1.
Introduction
Let Γ be a strongly regular graph with v vertices and parameters k, λ and μ. Then Γ is defined as follows: (1) For any two adjacent vertices x and y, there are exactly λ vertices adjacent to both x and y; (2) for any two nonadjacent vertices x and y, there are exactly μ vertices adjacent to both x and y. For a more detailed introduction on strongly regular graphs, please refer to [1,2].
Cayley graphs are an effective tool constructing strongly regular graphs. Let (G,+) be a finite abelian group and S be a subset of G∖{0} such that S=−S, where 0 is the identity of G. The Cayley graph Cay(G,S) is defined as the graph Γ(G,E) where two vertices a and b are adjacent if and only if a−b∈S. Let ˆG be the character group of G consisting of all characters of G. The eigenvalues of Cay(G,S) are given by ϕ(S)=∑x∈Sϕ(x), where ϕ∈ˆG. It is well known that Cay(G,S) is strongly regular if and only if ϕ(S) with ϕ∈ˆG∖{1ˆG} take exactly two values, where 1ˆG is the identity of ˆG. By the determination of Cayley graphs in the additive groups of finite fields, strongly regular cayley graphs were proposed in [3,4,5,6].
It should be noted that strongly regular graphs are related to some combinational objects, such as linear codes, two-intersection sets and partial difference set [7,8]. For these connections, we are inspired to construct asymptotically optimal codebooks by using the connection set S of Cay(G,S). An (N,K) codebook C is defined to be a set {ci}N−1i=0 of N units norm 1×K complex vectors ci, and ci (0≤i≤N−1) are called codewords of the codebook C. As an important measure of performance of a codebook C in code-division multiple access system, the maximum correlation amplitudes Imax(C) is defined by
where cHj denotes the conjugate transpose of a complex vector cj.
Minimizing Imax(C) is a meaningful problem as it can optimize some performance metrics such as average signal-to-noise ratio and outage probability. Hence, for a given K, it is desirable to construct codebooks with N as large as possible and Imax(C) as small as possible simultaneously. Unfortunately, there is a tradeoff among the parameters N, K and Imax(C). Let Iw(C)=√(N−K)/((N−1)K), we know Imax(C)≥Iw(C) [9]. If C achieves the Welch bound, that is, Imax(C)=Iw(C), then C is referred to as a Welch-bound-equality codebook. In ordinary circumstance, it is extremely difficult to construct codebooks achieving the Welch bound. As a consequence, researchers attempt to construct codebooks asymptotically meeting the Welch bound, that is, Imax(C) is slightly higher than Iw(C), but limN→∞Imax(C)/Iw(C)=1 [10,11,12].
This paper is organized as follows. Some interesting mathematical foundations will be introduced in Section II. Based on these related character sums, a class of strongly regular graphs and nearly optimal codebooks are presented in Section III. In addition, these constructed codebooks have new parameters.
For convenience, we use the following notations in the following sequel.
● m, s are positive integers and n=ms.
● p is an odd prime and q=pn.
● Trnm denotes the trace function from Fpn to Fpm.
● β is a primitive element of Fpn.
● ζp=e2π√−1p is a p-th primitive root of complex unity.
● ηn and ηm denote the quadratic characters of Fpn and Fpm, separately.
● χn and χm denote the canonical additive characters of Fpn and Fpm, separately.
● μa denotes an additive character of Fpn for a∈Fpn.
2.
Preliminaries
In this section, we start with characters of finite fields. To prove the main results of this letter, we need a number of results on exponential sums that are derived for the proofs.
For an odd prime p, let q=pn and Fq denote the finite field with q elements. Then Trnm is defined by
and Trnm is called the trace function from Fpn to Fpm.
An additive character of Fpn is a homomorphism χ from the additive group of Fpn to the multiplicative group of complex numbers of absolute value 1. The function
defines an additive character of Fpn and χn is called the canonical additive character of Fpn. For a∈Fpn, define
Obviously, μa is also an additive character of Fpn. And every additive character of Fpn can be obtained in this way [13]. Its orthogonality relation is given by
Let β be a primitive element of Fq. For a fixed integer j, 0≤j≤q−2, the function
defines a multiplicative character of Fq. In this paper, we use ηn to denote the quadratic character χ(q−1)/2 of Fq. And the quadratic character ηn is extended by letting ηn(0)=0. The orthogonality relation for quadratic characters is given by
where ηk is the quadratic character of Fpk and k is a positive integer.
The Gauss sum G(ηm,χm) over Fpm is defined by [13]
where ηm and χm are the quadratic and canonical additive characters of Fpm, respectively.
The Gauss sum G(ηm,χm) can be evaluated explicitly and the result on G(ηm,χm) is given in the following lemma.
Lemma 1. [13, Theorem 5.15] Let Fpm be the finite field with pm element, where p is an odd prime. Then
where p∗=(−1p)p.
Hence, we shall abbreviate G(ηm,χm) to Gm. The following lemma establishes a relationship between the quadratic character ηm and the canonical additive character χm of Fpm.
Lemma 2. [13, p. 195] With symbols and notations above, we have
Let f(x) be a function from Fq to Fp. The Walsh transform of f is defined by
for β∈Fq. The following lemma states a property of the Walsh transform of f(x)=αx2, where α∈F∗q.
Lemma 3. [14] For α∈F∗q, the Walsh transform coefficient of Trn1(αx2) is equal to
where β∈Fq and p∗=(−1p)p.
Below we give a few results which are used to obtain the main results of this paper.
Lemma 4. Let symbols be the same as before. Then we have:
(1) If s≥2 is even, then ηn(z)=1, for z∈F∗pm.
(2) If s≥2 is odd, then ηn(z)=ηm(z), for z∈F∗pm.
Proof. Assume that F∗pn=⟨β⟩, we get F∗pm=⟨βpn−1pm−1⟩. For n=ms, we have
This means that the parity of (pn−1)/(pm−1) is the same as s. Hence, we have
for z∈F∗pm. □
Lemma 5. [13, Theorem 5.12] For y∈Fpm, we obtain
3.
Proofs and main results
In this section, we provide a construction of strongly regular Cayley graphs and a family of asymptotically optimal codebooks. For α∈F∗q, let
The following lemma gives the cardinality of the special subset Dα of Fq.
Lemma 6. Let symbols be the same as before. Then the cardinality |Dα| of Dα is given by:
(1) If s is even, then
(2) If s is odd, then
Proof. In order to determine the cardinality of Dα, we firstly compute the values of the following two equalities:
It is clear that
Note that
By Lemmas 3 and 4, we get
Hence, we obtain
Now we determine the values of A2. By Lemma 2, we have
where the last equality follows from the fact that ∑a∈F∗pmηm(a)=0 and Lemma 4. By definition, we deduce that
The results of this lemma follow from (3.4)–(3.6). □
Example 1. Let p=5, n=4, m=2 and s=2. If α is a primitive element of F∗54, by Lemma 6 we get |Dα|=288, which agrees with numerical computations by Magma. If α=1, then |D1|=240, which is consistent with Magma program computation.
Example 2. Let p=7, n=3, m=1 and s=3. If α is a primitive element of F∗73, by Lemma 6 we get |Dα|=168, which agrees with Magma program. If α=1, then |D1|=126, which coincides with numerical results by Magma program computation.
Lemma 7. For a,α∈F∗pn, define
(1) If s is an even integer, then
where A=(−1)n−1ηn(−α)(p∗)n2pm.
(2) If s is an odd integer, then
where B=(−1)n+m(p∗)m+n2ηn(−α)pm.
Proof. For a∈F∗pn, by the orthogonality relation of μa we get
By Lemma 3, we get
From the map z↦−1z, we obtain
When s is even, from Lemmas 4 and 5, we have the result (1) of this lemma.
When s is odd, the desired result follows from Lemmas 4 and 5.
□
Lemma 8. For a,α∈F∗pn, let
(1) If s is even, then
where A=(−1)n−1(p∗)n2ηn(−α)pm.
(2) If s is odd, then
where B=(−1)n+m(p∗)m+n2ηn(−α)pm.
Proof. It follows from Lemma 2 that
From the map z↦−1z, we derive that
The desired result follows from (3.8), Lemmas 4 and 5.
□
Theorem 9. Let symbols be the same as before and s≥2 be even. Then the Cayley graph Cay(Fpn,Dα) is strongly regular with non-trivial eigenvalues −(p∗)n2(pm+1)ηn(−α)/(2pm) and (p∗)n2(pm−1)ηn(−α)/(2pm).
Proof. For a∈F∗pn, we deduce that
where the last equality follows from that ηm(0)=0. Then the desired conclusions follow from Lemmas 7 and 8. □
Remark 1. Let s>1 be an odd integer. Then the eigenvalues of the Cayley graph Cay(Fpn,Dα) can also be computed by a similar method given in Theorem 9. It can be easily checked that
where a∈F∗pn and B=(−1)n+mηn(−α)(p∗)m+n2/pm. This means that the Cayley graph Cay(Fpn,Dα) is not strong regular if s is odd.
Motivated by the work in [15], we give a construction of asymptotically optimal codebooks based on the strongly regular Cayley graph Cay(Fpn,Dα) defined in Theorem 9. For α∈F∗pn, let
where cα,a=(1√|Dα|μa(x))x∈Dα.
Theorem 10. Let
and let s≥2 be a fixed even integer. Then Cα defined by (3.9) is an asymptotically optimal codebook with parameters [pn,K].
Proof. By the definition of Cα and Lemma 6, we deduce that Cα is a [pn,K] codebook. For any two distinct codewords ca and cb in Cα (i.e., a≠b∈Fpn), it can be easily checked that
It follows from Theorem 9 that
which implies that
According to the Welch bound, we have
It is easy to check that
which means that the codebook Cα is asymptotically optimal with respect to the Welch bound.
□
Remark 2. Many readers may wonder what parameters the codebook Cα has when s is an odd integer and whether it is asymptotically optimal. If s is odd, then by Theorems 6 and 9 we know the codebook Cα defined in (3.9) has parameters
It can be verified that
which implies that C is not asymptotically optimal.
In Table 1, we assume that α is a primitive element of F∗pn, p=3 and s=4. And we show some parameters of the codebook Cα in this table. From Table 1, it can be seen that Cα is asymptotically optimal with respect to the Welch bound for sufficiently large N. This also agrees with the result of Theorem 10.
To give a comparison, we present the parameters (N,K) of some known asymptotically optimal codebooks and the codebook defined in (3.9) in Table 2. From this table, we can conclude that Cα has new parameters.
4.
Conclusions
In this paper, we propose a method for constructing strongly regular graphs. Then we use the connection set Dα (α∈F∗pn) of the strongly regular graph Cay(F∗pn,Dα) to give a class of codebook Cα. In addition, the parameters [N,K] and Imax(Cα) of the codebook Cα are determined in Theorem 10. Table 1 demonstrates that these proposed codebooks are asymptotically optimal according to the Welch bound.
Use of AI tools declaration
The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.
Acknowledgments
This work was supported by the Innovation Project of Engineering Research Center of Integration and Application of Digital Learning Technology (No.1221049), Humanities and Social Sciences Youth Foundation of Ministry of Education of China (No. 22YJC870018), the Science and Technology Development Fund of Tianjin Education Commission for Higher Education (No. 2020KJ112, KYQD1817, 2022KJ075), Haihe Laboratory of Information Technology Application Innovation (No. 22HHXCJC00002), the National Natural Science Foundation of China (Grant No. 12301670).
Conflict of interest
The authors declare no conflicts of interest.