Affiliation:
1. Institute for Theoretical Physics & IQST, University of Ulm
Abstract
Quantum error correcting codes (QECCs) are the means of choice whenever quantum systems suffer errors, e.g., due to imperfect devices, environments, or faulty channels. By now, a plethora of families of codes is known, but there is no universal approach to finding new or optimal codes for a certain task and subject to specific experimental constraints. In particular, once found, a QECC is typically used in very diverse contexts, while its resilience against errors is captured in a single figure of merit, the distance of the code. This does not necessarily give rise to the most efficient protection possible given a certain known error or a particular application for which the code is employed.In this paper, we investigate the loss channel, which plays a key role in quantum communication, and in particular in quantum key distribution over long distances. We develop a numerical set of tools that allows to optimize an encoding specifically for recovering lost particles both deterministically and probabilistically, where some knowledge about what was lost is available, and demonstrate its capabilities. This allows us to arrive at new codes ideal for the distribution of entangled states in this particular setting, and also to investigate if encoding in qudits or allowing for non-deterministic correction proves advantageous compared to known QECCs. While we here focus on the case of losses, our methodology is applicable whenever the errors in a system can be characterized by a known linear map.
Funder
Federal Ministry of Education and Research
Publisher
Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften
Subject
Physics and Astronomy (miscellaneous),Atomic and Molecular Physics, and Optics
Reference120 articles.
1. C. H. Bennett and G. Brassard, in International Conference on Computers, Systems & Signal Processing, Vol. 1, edited by K. Soundararajan (1984) pp. 175–179; C. H. Bennett and G. Brassard, Theoretical Computer Science 560, 7 (2014), reprint of 1984.
2. P. W. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000).
3. R. Renner, Security of Quantum Key Distribution, Ph.D. thesis, Swiss Federal Institute of Technology, Zürich (2005), arXiv:quant-ph/0512258v2.
4. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, et al., Rev. Mod. Phys. 81, 1301 (2009).
5. G. P. Agrawal, Fiber-Optic Communication Systems, 4th ed. (John Wiley & Sons, 2010).