Abstract
In this paper, using additive characters of finite field, we find a codebook which is equivalent to the measurement matrix in Mohades et al. (IEEE Signal Process Lett 21(7):839–843, 2014). The advantage of our construction is that it can be generalized naturally to construct the other five classes of codebooks using additive and multiplicative characters of finite field. We determine the maximum cross-correlation amplitude of these codebooks by the properties of characters and character sums. We prove that all the codebooks we constructed are asymptotically optimal with respect to the Welch bound. The parameters of these codebooks are new.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
An (N, K) codebook \(\mathcal {C}=\{\mathbf {c}_0,\mathbf {c}_1, ...,\mathbf {c}_{N-1}\}\) is a set of N unit-norm complex vectors \(\mathbf {c}_i \in \mathbb {C}^K\) over an alphabet A, where \(i=0, 1, \ldots , N-1\). The size of A is called the alphabet size of \(\mathcal {C}\). As a performance measure of a codebook in practical applications, the maximum cross-correlation magnitude of an (N, K) codebook \(\mathcal {C}\) is defined by
where \(\mathbf {c}_j^H\) denotes the conjugate transpose of the complex vector \(\mathbf {c}_j\). To evaluate an (N, K) codebook \(\mathcal {C}\), it is important to find the minimum achievable \(I_{max}(\mathcal {C})\) or its lower bound. The Welch bound [27] provides a well-known lower bound on \(I_{max}(\mathcal {C})\),
The equality holds if and only if for all pairs of (i, j) with \(i\ne j\)
A codebook \(\mathcal {C}\) achieving the Welch bound equality is called a maximum-Welch-bound-equality (MWBE) codebook [24] or an equiangular tight frame [14]. MWBE codebooks are employed in various applications including code-division multiple-access(CDMA) communication systems [20], communications [24], combinatorial designs [3, 4, 29], packing [2], compressed sensing [1], coding theory [5] and quantum computing [23]. To our knowledge, only the following MWBE codebooks are presented as follows:
-
\((N,N-1)\) MWBE codebooks for \(N>1\) based on discrete Fourier transformation matrices [24, 29] or m-sequences [24];
-
(N, K) MWBE codebooks from conference matrices [2, 25], where \(N=2K=2^{d+1}\) for a positive integer d or \(N=2K=p^d+1\) for an odd prime p and a positive integer d;
-
(N, K) MWBE codebooks based on \((N, K, \lambda )\) difference sets in cyclic groups [29] and abelian groups [3, 4];
-
(N, K) MWBE codebooks from \((2, k, \nu )\)-Steiner systems [7];
-
(N, K) MWBE codebooks depended on graph theory and finite geometries [6, 8, 9, 22].
The construction of an MWBE codebook is known to be very hard in general, and the known classes of MWBE codebooks only exist for very restrictive N and K. Many researches have been done instead to construct asymptotically optimal codebooks, i.e., codebook \(\mathcal {C}\) whose \(I_{max}(\mathcal {C})\) asymptotically achieves the Welch bound. In [24], Sarwate gave some asymptotically optimal codebooks from codes and signal sets. As an extension of the optimal codebooks based on difference sets, various types of asymptotically optimal codebooks based on almost difference sets, relative difference sets and cyclotomic classes were proposed, see [3, 13, 31,32,33]. Asymptotically optimal codebooks constructed from binary row selection sequences were presented in [12, 30]. In [10, 11, 17,18,19], some asymptotically optimal codebooks were constructed via Jacobi sums and hyper Eisenstein sum.
In [21], the authors combined a Reed–Solomon generator matrix with itself by the tensor product and employed this generated matrix to construct a complex measurement matrix. They proved that this matrix is asymptotically optimal according to the Welch bound. In this paper, we find a codebook which is equivalent to the measurement matrix in [21]. The codebook is actually the first construction in Sect. 3, using additive characters of finite field. The advantage of our construction is that it can be generalized naturally to construct the other five classes of codebooks using additive and multiplicative characters of finite field. We determine the maximum cross-correlation amplitude of these codebooks by the properties of characters and character sums. All of these codebooks we constructed are asymptotically optimal according to the Welch bound. As a comparison, in Table 1, we list the parameters of some known classes of asymptotically optimal codebooks and those of the new ones.
This paper is organized as follows. In Sect. 2, we recall some notations and basic results which will be needed in our discussion. In Sect. 3, we present our six constructions of asymptotically optimal codebooks. In Sect. 4, we derive another family of codebooks, which are also asymptotically optimal. In Sect. 5, we conclude this paper.
2 Preliminaries
In this section, we introduce some basic results on characters and character sums over finite fields, which will play important roles in the constructions of codebooks.
In this paper, we set q be a power of a prime p, and \(\mathbb {F}_q\) be a finite field with q elements. For a set E, \(\#E\) denotes the cardinality of E.
2.1 Characters over finite fields
Let \(\mathbb {F}_q\) be a finite field. In this subsection, we recall the definitions of the additive and multiplicative characters of \(\mathbb {F}_q\).
For each \(a\in \mathbb {F}_q\), an additive character of \(\mathbb {F}_q\) is defined by the function \(\chi _a(x)=\zeta _p^{{\text {Tr}}_{q/p}(ax)}\), where \(\zeta _p\) is a primitive p-th root of complex unity and \({\text {Tr}}_{q/p}(\cdot )\) is the trace function from \(\mathbb {F}_q\) to \(\mathbb {F}_p\). By the definition, \(\chi _a(x)=\chi _1(ax)\). When \(a=0\), we call \(\chi _0\) the trivial additive character of \(\mathbb {F}_q\). When \(a=1\), we call \(\chi _1\) the canonical additive character of \(\mathbb {F}_q\). Let \(\widehat{\mathbb {F}_q}\) be the set of all additive characters of \(\mathbb {F}_q\). The orthogonal relation of additive characters (see [16]) is given by
As in [16], the multiplicative characters of \(\mathbb {F}_q\) is defined as follows. For \(j=0,1,...,q-2\), the functions \(\varphi _j\) defined by
are all the multiplicative characters of \(\mathbb {F}_q\), where \(\alpha \) is a primitive element of \(\mathbb {F}_q^*\), and \(0\le i\le q-2\). If \(j=0\), we have \(\varphi _0(x)=1\) for any \(x\in \mathbb {F}_q^*\), \(\varphi _0\) is called the trivial multiplicative character of \(\mathbb {F}_q\). Let \(\widehat{\mathbb {F}_q^*}\) be the set of all the multiplicative characters of \(\mathbb {F}_q^*\).
Let \(\varphi \) be a multiplicative character of \(\mathbb {F}_q\). The orthogonal relation of multiplicative characters (see [16]) is given by
2.2 Character sums over finite fields
2.2.1 Gauss sum
Let \(\varphi \) be a multiplicative character of \(\mathbb {F}_q\) and \(\chi \) an additive character of \(\mathbb {F}_q\). Then the Gauss sum over \(\mathbb {F}_q\) is given by
For simplicity, we write \(G(\varphi ,\chi _1)\) over \(\mathbb {F}_q\) simply as \(g(\varphi )\). It is easy to see the absolute value of \(G(\varphi ,\chi )\) is at most \(q-1\), but is much smaller in general. The following lemma shows all the cases.
Lemma 2.1
[16, Theorem 5.11] Let \(\varphi \) be a multiplicative character and \(\chi \) an additive character of \(\mathbb {F}_q\). Then the Gauss sum \(G(\varphi ,\chi )\) over \(\mathbb {F}_q\) satisfies
For \(\varphi \ne \varphi _0\) and \(\chi \ne \chi _0\), we have \(\left| G(\varphi ,\chi )\right| =\sqrt{q}\).
Lemma 2.2
[16] Gauss sums for the finite field \(\mathbb {F}_q\) satisfy the following property:
\(G(\varphi ,\chi _{ab})=\overline{\varphi }(a)G(\varphi ,\chi _{b})\) for \(a\in \mathbb {F}_q^*\), \(b\in \mathbb {F}_q\), where \(\overline{\varphi }\) denotes the complex conjugate of \(\varphi \).
2.2.2 Jacobi sum
The definition of a multiplicative character \(\varphi \) can be extended as follows.
Let \(\varphi _1\) and \(\varphi _2\) be multiplicative characters of \(\mathbb {F}_q\). The sum
is called a Jacobi sum in \(\mathbb {F}_q\).
The values of Jacobi sums are given as follows.
Lemma 2.3
[16, Theorem 5.19, Theorem 5.20] For the values of Jacobi sums, we have the following results.
-
(1)
If \(\varphi _1\) and \(\varphi _2\) are trivial, then \(J(\varphi _1,\varphi _2)=q\).
-
(2)
If one of the \(\varphi _1\) and \(\varphi _2\) is trivial, the other is nontrivial, \(J(\varphi _1,\varphi _2)=0\).
-
(3)
If \(\varphi _1\) and \(\varphi _2\) are both nontrivial and \(\varphi _1\varphi _2\) is nontrivial, then \(|J(\varphi _1,\varphi _2)|=\sqrt{q}\).
-
(4)
If \(\varphi _1\) and \(\varphi _2\) are both nontrivial and \(\varphi _1\varphi _2\) is trivial, then \(|J(\varphi _1,\varphi _2)|=1\).
2.3 A general construction of codebooks
Let D be a set and \(K=\#D\). Let E be a set of some functions which satisfy
A general construction of codebooks is stated as follows in the complex plane,
3 Six constructions of codebooks
In [21], the authors combined a Reed–Solomon generator matrix with itself by the tensor product and employed this generated matrix to construct a complex measurement matrix. They proved that this matrix is asymptotically optimal according to the Welch bound. In this paper, we find a codebook which is equivalent to the measurement matrix in [21]. The codebook is actually the first construction in Sect. 3, which has been obtained in [26] recently. The advantage of the first construction is that it can be generalized naturally to construct the other five classes of asymptotically optimal codebooks using additive and multiplicative characters of finite field.
3.1 The first construction of codebooks
Let
Then \(\#D_1=q^2\).
The codebook \(\mathcal {C}_1\) is constructed as
We can derive the following Theorem.
Theorem 3.1
([26, Theorem 1]) \(\mathcal {C}_1\) is a codebook with \(N_1=q^3\), \(K_1=q^2\) and \(I_{max}(\mathcal {C}_1)=\frac{1}{q}\).
Theorem 3.2
([26, Remark 1]) Let \(I_{W1}\) be the Welch bound equality, for the given \(N_1\), \(K_1\) in the current section. We have
then the codebooks we proposed are asymptotically optimal.
When codebooks employed in practical applications, only those with only a few correlation values are interesting. The distribution of correlation magnitudes of \(\mathcal {C}_1\) is given as follows.
Corollary 3.3
([26, Theorem 1])
3.2 The second construction of codebooks
Let
Then \(\#D_2=(q-1)q\).
The codebook \(\mathcal {C}_2\) is constructed as
We can derive the following Theorem.
Theorem 3.4
\(\mathcal {C}_2\) is a codebook with \(N_2=(q-1)q^2\), \(K_2=(q-1)q\) and \(I_{max}(\mathcal {C}_2)=\frac{1}{q-1}\).
Proof
By the definition of \(\mathcal {C}_2\), it contains \((q-1)q^2\) codewords of length \((q-1)q\). Then it is easy to see \(N_2=(q^2-1)q\) and \(K_2=(q-1)q\). Let \(\mathbf {c}\) and \(\mathbf {c}'\) be any different codewords in \(\mathcal {C}_2\), \(\mathbf {c}=\frac{1}{\sqrt{K_2}}(\varphi _j(x)\chi _{b_1}(y)\chi _{c_1}(z))_{(x,y,z)\in D_2}\) and \(\mathbf {c}'=\frac{1}{\sqrt{K_2}}(\varphi _k(x)\chi _{b_2}(y)\chi _{c_2}(z))_{(x,y,z)\in D_2}\), where \(\varphi _j,\varphi _k\in \widehat{\mathbb {F}_q^*},b_1,b_2,c_1,c_2\in \mathbb {F}_q\). Then the correlation of \(\mathbf {c}\) and \(\mathbf {c}'\) is as follows.
The last equation holds by the orthogonal relation of additive characters.
When \(b\ne 0\) and \(c\ne 0\), we have
When \(b\ne 0\), \(c=0\), or \(b=0, c\ne 0\), it is easy to see \(\mathbf {c}\mathbf {c}'^H=0\).
When \(b=0\) and \(c=0\), since \(\mathbf {c}\ne \mathbf {c}'\), \(\varphi \) is nontrivial. We have
by the orthogonal relation of multiplicative characters.
Therefore, we have
\(\square \)
Using Theorem 3.4, we can derive the ratio of \(I_{max}(\mathcal {C}_2)\) of the proposed codebooks to that of the MWBE codebooks and show the asymptotic optimality of the proposed codebooks as in the following theorem.
Theorem 3.5
Let \(I_{W2}\) be the Welch bound equality, for the given \(N_2\), \(K_2\) in the current section. We have
then the codebooks we proposed are asymptotically optimal.
Proof
Note that \(N_2=(q-1)q^2\) and \(K_2=(q-1)q\). Then the corresponding Welch bound is
we have
It is obvious that \(\lim _{q\rightarrow +\infty }\frac{I_{max}(\mathcal {C}_2)}{I_{W2}}=1\). The codebook \(\mathcal {C}_2\) asymptotically meets the Welch bound. This completes the proof. \(\square \)
In Table 2, we provide some explicit values of the parameters of the codebooks we proposed for some given q, and corresponding numerical data of the Welch bound for comparison. The numerical results show that the codebooks \(\mathcal {C}_2\) asymptotically meet the Welch bound.
The distribution of correlation magnitudes of \(\mathcal {C}_2\) is given as follows.
Corollary 3.6
Example 1
Let \(q=p=3\). Then
and \(K_2=\#D_2=6\). Let \(\zeta =\zeta _3\). Thus, the set \(\mathcal {C}_2\) consists of the following 18 codewords of length 6:
It is easy to verify that this codebook is a (18, 6) codebook with \(I_{max}=\frac{1}{2}\). This is consistent with the conclusion of Theorem 3.5.
3.3 The third construction of codebooks
Let
Then \(\#D_3=(q-1)^2\).
The codebook \(\mathcal {C}_3\) is constructed as
We can derive the following Theorem.
Theorem 3.7
\(\mathcal {C}_3\) is a codebook with \(N_3=q^2(q-1)\), \(K_3=(q-1)^2\) and \(I_{max}(\mathcal {C}_3)=\frac{q}{(q-1)^2}\).
Proof
By the definition of \(\mathcal {C}_3\), it contains \(q^2(q-1)\) codewords of length \((q-1)^2\). Then it is easy to see \(N_3=q^2(q-1)\) and \(K_3=(q-1)^2\). Let \(\mathbf {c}\) and \(\mathbf {c}'\) be any different codewords in \(\mathcal {C}_3\), \(\mathbf {c}=\frac{1}{q-1}(\chi _{a_1}(x)\chi _{b_1}(y)\varphi _j(z))_{(x,y,z)\in D_3}\) and \(\mathbf {c}'=\frac{1}{q-1}(\chi _{a_2}(x)\chi _{b_2}(y)\varphi _k(z))_{(x,y,z)\in D_3}\), where \(a_1,a_2,b_1,b_2\in \mathbb {F}_q, \varphi _j,\varphi _k\in \widehat{\mathbb {F}_q^*}\). Then the correlation of \(\mathbf {c}\) and \(\mathbf {c}'\) is as follows.
When \(\varphi \) is trivial, since \(\mathbf {c}\ne \mathbf {c}'\), we get \(a\ne 0\) or \(b\ne 0\). By Lemma 2.1, we have
When \(\varphi \) is nontrivial, by Lemmas 2.1 and 2.2, we have
Therefore, we have
\(\square \)
Using Theorem 3.7, we can derive the ratio of \(I_{max}(\mathcal {C}_3)\) of the proposed codebooks to that of the MWBE codebooks and show the asymptotic optimality of the proposed codebooks as in the following theorem.
Theorem 3.8
Let \(I_{W3}\) be the Welch bound equality, for the given \(N_3\), \(K_3\) in the current section. We have
then the codebooks we proposed are asymptotically optimal.
Proof
Note that \(N_3=(q-1)q^2\) and \(K_3=(q-1)^2\). Then the corresponding Welch bound is
we have
It is obvious that \(\lim _{q\rightarrow +\infty }\frac{I_{max}(\mathcal {C}_3)}{I_{W3}}=1\). The codebook \(\mathcal {C}_3\) asymptotically meets the Welch bound. This completes the proof. \(\square \)
In Table 3, we provide some explicit values of the parameters of the codebooks we proposed for some given q, and corresponding numerical data of the Welch bound for comparison. The numerical results show that the codebooks \(\mathcal {C}_3\) asymptotically meet the Welch bound.
The distribution of correlation magnitudes of \(\mathcal {C}_3\) is given as follows.
Corollary 3.9
3.4 The fourth construction of codebooks
Let
Then \(\#D_4=(q-1)^2\).
The codebook \(\mathcal {C}_4\) is constructed as
We can derive the following Theorem.
Theorem 3.10
\(\mathcal {C}_4\) is a codebook with \(N_4=(q-1)^2q\), \(K_4=(q-1)^2\) and \(I_{max}(\mathcal {C}_4)=\frac{q}{(q-1)^2}\).
Proof
By the definition of \(\mathcal {C}_4\), it contains \((q-1)^2q\) codewords of length \((q-1)^2\). Then it is easy to see \(N_4=(q-1)^2q\) and \(K_4=(q-1)^2\). Let \(\mathbf {c}\) and \(\mathbf {c}'\) be any different codewords in \(\mathcal {C}_4\), \(\mathbf {c}=\frac{1}{q-1}(\varphi _s(x)\varphi _t(y)\chi _{c_1}(z))_{(x,y,z)\in D_4}\) and \(\mathbf {c}'=\frac{1}{q-1}(\varphi _s'(x)\varphi _t'(y)\chi _{c_2}(z))_{(x,y,z)\in D_4}\), where \(\varphi _s,\varphi _t,\varphi _s',\varphi _t'\in \widehat{\mathbb {F}_q^*},c_1,c_2\in \mathbb {F}_q\). Then the correlation of \(\mathbf {c}\) and \(\mathbf {c}'\) is as follows.
When \(c=0\), since \(\mathbf {c}\ne \mathbf {c}'\), at least one of \(\varphi \) and \(\varphi '\) is nontrivial. By Lemma 2.1, we have
When \(c\ne 0\), by Lemmas 2.1 and 2.2, we have
Therefore, we have
\(\square \)
Using Theorem 3.10, we can derive the ratio of \(I_{max}(\mathcal {C}_4)\) of the proposed codebooks to that of the MWBE codebooks and show the asymptotic optimality of the proposed codebooks as in the following theorem.
Theorem 3.11
Let \(I_{W4}\) be the Welch bound equality, for the given \(N_4\), \(K_4\) in the current section. We have
then the codebooks we proposed are asymptotically optimal.
Proof
Note that \(N_4=(q-1)^2 q\) and \(K_4=(q-1)^2\). Then the corresponding Welch bound is
we have
It is obvious that \(\lim _{q\rightarrow +\infty }\frac{I_{max}(\mathcal {C}_4)}{I_{W4}}=1\). The codebook \(\mathcal {C}_4\) asymptotically meets the Welch bound. This completes the proof. \(\square \)
In Table 4, we provide some explicit values of the parameters of the codebooks we proposed for some given q, and corresponding numerical data of the Welch bound for comparison. The numerical results show that the codebooks \(\mathcal {C}_4\) asymptotically meet the Welch bound.
The distribution of correlation magnitudes of \(\mathcal {C}_4\) is given as follows.
Corollary 3.12
3.5 The fifth construction of codebooks
Let
Then \(\#D_5=(q-1)(q-2)\).
The codebook \(\mathcal {C}_5\) is constructed as
We can derive the following Theorem.
Theorem 3.13
\(\mathcal {C}_5\) is a codebook with \(N_5=(q-1)^2q\), \(K_5=(q-1)(q-2)\) and \(I_{max}(\mathcal {C}_5)=\frac{q}{(q-1)(q-2)}\).
Proof
By the definition of \(\mathcal {C}_5\), it contains \((q-1)^2q\) codewords of length \((q-1)(q-2)\). Then it is easy to see \(N_5=(q-1)^2q\) and \(K_5=(q-1)(q-2)\). Let \(\mathbf {c}\) and \(\mathbf {c}'\) be any different codewords in \(\mathcal {C}_5\), \(\mathbf {c}=\frac{1}{\sqrt{(q-1)(q-2)}}(\chi _{a_1}(x)\varphi _s(y)\varphi _t(z))_{(x,y,z)\in D_5}\) and \(\mathbf {c}'=\frac{1}{\sqrt{(q-1)(q-2)}}(\chi _{a_2}(x)\varphi _s'(y)\varphi _t'(z))_{(x,y,z)\in D_5}\), where \(\varphi _s,\varphi _t,\varphi _s',\varphi _t'\in \widehat{\mathbb {F}_q^*},a_1,a_2\in \mathbb {F}_q\). Then the correlation of \(\mathbf {c}\) and \(\mathbf {c}'\) is as follows.
When \(a=0\), since \(\mathbf {c}\ne \mathbf {c}'\), at least one of \(\varphi \) and \(\varphi '\) is nontrivial, by Lemmas 2.1 and 2.3, we have
When \(a\ne 0\), by Lemmas 2.1 and 2.3, we have
Therefore, we have
the maximal value obtained when all of \(\varphi , \varphi '\) and \(\varphi \varphi '\) are nontrivial. \(\square \)
Using Theorem 3.13, we can derive the ratio of \(I_{max}(\mathcal {C}_5)\) of the proposed codebooks to that of the MWBE codebooks and show the asymptotic optimality of the proposed codebooks as in the following theorem.
Theorem 3.14
Let \(I_{W5}\) be the Welch bound equality, for the given \(N_5\), \(K_5\) in the current section. We have
then the codebooks we proposed are asymptotically optimal.
Proof
Note that \(N_5=(q-1)^2 q\) and \(K_5=(q-1)(q-2)\). Then the corresponding Welch bound is
we have
It is obvious that \(\lim _{q\rightarrow +\infty }\frac{I_{max}(\mathcal {C}_5)}{I_{W5}}=1\). The codebook \(\mathcal {C}_5\) asymptotically meets the Welch bound. This completes the proof. \(\square \)
In Table 5, we provide some explicit values of the parameters of the codebooks we proposed for some given q, and corresponding numerical data of the Welch bound for comparison. The numerical results show that the codebooks \(\mathcal {C}_5\) asymptotically meet the Welch bound.
The distribution of correlation magnitudes of \(\mathcal {C}_5\) is given as follows.
Corollary 3.15
3.6 The sixth construction of codebooks
Let
Then \(\#D_6=(q-2)^2\).
The codebook \(\mathcal {C}_6\) is constructed as
We can derive the following Theorem.
Theorem 3.16
\(\mathcal {C}_6\) is a codebook with \(N_6=(q-1)^3\), \(K_6=(q-2)^2\) and \(I_{max}(\mathcal {C}_6)=\frac{q}{(q- 2)^2}\).
Proof
By the definition of \(\mathcal {C}_6\), it contains \((q-1)^3\) codewords of length \((q-2)^2\). Then it is easy to see \(N_6=(q-1)^3\) and \(K_6=(q-2)^2\). Let \(\mathbf {c}\) and \(\mathbf {c}'\) be any different codewords in \(\mathcal {C}_6\), \(\mathbf {c}=\frac{1}{q-2}(\varphi _s(x)\varphi _u(y)\varphi _v(z))_{(x,y,z)\in D_6}\) and \(\mathbf {c}'=\frac{1}{q-2}(\varphi _s'(x)\varphi _u'(y)\varphi _v'(z))_{(x,y,z)\in D_6}\), where \(\varphi _s,\varphi _u,\varphi _v,\varphi _s',\varphi _u',\varphi _v'\in \widehat{\mathbb {F}_q^*}\). Then the correlation of \(\mathbf {c}\) and \(\mathbf {c}'\) is as follows.
When \(\varphi _k\) is trivial, since \(\mathbf {c}\ne \mathbf {c}'\), at least one of \(\varphi _i\) and \(\varphi _j\) is nontrivial. By Lemma 2.3, we have
When \(\varphi _k\) is nontrivial, by Lemma 2.3, we have
Therefore, we have
the maximal value obtained when all of \(\varphi _i,\varphi _j,\varphi _k,\varphi _i\varphi _k\) and \(\varphi _j\varphi _k\) are nontrivial. \(\square \)
Using Theorem 3.16, we can derive the ratio of \(I_{max}(\mathcal {C}_6)\) of the proposed codebooks to that of the MWBE codebooks and show the asymptotic optimality of the proposed codebooks as in the following theorem.
Theorem 3.17
Let \(I_{W6}\) be the Welch bound equality, for the given \(N_6\), \(K_6\) in the current section. We have
then the codebooks we proposed are asymptotically optimal.
Proof
Note that \(N_6=(q-1)^3\) and \(K_6=(q-2)^2\). Then the corresponding Welch bound is
we have
It is obvious that \(\lim _{q\rightarrow +\infty }\frac{I_{max}(\mathcal {C}_6)}{I_{W6}}=1\). The codebook \(\mathcal {C}\) asymptotically meets the Welch bound. This completes the proof. \(\square \)
In Table 6, we provide some explicit values of the parameters of the codebooks we proposed for some given q, and corresponding numerical data of the Welch bound for comparison. The numerical results show that the codebooks \(\mathcal {C}_6\) asymptotically meet the Welch bound.
The distribution of correlation magnitudes of \(\mathcal {C}_6\) is given as follows.
Corollary 3.18
4 Another family of codebooks
Based on the six constructions of codebooks in Sect. 3, more new codebooks can be derived, which are also asymptotically optimal.
Let \(\mathcal {E}_n\) denote the set formed by the standard basis of the n-dimensional Hilbert space:
Combining with the preceding six constructions, we get the following result.
Theorem 4.1
Let \(\mathcal {C}'_i=\mathcal {C}_i\cup \mathcal {E}_{K_i}\). Then the codebooks \(\mathcal {C}'_i\) are all asymptotically optimal, \(i=1,2,3,4,5,6\), and the parameters of the new codebooks are as follows:
\(N_i'=N_i+K_i\), \(K_i'=K_i\) and \(I_{max}(\mathcal {C}_i')=I_{max}(\mathcal {C}_i)\). Specifically,
-
(1)
\(N_1'=N_1+K_1=q^3+q^2\), \(K_1'=K_1=q^2\) and \(I_{max}(\mathcal {C}_1')=I_{max}(\mathcal {C}_1)=\frac{1}{q}\);
-
(2)
\(N_2'=N_2+K_2=(q^2-1)\), \(K_2'=K_2=(q-1)q\) and \(I_{max}(\mathcal {C}_2')=I_{max}(\mathcal {C}_2)=\frac{1}{q-1}\);
-
(3)
\(N_3'=N_3+K_3=q^3-2q+1\), \(K_3'=K_3=(q-1)^2\) and \(I_{max}(\mathcal {C}_3')=I_{max}(\mathcal {C}_3)=\frac{q}{(q-1)^2}\);
-
(4)
\(N_4'=N_4+K_4=q^3-q^2-q+1\), \(K_4'=K_4=(q-1)^2\) and \(I_{max}(\mathcal {C}_4')=I_{max}(\mathcal {C}_4)=\frac{q}{(q-1)^2}\);
-
(5)
\(N_5'=N_5+K_5=q^3-q^2-2q+2\), \(K_5'=K_5=(q-1)(q-2)\) and \(I_{max}(\mathcal {C}_5')=I_{max}(\mathcal {C}_5)=\frac{q}{(q-1)(q-2)}\);
-
(6)
\(N_5'=N_6+K_6=q^3-2q^2-q+3\), \(K_6'=K_6=(q-2)^2\) and \(I_{max}(\mathcal {C}_5')=I_{max}(\mathcal {C}_5)=\frac{q}{(q-2)^2}\).
Proof
We only prove the case when \(i=2\), the other cases can be proved as a similar way. It is easy to see \(N_2'=N_2+K_2=(q^2-1)q\) and \(K_2'=K_2=(q-1)q\). Let \(\mathbf {c}\) and \(\mathbf {c}'\) be any different codewords in \(\mathcal {C}_2'\), the correlation of \(\mathbf {c}\) and \(\mathbf {c}'\) can be discussed in the following cases.
Case 1: If \(\mathbf {c}\), \(\mathbf {c}'\in \ \mathcal {C}_2\), by Theorem 3.4, we have
Case 2: If \(\mathbf {c}\in \mathcal {C}_2\) and \(\mathbf {c}'\in \mathcal {E}_{(q-1)q}\) (or \(\mathbf {c}'\in \mathcal {C}_2\) and \(\mathbf {c}\in \mathcal {E}_{(q-1)q}\)), it is easy to see
Case 3: If \(\mathbf {c}\) and \(\mathbf {c}'\in \mathcal {E}_{(q-1)q}\), it is obvious that \(\mathbf {c}\mathbf {c}'^H=0.\)
From the above three cases, we have
Note that \(N_2'=(q^2-1)q\) and \(K_2'=(q-1)q\), then the corresponding Welch bound is
we have
It is obvious that \(\lim _{q\rightarrow +\infty }\frac{I_{max}(\mathcal {C}_2')}{I_W}=1\). The codebook \(\mathcal {C}_2'\) asymptotically meets the Welch bound. This completes the proof. \(\square \)
5 Concluding remarks
In this paper, we presented six constructions of codebooks asymptotically achieve the Welch bounds with additive characters, multiplicative characters and character sums of finite fields. Actually, the first construction in our paper is equivalent to the measurement matrix in [21]. The advantage of our construction is that it can be generalized naturally to the other five constructions of codebooks which are also asymptotically optimal.
References
Candes E., Wakin M.: An introduction to compressive sampling. IEEE Signal Process. Mag. 25(2), 21–30 (2008).
Conway J., Harding R., Sloane N.: Packing lines, planes, etc.: packings in Grassmannian spaces. Exp. Math. 5(2), 139–159 (1996).
Ding C.: Complex codebooks from combinatorial designs. IEEE Trans. Inf. Theory 52(9), 4229–4235 (2006).
Ding C., Feng T.: A generic construction of complex codebooks meeting the Welch bound. IEEE Trans. Inf. Theory 53(11), 4245–4250 (2007).
Delsarte P., Goethals J., Seidel J.: Spherical codes and designs. Geom. Dedic. 67(3), 363–388 (1997).
Fickus M., Mixon D.: Tables of the existence of equiangular tight frames (2016). arXiv:1504.00253v2.
Fickus M., Mixon D., Tremain J.: Steiner equiangular tight frames. Linear Algebr. Appl. 436(5), 1014–1027 (2012).
Fickus M., Mixon D., Jasper J.: Equiangular tight frames from hyperovals. IEEE Trans. Inf. Theory 62(9), 5225–5236 (2016).
Fickus M., Jasper J., Mixon D., Peterson J.: Tremain equiangular tight frames (2016). arXiv:1602.03490v1.
Heng Z.: Nearly optimal codebooks based on generalized Jacobi sums. Discret. Appl. Math. 250, 227–240 (2018).
Heng Z., Ding C., Yue Q.: New constructions of asymptotically optimal codebooks with multiplicative characters. IEEE Trans. Inf. Theory 63(10), 6179–6187 (2017).
Hong S., Park H., Helleseth T., Kim Y.: Near optimal partial Hadamard codebook construction using binary sequences obtained from quadratic residue mapping. IEEE Trans. Inf. Theory 60(6), 3698–3705 (2014).
Hu H., Wu J.: New constructions of codebooks nearly meeting the Welch bound with equality. IEEE Trans. Inf. Theory 60(2), 1348–1355 (2014).
Kovacevic J., Chebira A.: An introduction to frames. Found. Trends Signal Process. 2(1), 1–94 (2008).
Li C., Qin Y., Huang Y.: Two families of nearly optimal codebooks. Des. Codes Cryptogr. 75(1), 43–57 (2015).
Lidl R., Niederreiter H.: Finite Fields. Cambridge University Press, Cambridge (1997).
Luo G., Cao X.: Two constructions of asymptotically optimal codebooks via the hyper Eisenstein sum. IEEE Trans. Inf. Theory 64(10), 6498–6505 (2018).
Luo G., Cao X.: New constructions of codebooks asymptotically achieving the Welch bound. In: Proceedings of IEEE International Symposium on Information Theory, Vail, CO, pp. 2346–2349 (2018).
Luo G., Cao X.: Two constructions of asymptotically optimal codebooks. Crypt. Commun. (2018). https://doi.org/10.1007/s12095-018-0331-4.
Massey J., Mittelholzer T.: Welch’s Bound and Sequence Sets for Code-Division Multiple-Access Systems: Sequences II, pp. 63–78. Springer, New York (1999).
Mohades M., Mohades A., Tadaion A.: A Reed-Solomom code based measurement matrix with small coherence. IEEE Signal Process. Lett. 21(7), 839–843 (2014).
Rahimi F.: Covering graphs and equiangular tight frames. Ph.D. Thesis, University of Waterloo, Ontario (2016). http://hdl.handle.net/10012/10793.
Renes J., Blume-Kohout R., Scot A., Caves C.: Symmetric informationally complete quantum measurements. J. Math. Phys. 45(6), 2171–2180 (2004).
Sarwate D.: Meeting the Welch Bound with Equality, pp. 63–79. Springer, New York (1999).
Strohmer T., Heath R.: Grassmannian frames with applications to coding and communication. Appl. Comput. Harmon. Anal. 14(3), 257–275 (2003).
Tian L., Li Y., Liu T., Xu C.: Constructions of codebooks asymptotically achieving the Welch bound with additive characters. IEEE Signal Process. Lett. 26(4), 622–626 (2019).
Welch L.: Lower bounds on the maximum cross correlation of signals. IEEE Trans. Inf. Theory 20(3), 397–399 (1974).
Wu X., Lu W., Cao X., Chen M.: Two constructions of asymptotically optimal codebooks via the trace functions (2019). arXiv:1905.01815.
Xia P., Zhou S., Giannakis G.: Achieving the Welch bound with difference sets. IEEE Trans. Inf. Theory 51(5), 1900–1907 (2005).
Yu N.: A construction of codebooks associated with binary sequences. IEEE Trans. Inf. Theory 58(8), 5522–5533 (2012).
Zhang A., Feng K.: Two classes of codebooks nearly meeting the Welch bound. IEEE Trans. Inf. Theory 58(4), 2507–2511 (2012).
Zhang A., Feng K.: Construction of cyclotomic codebooks nearly meeting the Welch bound. Des. Codes Cryptogr. 63(2), 209–224 (2013).
Zhou Z., Tang X.: New nearly optimal codebooks from relative difference sets. Adv. Math. Commun. 5(3), 521–527 (2011).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by T. Helleseth.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This work was supported by the National Natural Science Foundation of China (Grant Nos. 11971102, 11801070, 11771007, and 61572027) and the Basic Research Foundation (Natural Science).
Rights and permissions
About this article
Cite this article
Lu, W., Wu, X., Cao, X. et al. Six constructions of asymptotically optimal codebooks via the character sums. Des. Codes Cryptogr. 88, 1139–1158 (2020). https://doi.org/10.1007/s10623-020-00735-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-020-00735-w