Abstract
In this paper, we present two new constructions of complex codebooks with multiplicative characters, additive characters and trace functions over finite fields, and determin the maximal cross-correlation amplitude of these codebooks. We prove that the codebooks we constructed are asymptotically optimal with respect to the Welch bound. Moreover, in the first construction, we generalize the result in Zhang and Feng (IEEE Trans. Inform. Theory 58(4), 2507–2511, 2012). In the second construction, we generalize the results in Hong et al. (IEEE Trans. Inf. Theory 60(6), 3698–3705, 2014), we can asymptotically achieve Welch bound for any odd prime p, we also derive the whole distribution of their inner products. The parameters of these codebooks are new.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
An (N,K) codebook \({\mathcal C}=\{\mathbf {c}_{0},\mathbf {c}_{1}, ...,\mathbf {c}_{N-1}\}\) is a set of N unit-norm complex vectors \(\mathbf {c}_{i} \in \mathbb {C}^{K}\) over an alphabet A, where i = 0,1,…,N − 1. The size of A is called the alphabet size of \({\mathcal C}\). As a performance measure of a codebook in practical applications, the maximum magnitude of inner products between a pair of distinct vectors in \({\mathcal C}\) is defined by
where \(\mathbf {c}_{j}^{H}\) denotes the conjugate transpose of the complex vector cj. To evaluate an (N,K) codebook \({\mathcal C}\), it is important to find the minimun achievable \(I_{max}({\mathcal C})\) or its lower bound. The Welch bound [27] provides a well-known lower bound on \(I_{max}({\mathcal C})\),
The equality holds if and only if for all pairs of (i,j) with i≠j
A codebook \({\mathcal C}\) achieving the Welch bound equality is called a maximum-Welch-bound-equality (MWBE) codebook [25] or an equiangular tight frame [15]. MWBE codebooks are employed in various applications including code-division multiple-access(CDMA) communication systems [22], communications [25], combinatorial designs [3, 4, 28], packing [2], compressed sensing [1], coding theory [5] and quantum computing [23]. To our knowledge, only the following MWBE codebooks are presented as follows:
-
(N,N − 1) MWBE codebooks for N > 1 based on discrete Fourier transformation matrices [25, 28] or m-sequences [25];
-
(N,K) MWBE codebooks from conference matrices [2, 26], where N = 2K = 2d+ 1 for a positive integer d or N = 2K = pd + 1 for a prime p and a positive integer d;
-
(N,K) MWBE codebooks based on (N,K,λ) difference sets in cyclic groups [28] and abelian groups [3, 4];
-
(N,K) MWBE codebooks from (2,k,ν)-Steiner systems [6];
-
(N,K) MWBE codebooks depended on graph theory and finite geometries [7,8,9, 24].
The construction of an MWBE codebook is known to be very hard in general, and the known classes of MWBE codebooks only exist for very restrictive N and K. Many researches have been done instead to construct asymptotically optimal codebooks, i.e., codebook \({\mathcal C}\) whose \(I_{max}({\mathcal C})\) asymptotically achieves the Welch bound. In [25], Sarwate gave some asymptotically optimal codebooks from codes and signal sets. As an extension of the optimal codebooks based on difference sets, various types of asymptotically optimal codebooks based on almost difference sets, relative difference sets and cyclotomic classes were proposed, see [3, 11, 30,31,32]. Asymptotically optimal codebooks constructed from binary row selection sequences were presented in [12, 29]. In [13, 14, 17,18,19,20], some asymptotically optimal codebooks were constructed via Jacobi sums and hyper Eisenstein sum.
In this paper, we present two new constructions of complex codebooks with multiplicative characters, additive characters and trace functions over finite fields, and determine the maximal cross-correlation amplitude of these codebooks. The key ideas in our new constructions are based on transitivity of trace and the Fourier expansion of characters. We prove that the codebooks we constructed are asymptotically optimal with respect to the Welch bound. Moreover, in the second construction, we also derive the whole distribution of their inner products. As a comparison, in Table 1, we list the parameters of some known classes of asymptotically optimal codebooks and those of the new ones.
This paper is organized as follows. In Section 2, we recall some notations and basic results which will be needed in our discussion. In Section 3, we present our first construction of codebooks. In Section 4, we present our second construction of codebooks. In Section 5, we conclude this paper.
2 Preliminaries
In this section, we introduce some basic results on trace functions, characters and character sums over finite fields, which will be needed in the following sections.
2.1 Trace functions of finite fields
Let \({\mathbb F}_{p}\), \({\mathbb F}_{r}\) and \({\mathbb F}_{q}\) be finite fields, with \({\mathbb F}_{p}\subseteq {\mathbb F}_{r}\subseteq {\mathbb F}_{q}\). Let Trq/r(⋅) be the trace functions from \({\mathbb F}_{q}\) to \({\mathbb F}_{r}\). with
Transitivity of trace in [21] is stated as
it plays an important role in our constructions.
2.2 Characters over finite fields
Let \({\mathbb F}_{q}\) be a finite field. In this subsection, we recall the definitions of the additive and multiplicative characters of \({\mathbb F}_{q}\).
For each \(a\in \mathbb {F}_{q}\), an additive character of \(\mathbb {F}_{q}\) is defined by the function \(\chi _{a}(x)=\zeta _{p}^{{\operatorname {Tr}}_{q/p}(ax)}\), where ζp is a primitive p-th root of complex unity. By the definition, χa(x) = χ1(ax). If a = 0, we call χ0 the trivial additive character of \(\mathbb {F}_{q}\). Let \(\widehat {{\mathbb F}_{q}}\) be the set of all additive characters of \({\mathbb F}_{q}\). The orthogonal relation of additive characters (see [21]) is given by
As in [21], the multiplicative character of \(\mathbb {F}_{q}\) is defined as follows. For j = 0,1,...,q − 2, the functions φj defined by
are all the multiplicative characters of \(\mathbb {F}_{q}\), where α is a primitive element of \(\mathbb {F}_{q}^{*}\), and 0 ≤ i ≤ q − 2. If j = 0, we have φ0(x) = 1 for any \(x\in \mathbb {F}_{q}^{*}\), φ0 is called the trivial multiplicative character of \(\mathbb {F}_{q}\). Let \(\widehat {{\mathbb F}_{q}^{*}}\) be the set of all the multiplicative characters of \({\mathbb F}_{q}^{*}\).
Let φ be a multiplicative character of \({\mathbb F}_{q}\). The orthogonal relation of multiplicative characters (see [21]) is given by
2.3 Gauss sums over finite fields
Let φ be a multiplicative character of \({\mathbb F}_{q}\) and χ an additive character of \({\mathbb F}_{q}\). Then the Gauss sum over \({\mathbb F}_{q}\) is given by
It is easy to see that the absolute value of Gq(φ,χ) is at most q − 1, but is much smaller in general, the following lemma shows all the cases.
Lemma 2.1
[21, Theorem 5.11] Let φ be a multiplicative character and χ an additive character of \({\mathbb F}_{q}\). Then the Gauss sum Gq(φ,χ) satisfies
For φ≠φ0 and χ≠χ0, we have \(\left |G_{q}(\varphi ,\chi )\right |=\sqrt {q}\).
Lemma 2.2
Lidl and Niederreiter [21] Gauss sums for the finite field \({\mathbb F}_{q}\) satisfy the following properties:
(1)\(G_{q}(\varphi ,\chi _{ab})=\overline {\varphi (a)}G_{q}(\varphi ,\chi _{b})\) for \(a\in {\mathbb F}_{q}^{*}\), \(b\in {\mathbb F}_{q}\), where \(\overline {\varphi (a)}\) denotes the complex conjugate of φ(a);
(2)\(G_{q}(\varphi ,\chi )G_{q}(\overline {\varphi },\chi )=\varphi (-1)q\).
Lemma 2.3
Lidl and Niederreiter [21] Let φ be a multiplicative character of \({\mathbb F}_{q}\). Then for any \(c\in {\mathbb F}_{q}^{*}\), we have
where the sum is extended over all additive characters χ of \({\mathbb F}_{q}\).
This is the Fourier expansion of the multiplicative character φ in terms of the additive characters of \({\mathbb F}_{q},\) with Gaussian sums appearing as Fourier coefficients.
2.4 A general construction of codebooks
Let D be a set and K = #D. Let E be a set of some functions which satisfy
A general construction of codebooks is stated as follows,
3 The first construction of codebooks
In this section, by multiplicative characters, transitivity of trace and fourier expansion, we construct new series of codebooks which asymptotically meet the Welch bound.
We first recall the construction in [30]. Let
where η is the quadratic multiplicative character of \({\mathbb F}_{q}\), η(0) is defined as 0 for convenience. Let K = #D and \(E=\widehat {{\mathbb F}_{q}^{*}}\). The codebooks \({\mathcal C}(D;E)=\{{\mathbf c}_{\varphi }=\frac {1}{\sqrt {K}}(\varphi (x))_{x\in D}: \varphi \in E\}\), which were constructed in [30] are asymptotically optimal when \(q\rightarrow \infty \).
In this section, we generalize this construction in [30] by trace functions. Let p be an odd prime, r = pt and q = rs, where t|s and \(p\nmid s\). Let η be the quadratic multiplicative character of \({\mathbb F}_{r}\). Let
and K = #D. Let \(E=\widehat {{\mathbb F}_{q}^{*}}\).
We define a codeword of length K as
and construct the following (N,K) codebook \({\mathcal C}(D;E)\) as:
We set
Through the definition of D, we know that
Theorem 3.1
With the above notations, we have N = q − 1, \(K=\frac {q(r-1)}{2r}\) and
Proof
By the definition of D and E, it is easy to see that N = q − 1 and \(K=\frac {q(r-1)}{2r}\).
For any characters φi and φj in \(\widehat {{\mathbb F}_{q}^{*}}\), where 1 ≤ i≠j ≤ q − 2. Let \(\varphi :=\varphi _{i}\overline {\varphi _{j}}\). Since i≠j, φ is nontrival. Then we have
where A and B are defined in Lemmas 3.4 and 3.5.
By the results in Lemmas 3.4 and Lemma 3.5, we get
□
Using Theorem 3.1, we will show the asymptotical-optimality of the proposed codebooks in the following theorem. For simiplicity, we set \(I_{max}=I_{max}{\mathcal C}(D;E)\).
Theorem 3.2
Let IW be the magnitude of the optimal correlation, i.e. the Welch bound equality, for the given N, K in the current section. We hav
and
Then the codebooks we proposed are asymptotically optimal.
Proof
Note that N = q − 1 and \(K=\frac {q(r-1)}{2r}\), we get
thus
By Theorem 3.1, we get
We get
thus
It is easy to see
Thus the codebooks \({\mathcal C}(D;E)\) asymptotically meet the Welch bound. This completes the proof. □
Remark 1
When r = q, it is exactly the first construction of codebooks in [30].
Let φ be a multiplicative character of \({\mathbb F}_{q}\) and φ∗ the restriction of φ to \( {{\mathbb F}}_{r}\). Let χa be an additive character of \({\mathbb F}_{q}\), and \(\chi _{a}^{*}\) the restriction of χa to \( {{\mathbb F}}_{r}\), where \(a\in {\mathbb F}_{q}\). Let ψb be an additive character of \({\mathbb F}_{r}\), where \(b\in {\mathbb F}_{r}\). Let χ = χ1 and ψ = ψ1 be the canonical additive characters of \({\mathbb F}_{q}\) and \({\mathbb F}_{r}\) respectively. The Lemmas which are used in the proof of Theorem 3.1 are as follows.
Lemma 3.3
χ∗ is nontrivial if and only if \(p\nmid s\).
Proof
For any \(b\in {\mathbb F}_{r}\), we have
It follows that χ∗ = ψs, the result is obtained. □
Lemma 3.4
Let \(A={\sum }_{x\in {\mathbb F}_{q}^{*}}\varphi (x)\eta (Tr_{q/r}(x+1))\). Then we have
Proof
By the Fourier expansion in Lemma 2.3, A can be rewritten as
Since \(p\nmid s\), the result follows from Lemmas 2.1 and 3.3. □
We set
It is easy to see that
Lemma 3.5
Let \(B={\sum }_{x\in {\mathbb F}_{q}^{*},\atop {\operatorname {Tr}}_{q/r}(x+1)= 0}\varphi (x)\). Then we have
Proof
By the definition of δ2(x), we have
Since \(p\nmid s\), the result follows from Lemmas 2.1 and 3.3. □
4 The second construction of codebooks
In this section, by additive characters, transitivity of trace and fourier expansion, we construct new series of codebooks which asymptotically meet the Welch bound.
In fact, we generalize the construction of codebooks in [12] and show that Imax of the proposed codebooks asymptotically achieves the Welch bound. We also derive the whole distribution of inner products of the proposed codebooks. In [12] the Welch bound can be asymptotically achieved only for sufficiently large prime p, while in our construction the Welch bound can be asymptotically achieved for any odd prime p.
We first recall the construction in [12]. Let p be an odd prime and q a power of p. Let η be the quadratic multiplicative character of \({\mathbb F}_{p}\). The construction in [12] is equivalent to the following one. Let
and K = #D, where T = q + 1. Let \(E=\widehat {{\mathbb F}_{q^{2}}}\).
The codebooks
are asymptotically optimal when \(p\rightarrow \infty \).
In this Section we generalize the construction in [12]. Let p be an odd prime, r = pt and q = rs, where t|s. Let η be the quadratic multiplicative character of \({\mathbb F}_{r}\). Let χa be an additive character of \({\mathbb F}_{q^{2}}\), where \(a\in {\mathbb F}_{q^{2}}\). Let χ = χ1 be the canonical additive characters of \({\mathbb F}_{q^{2}}\).
Let
and K = #D, where T = q + 1. Let \(E=\widehat {{\mathbb F}_{q^{2}}}=\{\chi _{a}: a\in {\mathbb F}_{q^{2}}\}\).
We define a codeword of length K as
and construct the following (N,K) codebook as:
By the definition of D and E, it is easy to see that N = q2 and \(K=\frac {q(q+1)(r-1)}{2r}\).
The following theorem gives the whole distribution of inner products of \({\mathcal C}(D;E)\).
Theorem 4.1
Let \({\mathbf c}_{a_{i}}{\mathbf c}_{a_{j}}^{H}\) be the inner product between a pair of code vectors \({\mathbf c}_{a_{i}}\) and \({\mathbf c}_{a_{j}}\) of the proposed codebooks \({\mathcal C}(D;E)\), where ai and aj are distinct elements in \({\mathbb F}_{q^{2}}\), 0 ≤ i≠j ≤ q2 − 1. Then \({\mathbf c}_{a_{i}}{\mathbf c}_{a_{j}}^{H}\) has the following distribution
Proof
We set
By the definition of D, we known that
As the notations defined in this section, we have
where Q and P are defined in Lemmas 4.5 and 4.6.
By the results in Lemmas 4.5 and 4.6, we have
To find the distribution, we need the following illustrations. (1) For any \(a\in {\mathbb F}_{q^{2}}^{*}\), there are N groups (ai,aj) satisfying ai − aj = a. (2) For any \(z\in {\mathbb F}_{q}^{*}\), there are T different \(a\in {\mathbb F}_{q^{2}}^{*}\) which satisfy z = aT. (3) There are \(\frac {q}{r}-1\) different \(z\in {\mathbb F}_{q}^{*}\) with Trq/r(z) = 0, and there are \(\frac {q}{r}\) different \(z\in {\mathbb F}_{q}^{*}\) with Trq/r(z)≠ 0. (4) The numbers of squares and nonsquares in \({\mathbb F}_{r}^{*}\) are both \(\frac {r-1}{2}\).
Then it is easy to get the distribution of \({\mathbf c}_{a_{i}}{\mathbf c}_{a_{j}}^{H}\) as follows:
This completes the proof. □
The following corollary which is a direct consequence of Theorem 4.1 gives the value of \(I_{max}{{\mathcal C}(D;E)}\).
Corollary 4.2
The maximum magnitude of inner products between a pair of code vectors of the proposed codebooks is
Using Corollary 4.2, we will show the asymptotical-optimality of the proposed codebooks in the following theorem. For simiplicity, we set \(I_{max}=I_{max}{\mathcal C}(D;E)\).
Theorem 4.3
Let IW be the magnitude of the optimal correlation, i.e. the Welch bound equality, for the given N, K in the current section. We hav
and
Then the codebooks we proposed are asymptotically optimal.
Proof
Note that N = q2 and \(K=q(q+1)\frac {r-1}{2r}\), we get
thus
By Corollary 4.2, we get
Thus
We can see
then
The codebooks \({\mathcal C}(D;E)\) asymptotically meet the Welch bound. This completes the proof. □
Remark 2
When r = p, the construction we proposed is exactly the one in [12]. In [12] the codebooks are construced by selecting K rows from N × N Hadamard matrices based on binary row selection sequence, but we use the additive character of finite field and a set D to construct our codebooks. It is pointed out in [12] that Imax of the codebooks asymptotically achieves the Welch bound equality only for sufficiently large prime number p. For small p, Imax of the codebooks has larger value than the Welch bound equality, though \(q\rightarrow +\infty \). It is hard to find sufficiently large primes. While, in our construction, for any fixed odd prime p, we can let t increase and then \(r=p^{t}\rightarrow +\infty \). So \(I_{max}{\mathcal C}(D;E)\) can asymptotically achieve the Welch bound equality.
The Lemmas which are used in the proof of Theorem 4.1 are as follows.
Lemma 4.4
Let fb(x) = Trq/p(bxT), \(\widehat {f_{b}}(a)={\sum }_{x\in {\mathbb F}_{q^{2}}}\omega ^{{\operatorname {Tr}}_{q/p}(bx^{T})+{\operatorname {Tr}}_{q^{2}/p}(ax)}\), where \(b\in {\mathbb F}_{r}\), \(a\in {\mathbb F}_{q^{2}}\) and ω is the complex p-th root of unity. Then we have
where \(a\in {\mathbb F}_{q^{2}}\).
Proof
Since fb(x) is a regular bent function, see [10], the result follows. □
Let ψb be an additive character of \({\mathbb F}_{r}\), where \(b\in {\mathbb F}_{r}\). Let χ = χ1 and ψ = ψ1 be the canonical additive characters of \({\mathbb F}_{q^{2}}\) and \({\mathbb F}_{r}\) respectively. We set
then
Lemma 4.5
Let \(P={\sum }_{x\in {\mathbb F}_{q^{2}} \atop {\operatorname {Tr}}_{q/r}(x^{T})=0}\chi (ax)\), where \(a\in {\mathbb F}_{q^{2}}^{*}\). Then we have
Proof
It follows that
The result follows from the fact that
□
Lemma 4.6
Let \(Q={\sum }_{x\in {\mathbb F}_{q^{2}}}{\chi (ax)}\eta ({\operatorname {Tr}}_{q/r}(x^{T}))\), where \(a\in {\mathbb F}_{q^{2}}^{*}\). Then we have
Proof
It holds that
The result follows from the fact that
and
□
5 Concluding remarks
In this paper, we presented two new constructions of codebooks asymptotically achieve the Welch bounds with multiplicative characters, additive characters, trace functions and Fourier expansion of finite fields. Our two constructions are the generalizations of the constructions in [30] and [12], respectively. The parameters of our codebooks are flexible and new.
One feature of our construction is the combination of the character sums and the transitivity of trace functions. Since character sums of finite fields are one of the main methods used in the constructions of asymptotically optimal codebooks, we believe that using trace functions we can generalize more known codebooks constructed by character sums.
In our second construction, one key point is that fb(x) in the Lemma IV.4 is a regular bent function. We wonder if there exist other (weakly) regular bent functions such that the codebooks constructed by them can asymptotically achieve the Welch bound.
References
Candes, E., Wakin, M.: An introduction to compressive sampling. IEEE Signal Process 25(2), 21–30 (2008)
Conway, J., Harding, R., Sloane, N.: Packing lines, planes, etc.: Packings in Grassmannian spaces. Exp. Math. 5(2), 139–159 (1996)
Ding, C.: Complex codebooks from combinatorial designs. IEEE Trans. Inform. Theory 52(9), 4229–4235 (2006)
Ding, C., Feng, T.: A generic construction of complex codebooks meeting the Welch bound. IEEE Trans. Inf. Theory 53(11), 4245–4250 (2007)
Delsarte, P., Goethals, J., Seidel, J.: Spherical codes and designs. Geometriae Dedicate 67(3), 363–388 (1997)
Fickus, M., Mixon, D., Tremain, J.: Steiner equiangular tight frames. Linear Algebra Appl. 436(5), 1014–1027 (2012)
Fickus, M., Mixon, D.: Tables of the existence of equiangular tight frames, arXiv:1504.00253v2 (2016)
Fickus, M., Mixon, D., Jasper, J.: Equiangular tight frames from hyperovals. IEEE Trans. Inf. Theory 62(9), 5225–5236 (2016)
Fickus, M., Jasper, J., Mixon, D., Peterson, J.: Tremain equiangular tight frames, arXiv:1602.03490v1 (2016)
Helleseth, T., Kholosha, A.: Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Trans. Inf. Theory 52(5), 2018–2032 (2006)
Hu, H., Wu, J.: New constructions of codebooks nearly meeting the Welch bound with equality. IEEE Trans. Inf. Theory 60(2), 1348–1355 (2014)
Hong, S., Park, H., Helleseth, T., Kim, Y.: Near optimal partial Hadamard codebook construction using binary sequences obtained from quadratic residue mapping. IEEE Trans. Inf. Theory 60(6), 3698–3705 (2014)
Heng, Z., Ding, C., Yue, Q.: New constructions of asymptotically optimal codebooks with multiplicative characters. IEEE Trans. Inf. Theory 63(10), 6179–6187 (2017)
Heng, Z: Nearly optimal codebooks based on generalized Jacobi sums. Discrete Appl. Math. 250, 227–240 (2018)
Kovacevic, J., Chebira, A.: An introduction to frames. Found. Trends Signal Process. 2(1), 1–94 (2008)
Li, C.J., Qin, Y., Huang, Y.W.: Two families of nearly optimal codebooks. Des. Codes Cryptogr. 75(1), 43–57 (2015)
Lu, W., Wu, X., Cao, X.W., Chen, M.: Six constructions of asymptotically optimal codebooks via the character sums. Des. Codes Cryptogr. 88(6), 1139–1158 (2020)
Luo, G.J., Cao, X.W.: Two constructions of asymptotically optimal codebooks via the hyper Eisenstein sum. IEEE Trans. Inf. Theory 64(10), 6498–6505 (2018)
Luo, G.J., Cao, X.W.: New constructions of codebooks asymptotically achieving the Welch bound. In: Proceedings IEEE Int. Symp. Inf. Theory, Vail, CO USA, pp 2346–2349 (2018)
Luo, G.J., Cao, X.W.: Two constructions of asymptotically optimal codebooks, Crypt. Commun. [online]. Available: https://doi.org/10.1007/s12095-018-0331-4 (2018)
Lidl, R., Niederreiter, H.: Finite fields. Cambridge University Press, Cambridge (1997)
Massey, J., Mittelholzer, T.: Welch’s bound and sequence sets for code-division multiple-access systems, Sequences II, pp 63–78. Springer, New York, (1999)
Renes, J., Blume-Kohout, R., Scot, A., Caves, C.: Symmetric informationally complete quantum measurements. J. Math. Phys. 45(6), 2171–2180 (2004)
Rahimi, F.: Covering graphs and equiangular tight frames, Ph.D. Thesis, University of Waterloo, Ontario, (available at http://hdl.handle.net/10012/10793) (2016)
Sarwate, D.: Meeting the Welch bound with equality, pp 63–79. Springe, New York (1999)
Strohmer, T., Heath, R.: Grassmannian frames with applications to coding and communication. Appl. Comput. Harmon. Anal. 14(3), 257–275 (2003)
Welch, L.: Lower bounds on the maximum cross correlation of signals. IEEE Trans. Inform. Theory 20(3), 397–399 (1974)
Xia, P., Zhou, S., Giannakis, G.: Achieving the Welch bound with difference sets. IEEE Trans. Inform. Theory 51(5), 1900–1907 (2005)
Yu, N.: A construction of codebooks associated with binary sequences. IEEE Trans. Inform. Theory 58(8), 5522–5533 (2012)
Zhang, A., Feng, K.: Two classes of codebooks nearly meeting the Welch bound. IEEE Trans. Inform. Theory 58(4), 2507–2511 (2012)
Zhang, A., Feng, K.: Construction of cyclotomic codebooks nearly meeting the Welch bound. Des. Codes Cryptogr. 63(2), 209–224 (2013)
Zhou, Z., Tang, X.: New nearly optimal codebooks from relative difference sets. Adv. Math. Commun. 5(3), 521–527 (2011)
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Grant No. 11971102, 11801070, 11771007, 61572027) and the Basic Research Foundation (Natural Science).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wu, X., Lu, W. & Cao, X. Two constructions of asymptotically optimal codebooks via the trace functions. Cryptogr. Commun. 12, 1195–1211 (2020). https://doi.org/10.1007/s12095-020-00448-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-020-00448-w