Stabilizer Codes on a Cayley Graph

Research Article
Open access

Stabilizer Codes on a Cayley Graph

Yiqun Gui 1*
  • 1 Keystone Academy, Beijing, China    
  • *corresponding author 18526204451@163.com
AORPM Vol.4 Issue 1
ISSN (Print): 3029-0899
ISSN (Online): 3029-0880

Abstract

The paper investigates quantum stabilizer codes and our innovative construction methodology. At first, we began with representing fundamental concepts and theories of quantum computing. In order to identify quantum error correcting codes, we extend the method of using polynomials to represent qudits on square lattices to accommodate more complicated situations in general Cayley graphs. The paper briefly reviews essential definitions and examples related to graphs, groups, and stabilizer codes, and later we propose the novel method and demonstrate its application by using the dihedral groupD4.

Keywords:

Quantum computing, Quantum error correction, Stabilizer codes, Cayley graph, Dihedral group

Gui,Y. (2025). Stabilizer Codes on a Cayley Graph. Advances in Operation Research and Production Management,4(1),79-91.
Export citation

1. Introduction

Quantum computing is advancing to meet the growing demand for computational efficiency in modern science and technology. Through the usage of quantum states, the field offers breakthrough applications and insights, including quantum cryptography for ultra-secure classical information transmission, quantum error correction for preserving quantum coherence amidst noise, and quantum computation for efficient processing through controlled quantum evolution [1]. Our paper mainly focuses on quantum error correction.

In recent years, the problem of noise has emerged as a predominant obstacle in the advancement of universal quantum computers. Quantum decoherence, which refers to the preservation of quantum states despite the interference of noise,is necessary in order to keep quantum computing reliable. Nowadays, experimental efforts have been made to simulate quantum computations on small-scale devices, aiming to achieve the quantum decoherence [2]. Unfortunately, these experiments are usually complicated and challenging. Though the experiments are difficult, quantum error-correcting codes offer a promising solution, which is also the reason for the exploration in our study.

Detecting effective quantum error-correcting codes involves various methodologies to compare and select optimal approaches: methods for encoding a single qubit to correct multiple errors [3]; the use of entire classes of codes makes the codes for multiple-correction of many qubits efficient [4,5]; in [6], the author provides efficient quantum error corrections codes and discusses techniques for manipulating codes and guessing new codes.

In our paper, we introduce a novel but useful method for representing qudits through polynomials. Though previous applications are limited to simpler square lattice codes, we do extend this approach to more complex scenarios in Cayley graphs, and give an example of the situation on the Cayley graph of dihedral group  D4 .

We outline topics of individual sections. Section 2 introduces basic concepts of quantum information. Section 3 introduces Groups and Graphs, especially Cayley graphs. Section 4 discusses the definitions and examples of stabilizer codes. Section 5 discusses the existing representation of stabilizer codes and our own innovations of stabilizer codes for a more complex group or in a more complicated graph. Section 6 shows an example of using our innovative method to find the stabilizer codes.

2. Quantum information

Quantum information systems improve the quantum computing through the usage of quantum mechanical phenomena to enhance computational efficiency. Moreover, we would like to highlight the fundamental characteristics of quantum information, which encompass quantum superposition and entanglement.

Property.1Quantum information is uncertain.

In classical computers, data are stored, sent, received, and processed in the string of form of bits, which is either 0 or 1. Contrary to that, quantum information systems demonstrate a significantly different situation. Initially, quantum bits, also known as qubits, are present in a superposition of multiple quantum states. Later, quantum collapse may be precipitated by observation in quantum information, resulting in a state change. This collapse is the collapse of the wave function, which represents to the mathematical representation of the quantum state of a certain quantum system. Specifically, collapse refers to the transformation of a wave function from a superposition of multiple quantum states to a single state as a result of observation. Quantum supervision theory points out that the quantum states of qubits is the state in a linear combination of state 0 and state 1 instead of either 0 or 1. Observing a qubit can change its superposition state to either 0 or 1. Hence, the qubit will transition from the state of superposition to a state of definitiveness. As an illustration, consider a qubit system consisting of 500 qubits. When doing the first observation, 300 of them might be 0. However, in the second observation, the value might change to 200. In essence,every observation and measurement will result in diverse outcomes.

Property.2Quantum information is not local.

According to the theory of quantum entanglement, the quantum state of each particle is not independently determined by itself, but rather can only be described in a global context. If there is a pair of entangled particles, measurement and observation will determine the quantum state of one of them. This allows us to infer the state of the other particle based on their global state. This indicates that in a quantum information system, every qubit’s quantum state is affected by the others. Consider, for example, a pair of qubits, consisting of 0 and 1. In a quantum information system with several qubits, the quantum state of one qubit influences the states of the other qubit, leading to a complex entangled system[7].

2.1. Basic concepts

2.1.1. Qubit

In classical computer, data is stored as strings of bits (0s or 1s), and always represented as vectors over  Z2 . In quantum computing, as used lots of times before, the basic unit of quantum information is called qubits, and the state is usually written in  |ψ , which uses Dirac notation. “ |  ” and “  | ” are two basic representations in Dirac notation. “ |  ” represents a column vector and “  | ” represents a row vector. In this essay, we mainly use “ |  ” . For example, the standard basis vectors of a single qubit  |0  and  |1  can be written as  |0=[10]  and  |1=[01] . Note that if there we want to represent three qubits, including  |0 ,  |0 , and  |1 , we can use  |001 . This is an example of utilizing Dirac notation to represent multiple qubits. The normalized representation of qubit state is

|α|2+|β|2=1,(1)

where  |α|2  and  |β|2  are the probabilities of obtaining  0  and  1  respectively.  α  and  β  are used in the representation of an arbitrary single-qudit state:[8]

|ψ=α|0+β|1=[αβ](2)

There is a basic criteria for quantum error correction about the qubits and environment. The initial state of an environment is denoted by  |0 E . A unitary transformation is used to characterize the evolution of a qubit and its environment:

 |0|0E |0 |00E+|1 |1E, 

 |1 |0E |0 |10E+|1 |11E; 

in which  |eij  is defined as the four states of the environment that do not need to be normalized or mutually orthogonal or mutually orthogonal[9].

2.2. Inner product space

An inner product space is a vector space denoted by  V . The operation of  V  is inner product denoted by  (,) . Here is an example. The inner product, denoted by  (x,y) ,or dot product  xy  of two vectors  x=(x1,x2,x3,,xn)  and  y=(y1,y2,y3,,yn) , where  x  and  y  are two elements of Euclidean Space  Rn  is

(x,y)=x1y1+x2y2+x3y3++xnyn.(3)

There are totally 4 axioms of  V :

Axiom.1 (x,x)0  when  (x,x)=0 ,  x=0 .

Axiom.2 (x,y+z)=(x,y)+(x,z) 

Axiom.3 (x,ay)=a(x,y)  for all  aR 

Axiom.4 (x,y)=(y,x)  for all  x ,  y   V .

Every inner-product space is a normed space because if there is an inner product space  V , the map    defined by setting  v=(v,v)12  defines a form on  V . When the norms are “standard norms”, the vector space is complete and in this situation, the inner-product space is called Hilbert space [10].

2.2.1. Qudit

In d-dimentional Hilbert space  Cd , where  dN* , where  C  is the set of complex numbers, the quantum state is called qudit.

2.3. Quantum error correction

An essential goal of quantum error correction is to minimise the harmful impact of noise on quantum information. Quantum noise refers to the elements that impact the precision of calculations performed on a quantum computer. For example, cosmic rays, radiation from mobile phones, or the magnetic field of the Earth are all the sources of quantum noise. These noises may lead to quantum error, which is the error happening in quantum algorithm, finally resulting in the error in information transferred by quantum computer. When quantum error happens, the input of a pure qudit will produce a mixed state or it will become a different pure state compared with the input one.

The codes known as Quantum Error Correcting Codes (QECC) often carry out this operation. QECC always perform 3 operations to correct the error of a quantum computing. Firstly, they encode the initial state of quantum information. Then, the diagnose errors. Finally, some recovery operations will be implemented to rectify errors.

QECC can be viewd as a mapping of  k  qubits (a  2k  dimensional Hilbert space) into  n  qubits (a  2n  dimensional Hilbert space). The encoding operation of  k  qubits toward  n  qubits is denoted by  [[k,n]] . The image of this mapping is known as the code space.

Take the situation when only one error on a single qubit at a time as an example, the first step is to encode the given logical qudit as follows:

 |0 |0̄=(|000+|111)(|000+|111)(|000+|111) 

 |1 |1̄=(|000-|111)(|000-|111)(|000-|111) 

Through the encoding process above, the data can be stored as 9 qubits.

The second process is the diagnosis of errors. Suppose the first qubit is flipped by switching  |0  and  |1 . When comparing the first and the second qubit, it is not difficult to find they are different. Note that during the process of diagnosis, the superposition state is not destroyed because the difference between the first and the second qubit is the object of measurement instead of the qubit itself. Then through comparing the first and the third qubit, we can find the first qubit disagrees with the third one. Thus, we can narrow the error to the first qudit. Finally, the recovery operation is basically flipping the first qudit. This kind of error is called a bit flip.

Another possible error in one qubit is sign flips, which is shown as follows :

 |0 |0̄=(|000+|111)(|000-|111)(|000+|111) 

 |1 |1̄=(|000-|111)(|000+|111)(|000-|111) 

Here we only need to compare whether the first sign is same as the second and the third one, thus find the error and flip the sign. A bit flip and a sign flip can be described as the operations as follows respectively:

σx=(0110)σz=(100-1)

2.4. Pauli matrix & pauli operator

The operations introduced in Section 2.3 belong to a group of matrices called Pauli matrix.

Pauli matrix includes 4 different matrices as follows [11]:

I=[1001]X=[0110]Y=[0-ii0]Z=[100-1]

Any  2×2  matrix can be expressed as a linear combination of these four matrices. For example, if  [abcd]  is a  2×2  matrix, it can be expressed as follows:

[abcd]=c1[0110]+c2[0-ii0]+c3[100-1]+c4[1001]

where  c1 ,  c2 ,  c3 , c4  are constants determined by  a,b,c,d  [7].

A Pauli operator is formed by taking a tensor product of Pauli matrix on a set of qudits  CdCd . On a single qudit  Cd , there are two Pauli matrices:  Xd,Zd  which are defined as follows:

Consider a set of orthonormal basis vectors denoted by  {|0, |1,, |d-1} . Pauli matrices  Xd  and  Zd  are characterized by

Xd |i =|i+1modd(4)

Zd|i =ωi |i,(5)

where  ω=e2π-1d  the primitive  d -th root of unity. Note that when applying  Xd  and  Zd  to a graph,  Xd  means flip symmetry operation so that the overall shape of the graph does not change, and  Zd  means rotation operation so that the overall shape of the graph does not change.

Pauli operators form a group denoted by  P . The definition of group and more information about Pauli group will be discussed in section 3. Note the following important commutation relation

XdZd=ωZdXd.(6)

Here is an example of an equilateral triangle.

The equilateral triangle  A  is shown in Figure 1. Specifically,  Z3 |1  is defined as rotating  2π3  counterclockwise around the center point  O  (this is also the operation of  ω ), and  Z3 |2  is defined as rotating  4π3  counterclockwise around the center point  O . Note that  Zd|n , where  n  is the notation of a point of  A , is defined as the reflection with respect to the axis of symmetry across the center point and vertex  n  (note that the direction of the symmetry is defined at the first time and it will not change.). For example, let the line across the center point and vertex 1 be the axis of symmetry. When there is no operations applied to the graph, this axis is denoted by  X3|1 , which is the line perpendicular to the horizontal plane.

Figure 1. An example of an equilateral triangle
Figure 1. An example of an equilateral triangle

By applying the operations  X3Z3|1 , the triangle will be changed to Figure 2. However, by applying the operations  Z3X3|1 , the triangle will be changed to Figure 3. In order to transform Figure 3 to Figure 2, an extra  ω  operation should be applied before the operation  Z3X3|1 , that is why  XdZd=ωZdXd .

图片
Figure 2.  X3Z3|1 
图片
Figure 3.  Z3X3|1 

3. Group and cayley graph

3.1. Definition of group

A group  G  is used to define a set that includes an operation, denoted by  * , which connects two elements in the group to form the third element. This operation is called binary operation. All groups satisfy four axioms as follows:

Axiom.1 A group is closed under the operation.

After applying a binary operation, the third element formed by the two chosen elements should belong to the set which the two chosen elements belong to.

Axiom.2 Associativity is allowed in groups.

Associativity is allowed in groups. For example,  (1+2)+3=1+(2+3) .

Axiom.3 Identity element

The identity element  e  satisfies that the operation of  e  and every element in  G  will be equal to the chosen element  a , which is the formula:  a*e=e*a=a 

Axiom.4 Inverse element

For every element in  G , there is an inverse element such that the operation of the chosen element  a  and its inverse  b  will be the identity element, which is the formula:  b*a=a*b=e .

Abelian group is also named commutative group, in which the order of two group elements does not affect the results after doing group operation, basically satisfying  a*b=b*a  when  a,b  belong to the given abelian group.  (Z,+)  is an example of abelian group because  a+b=b+a  for all  a,bZ . [12]

3.2. Examples and counter-examples of group

Example.1 Set of all integers with operation  + :  (Z,+) 

 Z  is the set of all integers. The binary operation is addition.

Example.2 Set of Pauli operators with operation   :  (P,) 

Pauli operators over a set of qudits form a group  P . Indeed, product of Pauli operators is still a Pauli operator. Note multiplication of Pauli operation is not necessarily commutative due to (6).

Counter-Example.1 Set of all integers with operation  × :  (Z,×) 

 Z  is the set of all integers. The binary operation is multiplication. However, it lacks an inverse that belongs to  Z .

3.3. Definition of subgroups

A subgroup  H  is a subset of  G  which is a group, denoted by  HG .  H  and  G  are groups with the same binary operation [12].

Example.1  (Z,+)(Q,+)(R,+)(C,+) 

Example.2 If  aN  divides  bN , then  (bZ,+)(aZ,+) .

3.4. Fundamental theorem of homomorphism

Given two groups  (G1,)  and  (G2,*) , a mapping  f:G1G2  is a group homomorphism if it satisfies

f(g1g2)=f(g1)*f(g2)for anyg1,g2G1.

Here are some fundamental definitions of homomorphism:

Definition.1 If  f  is surjective,  f  is an epimorphism.

Definition.2 If  f  is injective,  f  is a monomorphism.

Definition.3 If  f  is bijective, which means both surjective and injective,  f  is an isomorphism. In this situation,  G1  and  G2  are isomorphic groups, denoted by  G1G2 .

Definition.4 If  G1=G2 ,  f  is an endomorphism, which means a homomorphism from a group to itself.

Definition.5 If  G1=G2 ,  f  is an automorphism and an isomorphism.

Another essential concept in terms of homomorphism is  kernal  of  f , denoted by  ker(f) . If  f:G1G2  is a homomorphism,

ker(f)={gG1:f(g)=e}

The image of  f , denoted by  im(f) , is the range of  f  within  G2 , which is defined as

im(f)={hG2:there existsgG1withf(g)=h}.

After introducing some basic definitions, we need to know one of the most important theorem involved in group, which is Group Isomorphism Theorem.

 G1  and  G2  satisfy the two following properties:

Property.1 If  ker(f)  is a normal subgroup in  G1 , and  im(f)  is a subgroup of  G2 ,

G1/ker(f)im(f).

Property.2 Suppose  H  is a normal subgroup of a group  G .  f:GG/H , given by  f(g)=gH  for  gG  is a homomorphism. Here  ker(f)  is  H  and  im(f)  is  G/H .[12]

3.5. Group representation

Group representation theory examines homomorphisms mapping a group to the group of invertible linear transformations over vector spaces. To be more specific, it studies how abstract groups can be showed in the form of matrices and how their elements relates to linear transformations of vector spaces. Through the analysis of these representations, researches can get some helpful inspirations into the structure and properties of the group [13].

3.6. Group generators & generating set

If there is an element  gG  such that  G=g , then  G  is cyclic. Every element of  G  can be expressed as an integer power of  g . In this instance,  g  is defined as the generator of  G , and  G  is generated by  g .

Here is an example,  Z7  is cyclic because we can say it is generated by 3. All the elements of  Z7  can be write in the following form:

31=3,32=2,33=6,34=4,35=5,36=1

A generating set refers to a group of elements that can be combined (including themselves, their inverses, and all possible combinations of them) to produce all the elements of an entire group. In simple terms, if a group  G  can be generated by the elements in a set S through the group’s operation, then we say  S  is a generating set of  G  .

3.7. Definition of graph

According to the directed and undirected nature of the edges of the graph, graphs can be classified as directed graphs, undirected graphs, and mixed graphs. In directed graph, edges have directions, usually presented as an arrow.  (x,y)  means the edge’s direction is from  x  to  y . If the pair is not given an order and the edge has no direction,the graph is referred to as an undirected graph. A mixed graph consists of both directed edges and undirected edges.

3.8. Cayley graph

Cayley graph is a directed graph associated to  A , denoted by  GA,S , where  A  is a group and  S  is the generating set of  A . The graph includes two primary parts:

• Vertices are elements in set  A .

• Edges are elements in set  A×S .

Constructing a Cayley graph is the way of producing an unbounded sequence of  d -regular graphs at all. The way to construct a Cayley Graph is very simple, starting by taking a group  G  and some subset  H  of  G . We define the elements of  G  as the vertices of the Cayley graph, and the edges of the Cayley graph is the line drawn from  x  to  xγ  given that  xG  and  γH .[8]

In a Cayley graph, each edge is associated with a pair  (a,s) , where  aA  and  sS . Define  ι(e)  as the initial vertices of the edge  e  and  τ(e)  as the terminal vertex of the edge  e . The mapping  ι  and  τ  are specified by

ι:A×SAτ:A×SAι:(a,s)aτ:(a,s)as

Therefore, through the generator  s , the edge associated with the pair  (a,s)  can run from  a  to  as .

Here is an example of a Cayley graph in the sequence  (Cay(Z2n,1,n,2n-1)) . When  n=3 , the Cayley graph  (Cay(Z6,1,3,5))  is shown in Figure 4 [8]:

Figure 4. CayZ6,1,3,5
Figure 4. CayZ6,1,3,5

4. Stabilizer codes

In quantum information and theoretical condensed matter physics, stabilizer codes are often mentioned(defined below). They originate from quantum error correction, but are widely studied now as toy models for exotic quantum phases. The famous toric code model for anyons as well as the X-cube model for fractons both fall under this category.

4.1. Definition

Stabilizer codes refer to a collection of quantum codes utilized for performing quantum error correction. Given a set of qudits  CdCd , its code space is defined as the subspace of vectors invariant under a set  S  of Pauli operators known as stabilizers. A Pauli operators on  N  qubits can be expressed as  cO1O2ON  where  Oi  for  i(1iN)  is from the set  Oi{I,X,Y,Z}  and  c=jl  for  l=1,2,3,4 .[9]

A theorem from linear algebra stipulates that any two stabilizers  A,BS  commute, which means  AB=BA , if and only if they share the same eigenvectors. The proof is shown as follows:

Firstly, assuming  A  and  B  commute, so  AB=BA . Let  Ax=λx  ( x0 ), where  x  is a qudit and  λ  is a real number, thus

ABx=BAx=Bλx=λBx(7)

Obviously,  x  and  Bx  are both eigenvectors of  A  when  B0 , and they share the same eigenvalue  λ .

Next, assuming eigenvalues of  A  are distinct, so the eigenspaces are one-dimensional, which means  Bx  is a scalar multiple of  x .  x  is the eigenvector of  B . Therefore, considering the previous steps,  x  is the eigenvector of both  A  and  B .

Conversely, if  A  and  B  share the same set of eigenspaces, then there exists a basis where  A  and  B  are simultaneous diagonal. Any two diagonal matrices commute, therefore,  AB=BA . In other words,  S  is an abelian subgroup of  P .

Let  S  be the largest abelian subgroup of  PN  that fixes all elements from quantum code the set of quantum codes, denoted by  CQ .  S  now is the stablizer group that is generated by a set of  N-K  operators  g1,,gN-K , where  K  is defined below, so these operators are also called generators of  S . These generators have mainly three properties.

Property.1 They have the order of 2. Any elements from  S  can be written in terms of the generators:

s=g1c1...gN-KcN-K,ci{0,1};i=1,...,N-K.(8)

Property.2 They are commutative to each other.

Property.3 They are unitary and Hermitian.

Back to the quantum stabilizer codes, denoted by  CQ , it can be defined as the unique subspace of Hilbert Space  H2N  that is fixed by elements from  S  of  CQ  when the parameters is  [N,K]  as follows [9]:

CQ=sS{|cH2N:s|c=|c}.(9)

4.2. An example of pauli stabilizer group

Taking a 1-qubit Pauli group as an example, the following is how the Pauli matrix generates it:

I=[1001]X=[0110]Y=[0-ii0]Z=[100-1]

Pauli matrices have the same algebraic relationships as the four units if quaternions  (1,i,j,k) . So, the six stailized states of 1-qubit Pauli group are shown as below:

 Iall statesX|+Z|0Y|i 

 -Ino states-X|--Z|1-Y|-i 

Another example is called Shor’s 9-qubit code, which encodes 1 logical qubit,  ψ9 , into 9 physical qubits to correct any errors in the logical qubit. The nine physical qubits are encoded with the logical qubit in the following way:

|ψ9 =α22[(|000+|111)(|000+|111)(|000+|111)]+β22[(|000-|111)(|000-|111)(|000-|111)]     (10)

The stabilizer codes are :

O^12=Z1Z2O^23=Z2Z3O^45=Z1Z2O^56=Z2Z3O^78=Z1Z2O^89=Z2Z3O^1-6=(X1X2X3)(X4X5X6)O^4-9=(X4X5X6)(X7X8X9)

Notice that the stabilizers pairwise commute [15].

5. Representation of stabilizer codes

One amazing observation is that Pauli stabilizer codes with certain “translation symmetry” can be studied using modules over certain group algebra. This section first illustrates how this is done in the case of regular  Zd  lattice and then expands the situation on Cayley graph. A nonempty partial order  (V,)  is called a lattice when any  x,yV  have a greatest lower bound  xy  and a least upper bound  xy [16]. Here, the operations    is called meet and    is called join. Then, more general Cayley graph structures are considered.

5.1. Qudits on square lattice

Assign  q  qudits of dimension  n  to every point in a square lattice  ZD . The group  P , whose elements are Pauli operators on finitely many qudits, is still defined. There is a natural  ZD  action on  P  by translation. For example,  (1,0,,0)ZD  maps the Pauli operator  X  acting on the  i -th qudit at the origin to the  i -th quidit at the point  (1,0,,0)ZD  where  i{1,,q} . This implies that  P=P/ω  is a module over the group ring  Zn[ZD]Zn[x1±,,xD±]=R . A group ring is a ring where each element is also a group.

Proposition 1.  PR2q .

Proof. Denote the standard basis of  R2q  by  {e1,,eq,f1,,fq} . We define a map that takes  ei  to the equivalence class of the Pauli operator  X  acting on the  i -th qudit at the origin. Similarly, it takes  fi  to the equivalence class of the Pauli operator  Z  acting on the  i -th qudit at the origin. This also holds for between  R -modules isomorphisms, as is readily apparent.

We often use elements in  R2q  to represent Pauli operators in  P . This is well-defined if we stipulates that  Z  operators are always behind  X  operators. For example, if we have a system with a single qudit on each point of  Z ,  (1+x,1+x)t=(1+x)e+(1+x)fR2 , where  x=x-1 , stands for the Pauli operator  X0X1Z0Z-1  where the subscript indicates the location of the qudit on which a Pauli matrix acts. It is important that we write  Z0  after  X0  as they do not commute.

The definitions that follow are influenced by symplectic vector spaces. Let  R=Zn[x1±,,xD±] , where  n  and  D  are positive integers. Define an antipode map on  R  by

f(x1,,xD)¯=f(x1,,xD).

For some positive integer  q , let  P=R2q  be a free  R -module. For any  a,bP  define

ω(a,b)=aλqb,

with  a=at  and

λq=(0idq-idq0),(11)

where  idq  is an identity map.

In fact given  a,bR2q , the Pauli operator they represent commutes if and only if  aλqbR , where  R  is the ring defined above in Section 5.1, has zero constant term in the polynomial. Moreover, if  aλqb=0 , then any translate of  a  commutes with any translate of  b  [11].

5.2. Qudits on cayley graph

Let  G  be a discrete group with a set of generators  SG.  Let  C=C(G,S)  be its Cayley graph. Recall that  C  is a directed graph having one vertex associated with each group element and directed edges  (g,h)  whenever  gh-1S . Furthermore,  G  acts on  C  through right multiplication.

On each vertex of  C , attach  q  identical qudits  Cn  to form a total Hilbert space

H=G(Cn)q.

Action of  G  on  C  induces an action on  H  by identifying qudits on vertices connected by  G -action. In doing so, a quantum system with established stabiliser codes is created. Unlike  C , which depends on the choice of  S ,  H  and its  G -action both are independent of  S . Moreover, a quantum spin system defined on square lattice is a special case of qudits on Caley graph where  G=ZD .

5.3. Connection to group representation

Consider  P  Pauli operators modulo phases. It has the structure of  Zn[G]2q  viewed as a module over group ring  Zn[G] . Modules over  Zn[G]  are also known as representations of group  G  over  Zn .  Zn[G]  itself is called the regular representation. The standard symplectic form

ω(a,b)=aλqb,

with  a=at  and

λq=(0idq-idq0),

is still well-defined on  P=Zn[G]2q . And a symmetric stabilizer code is determined by a submodule of  P  on which the form vanishes.

6. Translation-invariant stabilizer code on a cayley graph

6.1. Generalized polynomial method for searching new stabilizer codes

The method mentioned in Secion 5 can be applied to any Cayley graph. Given any Cayley graph, we can represent stabilizer codes using our methods. In detail, we firstly represent the vertices in a Cayley graph by a group ring. One chosen Pauli operator will be the stabilizers of the graph. By using the formula for commutativity, we can find another stabilizer that commutes with the chosen one. Through this way, we can have various chosen stabilizers. Also by continuing using the same way to calculate more stabilizers, we can combine them to form stabilizer codes.

In general, there are some steps we can follow to find a new stabilizer code:

1. Start by choosing a Pauli operator as stabilizer.

2. We solve commuting equations and select a new stabilizer.

3. Repeat step 2 till satisfy any pre-set condition (set before the calculation).

4. The commuting equation will get too restrictive and it is not worth to calculate that, so we can stop our calculations.

5. We can amalgamate the stabilizers to create stabilizer codes.

6.2. An example of finding stabilizer codes on a cayley graph

We will give an example of the Cayley graph of a dihedral group  D4  as shown in Figure 4.  A,B,C,D,E,F,G,H  are 8 vertices in this graph and it is a directed graph.

Figure 5. Cayley graph of D4
Figure 5. Cayley graph of D4

The reason why we choose to find stabilizer codes in the Cayley graph of a dihedral group is because it is a commutative group. We place qudits on the vertices of the Cayley graph. For each qudit, they represent different operations. We define the flip between the vertices in the outer square and the vertices in the inner square to be  τ , and use  r  to represent the rotation of 90 degrees counterclockwise. By following these two rules, we can redenote the vertices, in which  E  is set to be the identity element. Thus,  A  is  τ ,  B  is  τr ,  C  is  τr2 ,  D  is  τr3 ,  E  is  e ,  H  is  r ,  G  is  r2 , and  F  is  r3 .

Firstly, we choose a stabilizer, in which  X4  is applied on the vertex  τ  and  Z4  is applied on the vertex  e . We denote this stabilizer as

(τe).

Our purpose is to find a vector  (mn)  that commutes with  (τe). 

We can apply our formula, thus we can get

(τe)×(0e-e0)×(mn)=0.(12)

Through basic calculation, we can get

(-eτ)×(mn)=0.(13)

Then,

-em+τn=0.(14)

The relationship between  m  and  n  is

τn=m(15)

In this case, it is easy to notice that there are multiple solutions for this equation. We can consider different cases. Here are some possible cases:

6. When  n=τ ,  m=e .  (mn)=(eτ) . In this case, the new stabilizer that commutes with the original stabilizer  (τe) is that  X4  is applied to the vertex  τ  and  Z4  is applied to the vertex  e . Therefore, the stabilizer codes are the combination of  (τe)  and  (eτ) .

7. When  n=r ,  m=τr .  (mn)=(τrr).  In this case, the new stabilizer that commutes with the original stabilizer  (τe)  is that  X4  is in  τr  and  Z4  is in  r . Therefore, the stabilizer codes are the combination of  (τe)  and  (τrr) .

8. When  n=r2 ,  m=τr2 .  (mn)=(τr2r2).  In this case, the new stabilizer that commutes with the original stabilizer  (τe)  is that  X4  is in  τr2  and  Z4  is in  r2 . Therefore, the stabilizer codes are the combination of  (τe)  and  (τr2r2) .

9. Also, we can have some more complicated cases. For example, when  n=r+r2 ,  m=τr+τr2 .  (mn)=(τr+τr2r+r2). 

Note that when we find stabilizer codes through this way, we can continue to find another one by using the one we just get. For example, for Case 1, we have already got  (mn)=(τe) . Therefore, we multiply  (mn)  with a new stabilizer, denoted by  (xy) . Then we set the  (mn)×(xy)=0 , so we can find the value of  (xy) . At this situation, our new stabilizers are the combination of the original given stabilizer  (τe) ,  (mn) , and  (xy) . However, through doing calculations, we can get a series of stabilizers for each case. The conditions will be more serious, so eventually the stabilizers will be too complicated to be worth calculating. At that time, we can terminate the process. Ultimately, we can combine the stabilizers to form stabilizer codes.

Therefore, by continuing calculating and finding various solutions, we can get different kinds of stabilizer codes and all of them can be clearly presented on Cayley graph.

7. Conclusion & further exploration

In conclusion, based on existing information of quantum computing and abstract algebra, we have devised an innovative method to find a stabilizer codes to solve our the problem of quantum errors. Specifically, we use a mathematical way to write the common way to find stabilizer codes and find that the methods can be extended to find stabilizer codes on a more complicated group or graph. We also give an example of how to use this method to find a stabilizer group on a dihedral graph  D4 . This approach enables the identification of various stabilizer codes.

The further exploration is to develop a program on computer or to find a mathematical way to compare codes found through this methods among themselves and with existing stabilizer codes, thus contributing to the development of quantum computing.


References

[1]. Andrew Steane. Quantum computing. Reports on Progress in Physics, 61(2):117, 1998.

[2]. David P DiVincenzo and Daniel Loss. Quantum computers and quantum coherence. Journal of Magnetism and Magnetic Materials, 200(1-3):202–218, 1999.

[3]. Andrew M Steane. Error correcting codes in quantum theory. Physical Review Letters, 77(5):793, 1996.

[4]. A Robert Calderbank and Peter W Shor. Good quantum error-correcting codes exist. Physical Review A, 54(2):1098, 1996.

[5]. Andrew Steane. Multiple-particle interference and quantum error correction. Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences, 452(1954):2551–2577, 1996.

[6]. Andrew M Steane. Simple quantum error-correcting codes. Physical Review A, 54(6):4741, 1996.

[7]. Lucio Piccirillo. Introduction to the Maths and Physics of Quantum Mechanics. CRC Press, 2023.

[8]. Mike Krebs and Anthony Shaheen. Expander families and Cayley graphs: a beginner’s guide. Oxford University Press, 2011.

[9]. Ivan Djordjevic. Quantum information processing and quantum error correction: an engineering approach. Academic press, 2012.

[10]. James C Robinson. An introduction to functional analysis. Cambridge University Press, 2020.

[11]. Jeongwan Haah. Algebraic methods for quantum codes on lattices. arXiv preprint arXiv: 1607. 01387, 2016.

[12]. Gerhard Rosenberger, Annika Schürenberg, and Leonard Wienke. Abstract Algebra: With Applications to Galois Theory, Algebraic Geometry, Representation Theory and Cryptography. Walter de Gruyter GmbH & Co KG, 2024.

[13]. Weisheng Qiu. Group representation theory. Higher Education Press, 2011.

[14]. Mark J DeBonis. Fundamentals of Abstract Algebra. CRC Press, 2024.

[15]. Steven H Simon. Topological quantum: Lecture notes and proto-book. Unpublished prototype. [online] Available at: http://www-thphys. physics. ox. ac. uk/people/SteveSimon, 26:35, 2020.

[16]. Volker Diekert, Manfred Kufleitner, Gerhard Rosenberger, and Ulrich Hertrampf. Elements of Discrete Mathematics: Numbers and Counting, Groups, Graphs, Orders and Lattices. Walter de Gruyter GmbH & Co KG, 2023.


Cite this article

Gui,Y. (2025). Stabilizer Codes on a Cayley Graph. Advances in Operation Research and Production Management,4(1),79-91.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Journal:Advances in Operation Research and Production Management

Volume number: Vol.4
Issue number: Issue 1
ISSN:3029-0880(Print) / 3029-0899(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).

References

[1]. Andrew Steane. Quantum computing. Reports on Progress in Physics, 61(2):117, 1998.

[2]. David P DiVincenzo and Daniel Loss. Quantum computers and quantum coherence. Journal of Magnetism and Magnetic Materials, 200(1-3):202–218, 1999.

[3]. Andrew M Steane. Error correcting codes in quantum theory. Physical Review Letters, 77(5):793, 1996.

[4]. A Robert Calderbank and Peter W Shor. Good quantum error-correcting codes exist. Physical Review A, 54(2):1098, 1996.

[5]. Andrew Steane. Multiple-particle interference and quantum error correction. Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences, 452(1954):2551–2577, 1996.

[6]. Andrew M Steane. Simple quantum error-correcting codes. Physical Review A, 54(6):4741, 1996.

[7]. Lucio Piccirillo. Introduction to the Maths and Physics of Quantum Mechanics. CRC Press, 2023.

[8]. Mike Krebs and Anthony Shaheen. Expander families and Cayley graphs: a beginner’s guide. Oxford University Press, 2011.

[9]. Ivan Djordjevic. Quantum information processing and quantum error correction: an engineering approach. Academic press, 2012.

[10]. James C Robinson. An introduction to functional analysis. Cambridge University Press, 2020.

[11]. Jeongwan Haah. Algebraic methods for quantum codes on lattices. arXiv preprint arXiv: 1607. 01387, 2016.

[12]. Gerhard Rosenberger, Annika Schürenberg, and Leonard Wienke. Abstract Algebra: With Applications to Galois Theory, Algebraic Geometry, Representation Theory and Cryptography. Walter de Gruyter GmbH & Co KG, 2024.

[13]. Weisheng Qiu. Group representation theory. Higher Education Press, 2011.

[14]. Mark J DeBonis. Fundamentals of Abstract Algebra. CRC Press, 2024.

[15]. Steven H Simon. Topological quantum: Lecture notes and proto-book. Unpublished prototype. [online] Available at: http://www-thphys. physics. ox. ac. uk/people/SteveSimon, 26:35, 2020.

[16]. Volker Diekert, Manfred Kufleitner, Gerhard Rosenberger, and Ulrich Hertrampf. Elements of Discrete Mathematics: Numbers and Counting, Groups, Graphs, Orders and Lattices. Walter de Gruyter GmbH & Co KG, 2023.