Next Article in Journal
The Role of the Central Limit Theorem in the Heterogeneous Ensemble of Brownian Particles Approach
Next Article in Special Issue
Using Data-Compressors for Classification Hunting Behavioral Sequences in Rodents as “Ethological Texts”
Previous Article in Journal
Variational Bayesian Iterative Estimation Algorithm for Linear Difference Equation Systems
Previous Article in Special Issue
Low-Entropy Stochastic Processes for Generating k-Distributed and Normal Sequences, and the Relationship of These Processes with Random Number Generators
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Four Constructions of Asymptotically Optimal Codebooks via Additive Characters and Multiplicative Characters

School of Mathematics, Southeast University, Nanjing 210096, China
*
Author to whom correspondence should be addressed.
Mathematics 2019, 7(12), 1144; https://doi.org/10.3390/math7121144
Submission received: 23 September 2019 / Revised: 5 November 2019 / Accepted: 19 November 2019 / Published: 23 November 2019
(This article belongs to the Special Issue Information Theory, Cryptography, Randomness and Statistical Modeling)

Abstract

:
In this paper, we present four new constructions of complex codebooks with multiplicative characters, additive characters, and quadratic irreducible polynomials and determine the maximal cross-correlation amplitude of these codebooks. We prove that the codebooks we constructed are asymptotically optimal with respect to the Welch bound. Moreover, we generalize the result obtained by Zhang and Feng and contain theirs as a special case. The parameters of these codebooks are new.

1. Introduction

An ( N , K ) codebook C = { c 0 , c 1 , , c N 1 } is a set of N unit-norm complex vectors c i C K over an alphabet A, where i = 0 , 1 , , N 1 . The size of A is called the alphabet size of C . As a performance measure of a codebook in practical applications, the maximum magnitude of inner products between a pair of distinct vectors in C is defined by:
I m a x ( C ) = max 0 i j N 1 | c i c j H | ,
where c j H denotes the conjugate transpose of the complex vector c j . To evaluate an ( N , K ) codebook C , it is important to find the minimum achievable I m a x ( C ) or its lower bound. The Welch bound [1] provides a well known lower bound on I m a x ( C ) ,
I m a x ( C ) I W = N K ( N 1 ) K .
The equality holds if and only if for all pairs of ( i , j ) with i j :
| c i c j H | = N K ( N 1 ) K .
A codebook C achieving the Welch bound equality is called a maximum Welch bound equality (MWBE) codebook [2] or an equiangular tight frame [3]. MWBE codebooks are employed in various applications including code division multiple access (CDMA) communication systems [4], communications [2], combinatorial designs [5,6,7], packing [8], compressed sensing [9], coding theory [10,11,12], and quantum computing [13]. To our knowledge, only the following MWBE codebooks have been presented as follows:
  • ( N , N ) orthogonal MWBE codebooks for any N > 1 [2,7];
  • ( N , N 1 ) MWBE codebooks for N > 1 based on discrete Fourier transformation matrices [2,7] or m-sequences [2];
  • ( N , K ) MWBE codebooks from conference matrices [8,14], where N = 2 K = 2 d + 1 for a positive integer d or N = 2 K = p d + 1 for a prime p and a positive integer d;
  • ( N , K ) MWBE codebooks based on ( N , K , λ ) difference sets in cyclic groups [7] and abelian groups [5,6];
  • ( N , K ) MWBE codebooks from ( 2 , k , ν ) -Steiner systems [15];
  • ( N , K ) MWBE codebooks dependent on graph theory and finite geometries [16,17,18,19].
The construction of an MWBE codebook is known to be very hard in general, and the known classes of MWBE codebooks only exist for very restrictive N and K. Many research works have been done instead to construct near optimal codebooks, i.e., codebook C whose I m a x ( C ) nearly achieves the Welch bound. In [2], Sarwate gave some nearly optimal codebooks from codes and signal sets. As an extension of the optimal codebooks based on difference sets, various types of near optimal codebooks based on almost difference sets, relative difference sets, and cyclotomic classes have been proposed; see [5,20,21,22,23]. Near optimal codebooks constructed from binary row selection sequences were presented in [24,25]. In [26,27,28,29,30], some near optimal codebooks were constructed via Jacobi sums and a hyper Eisenstein sum.
In [31], Mohades and Tadaion combined a Reed–Solomon generator matrix with itself by the tensor product and employed this generated matrix to construct a complex measurement matrix. They proved that this matrix is asymptotically optimal according to the Welch bound. In this paper, we use additive characters and multiplicative characters to construct four new codebooks, and we determine the maximal cross-correlation amplitude of these codebooks by the properties of characters and character sums. Moreover, we generalize the result in [21] and contain the result in [21] as a special case. All of these codebooks we constructed are new and near optimal according to the Welch bound. As a comparison, in Table 1, we list the parameters of some known classes of near optimal codebooks and the parameters of ours.
This paper is organized as follows. In Section 2, we recall some notations and basic results that will be needed in our discussion. In Section 3, we present our four constructions of near optimal codebooks. In Section 4, we give the conclusion.

2. Preliminaries

In this paper, we set q o be a power of a prime p and F q to be a finite field with q elements. For a set E, # E denotes the cardinality of E.
In this section, we introduce some basic results on characters and character sums over finite fields, which will play important roles in the construction of codebooks.

2.1. Characters over Finite Fields

Let F q be a finite field. In this subsection, we recall the definitions of the additive and multiplicative characters of F q .
For each a F q , an additive character of F q is defined by the function λ a ( x ) = ζ p Tr q / p ( a x ) , where ζ p is a primitive p - th root of complex unity and Tr q / p ( · ) is the trace functions from F q to F p . By the definition, λ a ( x ) = λ 1 ( a x ) . When a = 0 , we call λ 0 the trivial additive character of F q . When a = 1 , we call λ 1 the canonical additive character of F q . Let F q ^ be the set of all additive characters of F q . The orthogonal relation of additive characters (see [35]) is given by:
x F q λ a ( x ) = q , if   a = 0 , 0 , otherwise .
As in [35], the multiplicative characters of F q are defined as follows. For j = 0 , 1 , , q 2 , the functions φ j defined by:
φ j ( α i ) = ζ q 1 i j ,
are all the multiplicative characters of F q , where α is a primitive element of F q , and 0 i q 2 . If j = 0 , we have φ 0 ( x ) = 1 for any x F q , and φ 0 is called the trivial multiplicative character of F q . Let F q ^ be the set of all the multiplicative characters of F q .
Let φ be a multiplicative character of F q . The orthogonal relation of multiplicative characters (see [35]) is given by:
x F q φ ( x ) = q 1 , if   φ = φ 0 , 0 , otherwise .

2.2. Character Sums over Finite Fields

2.2.1. Gauss Sum

Let φ be a multiplicative character of F q and χ an additive character of F q . Then, the Gauss sum over F q is given by:
G ( φ , χ ) = x F q φ ( x ) χ ( x ) .
For simplicity, we write G ( φ , χ 1 ) over F q simply as g ( φ ) . It is easy to see that the absolute value of G ( φ , χ ) is at most q 1 , but is much smaller in general. The following lemma shows all the cases.
Lemma 1.
([35], Theorem 5.11) Let φ be a multiplicative character and χ an additive character of F q . Then, the Gauss sum G ( φ , χ ) over F q satisfies:
G ( φ , χ ) = q 1 , i f φ = φ 0 , χ = χ 0 , 1 , i f φ = φ 0 , χ χ 0 , 0 , i f φ φ 0 , χ = χ 0 .
For φ φ 0 and χ χ 0 , we have G ( φ , χ ) = q .

2.2.2. Jacobi Sum

The definition of a multiplicative character φ can be extended as follows.
φ ( 0 ) = 1 , if φ = φ 0 , 0 , if φ φ 0 .
Let φ 1 and φ 2 be multiplicative characters of F q . The sum:
J ( φ 1 , φ 2 ) = c 1 + c 2 = 1 , c 1 , c 2 F q φ 1 ( c 1 ) φ 2 ( c 2 )
is called a Jacobi sum in F q .
The values of Jacobi sums are given as follows.
Lemma 2.
([35], Theorem 5.19, Theorem 5.20) For the values of Jacobi sums, we have the following results.
(1) 
If φ 1 and φ 2 are trivial, then J ( φ 1 , φ 2 ) = q .
(2) 
If one of φ 1 and φ 2 is trivial, the other is nontrivial, J ( φ 1 , φ 2 ) = 0 .
(3) 
If φ 1 and φ 2 are both nontrivial and φ 1 φ 2 is nontrivial, then | J ( φ 1 , φ 2 ) | = q .
(4) 
If φ 1 and φ 2 are both nontrivial and φ 1 φ 2 is trivial, then | J ( φ 1 , φ 2 ) | = 1 .

2.3. A General Construction of Codebooks

There are two steps in the construction of the codebooks. In the first step, we need a set D, which determines the length of the vectors. In the second step, we choose a set of functions from D for the unit circle, which determine the number of vectors.
Let D be a set and K = # D . Let E be a set of some functions that satisfy:
f : D S , where S is the unit circle .
A general construction of codebooks is stated as follows in the complex plane,
C ( D ; E ) = { c f : = 1 K ( f ( x ) ) x D f E } .

3. Four Constructions of Near Optimal Codebooks

In this section, by multiplicative characters, additive characters, Gauss sums, and Jacobi sums, we construct four new series of codebooks.

3.1. The First Construction of Codebooks

In this section, we propose a construction of codebooks by the group of multiplicative characters of F q and a set D 1 derived by the multiplicative character of order m. The construction was inspired by [21], and we generalized the quadratic multiplicative character of a finite field to the multiplicative character of order m.
Let q = p t , where p is an odd prime number and t 1 is a positive integer. Let φ be the multiplicative character of order m of F q , where m | q 1 . Let:
D 1 : = { x F q φ ( x + 1 ) = 1 } ,
Then, K = # D 1 = q 1 m 1 .
A codeword of length K is defined as:
c χ = 1 K ( χ ( x ) ) x D 1 ,
where χ F q ^ .
Then, we construct the following ( N , K ) codebook C ( D 1 ) as:
C ( D 1 ) = { 1 K ( χ ( x ) ) x D 1 χ F q ^ } .
It is easy to see that N = q 1 .
We set:
δ 1 ( x ) = 1 + φ ( x + 1 ) + + φ m 1 ( x + 1 ) m , if x F q a n d x 1 , 0 , if x = 1 ;
through the definition of D 1 , we known that:
δ 1 ( x ) = 1 , if x D 1 , 0 , otherwise .
Lemma 3.
With the above notation, we have:
I m a x ( C ( D 1 ) ) ( m 1 ) q + 1 q 1 m .
Proof. 
For any characters χ i and χ j in F q ^ , where 1 i j q 1 , we have:
K ( c χ i c χ j H ) = K 1 K ( χ i ( x ) ) x D 1 1 K ( χ j ( x ) ) x D 1 H = x D 1 χ i ( x ) χ j ( x ) ¯ = x D 1 χ ( x ) , ( where χ = χ i χ j ¯ ) = x F q χ ( x ) δ 1 ( x ) = x F q , x 1 χ ( x ) 1 + φ ( x + 1 ) + + φ m 1 ( x + 1 ) m = 1 m [ x F q χ ( x ) + x F q χ ( x ) φ ( x + 1 ) + x F q χ ( x ) φ m 1 ( x + 1 ) ] 1 m χ ( 1 ) = 1 m [ x F q χ ( x ) + x F q χ ( x ) φ ( x + 1 ) + + x F q χ ( x ) φ m 1 ( x + 1 ) ] 1 m χ ( 1 ) = 1 m χ ( 1 ) [ x F q χ ( x ) + x F q χ ( x ) φ ( 1 x ) + + x F q χ ( x ) φ m 1 ( 1 x ) ] 1 m χ ( 1 ) = 1 m χ ( 1 ) [ J ( χ , φ ) + + J ( χ , φ m 1 ) 1 ] ,
the equations hold since x F q χ ( x ) = 0 , where χ is a nontrivial character as χ i χ j . By the results in Lemma 2, we get | J ( χ , φ i ) | = q , 1 i m 1 , so | [ J ( χ , φ ) + + J ( χ , φ m 1 ) 1 ] | ( m 1 ) q + 1 . It follows that:
I m a x ( C ( D 1 ) ) = m a x { | c χ i c χ j H | : 1 i j q 1 } ( m 1 ) q + 1 q 1 m .
 □
Remark 1.
( 1 ) Since N = q 1 and K = q 1 m 1 in this construction, the corresponding Welch bound is:
I W e l c h = N K ( N 1 ) K = ( m 1 ) q + 1 ( q 2 ) ( q 1 m ) .
Thus,
I m a x ( C ( D 1 ) ) I W e l c h 0 ,
and:
1 I m a x ( C ( D 1 ) ) I W e l c h m 1 ,
as q .
( 2 ) When m = 2 , we get I m a x ( C ( D 1 ) ) I W e l c h = 1 , when q , which is similar to the first construction in [21].

3.2. The Second Construction of Codebooks

In this section, we propose a construction of codebooks by the group of additive characters and a set D 2 derived by the multiplicative character of order m. In the first construction, we use the multiplicative characters, which lead to the Jacobi sums. In this section, we use the additive characters, which will lead to Gauss sums.
Let q = p t , where p is an odd prime number and t 1 is a positive integer. Let φ be the multiplicative character of order m of F q , where m | q 1 . Let:
D 2 : = { x F q φ ( x ) = 1 } .
Then, K = # D 2 = q 1 m .
A codeword of length K is defined as:
c λ = 1 K ( λ ( x ) ) x D 2 .
where λ F q ^ .
Then, we construct the following ( N , K ) codebook C ( D 2 ) as:
C ( D 2 ) = { 1 K ( λ ( x ) ) x D 2 λ F q ^ } .
It is easy to see that N = q .
Let:
δ 2 ( x ) = 1 + φ ( x ) + + φ m 1 ( x ) m , x F q
Through the definition of D 2 , we known that:
δ 2 ( x ) = 1 , if x D 2 , 0 , otherwise .
Theorem 1.
With the above notation, we have:
I m a x ( C ( D 2 ) ) ( m 1 ) q + 1 q 1 .
Proof. 
For any characters λ i and λ j in F q ^ , where 0 i j q 1 , we have:
K ( c λ i c λ j H ) = x D 2 λ i ( x ) λ j ( x ) ¯ = x D 2 λ ( x ) , ( where λ = λ i λ j ¯ ) = x F q λ ( x ) δ 2 ( x ) = x F q λ ( x ) 1 + φ ( x ) + + φ m 1 ( x ) m = 1 m [ x F q λ ( x ) + x F q λ ( x ) φ ( x ) + x F q λ ( x ) φ m 1 ( x ) ] = 1 m [ 1 + G ( φ , λ ) + + G ( φ , λ m 1 ) ] ,
and the last equation holds since x F q λ ( x ) = 1 , where λ is a nontrivial character as λ i λ j .
By the results in Lemma 1, we get | G ( φ , λ i ) | = q , 1 i m 1 , then:
I m a x ( C ( D 2 ) ) = m a x { | c λ i c λ j H | : 0 i j q 1 } ( m 1 ) q + 1 q 1 .
 □
Remark 2.
( 1 ) Since N = q and K = q 1 m in this construction, the corresponding Welch bound is:
I W e l c h = N K ( N 1 ) K = ( m 1 ) q + 1 q 1 .
Thus,
I m a x ( C ( D 2 ) ) I W e l c h 0 ,
and:
1 I m a x ( C ( D 2 ) ) I W e l c h m 1 ,
as q .
( 2 ) When m = 2 , we get I m a x ( C ( D 2 ) ) I W e l c h = 1 when q .

3.3. The Third Construction of Codebooks

In this section, we propose a construction of codebooks by the group of additive characters of F q 1 F q 2 and a set D 3 derived by the multiplicative characters of order m. We generalized the quadratic multiplicative character of a finite field in [21] to the multiplicative character of order m, and we contain the second construction in [21] as a special case. The third construction seems very close to [27,29]; however, the set D in our construction is defined by multiplicative characters, and the sets in their construction are defined by trace functions.
Let q 1 = p 1 t 1 , q 2 = p 2 t 2 , where p 1 , p 2 are odd primes and t 1 , t 2 1 are positive integers. Let R = F q 1 F q 2 , R = F q 1 F q 2 . Let φ 1 and φ 2 be the multiplicative character of order m of F q 1 and F q 2 , respectively, where m | ( q 1 1 , q 2 1 ) . The character group of the additive group R = F q 1 F q 2 is:
R ^ = { λ b : b = ( b 1 , b 2 ) R } ,
where λ b ( x ) = λ b 1 ( x 1 ) λ b 2 ( x 2 ) , for x = ( x 1 , x 2 ) R .
We set:
D 3 = { x = ( x 1 , x 2 ) R φ 1 ( x 1 ) φ 2 ( x 2 ) = 1 } .
Then, K = # D 3 = ( q 1 1 ) ( q 2 1 ) m .
A codeword of length K is defined as:
c b = 1 K ( λ b ( x ) ) x D 3 .
where b R .
Then, we construct the following ( N , K ) codebook C ( D 3 ) as:
C ( D 3 ) = { c b = 1 K ( λ b ( x ) ) x D 3 b R } .
It is easy to see that N = q 1 q 2 .
We set:
δ 3 ( x ) = 1 + φ 1 ( x 1 ) φ 2 ( x 2 ) + + φ 1 m 1 ( x 1 ) φ 2 m 1 ( x 2 ) m ,
where x R through the definition of D 3 , we known that:
δ 3 ( x ) = 1 , if x D 3 , 0 , otherwise .
Theorem 2.
With the above notation, we have:
I m a x ( C ( D 3 ) ) ( m 1 ) q 1 q 2 + 1 m .
Proof. 
For any characters λ i and λ j in R ^ , where λ i λ j , we have:
K ( c λ i c λ j H ) = x D 3 λ i ( x ) λ j ( x ) ¯ = x D 3 λ b ( x ) = x R λ b ( x ) δ 3 ( x ) ( where λ b = λ i λ j ¯ ) = x R λ b 1 ( x 1 ) λ b 2 ( x 2 ) 1 + φ 1 ( x 1 ) φ 2 ( x 2 ) + + φ 1 m 1 ( x 1 ) φ 2 m 1 ( x 2 ) m = 1 m [ x 1 F q 1 λ b 1 ( x 1 ) x 2 F q 2 λ b 2 ( x 2 ) + x 1 F q 1 λ b 1 ( x 1 ) φ 1 ( x 1 ) x 2 F q 2 λ b 2 ( x 2 ) φ 2 ( x 2 ) + + x 1 F q 1 λ b 1 ( x 1 ) φ 1 m 1 ( x 1 ) x 2 F q 2 λ b 2 ( x 2 ) φ 2 m 1 ( x 2 ) ] ,
since λ i λ j , λ b is a nontrivial character, which means not both b 1 and b 2 are equal to zero.
By the orthogonal relation of additive characters, we get:
x i F q i λ b i ( x i ) = q i 1 , for b i = 0 , 1 , for b i 0 .
and:
x i F q i λ b i ( x i ) φ i k ( x i ) = G ( φ i k , λ b i ) = 0 , for b i = 0 , q i , for b i 0 ,
where i = 1 , 2 and 0 k m 1 .
It follows that:
m K C C · H = 1 q 1 , for b 1 = 0 , b 2 0 1 q 2 , for b 1 0 , b 2 = 0 1 + G 1 ( φ 1 , λ b 1 ) G 2 ( φ 2 , λ b 2 ) + + G 1 ( φ 1 m 1 , λ b 1 ) G 2 ( φ 2 m 1 , λ b 2 ) , for b 1 0 , b 2 0 .
Thus:
I m a x ( C ( D 3 ) ) = m a x { | c λ i c λ j H | : 0 i j q 1 } ( m 1 ) q 1 q 2 + 1 ( q 1 1 ) ( q 2 1 ) .
 □
Remark 3.
( 1 ) Since N = q 1 q 2 and K = ( q 1 1 ) ( q 2 1 ) m in this construction, the corresponding Welch bound is:
I W e l c h = N K ( N 1 ) K = ( m 1 ) q 1 q 2 + q 1 + q 2 1 ( q 1 q 2 1 ) ( q 1 1 ) ( q 2 1 ) .
Thus,
I m a x ( C ( D 2 ) ) I W e l c h 0 ,
and:
1 I m a x ( C ( D 2 ) ) I W e l c h m 1 ,
as q 1 , q 2 and | q 1 q 2 | = O ( 1 ) .
( 2 ) When m = 2 , we get I m a x ( C ( D 3 ) ) I W e l c h = 1 , when q 1 , q 2 and | q 1 q 2 | = O ( 1 ) , which is similar to the second construction in [21].

3.4. The Fourth Construction of Codebooks

In this section, we propose a construction of codebooks by the group of multiplicative characters and a set D 4 derived by the quadratic character and a quadratic irreducible polynomial.
Let q = p t , where p is an odd prime number and t is a positive integer. Let η be the quadratic character of F q . Let f ( x ) = x 2 + a 1 x + a 0 F q [ x ] be a quadratic irreducible polynomial. We set:
D 4 : = { x F q η ( f ( x ) ) = 1 } ,
and # D 4 = K.
Lemma 4.
([35], Theorem 5.48) Let f ( x ) = a 2 x 2 + a 1 x + a 0 F q [ x ] with q odd and a 2 0 . Put b = a 1 2 4 a 2 a 0 , and let η be the quadratic character of F q . Then:
c F q η ( f ( c ) ) = η ( a 2 ) , i f d 0 , ( q 1 ) η ( a 2 ) , i f d = 0 .
Lemma 5.
With the above notations, we get:
K = q 1 2 , i f η ( a 0 ) = 1 , q 3 2 , i f η ( a 0 ) = 1 .
Proof. 
Let K 1 = # { x F q : η ( f ( x ) ) = 1 } . Since f is irreducible, we get:
K + K 1 = q 1 .
On the other hand, by Lemma 4, it is easy to see:
K K 1 + η ( a 0 ) = K K 1 + η ( f ( 0 ) ) = c F q η ( f ( c ) ) = η ( 1 ) = 1 .
The result then follows. □
A codeword of length K is defined as:
c χ = 1 K ( χ ( x ) ) x D 4 .
where χ F q ^ .
Then, we construct the following ( N , K ) codebook C ( D 4 ) as:
C ( D 4 ) = { 1 K ( χ ( x ) ) x D 4 χ F q ^ } ,
and it is easy to see N = q 1 .
Let:
δ 4 ( x ) = 1 + η ( f ( x ) ) 2 .
Through the definition of D 4 , we known that:
δ 4 ( x ) = 1 , if x D 4 , 0 , otherwise .
Theorem 3.
With the above notation, we have:
I m a x ( C ( D 4 ) ) q K = 2 q q 1 , i f η ( a 0 ) = 1 , 2 q q 3 , i f η ( a 0 ) = 1 .
Proof. 
For any characters χ i and χ j in F q ^ , where 1 i j q 1 , let χ = χ i χ j ¯ , then we have:
K ( c χ i c χ j H ) = x D 4 χ i ( x ) χ j ( x ) ¯ = x D 4 χ ( x ) = x F q χ ( x ) δ 4 ( x ) ( where χ = χ i χ j ¯ ) = x F q χ ( x ) 1 + η ( f ( x ) ) 2 = 1 2 x F q χ ( x ) + 1 2 x F q χ ( x ) η ( f ( x ) ) = 1 2 x F q χ ( x ) η ( f ( x ) ) .
By the result in Lemma 6, we get:
| x F q χ ( x ) η ( f ( x ) ) | ( 3 1 ) q = 2 q
Then:
I m a x ( C ( D 4 ) ) q K = 2 q q 1 , if η ( a 0 ) = 1 , 2 q q 3 , if η ( a 0 ) = 1 .
 □
Lemma 6.
([36]) Let f 1 ( x ) , , f h ( x ) be h monic, distinct, and irreducible polynomials in F q [ x ] , which have the positive degrees d 1 , , d h , respectively. Let d be the number of distinct roots of f ( x ) = i = 1 h f i ( x ) in its splitting field over F q . Let ψ 1 , , ψ h be the multiplicative characters of F q . Assume that the product character i = 1 h ψ i ( f i ( x ) ) is nontrivial for some x F q . Then, for every a i F q , i = 1 , , h ,
| x F q ψ 1 ( a 1 f 1 ( x ) ) , , ψ h ( a h f h ( x ) ) | ( d 1 ) q .
Remark 4.
Since N = q 1 , combining the result in Lemma 5 about K, the corresponding Welch bound is:
I W e l c h = 1 q 2 , i f η ( a 0 ) = 1 , q + 3 ( q 2 ) ( q 3 ) , i f η ( a 0 ) = 1 .
Thus,
I m a x ( C ( D 4 ) ) I W e l c h 0 ,
and:
lim q I m a x ( C ( D 2 ) ) I W e l c h = 2 .

4. Concluding Remarks

In this paper, we proposed four constructions of codebooks and determined the maximum cross-correlation amplitude of codebooks generated by these four constructions. We verified that the codebooks generated by these four constructions were asymptotically optimal with respect to the Welch bound. Notably, the parameters of our codebooks were new and flexible. The technique of our paper was the properties of the Gauss sum, Jacobi sum, and some conclusions about the upper bound of the multiplicative characters acting on irreducible polynomials. The parameters of our codebooks were flexible and new, and the p in our constructions could be any odd prime.

Author Contributions

Conceptualization, W.L.; Formal analysis, X.W.; Investigation, X.W.; Writing original draft, W.L.

Funding

This work was supported by the National Natural Science Foundation of China (Grant Nos. 11971102 and 11801070).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Welch, L. Lower bounds on the maximum cross correlation of signals. IEEE Trans. Inf. Theory 1974, 20, 397–399. [Google Scholar] [CrossRef]
  2. Sarwate, D. Meeting the Welch Bound with Equality; Springer: New York, NY, USA, 1999; pp. 63–79. [Google Scholar]
  3. Kovacevic, J.; Chebira, A. An introduction to frames. Found. Trends Signal Process. 2008, 2, 1–94. [Google Scholar] [CrossRef]
  4. Massey, J.; Mittelholzer, T. Welch’s Bound and Sequence Sets for Code-Division Multiple-Access Systems; Sequences II; Springer: New York, NY, USA, 1999; pp. 63–78. [Google Scholar]
  5. Ding, C. Complex codebooks from combinatorial designs. IEEE Trans. Inf. Theory 2006, 52, 4229–4235. [Google Scholar] [CrossRef]
  6. Ding, C.; Feng, T. A generic construction of complex codebooks meeting the Welch bound. IEEE Trans. Inf. Theory 2007, 53, 4245–4250. [Google Scholar] [CrossRef]
  7. Xia, P.; Zhou, S.; Giannakis, G. Achieving the Welch bound with difference sets. IEEE Trans. Inf. Theory 2005, 51, 1900–1907. [Google Scholar] [CrossRef]
  8. Conway, J.; Harding, R.; Sloane, N. Packing lines, planes, etc.: Packings in Grassmannian spaces. Exp. Math. 1996, 5, 139–159. [Google Scholar] [CrossRef]
  9. Candes, E.; Wakin, M. An introduction to compressive sampling. IEEE Signal Process 2008, 25, 21–30. [Google Scholar] [CrossRef]
  10. Delsarte, P.; Goethals, J.; Seidel, J. Spherical codes and designs. Geom. Dedicate 1997, 67, 363–388. [Google Scholar]
  11. Kim, Y.S.; Park, H.; No, J.S. Construction of New Fractional Repetition Codes from Relative Difference Sets with lambda=1. Entropy 2017, 19, 563. [Google Scholar] [CrossRef]
  12. Phu, T.T.; Nguyen, T.N.; Sang, N.Q. Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments. Entropy 2019, 21, 700. [Google Scholar]
  13. Renes, J.; Blume-Kohout, R.; Scot, A.; Caves, C. Symmetric informationally complete quantum measurements. J. Math. Phys. 2004, 45, 2171–2180. [Google Scholar] [CrossRef]
  14. Strohmer, T.; Heath, R. Grassmannian frames with applications to coding and communication. Appl. Comput. Harmon. Anal. 2003, 14, 257–275. [Google Scholar] [CrossRef]
  15. Fickus, M.; Mixon, D.; Tremain, J. Steiner equiangular tight frames. Linear Algebra Appl. 2012, 436, 1014–1027. [Google Scholar] [CrossRef]
  16. Fickus, M.; Mixon, D. Tables of the existence of equiangular tight frames. arXiv 2016, arXiv:1504.00253v2. [Google Scholar]
  17. Fickus, M.; Mixon, D.; Jasper, J. Equiangular tight frames from hyperovals. IEEE Trans. Inf. Theory 2016, 62, 5225–5236. [Google Scholar] [CrossRef]
  18. Fickus, M.; Jasper, J.; Mixon, D.; Peterson, J. Tremain equiangular tight frames. arXiv 2016, arXiv:1602.03490v1. [Google Scholar] [CrossRef]
  19. Rahimi, F. Covering Graphs and Equiangular Tight Frames. Ph.D. Thesis, University of Waterloo, Waterloo, ON, Canada, 2016. Available online: http://hdl.handle.net/10012/10793 (accessed on 20 November 2019).
  20. Hu, H.; Wu, J. New constructions of codebooks nearly meeting the Welch bound with equality. IEEE Trans. Inf. Theory 2014, 60, 1348–1355. [Google Scholar] [CrossRef]
  21. Zhang, A.; Feng, K. Two classes of codebooks nearly meeting the Welch bound. IEEE Trans. Inf. Theory 2012, 58, 2507–2511. [Google Scholar] [CrossRef]
  22. Zhang, A.; Feng, K. Construction of cyclotomic codebooks nearly meeting the Welch bound. Des. Codes Cryptogr. 2013, 63, 209–224. [Google Scholar] [CrossRef]
  23. Zhou, Z.; Tang, X. New nearly optimal codebooks from relative difference sets. Adv. Math. Commun. 2011, 5, 521–527. [Google Scholar]
  24. Hong, S.; Park, H.; Helleseth, T.; Kim, Y. Near optimal partial Hadamard codebook construction using binary sequences obtained from quadratic residue mapping. IEEE Trans. Inf. Theory 2014, 60, 3698–3705. [Google Scholar] [CrossRef]
  25. Yu, N. A construction of codebooks associated with binary sequences. IEEE Trans. Inf. Theory 2012, 58, 5522–5533. [Google Scholar] [CrossRef]
  26. Heng, Z.; Ding, C.; Yue, Q. New constructions of asymptotically optimal codebooks with multiplicative characters. IEEE Trans. Inf. Theory 2017, 63, 6179–6187. [Google Scholar] [CrossRef]
  27. Heng, Z. Nearly optimal codebooks based on generalized Jacobi sums. Discrete Appl. Math. 2018, 250, 227–240. [Google Scholar] [CrossRef]
  28. Luo, G.J.; Cao, X.W. Two constructions of asymptotically optimal codebooks via the hyper Eisenstein sum. IEEE Trans. Inf. Theory 2018, 64, 6498–6505. [Google Scholar] [CrossRef]
  29. Luo, G.J.; Cao, X.W. New constructions of codebooks asymptotically achieving the Welch bound. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; pp. 2346–2349. [Google Scholar]
  30. Luo, G.J.; Cao, X.W. Two constructions of asymptotically optimal codebooks. Crypt. Commun. 2019, 11, 825–838. [Google Scholar] [CrossRef]
  31. Mohades, M.M.; Mohades, A.; Tadaion, A. A Reed-Solomom Code Based Measurement Matrix with Small Coherence. IEEE Signal Process. Lett. 2014, 21, 839–843. [Google Scholar]
  32. Li, C.J.; Qin, Y.; Huang, Y.W. Two families of nearly optimal codebooks. Des. Codes Cryptogr. 2015, 75, 43–57. [Google Scholar] [CrossRef]
  33. Wu, X.; Lu, W.; Cao, X.W.; Chen, M. Two constructions of asymptotically optimal codebooks via the trace functions. arXiv 2019, arXiv:1905.01815. [Google Scholar]
  34. Lu, W.; Wu, X.; Cao, X.W. Six constructions of asymptotically optimal codebooks via the character sums. arXiv 2019, arXiv:1911.00506. [Google Scholar]
  35. Lidl, R.; Niederreiter, H. Finite Fields; Cambridge University Press: Cambridge, UK, 1997. [Google Scholar]
  36. Wan, D. Generators and irreducible polynomials over finite fields. Math. Comput. 1997, 66, 1195–1212. [Google Scholar] [CrossRef] [Green Version]
Table 1. The parameters of codebooks asymptotically meeting the Welch bound.
Table 1. The parameters of codebooks asymptotically meeting the Welch bound.
Parameters ( N , K ) I max I Welch References
( p n , K )
with odd p, where K = p 1 2 p ( p n + p n / 2 ) + 1
( p + 1 ) p n / 2 2 p K p n K ( p n 1 ) K [24]
( q 2 , ( q 1 ) 2 2 ) , q = p s with odd p q + 1 ( q 1 ) 2 ( q 1 ) q 2 + 2 q 1 q 2 1 [21]
q ( q + 4 ) , ( q + 3 ) ( q + 1 ) 2 , q is a prime power 1 q + 1 q 2 + 4 q 3 ( q 2 + 4 q 1 ) ( q + 3 ) ( q + 1 ) [32]
q , q 1 2 , q is a prime power q + 1 q 1 q + 1 q 1 [32]
( p n 1 , p n 1 2 ) with odd p p n + 1 p n 1 1 p n 1 [25]
( q l + q l 1 1 , q l 1 ) for any l > 2 1 q l 1 q l 1 ( q l + q l 1 1 ) q l 1 [23]
( ( q 1 ) k + q k 1 , q k 1 ),
for any k > 2 and q 4
q k + 1 ( q 1 ) k + ( 1 ) k + 1 ( q 1 ) k ( ( q 1 ) k + q k 1 1 ) q k 1 [26]
( ( q 1 ) k + K , K ), for any k > 2 ,
where K = ( q 1 ) k + ( 1 ) k + 1 q
q k 1 K ( q 1 ) k ( ( q 1 ) k + K 1 ) K [26]
( ( q s 1 ) n + K , K ) , for any s > 1 and n > 1 ,
where K = ( q s 1 ) n + ( 1 ) n + 1 q
q s n + 1 ( q s 1 ) n + ( 1 ) n + 1 ( q s 1 ) n ( ( q s 1 ) n + K 1 ) K [28]
( ( q s 1 ) n + q s n 1 , q s n 1 ) , for any s > 1 and n > 1 q s n + 1 ( q s 1 ) n + ( 1 ) n + 1 ( q s 1 ) n ( ( q s 1 ) n + q s n 1 1 ) q s n 1 [28]
( q 1 , q ( r 1 ) 2 r ) , r = p t , q = r s , with odd p and p s r q ( r 1 ) q r 2 r + q q ( q 2 ) ( r 1 ) [33]
( q 2 , q ( q + 1 ) ( r 1 ) 2 r ) , r = p t , q = r s , with odd p ( r + 1 ) q 2 r K 2 r q ( q + 1 ) ( r 1 ) ( q + 1 ) 2 ( q 1 ) ( r 1 ) [33]
( ( q 1 ) q 2 , ( q 1 ) q ) , q is a prime power 1 q 1 q 1 q 3 q 2 1 [34]
( q 1 , q 1 m 1 ) , q = p t with odd p, m q 1 ( m 1 ) q + 1 q 1 m ( m 1 ) q + 1 ( q 2 ) ( q 1 m ) this paper
( q , q 1 m ) , q = p t with odd p, m q 1 ( m 1 ) q + 1 q 1 ( m 1 ) q + 1 q 1 this paper
( q 1 q 2 , ( q 1 1 ) ( q 2 1 ) m ) , q i = p i t with odd p i ,
m q i 1 , i = 1 , 2
( m 1 ) q 1 q 2 + 1 ( q 1 1 ) ( q 2 1 ) ( m 1 ) q 1 q 2 + q 1 + q 2 1 ( q 1 q 2 1 ) ( q 1 1 ) ( q 2 1 ) this paper
( q 1 , q 1 2 ) , q = p t with odd p 2 q q 1 1 q 2 this paper
( q 1 , q 3 2 ) , q = p t with odd p 2 q q 3 q + 3 ( q 2 ) ( q 3 ) this paper

Share and Cite

MDPI and ACS Style

Wu, X.; Lu, W. Four Constructions of Asymptotically Optimal Codebooks via Additive Characters and Multiplicative Characters. Mathematics 2019, 7, 1144. https://doi.org/10.3390/math7121144

AMA Style

Wu X, Lu W. Four Constructions of Asymptotically Optimal Codebooks via Additive Characters and Multiplicative Characters. Mathematics. 2019; 7(12):1144. https://doi.org/10.3390/math7121144

Chicago/Turabian Style

Wu, Xia, and Wei Lu. 2019. "Four Constructions of Asymptotically Optimal Codebooks via Additive Characters and Multiplicative Characters" Mathematics 7, no. 12: 1144. https://doi.org/10.3390/math7121144

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop