{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:23:43Z","timestamp":1773966223691,"version":"3.50.1"},"reference-count":56,"publisher":"Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften","license":[{"start":{"date-parts":[[2017,4,25]],"date-time":"2017-04-25T00:00:00Z","timestamp":1493078400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["quantum-journal.org"],"crossmark-restriction":false},"short-container-title":["Quantum"],"abstract":"<jats:p>We study the fundamental limits on the reliable storage of quantum information in lattices of qubits by deriving tradeoff bounds for approximate quantum error correcting codes. We introduce a notion of local approximate correctability and code distance, and give a number of equivalent formulations thereof, generalizing various exact error-correction criteria. Our tradeoff bounds relate the number of physical qubits <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>n<\/mml:mi><\/mml:math>, the number of encoded qubits <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>k<\/mml:mi><\/mml:math>, the code distance <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>d<\/mml:mi><\/mml:math>, the accuracy parameter <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>&amp;#x03B4;<\/mml:mi><\/mml:math> that quantifies how well the erasure channel can be reversed, and the locality parameter <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>&amp;#x2113;<\/mml:mi><\/mml:math> that specifies the length scale at which the recovery operation can be done. In a regime where the recovery is successful to accuracy <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>&amp;#x03B4;<\/mml:mi><\/mml:math> that is exponentially small in <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>&amp;#x2113;<\/mml:mi><\/mml:math>, which is the case for perturbations of local commuting projector codes, our bound reads <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>k<\/mml:mi><mml:msup><mml:mi>d<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mfrac><mml:mn>2<\/mml:mn><mml:mrow><mml:mi>D<\/mml:mi><mml:mo>&amp;#x2212;<\/mml:mo><mml:mn>1<\/mml:mn><\/mml:mrow><\/mml:mfrac><\/mml:mrow><\/mml:msup><mml:mo>&amp;#x2264;<\/mml:mo><mml:mi>O<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-OPEN\"><mml:mo maxsize=\"1.2em\" minsize=\"1.2em\">(<\/mml:mo><\/mml:mrow><mml:mi>n<\/mml:mi><mml:mo stretchy=\"false\">(<\/mml:mo><mml:mi>log<\/mml:mi><mml:mo>&amp;#x2061;<\/mml:mo><mml:mi>n<\/mml:mi><mml:msup><mml:mo stretchy=\"false\">)<\/mml:mo><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mfrac><mml:mrow><mml:mn>2<\/mml:mn><mml:mi>D<\/mml:mi><\/mml:mrow><mml:mrow><mml:mi>D<\/mml:mi><mml:mo>&amp;#x2212;<\/mml:mo><mml:mn>1<\/mml:mn><\/mml:mrow><\/mml:mfrac><\/mml:mrow><\/mml:msup><mml:mrow class=\"MJX-TeXAtom-CLOSE\"><mml:mo maxsize=\"1.2em\" minsize=\"1.2em\">)<\/mml:mo><\/mml:mrow><\/mml:math> for codes on <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>D<\/mml:mi><\/mml:math>-dimensional lattices of Euclidean metric. We also find that the code distance of any local approximate code cannot exceed <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>O<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-OPEN\"><mml:mo maxsize=\"1.2em\" minsize=\"1.2em\">(<\/mml:mo><\/mml:mrow><mml:mi>&amp;#x2113;<\/mml:mi><mml:msup><mml:mi>n<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mo stretchy=\"false\">(<\/mml:mo><mml:mi>D<\/mml:mi><mml:mo>&amp;#x2212;<\/mml:mo><mml:mn>1<\/mml:mn><mml:mo stretchy=\"false\">)<\/mml:mo><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mo>\/<\/mml:mo><\/mml:mrow><mml:mi>D<\/mml:mi><\/mml:mrow><\/mml:msup><mml:mrow class=\"MJX-TeXAtom-CLOSE\"><mml:mo maxsize=\"1.2em\" minsize=\"1.2em\">)<\/mml:mo><\/mml:mrow><\/mml:math> if <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>&amp;#x03B4;<\/mml:mi><mml:mo>&amp;#x2264;<\/mml:mo><mml:mi>O<\/mml:mi><mml:mo stretchy=\"false\">(<\/mml:mo><mml:mi>&amp;#x2113;<\/mml:mi><mml:msup><mml:mi>n<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mo>&amp;#x2212;<\/mml:mo><mml:mn>1<\/mml:mn><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mo>\/<\/mml:mo><\/mml:mrow><mml:mi>D<\/mml:mi><\/mml:mrow><\/mml:msup><mml:mo stretchy=\"false\">)<\/mml:mo><\/mml:math>. As a corollary of our formulation of correctability in terms of logical operator avoidance, we show that the code distance <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>d<\/mml:mi><\/mml:math> and the size <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mover><mml:mi>d<\/mml:mi><mml:mo stretchy=\"false\">&amp;#x007E;<\/mml:mo><\/mml:mover><\/mml:mrow><\/mml:math> of a minimal region that can support all approximate logical operators satisfies <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mover><mml:mi>d<\/mml:mi><mml:mo stretchy=\"false\">&amp;#x007E;<\/mml:mo><\/mml:mover><\/mml:mrow><mml:msup><mml:mi>d<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mfrac><mml:mn>1<\/mml:mn><mml:mrow><mml:mi>D<\/mml:mi><mml:mo>&amp;#x2212;<\/mml:mo><mml:mn>1<\/mml:mn><\/mml:mrow><\/mml:mfrac><\/mml:mrow><\/mml:msup><mml:mo>&amp;#x2264;<\/mml:mo><mml:mi>O<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-OPEN\"><mml:mo maxsize=\"1.2em\" minsize=\"1.2em\">(<\/mml:mo><\/mml:mrow><mml:mi>n<\/mml:mi><mml:msup><mml:mi>&amp;#x2113;<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mfrac><mml:mi>D<\/mml:mi><mml:mrow><mml:mi>D<\/mml:mi><mml:mo>&amp;#x2212;<\/mml:mo><mml:mn>1<\/mml:mn><\/mml:mrow><\/mml:mfrac><\/mml:mrow><\/mml:msup><mml:mrow class=\"MJX-TeXAtom-CLOSE\"><mml:mo maxsize=\"1.2em\" minsize=\"1.2em\">)<\/mml:mo><\/mml:mrow><\/mml:math>, where the logical operators are accurate up to <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>O<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-OPEN\"><mml:mo maxsize=\"1.2em\" minsize=\"1.2em\">(<\/mml:mo><\/mml:mrow><mml:mo stretchy=\"false\">(<\/mml:mo><mml:mi>n<\/mml:mi><mml:mi>&amp;#x03B4;<\/mml:mi><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mo>\/<\/mml:mo><\/mml:mrow><mml:mi>d<\/mml:mi><mml:msup><mml:mo stretchy=\"false\">)<\/mml:mo><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mn>1<\/mml:mn><mml:mrow class=\"MJX-TeXAtom-ORD\"><mml:mo>\/<\/mml:mo><\/mml:mrow><mml:mn>2<\/mml:mn><\/mml:mrow><\/mml:msup><mml:mrow class=\"MJX-TeXAtom-CLOSE\"><mml:mo maxsize=\"1.2em\" minsize=\"1.2em\">)<\/mml:mo><\/mml:mrow><\/mml:math> in operator norm. Finally, we prove that for two-dimensional systems if logical operators can be approximated by operators supported on constant-width flexible strings, then the dimension of the code space must be bounded. This supports one of the assumptions of algebraic anyon theories, that there exist only finitely many anyon types.<\/jats:p>","DOI":"10.22331\/q-2017-04-25-4","type":"journal-article","created":{"date-parts":[[2017,4,25]],"date-time":"2017-04-25T08:51:31Z","timestamp":1493110291000},"page":"4","update-policy":"https:\/\/doi.org\/10.22331\/q-crossmark-policy-page","source":"Crossref","is-referenced-by-count":27,"title":["Limits on the storage of quantum information in a volume of space"],"prefix":"10.22331","volume":"1","author":[{"given":"Steven T.","family":"Flammia","sequence":"first","affiliation":[{"name":"Centre for Engineered Quantum Systems, School of Physics, The University of Sydney, Australia"},{"name":"Center for Theoretical Physics, Massachusetts Institute of Technology, Cambridge, USA"}]},{"given":"Jeongwan","family":"Haah","sequence":"additional","affiliation":[{"name":"Station Q Quantum Architectures and Computation Group, Microsoft Research, Redmond, Washington, USA"},{"name":"Center for Theoretical Physics, Massachusetts Institute of Technology, Cambridge, USA"}]},{"given":"Michael J.","family":"Kastoryano","sequence":"additional","affiliation":[{"name":"NBIA, Niels Bohr Institute, University of Copenhagen, Denmark"}]},{"given":"Isaac H.","family":"Kim","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, New York, USA"},{"name":"Perimeter Institute for Theoretical Physics, Waterloo ON N2L 2Y5, Canada"},{"name":"Institute for Quantum Computing, University of Waterloo, Waterloo ON N2L 3G1, Canada"}]}],"member":"9598","published-online":{"date-parts":[[2017,4,25]]},"reference":[{"key":"0","doi-asserted-by":"publisher","unstructured":"B. M. Terhal, ``Quantum error correction for quantum memories,&apos;&apos; Rev. Mod. Phys. 87, 307 (2015), arXiv:1302.3428.","DOI":"10.1103\/RevModPhys.87.307"},{"key":"1","doi-asserted-by":"crossref","unstructured":"D. Gottesman, ``An introduction to quantum error correction and fault-tolerant quantum computation,&apos;&apos; in Quantum Information Science and Its Contributions to Mathematics, Vol. 68, edited by S. J. Lomonaco, Jr. (American Mathematical Society, 2010) pp. 24\u201369, arXiv:0904.2557.","DOI":"10.1090\/psapm\/068\/2762145"},{"key":"2","doi-asserted-by":"publisher","unstructured":"D. W. Leung, M. A. Nielsen, I. L. Chuang, and Y. Yamamoto, ``Approximate quantum error correction can lead to better codes,&apos;&apos; Phys. Rev. A 56, 2567\u20132573 (1997).","DOI":"10.1103\/PhysRevA.56.2567"},{"key":"3","doi-asserted-by":"publisher","unstructured":"C. Cr\u00e9peau, D. Gottesman, and A. Smith, ``Approximate quantum error-correcting codes and secret sharing schemes,&apos;&apos; in Advances in Cryptology \u2013 EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, edited by R. Cramer (Springer Berlin Heidelberg, Berlin, Heidelberg, 2005) pp. 285\u2013301, quant-ph\/0503139.","DOI":"10.1007\/11426639_17"},{"key":"4","doi-asserted-by":"publisher","unstructured":"G. Moore and N. Read, ``Nonabelions in the fractional quantum hall effect,&apos;&apos; Nuclear Physics B 360, 362\u2013396 (1991).","DOI":"10.1016\/0550-3213(91)90407-O"},{"key":"5","doi-asserted-by":"publisher","unstructured":"A. Kitaev, ``Anyons in an exactly solved model and beyond,&apos;&apos; Annals of Physics 321, 2\u2013111 (2006), cond-mat\/0506438.","DOI":"10.1016\/j.aop.2005.10.005"},{"key":"6","doi-asserted-by":"publisher","unstructured":"S. Michalakis and J. P. Zwolak, ``Stability of frustration-free Hamiltonians,&apos;&apos; Communications in Mathematical Physics 322, 277\u2013302 (2013), arXiv:1109.1588.","DOI":"10.1007\/s00220-013-1762-6"},{"key":"7","doi-asserted-by":"publisher","unstructured":"M. B. Hastings and X.-G. Wen, ``Quasiadiabatic continuation of quantum states: The stability of topological ground-state degeneracy and emergent gauge invariance,&apos;&apos; Physical Review B 72, 045141 (2005), cond-mat\/0503554.","DOI":"10.1103\/physrevb.72.045141"},{"key":"8","doi-asserted-by":"publisher","unstructured":"S. Bravyi, M. B. Hastings, and S. Michalakis, ``Topological quantum order: stability under local perturbations,&apos;&apos; Journal of Mathematical Physics 51, 093512 (2010a), arXiv:1001.0344.","DOI":"10.1063\/1.3490195"},{"key":"9","doi-asserted-by":"publisher","unstructured":"S. Bravyi, D. Poulin, and B. Terhal, ``Tradeoffs for reliable quantum information storage in 2D systems,&apos;&apos; Phys. Rev. Lett. 104, 050503 (2010b), arXiv:0909.5200.","DOI":"10.1103\/PhysRevLett.104.050503"},{"key":"10","doi-asserted-by":"publisher","unstructured":"J. Haah and J. Preskill, ``Logical operator tradeoff for local quantum codes,&apos;&apos; Phys. Rev. A 86, 032308 (2012), 1011.3529.","DOI":"10.1103\/PhysRevA.86.032308"},{"key":"11","doi-asserted-by":"publisher","unstructured":"C. G. Brell, S. T. Flammia, S. D. Bartlett, and A. C. Doherty, ``Toric codes and quantum doubles from two-body Hamiltonians,&apos;&apos; New Journal of Physics 13, 053039 (2011), arXiv:1011.1942.","DOI":"10.1088\/1367-2630\/13\/5\/053039"},{"key":"12","doi-asserted-by":"crossref","unstructured":"B. Criger and B. Terhal, ``Noise thresholds for the [4,2,2]-concatenated toric code,&apos;&apos; Quant. Inf. Comput. 16, 1261 (2016), arXiv:1604.04062.","DOI":"10.26421\/QIC16.15-16-1"},{"key":"13","doi-asserted-by":"crossref","unstructured":"I. H. Kim and M. J. Kastoryano, ``Entanglement renormalization, quantum error correction, and bulk causality,&apos;&apos; (2017), arXiv:1701.00050.","DOI":"10.1007\/JHEP04(2017)040"},{"key":"14","doi-asserted-by":"publisher","unstructured":"S. Bravyi and B. Terhal, ``A no-go theorem for a two-dimensional self-correcting quantum memory based on stabilizer codes,&apos;&apos; New Journal of Physics 11, 043029 (2009), arXiv:0810.1983.","DOI":"10.1088\/1367-2630\/11\/4\/043029"},{"key":"15","doi-asserted-by":"publisher","unstructured":"N. Delfosse, ``Tradeoffs for reliable quantum information storage in surface codes and color codes,&apos;&apos; in 2013 IEEE International Symposium on Information Theory (Institute of Electrical & Electronics Engineers (IEEE), 2013) arXiv:1301.6588.","DOI":"10.1109\/isit.2013.6620360"},{"key":"16","doi-asserted-by":"publisher","unstructured":"S. Bravyi, ``Subsystem codes with spatially local generators,&apos;&apos; Phys. Rev. A 83, 012320 (2011), arXiv:1008.1029.","DOI":"10.1103\/PhysRevA.83.012320"},{"key":"17","doi-asserted-by":"publisher","unstructured":"D. Bacon, S. T. Flammia, A. W. Harrow, and J. Shi, ``Sparse Quantum Codes from Quantum Circuits,&apos;&apos; in Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC &apos;15 (ACM Press, New York, NY, USA, 2015) pp. 327\u2013334, arXiv:1411.3334.","DOI":"10.1145\/2746539.2746608"},{"key":"18","doi-asserted-by":"publisher","unstructured":"C. Cafaro and P. van Loock, ``Approximate quantum error correction for generalized amplitude-damping errors,&apos;&apos; Phys. Rev. A 89, 022316 (2014), arXiv:1308.4582.","DOI":"10.1103\/PhysRevA.89.022316"},{"key":"19","doi-asserted-by":"publisher","unstructured":"Y. Ouyang, ``Permutation-invariant quantum codes,&apos;&apos; Phys. Rev. A 90, 062317 (2014), arXiv:1302.3247.","DOI":"10.1103\/PhysRevA.90.062317"},{"key":"20","doi-asserted-by":"publisher","unstructured":"M. Grassl, L. Kong, Z. Wei, Z.-Q. Yin, and B. Zeng, ``Quantum Error-Correcting Codes for Qudit Amplitude Damping,&apos;&apos; arXiv:1509.06829 (2015), arXiv:1509.06829.","DOI":"10.1109\/TIT.2018.2790423"},{"key":"21","doi-asserted-by":"publisher","unstructured":"B. Schumacher and M. D. Westmoreland, ``Approximate quantum error correction,&apos;&apos; Quant. Info. Process. 1, 5\u201312 (2002), quant-ph\/0112106.","DOI":"10.1023\/A:1019653202562"},{"key":"22","doi-asserted-by":"publisher","unstructured":"C. B\u00e9ny and O. Oreshkov, ``General conditions for approximate quantum error correction and near-optimal recovery channels,&apos;&apos; Phys. Rev. Lett. 104, 120501 (2010), arXiv:0907.5391.","DOI":"10.1103\/PhysRevLett.104.120501"},{"key":"23","doi-asserted-by":"publisher","unstructured":"H. K. Ng and P. Mandayam, ``Simple approach to approximate quantum error correction based on the transpose channel,&apos;&apos; Phys. Rev. A 81, 062342 (2010), arXiv:0909.0931.","DOI":"10.1103\/PhysRevA.81.062342"},{"key":"24","doi-asserted-by":"publisher","unstructured":"J. C. Bridgeman, S. T. Flammia, and D. Poulin, ``Detecting Topological Order with Ribbon Operators,&apos;&apos; Phys. Rev. B 94, 205123 (2016), arXiv:1603.02275.","DOI":"10.1103\/PhysRevB.94.205123"},{"key":"25","doi-asserted-by":"publisher","unstructured":"C. T. Chubb and S. T. Flammia, ``Approximate symmetries of Hamiltonians,&apos;&apos; (2016), arXiv:1608.02600.","DOI":"10.1063\/1.4998921"},{"key":"26","doi-asserted-by":"publisher","unstructured":"A. Uhlmann, ``The ``transition probability&apos;&apos; in the state space of a $*$-algebra,&apos;&apos; Reports on Mathematical Physics 9, 273\u2013279 (1976).","DOI":"10.1016\/0034-4877(76)90060-4"},{"key":"27","doi-asserted-by":"publisher","unstructured":"C. A. Fuchs and J. van de Graaf, ``Cryptographic distinguishability measures for quantum-mechanical states,&apos;&apos; IEEE Trans. Inf. Theory 45, 1216 (1999), quant-ph\/9712042.","DOI":"10.1109\/18.761271"},{"key":"28","doi-asserted-by":"publisher","unstructured":"E. Knill and R. Laflamme, ``Theory of quantum error-correcting codes,&apos;&apos; Phys. Rev. A 55, 900\u2013911 (1997).","DOI":"10.1103\/PhysRevA.55.900"},{"key":"29","doi-asserted-by":"publisher","unstructured":"D. Kretschmann, D. Schlingemann, and R. F. Werner, ``The information-disturbance tradeoff and the continuity of Stinespring&apos;s representation,&apos;&apos; IEEE Transactions on Information Theory 54, 1708\u20131717 (2008), quant-ph\/0605009.","DOI":"10.1109\/tit.2008.917696"},{"key":"30","doi-asserted-by":"publisher","unstructured":"P. Hayden and A. Winter, ``Weak decoupling duality and quantum identification,&apos;&apos; IEEE Transactions on Information Theory 58, 4914\u20134929 (2012), arXiv:1003.4994.","DOI":"10.1109\/tit.2012.2191695"},{"key":"31","doi-asserted-by":"publisher","unstructured":"B. Schumacher and M. A. Nielsen, ``Quantum data processing and error correction,&apos;&apos; Phys. Rev. A 54, 2629\u20132635 (1996), quant-ph\/9604022.","DOI":"10.1103\/physreva.54.2629"},{"key":"32","doi-asserted-by":"crossref","unstructured":"A. Y. Kitaev, A. H. Shen, and M. N. Vyalyi, Classical and Quantum Computation (American Mathematical Society, 2002).","DOI":"10.1090\/gsm\/047"},{"key":"33","doi-asserted-by":"publisher","unstructured":"M. M\u00fcller-Lennert, F. Dupuis, O. Szehr, S. Fehr, and M. Tomamichel, ``On quantum R\u00e9nyi entropies: a new generalization and some properties,&apos;&apos; J. Math. Phys. 54, 122203 (2013), arXiv:1306.3142.","DOI":"10.1063\/1.4838856"},{"key":"34","doi-asserted-by":"publisher","unstructured":"S. Beigi, ``Sandwiched R\u00e9nyi divergence satisfies data processing inequality,&apos;&apos; J. Math. Phys. 54, 122202 (2013), arXiv:1306.5920.","DOI":"10.1063\/1.4838855"},{"key":"35","doi-asserted-by":"publisher","unstructured":"B. Yoshida and I. L. Chuang, ``Framework for classifying logical operators in stabilizer codes,&apos;&apos; Phys. Rev. A 81, 052302 (2010), arXiv:1002.0085.","DOI":"10.1103\/PhysRevA.81.052302"},{"key":"36","unstructured":"J. Preskill, ``Quantum error correction, Lecture notes for Physics 219, Caltech,&apos;&apos; (1999)."},{"key":"37","doi-asserted-by":"publisher","unstructured":"C. Vafa, ``Toward classification of conformal theories,&apos;&apos; Physics Letters B 206, 421\u2013426 (1988).","DOI":"10.1016\/0370-2693(88)91603-6"},{"key":"38","doi-asserted-by":"publisher","unstructured":"C. Chamon, ``Quantum glassiness,&apos;&apos; Phys. Rev. Lett. 94, 040402 (2005), cond-mat\/0404182.","DOI":"10.1103\/PhysRevLett.94.040402"},{"key":"39","doi-asserted-by":"publisher","unstructured":"S. Bravyi, B. Leemhuis, and B. M. Terhal, ``Topological order in an exactly solvable 3D spin model,&apos;&apos; Annals of Physics 326, 839\u2013866 (2011), arXiv:1006.4871.","DOI":"10.1016\/j.aop.2010.11.002"},{"key":"40","doi-asserted-by":"publisher","unstructured":"J. Haah, ``Local stabilizer codes in three dimensions without string logical operators,&apos;&apos; Phys. Rev. A 83, 042330 (2011), arXiv:1310.4507.","DOI":"10.1103\/PhysRevB.89.075119"},{"key":"41","doi-asserted-by":"publisher","unstructured":"S. Vijay, J. Haah, and L. Fu, ``A new kind of topological quantum order: A dimensional hierarchy of quasiparticles built from stationary excitations,&apos;&apos; Phys. Rev. B 92, 235136 (2015), 1505.02576.","DOI":"10.1103\/PhysRevB.92.235136"},{"key":"42","doi-asserted-by":"publisher","unstructured":"J. Haah, ``Commuting Pauli Hamiltonians as maps between free modules,&apos;&apos; Commun. Math. Phys. 324, 351\u2013399 (2013), arXiv:1204.1063.","DOI":"10.1007\/s00220-013-1810-2"},{"key":"43","doi-asserted-by":"publisher","unstructured":"M. B. Hastings, ``Lieb-Schultz-Mattis in higher dimensions,&apos;&apos; Physical Review B 69, 104431 (2004), cond-mat\/0305505.","DOI":"10.1103\/physrevb.69.104431"},{"key":"44","doi-asserted-by":"publisher","unstructured":"S. Bachmann, S. Michalakis, B. Nachtergaele, and R. Sims, ``Automorphic equivalence within gapped phases of quantum lattice systems,&apos;&apos; Communications in Mathematical Physics 309, 835\u2013871 (2012), arXiv:1102.0842.","DOI":"10.1007\/s00220-011-1380-0"},{"key":"45","doi-asserted-by":"publisher","unstructured":"B. Eastin and E. Knill, ``Restrictions on transversal encoded quantum gate sets,&apos;&apos; Physical Review Letters 102, 110502 (2009), arXiv:0811.4262.","DOI":"10.1103\/PhysRevLett.102.110502"},{"key":"46","doi-asserted-by":"publisher","unstructured":"S. Bravyi and R. K\u00f6nig, ``Classification of topologically protected gates for local stabilizer codes,&apos;&apos; Phys. Rev. Lett. 110, 170503 (2013), arXiv:1206.1609.","DOI":"10.1103\/PhysRevLett.110.170503"},{"key":"47","doi-asserted-by":"publisher","unstructured":"D. Poulin, ``Stabilizer formalism for operator quantum error correction,&apos;&apos; Phys. Rev. Lett. 95, 230504 (2005), quant-ph\/0508131.","DOI":"10.1103\/PhysRevLett.95.230504"},{"key":"48","doi-asserted-by":"publisher","unstructured":"C. B\u00e9ny, ``Conditions for the approximate correction of algebras,&apos;&apos; in Theory of Quantum Computation, Communication, and Cryptography (Springer, 2009) pp. 66\u201375, arXiv:0907.4207.","DOI":"10.1007\/978-3-642-10698-9_7"},{"key":"49","doi-asserted-by":"publisher","unstructured":"E. Dennis, A. Kitaev, A. Landahl, and J. Preskill, ``Topological quantum memory,&apos;&apos; Journal of Mathematical Physics 43, 4452\u20134505 (2002), quant-ph\/0110143.","DOI":"10.1063\/1.1499754"},{"key":"50","doi-asserted-by":"publisher","unstructured":"R. Alicki, M. Horodecki, P. Horodecki, and R. Horodecki, ``On thermal stability of topological qubit in kitaev&apos;s 4d model,&apos;&apos; Open Systems & Information Dynamics 17, 1\u201320 (2010), arXiv:0811.0033.","DOI":"10.1142\/S1230161210000023"},{"key":"51","doi-asserted-by":"publisher","unstructured":"B. J. Brown, D. Loss, J. K. Pachos, C. N. Self, and J. R. Wootton, ``Quantum memories at finite temperature,&apos;&apos; Rev. Mod. Phys. 88, 045005 (2016), arXiv:1411.6643.","DOI":"10.1103\/RevModPhys.88.045005"},{"key":"52","doi-asserted-by":"publisher","unstructured":"F. Pastawski, B. Yoshida, D. Harlow, and J. Preskill, ``Holographic quantum error-correcting codes: Toy models for the bulk\/boundary correspondence,&apos;&apos; Journal of High Energy Physics 2015, 149 (2015), arXiv:1503.06237.","DOI":"10.1007\/JHEP06(2015)149"},{"key":"53","doi-asserted-by":"publisher","unstructured":"D. Harlow, ``The Ryu-Takayanagi formula from quantum error correction,&apos;&apos; (2016), arXiv:1607.03901.","DOI":"10.1007\/s00220-017-2904-z"},{"key":"54","doi-asserted-by":"publisher","unstructured":"K. M. R. Audenaert, ``A sharp continuity estimate for the von Neumann entropy,&apos;&apos; Journal of Physics A: Mathematical and Theoretical 40, 8127\u20138136 (2007), quant-ph\/0610146.","DOI":"10.1088\/1751-8113\/40\/28\/s18"},{"key":"55","doi-asserted-by":"publisher","unstructured":"R. Alicki and M. Fannes, ``Continuity of quantum conditional information,&apos;&apos; J. Phys. A: Math. Gen. 37, L55\u2013L57 (2004), quant-ph\/0312081.","DOI":"10.1088\/0305-4470\/37\/5\/l01"}],"container-title":["Quantum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/quantum-journal.org\/papers\/q-2017-04-25-4\/pdf\/","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T13:13:17Z","timestamp":1644239597000},"score":1,"resource":{"primary":{"URL":"https:\/\/quantum-journal.org\/papers\/q-2017-04-25-4\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,25]]},"references-count":56,"URL":"https:\/\/doi.org\/10.22331\/q-2017-04-25-4","archive":["CLOCKSS"],"relation":{},"ISSN":["2521-327X"],"issn-type":[{"value":"2521-327X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,25]]},"article-number":"4"}}