Research article

A construction of strongly regular Cayley graphs and their applications to codebooks

  • Received: 15 November 2023 Revised: 12 December 2023 Accepted: 21 December 2023 Published: 27 December 2023
  • MSC : 94B05, 11T23, 11T24, 12E20

  • In this paper, we give a kind of strongly regular Cayley graphs and a class of codebooks. Both constructions are based on choosing subsets of finite fields, and the main tools that we employed are Gauss sums. In particular, these obtained codebooks are asymptotically optimal with respect to the Welch bound and they have new parameters.

    Citation: Yang Yan, Xingguo Zhang, Rize Jin, Limin Zhou. A construction of strongly regular Cayley graphs and their applications to codebooks[J]. AIMS Mathematics, 2024, 9(2): 2672-2683. doi: 10.3934/math.2024132

    Related Papers:

    [1] Qiuyan Wang, Weixin Liu, Jianming Wang, Yang Yan . A class of nearly optimal codebooks and their applications in strongly regular Cayley graphs. AIMS Mathematics, 2024, 9(7): 18236-18246. doi: 10.3934/math.2024890
    [2] Tao Cheng, Junchao Mao . A new class of directed strongly regular Cayley graphs over dicyclic groups. AIMS Mathematics, 2024, 9(9): 24184-24192. doi: 10.3934/math.20241176
    [3] Yang Yan, Hanning Chen, Jianming Wang, Gang Wang . A new construction of asymptotically optimal codebooks. AIMS Mathematics, 2024, 9(4): 9631-9640. doi: 10.3934/math.2024471
    [4] Nuttawoot Nupo, Sayan Panma . Certain structural properties for Cayley regularity graphs of semigroups and their theoretical applications. AIMS Mathematics, 2023, 8(7): 16228-16239. doi: 10.3934/math.2023830
    [5] Igal Sason . Observations on graph invariants with the Lovász $ \vartheta $-function. AIMS Mathematics, 2024, 9(6): 15385-15468. doi: 10.3934/math.2024747
    [6] Jiangmin Pan, Yingnan Zhang . On cubic semisymmetric bi-Cayley graphs on nonabelian simple groups. AIMS Mathematics, 2022, 7(7): 12689-12701. doi: 10.3934/math.2022702
    [7] Ganesh Gandal, R Mary Jeya Jothi, Narayan Phadatare . On very strongly perfect Cartesian product graphs. AIMS Mathematics, 2022, 7(2): 2634-2645. doi: 10.3934/math.2022148
    [8] Songpon Sriwongsa, Siripong Sirisuk . Nonisotropic symplectic graphs over finite commutative rings. AIMS Mathematics, 2022, 7(1): 821-839. doi: 10.3934/math.2022049
    [9] He Song, Longmin Wang, Kainan Xiang, Qingpei Zang . The continuity of biased random walk's spectral radius on free product graphs. AIMS Mathematics, 2024, 9(7): 19529-19545. doi: 10.3934/math.2024952
    [10] Imrana Kousar, Saima Nazeer, Abid Mahboob, Sana Shahid, Yu-Pei Lv . Numerous graph energies of regular subdivision graph and complete graph. AIMS Mathematics, 2021, 6(8): 8466-8476. doi: 10.3934/math.2021491
  • In this paper, we give a kind of strongly regular Cayley graphs and a class of codebooks. Both constructions are based on choosing subsets of finite fields, and the main tools that we employed are Gauss sums. In particular, these obtained codebooks are asymptotically optimal with respect to the Welch bound and they have new parameters.



    Let Γ be a strongly regular graph with v vertices and parameters k, λ and μ. Then Γ is defined as follows: (1) For any two adjacent vertices x and y, there are exactly λ vertices adjacent to both x and y; (2) for any two nonadjacent vertices x and y, there are exactly μ vertices adjacent to both x and y. For a more detailed introduction on strongly regular graphs, please refer to [1,2].

    Cayley graphs are an effective tool constructing strongly regular graphs. Let (G,+) be a finite abelian group and S be a subset of G{0} such that S=S, where 0 is the identity of G. The Cayley graph Cay(G,S) is defined as the graph Γ(G,E) where two vertices a and b are adjacent if and only if abS. Let ˆG be the character group of G consisting of all characters of G. The eigenvalues of Cay(G,S) are given by ϕ(S)=xSϕ(x), where ϕˆG. It is well known that Cay(G,S) is strongly regular if and only if ϕ(S) with ϕˆG{1ˆG} take exactly two values, where 1ˆG is the identity of ˆG. By the determination of Cayley graphs in the additive groups of finite fields, strongly regular cayley graphs were proposed in [3,4,5,6].

    It should be noted that strongly regular graphs are related to some combinational objects, such as linear codes, two-intersection sets and partial difference set [7,8]. For these connections, we are inspired to construct asymptotically optimal codebooks by using the connection set S of Cay(G,S). An (N,K) codebook C is defined to be a set {ci}N1i=0 of N units norm 1×K complex vectors ci, and ci (0iN1) are called codewords of the codebook C. As an important measure of performance of a codebook C in code-division multiple access system, the maximum correlation amplitudes Imax(C) is defined by

    Imax(C)=max0ijN1|cicHj|,

    where cHj denotes the conjugate transpose of a complex vector cj.

    Minimizing Imax(C) is a meaningful problem as it can optimize some performance metrics such as average signal-to-noise ratio and outage probability. Hence, for a given K, it is desirable to construct codebooks with N as large as possible and Imax(C) as small as possible simultaneously. Unfortunately, there is a tradeoff among the parameters N, K and Imax(C). Let Iw(C)=(NK)/((N1)K), we know Imax(C)Iw(C) [9]. If C achieves the Welch bound, that is, Imax(C)=Iw(C), then C is referred to as a Welch-bound-equality codebook. In ordinary circumstance, it is extremely difficult to construct codebooks achieving the Welch bound. As a consequence, researchers attempt to construct codebooks asymptotically meeting the Welch bound, that is, Imax(C) is slightly higher than Iw(C), but limNImax(C)/Iw(C)=1 [10,11,12].

    This paper is organized as follows. Some interesting mathematical foundations will be introduced in Section II. Based on these related character sums, a class of strongly regular graphs and nearly optimal codebooks are presented in Section III. In addition, these constructed codebooks have new parameters.

    For convenience, we use the following notations in the following sequel.

    m, s are positive integers and n=ms.

    p is an odd prime and q=pn.

    Trnm denotes the trace function from Fpn to Fpm.

    β is a primitive element of Fpn.

    ζp=e2π1p is a p-th primitive root of complex unity.

    ηn and ηm denote the quadratic characters of Fpn and Fpm, separately.

    χn and χm denote the canonical additive characters of Fpn and Fpm, separately.

    μa denotes an additive character of Fpn for aFpn.

    In this section, we start with characters of finite fields. To prove the main results of this letter, we need a number of results on exponential sums that are derived for the proofs.

    For an odd prime p, let q=pn and Fq denote the finite field with q elements. Then Trnm is defined by

    Trnm(x)=n/m1j=0x(pm)j

    and Trnm is called the trace function from Fpn to Fpm.

    An additive character of Fpn is a homomorphism χ from the additive group of Fpn to the multiplicative group of complex numbers of absolute value 1. The function

    χn(x)=ζTrn1(x)p, xFpn,

    defines an additive character of Fpn and χn is called the canonical additive character of Fpn. For aFpn, define

    μa(x)=χn(ax)=ζTrn1(ax)p,  xFpn.

    Obviously, μa is also an additive character of Fpn. And every additive character of Fpn can be obtained in this way [13]. Its orthogonality relation is given by

    xFpnμa(x)=xFpnχn(ax)={pn,if  a=0,0,if  aFpn.

    Let β be a primitive element of Fq. For a fixed integer j, 0jq2, the function

    χj(βi)=e2π1jiq1, i=0,1,,q2,

    defines a multiplicative character of Fq. In this paper, we use ηn to denote the quadratic character χ(q1)/2 of Fq. And the quadratic character ηn is extended by letting ηn(0)=0. The orthogonality relation for quadratic characters is given by

    xFpkηk(x)=0,

    where ηk is the quadratic character of Fpk and k is a positive integer.

    The Gauss sum G(ηm,χm) over Fpm is defined by [13]

    G(ηm,χm)=xFpmηm(x)χm(x),

    where ηm and χm are the quadratic and canonical additive characters of Fpm, respectively.

    The Gauss sum G(ηm,χm) can be evaluated explicitly and the result on G(ηm,χm) is given in the following lemma.

    Lemma 1. [13, Theorem 5.15] Let Fpm be the finite field with pm element, where p is an odd prime. Then

    G(ηm,χm)=(1)m1(p)m2,

    where p=(1p)p.

    Hence, we shall abbreviate G(ηm,χm) to Gm. The following lemma establishes a relationship between the quadratic character ηm and the canonical additive character χm of Fpm.

    Lemma 2. [13, p. 195] With symbols and notations above, we have

    ηm(x)=1pmaFpmGmηm(a)χm(ax).

    Let f(x) be a function from Fq to Fp. The Walsh transform of f is defined by

    Wf(β):=xFqζf(x)+Trn1(βx)p,

    for βFq. The following lemma states a property of the Walsh transform of f(x)=αx2, where αFq.

    Lemma 3. [14] For αFq, the Walsh transform coefficient of Trn1(αx2) is equal to

    ωα(β)=xFqζTrn1(αx2)+Trn1(βx)p=(1)n1ηn(α)(p)n2ζTrn1(β24α)p,

    where βFq and p=(1p)p.

    Below we give a few results which are used to obtain the main results of this paper.

    Lemma 4. Let symbols be the same as before. Then we have:

    (1) If s2 is even, then ηn(z)=1, for zFpm.

    (2) If s2 is odd, then ηn(z)=ηm(z), for zFpm.

    Proof. Assume that Fpn=β, we get Fpm=βpn1pm1. For n=ms, we have

    pn1pm1=pm(s1)+pm(s2)++pm+1.

    This means that the parity of (pn1)/(pm1) is the same as s. Hence, we have

    ηn(z)={1,if  s  is even, ηm(z),if   s  is odd,

    for zFpm.

    Lemma 5. [13, Theorem 5.12] For yFpm, we obtain

    zFpmηm(z)ζTrm1(zy)p={0,if  y=0,Gmηm(y),if  yFpm.

    In this section, we provide a construction of strongly regular Cayley graphs and a family of asymptotically optimal codebooks. For αFq, let

    Dα={xFq:ηm(Trnm(αx2))=1}. (3.1)

    The following lemma gives the cardinality of the special subset Dα of Fq.

    Lemma 6. Let symbols be the same as before. Then the cardinality |Dα| of Dα is given by:

    (1) If s is even, then

    |Dα|=12pm(pm1)(pn+ηn(α)(p)n2).

    (2) If s is odd, then

    |Dα|=12(pnpnm+(pm1)(1)n+(p+1)m2(p)m+n2ηn(α)pm).

    Proof. In order to determine the cardinality of Dα, we firstly compute the values of the following two equalities:

    A1=xFpnTrnm(αx2)=01, αFq,A2=xFpnTrnm(αx2)0ηm(Trnm(αx2)), αFq.

    It is clear that

    A1=1pmxFpnzFpmχm(zTrnm(αx2))=1pm(pn+zFpmxFpnχm(Trnm(zαx2))). (3.2)

    Note that

    zFpmxFpnχm(Trnm(zαx2))=zFpmxFpnχn(zαx2).

    By Lemmas 3 and 4, we get

    zFpmxFpnχn(zαx2)={(1)n1ηn(α)pn2(pm1),if  s  even,0,if  s  odd. (3.3)

    Hence, we obtain

    A1={pn+(1)n1ηn(α)(p)n2(pm1)pm,if  s  even,pnm,if  s  odd. (3.4)

    Now we determine the values of A2. By Lemma 2, we have

    A2=GmpmaFpmηm(a)xFpnχn(aαx2)=ηn(α)GmGnpmaFpmηm(a)ηn(a)={0,if  s  even,(1)(p1)m2(pm1)ηn(α)(1)n+m(p)n+m2pm,if   s  odd, (3.5)

    where the last equality follows from the fact that aFpmηm(a)=0 and Lemma 4. By definition, we deduce that

    |Dα|=xFpnTrnm(αx2)0ηm(Trnm(αx2))+12=pn212xFpnTrnm(αx2)=01+12xFpnTrnm(αx2)0ηm(Trnm(αx2)), (3.6)

    The results of this lemma follow from (3.4)–(3.6).

    Example 1. Let p=5, n=4, m=2 and s=2. If α is a primitive element of F54, by Lemma 6 we get |Dα|=288, which agrees with numerical computations by Magma. If α=1, then |D1|=240, which is consistent with Magma program computation.

    Example 2. Let p=7, n=3, m=1 and s=3. If α is a primitive element of F73, by Lemma 6 we get |Dα|=168, which agrees with Magma program. If α=1, then |D1|=126, which coincides with numerical results by Magma program computation.

    Lemma 7. For a,αFpn, define

    Eα,a=xFpnTrnm(αx2)0μa(x).

    (1) If s is an even integer, then

    Eα,a={A(pm1),if  Trnm(a24α)=0,A,if  Trnm(a24α)0,

    where A=(1)n1ηn(α)(p)n2pm.

    (2) If s is an odd integer, then

    Eα,a={0,if  Trnm(a24α)=0,B,if  Trnm(a24α)F2pm,B,if  Trnm(a24α)FpmF2pm,

    where B=(1)n+m(p)m+n2ηn(α)pm.

    Proof. For aFpn, by the orthogonality relation of μa we get

    Eα,a=xFpnTrnm(αx2)=0μa(x)=1pmxFpnzFpmχm(zTrmn(αx2))μa(x)=1pmzFpmxFpnχn(zαx2+ax).

    By Lemma 3, we get

    Eα,a=1pmzFpm(1)n1ηn(zα)(p)n2ζTrn1(a24zα)p.

    From the map z1z, we obtain

    Eα,a=1pmzFpm(1)n1ηn(zα)(p)n2ζTrn1(za24α)p. (3.7)

    When s is even, from Lemmas 4 and 5, we have the result (1) of this lemma.

    When s is odd, the desired result follows from Lemmas 4 and 5.

    Lemma 8. For a,αFpn, let

    Nα,a=xFpnTrnm(αx2)0ηm(Trnm(αx2))μa(x).

    (1) If s is even, then

    Nα,a={0,if  Trnm(a24α)=0,(p)mA,if  Trnm(a24α)F2pm,(p)mA,if  Trnm(a24α)FpmF2pm,

    where A=(1)n1(p)n2ηn(α)pm.

    (2) If s is odd, then

    Nα,a={(pm1)B,if  Trnm(a24α)=0,B,if  Trnm(a24α)0,

    where B=(1)n+m(p)m+n2ηn(α)pm.

    Proof. It follows from Lemma 2 that

    pmNα,a=GmxFpnzFpmχn(ax)ηm(z)χn(zαx2)=GnGmzFpmηm(z)ηn(zα)ζTrn1(a24zα)p.

    From the map z1z, we derive that

    pmNα,a=GnGmηm(z)ηn(zα)ζTrm1(zTrnm(a24α))p. (3.8)

    The desired result follows from (3.8), Lemmas 4 and 5.

    Theorem 9. Let symbols be the same as before and s2 be even. Then the Cayley graph Cay(Fpn,Dα) is strongly regular with non-trivial eigenvalues (p)n2(pm+1)ηn(α)/(2pm) and (p)n2(pm1)ηn(α)/(2pm).

    Proof. For aFpn, we deduce that

    xDαμa(x)=xFpnTrnm(αx2)0μa(x)ηm(Trnm(αx2))+12=12xFpnTrnm(αx2)0μa(x)+12xFpnTrnm(αx2)0μa(x)ηm(Trnm(αx2)),

    where the last equality follows from that ηm(0)=0. Then the desired conclusions follow from Lemmas 7 and 8.

    Remark 1. Let s>1 be an odd integer. Then the eigenvalues of the Cayley graph Cay(Fpn,Dα) can also be computed by a similar method given in Theorem 9. It can be easily checked that

    xDαμa(x){0,(pm1)B2,B},

    where aFpn and B=(1)n+mηn(α)(p)m+n2/pm. This means that the Cayley graph Cay(Fpn,Dα) is not strong regular if s is odd.

    Motivated by the work in [15], we give a construction of asymptotically optimal codebooks based on the strongly regular Cayley graph Cay(Fpn,Dα) defined in Theorem 9. For αFpn, let

    Cα={cα,a:aFpn}, (3.9)

    where cα,a=(1|Dα|μa(x))xDα.

    Theorem 10. Let

    K=12pm(pm1)(pn+ηn(α)(p)n2),

    and let s2 be a fixed even integer. Then Cα defined by (3.9) is an asymptotically optimal codebook with parameters [pn,K].

    Proof. By the definition of Cα and Lemma 6, we deduce that Cα is a [pn,K] codebook. For any two distinct codewords ca and cb in Cα (i.e., abFpn), it can be easily checked that

    |cacHb|=1K|xDαμa(x)¯μb(x)|=1K|xDαμab(x)|.

    It follows from Theorem 9 that

    |cacHb|{pn2(pm+1)2Kpm,pn2(pm1)2Kpm},

    which implies that

    Imax(Cα)=pn2(pm+1)2Kpm.

    According to the Welch bound, we have

    Iw(Cα)=pn+pnm+ηn(α)(1p)n2(pn2m2pn2)2(pn1)K.

    It is easy to check that

    limpn+Imax(Cα)Iw(Cα)=1,

    which means that the codebook Cα is asymptotically optimal with respect to the Welch bound.

    Remark 2. Many readers may wonder what parameters the codebook Cα has when s is an odd integer and whether it is asymptotically optimal. If s is odd, then by Theorems 6 and 9 we know the codebook Cα defined in (3.9) has parameters

    N=pn, K=12(pnpnm+(pm1)(1)n+(p+1)m2(p)m+n2ηn(α)pm),Imax(Cα)=(pm1)B2K.

    It can be verified that

    limpn+Imax(Cα)Iw(Cα)1,

    which implies that C is not asymptotically optimal.

    In Table 1, we assume that α is a primitive element of Fpn, p=3 and s=4. And we show some parameters of the codebook Cα in this table. From Table 1, it can be seen that Cα is asymptotically optimal with respect to the Welch bound for sufficiently large N. This also agrees with the result of Theorem 10.

    Table 1.  The parameters of the codebook Cα in (3.9) for p=3 and s=4.
    m N K Imax(Cα) IW(Cα) Imax/Iw
    2 6561 2808 5/312 1.4273×102 1.2273
    3 531441 254826 7/4719 1.4292×103 1.0379
    4 43046721 21228480 41/262080 1.5452×104 1.0124
    5 348684401 1735953120 61/3571920 1.7008×105 1.0041
    6 282429536481 141013893384 365/193434696 1.884×106 1.0014

     | Show Table
    DownLoad: CSV

    To give a comparison, we present the parameters (N,K) of some known asymptotically optimal codebooks and the codebook defined in (3.9) in Table 2. From this table, we can conclude that Cα has new parameters.

    Table 2.  The parameters of codebooks asymptotically meeting the Welch bound.
    Constraints Ref. Parameters (N,K)
    q is a prime power [16] (q,q+12)
    n>1, 1il, si>1
    qi=2si l>1
    [17] (2K+(1)ln,K),
    K=(q11)n(ql1)n(1)ln2
    1il, qi is a prime power, qi3(mod4) [18] (q1q2ql,(q1q2ql1)/2)
    q is a prime power, >2 [19] ((q1)+M,M)
    M=(q1)+(1)+1q,
    q is a prime power [20] (q3+q2q,q2q)
    q is a prime power [20] (q3+q2,q2)
    s>1, m>1,
    q is a prime power
    [21] ((qs1)m+qsm1,qsm1)
    s>1, m>1,
    q is a prime power
    [21] ((qs1)m+M,M)
    M=(qs1)m+(1)m+1q
    αFpn,
    p is an odd prime,
    n=ms, s is even Thm. 10 (pn,pm12pmC)
    C=pn+ηn(α)(1p)n2pn2

     | Show Table
    DownLoad: CSV

    In this paper, we propose a method for constructing strongly regular graphs. Then we use the connection set Dα (αFpn) of the strongly regular graph Cay(Fpn,Dα) to give a class of codebook Cα. In addition, the parameters [N,K] and Imax(Cα) of the codebook Cα are determined in Theorem 10. Table 1 demonstrates that these proposed codebooks are asymptotically optimal according to the Welch bound.

    The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This work was supported by the Innovation Project of Engineering Research Center of Integration and Application of Digital Learning Technology (No.1221049), Humanities and Social Sciences Youth Foundation of Ministry of Education of China (No. 22YJC870018), the Science and Technology Development Fund of Tianjin Education Commission for Higher Education (No. 2020KJ112, KYQD1817, 2022KJ075), Haihe Laboratory of Information Technology Application Innovation (No. 22HHXCJC00002), the National Natural Science Foundation of China (Grant No. 12301670).

    The authors declare no conflicts of interest.



    [1] R. C. Bose, Strongly regular graphs, partial geometries and partially balanced designs, Pac. J. Math., 13 (1963), 389–419. Available from: https://msp.org/pjm/1963/13-2/pjm-v13-n2-p04-s.pdf.
    [2] P. J. Cameron, Strongly regular graphs, Selected Topics in Graph Theory, New York: Academic Press, 1978,337–360. Available from: http://vlsicad.eecs.umich.edu/BK/SAUCY/papers/srg_cameron.pdf.
    [3] A. E. Brouwer, J. H. Van Lint, Strongly regular graphs and partial geometries, Enumeration and Designs, New York: Academic Press, 2022. Available from: https://pure.tue.nl/ws/files/2394798/595248.pdf.
    [4] A. E. Brouwer, R. M. Wilson, Q. Xiang, Cyclotomy and strongly regular graphs, J. Algebr. Comb., 10 (1999), 25–28. https://doi.org/10.1023/A:1018620002339 doi: 10.1023/A:1018620002339
    [5] T. Feng, Q. Xiang, Strongly regular graphs from unions of cyclotomic classes, J. Combin. Theory B, 102 (2012), 982–995. https://doi.org/10.1016/j.jctb.2011.10.006 doi: 10.1016/j.jctb.2011.10.006
    [6] T. Feng, K. Momihara, Q. Xiang, Constructions of strongly regular Cayley graphs and skew Hadamard difference sets from cyclotomic classes, Combinatorica, 35 (2015), 413–434. https://doi.org/10.1007/s00493-014-2895-8 doi: 10.1007/s00493-014-2895-8
    [7] P. J. Cameron, J. H. van Lint, Designs, graphs, codes and their links, Cambridge: Cambridge University Press, 1991.
    [8] J. M. Goethals, J. J. Seidel, Strongly regular graphs derived from combinatorial design, Geom. Combin., 1991, 44–61.
    [9] L. Welch, Lower bounds on the maximum cross correlation of signals, IEEE T. Inform. Theory, 20 (1974), 397–399. https://doi.org/10.1109/TIT.1974.1055219 doi: 10.1109/TIT.1974.1055219
    [10] Q. Wang, Y. Yan, Asymptotically optimal codebooks derived from generalised bent functions, IEEE Access, 8 (2020), 54905–54909. https://doi.org/10.1109/ACCESS.2020.2980330 doi: 10.1109/ACCESS.2020.2980330
    [11] W. Lu, X. Wu, X. Cao, Three constructions of asymptotically optimal codebooks via multiplicative characters of finite fields, Adv. Math. Commun., 2022, 1–9. https://doi.org/10.3934/amc.2022091
    [12] Y. Yan, Y. Yao, Z. Chen, Q. Wang, Two new families of asymptotically optimal codebooks from characters of cyclic groups, IEICE T. Fund. Electr., E104 (2021), 1027–1032. https://doi.org/10.1587/transfun.2020EAP1124 doi: 10.1587/transfun.2020EAP1124
    [13] R. Lidl, H. Niederreiter, Finite fields, Cambridge: Cambridge University Press, 1997. Available from: https://dl.acm.org/doi/10.5555/248301.
    [14] T. Helleseth, A. Kholosha, Monomial and quadratic bent functions over the finite fields of odd characteristic, IEEE T. Inform. Theory, 52 (2006), 2018–2032. Available from: http://www.ii.uib.no/publikasjoner/texrap/ps/2005-310.ps.
    [15] C. Ding, T. Feng, A generic construction of complex codebooks meeting the Welch bound, IEEE T. Inform. Theory, 53 (2007), 4245–4250. https://doi.org/10.1109/TIT.2007.907343 doi: 10.1109/TIT.2007.907343
    [16] C. Li, Q. Yue, Y. Huang, Two families of nearly optimal codebooks, Design. Code. Cryptogr., 75 (2015), 43–57. https://doi.org/10.1007/s10623-013-9891-7 doi: 10.1007/s10623-013-9891-7
    [17] G. Luo, X. Cao, Two constructions of asymptotically optimal codebooks, Cryptogr. Commun., 11 (2019), 825–838. https://doi.org/10.1007/s12095-018-0331-4 doi: 10.1007/s12095-018-0331-4
    [18] H. Hu, J. Wu, New constructions of codebooks nearly meeting the Welch bound with equality, IEEE T. Inform. Theory, 60 (2014), 1348–1355. https://doi.org/10.1109/TIT.2013.2292745 doi: 10.1109/TIT.2013.2292745
    [19] Z. Heng, C. Ding, Q. Yue, New constructions of asymptotically optimal codebooks with multiplicative characters, IEEE T. Inform. Theory, 63 (2017), 6179–6187. https://doi.org/10.1109/TIT.2017.2693204 doi: 10.1109/TIT.2017.2693204
    [20] L. Tian, Y. Li, T. Liu, C. Xu, Constructions of codebooks asymptotically achieving the welch bound with additive characters, IEEE Signal Proc. Let., 26 (2019), 622–626. https://doi.org/10.1109/LSP.2019.2891896 doi: 10.1109/LSP.2019.2891896
    [21] G. Luo, X. Cao, Two constructions of asymptotically optimal codebooks via the hyper eisenstein sum, IEEE T. Inform. Theory, 64 (2018), 6498–6505. https://doi.org/10.1109/TIT.2017.2777492 doi: 10.1109/TIT.2017.2777492
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1196) PDF downloads(87) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog