{"title":"Puncturing Quantum Stabilizer Codes","authors":"Jaron Skovsted Gundersen;René Bødker Christensen;Markus Grassl;Petar Popovski;Rafał Wisniewski","doi":"10.1109/JSAIT.2025.3562287","DOIUrl":"https://doi.org/10.1109/JSAIT.2025.3562287","url":null,"abstract":"Classical coding theory contains several techniques to obtain new codes from other codes, including puncturing and shortening. Both of these techniques have been generalized to quantum codes. Restricting to stabilizer codes, this paper introduces more freedom in the choice of the encoded states after puncturing. Furthermore, we also give an explicit description of the stabilizers for the punctured code. The additional freedom in the procedure also opens up for new ways to construct new codes from old, and we present several ways to utilize this in the search for codes with good or even optimal parameters. In particular, we use the construction to obtain codes whose parameters exceed the best previously known and which are better than what general puncturing guarantees. Lastly, the freedom in our puncture procedure allowed us to generalize the proof of the Griesmer bound from the classical setting to stabilizer codes for qudits of prime dimension since the proof relies heavily on the puncturing technique.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"6 ","pages":"74-84"},"PeriodicalIF":0.0,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143908363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas L. Marzetta;Brian McMinn;Amritpal Singh;Thorkild B. Hansen
{"title":"How Much Power Must We Extract From a Receiver Antenna to Effect Communications?","authors":"Thomas L. Marzetta;Brian McMinn;Amritpal Singh;Thorkild B. Hansen","doi":"10.1109/JSAIT.2025.3555066","DOIUrl":"https://doi.org/10.1109/JSAIT.2025.3555066","url":null,"abstract":"Subject to the laws of classical physics - the science that governs the design of today’s wireless communication systems - there is no need to match the radiation impedance of a receiver antenna to the impedance of the front-end electronics in order to effect communications. If we dispense with a transmission line and, instead, make the front-end electronics colocated with the antenna, then a high input impedance preamplifier can measure the open-circuit voltage directly on the antenna port while drawing negligible power. Neither Friis’ concept of noise figure, nor Shannon information theory, nor electronics technology dictates that we must extract power from an antenna. Classical physics appears not to provide a lower bound on the energy that must be extracted from the antenna for every bit of received information.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"6 ","pages":"49-58"},"PeriodicalIF":0.0,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143800996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum X-Secure T-Private Information Retrieval From MDS Coded Storage With Unresponsive and Byzantine Servers","authors":"Yuxiang Lu;Syed A. Jafar","doi":"10.1109/JSAIT.2025.3554625","DOIUrl":"https://doi.org/10.1109/JSAIT.2025.3554625","url":null,"abstract":"A communication-efficient protocol is introduced over a many-to-one quantum network for Q-E-B-MDS-X-TPIR, i.e., quantum private information retrieval with MDS-<italic>X</i>-secure storage and <italic>T</i>-private queries. The protocol is resilient to any set of up to <italic>E</i> unresponsive servers (erased servers or stragglers) and any set of up to <italic>B</i> Byzantine servers. The underlying coding scheme incorporates an enhanced version of a Cross Subspace Alignment (CSA) code, namely a Modified CSA (MCSA) code, into the framework of CSS codes. The error-correcting capabilities of CSS codes are leveraged to encode the dimensions that carry desired computation results from the MCSA code into the error space of the CSS code, while the undesired interference terms are aligned into the stabilized code space. The challenge is to do this efficiently while also correcting quantum erasures and Byzantine errors. The protocol achieves superdense coding gain over comparable classical baselines for Q-E-B-MDS-X-TPIR, recovers as special cases the state of art results for various other quantum PIR settings previously studied in the literature, and paves the way for applications in quantum coded distributed computation, where CSA code structures are important for communication efficiency, while security and resilience to stragglers and Byzantine servers are critical.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"6 ","pages":"59-73"},"PeriodicalIF":0.0,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143800744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Limits in Spectral Efficiency From Array Geometry","authors":"Divyakumar Badheka;Jacob J. Adams;Brian L. Hughes","doi":"10.1109/JSAIT.2025.3553733","DOIUrl":"https://doi.org/10.1109/JSAIT.2025.3553733","url":null,"abstract":"In MIMO communications, information about the transmitted signal is conveyed to the receiver through fields and currents on the surface of the receive antenna array. However, this information can only be observed indirectly through the ports of the array. This raises fundamental information-theoretic questions: How much useful information is contained in the fields and currents on the surface of the receiver array? How much of this information is captured by the array ports? Do conventional arrays efficiently extract the information contained in their conducting surfaces? In this paper, we consider these questions in the context of a multiuser MIMO (MU-MIMO) uplink where users are separated by spatial beamforming at the receiver. Our main results can be summarized as follows: To quantify the information contained in the EM fields and currents on the surface of the receiving antenna array, we first introduce a new model, the surface receiver model. We then use this model to derive upper bounds on the spectral efficiency that can be approached with any location of M ports on the surface of the receiving antenna array. We denote this the surface modal bound. Furthermore, we also derive upper bound on the spectral efficiency approached with any number or location of ports on the receiver array. We call it the surface spectral efficiency. Finally, we apply the analytical results to a MU-MIMO uplink with an array of patch antennas at the receiver. The results suggests that the conventional arrays of single and dual-polarized patches fails to capture most of the information contained in the surface currents. The results further suggest ways to modify the number of antenna ports, together with the receiver front-end, to extract the information in the surface currents more efficiently.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"6 ","pages":"34-48"},"PeriodicalIF":0.0,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10937211","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143792791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transversal Clifford and T-Gate Codes of Short Length and High Distance","authors":"Shubham P. Jain;Victor V. Albert","doi":"10.1109/JSAIT.2025.3570832","DOIUrl":"https://doi.org/10.1109/JSAIT.2025.3570832","url":null,"abstract":"The non-local interactions in several quantum device architectures allow for the realization of more compact quantum encodings while retaining the same degree of protection against noise. Anticipating that short to medium-length codes will soon be realizable, it is important to construct stabilizer codes that, for a given code distance, admit fault-tolerant implementations of logical gates with the fewest number of physical qubits. To this aim, we construct three kinds of codes encoding a single logical qubit for distances up to 31. First, we construct the smallest known doubly even codes, all of which admit a transversal implementation of the Clifford group. Applying a doubling procedure [<uri>https://arxiv.org/abs/1509.03239</uri>] to such codes yields the smallest known weak triply even codes for the same distances and number of encoded qubits. This second family of codes admit a transversal implementation of the logical T-gate. Relaxing the triply even property, we obtain our third family of triorthogonal codes with an even lower overhead at the cost of requiring additional Clifford gates to achieve the same logical operation. To our knowledge, these are the smallest known triorthogonal codes for their respective distances. While not qLDPC, the stabilizer generator weights of the code families with transversal <monospace>T</monospace>-gates scale roughly as the square root of their lengths.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"6 ","pages":"127-137"},"PeriodicalIF":0.0,"publicationDate":"2025-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144331694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mutual Coupling in Holographic MIMO: Physical Modeling and Information-Theoretic Analysis","authors":"Andrea Pizzo;Angel Lozano","doi":"10.1109/JSAIT.2025.3570804","DOIUrl":"https://doi.org/10.1109/JSAIT.2025.3570804","url":null,"abstract":"This paper presents a comprehensive framework for holographic multiantenna communication, a paradigm that integrates both wide apertures and closely spaced antennas relative to the wavelength. The presented framework is physically grounded, enabling information-theoretic analyses that inherently incorporate correlation and mutual coupling among the antennas. This establishes the combined effects of correlation and coupling on the information-theoretic performance limits across SNR levels. Additionally, it reveals that, by suitably selecting the individual antenna patterns, mutual coupling can be harnessed to either reinforce or counter spatial correlations as appropriate for specific SNRs, thereby improving the performance.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"6 ","pages":"111-126"},"PeriodicalIF":0.0,"publicationDate":"2025-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11006094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144232132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum Locally Recoverable Codes via Good Polynomials","authors":"Sandeep Sharma;Vinayak Ramkumar;Itzhak Tamo","doi":"10.1109/JSAIT.2025.3567480","DOIUrl":"https://doi.org/10.1109/JSAIT.2025.3567480","url":null,"abstract":"Locally recoverable codes (LRCs) with locality parameter r can recover any erased code symbol by accessing r other code symbols. This local recovery property is of great interest in large-scale distributed classical data storage systems as it leads to efficient repair of failed nodes. A well-known class of optimal (classical) LRCs are subcodes of Reed-Solomon codes constructed using a special type of polynomials called good polynomials. Recently, Golowich and Guruswami initiated the study of quantum LRCs (qLRCs), which could have applications in quantum data storage systems of the future. The authors presented a qLRC construction based on good polynomials arising out of subgroups of the multiplicative group of finite fields. In this paper, we present a qLRC construction method that can employ any good polynomial. We also propose a new approach for designing good polynomials using subgroups of affine general linear groups. Golowich and Guruswami also derived a lower bound on the minimum distance of their qLRC under the restriction that <inline-formula> <tex-math>$r+1$ </tex-math></inline-formula> is prime. Using similar techniques in conjunction with the expander mixing lemma, we develop minimum distance lower bounds for our qLRCs without the <inline-formula> <tex-math>$r+1$ </tex-math></inline-formula> prime restriction.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"6 ","pages":"100-110"},"PeriodicalIF":0.0,"publicationDate":"2025-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maryam Rezvani;Raviraj Adve;Akram Bin Sediq;Amr El-Keyi
{"title":"Energy Efficient Wireless Communications by Harnessing Huygens’ Metasurfaces","authors":"Maryam Rezvani;Raviraj Adve;Akram Bin Sediq;Amr El-Keyi","doi":"10.1109/JSAIT.2025.3566321","DOIUrl":"https://doi.org/10.1109/JSAIT.2025.3566321","url":null,"abstract":"Ambitions for the next generation of wireless communication include high data rates, low latency, ubiquitous access, ensuring sustainability (in terms of consumption of energy and natural resources), all while maintaining a reasonable level of implementation complexity. Achieving these goals necessitates reforms in cellular networks, specifically in the physical layer and antenna design. The deployment of transmissive metasurfaces at basestations (BSs) presents an appealing solution, enabling beamforming in the radiated wave domain, minimizing the need for energy-hungry RF chains. Among various metasurface-based antenna designs, we propose using Huygens’ metasurface-based antennas (HMAs) at BSs. Huygens’ metasurfaces offer an attractive solution for antennas because, by utilizing Huygens’ equivalence principle, they allow independent control over both the amplitude and phase of the transmitted electromagnetic wave. In this paper, we investigate the fundamental limits of HMAs in wireless networks by integrating electromagnetic theory and information theory within a unified analytical framework. Specifically, we model the unique electromagnetic characteristics of HMAs and incorporate them into an information-theoretic optimization framework to determine their maximum achievable sum rate. By formulating an optimization problem that captures the impact of HMA’s hardware constraints and electromagnetic properties, we quantify the channel capacity of HMA-assisted systems. We then compare the performance of HMAs against phased arrays and other metasurface-based antennas in both rich scattering and realistic 3GPP channels, highlighting their potential in improving spectral and energy efficiency.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"6 ","pages":"85-99"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143949157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2024 Index IEEE Journal on Selected Areas in Information Theory Vol. 5","authors":"","doi":"10.1109/JSAIT.2025.3528825","DOIUrl":"https://doi.org/10.1109/JSAIT.2025.3528825","url":null,"abstract":"","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"702-714"},"PeriodicalIF":0.0,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10839060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142976176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JSAIT Issue on Information-Theoretic Methods for Trustworthy and Reliable Machine Learning","authors":"Lalitha Sankar;Oliver Kosut;Flavio Calmon;Ayfer Ozgur;Lele Wang;Ofer Shayevitz;Parastoo Sadeghi","doi":"10.1109/JSAIT.2024.3508492","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3508492","url":null,"abstract":"","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"5 ","pages":"xii-xv"},"PeriodicalIF":0.0,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10830758","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}