Professional Documents
Culture Documents
Simple approach to approximate quantum error correction based on the transpose channel
of the optimal recovery. Using the fact that the transpose Above, we considered a given encoding map W and a given
channel is the optimal recovery map for perfect QEC codes, recovery map R. In reality, one wants to maximize the error
we rewrite the error-correction conditions [13–15] for perfect correction capability provided by the system by choosing W
QEC in such a way that the role of the transpose channel and R such that the worst-case fidelity is as close to 1 as
is apparent. From this, we derive necessary and sufficient possible. The problem of AQEC can thus be phrased as
conditions for AQEC founded on the transpose channel, as a
natural generalization of the perfect QEC conditions. While max max min F (|ψ,W −1 ◦ R ◦ E ◦ W). (1)
W R |ψ∈H0
AQEC conditions have been derived in the past from an
information-theoretic perspective [16–20], our conditions are If the quantity in Eq. (1) attains the maximum possible value
algebraic and lead to a simple and universal algorithm to find of 1, i.e., there exist W and R such that the worst-case fidelity
AQEC codes that does not require optimizing over all recovery is 1, then we have perfect QEC.
maps for each encoding map. Furthermore, we demonstrate The simplest approach to solving this optimization problem
that the worst-case fidelity for the transpose channel is an is to do an exhaustive search over all possible encodings. This
easily computable quantity for the most practically useful case amounts to randomly choosing d-dimensional subspaces C ⊂
of codes encoding a single qubit. Note that AQEC based on the H. For each C, we still need to optimize over R to maximize
worst-case entanglement fidelity was also discussed recently worst-case fidelity. For a given C, the optimization problem
in Ref. [21]. can be written as
max min F (|ψ,R ◦ E), (2)
R |ψ∈C
II. AQEC AS AN OPTIMIZATION PROBLEM where the worst-case fidelity is computed over all pure states
Consider a physical system, with Hilbert space denoted by in C only.
H. In this system, we seek to encode a qudit of information— Before proceeding further, let us define some terminology.
information carried by a d-dimensional Hilbert space H0 , with We will often make use of the square of the fidelity, which
d dim(H). In particular, we focus on the case of a subspace we denote as F 2 (·,·) ≡ [F (·,·)]2 . Whenever unambiguous, we
code, where the qudit is encoded into a d-dimensional will also refer to F 2 as the fidelity. The recovery R with the
subspace C, of H. Formally, the information is encoded into C largest worst-case fidelity for a given C is the optimal recovery
via a linear, invertible encoding map W. The action of noise and is denoted by Rop . The fidelity loss ηR , for a given code C
on the system is described by a completely positive (CP), and a recovery R, is defined as
trace-preserving (TP) map E : B(H) → B(H). E can describe, ηR ≡ 1 − min F 2 (|ψ,R ◦ E). (3)
for example, the Markovian noise acting on the system over |ψ∈C
some time step, or the effects of a single use of a noisy channel
The fidelity loss for Rop , denoted ηop , is ηop = minR ηR . We
for communication. Complete positivity of E entails that its
refer to ηop as the optimal fidelity loss. A code C is said to be
action can be described by a (nonunique) set of Kraus operators
N † -correctable if it has ηop for some ∈ [0,1]. -
{Ei }N
i=1 such that E acts as E(ρ) = i=1 Ei ρEi . To denote correctable codes with
1 are approximately correctable
the noise channel in terms of its Kraus elements, we write √
in the sense that code states have fidelity at least 1 −
E ∼ {E }. The fact that E is TP is enforced by the condition 1 − /2 after the action of the noise and (optimal) recovery.
† i
i Ei Ei = I, where I is the identity operator for the domain
of E. After the action of E, we perform a CPTP recovery map
III. TRANSPOSE CHANNEL AS UNIVERSAL,
R : B(H) → B(C) to undo the effects of the noise and then
NEAR-OPTIMAL RECOVERY
decode using W −1 .
How well the information is protected from the noise can be Here, we describe the transpose channel and demonstrate
quantified by the fidelity between the input qudit state and the that it is indeed the standard recovery map for perfect QEC
decoded state after noise and recovery. The fidelity between codes characterized by the well-known QEC conditions. We
any two states ρ and σ is given by F (ρ,σ ) ≡ tr ρ 1/2 σρ 1/2 . then proceed to show that the transpose channel is nearly
For a pure state ρ√≡ |ψψ|, this can be written as F (|ψ,σ ) ≡ optimal even in the case of AQEC codes.
F (|ψψ|,σ ) = ψ|σ |ψ. Note that, 0 F (ρ,σ ) 1, with
F = 0 if and only if ρ and σ have orthogonal support, and A. Transpose channel
F = 1 if and only if ρ = σ . The fidelity is thus a measure of Consider a d-dimensional code C and a CPTP noise channel
how close two states are. Since we will often discuss fidelity E ∼ {Ei }Ni=1 . Let P be the projector onto C and PE be the
for a state before and after the action of a map , we use the projector onto PE ≡ the support of E(C). The transpose channel
shorthand F (|ψ,) ≡ F [|ψ,(|ψψ|)]. is the CPTP map RP : B(PE ) → B(C) such that
Based on the fidelity measure, we say that a code C, together
with W and R, is effective at protecting the information from
N
†
RP (·) ≡ P Ei E(P )−1/2 (·) E(P )−1/2 Ei P , (4)
the noise E if the worst-case fidelity minρ∈S(H0 ) F [ρ,W −1 ◦
R ◦ E ◦ W] is close to 1. Here, S(H0 ) denotes the set of all i=1
states, pure or mixed, in the codespace. In fact, since the fidelity where the inverse of E(P ) is taken on its support. The transpose
F (ρ,σ ) is jointly concave in its arguments (see, for example, channel can be understood as being composed of three CP
Ref. [22]), it suffices to minimize only over pure states in maps: RP = P ◦ E † ◦ N , where P is the projection P (·)P
S(H0 ). onto C, E † is the adjoint of E, and N is the normalization map
062342-2
SIMPLE APPROACH TO APPROXIMATE QUANTUM ERROR . . . PHYSICAL REVIEW A 81, 062342 (2010)
N (·) = E(P )−1/2 (·)E(P )−1/2 . In this form, RP is manifestly Perfect QEC is often discussed for a noise channel that is CP
independent of the choice of Kraus representation for E. but not necessarily TP. In fact, Theorem 1 and Lemma 2 remain
RP is a special case of a recovery map introduced in Ref. [9] true even for a non-TP E. The non-TP scenario is particularly
for reversing the effects of a quantum channel on a given initial relevant when we deal with a system of n quantum registers,
state. RP defined here is exactly the case for the initial state where each register is independently affected by some CPTP
P /d, where d is the dimension of C. In Ref. [23], RP was noise E1 . One often looks for codes that perfectly correct the
shown to be useful for correcting information carried by codes noise up to some maximum number t of quantum registers
preserved according to an operationally motivated notion. The with errors. Then, instead of having E ≡ E1⊗n , the relevant
term transpose channel owes its origin to Ref. [12], where this noise channel for perfect QEC describes noise where at most
channel was first defined in an information-theoretic context. t registers have errors. Such an E is not TP, since we have
It was shown [24] that the transpose channel has the property discarded the part of E1⊗n that corresponds to having errors in
of being the unique noise channel that saturates Uhlmann’s more than t registers.
theorem, i.e., the monotonicity of relative entropy—a fact that Actually, a perfect QEC code for such a non-TP noise
was later used to characterize states that saturate the strong channel can be viewed as an AQEC code for the original
subbadditivity of quantum entropy [25]. n-register noise channel E1⊗n , which is TP. In our AQEC
While our focus is on AQEC, understanding the relevance discussion, the code we look for is approximately correctable
of RP to perfect QEC provides the intuition behind the AQEC on the channel anyway, so E is always assumed to be TP, which
conditions presented later. An important characterization of is often the physically relevant scenario. The TP requirement
perfect QEC codes is the set of QEC conditions [13–15], which is also important for fidelity to be a good measure of the
we briefly review here (see, for example, Ref. [22]): efficacy of the recovery operation. Note that the analysis in
Theorem 1 (Perfect QEC conditions). A CPTP recovery R the remainder of the article applies to a special type of non-TP
†
that perfectly corrects a CP map E on a subspace code C exists maps—E ∼ {Ei } such that i P Ei Ei P = aP for 0 a 1,
if and only if giving an additional proportionality factor a in our expressions.
†
∀i,j, P Ei Ej P = αij P , (5)
B. Near-optimality of the transpose channel
for some complex matrix α.
It is useful to rewrite Eq. (5) in a “diagonal” form. α is In general, RP need not be the optimal recovery map Rop
clearly Hermitian and can be diagonalized with a unitary u for a given C and E. However, in the following theorem and
such that α = uDu† , where
D is the diagonal matrix of eigen-
the subsequent corollary, which form the core results of our
values. The set {Fk ≡ i uik Ei } constitutes a different Kraus article, we show that it does not do much worse than Rop .
representation for E. With this choice of Kraus representation, Theorem 3. Consider a d-dimensional code C with optimal
the perfect QEC conditions take the diagonal form fidelity loss ηop under a CPTP noise channel E. For any |ψ ∈
†
C,
∀k,l, P Fk Fl P = δkl dkk P , (6)
F 2 (|ψ,Rop ◦ E) 1 + (d − 1)ηop F (|ψ,RP ◦ E). (8)
where dkk are the diagonal entries of D.
The recovery map R when Eq. (5) is satisfied—which we Proof. Let {Rj } be a set of Kraus operators of Rop :
denote as Rperf —is constructed
√ as follows [22]: using the polar B(PE ) → B(C). For any |ψ ∈ C, following [9], we have
decomposition Fk P = dkk Uk P , Rperf : B(PE ) → B(C) is
†
given by Rperf ∼ {P Uk }. One can check that Rperf is TP on F 2 (|ψ,Rop ◦ E)
⎡
domain B(PE ) and that for any ρ ∈ B(C), (Rperf ◦ E)(ρ) =
its ⎤⎡ ⎤
( k dkk )ρ. From the QEC conditions [Eq. (6)], we see that
† †
k dkk = tr[E(ρ)] is independent of ρ and is exactly equal to
⎣ |Ei E(P )−1/2 Ei |2 ⎦ ⎣ |Rj E(P )1/2 Rj |2 ⎦,
1 if and only if E is TP on C. Rperf thus recovers the original i j
code state, up to any reduction in trace due to the possible (9)
non-TP nature of E.
A natural question to ask here is how the transpose channel where · denotes expectation value with respect to |ψ.
RP relates to the recovery Rperf for a given E and C that satisfy 1/2 † 2
Since Rop is TP, we have that j |Rj E(P ) Rj |
the QEC conditions. Here, we show that they are exactly the †
same map, as previously noted in Ref. [9]: j Rj E(P )Rj = (Rop ◦ E)(P ).
Lemma 2. RP = Rperf . Now, choose a basis {|ψi }di=1 for C with |ψ1 ≡ |ψ. Let
† (i)
Proof. Observe that E(P ) = k (Fk P )(P Fk ) = k dkk Pk , ρi ≡ (Rop ◦ E)(|ψi ψi |) = kl αkl |ψk ψl |, for coefficients
† †
(i) (i)
where Pk ≡ Uk P Uk . Equation (6) gives P Uk Ul P = δkl P , satisfying k αkk = 1 and αkk 0∀k. From the definition
so Pk ’s are orthogonal projectors
√ with Pk Pl = δkl Pk . of ηop , αii(i) = ψi |ρi |ψi 1 − ηop . This implies k=i αkk (i)
Hence, E(P )−1/2 = k Pk / dkk . The Kraus operators (i)
ηop , which in turn gives αkk ηop ∀k = i. Since |ψ =
†
{P Fk E(P )−1/2 } of RP can hence be written as †
|ψ1 by construction, we get j |Rj E(P )1/2 Rj |2 (Rop ◦
† √ † † † E)(P ) 1 + (d − 1)ηop . Putting this into Eq. (9), and not-
P Fk E(P )−1/2 = l dkk /dll P Uk Ul P Ul = P Uk , (7) †
ing that ( i |Ei E(P )−1/2 Ei |2 )1/2 F (|ψ,RP ◦ E), gives
which are exactly the Kraus operators of Rperf . Eq. (8).
062342-3
HUI KHOON NG AND PRABHA MANDAYAM PHYSICAL REVIEW A 81, 062342 (2010)
Let ηP be the fidelity loss for code C with RP as the damping channel in Ref. [1] was shown to obey a set of
recovery. Then, Theorem 3 implies perturbed QEC conditions. More recently, [26] examined
Corollary 4. ηP satisfies ηop ηP ηop f (ηop ; d), where small perturbations of the perfect QEC conditions for general
f (η; d) is the function CPTP channels. However, the analysis in Ref. [26] is often
(d + 1) − η complicated, and one wonders if there is a simpler approach
f (η; d) ≡ = (d + 1) + O(η). (10) using the transpose channel. In this section, we discuss such a
1 + (d − 1)η set of AQEC conditions built on Corollary 4. We begin by first
Proof. ηP ηop is true by definition of ηop . For any |ψ ∈ writing down an alternate but equivalent set of perfect QEC
C, let F 2 (|ψ,RP ◦ E) ≡ 1 − ηP ,ψ . Then, by definition, the conditions which highlights the role of the transpose channel:
fidelity loss is ηP = max
ψ (ηP ,ψ ). From Theorem 3, 1 − ηop
Theorem 5 (Alternate form of perfect QEC conditions). A
F 2 (|ψ,Rop ◦ E) [1 + (d − 1)ηop ](1 − ηP ,ψ ). Rearrang- code C satisfies the perfect QEC conditions (Theorem 1) if and
ing gives ηP ,ψ ηop f (ηop ; d). Since this holds for all ηP ,ψ , it only if it satisfies
also holds for ηP . †
The inequality ηP ηop f (ηop ; d) makes precise our state- ∀i,j, P Ei E(P )−1/2 Ej P = βij P , (11)
ment that RP is near-optimal, with the additional factor of √
where β ≡ α, for α is defined in Eq. (5).
(d + 1). For the most practically relevant case of a code Proof. For a code C that satisfies the perfect QEC conditions
encoding a single qubit, this is only a factor of 3. Note that, for †
(Theorem 1), using Eq. (7) and P Uk Ul P = δkl P , we have
ηop = 0, the inequality in Corollary 4 collapses to ηP = ηop , as
expected from Lemma 2. Corollary 4 provides necessary and †
P Fk E(P )−1/2 Fl P = δkl dkk P . (12)
sufficient conditions for C to be approximately correctable—C
is approximately correctable if and only if ηP is small. This diagonal form can be rotated to any other Kraus
We do not know if the upper bound on ηP in Corollary 4 is representation using a unitary
√ u so that F k = i uik Ei and
tight. However, the appearance of the dimension d of the code α = uDu† . Defining β ≡ α gives Eq. (11), thus showing
in the bound is unavoidable, as can be seen from the following that if a code C satisfies the perfect QEC conditions, it also
example: satisfies Eq. (11).
Example 1. Consider a noise channel E, whose action on Conversely, suppose we start from the diagonal form of
a√code C is given by the set of Kraus operators {Ei P } = Eq. (11) as in Eq. (12), which can be accomplished
√ by choosing
√ √ √
{ 1 − pP , p|00|, p|01|, . . . , p|0d − 1|}, for 0 u so that β is diagonal with entries dkk . Then taking the
p
1. E acts like the identity channel on C, except for a small square root of Eq. (12) gives E(P )−1/4 Fk P = (dkk )1/4 Vk P for
damaging component that maps a small part of every code some unitary Vk , so Fk P = (dkk )1/4 E(P )1/4 Vk P . Putting this
state onto |0. For d 3, one can show that the worst-case †
into Eq. (12) gives P Vk Vl P = δkl P . Furthermore, E(P )1/2 =
fidelity, when using RP as the recovery, occurs for state |0. † 1/2 √ †
[ k (Fk P )(P Fk )] = k dkk Vk P Vk . Direct computation
The corresponding fidelity loss is ηP = (d − 1)p/[1 + (d − †
1)p]. Since E is nearly the identity channel, we might instead then gives P Fk Fl P = δkl dkk P , which is exactly Eq. (6).
do nothing (identity channel as the recovery), for which the Applying an appropriate u to rotate to the desired Kraus
representation gives Eq. (5).
fidelity loss is η0 = p. η0 is always smaller than ηP for small p.
Since ηop η0 , we see that ηP /ηop ηP /η0 = (d − 1)/[1 + Observe that the left-hand side of Eq. (11) is a Kraus
(d − 1)p], which grows as d increases, for fixed p. Hence, for operator of RP ◦ E. Thus, the QEC conditions in Theorem 5,
this noise channel and code, the separation between ηP and and equivalently the original conditions stated in Theorem 1,
ηop grows as d increases. simply express the fact that C is perfectly correctable if and
only if RP ◦ E ∝ P. The proportionality factor is ij βij2 =
That the dimension of the code space appears here is
perhaps not surprising. In the next section, we will see that ij αij = k dkk .
this approach to AQEC using the transpose channel can be We can now obtain a set of conditions for AQEC by
viewed as a perturbation from the perfect QEC case. The perturbing this alternate form of the QEC conditions.
factor of d appearing in our bounds can hence be understood Theorem 6 (AQEC conditions). Consider a CPTP channel
as quantifying the number of degrees of freedom in which the E ∼ {Ei }, and a d-dimensional code C with projector P . Let
approximate case can deviate from the perfect case.
ij ∈ B(C) be traceless operators such that
Note, however, that as d gets large, f (η; d) approaches 1/η. †
In this case, the inequality in Corollary 4 simply becomes the P Ei E(P )−1/2 Ej P = βij P +
ij , (13)
trivial statement ηop ηP 1. While we will often only be where βij ∈ C. Then, for ∈ [0,1], ∃ η ∈ [0,1] given by
interested in codes with small values of d, this demonstrates
the weakness in the bounds derived here for large d values. †
η = max [ψ|
ij
ij |ψ − |ψ|
ij |ψ|2 ]. (14)
|ψ∈C
ij
IV. THE TRANSPOSE CHANNEL AND QEC CONDITIONS
such that
One of the key tools in perfect QEC are the perfect QEC (i) C is -correctable if η ;
conditions (Theorem 1). Conditions characterizing AQEC (ii) C is -correctable only if η f (; d), where f is the
codes would likewise be useful. A natural approach is function defined in Eq. (10).
to perturb the perfect QEC conditions to allow for small Proof. The left-hand side of Eq. (13) is a Kraus operator of
deviations. For example, the four-qubit code for the amplitude RP ◦ E. This, along with the TP condition for RP ◦ E, gives
062342-4
SIMPLE APPROACH TO APPROXIMATE QUANTUM ERROR . . . PHYSICAL REVIEW A 81, 062342 (2010)
the expression on the right-hand side of Eq. (14) for ηP . Setting d—for example, one can use the set of standard generators
η = ηP , conditions (i) and (ii) follow from Corollary 4. of the SU(d) group, augmented with the identity operator.
Equation (14) elucidates how the fidelity loss arises from The action of can be represented as a matrix M, acting on
the presence of the
ij operators. If
ij = 0∀i,j , we have vectors [operators in B(C)] in the Hilbert-Schmidt space, with
perfect QEC. matrix elements
The AQEC conditions, like the perfect QEC conditions, 1
provide a way to check if a code is approximately correctable, Mαβ ≡ tr{Oα (Oβ )}. (15)
without requiring knowledge of the optimal recovery. More d
precisely, given a maximum tolerable fidelity loss for some Since is CP and Oα ’s are Hermitian, M∗αβ = Mαβ , so M
information processing task at hand, one can check if a code C is a real matrix.
is -correctable as follows. The AQEC conditions instruct us Now, the density operator corresponding to any pure state
to compute ηP , which can be done once we know C and the |ψ in C can be expanded in terms of the Hermitian basis as
noise channel E. If ηP , then C is a good code. If, however,
ηP violates the inequality in condition (ii), we know that C 1 1
|ψψ| = (I + s · O) = s · O, (16)
is not good enough for our purposes. Of course, there is a d d
gap—for ηP taking values ηP f (; d), we cannot use where s is a real (d 2 − 1)-element vector, s ≡ (1,s), O ≡
the conditions to determine if C is within our tolerable fidelity (O1 ,O2 , . . . ,Od 2 −1 ), and O ≡ (I,O). s is not an arbitrary
loss, but this gap is small for small d. We do not know if the vector, but in general has to obey some constraints in order
gap can be shrunk by replacing ηP with the fidelity loss for for it to correspond to a pure state.
a different recovery map than the transpose channel, but we Using Eqs. (15) and (16), the fidelity for a state |ψ ∈ C
believe it is unlikely to vanish completely. under the map can be written as F 2 (|ψ,) = d1 s T Ms,
For a general C, the fidelity loss ηP may be difficult to where s is s written as a column vector, and the superscript
compute as it requires a maximization over all states in the code T denotes the transpose. We can rewrite the expression for
space. However, there is a quick way to check for sufficiency the fidelity using the symmetrized version of M: Msym ≡
by relaxing condition (i) of Theorem 6: 1
(M + MT ). Observe that s T Msym s = s T Ms. Therefore,
Corollary 7. C is -correctable for some ∈ [0,1] if 2
†
sum , where
sum ≡ ij
ij
ij , and · denotes the F 2 (|ψ,) = s T Msym s. (17)
operator norm.
Proof. Observe that the right-hand side of Eq. (14) Finding the worst-case fidelity is hence equivalent to the
† †
satisfies ij [ψ|
ij
ij |ψ − |ψ|
ij |ψ|2 ] ψ|
sum |ψ. following minimization problem for a real, symmetric matrix
Maximizing this expression over all |ψ ∈ C gives
sum . Msym :
Hence, ηP
sum , and the sufficiency condition (i) in
Theorem 6 is satisfied if
sum . minimize: s T Msym s, (18a)
Since
sum 0, its operator norm is given by its maximum constraint: s corresponds to a pure state. (18b)
eigenvalue, which is easily computable. In fact, for codes
encoding a single qubit, it is easy to show For d > 2, the constraint Eq. (18b) is difficult to write down.
(using the Pauli
basis, for example) that
sum = 1 − ij |βij |2 . Note that Even if we relax the constraint to include mixed states, it is not
βij for any code C and noise channel E is simply given by known in general what s corresponding to a (positive, trace-1)
† density operator looks like. This constrained minimization
βij = (1/d)tr(P Ei E(P )−1/2 Ej P ).
problem is hence not simple for a general d.
For qubits (d = 2), however, the constraint equation is
V. COMPUTING η P FOR QUBIT CODES simple to write down. We choose the operator basis to be
the Pauli basis. Given an orthonormal basis {|v1 ,|v2 } for the
Computing ηP for a general code requires an exhaustive qubit code space, the Pauli basis {σ0 ≡ I2 ,σx ,σy ,σz } can be
optimization over all states in the code. However, for the constructed as
practically relevant case of codes encoding a single qubit, i.e.,
C with dimension d = 2, ηP turns out to require only simple σ0 = |v1 v1 | + |v2 v2 | ≡ I2 ,
eigenanalysis to compute. σx = |v1 v2 | + |v2 v1 |,
For a qubit code, (RP ◦ E) : B(C) → B(C) is a qubit map. (19)
Observe that RP ◦ E is not only CPTP but also unital [i.e., σy = −i(|v1 v2 | − |v2 v1 |),
(RP ◦ E)(P ) = P ]. Here, we show that the worst-case fidelity and σz = |v1 v1 | − |v2 v2 |.
for a unital, CPTP qubit map is easy to compute. While our
context requires only a unital, CPTP qubit map, we begin Equation (16) then corresponds to the Bloch sphere represen-
with a general CP map ∼ {Ki } on a d-dimensional Hilbert tation of a pure state, with the Bloch vector s ≡ (sx ,sy ,sz ) sat-
subspace C, so as to highlight why the qubit case is particularly isfying s = (sx2 + sy2 + sz2 )1/2 = 1. The constraint Eq. (18b)
simple. becomes
We begin by choosing a Hermitian basis constraint: s = (1,s), with s = 1. (18b )
{O0 ,O1 , . . . ,Od 2 −1 } for B(C), where O0 ≡ I,Oα† =
Oα ∀α,tr{Oα† Oβ } = δαβ d∀α,β. The operators {Oα ,α = The constrained minimization problem can then be solved
1, . . . ,d 2 − 1} are clearly traceless. Such a basis exists for any using the Lagrange multiplier method.
062342-5
HUI KHOON NG AND PRABHA MANDAYAM PHYSICAL REVIEW A 81, 062342 (2010)
For the case of a CPTP qubit map that is also unital, the 1
minimization problem can be further simplified. For any CPTP,
unital (arbitrary d), M takes the form
0.95
⎛ ⎞
1 0 ... 0
⎜0 ⎟
⎜ ⎟
2
worst−case fidelity F
0.9
M=⎜ ⎜ ..
⎟.
⎟ (20)
⎝. T ⎠
0.85
0 no error−correction
[4,1] code, Leung recovery
The first row comes from the fact that is TP, and the first [4,1] code, R recovery
P
0.8
column from the fact that is unital. T is a (d − 1) × (d − 1) [4,1] code, Fletcher recovery
real matrix. Defining Tsym ≡ 12 (T + T T ), Eq. (17) can be [[5,1,3]] code
random 4−qubit code, RP recovery
written as F 2 (|ψ,) = d1 (1 + sT Tsym s). This means that we 0.75
random 4−qubit code, Id recovery
can equivalently minimize sT Tsym s instead of the original
s T Msym s in Eq. (18a). For a qubit CPTP, unital then, the 0 0.05 0.1 0.15 0.2 0.25 0.3
damping parameter γ
0.35 0.4 0.45 0.5
062342-6
SIMPLE APPROACH TO APPROXIMATE QUANTUM ERROR . . . PHYSICAL REVIEW A 81, 062342 (2010)
2
worst−case fidelity F
channel recovery. 0.9
We also compare the performance of the [4,1] code under
these different recovery maps with that of a code that satisfies 0.85
the perfect QEC conditions. The smallest code capable of
perfectly correcting an arbitrary error on any single qubit [[5,1,3]] code
⊗5 random 3−qubit code, R recovery
requires five qubits. The relevant noise channel now is EAD . 0.8 P
random 2−qubit code, RP recovery
The five-qubit code [14,28], usually referred to as the [[5,1,3]]
code,3 satisfies the perfect QEC conditions for the CP channel 0.75
random 4−qubit code, Id recovery
⊗5 random 4−qubit code, RP recovery
comprising only the single-qubit (Pauli) errors in EAD . Using
the corresponding Rperf as the recovery for the [[5,1,3]] code, 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
⊗5 damping parameter γ
we compute the worst-case fidelity for the noise channel EAD ,
for different values of γ . As the plot in Fig. 1 shows, the
FIG. 2. (Color online) Randomly generated two-, three-, and
[[5,1,3]] code performs better than the [4,1] code with Leung four-qubit codes using the transpose channel as the recovery map.
recovery, but the [4,1] code uses one qubit less to encode the For comparison, we have also plotted the worst-case fidelity for the
same amount of information. The [4,1] code with the transpose [[5,1,3]] code and that of the randomly generated four-qubit code
channel as recovery has nearly identical worst-case fidelity as with no recovery (i.e., identity channel as recovery).
the [[5,1,3]] code, while the one with Fletcher recovery does
slightly better for small values of γ .
These observations clearly demonstrate the benefit of going performance of the randomly generated code was achieved,
beyond codes described by the perfect QEC conditions. due to the fact that the transpose channel is a near-optimal
Furthermore, while the [[5,1,3]] code is capable of perfectly recovery map for any code.
correcting an arbitrary single-qubit error in a system subjected Finally, we also consider the possibility of constructing
to any noise channel, the comparison with the [4,1] code with two-qubit and three-qubit codes for the amplitude damping
various recovery maps clearly show the gain that one might channel. Because the transpose channel is near-optimal for
achieve by adapting the codes and recovery to the noise channel any code, it can be used as a good recovery map for the codes
in question. we generate, thus eliminating the need to search for a good
Last, we also compute the worst-case fidelity for randomly recovery for every randomly selected code. The worst-case
generated four-qubit codes, using the transpose channel as fidelity for the best codes we found are plotted in Fig. 2.
the recovery map. Computing F 2 for about 500 randomly For comparison, we also plot the worst-case fidelities for the
selected codes took less than half an hour on a typical laptop randomly generated four-qubit code mentioned in the previous
computer. We plot the worst-case fidelity for the best code in paragraph, with the transpose channel and the identity channel
Fig. 1 (line marked “random 4-qubit code, RP recovery”). as recovery maps. The corresponding graphs for the two- and
For small values of γ , this random code does not do as three-qubit codes with identity channel as recovery are close to
well as the other codes discussed so far for the amplitude that of the four-qubit code. From the figure, we see that while
damping channel, but it still does significantly better than the the worst-case fidelity decreases as the number of physical
case without error correction. Furthermore, for γ 0.35, our qubits decreases, the two- and three-qubit codes in fact do
randomly generated code actually outperforms all the other not perform too badly compared to the four-qubit code or
codes. For comparison, we have also plotted the worst-case the [[5,1,3]] code. Such codes may be of relevance whenever
fidelity for this randomly generated code in the absence of the desire to lower resource requirements trumps the need for
the transpose channel recovery, i.e., with the identity channel the best possible worst-case fidelity.
as the recovery map (line marked “random 4-qubit code, Id
recovery”). One should keep in mind the ease with which the
VII. CONCLUSIONS AND OPEN PROBLEMS
062342-7
HUI KHOON NG AND PRABHA MANDAYAM PHYSICAL REVIEW A 81, 062342 (2010)
having to perform a difficult optimization over all recovery Another important problem is to figure out whether the
maps for every possible encoding. Furthermore, our approach, transpose channel can be easily implemented using measure-
founded on the worst-case fidelity rather than an averaged ments and gates. In the case of perfect QEC, the transpose
measure of fidelity, provides the often desirable guarantee channel (or equivalently Rperf ) can be implemented simply
that the code found is able to protect all information that can using syndrome measurements and conditional gates (see, for
be stored in the code with some minimum fidelity. We have example, Ref. [22]). In order for AQEC codes to be useful for
also shown that the case of qubit codes is particularly easy to computational or communication tasks, it must be possible to
handle, and our method of computing the worst-case fidelity implement the recovery operation using physical operations
for a CPTP qubit map might be useful in contexts beyond our that are not overly complicated or demanding in resources.
present discussion. This is in fact another advantage of our analytical approach
There are many interesting related open problems. An over numerically constructed recovery maps for which no
immediate question is whether the gap present in our AQEC practical implementation structure may be apparent (although,
conditions between the necessary and sufficient conditions see Ref. [7]).
(arising from the inequality in Corollary 4) can be reduced, AQEC provides a new and mostly unexplored arena of
either by improving the bound in Theorem 3 or by using possibilities for the design of codes to protect information
a different recovery map that might perform better than from noise for use in quantum information processing tasks.
the transpose channel. It would be very interesting if a simple Our work provides an analytical characterization of AQEC
and universal recovery map could be found, for which the and further analytical understanding will undoubtedly prove
dimension of the code does not appear in the worst-case invaluable toward unlocking the full potential of AQEC.
fidelity. There is also the question of whether it might
be possible to extend our efficient method of computing
ACKNOWLEDGMENTS
the worst-case fidelity for qubit codes to higher dimensional
codes and more general channels. Finally, we expect that the We thank David Poulin for introducing us to the problem
transpose channel can also be used to study approximate codes of approximation quantum error correction and for many
more general than subspace codes, like, for example, OQEC insightful discussions. This work is supported by NSF under
codes [29]. Grant No. PHY-0803371.
[1] D. W. Leung, M. A. Nielsen, I. L. Chuang, and Y. Yamamoto, [15] E. Knill and R. Laflamme, Phys. Rev. A 55, 900 (1997).
Phys. Rev. A 56, 2567 (1997). [16] B. Schumacher and M. D. Westmoreland, Quant. Info. Proc. 1,
[2] A. S. Fletcher, Ph.D. thesis (MIT), e-print arXiv:0706.3400 5 (2002).
[quant-ph] (2007). [17] R. Klesse, Phys. Rev. A 75, 062315 (2007).
[3] B. Schumacher, Phys. Rev. A 54, 2614 (1996). [18] F. Buscemi, Phys. Rev. A 77, 012309 (2008).
[4] M. Reimpell and R. F. Werner, Phys. Rev. Lett. 94, 080501 [19] C. Bény, TQC 2009 LNCS 5906, p. 6675 (2009), e-print
(2005). arXiv:0907.4207.
[5] R. L. Kosut and D. A. Lidar, Quant. Inf. Proc. 8, 443 (2009). [20] J. M. Renes, e-print arXiv:1003.1150v2 [quant-ph].
[6] A. S. Fletcher, P. W. Shor, and M. Z. Win, Phys. Rev. A 75, [21] C. Bény and O. Oreshkov, Phys. Rev. Lett. 104, 120501 (2010).
012338 (2007). [22] M. Nielsen and I. Chuang, Quantum Computation and Quantum
[7] A. S. Fletcher, P. W. Shor, and M. Z. Win, Phys. Rev. A 77, Information (Cambridge University Press, Cambridge, UK,
012320 (2008). 2000).
[8] R. L. Kosut, A. Shabani, and D. A. Lidar, Phys. Rev. Lett. 100, [23] R. Blume-Kohout, H. K. Ng, D. Poulin, and L. Viola, Phys. Rev.
020502 (2008). Lett. 100, 030501 (2008).
[9] H. Barnum and E. Knill, J. Math. Phys. 43, 2097 (2002). [24] D. Petz, Rev. Math. Phys. 15, 79 (2003).
[10] J. Tyson, e-print arXiv:0907.3386v4 [quant-ph]. [25] P. Hayden, R. Jozsa, D. Petz, and A. Winter, Commun. Math.
[11] N. Yamamoto, S. Hara, and K. Tsumura, Phys. Rev. A 71, Phys. 246, 359 (2004).
022322 (2005). [26] P. Mandayam and D. Poulin (in preparation, 2009).
[12] M. Ohya and D. Petz, Quantum Entropy and Its Use (Springer- [27] A. S. Fletcher, P. W. Shor, and M. Z. Win, IEEE Trans. Info.
Verlag, Berlin, Heidelberg, 1993). Theory 54, 5705 (2008).
[13] A. Ekert and C. Macchiavello, Phys. Rev. Lett. 77, 2585 [28] R. Laflamme, C. Miquel, J.-P. Paz, and W. H. Zurek, Phys. Rev.
(1996). Lett. 77, 198 (1996).
[14] C. H. Bennett, D. P. DiVincenzo, J. A. Smolin, and W. K. [29] D. Kribs, R. Laflamme, D. Poulin, and M. Lesosky, Quant. Inf.
Wootters, Phys. Rev. A 54, 3824 (1996). Comp. 6, 382 (2006).
062342-8