Next Article in Journal
Phase-Specific Damage Tolerance of a Eutectic High Entropy Alloy
Next Article in Special Issue
Entanglement of Temporal Sections as Quantum Histories and Their Quantum Correlation Bounds
Previous Article in Journal
Market Impact Analysis of Financial Literacy among A-Share Market Investors: An Agent-Based Model
Previous Article in Special Issue
Quantum Information Entropy for Another Class of New Proposed Hyperbolic Potentials
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Asymmetric Entanglement-Assisted Quantum MDS Codes Constructed from Constacyclic Codes

1
College of Computer and Information Sciences, Fujian Agriculture and Forestry University, Fuzhou 350002, China
2
College of Computer Science and Mathematics, Fujian University of Technology, Fuzhou 350118, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(12), 1603; https://doi.org/10.3390/e25121603
Submission received: 25 September 2023 / Revised: 12 November 2023 / Accepted: 21 November 2023 / Published: 30 November 2023
(This article belongs to the Special Issue Quantum Shannon Theory and Its Applications)

Abstract

:
Due to the asymmetry of quantum errors, phase-shift errors are more likely to occur than qubit-flip errors. Consequently, there is a need to develop asymmetric quantum error-correcting (QEC) codes that can safeguard quantum information transmitted through asymmetric channels. Currently, a significant body of literature has investigated the construction of asymmetric QEC codes. However, the asymmetry of most QEC codes identified in the literature is limited by the dual-containing condition within the Calderbank-Shor-Steane (CSS) framework. This limitation restricts the exploration of their full potential in terms of asymmetry. In order to enhance the asymmetry of asymmetric QEC codes, we utilize entanglement-assisted technology and exploit the algebraic structure of cyclotomic cosets of constacyclic codes to achieve this goal. In this paper, we generalize the decomposition method of the defining set for constacyclic codes and apply it to count the number of pre-shared entangled states in order to construct four new classes of asymmetric entanglement-assisted quantum maximal-distance separable (EAQMDS) codes that satisfy the asymmetric entanglement-assisted quantum Singleton bound. Compared with the codes existing in the literature, the lengths of the constructed EAQMDS codes and the number of pre-shared entangled states are more general, and the codes constructed in this paper have greater asymmetry.

1. Introduction

Quantum computing is a new computing paradigm that follows the laws of quantum mechanics to manage the processing of quantum information units. Compared with traditional computing, quantum computing offers exponential acceleration and significant breakthroughs [1]. In recent years, various scientifically advanced countries have placed great emphasis on quantum computing research and have launched their own quantum information technology strategies. They aim to capture the leading edge of the next wave of technological development and strive to achieve “quantum supremacy” as soon as possible [1]. Among them, Google, Rigetti Computing, and other world-leading institutions are engaged in quantum computing research. All of this indicates that quantum computing research is a very important and worthwhile field of study. It is particularly noteworthy that A. S. Holevo received the prestigious Claude E. Shannon Award from the IEEE Information Theory Society in 2016, in recognition of his groundbreaking contributions to quantum information theory. This honor marks the first time that research in the field of quantum information theory has been recognized with the highest award in the field of information theory. Additionally, quantum coding theory is an important research topic in quantum Shannon theory.
One of the key technologies in quantum computing research is QEC codes [2], which are essential for protecting quantum information from quantum decoherence caused by quantum noise during quantum computing and communication processes. Designing high-performance QEC codes is crucial for the future realization of quantum computing and communication. Classical computers can significantly enhance the reliability of computer communication and approach the Shannon capacity of channels with the help of error-correcting codes. However, due to the uncloneability of quantum states, the continuity of quantum errors, and the destruction of quantum information upon measurement [2], existing classical error-correcting code technology cannot be directly applied to protect quantum information. Research studies have shown that QEC codes can protect stored quantum information and also enable fault-tolerant quantum gate operations, fault-tolerant quantum state preparation, and fault-tolerant quantum measurements, thereby making quantum information processing reliable in noisy environments [2]. Currently, the research on QEC codes has become one of the important topics in the field of quantum computing and quantum information.
Similar to classical error-correcting codes theory, constructing and searching for QEC codes with maximum minimum distance is a core problem in the study of quantum coding theory. The quantum CSS code model, which transforms complex physical quantities into mathematical models, provides a connection between QEC codes and classical error-correcting codes [3]. Although a quantum CSS framework can be constructed from classical codes that are dual-containing (self-orthogonal), constructing quantum maximal-distance separable (MDS) codes with a relatively large minimum distance is not an easy task. Except for some special lengths of quantum codes, the minimum distance of most known q-ary quantum MDS codes is less than or equal to q 2 + 1 . Currently, the methods used to construct quantum MDS codes mainly adopt cyclic codes, constacyclic codes (narrow or non-narrow [4]) over finite fields, as well as generalized Reed–Solomon (RS) codes. Compared to traditional cyclic codes over finite fields, constacyclic codes over finite fields are a generalization of cyclic codes. They not only integrate the good performance of cyclic codes but also exhibit several new characteristics and rich algebraic structures. Additionally, compared to generalized Reed–Solomon codes over finite fields, constacyclic codes have a simpler algebraic structure of cyclotomic cosets and demonstrate good error-correcting capabilities. Although constacyclic dual-containing codes have better parameters and can obtain a few quantum MDS codes with a minimum distance greater than q 2 + 1 , the minimum distance of quantum MDS codes constructed by constacyclic codes is not always greater than q 2 + 1 . Additionally, the minimum distance of traditional quantum MDS codes still cannot exceed the q + 1 limit. Therefore, the dual-containing condition has posed an obstacle to the development of quantum coding theory [5].
In recent years, a major breakthrough in the field of QEC codes has been the construction system of entanglement-assisted stabilizer codes, which allows two parties to share a certain number of maximally entangled pairs in advance. This removes the restriction that the quantum stabilizer must be a subgroup of the Pauli group, thus allowing the error correction properties of any non-Abelian group to be applied [2]. The proposal of entanglement-assisted quantum error-correcting (EAQEC) codes breaks the limitation of the dual-containing condition previously required by stabilizer codes, which alleviates the challenges in determining the dual-containing condition necessary for modern codes such as LDPC codes [6] and Turbo codes [7]. Due to the more extensive algebraic structure of constacyclic codes over finite fields compared to cyclic codes, the synergy of entanglement-assisted techniques and constacyclic codes provides a rich resource for exploring the construction of entanglement-assisted quantum MDS (EAQMDS) codes. However, entanglement-assisted techniques also require the consumption of additional entanglement resources. Therefore, for EAQMDS codes, it is of significant research importance and potential application value to construct more quantum MDS codes with a minimum distance greater than q 2 + 1 or even q + 1 , while consuming entanglement resources as little as possible.
QEC codes defined over quantum channels—where qubit-flip errors (qudit-flip errors are primarily considered for high-dimensional systems) and phase-shift errors may have different probabilities—are called asymmetric QEC codes [8]. In many quantum mechanical systems, the probabilities of occurrence of qubit-flip and phase-shift errors are quite different [2]. Previous research on constructing entanglement-assisted quantum codes has predominantly focused on code constructions for symmetric quantum channels [9,10,11,12,13,14,15]. Recently, Galindo et al. introduced the concept of asymmetric EAQEC codes and presented an explicit computation of the parameters for asymmetric EAQEC codes derived from BCH codes [16]. Moreover, the quantum Singleton bound for asymmetric EAQMDS codes has been established in [16,17,18,19], along with the proposal of a general Euclidean construction method based on cyclic codes. Although there has been some progress in the study of asymmetric EAQMDS codes, several issues still need to be addressed.
  • Although sharing a certain number of entangled states between the communicating parties can enhance the error-correcting ability of quantum codes, it actually incurs higher entanglement preparation costs. Exploring how to obtain asymmetric EAQMDS codes with either good error-correcting capability or a high code rate, within the context of lower-cost preparation of entangled resources, is a topic worth exploring.
  • Although constacyclic codes inherit the good performance of cyclic codes, a pertinent question is how we can utilize the decomposition method of the defining set of constacyclic codes to achieve a general number of entangled states for the constructed EAQMDS codes?
Therefore, asymmetric EAQMDS codes are constructed in this paper by using constacyclic codes over finite fields. The main contributions are as follows:
  • The decomposition method of the defining set of constacyclic codes is re-characterized and applied to construct asymmetric EAQMDS codes. Under the same code length and fixed d z and d x , some asymmetric EAQMDS codes constructed in this paper can achieve the same net rate ( k c ) / n as the quantum codes in [18]. However, the asymmetric EAQMDS codes in this paper require fewer entangled states, which means that the preparation cost and cost of quantum entangled states required in this paper are less. In addition, some quantum codes that do not exist in [18,20,21,22,23,24,25,26,27,28,29] are obtained in this paper. Moreover, the minimum distance d z of some asymmetric EAQMDS codes constructed in this paper is much greater than q, indicating that such quantum codes have greater asymmetric error-correcting ability.
  • The number of entangled states in the constructed quantum codes exhibits generality. The parameters of the constructed asymmetric EAQMDS codes in this paper are listed as follows:
    (1)
    [ [ q 2 + 1 β , q 2 + 1 β 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 , where q = 2 β m + β + t is an odd prime power with a positive integer m and t 2 is even, such that β = t 2 + 1 , 0 δ 1 q β t 2 β , q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 + v q 1 and 0 v δ 1 .
    (2)
    [ [ q 2 + 1 β , q 2 + 1 β 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 , where q = 2 β m + β t is an odd prime power with a positive integer m and t 2 is even, such that β = t 2 + 1 , 0 δ 1 q β + t 2 β , q + β + t 2 β δ 2 q 2 + 1 2 β q δ 1 + v q 1 and 0 v δ 1 .
    (3)
    [ [ 2 ( q 2 + 1 ) α , 2 ( q 2 + 1 ) α 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 , where q = α m + α + t is an odd prime power with a positive integer m and t 3 is odd, such that α = t 2 + 1 , 0 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 + v q 1 , and 0 v t 1 2 .
    (4)
    [ [ 2 ( q 2 + 1 ) α , 2 ( q 2 + 1 ) α 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 , where q = α m + α t is an odd prime power with a positive integer m and t 3 is odd, such that α = t 2 + 1 , 0 δ 1 q + t α and q + α + t α δ 2 q 2 + 1 α q δ 1 + v q 1 , and 0 v t 1 2 .
The rest of this paper is organized as follows. In Section 2, we present some related works about symmetric and asymmetric EAQEC codes. In Section 3, we present some definitions and basic results of constacyclic codes and asymmetric EAQEC codes. In Section 4, four families of EAQMDS codes are constructed by using constacyclic codes with lengths of q 2 + 1 β and 2 ( q 2 + 1 ) α , respectively, where the number of entangled states constructed for asymmetric EAQMDS codes is universal. In Section 5, we mainly compare the parameters of the asymmetric EAQMDS codes constructed in this paper with those of the quantum codes in [18,25,27,28]. In Section 6, we present our conclusion and discussion.

2. Related Works

Since the works of Shor [30] and Steane [2,31], QEC codes have attracted a lot of attention from experts and scholars. Constructing good quantum codes through classical codes is particularly important in quantum information and quantum computing [32,33,34,35,36]. Some scholars utilize constacyclic codes (including both cyclic and negacyclic codes) to construct quantum MDS codes with a minimum distance greater than q 2 + 1 based on Hermite construction. Kai et al. used negacyclic codes to construct two classes of quantum MDS codes [37]. Since then, other types of negacyclic or constacyclic codes have also been studied by scholars, as detailed in references [5,38,39,40,41,42,43,44]. Although quantum MDS codes can be obtained through the construction of dual-containing (self-orthogonal) classical codes, most known q-ary quantum MDS codes have a minimum distance that is less than or equal to q 2 + 1 . Therefore, the dual-containing condition restricts the development of quantum coding theory [5].
Recently, the discovery of EAQEC coding theory has played an important role in the field of quantum information and quantum computing. Brun et al. proposed the entanglement-assisted stabilizer framework in [45]. They showed that some EAQEC codes can be constructed without the need for the dual-containing condition of classical quaternary codes if a certain number of entangled states are pre-shared between the sender and receiver. In [46], Li et al. proposed the decomposition method of the defining set of cyclic codes and used this method to construct EAQEC codes with good parameters. In [25], Fan et al. constructed EAQMDS codes with the help of a small number of pre-shared maximally entangled states. Guenda et al. introduced the concept of the Hull of classical codes in [47] and used it to construct some EAQMDS codes. In fact, the concept of the decomposition method of the defining set is functionally equivalent to the concept of the Hull of classical codes, both aimed at counting the entangled states of entanglement-assisted quantum codes. In [48], we proposed the concept of the decomposition method of the defining set for negacyclic codes over finite fields and employed it to construct several classes of EAQMDS codes of varying lengths. In [5,49], Lü et al. constructed several classes of EAQMDS by using negacyclic and constacyclic codes with the decomposition method of the defining set, and some of the EAQMDS codes have minimum distances greater than q + 1 . In [50], constacyclic codes with a length of q 2 1 r were used to construct some new EAQMDS codes, where r = 3 , 5 , 7 , and q 1 mod 5. In fact, pre-shared entangled states can improve the error correction ability of quantum codes. Quantum MDS codes that originally have a minimum distance of less than q 2 + 1 can have their minimum distance increased to more than q 2 + 1 or even q + 1 through the pre-shared entangled states. Therefore, it is necessary to consider EAQMDS codes with a larger minimum distance, and it is worth exploring how to count pre-shared entangled states to achieve a minimum distance greater than q 2 + 1 or even q + 1 for quantum MDS codes.
In quantum channels, the probabilities of qubit-flip (or qudit-flip) and phase-shift errors can be significantly different, and QEC codes that take advantage of this asymmetry are called asymmetric QEC codes. In 2007, Ioffe et al. [8] proposed asymmetric QEC schemes based on BCH and LDPC codes. Since then, some good asymmetric QEC codes have been constructed from families of known classical codes, such as BCH codes [51,52,53], constacyclic codes [54,55,56], RS codes [57], and others. New families of non-binary asymmetric quantum BCH codes and subsystem BCH codes were constructed by Leng and Ma [58]. The bounds for asymmetric quantum stabilizer codes were provided by Sarvepalli et al. [59,60]. Tang et al. [61] constructed several classes of asymmetric QEC codes with unbounded lengths from repeated-root cyclic codes and proposed asymmetric QEC codes that exceeded the asymmetric quantum Gilbert–Varshamov bound [62]. In [63], a few of the good asymmetric QEC codes were obtained from quasi-cyclic codes over small fields, which cannot all be deduced by the asymmetric quantum Gilbert–Varshamov bound in Matsumoto [62]. In addition, there are other construction methods that have also promoted the development of the theory of asymmetric QEC codes [64,65,66]. Recently, Galindo et al. [16] introduced the concept of asymmetric EAQEC codes and provided a Gilbert–Varshamov bound for asymmetric EAQEC codes. They then presented the explicit computation of the parameters of asymmetric EAQEC codes derived from BCH codes. In [18], the authors established a bound for pure asymmetric EAQEC codes similar to the quantum Singleton bound and introduced the definition of pure asymmetric EAQMDS codes. They then constructed three new families of asymmetric EAQEC codes. In [17], the authors determined the number of maximal entangled states required for asymmetric EAQEC codes by constructing linear l-intersection pairs for MDS codes. Compared to cyclic codes over finite fields, constacyclic codes have significant algebraic structural advantages, but there are currently few references on the use of constacyclic codes to construct asymmetric EAQEC codes, especially asymmetric EAQMDS codes.

3. Preliminaries

3.1. Constacyclic Codes

In this subsection, we recall some basic results about constacyclic codes in [33,37,38,67,68,69].
Let F q 2 be the finite field with q 2 elements, where q is a power of p and p is an odd prime number. F q 2 n is the n-dimension row vector space over F q 2 , in which n is a positive integer. An [ n , k , d ] q 2 linear code of length n over finite field F q 2 is a nonempty subspace of F q 2 n and its minimum distance is d. Throughout this paper, we assume that n is a positive integer relatively prime to q, i.e., g c d ( n , q ) = 1 . Moreover, the Singleton bound of linear codes is given as follows.
Proposition 1 
([67,70]). (Singleton bound) If an [ n , k , d ] linear code C over F q 2 exists, then
k n d + 1 .
If k = n d + 1 , then C is called an MDS code.
Let a q = ( a 0 q , a 1 q , , a n 1 q ) denote the conjugation of the vector a = ( a 0 , a 1 , , a n 1 ) . For u = ( u 0 , u 1 , , u n 1 ) and v = ( v 0 , v 1 , , v n 1 ) F q 2 n , the Hermitian inner product is defined as u , v h = u 0 v 0 q + u 1 v 1 q + + u n 1 v n 1 q . The Hermitian dual code of C can be defined as C h = { u F q 2 n u , v h = 0 f o r a l l v C } . If C C h , then C is called Hermitian self-orthogonal code. If C h C , then C is a Hermitian dual-containing code.
For a nonzero element λ F q 2 , a linear code C of length n over F q 2 satisfies the property that
( c 0 , c 1 , , c n 1 ) C ( λ c n 1 , c 0 , c 1 , , c n 2 ) C ,
then C is called a q 2 -ary λ -constacyclic code of length n over F q 2 . When λ = 1 ,   C is a negacyclic code. When λ = 1 ,   C is a cyclic code.
From [33,37], a q 2 -ary λ -constacyclic code C over F q 2 of length n is precisely an ideal in F q 2 [ x ] / x n λ and C can be generated by a monic polynomial g ( x ) which divides x n λ . Assume that λ F q 2 is a primitive r-th root of unity, and then it exists a primitive r n -th root of unity over some extension field of F q 2 , denoted by η , such that η n = λ . Let ξ = η r , then ξ is a primitive n-th root of unity, and the roots of x n λ are precisely the elements η ξ i = η 1 + r i , where 0 i n 1 . Set O r n = { 1 + r i | 0 i n 1 } . If C is a λ -constacyclic code over F q 2 of length n with generator polynomial g ( x ) , then the defining set of the constacyclic code C = g ( x ) is the set Z = { i O r n η i i s a r o o t o f g ( x ) } . For each i O r n , the set C i = { i , i q 2 , i q 4 , , i q 2 k 2 } mod r n is called the q 2 -cyclotomic coset modulo r n , where k is the smallest positive integer such that i q 2 k i mod r n . The defining set Z of constacyclic C is the union of some q 2 -cyclotomic cosets modulo r n . Constacyclic BCH codes have some properties that are similar to BCH codes. The following result gives the BCH bound of constacyclic codes.
Proposition 2 
(The BCH bound for constacyclic codes [33,38,68]). Assume that g c d ( n ,   q ) = 1 . Let C be a q 2 -ary λ-constacyclic code of length n. If the generator polynomial g ( x ) of C has the elements { η 1 + r i 0 i d 2 } as the roots, where η is a primitive r n -th root of unity, then the minimum distance of C is at least d.
From [33,37], we can see that the Hermitian dual C h of a λ -constacyclic code over F q 2 is a λ q -constacyclic code. If C is a constacyclic code over F q 2 with defining set Z , then the Hermitian dual C h has a defining set Z h = { z O r n | q z mod r n Z } . Moreover, it has the following result in [33,37].
Lemma 1 
([33,37]). Let C be a q 2 -ary constacyclic code of length n with defining set Z. Then C contains its Hermitian dual code if and only if Z q Z = , where q Z = { q z mod r n z Z } .

3.2. Asymmetric QEC Codes

In this subsection, we present some definitions and basic results of binary asymmetric QEC codes, and then introduce the basic results of q-ary asymmetric QEC codes. Specific details can be found [51,53,57,65,71,72].

3.2.1. Asymmetric QEC Codes for Qubit-Based Systems

In quantum information processing, a quantum bit (qubit) is a non-zero vector in the two-dimensional complex vector space C 2 . Typically, a basis for C 2 is represented as | 0 and | 1 , so a qubit can be represented as
α | 0 + β | 1 = α β ,
where α , β C and | α | 2 + | β | 2 = 1 . A quantum state (n-qubit) is a non-zero vector in the tensor product space C 2 n , assuming the basis vector of the tensor product space is | a , where | a = | a 1 a 2 a n and ( a 1 , a 2 , , a n ) F 2 n . Therefore, a quantum state can be uniquely represented as | v = a F 2 n c ( a ) | a , where c ( a ) with a F 2 n is a complex number that is not all zeros.
In quantum physics, a quantum state is a vector in C 2 n , and each quantum error is a unitary linear transformation in the complex vector space C 2 n . According to the CSS stabilizer theory, only independent error operators acting on each qubit need to be considered, and only three Pauli operators need to be considered for the error action on each qubit: X = 0 1 1 0 ,   Z = 1 0 0 1 and Y = 0 i i 0 . These three unitary operators act on the qubit | v = α | 0 + β | 1 as follows:
X | v = α | 1 + β | 0 ,
Z | v = α | 0 β | 1 ,
and
Y | v = i α | 1 i β | 0 ,
where X 2 = Y 2 = Z 2 = I 2 , Y = i X Z and I 2 = 1 0 0 1 .
The form of each error operator on the complex space C 2 n is e = i λ ω 1 ω 2 ω n , where λ { 0 , 1 , 2 , 3 } , ω i { I 2 , X , Y , Z } with 1 i n , here ω = I 2 indicates that the i-th qubit does not have an error. In fact, the Pauli operators and the phase factors { ± 1 , ± i } jointly constitute a Pauli group. For the basis vector | a = | a 1 a 2 a n , it has
e | a = i λ ( ω 1 | a 1 ) ( ω 2 | a 2 ) ( ω n | a n ) .
In addition, for a n-qubit | v = a F 2 n c ( a ) | a , it has
e | v = a F 2 n c ( a ) ( e | a ) .
Let G i and H i be the parity check and generator matrices of a classical code C i with parameters [ n , k i , d i ] for i { 1 , 2 } . The stabilizer of a quantum code based on the parity check matrices H 1 and H 2 satisfies the following equation
H 1 H 2 T + H 2 H 1 T = 0 ( m o d 2 ) ,
where H i T denotes the transpose of the matrix H i . The normalizer of the quantum code based on the generator matrices G 1 and G 2 satisfies the conditions H 1 G 1 T = 0 and H 2 G 2 T = 0 .
Therefore, the CSS construction of a binary AQEC code can be stated as Definition 1, where one of the two classical codes controls phase-shift errors, while the other controls qubit-flip errors.
Definition 1 
([51]). Given two classical codes C 1 and C 2 such that C 2 C 1 . If G = G 1 0 0 G 2 , and H = H 1 0 0 H 2 , then
H 1 H 2 T + H 2 H 1 T = 0 .
Let d x = w t ( C 1 \ C 2 ) and d z = w t ( C 2 \ C 1 ) , such that d z > d x and k 1 + k 2 > n . Assuming that C 1 corrects the qubit-flip errors and C 2 corrects phase-shift errors, then there exist AQEC codes with parameters
[ [ n , k 1 + k 2 n , d z / d x ] ] 2 .

3.2.2. Asymmetric QEC Codes for Qudit-Based Systems

Binary asymmetric QEC codes and q-ary asymmetric QEC codes are both designed to protect quantum information from noise and decoherence. The extension of binary asymmetric QEC codes to q-dimensional cases has practical significance, as in practical quantum computing, we may need to handle more qudits and may want to use different types of qudits to achieve more complex computations. Therefore, studying q-ary asymmetric QEC codes can help us better understand and design error-correcting schemes in practical quantum computing.
Let H be the Hilbert space H = C q n = C q C q . Let | x be the vectors of an orthonormal basis of C q , where the notions x are elements of F q . Consider a , b F q , the unitary operators X ( a ) and Z ( b ) in C q are defined by
X ( a ) | x = | x + a
and
Z ( b ) | x = ω t r ( b x ) | x
respectively, where ω = e x p ( 2 π i / p ) is a p-th root of unity and t r is the trace map from F q to F p (p is a prime). Consider that a = ( a 1 , a 2 , , a n ) F q n and b = ( b 1 , b 2 , , b n ) F q n . Let
X ( a ) = X ( a 1 ) X ( a 2 ) X ( a n )
and
Z ( b ) = Z ( b 1 ) Z ( b 2 ) Z ( b n )
be the tensor products of n error operators. The set
E n = { X ( a ) Z ( b ) a , b F q n }
is an error basis on the complex vector space C q n and the set
G n = { ω c X ( a ) Z ( b ) a , b F q n , c F p }
is the error group associated with E n . For a quantum error e = ω c X ( a ) Z ( b ) G n , where the quantum weight ω Q ( e ) , the X-weight ω X ( e ) , and the Z-weight ω Z ( e ) of e are defined, respectively, by
ω Q ( e ) = { i : 1 i n , ( a i , b i ) ( 0 , 0 ) } ,
ω X ( e ) = { i : 1 i n , a i 0 } ,
ω Z ( e ) = { i : 1 i n , b i 0 } .
Definition 2 
([53]). A q-ary asymmetric QEC code Q, denoted by [ [ n , k , d z / d x ] ] q , is a q k -dimensional subspace of the Hilbert space C q n , it can control all qudit-flip errors up to ( d x 1 ) / 2 and all phase-shift errors up to ( d z 1 ) / 2 .

3.3. Asymmetric EAQEC Codes

In this subsection, we present some definitions and some basic results about EAQEC codes in [45,46,48,50].
A q-ary [ [ n , k , d ; c ] ] q EAQEC code can encode k information qudits into n channel qudits with the help of c pairs of maximally entangled states and correct up to d 1 2 errors, in which d is the minimum distance of the code. The performance of an entanglement-assisted quantum code can be assessed through the metric of net rate k c n . Let H be an ( n k ) × n parity check matrix of C over F q 2 . Then C h has an n × ( n k ) generator matrix H , where H is the conjugate transpose matrix of H over F q 2 .
Definition 3 
(Asymmetric EAQEC codes [16,17,18]). An [ [ n , k , d z / d x ; c ] ] q 2 asymmetric EAQEC code Q over F q 2 encodes k logical qudits into n physical qudits with the help of c copies of maximally entangled states, which can correct all qudit-flip errors up to d x 1 2 and all phase-flip errors up to d z 1 2 .
Theorem 1 
([16,73]). Let C 1 and C 2 be two linear codes over F q 2 with parameters [ n , k i , d i ] q 2 with the parity check matrices H i , respectively, for i = 1 , 2 . Then there exists an asymmetric QEC code with parameters [ [ n , k 1 + k 2 n + c , d z / d x ; c ] ] q 2 , where d z = w t ( C 1 ( C 1 C 2 h ) ) and d x = w t ( C 2 ( C 2 C 1 h ) ) , with d z and d x as the minimum Hamming weight of the elements in the corresponding set, and
c = r a n k ( H 1 H 2 ) = d i m ( C 1 h ) d i m ( C 1 h C 2 )
 is the number of required maximally entangled states.
Proposition 3 
(Quantum Singleton bound for asymmetric EAQEC codes [16,17]). If an [ [ n , k , d z / d x ;   c ] ] q 2 asymmetric EAQEC code C exists, then
d z + d x n k + 2 + c .
If C satisfies the equality d z + d x = n k + 2 + c , then it is called an asymmetric EAQMDS code.

4. Constructions of Asymmetric EAQMDS Codes

In [5,48,50,74], the authors defined the decomposition of the defining set of constacyclic codes, including cyclic codes and negacyclic codes. The following Definition 4 further extends the decomposition method for the defining set of constacyclic codes.
Definition 4. 
Let C 1 and C 2 be constacyclic codes of length n with defining sets Z 1 and Z 2 , respectively, where g c d ( n , q ) = 1 . Assume that Z 11 = Z 1 ( q Z 2 ) , Z 12 = Z 1 Z 11 , and Z 21 = Z 2 ( q Z 1 ) , Z 22 = Z 2 Z 21 , where q Z 1 = { q x | x Z 1 } and q Z 2 = { q x | x Z 2 } . Then Z i = Z i 1 Z i 2 is called a decomposition of the defining set of C i with respect to C [ ( i + 1 ) m o d 2 ] + 1 for i = 1 , 2 .
Lemma 2. 
Let Z 1 and Z 2 be two defining sets of constacyclic code C 1 and C 2 with length n, respectively, where g c d ( n , q ) = 1 . Suppose that Z i = Z i 1 Z i 2 is a decomposition of Z i . Then the number of entangled states required is c = | Z i 1 | for i = 1 , 2 .
Proof. 
Assume that the defining sets Z 1 and Z 2 can generate constacyclic codes C 1 and C 2 , respectively. Let the parity check matrices of C 1 and C 2 over F q 2 be H 1 and H 2 , respectively. Therefore,
H 1 = H 11 H 12 ,
and
H 2 = H 21 H 22 ,
where H 11 and H 12 are parity check matrices of constacyclic codes generated by defining sets with Z 11 and Z 12 , respectively, and H 21 and H 22 are parity check matrices of constacyclic codes generated by defining sets with Z 21 and Z 22 , respectively.
Hence,
H 1 H 2 = H 11 H 21 H 11 H 22 H 12 H 21 H 12 H 22 .
From Definition 4, it has
H 1 H 2 = H 11 H 21 0 0 0 .
Hence, it has c = r a n k ( H 1 H 2 ) = r a n k ( H 11 H 21 ) = | Z i 1 | . □
From Lemma 2, if C 1 = C 2 , then the following Corollary 1 can be derived easily.
Corollary 1. 
Let Z be a defining set of constacyclic code C with length n, where g c d ( n , q ) = 1 . Suppose that Z = Z 1 Z 2 is a decomposition of Z. Then the number of entangled states required is c =   | Z 1 | , where Z 1 = Z ( q Z ) , Z 2 = Z Z 1 , and q Z = { q x | x Z } .
Lemma 3 
([11]). Let n = q 2 + 1 β and s = q 2 + 1 2 , where q is an odd prime power of the form 2 β m + β + t or 2 β m + β t , m is a positive integer, and t 2 is even, such that β = t 2 + 1 . Then C s = { s } , C s + q + 1 2 n = { s + q + 1 2 n } and C s ( q + 1 ) i = { s ( q + 1 ) i , s + ( q + 1 ) i } for 1 i n 2 1 .
Lemma 4. 
Let n = q 2 + 1 β , s = q 2 + 1 2 and r = q + 1 , where q is an odd prime power of the form 2 β m + β + t , m is a positive integer, and t 2 is even, such that β = t 2 + 1 . If C 1 and C 2 are two q 2 -ary constacyclic codes whose defining sets are given by Z 1 = i = 0 δ 1 C s ( q + 1 ) i and Z 2 = i = 0 δ 2 C s ( q + 1 ) i , respectively, where 0 δ 1 q β t 2 β and q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 1 , then C 1 h C 2 .
Proof. 
If C 1 and C 2 are two q 2 -ary constacyclic codes whose defining sets are given by Z 1 = i = 0 δ 1 C s ( q + 1 ) i and Z 2 = i = 0 δ 2 C s ( q + 1 ) i from Lemma 3, respectively, where 0 δ 1 q β t 2 β and q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 1 , then C 1 and C 2 are two MDS constacyclic codes with parameters [ n , n 2 δ 1 1 , 2 δ 1 + 2 ] q 2 and [ n , n 2 δ 2 1 , 2 δ 2 + 2 ] q 2 , respectively, from Propositions 1 and 2. For 0 δ 1 q β t 2 β and q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 1 , it has C 1 h C 2 . In fact, it only needs to show that Z 2 q Z 1 = . If Z 2 q Z 1 , then there exist two integers δ 1 and δ 2 such that s r δ 2 q ( s r δ 1 ) q 2 k m o d r n for k { 0 , 1 } , where 0 δ 1 q β t 2 β and q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 1 .
If k = 0 , it has s r δ 2 q ( s r δ 1 ) q s + q r δ 1 m o d r n , i.e., s δ 2 + q δ 1 m o d n . Since q + β t 2 β δ 2 + q δ 1 q 2 + 1 2 β 1 , which is in contradiction with s δ 2 + q δ 1 m o d n .
If k = 1 , it has s r δ 2 ( s r δ 1 ) q 3 q s + r q 3 δ 1 m o d r n , i.e., s δ 2 q δ 1 m o d n . If δ 1 = 0 , then it has δ 2 s m o d n that is in contradiction with q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 1 . Now we consider that s + q δ 1 δ 2 m o d n for 1 δ 1 q β t 2 β and q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 1 . Since s + q δ 1 δ 2 m o d n is equivalent to q 2 + 1 2 β + q δ 1 δ 2 m o d n , we have q 2 + 1 2 β + q q 2 + 1 2 β + q δ 1 q 2 + 1 2 β + q ( q β t 2 β ) = 2 q 2 ( β + t ) q + 1 2 β , which is in contradiction with q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 1 q 2 + 1 2 β q 1 . Therefore, it has C 1 h C 2 . □
Theorem 2. 
Let n = q 2 + 1 β and s = q 2 + 1 2 , where q = 2 β m + β + t is an odd prime power with a positive integer m, and t 2 is even, such that β = t 2 + 1 . For 0 δ 1 q β t 2 β and q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 + v q 1 , then there exist asymmetric EAQMDS codes with parameters [ [ n , n 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 , where 0 v δ 1 .
Proof. 
If C 1 and C 2 are two q 2 -ary constacyclic codes whose defining sets are given by Z 1 = i = 0 δ 1 C s ( q + 1 ) i and Z 2 = i = 0 δ 2 C s ( q + 1 ) i , respectively, where 0 δ 1 q β t 2 β and q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 + v q 1 , then C 1 and C 2 are two MDS constacyclic codes with parameters [ n , n 2 δ 1 1 , 2 δ 1 + 2 ] q 2 and [ n , n 2 δ 2 1 , 2 δ 2 + 2 ] q 2 , respectively, from Propositions 1 and 2. From Lemma 4, it has that C 1 h C 2 for 0 δ 1 q β t 2 β and q + β t 2 β δ 2 q 2 + 1 2 β q δ 1 1 , which implies that v = 0 . At this point, the asymmetric EAQMDS codes degenerate into asymmetric quantum MDS codes.
Now, we will discuss the case 1 v δ 1 . The range δ 2 can be divided into some intervals with I 0 = [ q + β t 2 β , q 2 + 1 2 β q δ 1 1 ] ,   I 1 = [ q 2 + 1 2 β q δ 1 , q 2 + 1 2 β q δ 1 + q 1 ] ,   I 2 = [ q 2 + 1 2 β q δ 1 + q , q 2 + 1 2 β q δ 1 + 2 q 1 ] , I 3 = [ q 2 + 1 2 β q δ 1 + 2 q , q 2 + 1 2 β q δ 1 + 3 q 1 ] , , I v = [ q 2 + 1 2 β q δ 1 + ( v 1 ) q , q 2 + 1 2 β q δ 1 + v q 1 ] , where 1 v δ 1 . From Lemma 2, it only needs to show that | Z 11 |   =   | Z 1 ( q Z 2 ) |   = 2 v (or | Z 21 |   =   | Z 2 ( q Z 1 ) |   = 2 v ).
Since
q Z 1 Z 2 = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( i = 0 δ 2 C s ( q + 1 ) i ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( l = 0 v j I l C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j I 0 C s ( q + 1 ) j ( j I 1 C s ( q + 1 ) j ) ( j I v C s ( q + 1 ) j ) ) = ( q i = 0 δ 1 C s ( q + 1 ) i ( j I 0 C s ( q + 1 ) j ) ) ( q i = 0 δ 1 C s ( q + 1 ) i ( j I 1 C s ( q + 1 ) j ) ) ( q i = 0 δ 1 C s ( q + 1 ) i ( j I v C s ( q + 1 ) j ) )
Here, we will discuss the above equation specifically for different cases, as follows:
(1) If v = 1 , then I 1 = [ q 2 + 1 2 β q δ 1 , q 2 + 1 2 β q δ 1 + q 1 ] ,
q ( s ( q + 1 ) ( q 2 + 1 2 β q δ 1 ) ) ( q + 1 ) s + s + q ( q + 1 ) q 2 + 1 2 β q 2 ( q + 1 ) δ 1 s ( q + 1 ) s + ( q 2 1 + q + 1 ) q 2 + 1 2 β ( q 2 + 1 1 ) ( q + 1 ) δ 1 s ( q + 1 ) s + ( q + 1 ) q 2 + 1 2 β + ( q + 1 ) δ 1 s ( q + 1 ) ( q 2 + 1 2 q 2 + 1 2 β δ 1 ) s ( q + 1 ) ( ( q 2 + 1 ) t 2 2 β δ 1 ) s + ( q + 1 ) δ 1 m o d ( q + 1 ) n ,
and
q ( s + ( q + 1 ) ( q 2 + 1 2 β q δ 1 ) ) ( q + 1 ) s + s q ( q + 1 ) q 2 + 1 2 β + q 2 ( q + 1 ) δ 1 s ( q + 1 ) s ( q 2 1 + q + 1 ) q 2 + 1 2 β + ( q 2 + 1 1 ) ( q + 1 ) δ 1 s ( q + 1 ) s ( q + 1 ) q 2 + 1 2 β ( q + 1 ) δ 1 s ( q + 1 ) ( q 2 + 1 2 + q 2 + 1 2 β + δ 1 ) s ( q + 1 ) ( ( q 2 + 1 ) ( β + 1 ) 2 β + δ 1 ) s ( q + 1 ) δ 1 m o d ( q + 1 ) n ,
which implies q C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 ) = C s ( q + 1 ) δ 1 .
Moreover,
q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j I 1 C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + 1 q 2 + 1 2 β q δ 1 + q 1 C s ( q + 1 ) j C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 ) ) = ( q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + 1 q 2 + 1 2 β q δ 1 + q 1 C s ( q + 1 ) j ) ) ( q ( i = 0 δ 1 C s ( q + 1 ) i ) C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 ) ) .
From Lemma 4, we can see that
q ( i = 0 δ 1 C s ( q + 1 ) i ) C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 ) = C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 ) .
Hence, Formula (28) is equivalent to
q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j I 1 C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + 1 q 2 + 1 2 β q δ 1 + q 1 C s ( q + 1 ) j ) C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 ) .
Next, we will prove that if q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + 1 q 2 + 1 2 β q δ 1 + q 1 C s ( q + 1 ) j ) = holds, then the equation
q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j I 1 C s ( q + 1 ) j ) = C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 )
is true.
Assume that q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + 1 q 2 + 1 2 β q δ 1 + q 1 C s ( q + 1 ) j ) , then there exist two integers, δ 1 and δ 2 , such that s ( q + 1 ) δ 2 q ( s ( q + 1 ) δ 1 ) q 2 k m o d ( q + 1 ) n for k { 0 , 1 } , where 0 δ 1 q β t 2 β and q 2 + 1 2 β q δ 1 + 1 δ 2 q 2 + 1 2 β q δ 1 + q 1 .
If k = 0 , it has s ( q + 1 ) δ 2 q ( s ( q + 1 ) δ 1 ) q s + q ( q + 1 ) δ 1 m o d ( q + 1 ) n , i.e., s δ 2 + q δ 1 m o d n . Since q 2 + 1 2 β + 1 δ 2 + q δ 1 q 2 + 1 2 β + q 1 , which is in contradiction with s δ 2 + q δ 1 m o d n .
If k = 1 , it has s ( q + 1 ) δ 2 ( s ( q + 1 ) δ 1 ) q 3 q s + ( q + 1 ) q 3 δ 1 m o d ( q + 1 ) n , i.e., s δ 2 q δ 1 m o d n . If δ 1 = 0 , then it has δ 2 s m o d n that is in contradiction with q 2 + 1 2 β + 1 δ 2 q 2 + 1 2 β + q 1 . Now we consider that s + q δ 1 δ 2 m o d n for 1 δ 1 q β t 2 β and q 2 + 1 2 β q δ 1 + 1 δ 2 q 2 + 1 2 β q δ 1 + q 1 . Since s + q δ 1 δ 2 m o d n is equivalent to q δ 1 + q 2 + 1 2 β δ 2 m o d n , it has q 2 + 1 2 β + q q 2 + 1 2 β + q δ 1 q 2 + 1 2 β + q ( q β t 2 β ) = 2 q 2 ( β + t ) q + 1 2 β , which is in contradiction with q 2 + 1 2 β q δ 1 + 1 δ 2 q 2 + 1 2 β q δ 1 + q 1 . Therefore, it has q ( i = 0 δ 1 C s ( q + 1 ) i ) ( i = q 2 + 1 2 β q δ 1 + 1 q 2 + 1 2 β q δ 1 + q 1 C s ( q + 1 ) i ) = .
From the above discussion, we can see that Formula (31) holds. Hence, the number of entangled states required is 2 when v = 1 .
(2) Here, we prove the case for I v = [ q 2 + 1 2 β q δ 1 + ( v 1 ) q , q 2 + 1 2 β q δ 1 + v q 1 ] , and the same way can be proven for other cases as well. If I v = [ q 2 + 1 2 β q δ 1 + ( v 1 ) q , q 2 + 1 2 β q δ 1 + v q 1 ] , then
q ( s ( q + 1 ) ( q 2 + 1 2 β q δ 1 + q ( v 1 ) ) ) ( q + 1 ) s + s + q ( q + 1 ) q 2 + 1 2 β q 2 ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) s + ( q 2 1 + q + 1 ) q 2 + 1 2 β ( q 2 + 1 1 ) ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) s + ( q + 1 ) q 2 + 1 2 β + ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) ( q 2 + 1 2 q 2 + 1 2 β δ 1 + v 1 ) s ( q + 1 ) ( ( q 2 + 1 ) t 2 2 β δ 1 + v 1 ) s + ( q + 1 ) ( δ 1 v + 1 ) m o d ( q + 1 ) n ,
and
q ( s + ( q + 1 ) ( q 2 + 1 2 β q δ 1 + q ( v 1 ) ) ) ( q + 1 ) s + s q ( q + 1 ) q 2 + 1 2 β + q 2 ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) s ( q 2 1 + q + 1 ) q 2 + 1 2 β + ( q 2 + 1 1 ) ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) s ( q + 1 ) q 2 + 1 2 β ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) ( q 2 + 1 2 + q 2 + 1 2 β + δ 1 v + 1 ) s ( q + 1 ) ( ( q 2 + 1 ) ( β + 1 ) 2 β + δ 1 v + 1 ) s ( q + 1 ) ( δ 1 v + 1 ) m o d ( q + 1 ) n ,
which implies q C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 + q ( v 1 ) ) = C s ( q + 1 ) ( δ 1 v + 1 ) .
Moreover,
q i = 0 δ 1 C s ( q + 1 ) i ( j I v C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + ( v 1 ) q q 2 + 1 2 β q δ 1 + v q 1 C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + ( v 1 ) q + 1 q 2 + 1 2 β q δ 1 + v q 1 C s ( q + 1 ) j C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 + ( v 1 ) q ) ) = ( q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + ( v 1 ) q + 1 q 2 + 1 2 β q δ 1 + v q 1 C s ( q + 1 ) j ) ) ( q ( i = 0 δ 1 C s ( q + 1 ) i ) C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 + q ( v 1 ) ) ) .
From Lemma 4, we can see that
q ( i = 0 δ 1 C s ( q + 1 ) i ) C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 + q ( v 1 ) ) = C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 + q ( v 1 ) ) .
Hence, Formula (34) is equivalent to
q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j I v C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + ( v 1 ) q + 1 q 2 + 1 2 β q δ 1 + v q 1 C s ( q + 1 ) j ) C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 + q ( v 1 ) ) .
Next, we will prove that if q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + ( v 1 ) q + 1 q 2 + 1 2 β q δ 1 + v q 1 C s ( q + 1 ) j ) = holds, then the equation
q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j I v C s ( q + 1 ) j ) = C s ( q + 1 ) ( q 2 + 1 2 β q δ 1 + q ( v 1 ) )
is true.
Assume that q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + ( v 1 ) q + 1 q 2 + 1 2 β q δ 1 + v q 1 C s ( q + 1 ) j ) , then there exist two integers δ 1 and δ 2 such that s ( q + 1 ) δ 2 q ( s ( q + 1 ) δ 1 ) q 2 k m o d ( q + 1 ) n for k { 0 , 1 } , where 0 δ 1 q β t 2 β and q 2 + 1 2 β q δ 1 + ( v 1 ) q + 1 δ 2 q 2 + 1 2 β q δ 1 + v q 1 .
If k = 0 , it has s ( q + 1 ) δ 2 q ( s ( q + 1 ) δ 1 ) q s + q ( q + 1 ) δ 1 m o d ( q + 1 ) n , i.e., s δ 2 + q δ 1 m o d n . Since q 2 + 1 2 β + ( v 1 ) q + 1 δ 2 + q δ 1 q 2 + 1 2 β + v q 1 , which is in contradiction with s δ 2 + q δ 1 m o d n .
If k = 1 , it has s ( q + 1 ) δ 2 ( s ( q + 1 ) δ 1 ) q 3 q s + ( q + 1 ) q 3 δ 1 m o d ( q + 1 ) n , i.e., s δ 2 q δ 1 m o d n . If δ 1 = 0 , then it has δ 2 s m o d n that is in contradiction with q 2 + 1 2 β + ( v 1 ) q + 1 δ 2 q 2 + 1 2 β + v q 1 . Now we consider that s + q δ 1 δ 2 m o d n for 1 δ 1 q β t 2 β and q 2 + 1 2 β q δ 1 + ( v 1 ) q + 1 δ 2 q 2 + 1 2 β q δ 1 + v q 1 . Since s + q δ 1 δ 2 m o d n is equivalent to q 2 + 1 2 β + q δ 1 δ 2 m o d n , it has q 2 + 1 2 β + q q 2 + 1 2 β + q δ 1 q 2 + 1 2 β + q ( q β t 2 β ) = 2 q 2 ( β + t ) q + 1 2 β , which is in contradiction with q 2 + 1 2 β q δ 1 + ( v 1 ) q + 1 δ 2 q 2 + 1 2 β q δ 1 + v q 1 . Therefore, it has q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 2 β q δ 1 + ( v 1 ) q + 1 q 2 + 1 2 β q δ 1 + v q 1 C s ( q + 1 ) j ) = .
According to the above discussion, the number of entangled states is 2 v , where 0 v δ 1 . Therefore, we can see that asymmetric EAQMDS codes with parameters [ [ n , n 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 exist from Theorem 1 and Proposition 3. □
Example 1. 
Let t = 2 and q = 17 , then n = 58 , 0 δ 1 1 , 2 δ 2 29 17 δ 1 + 17 v 1 and 0 v δ 1 . Some asymmetric EAQMDS codes with c = 2 derived from Theorem 2 are listed in Table 1.
Similar to Lemma 4 and Theorem 2, we can also obtain the following Lemma 5 and Theorem 3.
Lemma 5. 
Let n = q 2 + 1 β and s = q 2 + 1 2 , where q is an odd prime power of the form 2 β m + β t , m is a positive integer, and t 2 is even, such that β = t 2 + 1 . If C 1 and C 2 are two q 2 -ary constacyclic codes whose defining sets are given by Z 1 = i = 0 δ 1 C s ( q + 1 ) i and Z 2 = i = 0 δ 2 C s ( q + 1 ) i , respectively, where 0 δ 1 q β + t 2 β and q + β + t 2 β δ 2 q 2 + 1 2 β q δ 1 1 , then C 1 h C 2 .
Theorem 3. 
Let n = q 2 + 1 β and s = q 2 + 1 2 , where q = 2 β m + β t is an odd prime power with a positive integer m, and t 2 is even, such that β = t 2 + 1 . For 0 δ 1 q β + t 2 β and q + β + t 2 β δ 2 q 2 + 1 2 β q δ 1 + v q 1 , then there exist asymmetric EAQMDS codes with parameters [ [ n , n 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 , where 0 v δ 1 .
Example 2. 
Let t = 2 and q = 13 , then n = 34 , 0 δ 1 1 , 2 δ 2 17 13 δ 1 + 13 v 1 and 0 v δ 1 . Some asymmetric EAQMDS codes derived from Theorem 3 are listed in Table 2.
Lemma 6. 
Let n = 2 ( q 2 + 1 ) α , s = q 2 + 1 2 and r = q + 1 , where q = α m + α + t or q = α m + α t is an odd prime power and m is a positive integer, t 3 is odd, such that α = t 2 + 1 . Then C s = { s } , C s + q + 1 2 n = { s + q + 1 2 n } and C s ( q + 1 ) i = { s ( q + 1 ) i , s + ( q + 1 ) i } for 1 i n 2 1 .
Proof. 
Since s = 1 + ( q + 1 ) q 1 2 and s + q + 1 2 n = 1 + ( q + 1 ) ( q 1 2 + n 2 ) , which implies s, s + q + 1 2 n O r n . Since s q 2 = s ( q 2 + 1 1 ) s mod ( q + 1 ) n and ( s + q + 1 2 n ) q 2 = s q 2 + ( q + 1 2 n ) ( q 2 + 1 1 ) s + q + 1 2 n mod ( q + 1 ) n , it follows that C s = { s } and C s + q + 1 2 n = { s + q + 1 2 n } . For 1 i n 2 1 , it has C s ( q + 1 ) i = { s ( q + 1 ) i , s + ( q + 1 ) i } from ( s ( q + 1 ) i ) q 2 = s q 2 ( q + 1 ) i q 2 s + ( q + 1 ) i ( q + 1 ) i ( q 2 + 1 ) s + ( q + 1 ) i mod ( q + 1 ) n and ( s + ( q + 1 ) i ) q 2 = s q 2 + ( q + 1 ) i q 2 s ( q + 1 ) i + ( q + 1 ) i ( q 2 + 1 ) s ( q + 1 ) i mod ( q + 1 ) n .
Moreover, we show that C s ( q + 1 ) i = { s ( q + 1 ) i , s + ( q + 1 ) i } is disjoint for 1 i n 2 1 . In fact, we assume that two integers exist, i and j, 1 i j n 2 1 , such that C s ( q + 1 ) i = C s ( q + 1 ) j , and then we have s ( q + 1 ) i ( s ( q + 1 ) j ) q 2 k mod ( q + 1 ) n for k { 0 , 1 } .
If k = 0 , we have s ( q + 1 ) i s ( q + 1 ) j mod ( q + 1 ) n , which is equivalent to i = j . It is in contradiction with 1 i j n 2 1 .
If k = 1 , we have s ( q + 1 ) i s + ( q + 1 ) j mod ( q + 1 ) n , which is equivalent to i + j n mod n . It is in contradiction with 0 i + j n 2 . Therefore, the result follows. □
Lemma 7. 
Let n = 2 ( q 2 + 1 ) α , s = q 2 + 1 2 and r = q + 1 , where q = α m + α + t is an odd prime power with a positive integer m, and t 3 is odd, such that α = t 2 + 1 . If C 1 and C 2 are two q 2 -ary constacyclic codes whose defining sets are given by Z 1 = i = 0 δ 1 C s ( q + 1 ) i and Z 2 = i = 0 δ 2 C s ( q + 1 ) i , respectively, where 0 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 1 , then C 1 h C 2 .
Proof. 
If C 1 and C 2 are two q 2 -ary constacyclic codes whose defining sets are given by Z 1 = i = 0 δ 1 C s ( q + 1 ) i and Z 2 = i = 0 δ 2 C s ( q + 1 ) i from Lemma 6, respectively, where 0 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 1 , then C 1 and C 2 are two MDS constacyclic codes with parameters [ n , n 2 δ 1 1 , 2 δ 1 + 2 ] q 2 and [ n , n 2 δ 2 1 , 2 δ 2 + 2 ] q 2 , respectively, from Propositions 1 and 2. For 0 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 1 , it has C 1 h C 2 . In fact, it only needs to show that Z 2 q Z 1 = for 0 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 1 . If Z 2 q Z 1 , then there exist two integers δ 1 and δ 2 such that s r δ 2 q ( s r δ 1 ) q 2 k m o d r n for k { 0 , 1 } , where 0 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 1 .
If k = 0 , it has s r δ 2 q ( s r δ 1 ) q s + q r δ 1 m o d r n , i.e., s δ 2 + q δ 1 m o d n . Since q + α t α δ 2 + q δ 1 q 2 + 1 α 1 , which is in contradiction with s δ 2 + q δ 1 m o d n .
If k = 1 , it has s r δ 2 ( s r δ 1 ) q 3 q s + r q 3 δ 1 m o d r n , i.e., s δ 2 q δ 1 m o d n . If δ 1 = 0 , then it has δ 2 s m o d n that is in contradiction with q + α t α δ 2 q 2 + 1 α q δ 1 1 . Now we consider that s + q δ 1 δ 2 m o d n for 1 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 1 . Since s + q δ 1 δ 2 m o d n is equivalent to q 2 + 1 α + q δ 1 δ 2 m o d n ; moreover, it has q 2 + 1 α + q q 2 + 1 α + q δ 1 q 2 + 1 α + q ( q t α ) = q 2 q t + 1 α , which is in contradiction with q + α t α δ 2 q 2 + 1 α q δ 1 1 q 2 + 1 α q 1 . Therefore, it has C 1 h C 2 . □
Theorem 4. 
Let n = 2 ( q 2 + 1 ) α and s = q 2 + 1 2 , where q = α m + α + t is an odd prime power with a positive integer m, t 3 is odd, such that α = t 2 + 1 . For 0 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 + v q 1 , then there exist asymmetric EAQMDS codes with parameters [ [ n , n 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 , where 0 v t 1 2 .
Proof. 
If C 1 and C 2 are two q 2 -ary constacyclic codes whose defining sets are given by Z 1 = i = 0 δ 1 C s ( q + 1 ) i and Z 2 = i = 0 δ 2 C s ( q + 1 ) i , respectively, where 0 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 + v q 1 , then C 1 and C 2 are two MDS constacyclic codes with parameters [ n , n 2 δ 1 1 , 2 δ 1 + 2 ] q 2 and [ n , n 2 δ 2 1 , 2 δ 2 + 2 ] q 2 , respectively, from Propositions 1 and 2. From Lemma 7, we can see that C 1 h C 2 for 0 δ 1 q t α and q + α t α δ 2 q 2 + 1 α q δ 1 1 , which implies that v = 0 . At this point, the asymmetric EAQMDS codes degenerates into asymmetric quantum MDS codes.
Now, we consider the case v 1 , and the range δ 2 can be divided into some intervals with I 0 = [ q + α t α , q 2 + 1 α q δ 1 1 ] , I 1 = [ q 2 + 1 α q δ 1 , q 2 + 1 α q δ 1 + q 1 ] , I 2 = [ q 2 + 1 α q δ 1 + q , q 2 + 1 α q δ 1 + 2 q 1 ] , …, I v = [ q 2 + 1 α q δ 1 + ( v 1 ) q , q 2 + 1 α q δ 1 + v q 1 ] , where 1 v t 1 2 .
In order to obtain the number of entangled states, it only needs to show that | Z 11 |   =   | Z 1 ( q Z 2 ) |   = 2 v (or | Z 21 |   =   | Z 2 ( q Z 1 ) |   = 2 v ) from Lemma 2. Hence,
q Z 1 Z 2 = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = 0 δ 2 C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( l = 0 v j I l C s ( q + 1 ) j ) = ( q i = 0 δ 1 C s ( q + 1 ) i ( j I 0 C s ( q + 1 ) j ) ) ( q i = 0 δ 1 C s ( q + 1 ) i ( j I 1 C s ( q + 1 ) j ) ) ( q i = 0 δ 1 C s ( q + 1 ) i ( j I v C s ( q + 1 ) j ) )
Here, we only discuss the case I v ( v 1 ) as follows; other cases can be discussed in a similar manner.
If I v = [ q 2 + 1 α q δ 1 + ( v 1 ) q , q 2 + 1 α q δ 1 + v q 1 ] , then
q ( s ( q + 1 ) ( q 2 + 1 α q δ 1 + ( v 1 ) q ) ) ( q + 1 ) s + s + q ( q + 1 ) q 2 + 1 α q 2 ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) s + ( q 2 1 + q + 1 ) q 2 + 1 α ( q 2 + 1 1 ) ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) s + ( q + 1 ) q 2 + 1 α + ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) ( q 2 + 1 2 q 2 + 1 α δ 1 + v 1 ) s ( q + 1 ) ( ( q 2 + 1 ) ( α 2 ) 2 α δ 1 + v 1 ) s + ( q + 1 ) ( δ 1 v + 1 ) m o d ( q + 1 ) n ,
and
q ( s + ( q + 1 ) ( q 2 + 1 α q δ 1 + q ( v 1 ) ) ) ( q + 1 ) s + s q ( q + 1 ) q 2 + 1 α + q 2 ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) s ( q + 1 ) q 2 + 1 α ( q + 1 ) ( δ 1 v + 1 ) s ( q + 1 ) ( q 2 + 1 2 + q 2 + 1 α + δ 1 v + 1 ) s ( q + 1 ) ( ( q 2 + 1 ) ( α + 2 ) 2 α + δ 1 v + 1 ) s ( q + 1 ) ( δ 1 v + 1 ) m o d ( q + 1 ) n ,
which implies q C s ( q + 1 ) ( q 2 + 1 α q δ 1 + q ( v 1 ) ) = C s ( q + 1 ) ( δ 1 v + 1 ) .
Moreover,
q i = 0 δ 1 C s ( q + 1 ) i ( j I v C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 α q δ 1 + ( v 1 ) q q 2 + 1 α q δ 1 + v q 1 C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 α q δ 1 + ( v 1 ) q + 1 q 2 + 1 α q δ 1 + v q 1 C s ( q + 1 ) j C s ( q + 1 ) ( q 2 + 1 α q δ 1 + ( v 1 ) q ) ) = ( q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 α q δ 1 + ( v 1 ) q + 1 q 2 + 1 α q δ 1 + v q 1 C s ( q + 1 ) j ) ) ( q ( i = 0 δ 1 C s ( q + 1 ) i ) C s ( q + 1 ) ( q 2 + 1 α q δ 1 + q ( v 1 ) ) )
From Lemma 7, we can see that
q ( i = 0 δ 1 C s ( q + 1 ) i ) C s ( q + 1 ) ( q 2 + 1 α q δ 1 + q ( v 1 ) ) ) = C s ( q + 1 ) ( δ 1 v + 1 ) .
Hence, Formula (41) is equivalent to
q i = 0 δ 1 C s ( q + 1 ) i ( j I v C s ( q + 1 ) j ) = q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 α q δ 1 + ( v 1 ) q + 1 q 2 + 1 α q δ 1 + v q 1 ) C s ( q + 1 ) ( δ 1 v + 1 ) .
Next, we will prove that if q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 α q δ 1 + ( v 1 ) q + 1 q 2 + 1 α q δ 1 + v q 1 ) = holds, then the equation
q i = 0 δ 1 C s ( q + 1 ) i ( j I 0 C s ( q + 1 ) j ) = C s ( q + 1 ) ( δ 1 v + 1 )
is true.
Assume that q ( i = 0 δ 1 C s ( q + 1 ) i ) ( j = q 2 + 1 α q δ 1 + ( v 1 ) q + 1 q 2 + 1 α q δ 1 + v q 1 C s ( q + 1 ) j ) , then there exist two integers δ 1 and δ 2 such that s ( q + 1 ) δ 2 q ( s ( q + 1 ) δ 1 ) q 2 k m o d ( q + 1 ) n for k { 0 , 1 } , where 0 δ 1 q t α and q 2 + 1 α q δ 1 + ( v 1 ) q + 1 δ 2 q 2 + 1 α q δ 1 + v q 1 .
If k = 0 , it has s ( q + 1 ) δ 2 q ( s ( q + 1 ) δ 1 ) q s + q r δ 1 m o d ( q + 1 ) n , i.e., s δ 2 + q δ 1 m o d n . Since q 2 + 1 α + ( v 1 ) q + 1 δ 2 + q δ 1 q 2 + 1 α + v q 1 , which is in contradiction with s δ 2 + q δ 1 m o d n .
If k = 1 , it has s ( q + 1 ) δ 2 ( s ( q + 1 ) δ 1 ) q 3 q s + r q 3 δ 1 m o d ( q + 1 ) n , i.e., s δ 2 q δ 1 m o d n . If δ 1 = 0 , then it has δ 2 s m o d n that is in contradiction with q 2 + 1 α + ( v 1 ) q + 1 δ 2 q 2 + 1 α + v q 1 . Now we consider that s + q δ 1 δ 2 m o d n for 1 δ 1 q t α and q 2 + 1 α q δ 1 + ( v 1 ) q + 1 δ 2 q 2 + 1 α q δ 1 + v q 1 . Since s + q δ 1 δ 2 m o d n is equivalent to q 2 + 1 α + q δ 1 δ 2 m o d n , moreover, it has q 2 + 1 α + q q 2 + 1 α + q δ 1 q 2 + 1 α + q ( q t α ) = 2 q 2 t q + 1 α , which is in contradiction with q 2 + 1 α q δ 1 + ( v 1 ) q 1 δ 2 q 2 + 1 α q ( δ 1 v ) 1 . Therefore, it has q ( i = 0 δ 1 C s ( q + 1 ) i ) ( i = q 2 + 1 α q δ 1 + ( v 1 ) q + 1 q 2 + 1 α q δ 1 + v q 1 C s ( q + 1 ) i ) = .
According to the above discussion, the number of entangled states is 2 v , where 0 v t 1 2 . Therefore, we can see that asymmetric EAQMDS codes with parameters [ [ n , n 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 exist from Theorem 1 and Proposition 3. □
Example 3. 
Let t = 3 and q = 23 , then n = 106 , 0 δ 1 2 , 3 δ 2 53 23 δ 1 + 23 v 1 and 0 v 1 . Some asymmetric EAQMDS codes derived from Theorem 4 are listed in Table 3.
Similar to Lemma 7 and Theorem 4, we can also obtain the following Lemma 8 and Theorem 5.
Lemma 8. 
Let n = 2 ( q 2 + 1 ) α and s = q 2 + 1 2 , where q = α m + α t is an odd prime power with a positive integer m, and t 3 is odd, such that α = t 2 + 1 . If C 1 and C 2 are two q 2 -ary constacyclic codes whose defining sets are given by Z 1 = i = 0 δ 1 C s ( q + 1 ) i and Z 2 = i = 0 δ 2 C s ( q + 1 ) i , respectively, where 0 δ 1 q + t α and q + α + t α δ 2 q 2 + 1 α q δ 1 1 , then C 1 h C 2 .
Theorem 5. 
Let n = 2 ( q 2 + 1 ) α and s = q 2 + 1 2 , where q = α m + α t is an odd prime power with a positive integer m, and t 3 is odd, such that α = t 2 + 1 . For 0 δ 1 q + t α and q + α + t α δ 2 q 2 + 1 α q δ 1 + v q 1 , then there exist asymmetric EAQMDS codes with parameters [ [ n , n 2 ( δ 1 + δ 2 + 1 v ) , 2 δ 2 + 2 / 2 δ 1 + 2 ; 2 v ] ] q 2 , where 0 v t 1 2 .
Example 4. 
Let t = 3 and q = 27 , then n = 146 , 0 δ 1 3 , 4 δ 2 73 27 δ 1 + 27 v 1 and 0 v 1 . Some asymmetric EAQMDS codes derived from Theorem 5 are listed in Table 4.

5. Codes Comparison

In this paper, the constacyclic codes with lengths q 2 + 1 β and 2 ( q 2 + 1 ) α are utilized to construct some classes of asymmetric EAQMDS codes. Current studies [75,76,77] indicate that the energy relaxation time is much larger than the phase coherence time, indicating that phase-shift errors occur more frequently than qubit-flip (or qudit-flip) errors. From Table 5, Table 6, Table 7 and Table 8, the distances of some codes constructed in this paper are far beyond q + 1 , which indicates that asymmetric EAQMDS codes constructed in this paper have greater asymmetry and stronger capabilities for detecting and correcting phase-shift errors.
In addition, we compare the asymmetric EAQMDS codes constructed in this paper with respect to the ones constructed in [18], because the codes constructed in that paper have better parameters than the symmetric EAQMDS codes in the other current references [25,27,28]. In Table 5, Table 6, Table 7 and Table 8, we compare the asymmetric EAQMDS codes constructed in this paper with respect to the ones in [18]. Although some asymmetric EAQMDS codes constructed in this paper have the same net rate ( k c ) / n as those constructed in [18], it can be found that the ones in [18] require the use of a larger number of entangled states, which also implies that preparing entangled states for asymmetric EAQMDS codes in [18] require more effort and cost. Furthermore, it can be found from Table 5, Table 6, Table 7 and Table 8 that under the same conditions of code length, d z and d x , this paper can construct some asymmetric EAQMDS codes with higher net rates that are not achieved in [18]. Finally, the parameters of the asymmetric EAQMDS codes constructed in this paper are more general than the quantum asymmetric codes constructed in [20,21,22,23,24,26], and some quantum codes have better parameters than the quantum asymmetric codes constructed using generalized RS codes in [29]. For example, the quantum codes [ [ 96 ; 1 , 93 / 4 ] ] 23 2 and [ [ 140 ; 2 , 136 / 4 ] ] 27 2 constructed in [29] are compared to the ones [ [ 106 ; 12 , 94 / 4 ] ] 23 2 and [ [ 146 , 10 , 136 / 4 ; 2 ] 27 2 constructed in this paper. The code rate of the quantum codes constructed in this paper is higher than the code rate of the quantum codes constructed in [29]. Here, we only consider the case where c = 2 . The same situation applies to other quantum codes with the parameters where c = 2 v and v 2 .

6. Conclusions and Discussions

In this paper, we construct four families of asymmetric EAQMDS codes from constacyclic codes. We find that pre-sharing a certain number of entangled states between communicating parties allows asymmetric QEC codes to be no longer constrained by the Hermitian dual-containing condition. As a result, this can enhance the error correction capabilities of asymmetric EAQMDS codes from Theorems 2–5. Although the finite fields used to construct asymmetric EAQMDS codes in this paper are larger than the ones used in [18], this paper obtains some asymmetric EAQMDS codes with a small number of entangled states that cannot be constructed in [18]. How to construct asymmetric EAQMDS codes with good performance on small finite fields is the next important issue that we need to explore. Although the Hull of generalized RS codes has been used to construct EAQMDS codes [47], the method of the decomposition of the defining set is more intuitive and clearer. If one wants to obtain more asymmetric EAQMDS codes with other entanglements, one can use the same method in this paper to obtain them. Finally, exploring how to use combinatorial methods to obtain asymmetric EAQMDS codes with flexible entangled states presents an intriguing area for future work.

Author Contributions

The problem was conceptualized by J.C. and Y.C. Theoretical analysis and verification were carried out by J.C., W.F., S.Z., J.Q., C.Z., Y.X. and B.Z. The paper was authored by J.C., W.F., S.Z., J.Q. and Y.C. Y.C. reviewed and refined the grammar and structure of the paper. All authors have read and agreed to the published version of the manuscript.

Funding

The Natural Science Foundation of Fujian Province, China (nos. 2020J01571, 2016J01281), the Science and Technology Innovation Special Fund of Fujian Agriculture and Forestry University (no. CXZX2019119S), the Undergraduate Innovation and Entrepreneurship Training Program of Fujian Agricultural and Forestry University (no. X202310389361), and the Research Fund of Fujian University of Technology (no. GY-Z23210).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Guo, G.; Chen, Z.; Guo, G. Introduction to Quantum Computation and Programming, 1st ed.; Science Press: Beijing, China, 2019; pp. 1–27. [Google Scholar]
  2. Steane, A.M. Simple quantum error-correction codes. Phys. Rev. A 1996, 54, 4741–4751. [Google Scholar] [CrossRef]
  3. Calderbank, A.R.; Rains, E.M.; Shor, P.W.; Sloane, N.J.A. Quantum error correction and orthogonal geometry. Phys. Rev. Lett. 1997, 78, 405–408. [Google Scholar] [CrossRef]
  4. Li, R.; Wang, J.; Liu, Y.; Guo, G. New quantum constacyclic codes. Quantum Inf. Process. 2019, 18, 127. [Google Scholar] [CrossRef]
  5. Lü, L.; Ma, W.; Li, R.; Ma, Y.; Liu, Y.; Cao, H. Entanglement-assisted quantum MDS codes from constacyclic codes with large minimum distance. Finite Fields Appl. 2018, 53, 309–325. [Google Scholar] [CrossRef]
  6. Hsieh, M.H.; Yen, W.T.; Hsu, L.Y. High performance entanglement-assisted quantum LDPC codes need little entanglement. IEEE Trans. Inf. Theory 2011, 57, 1761–1769. [Google Scholar] [CrossRef]
  7. Wilde, M.M.; Hsieh, M.H.; Babar, Z. Entanglement-assisted quantum turbo codes. IEEE Trans. Inf. Theory 2013, 60, 1203–1222. [Google Scholar] [CrossRef]
  8. Ioffe, L.B.; Mézard, M. Asymmetric quantum error-correcting codes. Phys. Rev. A 2006, 75, 032345. [Google Scholar] [CrossRef]
  9. Chen, X.; Lu, X.; Zhu, S.; Jiang, W.; Wang, X. New entanglement-assisted quantum codes from negacyclic codes. arXiv 2023, arXiv:2305.08517v1. [Google Scholar]
  10. Chen, X.; Zhu, S.; Jiang, W. Cyclic codes and some new entanglement-assisted quantum MDS codes. Design Code Cryptogr. 2021, 89, 2533–2551. [Google Scholar] [CrossRef]
  11. Chen, X.; Zhu, S.; Jiang, W.; Luo, G. A new family of EAQMDS codes constructed from constacyclic codes. Design Code Cryptogr. 2021, 89, 2179–2193. [Google Scholar] [CrossRef]
  12. Pang, B.; Zhu, S.; Wang, L. New entanglement-assisted quantum MDS codes. Int. J. Quantum Inf. 2021, 19, 2150016. [Google Scholar] [CrossRef]
  13. Pereira, F.R.; Pellikaan, R.; La Guardia, G.G. entanglement-assisted quantum codes From algebraic geometry codes. IEEE Trans. Inf. Theory 2019, 67, 7110–7120. [Google Scholar] [CrossRef]
  14. Wang, L.; Wang, P.; Zhu, S. Some new families of entanglement-assisted quantum MDS codes derived from negacyclic codes. Quantum Inf. Process. 2022, 21, 318. [Google Scholar] [CrossRef]
  15. Wang, L.; Zhu, S.; Sun, Z. Entanglement-assisted quantum MDS codes from cyclic codes. Quantum Inf. Process. 2020, 19, 65. [Google Scholar] [CrossRef]
  16. Galindo, C.; Hernando, F.; Matsumoto, R.; Ruano, D. Asymmetric entanglement-assisted quantum error-correcting codes and BCH codes. IEEE Access 2019, 8, 18571–18579. [Google Scholar] [CrossRef]
  17. Huang, Z.; Fang, W.; Fu, F. On pure MDS asymmetric entanglement-assisted quantum error-correcting codes. arXiv 2021, arXiv:2107.04166. [Google Scholar]
  18. Liu, H.; Hu, P.; Liu, X. Asymmetric entanglement-assisted quantum codes: Bound and constructions. Design Code Cryptogr. 2021, 89, 797–809. [Google Scholar] [CrossRef]
  19. Pereira, F.R.; Pellikaan, R.; La Guardia, G.G.; Assis, F.M. Application of complementary dual AG codes to entanglement-assisted quantum codes. In Proceedings of the 2019 IEEE International Symposium on Information Theory, Paris, France, 7–12 July 2019; pp. 2559–2563. [Google Scholar]
  20. Chen, J.; Chen, Y.; Huang, Y.; Feng, C. New optimal asymmetric quantum codes and quantum convolutional codes derived from constacyclic codes. Quantum Inf. Process. 2019, 18, 40. [Google Scholar] [CrossRef]
  21. Chen, J.; Huang, Y.; Feng, C.; Chen, R. Some families of optimal quantum codes derived from constacyclic codes. Linear Multilinear Algebra 2019, 67, 725–742. [Google Scholar] [CrossRef]
  22. Chen, J.; Li, J.; Huang, Y. Asymmetric Quantum Codes and Quantum Convolutional Codes Derived from Nonprimitive Non-Narrow-Sense BCH Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2015, 98-A, 1130–1135. [Google Scholar] [CrossRef]
  23. Chen, J.; Li, J.; Huang, Y.; Lin, J. Some families of asymmetric quantum codes and quantum convolutional codes from constacyclic codes. Linear Algebra Appl. 2015, 475, 186–199. [Google Scholar] [CrossRef]
  24. Chen, X.; Zhu, S.; Kai, X. Two classes of new optimal asymmetric quantum codes. Int. J. Theor. Phys. 2018, 57, 1829–1838. [Google Scholar] [CrossRef]
  25. Fan, J.; Chen, H.; Xu, J. Constructions of q-ary entanglement-assisted quantum MDS codes with minimum distance greater than q+1. Quantum Inf. Comput. 2016, 16, 0423–0434. [Google Scholar] [CrossRef]
  26. Huang, Y.; Chen, J.; Feng, C.; Chen, R. Some families of asymmetric quantum MDS codes constructed from constacyclic codes. Int. J. Theor. Phys. 2017, 57, 453–464. [Google Scholar] [CrossRef]
  27. Li, L.; Zhu, S.; Liu, L.; Kai, X. Entanglement-assisted quantum MDS codes from generalized Reed-Solomon codes. Quantum Inf. Process. 2019, 18, 153. [Google Scholar] [CrossRef]
  28. Luo, G.; Cao, X. Two new families of entanglement-assisted quantum MDS codes from generalized Reed-Solomon codes. Quantum Inf. Process. 2019, 18, 89. [Google Scholar] [CrossRef]
  29. Wang, G.; Tang, C.; Wei, W. Some new constructions of optimal asymmetric quantum codes. Quantum Inf. Process. 2023, 22, 85. [Google Scholar] [CrossRef]
  30. Shor, P.W. Scheme for reducing decoherence in quantum memory. Phys. Rev. A 1995, 52, 2493–2496. [Google Scholar] [CrossRef] [PubMed]
  31. Steane, A.M. Enlargement of Calderbank-Shor-Steane quantum codes. IEEE Trans. Inf. Theory 1999, 45, 2492–2495. [Google Scholar] [CrossRef]
  32. Calderbank, A.R.; Rains, E.M.; Shor, P.W.; Sloane, N.J.A. Quantum error correction via codes over GF(4). IEEE Trans. Inf. Theory 1998, 44, 1369–1387. [Google Scholar] [CrossRef]
  33. Chen, B.; Ling, S.; Zhang, G. Application of constacyclic codes to quantum MDS codes. IEEE Trans. Inf. Theory 2015, 61, 1474–1484. [Google Scholar] [CrossRef]
  34. Chen, H. Some good quantum error-correcting codes from algebraicgeometric codes. IEEE Trans. Inf. Theory 2001, 47, 2059–2061. [Google Scholar] [CrossRef]
  35. Ketkar, A.; Klappenecker, A.; Kumar, S.; Sarvepalli, P.K. Nonbinary stabilizer codes over finite fields. IEEE Trans. Inf. Theory 2006, 52, 4892–4914. [Google Scholar] [CrossRef]
  36. Shikhmin, A.; Litsyn, S.; Tsfasman, M.A. Asymptotically good quantum codes. Phys. Rev. A 2001, 63, 2001. [Google Scholar]
  37. Kai, X.; Zhu, S. New quantum MDS codes from negacyclic codes. IEEE Trans. Inf. Theory 2013, 59, 1193–1197. [Google Scholar] [CrossRef]
  38. Kai, X.; Zhu, S.; Li, P. Constacyclic codes and some new quantum MDS codes. IEEE Trans. Inf. Theory 2014, 60, 2080–2086. [Google Scholar] [CrossRef]
  39. Lü, L.; Ma, W.; Li, R.; Ma, Y.; Guo, L. New quantum MDS codes constructed from constacyclic codes. arXiv 2018, arXiv:1803.07927. [Google Scholar]
  40. Qian, J.; Zhang, L. Improved constructions for quantum maximum distance separable codes. Quantum Inf. Process. 2017, 16, 20. [Google Scholar] [CrossRef]
  41. Qian, J.; Zhang, L. Entanglement-assisted quantum codes from arbitrary binary linear codes. Des. Codes Cryptogr. 2015, 77, 193–202. [Google Scholar] [CrossRef]
  42. Wang, L.; Zhu, S. New quantum MDS codes derived from constacyclic codes. Quantum Inf. Process. 2015, 14, 881–889. [Google Scholar] [CrossRef]
  43. Zhang, G.; Chen, B. New quantum MDS codes. Int. J. Quantum Inf. 2014, 12, 1450019. [Google Scholar] [CrossRef]
  44. Zhang, T.; Ge, G. Some new classes of quantum MDS codes from constacyclic codes. IEEE Trans. Inf. Theory 2015, 61, 5224–5228. [Google Scholar] [CrossRef]
  45. Brun, T.A.; Devetak, I.; Hsieh, M.H. Correcting quantum errors with entanglement. Science 2006, 314, 436–439. [Google Scholar] [CrossRef] [PubMed]
  46. Lü, L.; Li, R. Entanglement-assisted quantum codes from primitive quaternary BCH codes. Int. J. Quantum Inf. 2014, 12, 1450015. [Google Scholar] [CrossRef]
  47. Guenda, K.; Jitman, S.; Gulliver, T.A. Constructions of good entanglement-assisted quantum error correcting codes. Design Code Cryptogr. 2018, 86, 121–136. [Google Scholar] [CrossRef]
  48. Chen, J.; Huang, Y.; Feng, C.; Chen, R. Entanglement-assisted quantum MDS codes constructed from negacyclic codes. Quantum Inf. Process. 2017, 16, 303. [Google Scholar] [CrossRef]
  49. Lü, L.; Li, R.; Guo, L.; Ma, Y.; Liu, Y. Entanglement-assisted quantum MDS codes from negacyclic codes. Quantum Inf. Process. 2018, 17, 69. [Google Scholar] [CrossRef]
  50. Liu, Y.; Li, R.; Lü, L.; Ma, Y. Application of constacyclic codes to entanglement-assisted quantum maximum distance separable codes. Quantum Inf. Process. 2018, 17, 210. [Google Scholar] [CrossRef]
  51. Aly, S.A. Asymmetric quantum BCH codes. In Proceedings of the IEEE International Conference in Computer Engineering and Systems, Cairo, Egypt, 25–27 November 2008; pp. 157–162. [Google Scholar]
  52. Aly, S.A.; Klappenecker, A.; Sarvepalli, P.K. On quantum and classical BCH codes. IEEE Trans. Inf. Theory 2007, 53, 1183–1188. [Google Scholar] [CrossRef]
  53. La Guardia, G.G. New families of asymmetric quantum BCH codes. Quantum Inf. Comp. 2011, 11, 239–252. [Google Scholar] [CrossRef]
  54. Chen, J.; Li, J.; Lin, J. New optimal asymmetric quantum codes derived from negacyclic codes. Int J. Theor. Phys. 2014, 53, 72–79. [Google Scholar] [CrossRef]
  55. Xu, G.; Li, R.; Guo, L.; Lu, L. New optimal asymmetric quantum codes from constacyclic codes. Int. J. Mod. Phys. 2017, 31, 1750030. [Google Scholar] [CrossRef]
  56. Zhang, G.; Chen, B.; Li, L. New optimal asymmetric quantum codes from constacyclic codes. Mod. Phys. Lett. B 2014, 28, 1450126. [Google Scholar] [CrossRef]
  57. La Guardia, G.G. Asymmetric quantum Reed-Solomon and generalized Reed-Solomon codes. Quantum Inf. Process. 2012, 11, 591–604. [Google Scholar] [CrossRef]
  58. Leng, R.; Ma, Z. Contructions of new families of nonbinary asymmetric quantum BCH codes and subsystem BCH codes. Sci. China 2012, 55, 465–469. [Google Scholar]
  59. Sarvepalli, P.K.; Rotte, L.M.; Klappennecker, A. Asymmetric quantum LDPC codes. arXiv 2008, arXiv:0804.4316. [Google Scholar]
  60. Sarvepalli, P.K.; Klappennecker, A.; Rotte, L.M. Asymmetric quantum codes: Constructions, bounds and performance. Proc. R. Soc. A Math. Phys. Eng. Sci. 2009, 465, 1645–1672. [Google Scholar] [CrossRef]
  61. Tang, X.; Li, W.; Zhao, W. Asymmetric quantum codes with high code rates. Quantum Inf. Process. 2022, 21, 346. [Google Scholar] [CrossRef]
  62. Matsumoto, R. Two Gilbert-Varshamov-type existential bounds for asymmetric quantum error-correcting codes. Quantum Inf. Process. 2017, 16, 1–7. [Google Scholar] [CrossRef]
  63. Lv, J.; Li, R.; Yao, Y. Quasi-cyclic constructions of asymmetric quantum error-correcting codes. Crypt. Comm. 2021, 13, 661–680. [Google Scholar] [CrossRef]
  64. Ezerman, M.F.; Jitman, S.; Ling, S.; Pasechnik, D.V. CSS-like constructions of asymmetric quantum codes. IEEE Trans. Inf. Theory 2013, 59, 6732–6754. [Google Scholar] [CrossRef]
  65. La Guardia, G.G. Asymmetric quantum codes: New codes from old. Quantum Inf. Process. 2013, 12, 2771–2790. [Google Scholar] [CrossRef]
  66. Wang, L.; Feng, K.; Ling, S.; Xing, C. Asymmetric quantum codes:characterization and constructions. IEEE Trans. Inf. Theory 2010, 56, 2938–2945. [Google Scholar] [CrossRef]
  67. Huffman, W.C.; Pless, V. Fundamentals of Error-Correcting Codes, 1st ed.; Cambridge University Press: New York, NY, USA, 2003. [Google Scholar]
  68. Krishna, A.; Sarwate, D.V. Pseudocyclic maximum-distance-separable codes. IEEE Trans. Inf. Theory 1990, 36, 880–884. [Google Scholar] [CrossRef]
  69. La Guardia, G.G. On optimal constacyclic codes. Linear Algebra Appl. 2016, 496, 594–610. [Google Scholar] [CrossRef]
  70. MacWilliams, F.J.; Sloane, N.J.A. The Theory of Error-Correcting Codes, 1st ed.; Elsevier: Amsterdam, The Netherlands, 1977; pp. 1–50. [Google Scholar]
  71. La Guardia, G.G. Asymmetric quantum product codes. Int. J. Quantum Inf. 2012, 10, 1250005. [Google Scholar] [CrossRef]
  72. La Guardia, G.G. On the construction of asymmetric quantum codes. Int. J. Theor. Phys. 2014, 53, 2312–2322. [Google Scholar] [CrossRef]
  73. Pereira, F.R. Entanglement-assisted quantum codes from cyclic codes. Entropy 2019, 25, 37. [Google Scholar] [CrossRef]
  74. Chen, X.; Zhu, S.; Kai, X. Entanglement-assisted quantum MDS codes constructed from constacyclic codes. Quantum Inf. Process. 2018, 17, 273. [Google Scholar] [CrossRef]
  75. Abobeih, M.H.; Cramer, J.; Bakker, M.A.; Kalb, N.; Markham, M.; Twitchen, D.J.; Taminiau, T.H. One-second coherence for a single electron spin coupled to a multi-qubit nuclear-spin environment. Nat. Commun. 2018, 9, 2552. [Google Scholar] [CrossRef]
  76. Gyenis, A.; Mundada, P.S.; Paolo, A.D.; Hazard, T.M.; You, X.; Schuster, D.I.; Koch, J.; Blais, A.; Houck, A.A. Experimental realization of a protected superconducting circuit derived from the 0-π qubit. PRX Quantum 2021, 2, 010339. [Google Scholar] [CrossRef]
  77. Zhou, X.; Koolstra, G.; Zhang, X.; Yang, G.; Han, X.; Dizdar, B.; Li, X.; Divan, R.; Guo, W.; Murch, K.W.; et al. Single electrons on solid neon as a solid-state qubit platform. Nature 2022, 605, 46–50. [Google Scholar] [CrossRef] [PubMed]
Table 1. Sample parameters of asymmetric EAQMDS codes constructed from Theorem 2.
Table 1. Sample parameters of asymmetric EAQMDS codes constructed from Theorem 2.
qn [ [ n , k , d z / d x ; c ] ] q 2
1758 [ [ 58 , 2 , 56 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 4 , 54 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 6 , 52 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 8 , 50 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 10 , 48 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 12 , 46 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 14 , 44 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 16 , 42 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 18 , 40 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 40 , 14 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 42 , 12 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 44 , 10 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 48 , 8 / 4 ; 2 ] ] 17 2
1758 [ [ 58 , 52 , 6 / 4 ; 2 ] ] 17 2
Table 2. Sample parameters of asymmetric EAQMDS codes constructed from Theorem 3.
Table 2. Sample parameters of asymmetric EAQMDS codes constructed from Theorem 3.
qn [ [ n , k , d ; c ] ] q 2
1334 [ [ 34 , 2 , 32 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 4 , 30 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 6 , 28 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 8 , 26 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 10 , 24 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 12 , 22 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 20 , 14 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 22 , 12 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 24 , 10 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 26 , 8 / 4 ; 2 ] ] 13 2
1334 [ [ 34 , 28 , 6 / 4 ; 2 ] ] 13 2
Table 3. Sample parameters of asymmetric EAQMDS codes constructed from Theorem 4.
Table 3. Sample parameters of asymmetric EAQMDS codes constructed from Theorem 4.
qn [ [ n , k , d z / d x ; c ] ] q 2
23106 [ [ 106 , 98 , 8 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 96 , 10 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 94 , 12 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 92 , 14 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 14 , 92 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 12 , 94 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 10 , 96 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 8 , 98 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 6 , 100 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 4 , 102 / 4 ; 2 ] ] 23 2
23106 [ [ 106 , 2 , 104 / 4 ; 2 ] ] 23 2
Table 4. Sample parameters of asymmetric EAQMDS codes constructed from Theorem 5.
Table 4. Sample parameters of asymmetric EAQMDS codes constructed from Theorem 5.
qn [ [ n , k , d z / d x ; c ] ] q 2
27146 [ [ 146 , 136 , 10 / 4 ; 2 ] ] 27 2
27146 [ [ 146 , 134 , 12 / 4 ; 2 ] ] 27 2
27146 [ [ 146 , 132 , 14 / 4 ; 2 ] ] 27 2
27146 [ [ 146 , 130 , 16 / 4 ; 2 ] ] 27 2
27146 [ [ 146 , 12 , 134 / 4 ; 2 ] ] 27 2
27146 [ [ 146 , 10 , 136 / 4 ; 2 ] ] 27 2
27146 [ [ 146 , 8 , 138 / 4 ; 2 ] ] 27 2
27146 [ [ 146 , 6 , 140 / 4 ; 2 ] ] 27 2
27146 [ [ 146 , 4 , 142 / 4 ; 2 ] ] 27 2
27146 [ [ 146 , 2 , 144 / 4 ; 2 ] ] 27 2
Table 5. Comparison of asymmetric EAQMDS codes derived from Theorem 2 with those found in [18].
Table 5. Comparison of asymmetric EAQMDS codes derived from Theorem 2 with those found in [18].
Codes in [18] ( k c ) / n Codes from Theorem 2 ( k c ) / n
[ [ 58 , 6 , 54 / 4 ; 4 ] ] 17 2 0.035 [ [ 58 , 4 , 54 / 4 ; 2 ] ] 17 2 0.035
[ [ 58 , 12 , 52 / 4 ; 8 ] ] 17 2 0.069 [ [ 58 , 6 , 52 / 4 ; 2 ] ] 17 2 0.069
[ [ 58 , 18 , 50 / 4 ; 12 ] ] 17 2 0.103 [ [ 58 , 8 , 50 / 4 ; 2 ] ] 17 2 0.103
[ [ 58 , 24 , 48 / 4 ; 16 ] ] 17 2 0.138 [ [ 58 , 10 , 48 / 4 ; 2 ] ] 17 2 0.138
[ [ 58 , 30 , 46 / 4 ; 20 ] ] 17 2 0.172 [ [ 58 , 12 , 46 / 4 ; 2 ] ] 17 2 0.172
[ [ 58 , 36 , 44 / 4 ; 24 ] ] 17 2 0.207 [ [ 58 , 14 , 44 / 4 ; 2 ] ] 17 2 0.207
[ [ 58 , 42 , 42 / 4 ; 28 ] ] 17 2 0.241 [ [ 58 , 16 , 42 / 4 ; 2 ] ] 17 2 0.241
[ [ 58 , 48 , 40 / 4 ; 32 ] ] 17 2 0.276 [ [ 58 , 18 , 40 / 4 ; 2 ] ] 17 2 0.276
[ [ 58 , 54 , 38 / 4 ; 36 ] ] 17 2 0.310 [ [ 58 , 20 , 38 / 4 ; 2 ] ] 17 2 0.310
[ [ 58 , 22 , 36 / 4 ; 2 ] ] 17 2 0.345
[ [ 58 , 24 , 34 / 4 ; 2 ] ] 17 2 0.379
[ [ 58 , 26 , 32 / 4 ; 2 ] ] 17 2 0.414
[ [ 58 , 28 , 30 / 4 ; 2 ] ] 17 2 0.448
[ [ 58 , 30 , 28 / 4 ; 2 ] ] 17 2 0.483
[ [ 58 , 32 , 26 / 4 ; 2 ] ] 17 2 0.517
[ [ 58 , 34 , 24 / 4 ; 2 ] ] 17 2 0.552
[ [ 58 , 36 , 22 / 4 ; 2 ] ] 17 2 0.586
[ [ 58 , 38 , 20 / 4 ; 2 ] ] 17 2 0.621
[ [ 58 , 40 , 18 / 4 ; 2 ] ] 17 2 0.655
[ [ 58 , 42 , 16 / 4 ; 2 ] ] 17 2 0.690
[ [ 58 , 44 , 14 / 4 ; 2 ] ] 17 2 0.724
[ [ 58 , 46 , 12 / 4 ; 2 ] ] 17 2 0.759
[ [ 58 , 48 , 10 / 4 ; 2 ] ] 17 2 0.793
[ [ 58 , 50 , 8 / 4 ; 2 ] ] 17 2 0.828
[ [ 58 , 52 , 6 / 4 ; 2 ] ] 17 2 0.862
Table 6. Comparison of asymmetric EAQMDS codes derived from Theorem 3 with those found in [18].
Table 6. Comparison of asymmetric EAQMDS codes derived from Theorem 3 with those found in [18].
Codes in [18] ( k c ) / n Codes from Theorem 3 ( k c ) / n
[ [ 34 , 6 , 30 / 4 ; 4 ] ] 13 2 0.059 [ [ 34 , 4 , 30 / 4 ; 2 ] ] 13 2 0.059
[ [ 34 , 12 , 28 / 4 ; 8 ] ] 13 2 0.118 [ [ 34 , 6 , 28 / 4 ; 2 ] ] 13 2 0.118
[ [ 34 , 18 , 26 / 4 ; 12 ] ] 13 2 0.177 [ [ 34 , 8 , 24 / 4 ; 2 ] ] 13 2 0.177
[ [ 34 , 24 , 24 / 4 ; 16 ] ] 13 2 0.235 [ [ 34 , 10 , 24 / 4 ; 2 ] ] 13 2 0.235
[ [ 34 , 30 , 22 / 4 ; 20 ] ] 13 2 0.294 [ [ 34 , 12 , 22 / 4 ; 2 ] ] 13 2 0.294
[ [ 34 , 14 , 20 / 4 ; 2 ] ] 13 2 0.353
[ [ 34 , 16 , 18 / 4 ; 2 ] ] 13 2 0.412
[ [ 34 , 18 , 16 / 4 ; 2 ] ] 13 2 0.471
[ [ 34 , 20 , 14 / 4 ; 2 ] ] 13 2 0.529
[ [ 34 , 22 , 12 / 4 ; 2 ] ] 13 2 0.588
[ [ 34 , 24 , 10 / 4 ; 2 ] ] 13 2 0.647
[ [ 34 , 26 , 8 / 4 ; 2 ] ] 13 2 0.706
[ [ 34 , 28 , 6 / 4 ; 2 ] ] 13 2 0.765
Table 7. Comparison of asymmetric EAQMDS codes derived from Theorem 4 with those found in [18].
Table 7. Comparison of asymmetric EAQMDS codes derived from Theorem 4 with those found in [18].
Codes in [18] ( k c ) / n Codes from Theorem 4 ( k c ) / n
[ [ 106 , 6 , 102 / 4 ; 4 ] ] 23 2 0.019 [ [ 106 , 4 , 102 / 4 ; 2 ] ] 23 2 0.019
[ [ 106 , 12 , 100 / 4 ; 8 ] ] 23 2 0.038 [ [ 106 , 6 , 100 / 4 ; 2 ] ] 23 2 0.038
[ [ 106 , 18 , 98 / 4 ; 12 ] ] 23 2 0.057 [ [ 106 , 8 , 98 / 4 ; 2 ] ] 23 2 0.057
[ [ 106 , 24 , 96 / 4 ; 16 ] ] 23 2 0.076 [ [ 106 , 10 , 96 / 4 ; 2 ] ] 23 2 0.076
[ [ 106 , 30 , 94 / 4 ; 20 ] ] 23 2 0.094 [ [ 106 , 12 , 94 / 4 ; 2 ] ] 23 2 0.094
[ [ 106 , 36 , 92 / 4 ; 24 ] ] 23 2 0.113 [ [ 106 , 14 , 92 / 4 ; 2 ] ] 23 2 0.113
[ [ 106 , 42 , 90 / 4 ; 28 ] ] 23 2 0.132 [ [ 106 , 16 , 90 / 4 ; 2 ] ] 23 2 0.132
[ [ 106 , 48 , 88 / 4 ; 32 ] ] 23 2 0.151 [ [ 106 , 18 , 88 / 4 ; 2 ] ] 23 2 0.151
[ [ 106 , 54 , 86 / 4 ; 36 ] ] 23 2 0.151 [ [ 106 , 18 , 86 / 4 ; 2 ] ] 23 2 0.151
[ [ 106 , 90 , 74 / 4 ; 60 ] ] 23 2 0.283 [ [ 106 , 32 , 74 / 4 ; 2 ] ] 23 2 0.283
[ [ 106 , 96 , 72 / 4 ; 64 ] ] 23 2 0.302 [ [ 106 , 34 , 72 / 4 ; 2 ] ] 23 2 0.302
[ [ 106 , 102 , 70 / 4 ; 68 ] ] 23 2 0.321 [ [ 106 , 36 , 70 / 4 ; 2 ] ] 23 2 0.321
[ [ 106 , 38 , 68 / 4 ; 2 ] ] 23 2 0.340
[ [ 106 , 88 , 18 / 4 ; 2 ] ] 23 2 0.811
[ [ 106 , 90 , 16 / 4 ; 2 ] ] 23 2 0.830
[ [ 106 , 92 , 14 / 4 ; 2 ] ] 23 2 0.849
[ [ 106 , 94 , 12 / 4 ; 2 ] ] 23 2 0.868
[ [ 106 , 96 , 10 / 4 ; 2 ] ] 23 2 0.887
[ [ 106 , 98 , 8 / 4 ; 2 ] ] 23 2 0.906
Table 8. Comparison of asymmetric EAQMDS codes derived from Theorem 5 with those found in [18].
Table 8. Comparison of asymmetric EAQMDS codes derived from Theorem 5 with those found in [18].
Codes in [18] ( k c ) / n Codes from Theorem 5 ( k c ) / n
[ [ 146 , 6 , 142 / 4 ; 4 ] ] 27 2 0.014 [ [ 146 , 4 , 142 / 4 ; 2 ] ] 27 2 0.014
[ [ 146 , 12 , 140 / 4 ; 8 ] ] 27 2 0.027 [ [ 146 , 6 , 140 / 4 ; 2 ] ] 27 2 0.027
[ [ 146 , 18 , 138 / 4 ; 12 ] ] 27 2 0.041 [ [ 146 , 8 , 138 / 4 ; 2 ] ] 27 2 0.041
[ [ 146 , 24 , 136 / 4 ; 16 ] ] 27 2 0.055 [ [ 146 , 10 , 136 / 4 ; 2 ] ] 27 2 0.055
[ [ 146 , 30 , 134 / 4 ; 20 ] ] 27 2 0.069 [ [ 146 , 12 , 134 / 4 ; 2 ] ] 27 2 0.069
[ [ 146 , 36 , 132 / 4 ; 24 ] ] 27 2 0.082 [ [ 146 , 14 , 132 / 4 ; 2 ] ] 27 2 0.822
[ [ 146 , 42 , 130 / 4 ; 28 ] ] 27 2 0.096 [ [ 146 , 16 , 130 / 4 ; 2 ] ] 27 2 0.096
[ [ 146 , 126 , 102 / 4 ; 84 ] ] 27 2 0.288 [ [ 146 , 44 , 102 / 4 ; 2 ] ] 27 2 0.288
[ [ 146 , 132 , 100 / 4 ; 88 ] ] 27 2 0.301 [ [ 146 , 46 , 100 / 4 ; 2 ] ] 27 2 0.301
[ [ 146 , 138 , 98 / 4 ; 92 ] ] 27 2 0.315 [ [ 146 , 48 , 98 / 4 ; 2 ] ] 27 2 0.315
[ [ 146 , 144 , 96 / 4 ; 96 ] ] 27 2 0.329 [ [ 146 , 50 , 96 / 4 ; 2 ] ] 27 2 0.329
[ [ 146 , 52 , 94 / 4 ; 2 ] ] 27 2 0.343
[ [ 146 , 54 , 92 / 4 ; 2 ] ] 27 2 0.356
[ [ 146 , 138 , 12 / 4 ; 2 ] ] 27 2 0.932
[ [ 146 , 140 , 10 / 4 ; 2 ] ] 27 2 0.945
[ [ 146 , 142 , 8 / 4 ; 2 ] ] 27 2 0.959
[ [ 146 , 144 , 6 / 4 ; 2 ] ] 27 2 0.973
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, J.; Fang, W.; Zhou, S.; Qiu, J.; Zhang, C.; Xu, Y.; Zeng, B.; Chen, Y. Asymmetric Entanglement-Assisted Quantum MDS Codes Constructed from Constacyclic Codes. Entropy 2023, 25, 1603. https://doi.org/10.3390/e25121603

AMA Style

Chen J, Fang W, Zhou S, Qiu J, Zhang C, Xu Y, Zeng B, Chen Y. Asymmetric Entanglement-Assisted Quantum MDS Codes Constructed from Constacyclic Codes. Entropy. 2023; 25(12):1603. https://doi.org/10.3390/e25121603

Chicago/Turabian Style

Chen, Jianzhang, Wanchuan Fang, Shuo Zhou, Jie Qiu, Chenyang Zhang, Yixin Xu, Bozhe Zeng, and Youqin Chen. 2023. "Asymmetric Entanglement-Assisted Quantum MDS Codes Constructed from Constacyclic Codes" Entropy 25, no. 12: 1603. https://doi.org/10.3390/e25121603

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop