C⊥ of C, which consists of all codewords that are orthogonal to each codeword in C. Hence, the generator matrix of the dual code is H T and its parity check matrix is GT . B.2 Quantum Error Correction In the quantum case, the situation is a bit more complicated. Where in the classical case only one type of error is possible (namely the bit flip error), a qubit can undergo three different types of errors: a bit flip, which changes |0 to |1 and |1 to |0,a phase error, which maps |1 to −|1 but leaves |0 unchanged, and a combination of the two, which maps |0→−|1 and |1→|0. The Calderbank–Shor–Steane (CSS) code is now defined as follows: Suppose we have two classical linear error correction codes, an [n, k1] code C1 and an [n, k2] ⊂ ⊥ code C2 such that C2 C1 and C1 and C2 both correct up to t errors. Using these two classical codes we can define a quantum error correction code, the CSS code of C1 over C2, denoted CSS(C1,C2).Itisan[n, k1 − k2] quantum code that is capable of correcting errors on up to t qubits. The construction works as follows: for any codeword x ∈ C1, we define the quantum state 1 |x + C2=√ |x + y, (B.6) |C2| y∈C2 where + is the bitwise addition modulo 2 and |C2| denotes the cardinality of C2 k (which is 2 2 , since this is the number of codewords of C2).
Recommended publications
  • A New Family of Fault Tolerant Quantum Reed-Muller Codes
    Clemson University TigerPrints All Theses Theses December 2020 A New Family of Fault Tolerant Quantum Reed-Muller Codes Harrison Beam Eggers Clemson University, [email protected] Follow this and additional works at: https://tigerprints.clemson.edu/all_theses Recommended Citation Eggers, Harrison Beam, "A New Family of Fault Tolerant Quantum Reed-Muller Codes" (2020). All Theses. 3463. https://tigerprints.clemson.edu/all_theses/3463 This Thesis is brought to you for free and open access by the Theses at TigerPrints. It has been accepted for inclusion in All Theses by an authorized administrator of TigerPrints. For more information, please contact [email protected]. A New Family of Fault Tolerant Quantum Reed-Muller Codes A Thesis Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Master of Science Mathematics by Harrison Eggers December 2020 Accepted by: Dr. Felice Manganiello, Committee Chair Dr. Shuhong Gao Dr. Kevin James Abstract Fault tolerant quantum computation is a critical step in the development of practical quan- tum computers. Unfortunately, not every quantum error correcting code can be used for fault tolerant computation. Rengaswamy et. al. define CSS-T codes, which are CSS codes that admit the transversal application of the T gate, which is a key step in achieving fault tolerant computation. They then present a family of quantum Reed-Muller fault tolerant codes. Their family of codes admits a transversal T gate, but the asymptotic rate of the family is zero. We build on their work by reframing their CSS-T conditions using the concept of self-orthogonality.
    [Show full text]
  • Fault-Tolerant Quantum Gates Ph/CS 219 2 February 2011
    Fault-tolerant quantum gates Ph/CS 219 2 February 2011 Last time we considered the requirements for fault-tolerant quantum gates that act nontrivially on the codespace of a quantum error-correcting code. In the special case of a code that corrects t=1 error, the requirements are: -- if the gate gadget is ideal (has no faults) and its input is a codeword, then the gadget realizes the encoded operation U acting on the code space. -- if the gate gadget is ideal and its input has at most one error (is one-deviated from the codespace), then the output has at most one error in each output block. -- if the gate has one fault and its input has no errors, then the output has at most one error in each block (the errors are correctable). We considered the Clifford group, the finite subgroup of the m-qubit unitary group generated by the Hadamard gate H, the phase gate P (rotation by Pi/2 about the z-axis) and the CNOT gate. For a special class of codes, the generators of the Clifford group can be executed transversally (i.e., bitwise). The logical U can be done by applying a product of n U (or inverse of U) gates in parallel (where n is the code's length). If we suppose that the number of encoded qubits is k=1, then: -- the CNOT gate is transversal for any CSS code. -- the H gate is transversal for a CSS code that uses the same classical code to correct X errors and Z errors.
    [Show full text]
  • Security of Quantum Key Distribution with Multiphoton Components
    Security of quantum key distribution with multiphoton components 1,2, 1,2, 1,2 1,2 Hua-Lei Yin ∗, Yao Fu ∗, Yingqiu Mao & Zeng-Bing Chen 1Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026, China 2The CAS Center for Excellence in QIQP and the Synergetic Innovation Center for QIQP, Uni- versity of Science and Technology of China, Hefei, Anhui 230026, China ∗ These authors contributed equally to this work. Correspondence and requests for materials should be addressed to H.-L.Y. (email: [email protected]) or Z.-B.C. (email: [email protected]) Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin- Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be ex- tracted from the two-photon component by modifying the classical post-processing proce- dure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four arXiv:1607.02366v1 [quant-ph] 8 Jul 2016 photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three- photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works.
    [Show full text]
  • Arxiv:2104.09539V1 [Quant-Ph] 19 Apr 2021
    Practical quantum error correction with the XZZX code and Kerr-cat qubits Andrew S. Darmawan,1, 2 Benjamin J. Brown,3 Arne L. Grimsmo,3 David K. Tuckett,3 and Shruti Puri4, 5 1Yukawa Institute for Theoretical Physics (YITP), Kyoto University, Kitashirakawa Oiwakecho, Sakyo-ku, Kyoto 606-8502, Japan∗ 2JST, PRESTO, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012, Japan 3Centre for Engineered Quantum Systems, School of Physics, University of Sydney, Sydney, New South Wales 2006, Australia 4 Department of Applied Physics, Yale University, New Haven, Connecticut 06511, USAy 5Yale Quantum Institute, Yale University, New Haven, Connecticut 06511, USA (Dated: April 21, 2021) The development of robust architectures capable of large-scale fault-tolerant quantum computa- tion should consider both their quantum error-correcting codes, and the underlying physical qubits upon which they are built, in tandem. Following this design principle we demonstrate remarkable error correction performance by concatenating the XZZX surface code with Kerr-cat qubits. We contrast several variants of fault-tolerant systems undergoing different circuit noise models that reflect the physics of Kerr-cat qubits. Our simulations show that our system is scalable below a threshold gate infidelity of pCX 6:5% within a physically reasonable parameter regime, where ∼ pCX is the infidelity of the noisiest gate of our system; the controlled-not gate. This threshold can be reached in a superconducting circuit architecture with a Kerr-nonlinearity of 10MHz, a 6:25 photon cat qubit, single-photon lifetime of > 64µs, and thermal photon population < 8%.∼ Such parameters are routinely achieved in superconducting∼ circuits. ∼ I. INTRODUCTION qubit [22, 34, 35].
    [Show full text]
  • Quantum Error-Correcting Codes by Concatenation QEC11
    Quantum Error-Correcting Codes by Concatenation QEC11 Second International Conference on Quantum Error Correction University of Southern California, Los Angeles, USA December 5–9, 2011 Quantum Error-Correcting Codes by Concatenation Markus Grassl joint work with Bei Zeng Centre for Quantum Technologies National University of Singapore Singapore Markus Grassl – 1– 07.12.2011 Quantum Error-Correcting Codes by Concatenation QEC11 Why Bei isn’t here Jonathan, November 24, 2011 Markus Grassl – 2– 07.12.2011 Quantum Error-Correcting Codes by Concatenation QEC11 Overview Shor’s nine-qubit code revisited • The code [[25, 1, 9]] • Concatenated graph codes • Generalized concatenated quantum codes • Codes for the Amplitude Damping (AD) channel • Conclusions • Markus Grassl – 3– 07.12.2011 Quantum Error-Correcting Codes by Concatenation QEC11 Shor’s Nine-Qubit Code Revisited Bit-flip code: 0 000 , 1 111 . | → | | → | Phase-flip code: 0 + ++ , 1 . | → | | → | − −− Effect of single-qubit errors on the bit-flip code: X-errors change the basis states, but can be corrected • Z-errors at any of the three positions: • Z 000 = 000 | | “encoded” Z-operator Z 111 = 111 | −| = Bit-flip code & error correction convert the channel into a phase-error ⇒ channel = Concatenation of bit-flip code and phase-flip code yields [[9, 1, 3]] ⇒ Markus Grassl – 4– 07.12.2011 Quantum Error-Correcting Codes by Concatenation QEC11 The Code [[25, 1, 9]] The best single-error correcting code is = [[5, 1, 3]] • C0 Re-encoding each of the 5 qubits with yields = [[52, 1, 32]]
    [Show full text]
  • Quantum Key Distribution Protocols and Applications
    Quantum Key Distribution Protocols and Applications Sheila Cobourne Technical Report RHUL{MA{2011{05 8th March 2011 Department of Mathematics Royal Holloway, University of London Egham, Surrey TW20 0EX, England http://www.rhul.ac.uk/mathematics/techreports Title: Quantum Key Distribution – Protocols and Applications Name: Sheila Cobourne Student Number: 100627811 Supervisor: Carlos Cid Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished works of other people. I declare that I have also read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences and in accordance with it I submit this project report as my own work. Signature: Date: Acknowledgements I would like to thank Carlos Cid for his helpful suggestions and guidance during this project. Also, I would like to express my appreciation to the lecturers at Royal Holloway who have increased my understanding of Information Security immensely over the course of the MSc, without which this project would not have been possible. Contents Table of Figures ................................................................................................... 6 Executive Summary ............................................................................................. 7 Chapter 1 Introduction ...................................................................................
    [Show full text]
  • Graphical and Programming Support for Simulations of Quantum Computations
    AGH University of Science and Technology in Kraków Faculty of Computer Science, Electronics and Telecommunications Institute of Computer Science Master of Science Thesis Graphical and programming support for simulations of quantum computations Joanna Patrzyk Supervisor: dr inż. Katarzyna Rycerz Kraków 2014 OŚWIADCZENIE AUTORA PRACY Oświadczam, świadoma odpowiedzialności karnej za poświadczenie nieprawdy, że niniejszą pracę dyplomową wykonałam osobiście i samodzielnie, i nie korzystałam ze źródeł innych niż wymienione w pracy. ................................... PODPIS Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie Wydział Informatyki, Elektroniki i Telekomunikacji Katedra Informatyki Praca Magisterska Graficzne i programowe wsparcie dla symulacji obliczeń kwantowych Joanna Patrzyk Opiekun: dr inż. Katarzyna Rycerz Kraków 2014 Acknowledgements I would like to express my sincere gratitude to my supervisor, Dr Katarzyna Rycerz, for the continuous support of my M.Sc. study, for her patience, motivation, enthusiasm, and immense knowledge. Her guidance helped me a lot during my research and writing of this thesis. I would also like to thank Dr Marian Bubak, for his suggestions and valuable advices, and for provision of the materials used in this study. I would also thank Dr Włodzimierz Funika and Dr Maciej Malawski for their support and constructive remarks concerning the QuIDE simulator. My special thank goes to Bartłomiej Patrzyk for the encouragement, suggestions, ideas and a great support during this study. Abstract The field of Quantum Computing is recently rapidly developing. However before it transits from the theory into practical solutions, there is a need for simulating the quantum computations, in order to analyze them and investigate their possible applications. Today, there are many software tools which simulate quantum computers.
    [Show full text]
  • Universal Quantum Computation with Ideal Clifford Gates and Noisy Ancillas
    PHYSICAL REVIEW A 71, 022316 ͑2005͒ Universal quantum computation with ideal Clifford gates and noisy ancillas Sergey Bravyi* and Alexei Kitaev† Institute for Quantum Information, California Institute of Technology, Pasadena, 91125 California, USA ͑Received 6 May 2004; published 22 February 2005͒ We consider a model of quantum computation in which the set of elementary operations is limited to Clifford unitaries, the creation of the state ͉0͘, and qubit measurement in the computational basis. In addition, we allow the creation of a one-qubit ancilla in a mixed state ␳, which should be regarded as a parameter of the model. Our goal is to determine for which ␳ universal quantum computation ͑UQC͒ can be efficiently simu- lated. To answer this question, we construct purification protocols that consume several copies of ␳ and produce a single output qubit with higher polarization. The protocols allow one to increase the polarization only along certain “magic” directions. If the polarization of ␳ along a magic direction exceeds a threshold value ͑about 65%͒, the purification asymptotically yields a pure state, which we call a magic state. We show that the Clifford group operations combined with magic states preparation are sufficient for UQC. The connection of our results with the Gottesman-Knill theorem is discussed. DOI: 10.1103/PhysRevA.71.022316 PACS number͑s͒: 03.67.Lx, 03.67.Pp I. INTRODUCTION AND SUMMARY additional operations ͑e.g., measurements by Aharonov- Bohm interference ͓13͔ or some gates that are not related to The theory of fault-tolerant quantum computation defines topology at all͒. Of course, these nontopological operations an important number called the error threshold.
    [Show full text]
  • Intercept-Resend Attack on SARG04 Protocol: an Extended Work
    Polytechnic Journal. 2020. 10(1): 88-92 ISSN: 2313-5727 http://journals.epu.edu.iq/index.php/polytechnic RESEARCH ARTICLE Intercept-Resend Attack on SARG04 Protocol: An Extended Work Ali H. Yousif*, Omar S. Mustafa, Dana F. Abdulqadir, Farah S. Khoshaba Department of Information System Engineering, Erbil Technical Engineering College, Erbil Polytechnic University, Erbil, Kurdistan Region, Iraq *Correspondence author: ABSTRACT Ali H. Yousif, Department of Information In this paper, intercept/resend eavesdropper attack over SARG04 quantum key distribution protocol is System Engineering, investigated by bounding the information of an eavesdropper; then, the attack has been analyzed. In Erbil Technical Engineering 2019, simulation and enhancement of the performance of SARG04 protocol have been done by the College, Erbil Polytechnic same research group in terms of error correction stage using multiparity rather than single parity (Omar, University, Erbil, Kurdistan 2019). The probability of detecting the case in the random secret key by eavesdropper is estimated. Region, Iraq, The results of intercept/resend eavesdropper attack proved that the attack has a significant impact E-mail: [email protected] on the operation of the SARG04 protocol in terms of the final key length. Received: 28 October 2019 Keywords: Eavesdropper; Intercept-resend; IR; Quantum; SARG04 Accepted: 05 February 2020 Published: 30 June 2020 DOI 10.25156/ptj.v10n1y2020.pp88-92 INTRODUCTION promises to revolutionize secure communication using the key distribution. Nowadays, the information security is the most important concern of people and entity. One of the main issues Quantum key distribution (QKD) enables two parties to of practical quantum communication is the information establish a secure random secret key depending on the security under the impact of disturbances or quantum principles of quantum mechanics.
    [Show full text]
  • Gr Qkd 003 V2.1.1 (2018-03)
    ETSI GR QKD 003 V2.1.1 (2018-03) GROUP REPORT Quantum Key Distribution (QKD); Components and Internal Interfaces Disclaimer The present document has been produced and approved by the Group Quantum Key Distribution (QKD) ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. 2 ETSI GR QKD 003 V2.1.1 (2018-03) Reference RGR/QKD-003ed2 Keywords interface, quantum key distribution ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Introduction to Quantum Error Correction
    Introduction to Quantum Error Correction Gilles Zémor Nomade Lodge, May 2016 1 Qubits, quantum computing 1.1 Qubits A qubit is a mathematical description of a particle, e.g. a photon, it is a vector of unit norm in a Hilbert space H of dimension 2. It is customary to give oneself a basis of this space, that is written in Dirac notation (j0i; j1i) rather than the usual mathematical notation (e0; e1). A qubit is therefore a quantity expressed as αj0i + βj1i with jαj2 + jβj2 = 1. The physical state of n particles is described by a vector in the Hilbert space H⊗n, which consists of all complex linear combinations of products jx1i⊗jx2i⊗· · ·⊗jxni, where jxii ranges over the two basis vectors of the i-th copy of the Hilbert space H. Typically one uses the convention xi 2 f0; 1g and the basis vectors of the 2n-dimensional complex vector space H⊗n are written, to lighten notation as jx1ijx2i · · · jxni or simply as jx1x2 : : : xni: This basis of H⊗n will be referred to as the computational basis. Quantum states are described by vectors of unit norm in H⊗n. Quantum states are also not changed by multiplication by a complex number of modulus 1, so that strictly speaking quantum states are unit vectors of H⊗n modulo the multiplicative group of complex numbers of unit norm. Unitary transformations. A quantum state j i may be changed into another quantum state j 0i by any unitary transformation U of the Hilbert space H⊗n. A unitary transformation is an operator of H⊗n that preserves the hermitian inner product.
    [Show full text]
  • A Decoding Algorithm for CSS Codes Using the X/Z Correlations Nicolas Delfosse, Jean-Pierre Tillich
    A decoding algorithm for CSS codes using the X/Z correlations Nicolas Delfosse, Jean-Pierre Tillich To cite this version: Nicolas Delfosse, Jean-Pierre Tillich. A decoding algorithm for CSS codes using the X/Z correlations. 2014. hal-00937128 HAL Id: hal-00937128 https://hal.archives-ouvertes.fr/hal-00937128 Preprint submitted on 27 Jan 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A decoding algorithm for CSS codes using the X/Z correlations Nicolas Delfosse* and Jean-Pierre Tillich** *Département de Physique, Université de Sherbrooke, Sherbrooke, Québec, J1K 2R1, Canada, [email protected] **INRIA, Project-Team SECRET, 78153 Le Chesnay Cedex, France, [email protected] January 27, 2014 Abstract We propose a simple decoding algorithm for CSS codes taking into account the cor- relations between the X part and the Z part of the error. Applying this idea to surface codes, we derive an improved version of the perfect matching decoding algorithm which uses these X=Z correlations. 1 Introduction Low Density Parity–Check (LDPC) codes are linear codes defined by low weight parity-check equations. It is one of the most satisfying construction of error-correcting codes since they are both capacity approaching and endowed with an efficient decoding algorithm.
    [Show full text]