{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:49:37Z","timestamp":1749703777591,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T00:00:00Z","timestamp":1677283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T00:00:00Z","timestamp":1677283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000893","name":"Simons Foundation","doi-asserted-by":"publisher","award":["709212"],"award-info":[{"award-number":["709212"]}],"id":[{"id":"10.13039\/100000893","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s12095-023-00635-5","type":"journal-article","created":{"date-parts":[[2023,2,25]],"date-time":"2023-02-25T15:02:26Z","timestamp":1677337346000},"page":"719-729","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Welch bound equality sets with few distinct inner products from Delsarte-Goethals sets"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3823-6540","authenticated-orcid":false,"given":"Somantika","family":"Datta","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,25]]},"reference":[{"issue":"3","key":"635_CR1","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/TIT.1974.1055219","volume":"20","author":"LR Welch","year":"1974","unstructured":"Welch, L.R.: Lower bounds on the maximum cross correlation of signals. IEEE Trans. Inf. Theory 20(3), 397\u2013399 (1974)","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"Klappenecker, A., R\u00f6tteler, M.: Mutually unbiased bases are complex projective 2-designs. In: Proceedings of the International Symposium on Information Theory, pp. 1740\u20131744 (2005)","key":"635_CR2","DOI":"10.1109\/ISIT.2005.1523643"},{"issue":"3","key":"635_CR3","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/S1063-5203(03)00023-X","volume":"14","author":"T Strohmer","year":"2003","unstructured":"Strohmer, T., Heath, R.W. Jr: Grassmannian frames with applications to coding and communication. Appl. Comput. Harmon. Anal. 14(3), 257\u2013275 (2003)","journal-title":"Appl. Comput. Harmon. Anal."},{"issue":"9","key":"635_CR4","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1109\/TIT.2003.815788","volume":"49","author":"S Waldron","year":"2003","unstructured":"Waldron, S.: Generalized Welch bound equality sequences are tight frames. IEEE Trans. Inf. Theory 49(9), 2307\u20132309 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"635_CR5","volume-title":"Meeting the Welch Bound with Equality. DMTCS Series","author":"DV Sarwate","year":"1999","unstructured":"Sarwate, D.V.: Meeting the Welch Bound with Equality. DMTCS Series. Springer, Berlin (1999). Chap. 11"},{"doi-asserted-by":"crossref","unstructured":"Xia, P., Zhou, S., Giannakis, G.B.: Achieving the Welch bound with difference sets. IEEE Trans. Inf. Theory 51(5) (2005)","key":"635_CR6","DOI":"10.1109\/TIT.2005.846411"},{"doi-asserted-by":"crossref","unstructured":"Ding, C., Feng, T.: A generic construction of complex codebooks meeting the Welch bound. IEEE Trans, Inf. Theory 53(11) (2007)","key":"635_CR7","DOI":"10.1109\/TIT.2007.907343"},{"key":"635_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.laa.2003.07.012","volume":"377","author":"RB Holmes","year":"2004","unstructured":"Holmes, R.B., Paulsen, V.I.: Optimal frames for erasures. Linear Algebra Appl. 377, 31\u201351 (2004)","journal-title":"Linear Algebra Appl."},{"doi-asserted-by":"crossref","unstructured":"Massey, J.L., Mittelholzer, T.: Welch\u2019s bound and sequence sets for code-division multiple-access systems. In: Capocelli, R., De Santis, A., Vaccaro, U. (eds.) Sequences, II: Methods in Communication, Security and Computer Science (Positano, 1991), pp 63\u201378. Springer (1993)","key":"635_CR9","DOI":"10.1007\/978-1-4613-9323-8_7"},{"issue":"10","key":"635_CR10","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1016\/j.laa.2012.05.036","volume":"437","author":"S Datta","year":"2012","unstructured":"Datta, S., Howard, S., Cochran, D.: Geometry of the Welch bounds. Linear Algebra Appl. 437(10), 2455\u20132470 (2012)","journal-title":"Linear Algebra Appl."},{"key":"635_CR11","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/S1385-7258(66)50038-5","volume":"28","author":"JH van Lint","year":"1966","unstructured":"van Lint, J.H., Seidel, J.J.: Equilateral point sets in elliptic geometry. Nederl. Akad. Wetensch. Proc. Ser. A 69=Indag. Math. 28, 335\u2013348 (1966)","journal-title":"Nederl. Akad. Wetensch. Proc. Ser. A 69=Indag. Math."},{"issue":"3","key":"635_CR12","first-page":"91","volume":"30","author":"P Delsarte","year":"1975","unstructured":"Delsarte, P., Goethals, J.M., Seidel, J.J.: Bounds for systems of lines and Jacobi polynomials. Philips Res. Repts. 30(3), 91\u2013105 (1975). Issue in honour of C.J. Bouwkamp","journal-title":"Philips Res. Repts."},{"issue":"2-3","key":"635_CR13","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.laa.2007.05.043","volume":"426","author":"MA Sustik","year":"2007","unstructured":"Sustik, M.A., Tropp, J.A., Dhillon, I.S., Heath, R.W. Jr: On the existence of equiangular tight frames. Linear Algebra Appl. 426(2-3), 619\u2013635 (2007)","journal-title":"Linear Algebra Appl."},{"issue":"1","key":"635_CR14","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/j.laa.2008.08.002","volume":"430","author":"BG Bodmann","year":"2009","unstructured":"Bodmann, B.G., Paulsen, V.I., Tomforde, M.: Equiangular tight frames from complex Seidel matrices containing cube roots of unity. Linear Algebra Appl. 430(1), 396\u2013417 (2009)","journal-title":"Linear Algebra Appl."},{"issue":"6","key":"635_CR15","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1063\/1.1737053","volume":"45","author":"JM Renes","year":"2004","unstructured":"Renes, J.M., Blume-Kohout, R., Scott, A.J., Caves, C.M.: Symmetric informationally complete quantum measurements. J. Math. Phys. 45(6), 2171\u20132180 (2004)","journal-title":"J. Math. Phys."},{"unstructured":"Grassl, M.: On SIC-POVMs and MUBs in dimension 6. In: Proc. ERATO Conf. on Quant. Inf. Science (EQUIS 2004), pp 60\u201361 (2004)","key":"635_CR16"},{"issue":"4","key":"635_CR17","doi-asserted-by":"publisher","first-page":"042203","DOI":"10.1063\/1.3374022","volume":"51","author":"AJ Scott","year":"2010","unstructured":"Scott, A.J., Grassl, M.: Symmetric informationally complete positive-operator-valued measures: A new computer study. J. Math. Phy. 51(4), 042203 (2010). https:\/\/doi.org\/10.1063\/1.3374022","journal-title":"J. Math. Phy."},{"issue":"16","key":"635_CR18","doi-asserted-by":"publisher","first-page":"165302","DOI":"10.1088\/1751-8121\/aab4cd","volume":"51","author":"M Appleby","year":"2018","unstructured":"Appleby, M., Chien, T.-Y., Flammia, S., Waldron, S.: Constructing exact symmetric informationally complete measurements from numerical solutions. J. Phys. A Math. Theor. 51(16), 165302 (2018). https:\/\/doi.org\/10.1088\/1751-8121\/aab4cd","journal-title":"J. Phys. A Math. Theor."},{"unstructured":"Scott, A.J.: SICs: Extending the list of solutions.arXiv:1703.03993 (2017)","key":"635_CR19"},{"issue":"2","key":"635_CR20","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"AR Hammons","year":"1994","unstructured":"Hammons, A.R., Kumar, P.V., Calderbank, A.R., Sloane, N.J.A., Sole, P.: The $\\mathbb {Z}_{4}$-linearity of Kerdock, Preparata, Goethals, and related codes. IEEE Trans. Inf. Theory 40(2), 301\u2013319 (1994). https:\/\/doi.org\/10.1109\/18.312154","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"635_CR21","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/JSTSP.2010.2043161","volume":"4","author":"R Calderbank","year":"2010","unstructured":"Calderbank, R., Howard, S., Jafarpour, S.: Construction of a large class of deterministic sensing matrices that satisfy a statistical isometry property. IEEE J. Sel. Top. Sig. Process. 4(2), 358\u2013374 (2010). https:\/\/doi.org\/10.1109\/JSTSP.2010.2043161","journal-title":"IEEE J. Sel. Top. Sig. Process."},{"doi-asserted-by":"crossref","unstructured":"Kerdock, A.M.: A class of low rate nonlinear binary codes. Information and Control (1972)","key":"635_CR22","DOI":"10.1016\/S0019-9958(72)90376-2"},{"unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland Pub. Co (16) (1977)","key":"635_CR23"},{"doi-asserted-by":"publisher","unstructured":"Kantor, W.M.: MUBs inequivalence and affine planes. J. Math. Phys. 53. https:\/\/doi.org\/10.1063\/1.3690050 (2012)","key":"635_CR24","DOI":"10.1063\/1.3690050"},{"unstructured":"Keung, R., Gross, D.: Qubit stabilizer states are complex projective 3-designs. arXiv:1510.02767 (2015)","key":"635_CR25"},{"key":"635_CR26","volume-title":"An Introduction to Frames and Riesz Bases. Applied and Numerical Harmonic Analysis","author":"O Christensen","year":"2016","unstructured":"Christensen, O.: An Introduction to Frames and Riesz Bases. Applied and Numerical Harmonic Analysis, 2nd edn. Birkh\u00e4user, Birkh\u00e4user (2016)","edition":"2nd edn."},{"issue":"19","key":"635_CR27","doi-asserted-by":"publisher","first-page":"5222","DOI":"10.1109\/TSP.2015.2450195","volume":"63","author":"M Thill","year":"2015","unstructured":"Thill, M., Hassibi, B.: Group frames with few distinct inner products and low coherence. IEEE Trans. Sig. Process. 63(19), 5222\u20135237 (2015). https:\/\/doi.org\/10.1109\/TSP.2015.2450195","journal-title":"IEEE Trans. Sig. Process."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00635-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-023-00635-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-023-00635-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T07:09:18Z","timestamp":1680073758000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-023-00635-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,25]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["635"],"URL":"https:\/\/doi.org\/10.1007\/s12095-023-00635-5","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2023,2,25]]},"assertion":[{"value":"16 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}