1 Introduction

The entanglement-assisted (EA) stabilizer formalism was proposed by Brun et al. in [1], and it includes the standard stabilizer formalism [2, 3] as a special case. It was shown in [1] that classical quaternary (and binary) linear codes which are not self-orthogonal can be transformed into EAQECCs, if shared entanglement is available between the sender and receiver.

An \([[n,k,d;c]]\) EAQECC that encodes \(k\) information qubits into \(n\) channel qubits with the help of \(c\) pairs of maximally entangled Bell states (ebits) can correct up to \(\lfloor \frac{d-1}{2}\rfloor \) errors, where \(d\) is the minimum distance of the code. If there is no \([[n,k,d+1;c]]\) for given \(n,k\) and \(c\), then an \([[n,k,d;c]]\) EAQECC is optimal. In order to figure out the optimality of EAQECCs, some bounds on EAQECCs are invented, such as the EA-quantum Hamming bound for non-degenerate EAQECCs, the EA-quantum Singleton bound, the EA-quantum Plotkin bound and the EA-quantum linear programming bound [1, 47]. The EA-quantum Plotkin bound reads: If there exits an \([[n,k,d;c]]\), then

$$\begin{aligned} d \le \frac{3n\times 4^{k}}{4(4^{k}-1)}. \end{aligned}$$

Entanglement is a useful resource; it has been shown that entanglement can increase the rate and error-correcting ability of quantum codes [1, 7], and maximal entanglement EAQECCs can have more information qubits and higher minimum distance at the cost of more ebits [7]. Maximal entanglement EAQECCs exploit the maximum amount of entanglement possible, although that much ebits could be an expensive resource in practice. However, known results found in the literature [812] and recent research [1216] suggest that a higher rate and/or better noise suppression capabilities may be achieved by exploiting maximal entanglement. Refs. [811] have shown that maximal entanglement EAQECCs can achieve the EA-quantum capacity of a depolarizing channel, which establishes a limit on the performance of EAQECCs, and [12] has shown maximal entanglement EA turbo codes come close to the EA-hashing bound within a few decibels. Refs. [7, 13] have shown that some maximal entanglement codes \([[n,k,d;c]]\) are not equivalent to any standard quantum codes \([[n+c,k,d]]\) and have better performance than all \([[n+c,k,d]]\). Even if a maximal entanglement code \([[n,k,d;c]]\) is equivalent to an \([[n+c,k,d]]\) stabilizer code, it may still have better performance than \([[n+c,k,d]]\) stabilizer codes [13]. Refs. [1214, 16] indicate that ebits may be robust against noise when the ebits are not noiseless; in such case, maximal entanglement EAQECCs can also be used to correct errors efficiently on some channels. Thus, it is worthwhile to study maximal entanglement EAQECCs.

It has been shown that maximal entanglement EAQECCs can achieve the EA-hashing bound asymptotically [4, 5]. In [4, 5], Lai et al. proved that EA repetition codes with parameters \([[n,1,n;n-1]]\) are optimal for \(n\) odd, and EA repetition codes with parameters \([[n,1,n-1;n-1]]\) are optimal for \(n\) even. They also construct many good maximal entanglement EAQECCs with length \(n\le 15\) in [4, 5, 7] and establish a table of upper and lower bounds on the highest achievable minimum distance of any maximal entanglement EAQECCs for \(n\le 15\). In [17], some maximal entanglement EAQECCs of short length are constructed from caps in projective space and several of these codes improve parameters of the codes given in [4, 5].

In this paper, we study constructions of maximal entanglement EAQECCs from quaternary linear codes and manage to improve parameters of the codes in [4, 5, 7]. We give our discussion in two aspects. The first one is on the construction of quaternary zero radical codes of dimension \(k\le 4\) and related maximal entanglement EAQECCs, and the second one is on the construction of higher-dimensional quaternary zero radical codes of length \(n\le 20\) and related maximal entanglement EAQECCs.

This paper is organized as follows. In Sect. 2, basic concepts on linear codes over the quaternary field \(\mathbf {F}_{4}\) and EAQECCs are reviewed. In Sect. 3, constructions of quaternary zero radical codes of dimension \(k\le 3\) and related maximal entanglement EAQECCs are presented. Section 4 discuss construction of four-dimensional quaternary zero radical codes and EAQECCs. Explicit constructions of higher-dimensional quaternary codes of short lengths and maximal entanglement EAQECCs of distance \(d\ge 5\) are given in Sect. 5. Finally, in Sect. 6, optimality of the obtained EAQECCs is discussed and a table of upper and lower bounds on the minimum distance of any maximal entanglement EAQECCs for \(n\le 20\) is presented.

2 Preliminary

In this section, we recall some basic concepts on linear codes over the quaternary field \(\mathbf {F}_{4}\) and EAQECCs and make some preparation for later use.

Let \(\mathbf {F}_{4}=\{0,1,\omega ,\varpi \}\) be the Galois field with four elements such that \(\varpi =1+\omega =\omega ^{2},\omega ^{3}=1\), and the conjugation is defined by \(\bar{x}=x^{2}\). Let \(\mathbf {F}_{4}^{n}\) be the \(n\)-dimensional space over \(\mathbf {F}_{4}\), an \(m\)-dimensional subspace \(\mathcal {C}\) of \(\mathbf {F}_{4}^{n}\) is called an \(m\)-dimensional linear code of length \(n\), and is denoted as \(\mathcal {C} =[n,m]_{4}\). If the Hamming distance of \(\mathcal {C}\) is \(d\), then it is denoted as \(\mathcal {C} =[n,m,d]_{4}\).

The Hermitian inner product of \(\mathbf{u}, \mathbf{v}\in \mathbf {F}_{4}^{n}\) is defined to be

$$\begin{aligned} ({\mathbf {u,v}})={\mathbf {uv^{\dag }}}=u_{1}\bar{v_{1}}+u_{2}\bar{v_{2}}+\cdot \cdot \cdot +u_{n}\bar{v_{n}}. \end{aligned}$$

The Hermitian dual code of \(\mathcal {C} =[n,m]_{4}\) is \(\mathcal {C}^{\perp h} =\{x\mid (x,y)_{h}=0,\forall y\in \mathcal {C}\}\), and \(\mathcal {C}^{\perp h} =[n,n-m]_{4}\). A matrix \(G\) whose rows form a basis of \(\mathcal {C}\) is called a generator matrix of \(\mathcal {C}\), and a generator matrix \(H\) of \(\mathcal {C}^{\perp h}\) is called a parity check matrix of \(\mathcal {C}\).

It was shown that for a linear code \(\mathcal {C} =[n,m,d]_{4}\) with parity check matrix \(H\), then \(\mathcal {C}^{\perp h}\) EA stabilizes an \([[n,2m+c-n,d;c]]\) EAQECC, where \(c=\) rank(\(HH^{\dagger }\)) and \(H^{\dagger }\) is the conjugate transpose of \(H\), see [1, 18]. Let \(k=n-m\). If \(c=k\), then the EAQECC has parameters \([[n,n-k,d;k]]\) and it is a maximal entanglement EAQECC. Thus, we can deduce the following lemma from Corollary 2 of [18].

Lemma 2.1

If \(\mathcal {C} =[n,n-k,d]_{4}\) is a linear code with parity check matrix \(H=H_{k\times n}\), then \(\mathcal {C}^{\perp h}\) EA stabilizes an \([[n,n-k,d;k]]\) maximal entanglement EAQECC if and only if \(k=\) rank(\(HH^{\dagger })\).

According to [19], a linear code \(\mathcal {C} =[n,m,d]_{4}\) is a subspace of the unitary space \(\mathbf {F}_{4}^{n}\). Let \(G\) and \(H\) be generator and check matrices of \(\mathcal {C}\), respectively. From \(k=\) rank(\(HH^{\dagger }) =n-m\), one can deduce \(m=\) rank(\(GG^{\dagger }) =n-k\). In such case, \(\mathcal {C}\) and \(\mathcal {C}^{\perp h}\) are called totally non-isotropic subspaces of \(\mathbf {F}_{4}^{n}\) in finite geometry, the radical code \(R(\mathcal {C})\) of \(\mathcal {C}\) and \(\mathcal {C}^{\perp h}\) is \(R(\mathcal {C})= \mathcal {C} \cap \mathcal {C}^{\perp h} =\{0\}\); hence, \(\mathcal {C}\) (or \(\mathcal {C}^{\perp h}\)) is also called zero radical code. Thus, Lemma 2.1 can be restated as

Lemma 2.1’

If \(\mathcal {C} =[n,m=n-k,d]_{4}\) is a linear code with generator matrix \(G=G_{m\times n}\), then \(\mathcal {C}^{\perp h}\) EA stabilizes an \([[n,n-k,d;k]]\) maximal entanglement EAQECC if and only if \(\mathcal {C}\) is a zero radical code, i.e., rank(\(GG^{\dagger })=m\).

Remark 2.1

According to page 4022 of [4] (in the paragraph after Definition 1) or Theorem 2.3 of [6], a maximal entanglement EAQECC must be non-degenerate. If one gives the EA stabilizer group \(S\) of a maximal entanglement EAQECC, then \(S_{I}\) must be a trivial group. Hence, a maximal entanglement EAQECC derived from a zero radical quaternary code has the same minimum distance with the underlying classical code. However, a nonzero radical code usually gives an EAQECC with minimum distance different from that of the underlying classical code [6].

The EA-quantum Plotkin bound has the same form as the Plotkin bound for quaternary linear codes [20]; hence, from Lemma 2.1’, we have

Corollary 2.2

If \(\mathcal {C} =[n,m=n-k,d]_{4}\) is a zero radical code saturating the classical Plotkin bound for quaternary linear code, then \(\mathcal {C}^{\perp h}\) EA stabilizes an \([[n,m,d;k]]\) maximal entanglement EAQECC saturating the EA-quantum Plotkin bound.

In the following sections, we will manage to construct zero radical code \(\mathcal {C} =[n,m,d]_{4}\) with large \(d\). To do this, we make some notations for later use.

Let \({\mathbf {1_{n}}}=(1,1,\ldots ,1)_{1\times n}\) and \({\mathbf {0_{n}}}=(0,0,\ldots ,0)_{1\times n}\) to denote the all-one vector and the all-zero vector of length \(n\), respectively. Construct

$$\begin{aligned}&S_{2}=\left( \begin{array}{ccccc} 0 &{} 1 &{} 1 &{} 1 &{} 1\\ 1 &{} 0 &{} 1 &{} \omega &{} \varpi \\ \end{array} \right) =(\alpha _{1},\ldots ,\alpha _{5}),&\\&S_{3}= \left( \begin{array}{cccccc} S_{2} &{} \mathbf {0}_{2\times 1} &{} S_{2} &{} S_{2} &{} S_{2}\\ \mathbf {0}_{5} &{} 1 &{} \mathbf {1}_{5} &{} \omega \mathbf {1}_{5} &{} \varpi \mathbf {1}_{5}\\ \end{array} \right) =(\beta _{1},\beta _{2},\ldots ,\beta _{21}),&\\&S_{4}= \left( \begin{array}{cccccc} S_{3} &{} \mathbf {0}_{3\times 1} &{} S_{3} &{} S_{3} &{} S_{3}\\ \mathbf {0}_{21} &{} 1 &{} \mathbf {1}_{21} &{} \omega \mathbf {1}_{21} &{} \varpi \mathbf {1}_{21}\\ \end{array} \right) =(\gamma _{1},\gamma _{2},\ldots ,\gamma _{85}).&\end{aligned}$$

It is well known that the matrix \(S_{2}\) generates the \([5,2,4]_{4}\) Simplex code with weight polynomial \(1+15y^{4}, S_{3}\) generates the \([21,3,16]_{4}\) Simplex code with weight polynomial \(1+63y^{16}, S_{4}\) generates the \([85,4,64]_{4}\) Simplex code with weight polynomial \(1+255y^{16}\), and \(S_{k}S_{k}^{\dagger }=0\) for \(k=2,3,4\), see [20].

Notation 2.1

In the following sections, in each generator matrix of linear codes, we use 2 and 3 to represent \(\omega \) and \(\varpi \), respectively. For a matrix \(P\), the conjugate transpose of \(P\) is denoted as \(P^{\dagger }\), and the juxtaposition \((P, P,\ldots ,P)\) of \(s\)-copies of \(P\) is denoted as \(sP\). An \([n,m,d]_{4}\) code is denoted as \([n,m,d]\) for short, and the Hermitian dual code of a linear code is called dual code for short.

Remark 2.2

We use a computer to check the parameters of classical codes and the rank of \(GG^{\dagger }\) presented in Sects. 35. The zero radical codes presented in Sect. 3 have the largest possible minimum distance for given \(n\) and \(k\). However, while some zero radical codes given in Sects. 4 and 5 are also optimal, not all of them attain known upper bounds on the minimum distance of a linear code. Nonetheless, their minimum distances appear very good in general. These codes are the best possible among those obtainable by our approach.

3 Construction of \([[n,k,d;n-k]]\) EAQECCs for \(k\le 3\)

There are many works, which discuss the existence, construction and classification of quaternary linear codes, see [2025]. However, little attention was paid on \(R(\mathcal {C})= \mathcal {C} \cap \mathcal {C}^{\perp h}\) for a given optimal quaternary linear code \(\mathcal {C}\). From [22, 23], we can deduce many known optimal codes are not zero radical codes, such as Simplex codes and McDonald codes. Thus, to construct maximal entanglement EAQECCs from quaternary linear codes, one needs to construct zero radical codes with good parameters. We will discuss such a problem in the following sections. In this section, we focus on construction of \([[n,k,d;n-k]]\) EAQECCs for \(k\le 3\) from zero radical codes.

It is well known that \(G={\mathbf {1_{n}}}=(1,1,\ldots ,1)\) generates the \([n,1,n ]\) optimal code. If \(n\) is odd, then this \([n,1,n ]\) code is a zero radical code and it gives an \([[n,1,n;n-1]]\) maximal entanglement EAQECC. While \(n\) is even, then the \([n,1,n ]\) code is not a zero radical code and it cannot give an \([[n,1,n;n-1]]\) maximal entanglement EAQECC. When \(n\) is even, \(G'=(1,1,\ldots ,1,0)\) generates an \([n,1,n-1 ]\) near optimal code, which is a zero radical code. Using this \([n,1,n-1 ]\) near optimal linear code, one can deduce an \([[n,1,n-1;n-1]]\) maximal entanglement EAQECC. This EAQECC is also optimal, see [5].

In the following, we discuss the construction of maximal entanglement EAQECCs from two- and three-dimensional zero radical codes in two cases.

Case 1. Two-dimensional zero radical codes and EAQECCs

The parameters of optimal linear codes of dimension 2 are known [25]. Table 1 lists the optimal parameters.

Table 1 Parameters of optimal \([n,2]\) linear codes

The optimal \([5s,2,4s]\) and \([5s+4,2,4s+3]\) codes are not zero radical codes according to [25]. Let \(G=G_{2,n}\) be a generator matrix of an optimal \([n,2]\) code with \(n=5s\) or \(n=5s+4\), then rank(\(GG^{\dagger })\le 1\). Hence, the parameters of zero radical \([n,2]\) codes for \(n=5s\) and \(n=5s+4\) may be \([5s,2,4s-1]\) and \([5s+4,2,4s+2]\), respectively. Parameters of good zero radical \([n,2,d]\) codes are listed as following Table 2.

Table 2 Parameters of zero radical \([n,2]\) codes

Lemma 3.1

If \( n=5s+t\ge 2\), then there is an \([n,2, d]\) zero radical code with parameters as given in Table 2.

Proof

  1. (1)

    For \(n=5s, 5s+1\) and \(s\ge 1\), construct \(G_{2,5}=(\alpha _{1},\alpha _{2},\alpha _{3},2\alpha _{4}), G_{2,5s}=(G_{2,5}|(s-1)S_{2}), G_{2,5s+1}=(2\alpha _{1},2\alpha _{2},\alpha _{3},\alpha _{4}|(s-1)S_{2})\).

  2. (2)

    For \(n=5s+2, 5s+3, 5s+4\) and \(s\ge 0\), construct \(G_{2,5s+2}=(\alpha _{1},\alpha _{2}|sS_{2}), G_{2,5s+3}=(\alpha _{1},\alpha _{2},\alpha _{3}|sS_{2}), G_{2,5s+4}=(2\alpha _{1},\alpha _{2},\alpha _{3}|sS_{2})\).

\(\square \)

It is easy to check that the codes with generator matrices \(G_{2,2}=(\alpha _{1},\alpha _{2}), G_{2,3}=(\alpha _{1},\alpha _{2},\alpha _{3}), G_{2,4}=(2\alpha _{1},\alpha _{2},\alpha _{3}), G_{2,5}=(\alpha _{1},\alpha _{2},\alpha _{3},2\alpha _{4}), G_{2,6}=(2\alpha _{1},2\alpha _{2},\alpha _{3},\alpha _{4}\) have parameters \([2,2,1], [3,2,2], [4,2,2], [5,2,3]\) and \([6,2,4]\), respectively, and they are all zero radical codes. From \(S_{2}\) generates the \([5,2,4]\) Simplex code and \(S_{2}S^{\dagger }_{2}=0\), one can derive: In the above two cases (1) and (2), the codes with generator matrices \(G_{2,n}\) have the desired parameters as Table 2, and rank(\(G_{2,n}G_{2,n}^{\dagger })=2\). Hence, the lemma follows.

Using these zero radical \([n,2]\) codes given in Lemma 3.1, one can deduce

Corollary 3.2

There are maximal entanglement EAQECCs with the following parameters: \([[3,2,2;1]], [[4,2,2;2]], [[5s,2,4s-1;5s-2]], [[5s+1,2,4s;5s-1]], [[5s+2,2,4s+1;5s]], [[5s+3,2,4s+2;5s+1]]\) and \([[5s+4,2,4s+2;5s+2]]\) for \(s\ge 1\). The \([[3,2,2;1]], [[5s+1,2,4s;5s-1]], [[5s+2,2,4s+1;5s]]\) and \([[5s+3,2,4s+2;5s+1]]\) codes saturate the EA Plotkin bound, \([[4,2,2;2]], [[5s,2,4s-1;5s-2]]\) and \([[5s+4,2,4s+2;5s+2]]\) codes have distance one less than the EA Plotkin bound.

Case 2. Three-dimensional zero radical codes and EAQECCs

In this case, we only discuss construction of three-dimensional zero radical codes and EAQECCs. We use Table 3 and Table 4 to give zero radical \([n,3]\) codes with good parameters. For \(n=21s\) and \(s\ge 1\), there is a zero radical \([n,3]\) code with parameters \([21s,3, 16s-1]\).

Table 3 Parameters of zero radical \([n,3]\) codes for length \(3\le n\le 21\)
Table 4 Parameters of zero radical \([n,3]\) codes for length \(n\ge 22\)

Lemma 3.3

  1. (1)

    If \(3\le n\le 21\), then there is a zero radical \([n,3,d]\) code as Table 3.

  2. (2)

    If \( n=21s+t\ge 22\), then there is an \([n,3, d]\) zero radical code with parameters as given in Table 4.

Proof

(1) If \(A\) is a sub-matrix of \(B\), which is formed by columns of \(B\), delete the columns of \(A\) from \(B\), the resulting matrix is denoted as \(B\setminus A\). Let

$$\begin{aligned}&G_{3,3}=\left( \begin{array}{ccccccc} 100\\ 010\\ 001\\ \end{array} \right) \!, G_{3,4}=\left( \begin{array}{ccccccc} 1100\\ 0110\\ 0001\\ \end{array} \right) \!, G_{3,5}=\left( \begin{array}{ccccccc} 01101\\ 10012\\ 00011\\ \end{array} \right) \!, G_{3,6}=\left( \begin{array}{ccccccc} 111110\\ 013231\\ 000113\\ \end{array} \right) \!,\\&B_{3,6}=\left( \begin{array}{cccccccc} 1 1 1 1 1 0\\ 0 0 1 2 1 1\\ 0 0 0 0 0 0\\ \end{array}\right) \!, G_{3,7}=\left( \begin{array}{cccccc} 1 1 1 0 1 1 1\\ 1 2 3 1 1 2 3\\ 2 2 2 3 3 3 3\\ \end{array}\right) \!, G_{3,8}=\left( \begin{array}{cccccc} 0 1 1 1 0 1 1 1\\ 1 1 2 3 1 0 1 3\\ 2 2 2 2 3 3 3 3\\ \end{array}\right) ,\\&G_{3,9}=\left( \begin{array}{cccccc} 1 1 0 1 1 0 1 1 1\\ 1 3 1 2 3 1 1 2 3\\ 1 1 2 2 2 3 3 3 3\\ \end{array}\right) \!, G_{3,10}=\left( \begin{array}{cccccc} 1 1 0 1 1 1 0 1 1 1\\ 1 3 1 1 2 3 1 1 2 3\\ 1 1 2 2 2 2 3 3 3 3\\ \end{array}\right) \!, G_{3,11}=\left( \begin{array}{cccccc} 1 1 1 1 1 1 0 1 1 1 1\\ 3 3 0 1 2 3 1 0 1 2 3\\ 0 1 2 2 2 2 3 3 3 3 3\\ \end{array}\right) \!,\\&G_{3,12}=\left( \begin{array}{cccccc} 1 1 1 1 1 1 1 0 1 1 1 1\\ 1 2 3 0 1 2 3 1 0 1 2 3\\ 1 1 1 2 2 2 2 3 3 3 3 3\\ \end{array} \right) \!, A_{3,15}\!=\!(\beta _{7}, \beta _{8}, \ldots , \beta _{21}), A_{3,16}\!=\!(\beta _{6},\beta _{7}, \ldots , \beta _{21}). \end{aligned}$$

Construct

$$\begin{aligned}&G_{3,13}=(S_{3}\setminus (\beta _{1},\ldots ,\beta _{7},\beta _{8})), G_{3,14}=(S_{3}\setminus G_{3,7}), G_{3,15}=(S_{3}\setminus G_{3,6}),\\&G_{3,16}=(S_{3}\setminus (\beta _{1},\beta _{2},\beta _{3},\beta _{6},\beta _{10}), G_{3,17}=(S_{3}\setminus G_{3,4}), G_{3,18}=(S_{3}\setminus G_{3,3}),\\&G_{3,19}=(G_{3,3}\mid A_{3,16}), G_{3,20}{=}(\beta _{3},\ldots ,\beta _{6}\mid \beta _{6}, \ldots , \beta _{21}), G_{3,21}{=}(A_{3,15}\mid B_{3,6}).\\ \end{aligned}$$

Using a computer, it is not difficult to check that rank(\(G_{3,n}G_{3,n}^{\dagger })=3\) for \(3\le n\le 21\), and the codes \(\mathcal {C}_{n}\) with generator matrices \(G_{3,n}\) have weight polynomials \(W_{n}(z)\) as follows:

$$\begin{aligned}&W_{3}(z)=1+9z+27z^{2}+27z^{3},\\&W_{4}(z)=1+3z+9z^{2}+33z^{3}+18z^{4},\\&W_{5}(z)=1+9z^{2}+15z^{3}+18z^{4}+21z^{5}, \\&W_{6}(z)=1+9z^{3}+18z^{4}+27z^{5}+9z^{6},\\&W_{7}(z)=1+12z^{4}+27z^{5}+15z^{6}+9z^{7},\\&W_{8}(z)=1+21z^{5}+21z^{6}+15z^{7}+6z^{8},\\&W_{9}(z)=1+27z^{6}+27z^{7}+9z^{9},\\&W_{10}(z)=1+3z^{6}+33z^{7}+18z^{8}+3z^{9}+6z^{10},\\&W_{11}(z)=1+15z^{7}+18z^{8}+21z^{9}+9z^{10},\\&W_{12}(z)=1+15z^{8}+33z^{9}+9z^{10}+3z^{11}+3z^{12},\\&W_{13}(z)=1+24z^{9}+27z^{10}+9z^{11}+3z^{13},\\&W_{14}(z)=1+9z^{9}+15z^{10}+27z^{11}+12z^{12},\\&W_{15}(z)=1+9z^{10}+27z^{11}+18z^{12}+9z^{13},\\&W_{16}(z)=1+15z^{11}+24z^{12}+21z^{13}+3z^{14},\\&W_{17}(z)=1+18z^{12}+33z^{13}+9z^{14}+3z^{15},\\&W_{18}(z)=1+27z^{13}+27z^{14}+9z^{15},\\&W_{19}(z)=1+6z^{13}+27z^{14}+27z^{15}+3z^{17},\\&W_{20}(z)=1+9z^{14}+33z^{15}+18z^{16}+3z^{17},\\&W_{21}(z)=1+21z^{15}+24z^{16}+15z^{17}+3z^{18}.\\ \end{aligned}$$

Summarizing the previous discussion, hence (1) holds.

(2) For \( n=21s+t\ge 22\). Construct \(G_{3,21s}=(G_{3,21}\mid (s-1) S_{3}), G_{3,21s+1}=(G_{3,6}\mid A_{3,16}\mid (s-1) S_{3}), G_{3,21s+2}=(G_{3,7}\mid A_{3,16}\mid (s-1) S_{3}), G_{3,21s+3}=(G_{3,3}\mid s S_{3}), G_{3,21s+4}=(G_{3,9}\mid A_{3,16}\mid (s-1) S_{3})\) and \(G_{3,21s+t}=(G_{3,t}\mid s S_{3})\) for \(5\le t\le 20\).

From \( A_{3,16} A^{\dagger }_{3,16}=0, S_{3}S^{\dagger }_{3}=0\) and the discussion of (1), one can deduce (2) holds. \(\square \)

Using the zero radical codes given in Lemma 3.3, one can derive

Corollary 3.4

  1. (1)

    If \(s\ge 0, n=21s+t\ge 5\), then they are the following maximal entanglement EAQECCs:

    $$\begin{aligned}&{[[21s+5,3,16s+2;21s+2]]}, [[21s+6,3,16s+3;21s+3]],\\&{[[21s+7,3,16s+4;21s+4]]}, [[21s+8,3,16s+5;21s+5]],\\&{[[21s+9,3,16s+6;21s+6]]}, [[21s+10,3,16s+6;21s+7]],\\&{[[21s+11,3,16s+7;21s+8]]}, [[21s+12,3,16s+8;21s+9]],\\&{[[21s+13,3,16s+9;21s+10]]}, [[21s+14,3,16s+9;21s+11]],\\&{[[21s+15,3,16s+10;21s+12]]}, [[21s+16,3,16s+11;21s+13]],\\&{[[21s+17,3,16s+12;21s+14]]}, [[21s+18,3,16s+13;21s+15]],\\&{[[21s+19,3,16s+13;21s+16]]}, [[21s+20,3,16s+14;21s+17]]. \end{aligned}$$
  2. (2)

    If \(s\ge 1\), then they are the following maximal entanglement EAQECCs:

    $$\begin{aligned}&{[[21s,3,16s-1;21s-3]]}, [[21s+1,3,16s-1;21s-2]],\\&[[21s+2,3,16s;21s-1]], {[[21s+3,3,16s+1;21s]]},\\&[[21s+4,3,16s+2;21s+1]].\\ \end{aligned}$$

    The \([[21s+9,3,16s+6;21s+6]], [[21s+13,3,16s+9;21s+10]], [[21s+17,3,16s+12;21s+14]]\) and \([[21s+18,3,16s+13;21s+15]]\) codes saturate the EA Plotkin bound, the other EAQECCs have distances one less than the EA Plotkin bound.

4 Construction of \([[n,4,d;n-4]]\) EAQECC

In this section, we discuss construction of \([[n,4,d;n-4]]\) EAQECC from four-dimensional zero radical codes. Parameters of zero radical \([n,4, d]\) codes for \(4\le n\le 88\) are given in the following following Table 5.

Table 5 Parameters of zero radical \([n,4, d]\) codes for length \(4\le n\le 88\)

Lemma 4.1

If \(4\le n\le 88\), then there is an \([n,4,d]\) zero radical code as in Table 5.

Proof

Ref. [17] proved the lemma holds for \(4\le n\le 13\). Now we prove it also holds for \(14\le n\le 88\). We will prove the lemma holds in two cases.

Case 1. Construction of zero radical \([n,4,d]\) code with \(14\le n \le 81\) and \(n\ne 46,48,63,73\).

In this case, we give 11 special zero radical codes at first, then puncture these codes and give 53 new zero radical codes. We construct 11 matrices at first. Let

$$\begin{aligned}&G_{4,17}=\left( \begin{array}{cccccc} 0 0 1 1 1 0 1 1 1 1 0 1 1 0 1 0 1 \\ 1 1 0 2 0 1 2 2 2 0 1 1 3 0 3 1 1 \\ 3 0 1 1 2 2 2 1 2 0 0 0 0 1 1 2 2 \\ 0 1 1 1 1 1 1 2 2 3 3 3 3 3 3 3 3 \\ \end{array}\right) \!, G_{4,26}=\left( \begin{array}{cccccc} 1 1 1 1 1 0 1 1 0 1 1 1 1 1 0 0 0 0 1 1 0 1 1 0 1 1\\ 0 2 1 2 2 1 0 1 1 0 3 3 1 3 1 0 0 1 0 1 1 2 1 0 0 3\\ 0 0 2 2 3 2 2 0 1 3 0 2 3 3 3 1 0 0 3 1 0 1 1 1 0 1\\ 0 0 0 3 3 3 3 2 0 3 2 0 2 2 3 3 1 0 1 1 2 2 3 0 1 1\\ \end{array}\right) \!,\\&G_{4,33}=\left( \begin{array}{cccccc} 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 \\ 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 2 2 2 2 2 2 2 3 3 3 3 3 3 3 0 2 0 3 \\ 1 0 0 1 2 2 3 3 1 0 0 3 3 2 2 3 2 2 1 1 0 0 2 3 3 0 0 1 1 0 3 2 0 \\ 0 1 0 1 2 3 1 2 3 0 2 0 1 1 3 2 0 1 2 3 1 3 0 0 3 2 3 1 2 3 1 0 0\\ \end{array}\right) \!,\\&G_{4,37}=\left( \begin{array}{cccccc} 1 0 1 1 1 1 0 1 1 1 0 1 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 1 1 1 1 0 1 1 1 \\ 0 0 0 2 3 0 1 1 2 3 0 2 3 1 3 0 1 0 2 1 2 2 0 2 0 3 0 1 1 1 3 1 2 1 2 3 0 \\ 0 1 1 1 1 2 3 3 3 3 0 0 0 1 1 2 2 3 3 0 0 0 1 1 2 2 3 3 0 0 0 1 1 2 2 2 3 \\ 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 \\ \end{array}\right) \!,\\&G_{4,45}=\left( \begin{array}{cccccc} 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 \\ 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3 3 0 0 0 0 0 0 0 0 0 1 \\ 1 2 2 3 3 3 0 0 0 0 1 1 2 2 2 3 3 3 0 0 0 0 1 1 1 2 2 2 3 3 3 0 0 0 0 1 1 1 2 2 2 3 3 3 0 \\ 3 2 3 0 1 2 0 1 2 3 1 2 0 1 3 0 3 2 0 1 2 3 0 2 3 0 2 1 0 3 1 0 1 2 3 1 2 3 1 2 3 1 2 3 0 \\ \end{array}\right) \!,\\&G_{4,54}=\left( \begin{array}{cccccc} 0 1 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0 1 1 0 1 0 1 1 1 1 0 1 1 1 1 1 1 1 0 1 1 1 0 1 0 1 1 1 1 1 1 1 1 0 1 1 1 \\ 0 0 1 1 2 3 0 1 1 2 3 0 1 1 2 3 0 1 2 3 0 0 1 1 2 3 0 1 1 2 3 0 1 2 3 1 1 2 3 0 0 1 1 2 3 0 1 2 3 0 1 1 2 3 \\ 0 1 1 1 1 1 2 2 2 2 2 3 3 3 3 3 0 0 0 0 1 1 1 1 1 1 2 2 2 2 2 3 3 3 3 0 0 0 0 1 1 1 1 1 1 2 2 2 2 3 3 3 3 3 \\ 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 \\ \end{array}\right) \!. \end{aligned}$$

Delete the columns with index set \(\{1,2, \ldots , 23,24,28\}\) from \(S_{4}\) and denote the resulting matrix as \(G_{4,60}\). Delete the columns with index set \(\{1,2, \ldots ,8,9,13,22,23,\) \(31,38,44,53,57,75,79\}\) from \(S_{4}\) and denote the resulting matrix as \(G_{4,66}\). Delete the columns with index set \(\{1,2, \ldots ,9, 22,23, 28,49,70\}\) from \(S_{4}\) and denote the resulting matrix as \(G_{4,71}\). Delete the columns with index set \(\{1,2, \ldots ,7, 22,30\}\) from \(S_{4}\) and denote the resulting matrix as \(G_{4,76}\). Delete the columns with index set \(\{1,2,6,22\}\) from \(S_{4}\) and denote the resulting matrix as \(G_{4,81}\).

It is not difficult to check that the above 11 matrices generate zero radical codes by a computer, and these 11 codes have parameters as following: \(\mathcal {C}_{17} =[17,4,11], \mathcal {C}_{26} =[26,4,18], \mathcal {C}_{33} =[33,4,23], \mathcal {C}_{37} =[37,4,26], \mathcal {C}_{45} =[45,4,32], \mathcal {C}_{54} =[54,4,39], \mathcal {C}_{60} =[60,4,44], \mathcal {C}_{66} =[66,4,48], \mathcal {C}_{71} =[71,4,52], \mathcal {C}_{76} =[76,4,56], \mathcal {C}_{81} =[81,4,60]\). Puncturing on these 11 codes, we can construct 53 new zero radical codes with parameters as in Table 5. We just give the results of puncturing, for details of the puncturing process please see the “Appendix”.

Puncturing \(\mathcal {C}_{17}\) on suitable coordinates, one can obtain desired zero radical codes with length \(14\le n\le 16\). Puncturing \(\mathcal {C}_{26}\) on suitable coordinates, one can obtain desired zero radical codes with length \(18\le n\le 25\). Puncturing \(\mathcal {C}_{33}\) on suitable coordinates, one can obtain desired zero radical codes with length \(27\le n\le 32\). Puncturing \(\mathcal {C}_{37}\) on suitable coordinates, one can obtain desired zero radical codes with length \(34\le n\le 36\). Puncturing \(\mathcal {C}_{45}\) on suitable coordinates, one can obtain desired zero radical codes with length \(38\le n\le 44\). Puncturing \(\mathcal {C}_{54}\) on suitable coordinates, one can obtain desired zero radical codes with length \(47\le n\le 53\) and \(n\ne 48\). Puncturing \(\mathcal {C}_{60}\) on suitable coordinates, one can obtain desired zero radical codes with length \(55\le n\le 59\). Puncturing \(\mathcal {C}_{66}\) on suitable coordinates, one can obtain desired zero radical codes with length \(61\le n\le 65\) and \(n\ne 63\). Puncturing \(\mathcal {C}_{71}\) on suitable coordinates, one can obtain desired zero radical codes with length \(67\le n\le 70\). Puncturing \(\mathcal {C}_{76}\) on suitable coordinates, one can obtain desired zero radical codes with length \(73\le n\le 75\). Puncturing \(\mathcal {C}_{81}\) on suitable coordinates, one can obtain desired zero radical codes with length \(77\le n\le 80\).

Through the above process, we have constructed 64 zero radical codes, leave 11 zero radical codes undetermined.

Case 2. On 11 zero radical codes with lengths \(n\in \{46,48,63,72,82,\ldots ,88\}\).

In this case, we give 11 zero radical codes that are not covered in Case 1. Let

$$\begin{aligned}&G_{4,46}=\left( \begin{array}{cccccc} 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 1 0 1 1 0 1 1 0 1 1 0 1 1 0 1 1 0 1 1 1 1 1 0 1 0 1 1 0 1 1 \\ 0 1 2 3 2 3 1 2 3 1 2 3 1 2 3 1 2 1 2 3 1 1 3 1 2 3 1 2 3 1 1 3 1 1 2 1 2 3 1 3 1 1 2 1 2 3 \\ 0 0 0 0 1 1 2 2 2 3 3 3 0 0 0 1 1 2 2 2 3 3 3 0 0 0 1 1 1 2 2 2 3 3 3 0 0 0 1 1 2 2 2 3 3 3 \\ 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 \\ \end{array}\right) \!,\\&G_{4,48}=\left( \begin{array}{cccccc} 1 1 1 0 1 0 1 1 1 0 1 0 1 1 1 0 1 1 1 1 1 1 1 0 1 0 1 1 0 1 1 1 1 1 1 1 0 1 1 0 1 0 1 1 1 1 1 1 \\ 0 2 3 0 1 1 1 2 0 1 1 0 1 3 0 1 2 3 0 3 0 1 2 1 2 0 3 0 1 2 3 0 1 2 3 0 1 1 3 0 0 1 1 2 1 2 3 2 \\ 0 0 0 1 1 2 2 2 3 3 3 0 0 0 1 1 1 1 2 2 3 3 3 0 0 1 1 2 2 2 2 3 3 3 3 0 0 0 0 1 1 1 1 1 2 2 2 3 \\ 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 3 3 3 \\ \end{array}\right) \!. \end{aligned}$$

Delete the columns with index set \(\{1,3, \ldots , 23,28\}\) from \(S_{4}\) and add the \(24th\) column of \(S_{4}\), denote the resulting matrix as \(G_{4,63}\). Delete the columns with index set \(\{1,2, \ldots ,8, 10,13,14,18,22\}\) from \(S_{4}\) and denote the resulting matrix as \(G_{4,72}\). Delete the columns with index set \(\{1,2,3,6\}\) from \(S_{4}\) and add the \(22th\) column of \(S_{4}\), denote the resulting matrix as \(G_{4,82}\). Delete the columns with index set \(\{1,2,6\}\) from \(S_{4}\) and add the \(22th\) column of \(S_{4}\), denote the resulting matrix as \(G_{4,83}\). Delete the columns with index set \(\{3,4,8,22\}\) from \(S_{4}\) and add the columns of \(S_{4}\) with index set \(\{6,9,10\}\), denote the resulting matrix as \(G_{4,84}\).

Let \(A_{4,3}=(\gamma _{6},\gamma _{13},\gamma _{35}), A_{4,4}=(\gamma _{1},\gamma _{6},\gamma _{13},\gamma _{35}), B_{4,20}=(\gamma _{2},\ldots ,\gamma _{21}), B_{4,21}=(\gamma _{1},\gamma _{2},\ldots ,\gamma _{21}), C_{4,19}=(\gamma _{2},\gamma _{4},\ldots ,\gamma _{21},), C_{4,20}=(\gamma _{1},\ldots ,\gamma _{6}, \gamma _{8},\ldots , \gamma _{21})\) and \(D_{4,63}=(\gamma _{23},\gamma _{24},\ldots ,\gamma _{85})\). Construct \(G_{4,85}=(A_{4,3}\mid C_{4,19}\mid D_{4,63}), G_{4,86}=(A_{4,3}\mid B_{4,20}\mid D_{4,63}), G_{4,87}=(A_{4,4}\mid C_{4,20}\mid D_{4,63})\) and \(G_{4,88}=(A_{4,4}\mid B_{4,21}\mid D_{4,63})\).

It is not difficult to check that the above 11 matrices \(G_{4,n}\) generate zero radical codes and these 11 codes have parameters as following: \(\mathcal {C}_{46} =[46,4,33], \mathcal {C}_{48} =[48,4,34], \mathcal {C}_{63} =[63,4,46], \mathcal {C}_{72} =[72,4,53], \mathcal {C}_{82} =[82,4,60], \mathcal {C}_{83} =[83,4,61], \mathcal {C}_{84} =[84,4,62], \mathcal {C}_{85} =[85,4,62], \mathcal {C}_{86} =[86,4,63], \mathcal {C}_{87} =[87,4,64]\) and \(\mathcal {C}_{88} =[88,4,64]\). \(\square \)

Summarizing the above discussion, the lemma follows.

Using the zero radical codes given in Lemma 4.1 and the \([85,4,64]\) Simplex code, one can deduce

Corollary 4.2

  1. (1)

    If \(s\ge 0, n_{1}=85s+n\ge 4\) and \(n\le 84\), then there is an \([[n_{1},4,64s+d;n_{1}-4]]\) maximal entanglement EAQECC, where \(n,d\) are given in Table 5

  2. (2)

    If \(s\ge 1, n=85s+t\) and \(t\le 3\), then they are the following maximal entanglement EAQECCs: \([[85s,4,64-2;85s-4]], [[85s+1,4,64s-1;85s-3]], [[85s+2,4,64s;85s-2]], [[85s+3,4,64s;85s-1]]\).

Remark 4.1

According to [24], for \(n=6, \ldots , 13,\) 19, 20, 21, 24, 25, 26, 32, 33, 35, 36, 40, 41, 45, 46, \(50, 51, \ldots , 54, 56, \ldots , 60, 66, 71, 72, 76, 81\), the \([n,4,d]\) zero radical codes given in Lemma 4.1 are also optimal linear codes. Except these mentioned above codes, the zero radical codes given in this section do not attain known upper bounds on the minimum distance of a linear code. Nonetheless, their minimum distances appear very good in general. These codes are the best possible among those obtainable by our approach. Furthermore, it is an interesting question that whether zero radical codes which do not attain known upper bounds on the minimum distance of a linear code have better parameters than these ones given in this section.

5 Construction of short length \([[n,k,d;n-k]]\) EAQECC with \(k\ge 5\)

In this section, we discuss construction of \([n,k]\) zero radical codes for \(k\ge 5\) and \(n\ge 11\) from known codes in [21, 23, 26] and construct \([[n,k,d;n-k]]\) EAQECCs for \(n\le 20\). The discussion is presented in four cases.

Case 1. Construction of \([n,5]\) zero radical codes

Let

$$\begin{aligned} G_{5,11}=\left( \begin{array}{ccccc} 1 3 3 0 2 2 1 0 0 0 0\\ 0 1 3 3 0 2 2 1 0 0 0\\ 0 0 1 3 3 0 2 2 1 0 0\\ 0 0 0 1 3 3 0 2 2 1 0\\ 0 0 0 0 1 3 3 0 2 2 1 \\ \end{array} \right) \!. \end{aligned}$$

According to [21], \(G_{5,11}\) generates a \([11,5,6]\) cyclic zero radical code and its dual is a \([11,6,5]\) cyclic zero radical code. Extending this \([11,5,6]\) code by \(a=(1,2,1,0,0)^{T}\), one obtain a \([12,5,6]\) zero radical code. Extending this \([12,5,6]\) code by \(b=(1,1,1,2,1)^{T}\), one obtain a \([13,5,7]\) zero radical code.

In [23], an optimal \(\mathcal {C} =[24,5,16]\) with generator matrix \(G_{5,24}\) is given and this code is not zero radical code, where

$$\begin{aligned} G_{5,24}=\left( \begin{array}{cccccc} 0 0 1 1 1 1 1 0 0 0 1 1 1 1 0 0 1 1 1 1 1 0 1 1 \\ 0 1 0 0 0 1 2 1 1 1 0 0 2 2 1 1 0 1 1 3 3 1 0 3 \\ 1 2 0 0 2 3 3 0 2 3 2 3 0 1 1 2 1 3 3 1 3 2 3 2 \\ 2 3 0 3 2 2 0 1 1 1 1 1 3 3 3 2 2 1 2 1 0 1 0 3 \\ 3 3 0 2 2 2 2 0 1 3 3 1 2 0 3 2 1 3 3 2 1 3 2 0\\ \end{array}\right) \!. \end{aligned}$$

Puncturing \(\mathcal {C}\) on coordinate sets \(\{1,2,3,4,8\}, \{1,2,3,4,8,10\}, \{1,2,3,4,5,8,9\},\) \(\{1,2,3,4,5,8,16,22\}, \{1,2,3,4,5,6,8,9,19\}\) and \(\{1,2,3,4,5,6,8,9,10,16\}\), one can obtain \([19,5,11], [18,5,10], [17,5,9],\) \([16,5,9], [15,5,8]\) and \([14,5,7]\) zero radical codes, respectively. In [17], a \([20,5,12]\) zero radical code is constructed from projective cap. Thus, for each \(n\) with \(11\le n\le 20\), we have constructed an \([n,5]\) zero radical code.

Case 2. Construction of \([n,6]\) zero radical codes and their dual codes

A constacyclic code \(\mathcal {C} =[21,15,5]\) with generator polynomial \(x^{6}+\overline{\omega }x^{5}+x^{4}+\overline{\omega }x^{2}+x+\overline{\omega }\) is given in [21]. The dual code of \(\mathcal {C}\) is a code \(\mathcal {D} =[21, 6, 12]\), and both of \(\mathcal {C}\) and \(\mathcal {D}\) are zero radical codes. This zero radical code \(\mathcal {D}\) has a generator matrix \(G_{6,21}\), where

$$\begin{aligned} G_{6,21}=\left( \begin{array}{ccccc} 2 1 1 2 1 0 2 2 1 1 0 2 1 2 2 1 0 0 0 0 0 \\ 3 0 3 2 0 1 3 1 0 3 1 3 0 2 1 0 1 0 0 0 0 \\ 2 2 1 1 3 0 3 1 0 1 3 3 2 2 0 0 0 1 0 0 0 \\ 0 2 2 1 1 3 0 3 1 0 1 3 3 2 2 0 0 0 1 0 0 \\ 3 2 0 1 3 1 0 3 1 3 0 2 1 0 1 0 0 0 0 1 0 \\ 2 2 3 2 0 3 3 2 2 0 3 2 3 3 2 0 0 0 0 0 1 \\ \end{array}\right) \!. \end{aligned}$$

Puncturing \(\mathcal {D}\) on coordinate sets {1}, {1,8}, {1,2,4}, {1,2,4,5}, {1,2,3,11,14}, {1,2,3,4,6,7}, {1,2,3,4,5,6,7}, {1,2,3,4,5,6,7,11} and {1,2,3,4,5,6,7,8,11}, one can obtain [20, 6, 11], [19,6,10], [18,6,9], [17,6,8], [16,6,8], [15,6,7], [14,6,6], [13,6,5] and [12,6,5] zero radical codes, respectively. The dual codes of these codes have parameters \([n,n-6,5]\). Thus, for \(11\le n\le 20\), we have shown that there are an \([n,6]\) zero radical code and an \([n,n-6,5]\) zero radical code.

Case 3. Construction of some zero radical codes with distance six.

In [26], a parity check matrix of a \([36, 27, 6]\) code is given; from this parity check matrix, we can deduce two submatrices \(G_{7,20}\) and \(G_{8,27}\) as follows:

$$\begin{aligned} G_{7,20}\!=\!\!\!\left( \begin{array}{cccccc}\!\! 1 0 0 0 0 0 1 2 2 0 1 3 0 3 3 0 1 2 3 1 \\ 0 1 0 0 0 0 1 2 1 2 3 0 0 3 1 3 2 0 2 1 \\ 0 0 1 0 0 0 1 1 2 3 3 1 0 1 3 2 2 1 2 1 \\ 0 0 0 1 0 0 1 1 0 2 1 2 0 1 0 3 1 3 0 2 \\ 0 0 0 0 1 0 1 0 1 1 2 2 0 0 1 1 3 3 0 2 \\ 0 0 0 0 0 1 0 1 1 1 1 1 0 0 0 0 0 0 1 3 \\ 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 \\ \end{array}\right) \!,G_{8,27}\!{=}\!\left( \begin{array}{cccccc} 1 0 0 0 0 0 1 2 2 0 1 3 0 3 3 0 1 2 3 1 0 3 3 1 2 0 2 \\ 0 1 0 0 0 0 1 2 1 2 3 0 0 3 1 3 2 0 2 1 0 2 1 3 1 1 0 \\ 0 0 1 0 0 0 1 1 2 3 3 1 0 1 3 2 2 1 2 1 0 2 1 1 2 0 2 \\ 0 0 0 1 0 0 1 1 0 2 1 2 0 1 0 3 1 3 0 2 0 1 0 2 1 1 2 \\ 0 0 0 0 1 0 1 0 1 1 2 2 0 0 1 1 3 3 0 2 0 0 0 0 2 0 1 \\ 0 0 0 0 0 1 0 1 1 1 1 1 0 0 0 0 0 0 1 3 0 0 2 2 1 3 1 \\ 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 0 0 0 1 2 2 3 \\ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1\\ \end{array}\right) \!. \end{aligned}$$

Let the codes \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\) be generated by \(G_{7,20}\) and \(G_{8,27}\), respectively. These two codes are not zero radical codes; the dual codes of \(\mathcal {C}_{1}\) and \(\mathcal {C}_{2}\) have parameters \([20, 13, 6]\) and \([27, 19, 6]\), respectively.

Puncturing \(\mathcal {C}_{1}\) on coordinate sets {1,2,3}, {1,2,3,6}, {1,2,3,4,6}, {1,2,3,4,5,6}, {1,2,3,4,5,6,7}, we can obtain \([n,7]\) zero radical codes for \(13\le n\le 17\). From these \([n,7]\) zero radical codes, one can obtain \([n,n-7, 6]\) zero radical codes for \(13\le n\le 17\). Puncturing \(\mathcal {C}_{2}\) on coordinate sets {1,2,3,4,5,6,7}, {1,2,3,4,5,6,7,8}, {1,2,3,4,5,6,7, 8,10}, result in \([n,8]\) zero radical codes for \(18\le n\le 20\). From these \([n,8]\) zero radical codes, one can obtain \([n,n-8, 6]\) zero radical codes for \(18\le n\le 20\). Hence, for each \(n\) with \(13\le n\le 20\), we have constructed a zero radical code of length \(n\) and distance 6.

Case 4. Construction of some zero radical codes with \(d\ge 7\) or \(k\ge 7\).

A cyclic code \([19,9,8]\) with generator polynomial \(x^{10}+\varpi x^{9}+\omega x^{8}+\omega x^{7}+x^{5}+\varpi x^{3}+\varpi x^{2}+\omega x+1\) is given in [21], this \([19,9,8]\) code is a zero radical code and its dual code is a \([19,10,7]\) code. Puncturing this \([19,9,8]\) code on coordinates set \(\{1,2\}\), one can obtain a \([17,9,6]\) code and its dual is a \([17,8,7]\) code, these two codes are zero radical codes. Puncturing this \([19,9,8]\) code on coordinates set \(\{1,2,4\}\), one can obtain a \([16,9,5]\) code and its dual is a \([16,7,7]\) code, these two codes are zero radical codes.

Next, consider the \([19,10,7]\) cyclic code given in [21], whose generator polynomial is \(x^{9}+\omega x^{8}+\omega x^{6}+\omega x^{5}+\varpi x^{4}+\varpi x^{3} +\varpi x+1\). Puncturing this \([19,10,7]\) code on the first coordinate, one can get a \([18,10,6]\) zero radical code and its dual code is a \([18,8,8]\) zero radical code.

A \([21,9,9]\) cyclic code given in [21] has generator polynomial \(x^{12}+\varpi x^{11}+ x^{10}+\omega x^{8}+x^{7}+\varpi x^{5}+x^{4}+\varpi x^{2}+\omega \), the dual code of this code is a \([21,12,7]\) code, but both of them are not zero radical codes. Puncturing this \([21,9,9]\) code on coordinates set \(\{1,2,3\}\), one can obtain a \([18,9,6]\) code and its dual code is a \([18,9,7]\) code, both of these two codes are zero radical codes.

Construct

$$\begin{aligned} G_{7,17}=\left( \begin{array}{cccccc} 1 0 1 0 1 1 1 1 1 1 0 0 0 0 0 0 0 \\ 3 1 0 1 3 0 1 2 0 0 1 0 0 0 0 0 1 \\ 1 1 3 0 2 0 1 2 1 0 0 1 0 0 0 0 0 \\ 1 2 3 2 2 1 0 2 2 0 0 0 1 0 0 0 0 \\ 3 3 3 1 1 0 1 3 2 0 0 0 0 1 0 0 0 \\ 3 2 0 0 0 1 2 1 1 0 0 0 0 0 1 0 0 \\ 1 3 3 2 0 3 1 1 0 0 0 0 0 0 0 1 0\\ \end{array}\right) ,\quad B=(b_{1},b_{2},b_{3})=\left( \begin{array}{cccccc} 0 1 1\\ 0 0 2\\ 1 0 1\\ 0 0 0\\ 1 0 0\\ 1 0 1\\ 0 0 1\\ \end{array}\right) . \end{aligned}$$

\(G_{7,17}\) generates a zero radical code \(\mathcal {C} =[17,7,7]\). Extending \(\mathcal {C}\) by \(b_{1}\) gives a \([18,7,8]\) zero radical code. Extending \(\mathcal {C}\) by \(b_{1}\) and \(b_{2}\) gives a \([19,7,8]\) zero radical code. Extending \(\mathcal {C}\) by \(b_{1}, b_{2}\) and \(b_{3}\), gives a \([20,7,9]\) zero radical code.

Hence, we have shown that there are [16,7,7], [17,7,7], [17,8,7], [17,9,6], [18,7,8], [18,8,8], [18,9,7], [18,10,6], [19,7,8], [19,9,8], [19,10,7] and [20,7,9] zero radical codes.

Summarizing the above four cases, we have

Theorem 5.1

They are the following maximal entanglement EAQECCs:

  1. (1)

    [[11,5,6;6]], [[12,5,6;7]], [[13,5,7;8]], [[14,5,7;9]], [[15,5,8;10]], [[16,5,9;11]],           [[17,5,9;12]], [[18,5,10;13]], [[19,5,11;14]], [[20,5,12;15]].

  2. (2)

    [[12,6,5;6]], [[13,6,6;7]], [[14,6,6;8]], [[15,6,7;9]], [[16,6,8;10]], [[17,6,8;11]], [[18,6,9;12]], [[19,6,10;13]], [[20,6,11;14]], [[21,6,12;15]] and \([[n,n-6,5;6]]\) for \(12\le n\le 21\).

  3. (3)

    \([[n,n-7, 6;7]]\) for \(13\le n\le 17\), and \([[n,n-8, 6;8]]\) for \(18\le n\le 20\).

  4. (4)

    [[16,7,7;9]], [[17,7,7;10]], [[18,7,8;11]], [[19,7,8;12]], [[20,7,9;13]]; [[17,8,7;9]], [[18,8,8;10]], [[19,8,8;11]], [[20,8,8;12]]; [[17,9,6;8]], [[18,9,7;9]], [[19,9,8;10]], [[20,9,8;11]]; [[18,10,6;8]], [[19,10,7;9]].

Remark 5.1

When puncturing a given code, we tried all possible coordinates and chose one case that result in zero radical code with highest minimum distance as output. According to [24], the following zero radical codes we give in this section are also optimal linear codes: \([n,5, d]\) for \(11\le n\le 20\) and \(n\ne 14,17\); \([n,6, d]\) for \(n= 13,16, 19, 20,21\); \([n,n-6, 5]\) for \(13\le n\le 21\); \([n,n-7, 6]\) for \(13\le n\le 20\); \([18, 8, 8], [19, 9, 8], [18, 10, 6]\) and \([19, 10, 7]\). Except these mentioned above codes, the zero radical codes given in this section do not attain known upper bounds on the minimum distance of a linear code. Nonetheless, their minimum distances appear very good in general. These codes are the best possible among those obtainable by our approach.

6 Discussion and conclusion

In this paper, we studied construction of quaternary zero radical codes and maximal entanglement EAQECCs. For each \(k\le 4\) and \(n\ge k\), we constructed an \([n,k]\) zero radical code and we also constructed some \([n,k,d]\) zero radical codes for \(n\le 20, k\ge 5\) and \(d\ge 5\). Based on these results on classical codes, we constructed many maximal entanglement EAQECCs with good parameters. Some of these EAQECCs are optimal codes and saturate the EA Plotkin bound, and some of them have parameters better than known ones in the literature.

In [17], we have constructed [[12,4,7;8]] and [[13,4,8;9]] codes. Our [[9,3,6;6]], [[12,3,8;9]], [[15,3,10;12]], [[12,4,7;8]], [[13,4,8;9]], [[14,4,8;10]], [[15,4,9;11]], [[13,5,7;8]] and [[14,5,7;9]]; which improve on the codes [[9,3,5;6]], [[12,3,7;9]], [[15,3,9;12]], [[12,4,6;8]], [[13,4,7;9]], [[14,4,7;10]], [[15,4,8;11]], [[13,5,6;8]] and [[14,5,6;9]] given in [4, 5], respectively.

In [27], it has been proved that an additive quaternary \([15,5,9]\) code does not exist; hence, an \([[15,5,8;10]]\) code is optimal. Thus, optimal maximal entanglement EAQECCs of length \(n\le 15\) can be determined except the six codes \([[12,6;6]], [[14,5;9]], [[14,6;8]], [[15,4;10]], [[15,6;9]]\) and \([[15,7;8]]\). In [28], a method for constructing maximal entanglement EAQECCs from binary linear codes is presented and many higher-dimensional maximal entanglement EAQECCs are constructed from optimal binary codes. We have checked all maximal entanglement EAQECCs with \(n\le 20\) and \(d\ge 3\) that constructed from optimal binary codes and find that the resulting EAQECCs cannot be better than our EAQECCs. Combining the results of [4, 5, 7, 17] and the results in Sects. 35 with known bounds, we formulate a table (Table 6) of upper and lower bounds on the minimum distance of any maximal entanglement EAQECCs with length up to 20 channel qubits.

Table 6 Lower and upper bounds on the minimum distance of maximal entanglement EAQECCs

In Table 6, many lower bounds for distance of EAQECCs with length \(n\ge 16\) are from known constructed codes. To make the bounds in Table 6 tighter, we need to choose other zero radical codes better than that given in Sect. 5 and consider other code constructions (such as that of [7]) to raise the lower bounds. We also plan to explore the construction of EAQECCs from additive quaternary codes to decrease the upper bound.