CSS Codes from Dn Root Lattices: An Infinite Family with Rate 1 - 4/K

CSS Codes from D
n
Root Lattices:
An Infinite Family with Rate 1 4/K
Raghu Kulkarni
IDrive Inc, SSMTheory and Quantum Computing Group
raghu@idrive.com
Preprint, 2026
Abstract
An old question in sphere-packing yields an explicit construction in quantum er-
ror correction. The face-centered cubic lattice—the densest sphere packing in three
dimensions—generates a CSS code with encoding rate 2
/
3. We demonstrate that this
construction extends to every
D
n
root lattice (
n
3), yielding codes with parameters
[[
n
(
n
1)
L
n
/
2
,
(
n
2)(
n+
1)
L
n
/
2 + 2
,
3]] and an encoding rate converging to 1
4
/K
as
L
, where
K
= 2
n
(
n
1) is the coordination number. CSS validity, the rank formula,
the asymptotic rate, and the exact distance
d
= 3 are proved analytically for all
n
3 by
exploiting an exact graph isomorphism between the primal vertex lattice and the dual
void lattice. As
K
grows along the densest-packing hierarchy, the topologically protected
fraction approaches unity, establishing the first proven infinite family of topological CSS
codes whose rate converges to 1 at fixed distance.
Contents
1 Introduction 1
2 The D
n
Root Lattice 2
3 CSS Code Construction 3
3.1 Qubits on edges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.2 Z-stabilisers on vertices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.3 X-stabilisers on voids . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
4 Main Theorems 4
5 Distance 5
6 The Rate Formula 6
7 Comparison with Known CSS Codes 7
8 Open Problems 7
1 Introduction
The face-centered cubic (FCC) arrangement of spheres was conjectured by Kepler in 1611 to
be the densest packing of equal spheres in three dimensions. Gauss proved this for lattice
1
packings in 1831, and the full conjecture was resolved by Hales’s computer-assisted proof
in 2005 [
2
]. In recent work [
1
], it was shown that this same FCC lattice, interpreted as a
qubit graph, yields a CSS quantum code [
3
,
4
] with an encoding rate of 2
/
3—higher than
any topological code previously known at the exact same distance d = 3.
The present paper generalizes this result. The construction strictly relies on the property
that the FCC lattice is an even-parity sublattice of
Z
3
, a structural characteristic that holds
for the
D
n
root lattice in every dimension. The
D
n
root lattice has
K
= 2
n
(
n
1) nearest
neighbours; the CSS code built from it has a rate of 1
4
/K
. For
n
= 3, this evaluates to
2/3; for n = 4, it evaluates to 5/6. As n , the rate strictly approaches 1.
While the asymptotic rate was expected from the graph density, the scaling of the code
distance requires formal evaluation. Initial computational sweeps of the
D
4
lattice at
L
= 4
indicated that all 4096 distinct triangles in the
D
4
graph operate as non-trivial logical
operators. We formalize this observation by providing a complete analytic proof that
d
= 3
exactly for all
n
3. The proof relies on establishing an exact graph isomorphism between
the primal
D
n
graph and the adjacency graph of its topological voids, which maps the logical
operators into the strict cut space of the lattice.
Context. Topological CSS codes have been central to quantum fault-tolerance since Kitaev’s
toric code [
5
], which achieves
k
= 2 regardless of system size. Surface codes [
6
] simplified the
physical geometry but maintained an asymptotic rate approaching 0. Hypergraph product
codes [
7
] were the first to achieve constant positive rate at constant distance, and recent
QLDPC constructions [
8
,
9
] achieve both constant rate and linear distance. The
D
n
family
occupies a distinct parameter regime: a rate approaching 1, small fixed distance, and a purely
geometric construction.
Organisation. Section 2 reviews the structural properties of the
D
n
lattice. Section 3
formalizes the CSS code definitions. Section 4 establishes CSS validity and proves the rank
formulas. Section 5 provides the rigorous algebraic proofs establishing the exact distance
d
= 3. Section 6 interprets the asymptotic rate, and Section 7 compares the family with
established literature.
2 The D
n
Root Lattice
Definition 2.1. The D
n
root lattice (n 2) is defined as:
D
n
=
x Z
n
x
1
+ ··· + x
n
0 (mod 2)
.
This corresponds to the
n
-dimensional checkerboard consisting of all sites with an even
coordinate sum. The nearest-neighbour vectors (roots) are:
N
D
n
=
±e
i
± e
j
1 i < j n
, (1)
where
e
i
is the
i
-th standard basis vector. Each root has a squared Euclidean length
|r|
2
= 2,
yielding exactly K = 4
n
2
= 2n(n 1) nearest neighbours.
Notable instances include
D
3
=
A
3
=
FCC with
K
= 12, proved to be the densest 3D
packing [
2
];
D
4
with
K
= 24, proved to be the densest 4D lattice packing by Korkine and
Zolotareff [
10
]; and
D
8
E
8
with
K
= 112. (Note that
E
8
, with
K
= 240, is the strictly
densest 8D packing [11]).
On the torus (Z/LZ)
n
with L even and L 4, the coordinate sites partition into:
vertices: n
V
= L
n
/2 even-parity sites,
voids: n
O
= L
n
/2 odd-parity sites.
2
Each void
o
is geometrically surrounded by exactly 2
n
vertices defined by the set
{o ± e
d
:
d = 1, . . . , n}.
Lemma 2.2 (Vertex- and void-transitivity). The even-parity sites and odd-parity sites each
form a single, distinct orbit under the translation group of the lattice.
Proof.
Translation by any vector
v D
n
(even parity) maps even-parity sites to even-parity
sites and odd-parity sites to odd-parity sites. The translation group is transitive on
D
n
,
establishing the vertex-transitivity of the
D
n
graph. For odd-parity sites, translation by any
odd-parity vector (e.g.,
e
1
) maps even sets to odd sets. Composing two such translations
maps odd to odd, confirming the orbit of any void under the full translation group equals all
voids. Thus, the void network is strictly vertex-transitive.
3 CSS Code Construction
3.1 Qubits on edges
A single physical qubit is placed on each edge of the
D
n
graph. Since each vertex has
K
neighbours and every edge is shared between two vertices, the total physical qubit count is:
n
E
=
K
2
n
V
= n(n 1)
L
n
2
. (2)
Figure 1: The CSS construction on a 2D slice of
D
3
(FCC). Left: a Z-stabiliser on a vertex
(blue, weight
K
). Right: an X-stabiliser on a void (red square), acting on the
K
non-antipodal
edges among the 2
n
surrounding vertices (orange). CSS validity is maintained because each
vertex-void pair shares an even number 2(n 1) of edges.
3.2 Z-stabilisers on vertices
For each vertex
v D
n
, the Z-stabiliser operator applies a Pauli
Z
to all
K
incident edges.
The parity-check matrix
H
Z
is exactly the unoriented vertex–edge incidence matrix of the
D
n
graph, where every row has uniform weight K.
3
3.3 X-stabilisers on voids
For a void
o
, its 2
n
surrounding vertices are defined as
{o
+
s e
d
:
d
= 1
, . . . , n, s
=
±
1
}
. We
define the antipodal pair along direction
d
as the two vertices
{o
+
e
d
, oe
d
}
. The X-stabiliser
for void
o
applies a Pauli
X
to all non-antipodal edges formed among its surrounding vertices.
A non-antipodal pair of vertices (
o
+
s
1
e
i
, o
+
s
2
e
j
) with
i
=
j
has a displacement vector
s
2
e
j
s
1
e
i
e
i
± e
j
}
, which identically matches the definition of a valid
D
n
root. The
number of such non-antipodal pairs is
2n
2
n
= 2
n
(
n
1) =
K
. Therefore, both Z- and
X-stabilisers possess a uniform weight of K.
4 Main Theorems
Theorem 4.1 (CSS validity). H
X
H
T
Z
= 0 over F
2
for all n 3 and even L 4.
Proof.
For any void
o
and vertex
v
, the matrix product evaluates the shared support:
(H
X
H
T
Z
)[o, v] = |edges(o) star(v)| (mod 2).
Case 1 :
v / surrounding
(
o
). No X-stabiliser edge originating from
o
utilizes
v
as an endpoint.
The intersection is empty, contributing 0.
Case 2 :
v
=
o
+
s
0
e
k
surrounding
(
o
). The vertex
v
connects via X-stabiliser edges to all
2
n
2 non-antipodal surrounding vertices (every surrounding vertex except its antipodal
partner
o s
0
e
k
). Because 2(
n
1)
0 (
mod
2) for all integers
n
2, the intersection size
is strictly even, contributing 0.
Theorem 4.2 (Edge coverage). Every edge of
D
n
is contained in exactly 2 void X-stabilisers.
Proof.
Consider an edge (
u, v
) defined by the root
v u
=
e
i
e
j
. A void
o
contains (
u, v
)
in its X-stabiliser if and only if both
u
and
v
are non-antipodal surrounding vertices of
o
.
Writing
u
=
o
+
s
a
e
a
and
v
=
o
+
s
b
e
b
subject to the constraint
s
b
e
b
s
a
e
a
=
e
i
e
j
yields
exactly two geometric solutions:
o
1
=
u e
j
and
o
2
=
u
+
e
i
. Because
u
is an even-parity
site and the basis vectors contain a single non-zero coordinate, both
o
1
and
o
2
are odd-parity
sites (valid voids). By symmetry, this applies to all root configurations. Hence, every edge is
covered by exactly 2 voids.
Corollary 4.3.
P
o
(H
X
)
o,·
= 0 over F
2
. Hence rk
F
2
(H
X
) n
O
1.
Theorem 4.4 (Rank formula). For even
L
4 and
n
3:
rk
F
2
(
H
Z
) =
n
V
1 and
rk
F
2
(H
X
) = n
O
1.
Proof.
For
H
Z
: The graph Laplacian =
H
T
Z
H
Z
has momentum-space eigenvalues
λ
(k) =
K
ˆ
A
(k), where
ˆ
A
(k) = 4
P
i<j
cos k
i
cos k
j
. At k = 0,
ˆ
A
(0) = 4
n
2
=
K
, yielding
λ
(0) = 0.
For k
= 0, the
D
n
graph on the torus is connected, leaving exactly one zero eigenvalue over
R. Over F
2
, the incidence matrix of any connected graph has rank n
V
1 [12].
For
H
X
: Corollary 4.3 restricts the rank to
n
O
1. To establish the lower bound, we
define the void adjacency graph
G
O
: vertices are voids, and two voids are adjacent if they
share at least one X-stabiliser edge. By Lemma 2.2, the odd-parity sites form a single orbit,
making
G
O
vertex-transitive. For
n
3 and
L
4, Theorem 4.2 dictates that every void
o
shares its
K
edges with exactly
K
other voids. Since
K
= 2
n
(
n
1)
12,
G
O
is a non-empty,
connected vertex-transitive graph. Therefore,
H
X
, acting as the incidence matrix of
G
O
, has
rank n
O
1.
Theorem 4.5 (Encoding parameters). The D
n
CSS code satisfies:
k =
(n 2)(n + 1)
2
L
n
+ 2,
k
n
E
L→∞
1
4
K
.
4
Proof. Applying Theorem 4.4 to the stabilizer rank-nullity equation:
k = n
E
(n
V
1) (n
O
1) = n(n 1)
L
n
2
2
L
n
2
1
=
n
2
n2
2
L
n
+ 2 =
(n2)(n+1)
2
L
n
+ 2.
The asymptotic rate evaluates to
k/n
E
(
n
2)(
n
+ 1)
/
[
n
(
n
1)] = 1
2
/
[
n
(
n
1)] =
1 4/K.
Table 1 details the specific parameters across dimensional hierarchies.
Table 1: Analytic parameters for the
D
n
CSS code family. The exact distance
d
= 3 holds
analytically for all n 3, establishing the rate asymptote 1 4/K.
Code n
E
k d Rate Stab. wt.
D
3
, L = 4 192 130 3 67.71% 12
D
3
, L = 6 648 434 3 66.98% 12
D
4
, L = 4 1536 1282 3 83.46% 24
D
4
, L = 6 7776 6482 3 83.36% 24
D
5
, L = 4 10240 9218 3 90.02% 40
D
n
, large L n(n1)L
n
/2
(n2)(n+1)
2
L
n
+ 2 3 1 4/K 2n(n1)
5 Distance
Because Z-stabilizers are rows of the graph incidence matrix
H
Z
, any vector
v ker H
Z
defines an X-operator. Symmetrically, vectors in
ker H
X
define Z-operators. The distances
d
X
and
d
Z
correspond to the minimum non-zero weight of vectors in
ker H
Z
\ rowspace
(
H
X
)
and ker H
X
\ rowspace(H
Z
), respectively.
Theorem 5.1 (Lower bounds:
d
X
3 and
d
Z
3). For all
n
3 and even
L
4, the code
graph possesses no parallel edges.
Proof. d
Z
3: A weight-1 operator is a single edge with two distinct endpoints, making
H
Z
T
T
= 0. A weight-2 operator
e
a
+
e
b
is in
ker H
Z
if and only if edges
a
and
b
are parallel
(sharing identical endpoints). Two distinct
D
n
roots
r
1
=
r
2
yield the same translated
neighbor
v
+
r
1
v
+
r
2
(
mod L
) only if
r
1
r
2
(
mod L
). Since the Euclidean distance
|r
1
r
2
|
8 <
4
L
, this explicitly forces
r
1
=
r
2
, representing the same edge. Thus, no
parallel edges exist, giving d
Z
3.
d
X
3: By Theorem 4.2, every edge is covered by exactly 2 X-stabilisers, forbidding
weight-1 operators in
ker H
X
. A weight-2 operator is in
ker H
X
if and only if the two void-
coverage sets for edges
a
and
b
are identical. This would require two distinct edges to span the
exact same pair of voids, generating a multi-edge in the void adjacency graph
G
O
. However,
as proven in Theorem 5.2 below,
G
O
is exactly isomorphic to the
D
n
graph, inheriting its
lack of parallel edges. Thus, d
X
3.
Theorem 5.2 (Void Graph Isomorphism). The void adjacency graph
G
O
is strictly isomorphic
to the D
n
primal graph.
Proof.
The vertices of
G
O
are the odd-parity sites
o Z
n
. Two voids
o
1
and
o
2
share an
edge in
G
O
if they share an X-stabilizer edge. By the geometry derived in Theorem 4.2,
this overlap strictly requires their difference to be a root vector:
o
1
o
2
=
±e
i
± e
j
N
D
n
.
Consequently, the adjacency condition for
G
O
is mathematically identical to the adjacency
condition of the
D
n
graph. Because the odd-parity sites are merely a global translation of
the even-parity sites by e
1
, the graphs are exactly isomorphic: G
O
=
D
n
.
5
Theorem 5.3 (Exact Distance:
d
X
= 3 and
d
Z
= 3). For all
n
3, every graphical triangle
forms a non-trivial logical operator.
Proof.
The matrix
H
Z
is the unoriented incidence matrix of the
D
n
graph, while
H
X
acts
identically as the unoriented incidence matrix of
G
O
. Over
F
2
, the kernel of an incidence
matrix defines the graph’s cycle space, and the row space defines its cut space.
Because both the
D
n
graph and
G
O
are connected, vertex-transitive,
K
-regular simple
graphs, classic graph theory establishes that their edge connectivity is exactly their degree
K
[
12
]. Therefore, the minimum size of any non-empty edge cut in either graph is exactly
K
. This dictates that the minimum non-zero weight of any vector in
rowspace
(
H
X
) or
rowspace(H
Z
) is strictly K = 2n(n 1).
A triangle in the
D
n
graph constitutes a 3-cycle, represented by an indicator vector
T
X
ker H
Z
. For all
n
3, the cut space bound requires
K
12. Because the triangle
T
X
has weight 3
<
12
K
, it is mathematically isolated from
rowspace
(
H
X
). Therefore,
T
X
is a
non-trivial X-logical operator, yielding d
X
3.
By symmetry via the isomorphism in Theorem 5.2, a triangle in the void graph
G
O
defines
a vector
T
Z
ker H
X
. Its weight is 3
<
12
K
, isolating it from
rowspace
(
H
Z
). Thus,
T
Z
is a non-trivial Z-logical operator, yielding d
Z
3.
Combined with the lower bounds from Theorem 5.1, the exact distance evaluates to
d
X
= d
Z
= 3 for all n 3.
6 The Rate Formula
Figure 2: Asymptotic encoding rate 1
4
/K
for the
D
n
family. The analytical formula
establishes that as the dimension and coordination number scale, the topologically protected
subset of the lattice bounds approaches 100%. All historical topological CSS codes natively
converge to a rate of 0.
Factoring the edge count as
n
E
= (
K/
2)
n
V
, the fractional rank utilized by the stabilizers
scales as
rk
(
H
Z
)
/n
E
n
V
/n
E
= 2
/K
. The symmetric structure guarantees the same for
H
X
. Evaluating the limit:
k
n
E
= 1
rkH
Z
n
E
rkH
X
n
E
1
2
K
2
K
= 1
4
K
.
Each stabiliser type consumes exactly 2
/K
of the available information capacity. The
remaining 1
4
/K
fraction is fully protected by the lattice topology. Because
K
= 2
n
(
n
1)
6
expands with dimension, the rate strictly increases with
n
. For the lowest dimensional cases
(n = 3 and n = 4), the code rate achieves 2/3 and 5/6, respectively.
7 Comparison with Known CSS Codes
Table 2: The D
n
family in context.
Code family Rate Distance Stab. weight
Toric / surface codes 0
n O(1)
Hypergraph product [7] const.
n const.
Good QLDPC [8, 9] const. O(n) const.
D
n
(this work) 1 4/K 1 3 2n(n 1)
The
D
n
code architecture strategically trades distance scaling for extreme encoding rates.
They are structurally suited for fault-tolerant applications where physical noise is intrinsically
bounded below the threshold and high logical qubit density is the primary architectural
constraint. While the stabilizer weight
K
= 2
n
(
n
1) remains physically manageable for
n
= 3 (
K
= 12) and
n
= 4 (
K
= 24), hardware implementations for
n
6 will demand highly
centralized syndromic measurement networks.
8 Open Problems
O1. The
E
8
code. The
E
8
root lattice (
K
= 240, predicted rate 59
/
60) introduces half-
integer coset vectors not native to the
D
n
evaluation. A valid CSS formulation derived from
the integer Construction A realization of
E
8
would constitute the highest-rate topological
code theoretically permitted by uniform crystallographic structures.
O2. Single-shot decoding. Evaluating whether
D
n
codes natively admit single-shot
error correction requires further simulation to quantify local syndrome confinement under
phenomenological noise models.
O3. Optimal rate bounds at
d
= 3. It remains formally unproven whether 1
4
/K
represents the strict information-theoretic maximum encoding rate for a translationally
invariant topological CSS code operating at coordination K and distance 3.
O4. Weight reduction. For a fixed parameter
n
, analytical methods are required to
determine if mathematically equivalent subsystem codes exist that factorize the stabilizer
operators into components strictly smaller than K = 2n(n 1).
Acknowledgements
We acknowledge the quantum error correction community for the prior structural work that
established the necessary context for interpreting geometric stabilizers in high dimensions.
References
[1]
R. Kulkarni, “A 67%-Rate CSS Code on the FCC Lattice: [[192
,
130
,
3]] from Weight-12
Stabilizers,” arXiv:2603.20294 [quant-ph] (2025).
[2] T. C. Hales, “A proof of the Kepler conjecture,” Ann. Math. 162, 1065–1185 (2005).
[3]
A. R. Calderbank and P. W. Shor, “Good quantum error-correcting codes exist,” Phys.
Rev. A 54, 1098–1105 (1996).
7
[4]
A. M. Steane, “Multiple-particle interference and quantum error correction,” Proc. R.
Soc. A 452, 2551–2577 (1996).
[5]
A. Yu. Kitaev, “Fault-tolerant quantum computation by anyons,” Ann. Phys. 303, 2–30
(2003).
[6]
E. Dennis, A. Kitaev, A. Landahl, J. Preskill, “Topological quantum memory,” J. Math.
Phys. 43, 4452–4505 (2002).
[7]
J.-P. Tillich and G. Z´emor, “Quantum LDPC codes with positive rate and minimum
distance proportional to the square root of the blocklength,” IEEE Trans. Inf. Theory
60, 1193–1202 (2014).
[8] A. Leverrier, V. Tillich, G. emor, “Quantum expander codes,” Proc. FOCS (2022).
[9]
P. Panteleev and G. Kalachev, “Asymptotically good quantum and locally testable
classical LDPC codes,” Proc. STOC (2022).
[10]
A. Korkine and G. Zolotareff, “Sur les formes quadratiques,” Math. Ann. 6, 366–389
(1872).
[11]
M. Viazovska, “The sphere packing problem in dimension 8,” Ann. Math. 185, 991–1015
(2017).
[12] C. Godsil and G. Royle, Algebraic Graph Theory, Springer (2001).
8