Skip to main content
Entropy logoLink to Entropy
. 2021 Aug 26;23(9):1108. doi: 10.3390/e23091108

The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings

Jheyne N Ortiz 1,*, Robson R de Araujo 2, Diego F Aranha 3, Sueli I R Costa 4, Ricardo Dahab 1
Editors: Amin Sakzad, Khoa Nguyen
PMCID: PMC8465940  PMID: 34573733

Abstract

Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring instantiations enlarges the scope of possible applications and favors the diversification of security assumptions. In this work, we extend the Ring-LWE problem in lattice-based cryptography to include algebraic lattices, realized through twisted embeddings. We define the class of problems Twisted Ring-LWE, which replaces the canonical embedding by an extended form. By doing so, we allow the Ring-LWE problem to be used over maximal real subfields of cyclotomic number fields. We prove that Twisted Ring-LWE is secure by providing a security reduction from Ring-LWE to Twisted Ring-LWE in both search and decision forms. It is also shown that the twist factor does not affect the asymptotic approximation factors in the worst-case to average-case reductions. Thus, Twisted Ring-LWE maintains the consolidated hardness guarantee of Ring-LWE and increases the existing scope of algebraic lattices that can be considered for cryptographic applications. Additionally, we expand on the results of Ducas and Durmus (Public-Key Cryptography, 2012) on spherical Gaussian distributions to the proposed class of lattices under certain restrictions. As a result, sampling from a spherical Gaussian distribution can be done directly in the respective number field while maintaining its format and standard deviation when seen in Zn via twisted embeddings.

Keywords: lattice-based cryptography, twisted embeddings, ring learning with errors, spherical Gaussian sampling, ℤn-equivalent lattices

1. Introduction

Lattice-based cryptography comprehends the class of cryptosystems whose security is based on the conjectured intractability of hard lattice problems such as the Shortest Independent Vectors Problem (SIVP), the Shortest Vector Problem (SVP), and the Closest Vector Problem (CVP) [1,2]. The main computational problem in the foundation of most modern lattice-based cryptosystems is Learning with Errors (LWE) [3]. Since its introduction in the cryptographic realm in 2005, algebraically structured variants have been proposed, such as Learning with Errors over Rings [4], denoted Ring-LWE, and Module-LWE [5,6,7], among others [8].

Although the Ring-LWE hardness results hold for any number field [4,9], its most used instantiation in lattice-based cryptosystems is over power-of-two cyclotomic number fields, as evidenced by the finalists of NIST’s Post-Quantum Cryptography standardization effort [10]. This choice of a number field is particularly interesting because its ring of integers is isomorphic to the polynomial ring R=Z[x]/(xn+1), for n a power of two. The fact that xn+1 is maximally sparse allows efficient polynomial multiplication using the number-theoretic transform combined with the negacyclic convolution. In addition to that, the transformation from the ring R to its dual, denoted R, is a simple scaling of the form R=mR, allowing applications to work directly on R, with no loss in their underlying worst-case hardness guarantees [4].

Another advantage of power-of-two cyclotomic number fields is that the sampling of error terms can be performed directly in the ring R considering a power basis, since the transformation to the associated vector subspace H isomorphic to Rn is just a rigid rotation followed by scaling. For other choices of cyclotomic fields, sampling from a spherical Gaussian distribution can be done in an extended ring and performing a reduction modulo the cyclotomic polynomial Φm(x), which leads to the desired spherical distribution in the canonical embedding [11]. For general number fields, the best option in terms of security still is a sampling from an error distribution in H and computing the inverse transformation with respect to the canonical embedding [4,12].

There are several works in the literature exploring properties of number fields used in the foundation of some cryptosystems based on ideal lattices. An example is a quantum polynomial-time algorithm to find a small generator of a principal ideal in the ring of algebraic integers of cyclotomic rings [13], which applies to a few schemes including the fully-homomorphic encryption scheme of Smart and Vercauteren [14]. Moreover, a sequence of works has characterized weak instances of Ring-LWE and Poly-LWE problems and proposed attacks using special properties for specific parameters [15,16,17,18,19,20,21,22,23,24]. Another motivation for searching for alternative number fields is the inflexibility of system parameters that grow as a power-of-two. In such cryptosystems, when it is required to increase the security level, it may be necessary to increase the lattice dimension which implies doubling its size. However, a more suitable dimension could be a value much smaller than the next power of two. In fact, a ring dimension ranging from 700 to 800 suffices for 128-bit security [25].

Although these weak instances are not addressed by worst-case hardness theorems [26], new proposals adopting non-conventional rings have emerged as alternatives, thus favoring the diversification of security assumptions. For NTRU-based schemes, examples are the NTTRU [27], the third-round NTRU submission [28] in the NIST Post-Quantum Cryptography contest [10], and NTRU Prime [29]. For Ring-LWE, the instantiations have been restricted to cyclotomic number fields. Lyubashevsky, Peikert, and Regev introduced a toolkit with techniques for secure implementation of Ring-LWE primitives over any cyclotomic number field [12], allowing applications to work on cyclotomic rings with non-power-of-two dimension. Later on, this toolkit was implemented in software in two distinct libraries [30,31]. An alternative instantiation could be the adoption of the polynomial ring Z[x]/(xpx1) for p prime, which was proposed for NTRU Prime [29], and suggested for the Ring-LWE setting [32]. In this sense, we conjecture whether the Ring-LWE problem could be parameterized by number fields other than the cyclotomic for cryptographic applications.

1.1. Contributions

In this context, we extend the Ring-LWE class of problems to embrace more general algebraic constructions of lattices which allow additional factors on the embedding coordinates. We replace the canonical embedding by twisted embeddings. Since the canonical embedding is a special case of twisted embeddings, this replacement maintains the consolidated results for Ring-LWE. Twisted embeddings have been useful in coding theory, since they allow the construction of algebraic lattices with improved properties for Rayleigh fading channels, providing high density, maximum diversity, and great minimum product distance [33,34,35].

We extend the Ring-LWE problem by replacing the canonical embedding with twisted embeddings on both the search and decision variants. As a result, we obtain the Twisted Ring-LWE problem, in which the error terms are sampled in the space H isomorphic to Rn under the inner product induced by a twisted embedding. We show that Twisted Ring-LWE is at least as secure as Ring-LWE through a security reduction from Ring-LWE to Twisted Ring-LWE. We also recomputed the approximation factors in the worst-case to average-case reductions from hard lattice problems taking into account the new twist factor.

As a result, algebraic constructions from coding theory via twisted embeddings can also be used in cryptographic applications based on the Ring-LWE problem. In this work, we focused our attention on the algebraic construction of rotated Zn-lattices via twisted embeddings. Ducas and Durmus [11] showed that a spherical Gaussian distribution in the ring Q[x]/(Θm(x)), where Θm(x)=xm1 if m is odd, and Θm(x)=xm2+1 if m is even, corresponds to a distribution with the same format in the space H, but linearly wider in the ring dimension. This occurs because the lattice obtained from the ring Q[x]/(Θm(x)) is a rotated Zn-lattice in the canonical embedding. The same holds for the ring of integers of a power-of-two cyclotomic number field. Thus, we generalize this result of Ducas and Durmus by showing that if the parameter ring leads to a rotated Zn-lattice under twisted embeddings, then both the format and the standard deviation of a spherical Gaussian distribution in KR is preserved when seen in H. Examples of ideal lattices equivalent to Zn are those obtained from power-of-two cyclotomic number fields [36], and their maximal real subfields [37], and the maximal real subfields of p-th cyclotomic number fields. Since power-of-two cyclotomic rings have been widely used in cryptographic applications, we consider parameterizing the Ring-LWE problem with the ring of integers of the maximal real subfield of a cyclotomic number field. We discuss the limitations of using maximal real subfields in a public-key encryption scheme [12] using the polynomial representation in terms of the arithmetic operations and the expansion factor of the defining polynomial. However, we argue that these limitations could be circumvented by using the coefficient vector representation, as done in [12]. Finally, we also argue that twisted embeddings can be used as a tool to connect Ring-LWE instances over distinct rings, which may lead to a response to the open question left by Peikert, Regev, and Stephens-Davidowitz [9]. In fact, if the parameter rings generate the same algebraic lattice in the space H, their Ring-LWE instances can be efficiently converted between themselves.

1.2. Organization

This paper is organized as follows. Section 2 is devoted to the introduction of concepts and results on lattices and algebraic number theory to be used throughout the paper. In particular, Section 2.4 presents the original statement of the Ring-LWE problem in its search and decision variants, and also the computational problems which form the foundation of the (Ring)-LWE hardness.

Section 3 introduces the twisted embeddings and generalizes the class of Ring-LWE problems by adopting twisted embeddings. We prove that multiplying the coordinates of vectors in the canonical representation by a twisting factor does not affect the hardness of Ring-LWE. This is shown via a reduction from both search and decision versions of Ring-LWE to their corresponding twisted forms. Moreover, we compute the new approximation factors for the reduction from SIVP to DGS (Discrete Gaussian Sampling problem), and also for the reduction from DGS to Ring-LWE. Since the new approximation factors are simply multiplied by a scalar associated with the lattice dimension n, the asymptotic factors are not affected by the change of embeddings.

Section 4 extends to a more general class of number fields the results of Ducas and Durmus on spherical Gaussian sampling [11]. We show that correct noise sampling can be performed directly in the field representation of lattices equivalent to Zn without any increase in the standard deviation. Section 4.1 discusses the practical impacts of instantiating the Ring-LWE problem over the ring of integers of the maximal real cyclotomic number field Q(ζp+ζp1), where p5 is a prime number. We analyze the main computational operations in the compact public-key cryptosystem of Lyubashevsky, Peikert, and Regev [12], and also the format of the ring’s defining polynomial in terms of the expansion factor. Finally, Section 5 discuss our results and highlight future research directions on the practical aspects of the Twisted Ring-LWE problem.

2. Preliminaries on Lattices and Algebraic Number Theory

In this section, we introduce concepts, results and notation to be used throughout the paper. For a positive integer number m, denote by [m] the set {1,2,,m}. For 1p<, the p-norm of a vector a in Rn or Cn is ap=i=1n|ai|p1/p, and the -norm is a=maxi[n]|ai|.

2.1. The Space H

Frequently, lattices are defined in the Euclidean space Rn. However, in the Ring-LWE context [4,9], it is more convenient to define lattices in a specific subspace of Cn isometric to Rn: the space H.

Definition 1

(Space H). Let s1 and s2 be non-negative integer numbers such that n=s1+2s2>0. The subspace HCnis defined as

H=a1,a2,,anRs1×C2s2:aj+s1+s2=aj+s1¯,j[s2].

We consider H endowed with the inner product obtained as a restriction of the standard inner product of Cn:

a,bH:=i[n]aibi¯=i[s1]aibi+j[s2]aj+s1bj+s1+s2+aj+s1+s2bj+s1R.

The norm (usually 2-norm) of a=(a1,a2,,an)H is defined as a=a,aH.

For i[n], denote by ui the vector with all zero coordinates except for the i-th position, which is equal to one. We consider {u1,u2,,un} the canonical basis of Rn (over R) and Cn (over C). An orthonormal basis for H can be defined in terms of the canonical basis of Cn:

Definition 2

(Canonical basis of H). Let s1 and s2 be non-negative integer numbers such that n=s1+2s2>0. For i[s1], define hi=ui. For i[s2], define hi+s1=12ui+s1+ui+s1+s2 and hi+s1+s2=i2(ui+s1ui+s1+s2). Then, the set B={h1,h2,,hn} is an orthonormal basis of H, which we call the canonical basis of H as an n-dimensional R-vector space.

Notice that any vector a=(a1,a2,,an)HCn can be written as an R-linear combination of the vectors of the canonical basis B of H as

a=i[s1]aihi+i[s2]2(ai+s1)hi+s1+i[s2]2(ai+s1)hi+s1+s2,

where (·) and (·) denote the real and imaginary parts of a complex number, respectively.

The linear map κi[n]bihi:=i[n]biui, with biR, defines an isomorphism between the R-vector spaces H and Rn, such that a,bH=κ(a),κ(b), where ·,· denotes the standard inner product in Rn. Then, it follows that H and Rn are isometric, that is, H is an Euclidean space, as defined next. In particular, the norm of an element aH coincides with the usual norm (2-norm) of κ(a)Rn, that is, a=κ(a)2.

2.2. Lattices in Euclidean Vector Spaces

An Euclidean vector space (E,·,·E) is an n-dimensional R-vector space E with an inner product ·,·E, which is isometric to Rn with the standard inner product. Consider an orthonormal basis B(E)={e1,e2,,en} of E.

A set ΛE is said to be a full-rank lattice (or simply lattice), if Λ is a discrete additive subgroup of E with rank n. Equivalently, ΛE is a lattice if there exists a set of linearly independent vectors B={v1,v2,,vn}E such that

Λ=Λ(B)=i[n]aivi:aiZ.

The set B is called a basis (or a Z-basis) of Λ. For each vjB, it can be written in terms of the orthonormal basis B(E) as vj=i[n]vijei for vijR.

The minimum distance of a lattice Λ in the p-norm, denoted λ1(p)(Λ), is the length of a shortest nonzero lattice vector, that is, λ1(p)(Λ)=min0xΛxp. Similarly, for any kn, the k-th successive minimum of a lattice Λ, denoted λk(p)(Λ), is the smallest r^>0 such that Λ contains at least k linearly independent vectors of norm at most r^.

The matrix M=[vij]n×n, for which the j-th column is given by the coefficients of vj written in the orthonormal basis B(E), is called a generator matrix of Λ. Two basis generate the same lattice if and only if the associated generator matrices M and M are related as M=MU, where U is unimodular (has integer entries and det(U)=±1). The matrix G=MtM is called the Gram matrix of Λ with respect to M. Since the basis B(E) of the Euclidean vector space is orthonormal, then G=[vi,vjE]n×n. The determinant of G is called the determinant of Λ and is denoted by det(Λ). Clearly, det(Λ)=det(M)2 does not depend of a particular basis of Λ.

The dual lattice of Λ is the lattice Λ*={aE:a,bEZ,bΛ} and has generator matrix (Mt)1. It is known that (Λ*)*=Λ and if Λ has generator matrix M, then (Mt)1 is a generator matrix for Λ* and therefore det(Λ*)=det(Λ)1.

A lattice ΛE is called integral if a,bEZ for all a,bΛ. Equivalently, Λ is an integral lattice if and only if ΛΛ*Λ/det(Λ). An integral lattice is called unimodular, or self-dual, if det(Λ)=1 or, equivalently, if Λ=Λ*.

Two lattices Λ and Λ are said to be equivalent if one can be obtained from the other through a rotation, a reflection, or a change of scale. We denote this equivalence by ΛΛ. Two Gram matrices G and G of two equivalent lattices Λ and Λ, respectively, are related as G=c2UtGU, where c0 is a real constant and U is unimodular.

We say that a lattice Λ in (E,·,·E) is orthogonal if it has a basis B={v1,v2,,vn} such that vi,vj=0 if ij, for all i,j[n]. This means that Λ has a diagonal Gram matrix. Moreover, if the basis B satisfies vi,vj=0 if ij and vi,vj=c if i=j, for all i,j[n] and cR, then Λ is equivalent to the Zn-lattice. In this case, Λ has a Gram matrix G=cIdn. In particular, when c=1, we say that Λ is an orthonormal lattice.

Gaussian Measures

For r>0, define the Gaussian function ρr,c:H(0,1] centered at c as

ρr,c(a)=exp(πac2/r2). (1)

The subscript c is taken to be 0 when omitted. By normalizing this function, we obtain the continuous Gaussian probability distribution Dr of width r, whose density is given by rn·ρr(x).

We extend this definition to elliptical Gaussian distributions in {hi}i[n] (the canonical basis of H) as follows. Let r=(r1,,rn)(R+)n be a vector of positive real numbers such that rj+s1+s2=rj+s1 for each j[s2]. Then, a sample from the n-dimensional distribution Dr is given by i[n]xihi, where the xi are chosen independently from the (one-dimensional) Gaussian distribution Dri over R.

The smoothing parameter is a lattice parameter defining the width beyond which a discrete Gaussian starts to behave similarly to a continuous distribution [38]. It is related to the minimum distance and the successive minimum of a lattice and it will be used to derive the approximation factors in the worst-case to average-case reduction for to the Twisted Ring-LWE problem. The Gaussian mass of a coset c+Λ is defined as ρr(c+Λ)=xc+Λρr(x).

Definition 3

(Smoothing parameter). For an n-dimensional lattice Λ and positive real ϵ>0, the smoothing parameter ηϵ(Λ) is the smallest r such that ρ1/r(Λ*\{0})ϵ.

For any cRn, real r>0, and an arbitrary lattice Λ with dimension n, normalizing the Gaussian function ρr,c(a) gives the discrete Gaussian distribution over Λ as

DΛ,r,c(a)=ρr,c(a)ρr,c(Λ),

for all aΛ.

2.3. Algebraic Number Theory

In this section, we summarize concepts and results from algebraic number theory, presenting as an example the case of cyclotomic number fields and their maximal real subfields. Details can be found in [39,40].

An (algebraic) number field K is a finite extension of the field Q. This means that QK and K is a Q-vector space with finite dimension. The degree of K, denoted [K:Q], is the dimension of the Q-vector space K. In general, if K and L are number fields such that KL, the symbol [L:K] is defined to be the integer number [L:Q]/[K:Q] and is called the degree of the extension L/K.

By the Primitive Element Theorem, there exists an element θK such that K=Q(θ), which is equivalent to say that {1,θ,θ2,,θn1}, with n=[K:Q], is a power basis of K over Q. Also, if p(x) is the minimal polynomial of θ over Q, then K is isomorphic to Q[x]/(p(x)) and K=Q(θ) for some root θ of p(x). The roots of p(x) are called the conjugates of θ.

Example 1

(Cyclotomic number field). A number field of particular interest is Q(ζm), the m-th cyclotomic field, where ζm=exp(2πi/m) is a primitive m-th root of unity for any integer number m1. The degree of Q(ζm) is φ(m), where φ(·) denotes Euler’s totient function. The minimal polynomial of ζm, called the m-th cyclotomic polynomial, is Φm(x)=kZm*(xζmk), where Zm* denotes the group of invertible elements in Zm.

Example 2

(Maximal real subfield). For m2(mod4), m>1, the number field Q(ζm+ζm1)RQ(ζm) is the maximal real subfield of Q(ζm) and has degree φ(m)/2.

Let K be a number field. A map ¯:KK is called an involution of K if a+b¯=a¯+b¯, a·b¯=a¯·b¯, and a¯¯=a, for all a,bK. If K=C, the complex conjugation is an example of involution. If K=Q(ζm) is a cyclotomic number field, then ζm¯=ζm1 is the same involution given by the complex conjugation. In this work, whenever the cyclotomic number field is used, we implicitly assume this involution. For the maximal real subfield Q(ζm+ζm1), we consider the involution given by the identity map.

The subfield F={aKa¯=a}, called the fixed field by involution of K, satisfies [K:F]2. When [K:F]=1 (or F=K), we say that the involution is trivial (it is the identity); otherwise, the involution is said to be non-trivial. If K=Q(ζm), the fixed field by the involution ζm¯=ζm1 of K is its maximal real subfield [36].

2.3.1. Field Monomorphisms

Let K be a number field of degree n. There are exactly n distinct monomorphisms (of fields) from K to C. These monomorphisms are Q-monomorphisms. If K=Q(θ) and p(x) is the minimal polynomial of θ, these monomorphisms can be defined as σi(θ)=θi for i[n], where θi are all the distinct roots of p(x).

A monomorphism σi:KC is said to be real if σi(K)R. Otherwise, it is said to be complex. If σi is a complex monomorphism, then σi¯ is another complex monomorphism defined by σi¯(a)=σi(a)¯. So, we can write the degree n as n=s1+2s2, where s10 is the number of real monomorphisms and 2s20 is the number of complex monomorphisms from K to C. The canonical embedding from K into the subspace H is the homomorphism

σ(a)=σ1(a),σ2(a),,σn(a).

Its image is a lattice, used in the Ring-LWE problem [4,9].

The pair (s1,s2) is called the signature of K. We say that K is totally real when s2=0, and that K is totally complex when s1=0. The number field K is said to be a CM-field if it is totally complex and has degree two over its fixed field by the involution F [36].

Any cyclotomic number field K=Q(ζm), with m3, is totally complex. Their monomorphisms are defined as σi(ζm)=ζmi for each i[m] such that gcd(i,m)=1. In turn, any maximal real cyclotomic subfield Q(ζm+ζm1) is totally real. Their monomorphisms are defined as σi(ζm+ζm1)=ζmi+ζmi for each im/2 such that gcd(i,m)=1. Note that Q(ζm) is a CM-field once Q(ζm) is a totally complex field of degree two over Q(ζm+ζm1).

The number field K is said to be a Galois number field if, for every xK, the minimal polynomial of x over Q has all its roots in K. In this case, the set of automorphisms σ:KK, where σ(a)=a for all aQ, constitutes a group under the composition, called Galois group of K over Q and denoted by Gal(K/Q). If KC is a Galois number field, then the monomorphisms from K to C are exactly the elements of Gal(K/Q). An important fact is that any Galois number field is totally real or totally complex. Cyclotomic number fields and their maximal real subfields are Galois number fields. Specifically, the set Gal(Q(ζm)/Q) is isomorphic to Zm* and Gal(Q(ζm+ζm1)/Q) is isomorphic to Zm*/{±1}.

2.3.2. Ring of Integers and Its Ideals

Let K be a Galois number field. For every aK, the trace and norm of any element aK can be defined, respectively, as

TrK(a)=σGal(K/Q)σ(a)andNK(a)=σGal(K/Q)σ(a).

For all aK, TrK(a) and NK(a) are elements of Q.

The set of all elements in a number field K that are the root of a monic polynomial in Z[x] is a ring called the ring of integers of K, denoted by OK. If K is a number field of degree n, its ring of integers has a Z-basis with n elements, which is called an integral basis of K. If aOK, then TrK(a) and NK(a) are elements of Z.

If I is a nonzero (integral) ideal of OK, then I has a Z-basis with n elements. The same holds if I is a fractional ideal of K, which is a subset of K satisfying the condition that dIOK is an integral ideal for some element dOK. Note that every integral ideal is also fractional (d=1). Also, any Z-basis of some nonzero fractional ideal of K, including its ring of integers, is a Q-basis of K. If K=Q(ζm) is the m-th cyclotomic number field, then OK=Z[ζm], which is the set of all Z-linear combinations of powers of ζm. Similarly, the ring of integers of Q(ζm+ζm1) is Z[ζm+ζm1]. In general, the ring of integers of a number field K=Q(θ) does not have the form Z[θ]. When this is the case, we say that K is a monogenic number field.

The fractional ideal DK1={aK:TrK(aOK)Z} is the codifferent ideal, that is, the dual ideal of the ring of integers. Frequently, the codifferent ideal is also denoted by OK. Note that OKDK1. If OK=Z[θ] for some θK, then OK=(p(θ))1OK, where p(x) is the derivative of the minimal polynomial p(x) of θ [41] (Section 13.2, J). The inverse ideal of the codifferent, that is, DK=(DK1)1, is an ideal of OK called different of K. In general, the dual ideal of any fractional ideal I of K is the fractional ideal I of K, defined as

I:={aK:TrK(aI)Z}=I1·OK.

If I is a nonzero fractional ideal of OK, the norm of I is N(I)=|OK/I| (the cardinality of the quotient of additive groups). If I and J are ideals of OK, then N(IJ)=N(I)N(J), where IJ denotes the product of IandJ, that is, the set all finite sums of products ab for aI and bJ. If I is a principal ideal generated by some aK, then N(I)=|NK(a)|.

2.4. The Ring-LWE Problem

In the following definitions, a lattice Λ is usually represented by a basis B and, in the context of algebraic lattices, Λ can be seen as a fractional ideal I of an arbitrary number field K via canonical embedding.

Firstly, we define the computational problems which form the foundation of the (Ring)-LWE hardness, namely the decision version of the Shortest Vector Problem (GapSVP), the Shortest Independent Vectors Problem (SIVP), and the Discrete Gaussian Sampling (DGS) problem, which is denoted K-DGS when the underlying lattice is taken over a number field K [4].

Definition 4

(GapSVPγ). For an approximation factor γ=γ(n)1, the GapSVPγ is: given a lattice Λ and length d>0, output YES if λ1(Λ)d and NO if λ1(Λ)>γd.

Definition 5

(SIVPγ). For an approximation factor γ=γ(n)1, the SIVPγ is: given a lattice Λ, output n linearly independent lattice vectors of length at most γ(n)·λn(Λ).

By seeing a fractional ideal I of an arbitrary number field K as a lattice using the canonical embedding, let DI,r denote the discrete Gaussian distribution of width r over I in the field tensor product KR=KQR, which is isomorphic to the space H.

Definition 6

(K-DGSγ). For a function γ that maps lattices to nonnegative reals, the K-DGSγ problem is: given an ideal I in K and a parameter rγ=γ(I), output an independent sample from a distribution that is within negligible distance of DI,r.

Alternatively, for the purpose of the worst-case to average-case reduction for (Ring-)LWE, the DGS problem can be stated as follows: given an n-dimensional lattice Λ and a number r2n·ηϵ(Λ)/α, output a sample from DΛ,r.

In order to define the Ring-LWE distribution and the computational problems associated with it, let K be a number field with ring of integers R=OK. Recall that R is the (fractional) codifferent ideal of K, and let T=KR/R. Let q2 be a (rational) integer modulus and, for any fractional ideal I of K, let Iq=I/qI.

Definition 7

([4] Ring-LWE distribution). For sRq (the “secret”) and an error distribution ψ over KR, a sample from the Ring-LWE distribution As,ψ over Rq×T is generated by choosing aRq uniformly at random, choosing eψ, and outputting (a,b=(a·s)/q+emodR).

Definition 8

([4] Ring-LWE, search). Let Ψ be a family of distributions over KR. The search version of the Ring-LWE problem, denoted R-LWEq,Ψ, is defined as follows: given access to arbitrarily many independent samples from As,ψ, for some arbitrary sRq and ψΨ, find s.

Definition 9

([4,9] Ring-LWE, average-case decision). Let Υ be a distribution over a family of error distributions, each over KR. The average-case Ring-LWE decision problem, denoted R-LWEq,Υ, is to distinguish (with non-negligible advantage) between independent samples from As,ψ for a random choice of (s,ψ)U(Rq)×Υ, and the same number of uniformly random and independent samples from Rq×T.

3. The Twisted Ring-LWE

Firstly, we collect important results on algebraic lattices obtained through twisted embeddings. Then, we present the class of problems Twisted Ring-LWE, which is the main contribution of this work. The hardness of Twisted Ring-LWE is demonstrated by security reductions from the original Ring-LWE problem. Also, we recompute the approximation factors in the worst-case to average reduction from the SIVP problem, considering the twist factor defining the twisted embedding.

3.1. Twisted Embeddings

In this section consider the following setting. Let K be an algebraic number field with degree n, signature (s1,s2), and ¯ a fixed involution. Consider F to be the fixed field by the involution of K. Let σi be the real monomorphisms for i[s1], and σi+s1 be the complex monomorphisms for i[2s2] from K to C, where σi+s1+s2=σi+s1¯ for all i[s2]. The twisted embeddings defined next are a generalization of the canonical embedding [36]. An element τK is said to be totally positive if τF and τi=σi(τ) is a positive real number for all i[n].

Definition 10

(Twisted embeddings). For any totally positive τF, the τ-twisted embedding (or simply twisted embedding) is the homomorphism στ:KH, defined as

στ(a)=(τ1σ1(a),,τs1σs1(a),τ1+s1σ1+s1(a),,τ2s2+s1σ2s2+s1(a)).

Since τ=1 in F is totally positive, then σ1=σ, which means that twisted embeddings are generalizations of the canonical embedding. Twisted embeddings provide a way to obtain a variety of lattices in HRn in addition to the ones obtained via canonical embedding, as a consequence of Proposition 1 [36].

Proposition 1

([36]). If M is a free Z-module of rank n in K (particularly, if M is the ring of integers of K or any fractional ideal of K), then στ(M) is a full-rank lattice in H.

Twisted embeddings can be extended from K to KR as follows. For any totally positive element τF, the R-vector space στ(KR) is isomorphic to HRn. If B is a Q-basis of the number field K, then B is an R-basis of KR. So, for all totally positive τF, στ(B) is an R-basis of H.

Consider the natural extension of the trace function TrK:KQ to TrK:KRR. For any totally positive τF, we can define an inner product in KR as

a,bτ:=στ(a),στ(b)H=TrK(τab¯),a,bKR. (2)

By considering the inner product ·,·τ, the R-vector space KR is an Euclidean vector space of dimension n isometric to both (H,·,·H) and (Rn,·,·).

For each aKR, the p-norms of a under the canonical embedding are simply ap=σ(a)p=i[n]|σi(a)|p1/p for p<, and maxi[n]|σi(a)| for p=. Similarly, the p-norms induced from Cn under twisted embeddings are defined as

ap,τ:=στ(a)p=i[n]τiσi(a)p1/p

for p<, and the -norm is

a,τ:=στ(a)=maxi[n]τiσi(a),

where τi=σi(τ) for a totally positive element τF. Thus, any free Z-module M of rank n can be seen as a full-rank lattice directly in the Euclidean vector space (KR,·,·τ), although the image of στ(M) is frequently considered as in (H,·,·H).

Using the fact that στ(a·b)=σ(a)στ(b)=στ(a)σ(b) for any a,bKR, where ⊙ is the component-wise multiplication in the space H, it follows that

a·bp,τabp,τanda·bp,τapb,τ. (3)

Notice that, since multiplication of elements in KR is mapped to coordinate-wise multiplication in H, we have that for any element aKR, the distribution of a·Dr is Dr, where ri=ri·τiσi(a) for i[n]. Because of the induced norms from C, which maps elements of K to H, an elliptical distribution defined in the space H can be seen as a distribution directly over KR. For practical applications, sampling from an error distribution in KR is done by generating the error in H and mapping it to its corresponding element in KR, via twisted embeddings. However, in some special cases, an error can be efficiently sampled directly in KR without requiring the computation of the inverse of the Vandermonde matrix with respect to στ [11].

Since KRRn under twisted embeddings, it follows that KR admits an orthonormal basis. Thus, for any Z-basis B={v1,v2,,vn} of the free Z-module M of rank n in K, the matrix [vi,vjτ]n×n is a Gram matrix of the lattice M in (KR,·,·τ), which coincides with the Gram matrix of στ(M) in (H,·,·H) with respect to the basis {στ(v1),στ(v2),,στ(vn)}. It should be clear that, for different totally positive elements, the lattices obtained from M may not be equivalent, as can be seen below.

Example 3.

Let K=Q(3)={a+b3:a,bQ} be a totally real number field with degree two. It follows that the fixed field by the usual involution is F=K. For any totally positive element τF, consider the lattice Mτ=OK=Z[3] in the inner product space (KR,·,·τ). The set {1,3} is a Z-basis of Mτ and the Gram matrix of the lattice Mτ is given by

Gτ=TrK(τ)TrK(τ3)TrK(τ3)TrK(3τ). (4)

For example, for τ=1 and τ=2+3, the Gram matrices are given by:

G1=2006andG2+3=46612. (5)

Suppose that these two lattices are equivalent. Then, there exists a square matrix U with integer entries and determinant ±1, and a real number k0 such that G2+3=k2UtG1U. Since the determinant of both matrices in (5) is equal to 12, then k=±1. Now, consider U to be a matrix for which the rows are given by the vectors (a,b)Z2 and (c,d)Z2. So, the system of equations G2+3=UtG1U has no solution (a,b,c,d)Z4 because the equation 2=a2+3c2, provided by the first entry, has no solution (a,c)Z2. This gives a contradiction. Therefore, the lattices given by the same module M=OK in the two different inner product spaces (KR,·,·1) and (KR,·,·2+3) are not equivalent.

Any full-rank lattice M in (KR,·,·τ) is said to be an algebraic lattice. If M=I is a fractional ideal in K and the lattice I is integral (that is, a,bτZ for all a,bI), then I can be called an ideal lattice in (KR,·,·τ). Since a,bτ=TrK(τab¯), an ideal I of K constitutes an ideal lattice in (KR,·,·τ) if and only if τII¯DK1 (=OK). Ideal lattices can be obtained if and only if K is either a totally real number field or a CM-field. In particular, ideal lattices can be obtained via cyclotomic number fields and their maximal real subfields.

Let I be a fractional ideal of K. It is known that σ(I)=σ(I)*¯ in H under the canonical embedding. However, the same does not hold for twisted embeddings in general, as can be inferred from Proposition 2.

Proposition 2.

Let τF be a totally positive element and let I a fractional ideal of K. Then, in the Euclidean vector space (KR,·,·τ), it follows that:

  • (i) 

    I*=τ1I¯; and

  • (ii) 

    I is an unimodular (self-dual) lattice in (KR,·,·τ) if and only if τII¯=DK1.

Proof. 

By definition, aI* if and only if TrK(τaI¯)Z, which occurs if and only if τaI¯, which is equivalent to aτ1I¯. This proves (i). Secondly, I is unimodular when I is integral and I=I*. The lattice I is integral if and only if τII¯1DK1. In turn, by (i), I=I* if and only if I=τ1I¯=τ1I¯1DK1, which is equivalent to τII¯=DK1. Therefore, I is unimodular if and only if τII¯=DK1.    □

3.2. The Twisted Ring-LWE Problem

In this section, we propose an extended version of the Ring-LWE problem, adopting twisted embeddings rather than the canonical embedding. We refer to this new class of problems as Twisted Ring-LWE, or simply Ring-LWEτ. We also prove that solving the Twisted Ring-LWE problem is at least as hard as solving the original Ring-LWE problem [4], providing a polynomial-time reduction from Ring-LWE to Twisted Ring-LWE.

In the Ring-LWE distribution, the error e is randomized by a distribution ψ over the space (KR,·,·τ=1). In this sense, an error in KR can be seen as the inverse image of a sample from the distribution ψ in HRn via the canonical embedding. In our general case, we consider K a number field with an involution, F its associated fixed field, τF a totally positive element, and στ the twisted embedding. The error e is randomized by a distribution ψ over (KR,·,·τ). In the following, it is assumed q2 is an integer number, R:=OK, and Iq:=I/qI for any fractional ideal I of K.

Definition 11

(Twisted Ring-LWE distribution). For a totally positive element τF, let ψτ denote an error distribution over the inner product ·,·τ and sRq (the “secret”) be an uniformly randomized element. The Twisted Ring-LWE distributionAs,ψτ produces samples of the form

(a,b=a·s+emodqR)Rq×KR/qR, (6)

where a is uniformly randomized in Rq and the error e is randomized by ψτ in (KR,·,·τ).

Analogously to Ring-LWE [4], which is defined in the space KR provided with the inner product associated to the canonical embedding, we can define both search and decision problems in the space (KR,·,·τ) as follows. We strictly follow the search problem as defined by Lyubashevsky et al. [4] and the decision problem which was further defined by Peikert et al. [9].

Definition 12.

For a positive real α>0, the family Ψα(τ) is the set of all elliptical Gaussian distributions Dr over (KR,·,·τ), where each parameter riα.

Definition 13

(Ring-LWEτ, search). Let Ψ(τ) be a family of distributions over the inner product space (KR,·,·τ). The search version of the Ring-LWEτ problem is defined as follows: given access to arbitrarily many independent samples from As,ψτ for some arbitrary sRq and ψτΨ(τ), find s.

Definition 14.

Fix an arbitrary f(n)=ωlogn. For α>0, a distribution sampled from Υα(τ) is an elliptical Gaussian Dr in (KR,·,·τ), where r is sampled as follows: for i[s1], sample xiD1 and set ri2=α2(xi2+f2(n))/2. For i=s1+1,,s1+s2, sample xi,yiD1/2 and set ri2=ri+s2=α(xi2+yi2+f2(n))/2.

Notice that, in Definition 14, sampling xiD1 for i[s1] and xi,yiD1/2 for i=s1+1,,s1+s2 is done according to the Gaussian function given in Equation (1), using the norm induced by the corresponding twisted embedding.

Definition 15

(Ring-LWEτ, average-case decision). Let Υ(τ) be a distribution over a family of error distributions, each in the inner product space (KR,·,·τ). The average-case decision version of the Ring-LWEτ problem is to distinguish, with non-negligible advantage, between arbitrarily many independent samples from As,ψτ, for a random choice of (s,ψτ)U(Rq)×Υ(τ), and the same number of uniformly random and independent samples from Rq×KR/R.

Generally speaking, the Twisted Ring-LWE distribution and both search and decision variants of Twisted Ring-LWE collapse to their original definitions in the Ring-LWE problem when τ=1.

3.3. Hardness of Twisted Ring-LWE

In this section we provide evidence of the hardness of the Ring-LWEτ class of problems. Firstly, we provide reductions from the Ring-LWE problem to the Ring-LWEτ problem. By doing so, the Ring-LWEτ problem is proven to be at least as hard as NP-hard lattice problems. It occurs that these are indeed self reductions, in the sense that they preserve the secret term sRq, only distorting the error distribution over KR.

We recall that the reduction to the search version of Ring-LWE is defined over a set of elliptical Gaussian distributions over KR (Definition 12).

Theorem 1.

Let K be an arbitrary number field and τF be totally positive. Let (s,ψ) be randomly chosen from (U(Rq)×Ψ) in (KR,·,·τ=1). Then there is a polynomial-time reduction from Ring-LWEq,ψ to Ring-LWEq,ψττ.

Proof. 

We assume the existence of an oracle for Ring-LWEτ that, given a set of independent samples from As,ψτ, for some arbitrary sRq and ψτΨ(τ), recovers the secret term s. Given a set of independent samples from the Ring-LWE distribution As,ψ, solving the search version of Ring-LWE amounts to finding the secret s. In order to evoke the Ring-LWEτ oracle to solve Ring-LWE, we must ensure that the error terms from the input samples follow a Gaussian distribution ψτΨ(τ). Let the input samples from As,ψ be represented as

(ai,bi=ai·s+eimodqR)Rq×T,

where eiψKR. Thus, we use the fact that ei=σ1(e˜i), for some e˜i obtained from the Gaussian distribution ψ over H. The Ring-LWEτ samples are obtained by first computing the corresponding representatives of each pair (ai,bi) in H as

σ(ai),σ(bi)=σ(ai),σ(ai)·σ(s)+e˜i.

By applying the inverse transformation στ1, we obtain that

στ1σai,στ1σ(bi)=στ1σai,στ1σai·s+στ1(e˜i). (7)

Notice that s was unchanged by the transformations, so it is a randomized element over Rq. Because ai was sampled according to a uniform distribution over Rq and both σ and στ1 transformations are injective, στ1(σ(ai)) is also uniform in Rq. And, finally, since ei=στ1(e˜i) is randomized by ψτ in (KR,·,·τ), the set of samples in (7) follows the distribution As,ψτ. Given the set of samples (7) as input for the Ring-LWEτ solver, it finds the secret s. Then, mapping the solution to the Ring-LWE instance of the Ring-LWEτ solution is done by the identity transformation. Since the computation of the transformations σ and στ1 can be seen as vector-matrix multiplications, the reduction costs O(n2) operations. Thus, the given reduction from Ring-LWE to Ring-LWEτ runs in polynomial time. This concludes the proof.    □

Theorem 2.

Let K be an arbitrary number field and τF be a totally positive element. Let (s,ψ) be randomly chosen from (U(Rq)×Υ) in (KR,·,·τ=1). There is a polynomial-time reduction from Ring-LWEq,Υ to Ring-LWEq,Υ(τ)τ.

Proof. 

Given a set of m pairs of the form (ai,bi)Rq×T, each drawn either from As,ψ or from a uniform distribution over Rq×T, we prove that the (decision) Ring-LWE problem can be solved using only an oracle for (decision) Ring-LWEτ and a polynomial-time function for mapping the input instances. As in the reduction for the search variant, we apply the transformations σ and στ1, in this order, to each pair (ai,bi)Rq×T. As a result, those pairs drawn from (U(Rq),U(T)) are still uniformly distributed over Rq×T, since both σ and στ1 are injective maps. On the other hand, the pairs drawn from Aq,ψ now follow the Ring-LWEτ distribution Aq,ψτ. Thus, given an algorithm that solves (decision) Ring-LWEτ, it distinguishes in two different sets the m/2 samples drawn from Aq,ψτ and those m/2 uniformly distributed. Since mapping Ring-LWE to Ring-LWEτ instances preserves distributions, the solution for (decision) Ring-LWE problem is done by an identity transformation. Finally, the computation of the transformations σ and στ1 costs O(n2) operations; thus, the reduction runs in polynomial time. This concludes the proof.    □

3.4. Computing the Approximation Factors

Throughout this section, consider an arbitrary number field K of degree n with ring of integers R=OK, and I a fractional ideal in K. Concerning the canonical embedding, a twisted embedding modifies the representatives of a fractional ideal I when seen as a lattice στ(I) in H. Thus, since we use lattice measures such as the minimum distance and the successive minima in the security reductions, we analyze the effect of redefining the inner product in the Ring-LWE security reductions.

By strictly following the setting of Lyubashevsky et al. [4], we start by deriving upper bounds for the smoothing parameter concerning the p-norm under twisted embeddings. From the inequalities in (3), we are able to relate the p-norm under twisted embeddings with the infinity norm under the canonical embedding as

aap,τi[n]τip/21p.

We can also relate p-norms under both embeddings in H as

1maxi[n]τi·ap,τap1mini[n]τi·ap,τ.

Using the above inequalities, Lemmas 1 and 2 present upper bounds for the smoothing parameter associated with twisted embeddings, which are a straightforward adaptation of Lemmas 2.7 and 3.5 from [42]. Notice that, when τ=1, these upper bounds are exactly the same as presented in [42]. Consider that λn(p,τ)(Λ) and λ1(p,τ)(Λ) denotes the k-th successive minimum and the minimum distance of a lattice Λ in the p-norm, respectively, under a τ-twisted embedding.

Lemma 1.

Let K be an arbitrary number field with fixed field by the involution F and τF totally positive. For any p[2,], any n-dimensional lattice Λ in (KR,·,·τ), and any ϵ>0,

ηϵ(Λ)λn(p,τ)(Λ)·n1/21/pmini[n]τi·log(2n(1+1/ϵ))/π.

In particular, for any ω(logn) function, there is a negligible function ϵ(n) for which

ηϵ(Λ)λn(p,τ)(Λ)·n1/21/pmini[n]τi·ω(logn).

Lemma 2.

Let K be an arbitrary number field with fixed field by the involution F and τF totally positive. For any p[1,], any n-dimensional lattice Λ in (KR,·,·τ), and any ϵ>0,

ηϵ(Λ)maxi[n]τi·n1/p·log(2n(1+1/ϵ))/πλ1(p,τ)(Λ*).

In particular, for any ω(logn) function, there is a negligible function ϵ(n) such that

ηϵ(Λ)maxi[n]τi·n1/p·ω(logn)/λ1(p,τ)(Λ*).

The (search) Ring-LWE hardness consists in two reductions: (i) a worst-case to average-case reduction from DGS to Ring-LWE (Theorem 3); and (ii) a reduction from the Generalized Independent Vectors Problem (GIVP), which is a generalization of SIVP, to DGS (Lemma 3).

Theorem 3

([4] (Theorem 4.1)). Let K be an arbitrary number field of degree n with ring of integers R=OK, and I a fractional ideal in K. Let α=α(n)>0, and let q=q(n)2 be such that αq2·ω(logn). For some negligible ϵ=ϵ(n), there is a probabilistic polynomial-time quantum reduction from K-DGSγ to R-LWEq,Ψα, where

γ=maxηϵ(I)·(2/α)·ω(logn),2n/λ1(I).

Lemma 3

([3] (Lemma 3.17)). For any ϵ=ϵ(n)110 and any φ(Λ)2ηϵ(Λ), there is a polynomial time reduction from GIVP2nφ to DGSφ.

Thus, we use the inequalities for the smoothing parameter ηϵ derived in Lemmas 1 and 2 to recompute the approximation factors in Theorem 3 and Lemma 3. We start by computing the approximated factor γ from Theorem 3. As long as α<logn/n, it follows that the K-DGSγ parameter is

γ=ηϵ(I)·(2/α)·ω(logn)=ηϵ(I)·O˜(1/α).

Using the inequality ηϵ(I)λn(p,τ)(Λ)·n1/21/pmini[n]τi·ω(logn) from Lemma 1, we obtain that the parameter φ in Lemma 3 is

φλn(p,τ)(Λ)·n1/21/pmini[n]τi·ω(logn)·O˜(1/α).

Now, using the above inequality for φ, we define the upper bound for the GIVP parameter to be μ, for which

μ=2nφ2n·λn(p,τ)(Λ)·n1/21/pmini[n]τi·ω(logn)·O˜(1/α).

Remark 1.

Notice that, regardless of the p-norm, μ=O˜(n/α). Since O˜(n/α) is the approximation factor for the search version of the Ring-LWE problem [4] (Section 4), we conclude that the approximation factors remain unchanged with respect to the change of embeddings due to the asymptotic notation. Moreover, since the twisting factor is constant concerning the number field degree n, the approximation factors for the decision version of the Twisted Ring-LWE problem also remain unchanged.

4. Applications of the Twisted Ring-LWE

In this section, we discuss how to extend to a more general class of number fields the results of Ducas and Durmus for sampling from a spherical Gaussian distribution [11], focusing on the algebraic realization of Zn-lattices.

Durmus and Ducas proved a special case when a spherical Gaussian distribution with width s in the power basis corresponds to a spherical Gaussian distribution with width sm over the space H (Theorem 4) [11]. In order to sample directly over the cyclotomic ring Q[x]/(Φm(x)), leading to the correct distribution in the embedding representation, they sample the error polynomial in the ring Q[x]/(Θm(x)), where Θm(x)=xm1 if m is odd, and Θm(x)=xm2+1 if m is even. Then, the reduction modulo Φm leads to the correct distribution under the canonical embedding. This method avoids resorting to complex embeddings and the inverse of the Vandermonde matrix.

In the statement of Theorem 4, let m=m if m is odd and m=m/2 if m is even. Also, let β represent the polynomial reduction from Q[x]/(Θm(x)) to Q[x]/(Φm(x)), and let the linear operator T:HH with matrix in the canonical basis of H be:

T=12Idϕ(m)/2iIdϕ(m)/2Idϕ(m)/2iIdϕ(m)/2,withi=1. (8)

Theorem 4

([11] (Theorem 5)). Let vQ[x]/(Θm(x)) be a random variable distributed as ψsm in the power basis. Then, the distribution of (T1σβ)(v), seen in the canonical basis of H, is the spherical Gaussian ψsmϕ(m).

The shape of the distribution is preserved because the transformation T1σ is, in fact, a scaled-orthogonal map from the power basis of Q[x]/(Φm(x)) to the space H, where T1 is Hermitian (T1=T¯t). The proof for Theorem 4 reduces to proving that MCϕ(m)×m, the matrix representing the linear map γ from the power basis of Z[x]/(Θm(x)) to the canonical basis of Cϕ(m) satisfies C=MM¯t=mIdϕ(m). The coefficients of M are given by mi,j=σj(xi)=ζmij. Then, for all i,jZm*, we have that

ci,j=k[m]ζmikζmjk¯=k[m](ζmij)k=mifi=j,0otherwise.

Thus, E=T1M=E¯, so EEt=EE¯t=T1MM¯tT=mIdϕ(m). This last equation implies that, if a random variable vQ[x]/(Θm(x)) has covariance matrix s2Idm, then the covariance matrix of (T1γ)(v) is s2EIdmE¯t=s2mIdϕ(m), and the distribution of (T1γ)(v) is the spherical Gaussian ψsmϕ(m).

In the following, we discuss how the shape of spherical Gaussian distributions may be preserved when seen in the space H for special algebraic constructions under twisted embeddings. Following Ducas and Durmus’ approach, we are interested in lattices equivalent to Zn, whose Gram matrices have the form cIdn for cR. In this sense, the matrix mapping elements of KR to the space H is a scaled-orthogonal map [11]. It follows that any algebraic realization of the Zn-lattice preserves the shape of an error distribution over KR when seen as in H.

In Theorem 5, we prove that fractional ideals realizing lattices equivalent to Zn in an orthonormal basis, which are the special case when the Gram matrix is simply Idn, preserve both format and standard deviation of spherical Gaussian distributions. We recall that ideal lattices can be obtained if and only if K is a totally real number field, or if K is a CM-field [36].

Theorem 5.

Let K be a number field with an involution and F its associated fixed field. Consider τF totally positive and IOK a fractional ideal such that I is an ideal lattice in (KR,·,·τ). If I is a lattice equivalent to Zn, then both the shape and the standard deviation of a spherical Gaussian distribution in an orthonormal basis of IKR are preserved when seen in the canonical basis of the space H (via the twisted embedding στ).

Proof. 

Let n be the degree of K and let vI be a random variable over the spherical Gaussian distribution with covariance matrix s2Idn in an orthonormal Z-basis of I, for some real number s. Since the twisted embedding στ:KRH is a linear transformation, the covariance matrix of στ(v) in the canonical basis of H is Es2IdnEt, where E=T1M, with T as in (8) and M is the generator matrix of στ(I). Since MMt=MtM=Idn, and because MMt is the Gram matrix of the Zn-equivalent lattice I in (KR,·,·τ), the covariance matrix of στ(v) is

Es2IdnEt=T1Ms2IdnMtT=s2Idn,

which proves that στ(v) is randomized in the spherical Gaussian distribution over the canonical basis of H with the same standard deviation as v over KR in the orthonormal basis of I. This concludes the proof.    □

Examples of ideal lattices equivalent to Zn are those obtained from cyclotomic number fields Q(ζ2k) [36], and their maximal real subfields [37], and the maximal real subfields Q(ζp+ζp1) for any prime p5 [43]. The case of the power-of-two cyclotomic number fields were previously addressed by Lyubashevsky et al. [4], and Ducas and Durmus [11]. In the following, we discuss the family of lattices equivalent to Zn built on Q(ζp+ζp1), for any p5 prime.

Let p5 be a prime number, n=(p1)/2, and ζ=ζp=exp(2iπ/p). The cyclotomic construction of the Zn-lattice (Proposition 3) is on the ring of integers of the maximal real subfield of a cyclotomic number field, denoted Q(ζ+ζ1), whose integral basis is C={ej=ζj+ζj1jn}.

Proposition 3

([44] (Proposition 1)). Let p5 be a prime number, and let K=Q(ζp+ζp1) and τ=1p(1ζp)(1ζp1). Then OK in (KR,·,·τ) is a lattice equivalent to Zn with basis C={e1,,enen=enandej=ej+ej+1}, where C={e1,,en} is an integral basis of K.

The generator matrix of the Zn-lattice in H=Rn (this is an equality because K is totally real), realized in Proposition 3, is given by

M=DMU, (9)

where D=diagσk(τ)pn×n, M=σi(ζj+ζj)i,j[n]×[n] and

U=10000110001110011111n×n.

As an immediate consequence of Theorem 5, in Corollary 1 we prove that the construction for the Zn-lattice mentioned above, in fact does not change the shape of the error distribution and, more importantly, the standard deviation is the same when the distribution is seen over H.

Corollary 1.

Let K=Q(ζp+ζp1) for p5 prime and let vOK be a random variable distributed as ψsn in the basis C. Then, the distribution of (T1στ)(v) for τ=1p(1ζp)(1ζp1), seen in the canonical basis of H, is the spherical Gaussian ψsn.

Proof. 

In the realization of the Zn-lattice (Proposition 3), the matrix representing the linear map στ from the basis C of OK to the canonical basis of Rn is given by M (9). Since OK is a lattice equivalent to Zn in the basis C, the result follows immediately from Theorem 5. This concludes the proof.    □

4.1. Practical Impacts on a Public-Key Cryptosystem

In this section, we use the fact that K=Q(ζp+ζp1) is a subfield of Q(ζp), for p prime, to analyze the practical impacts of instantiating the Ring-LWE problem over the ring of integers of K in the compact public-key cryptosystem of Lyubashevsky, Peikert, and Regev [12] (Section 8.2).

The public-key cryptosystem presented below is parameterized by an m-th cyclotomic ring R and two coprime integers p and q. The message space is defined as Rp and it is required that q be coprime with every odd prime dividing m. Consider that ψτ is an error distribution over (KR,·,·τ) and · denotes a valid discretization to (cosets) of R or pR. Also, m^=m/2 if m is even, otherwise m^=m. Finally, for any a¯Zq, let a¯ denote the unique representative a(a¯+qZ)[q/2,q/2), which is entry-wise extended to polynomials.

  • Gen: choose a uniformly random aRq. Choose xψτR and ep·ψτpR. Output (a,b=m^(a·x+e)modqR)Rq×Rq as the public key, and x as the secret key.

  • Enc(a,b)(μRp): choose zψτR,ep·ψτpR, and ep·ψτt1μ+pR. Let u=m^(a·z+e)modqR and v=z·b+eRq. Output (u,v)Rq×Rq.

  • Decx(u,v): compute vu·xmodqR, and decode it to d=vu·xR. Output μ=t·dmodpR.

In such an encryption scheme, the most computationally expensive operations are given by the error sampling and the discretization of the error terms, and the polynomial multiplication. As proved in Corollary 1, when R is the ring of integers of Q(ζp+ζp1), the sampling of error terms can be performed directly over (KR,·,·τ) in the orthonormal basis C while preserving the spherical format and the standard deviation with respect to the corresponding distribution in H. In this case, the error sampling is similar to that performed when K is a cyclotomic field with dimension a power of two, where the spherical format is preserved but the standard deviation increases by m. Because of that, any algorithm for one-dimensional discrete Gaussian sampling can be used in our instantiation, including those already adopted in the power-of-two cyclotomic case. The efficiency of discrete sampling when K=Q(ζp+ζp1) is emphasized by the fact that the discretization in Zn-lattices is simply a coordinate-wise rounding to the nearest integer.

In Ring-LWE cryptosystems, arithmetic operations such as addition and multiplication are performed in the polynomial representation of the ring of integers. The ring of integers of the maximal real subfield Q(ζp+ζp1) is Z[ζp+ζp1]. Thus, associating ζp+ζp1 with indeterminate x yields an isomorphism between Z[ζp+ζp1] and Z[x]/(Ψp(x)), where Ψp(x) is the minimal polynomial of ζp+ζp1. This would require a change of basis from C, the basis used for error sampling, to the power basis {(ζp+ζp1)j0j<n}. The coefficients of the defining polynomial Ψp(x) vary according to the choice of p. Aranés and Arenas provided a closed formula for the coefficients of Ψpυ(x) for p prime and υ1 (Theorem 7). Consider that, for strictly positives r and k, Ar(k) are the determinants of order k, defined in Theorem 6. For details, we refer the reader to [45].

Theorem 6

([45] (Theorem 1)). For any strictly positive integers r and k, we have that

Ar(k)=r+k2k+r+k3k1,

where nk denotes the binomial coefficient n!k!(nk)!.

Theorem 7

([45] (Theorem 2)). The coefficients aj of the polynomial Ψpυ(x) are given by the following formulae. If p is odd,

aj=0,ifj>mpυ1;k=1k1(mod2)mjpυ1(1)(mjkpυ1)/2Aj+2mjkpυ12,ifm+j1(mod2);(1)mj2k=0mj2pυ1(1)kAj+2mj2kpυ1,ifm+j0(mod2);

and in the case p=2, υ3:

aj=(1)mj2Aj+2mj2,ifjiseven;0,otherwise.

Notice that, in our case, υ=1; thus, all coefficients are always non-zero. For example, when p=31, we have that n=15 and the defining polynomial Ψp(x) is

Ψ31(x)=x15+x1414x1313x12+78x11+66x10220x9165x8+330x7+210x6252x5126x4+84x3+28x28x1,

which is very dense and the coefficients are not restricted to the set {0,1}. However, depending on the choice of value for the coefficient’s modulus q, the defining polynomial may have a complete factorization modulo q, which allows algorithms based on the Chinese Remainder Theorem (CRT) for efficient polynomial multiplication. For example, for p=31 and q=61, the defining polynomial factors in 15 distinct degree-one polynomials as follows:

Ψ31(x)mod61=(x+5)(x+6)(x+15)(x+16)(x+21)(x+22)(x+24)(x+27)(x+29)(x+36)(x+38)(x+41)(x+48)(x+49)(x+51). (10)

Thus, f(x)=Ψ31(x) can be factored as f(x)=i[k]fi(x)(modq), where fi(x) are polynomials of small degree. The multiplication a·b modulo f(x) is done by computing ai=amodfi(x) and bi=bmodfi(x), for i[k], computing the component-wise multiplication (aibi) and, finally, using the inverse operation to obtain the polynomial c such that cmodfi(x)=aibimodfi(x), as discussed by Lyubashevsky and Seiler [27]. Although the asymptotic cost of an algorithm based on this technique is O(nlogn), the hidden constants may be large due to the increased number of reductions modulo q in comparison with CRT-based algorithms for power-of-two cyclotomic number fields [27,46]. Another important aspect of the defining polynomial is captured by the expansion factor, a property introduced by Lyubashevsky and Micciancio [47]. The expansion factor of a polynomial f is

EF(f,k)=maxgZ[x],deg(g)k(deg(f)1)gf/g,

where gf is the norm of the polynomial g after reduction modulo f. By computing the expansion factor of Ψp(x), we can measure the increase in magnitude of the maximum coefficient of gΨp(x). Also, the expansion factor helps us in choosing a value for q such that the coefficients do not wrap around after arithmetic operations, avoiding the occurrence of decryption errors.

In order to analyze the expansion factor of Ψp(x), we compare it with xn+1, the defining polynomial of cyclotomic polynomial rings with dimension a power of two, which is widely adopted in practical applications. For that, we recall Lemma 4, which defines an upper bound for the magnitude of the coefficients of a polynomial gZ[x] after a reduction modulo f.

Lemma 4.

If g is a polynomial in Z[x] and f is a monic polynomial in Z[x] such that deg(g)deg(f), then gfg2fdeg(g)deg(f)+1.

For the case f(x)=Ψp(x), it is sufficient to analyze the value of f. Firstly, for f(x)=xn+1, we have that f=1. On the other hand, when f(x)=Ψp(x), f assumes the maximum value of aj according to Theorem 7. For example, for p=31, f=330, leading to an exponential growth of coefficients, which is roughly 330deg(g)deg(f)+1 times bigger with respect to the case when f(x)=x16+1. Such growth of coefficients require an increased value for the choice of the modulus q in order to avoid the coefficients to wrap around after polynomial operations. This also leads to an increase in the length of system parameters and memory/bandwidth requirement for transmission of public parameters.

In the positive direction, since the dimension of K does not increase as a power-of-two, one may want to find a ring instantiation that closely achieves a target security level. For example, to obtain a ring dimension between 700 and 800, the required for achieving 128-bit security [27], possible choices for the value of p ranges from the 223-th to the 252-th prime number, comprehending 29 possible choices.

In a nutshell, we have discussed some practical impacts of instantiating the Twisted Ring-LWE problem when K is the maximal real subfield of a cyclotomic number field, whose dimension is n=(p1)/2 for any prime p5. The increased cost in arithmetic operations is inherent to this particular instantiation and field representation, but the same cannot be said about all algebraic constructions which lead to lattices equivalent to Zn. This is reinforced by the fact that the ring of integers of power-of-two cyclotomic number fields also leads to lattices equivalent to Zn and, yet, it allows for very efficient algorithms for arithmetic operations in the power basis representation. Thus, in Section 5, we briefly discuss on an alternative field representation when K is the maximal real subfield of a cyclotomic number field. Moreover, we present future research possibilities related to the Twisted Ring-LWE problem.

5. Discussion

In this paper, we introduce an extension to the Ring-LWE class of problems, namely The Twisted Ring-LWE Problem [4,9]. The Ring-LWE problem uses the canonical embedding to map some underlying ring to a lattice in Rn. By doing so, we can define geometric norms and error distributions on the tensor field KR, which is isomorphic to Rn. The Twisted Ring-LWE problem is obtained by adopting twisted embeddings [36] rather than the canonical embedding, which is a specialization of twisted embeddings. We prove that the Twisted Ring-LWE Problem is as secure as the original Ring-LWE Problem by providing a security reduction from both variants of Ring-LWE to their twisted forms.

As a result, we broaden the scope of number of algebraic lattices that can be used for lattice-based cryptosystems, including those algebraic constructions of lattices that allow additional factors on the embedding coordinates. This type of construction has been useful in coding theory, since they allow the construction of algebraic lattices with improved properties for Rayleigh fading channels, providing high density, maximum diversity, and great minimum product distance [33,34,35]. Notice that these constructions cannot be obtained via canonical embedding. We took as an example the construction of rotated Zn-lattices. We prove that we can perform efficient and secure sampling from spherical Gaussian distributions in KR, if the parameter ring leads to a rotated Zn-lattice in the space H via twisted embeddings. This generalizes the results of Ducas and Durmus in Theorem 5 [11] and the power-of-two cyclotomic case.

An example of a construction of the Zn-lattice via twisted embeddings is from maximal real subfields of both power-of-two and p-th cyclotomic number fields. We analyze instantiating the Ring-LWE problem using maximal real subfields of p-th cyclotomic number fields in a public-key encryption scheme [12]. By doing so, we can instantiate the Ring-LWE problem in a dimension close to 700 to achieve 128-bit security [25] and provide variability of security assumptions, avoiding the use of the widely adopted power-of-two cyclotomic number field. However, representing the field elements as residue polynomials modulo the defining polynomial is of limited interest, since the coefficients’ modulus may become very large to avoid the occurrence of decryption errors. This occurs because the expansion factor of the defining polynomial of maximal real subfields of p-th cyclotomic number fields grows exponentially.

Future Work

Lyubashevsky, Peikert, and Regev [12] suggested representing the field elements as coefficient vectors in an integral basis apart from the power basis. By taking the underlying ring as the ring of integers of the maximal real subfield of a cyclotomic number field on an orthonormal basis, we can perform efficient Gaussian sampling with hardness guarantee, as discussed in Section 4. Moreover, we can perform efficient ring arithmetic by taking the ring representatives under the twisted embedding, in which both addition and multiplication are taken component-wise. Although the change of representation may need floating-point arithmetic, one may explore lattice basis symmetries to accelerate the computation of the twisted embedding or find a basis more suitable for arithmetic operations. In addition to that, all algorithmic tasks can be performed directly in the space H, without resorting to change of representation from KR. We leave as future work a full analysis and the software implementation of the instantiation of the Twisted Ring-LWE Problem in a cryptosystem adopting the coefficient vector representation.

We also leave as future work detailing how to connect Twisted Ring-LWE instantiations over different number fields, if the ring of integers of both number fields leads to equivalent lattices under twisted embeddings. By doing so, we can connect an instance on a power-of-two cyclotomic number field to an instance of a maximal real subfield as both rings of integers lead to a construction of the Zn-lattice. This may lead to a response to the open question left by Peikert, Regev, and Stephens-Davidowitz [9]. As a consequence, we may be able to explore algebraic properties inherent to maximal real subfields helping to assert the concrete hardness of power-of-two cyclotomic number fields.

Author Contributions

All authors contributed to the study conception and design. The first draft of the manuscript was written by J.N.O. and R.R.d.A. and all authors contributed to all versions of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

The authors were supported in part by the Brazilian Coordination for the Improvement of Higher Education Personnel Foundation (CAPES) grant numbers 1591123 and 1540410, the Brazilian National Council for Scientific and Technological Development (CNPq) grant numbers 164489/2018-5 and 313326/2017-7, and the São Paulo Research Foundation (FAPESP) grant number 2013/25977-7. The authors acknowledge the support from the DIGIT Centre for Digitalisation, Big Data and Data Analytics; and the Concordium Blockchain Research Center at Aarhus University.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Ajtai M. Generating Hard Instances of Lattice Problems (Extended Abstract); Proceedings of the STOC ’96, Twenty-Eighth Annual ACM Symposium on Theory of Computing; Philadelphia, PA, USA. 22–24 May 1996; New York, NY, USA: ACM; 1996. pp. 99–108. [DOI] [Google Scholar]
  • 2.Peikert C. A Decade of Lattice Cryptography. Found. Trends Theor. Comput. Sci. 2016;10:283–424. doi: 10.1561/0400000074. [DOI] [Google Scholar]
  • 3.Regev O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography; Proceedings of the STOC ’05, Thirty-Seventh Annual ACM Symposium on Theory of Computing; Baltimore, MD, USA. 22–24 May 2005; New York, NY, USA: ACM; 2005. pp. 84–93. [DOI] [Google Scholar]
  • 4.Lyubashevsky V., Peikert C., Regev O. Advances in Cryptology—Proceedings of the EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, 30 May–3 June 2010. Springer; Berlin/Heidelberg, Germany: 2010. On Ideal Lattices and Learning with Errors over Rings; pp. 1–23. [DOI] [Google Scholar]
  • 5.Brakerski Z., Gentry C., Vaikuntanathan V. (Leveled) Fully Homomorphic Encryption without Bootstrapping; Proceedings of the ITCS ’12, 3rd Innovations in Theoretical Computer Science Conference; Cambridge, MA, USA. 8–10 January 2012; New York, NY, USA: Association for Computing Machinery; 2012. pp. 309–325. [DOI] [Google Scholar]
  • 6.Langlois A., Stehlé D. Worst-case to average-case reductions for module lattices. Des. Codes Cryptogr. 2015;75:565–599. doi: 10.1007/s10623-014-9938-4. [DOI] [Google Scholar]
  • 7.Albrecht M.R., Deo A. Large Modulus Ring-LWE ≥ Module-LWE. In: Takagi T., Peyrin T., editors. Advances in Cryptology—ASIACRYPT 2017—23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, 3–7 December 2017. Volume 10624. Springer; Cham, Switzerland: 2017. pp. 267–296. Proceedings Part I Lecture Notes in Computer Science. [DOI] [Google Scholar]
  • 8.Peikert C., Pepin Z. Algebraically Structured LWE, Revisited. In: Hofheinz D., Rosen A., editors. Theory of Cryptography. Springer International Publishing; Cham, Switzerland: 2019. pp. 1–23. [Google Scholar]
  • 9.Peikert C., Regev O., Stephens-Davidowitz N. Pseudorandomness of ring-LWE for Any Ring and Modulus; Proceedings of the STOC 2017, 49th Annual ACM SIGACT Symposium on Theory of Computing; Montreal, QC, Canada. 19–23 June 2017; New York, NY, USA: ACM; 2017. pp. 461–473. [DOI] [Google Scholar]
  • 10.National Institute of Standards and Technology Post-Quantum Cryptography. [(accessed on 30 July 2021)];2017 Available online: https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization.
  • 11.Ducas L., Durmus A. Public Key Cryptography, Proceedings of the PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, 21–23 May 2012. Springer; Berlin/Heidelberg, Germany: 2012. Ring-LWE in Polynomial Rings; pp. 34–51. [DOI] [Google Scholar]
  • 12.Lyubashevsky V., Peikert C., Regev O. A Toolkit for Ring-LWE Cryptography. Cryptology ePrint Archive, Report 2013/293. 2013. [(accessed on 30 July 2021)]. Available online: http://eprint.iacr.org/2013/293.
  • 13.Campbell P., Groves M., Shepherd D. SOLILOQUY: A Cautionary Tale. ETSI 2nd Quantum-Safe Crypto Workshop. 2014. [(accessed on 30 July 2021)]. pp. 1–9. Available online: http://docbox.etsi.org/Workshop/2014/201410_CRYPTO/S07_Systems_and_Attacks/S07_Groves_Annex.pdf.
  • 14.Smart N.P., Vercauteren F. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes. In: Nguyen P.Q., Pointcheval D., editors. Public Key Cryptography, Proceedings of the PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, 26–28 May 2010. Springer; Berlin/Heidelberg, Germany: 2010. pp. 420–443. [DOI] [Google Scholar]
  • 15.Eisenträger K., Hallgren S., Lauter K. Weak Instances of PLWE. In: Joux A., Youssef A., editors. Selected Areas in Cryptography, Proceedings of the SAC 2014: 21st International Conference, Montreal, QC, Canada, 14–15 August 2014. Springer International Publishing; Cham, Switzerland: 2014. pp. 183–194. Revised Selected Papers. [Google Scholar]
  • 16.Elias Y., Lauter K.E., Ozman E., Stange K.E. Provably Weak Instances of Ring-LWE. In: Gennaro R., Robshaw M., editors. Advances in Cryptology, Proceedings of the CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2015. Springer; Berlin/Heidelberg, Germany: 2015. pp. 63–92. Proceedings, Part I. [DOI] [Google Scholar]
  • 17.Chen H., Lauter K.E., Stange K.E. Attacks on the Search-RLWE Problem with Small Error. Cryptology ePrint Archive, Report 2015/971. 2015. [(accessed on 30 July 2021)]. Available online: https://eprint.iacr.org/2015/971.
  • 18.Castryck W., Iliashenko I., Vercauteren F. Provably Weak Instances of Ring-LWE Revisited; Proceedings of the 35th Annual International Conference on Advances in Cryptology—EUROCRYPT 2016; Vienna, Austria. 8–12 May 2016; New York, NY, USA: Springer; 2016. pp. 147–167. [DOI] [Google Scholar]
  • 19.Castryck W., Iliashenko I., Vercauteren F. On error distributions in ring-based LWE. LMS J. Comput. Math. 2016;19:130–145. doi: 10.1112/S1461157016000280. [DOI] [Google Scholar]
  • 20.Chen H., Lauter K., Stange K.E. Security Considerations for Galois Non-dual RLWE Families. In: Avanzi R., Heys H., editors. Selected Areas in Cryptography, Proceedings of the SAC 2016, Pisa, Italy, 4–8 April 2016. Springer International Publishing; Cham, Switzerland: 2017. pp. 443–462. [Google Scholar]
  • 21.Chen H. Solving Ring-LWE over Algebraic Integer Rings. Cryptology ePrint Archive, Report 2019/791. 2019. [(accessed on 30 July 2021)]. Available online: https://ia.cr/2019/791.
  • 22.Chen H. Subset Attacks on Ring-LWE with Wide Error Distributions I. Cryptology ePrint Archive, Report 2020/440. 2020. [(accessed on 30 July 2021)]. Available online: https://ia.cr/2020/440.
  • 23.Chen H. Ring-LWE over Two-to-Power Cyclotomics Is Not Hard. Cryptology ePrint Archive, Report 2021/418. 2021. [(accessed on 30 July 2021)]. Available online: https://ia.cr/2021/418.
  • 24.Stange K.E. Algebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum-Kalai-Wasserman Algorithm. Cryptology ePrint Archive, Report 2019/183. 2019. [(accessed on 30 July 2021)]. Available online: https://ia.cr/2019/183.
  • 25.Albrecht M.R., Curtis B.R., Deo A., Davidson A., Player R., Postlethwaite E.W., Virdia F., Wunderer T. Estimate all the LWE, NTRU Schemes! Cryptology ePrint Archive, Report 2018/331. 2018. [(accessed on 30 July 2021)]. Available online: https://eprint.iacr.org/2018/331.
  • 26.Peikert C. How (Not) to Instantiate Ring-LWE. In: Zikas V., De Prisco R., editors. Security and Cryptography for Networks: 10th International Conference, SCN 2016, Amalfi, Italy, 31 August–2 September 2016. Springer International Publishing; Cham, Switzerland: 2016. pp. 411–430. [DOI] [Google Scholar]
  • 27.Lyubashevsky V., Seiler G. NTTRU: Truly Fast NTRU Using NTT. Cryptology ePrint Archive, Report 2019/040. 2019. [(accessed on 30 July 2021)]. Available online: https://eprint.iacr.org/2019/040.
  • 28.Chen C., Danba O., Hoffstein J., Hülsing A., Rijneveld J., Schanck J.M., Saito T., Schwabe P., Whyte W., Xagawa K., et al. NTRU Algorithm Specifications And Supporting Documentation. Submission to the NIST Post-Quantum Cryptography Standardization Project. 2020. [(accessed on 30 July 2021)]. Available online: https://ntru.org/resources.shtml.
  • 29.Bernstein D.J., Chuengsatiansup C., Lange T., van Vredendaal C. NTRU Prime: Reducing Attack Surface at Low Cost. Cryptology ePrint Archive, Report 2016/461. 2016. [(accessed on 30 July 2021)]. Available online: http://eprint.iacr.org/2016/461.
  • 30.Mayer C.M. Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields. Cryptology ePrint Archive, Report 2016/049. 2016. [(accessed on 30 July 2021)]. Available online: http://eprint.iacr.org/2016/049.
  • 31.Crockett E., Peikert C. Λoλ: Functional Lattice Cryptography. In: Weippl E.R., Katzenbeisser S., Kruegel C., Myers A.C., Halevi S., editors. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security; Vienna, Austria. 24–28 October 2016; New York, NY, USA: ACM; 2016. pp. 993–1005. [DOI] [Google Scholar]
  • 32.Peikert C., Regev O., Stephens-Davidowitz N. Pseudorandomness of Ring-LWE for Any Ring and Modulus (Slides) 2017. [(accessed on 30 July 2021)]. Available online: https://web.eecs.umich.edu/~cpeikert/pubs/slides-anyring.pdf.
  • 33.Boutros J., Viterbo E., Rastello C., Belfiore J.C. Good lattice constellations for both Rayleigh fading and Gaussian channels. IEEE Trans. Inf. Theory. 1996;42:502–518. doi: 10.1109/18.485720. [DOI] [Google Scholar]
  • 34.Jorge G.C., Costa S.I. On rotated Dn-lattices constructed via totally real number fields. Arch. Der Math. 2013;100:323–332. doi: 10.1007/s00013-013-0501-8. [DOI] [Google Scholar]
  • 35.De Araujo R.R., Jorge G.C. Constructions of full diversity Dn-lattices for all n. Rocky Mt. J. Math. 2020;50:1137–1150. doi: 10.1216/rmj.2020.50.1137. [DOI] [Google Scholar]
  • 36.Bayer-Fluckiger E. Contemporary Mathematics. Volume 241 American Mathematical Society; Providence, RI, USA: 1999. Lattices and Number Fields. [Google Scholar]
  • 37.Andrade A.A., Interlando J.C. Rotated ℤn-Lattices via Real Subfields of ℚ(ζ2r) TEMA (São Carlos) 2019;20:445–456. doi: 10.5540/tema.2019.020.03.445. [DOI] [Google Scholar]
  • 38.Micciancio D., Regev O. Worst-Case to Average-Case Reductions Based on Gaussian Measures. SIAM J. Comput. 2007;37:267–302. doi: 10.1137/S0097539705447360. [DOI] [Google Scholar]
  • 39.Samuel P., Silberger A.J. Algebraic Theory of Numbers. Hermann; Paris, France: 1970. [Google Scholar]
  • 40.Stewart I.N., Tall D.O. Algebraic Number Theory and Fermat’s Last Theorem: Third Edition. 3rd ed. A K Peters/CRC Press; New York, NY, USA: 2001. [DOI] [Google Scholar]
  • 41.Ribenboim P. Classical Theory of Algebraic Numbers. Universitext, Springer; New York, NY, USA: 2001. [DOI] [Google Scholar]
  • 42.Peikert C. Limits on the Hardness of Lattice Problems in ℓp Norms. Comput. Complex. 2008;17:300–351. doi: 10.1007/s00037-008-0251-3. [DOI] [Google Scholar]
  • 43.Bayer-Fluckiger E., Oggier F., Viterbo E. New algebraic constructions of rotated ℤn-lattice constellations for the Rayleigh fading channel. IEEE Trans. Inf. Theory. 2004;50:702–714. doi: 10.1109/TIT.2004.825045. [DOI] [Google Scholar]
  • 44.Oggier F., Viterbo E. Algebraic Number Theory and Code Design for Rayleigh Fading Channels. Commun. Inf. Theory. 2004;1:333–416. doi: 10.1561/0100000003. [DOI] [Google Scholar]
  • 45.Aranés M., Arenas A. On the defining polynomials of maximal real cyclotomic extensions. Rev. Real Acad. Cienc. Exactas FÍsicas y Nat. Ser. A. Mat. 2008;101:187–203. doi: 10.1007/BF03191817. [DOI] [Google Scholar]
  • 46.Chu E., George A. Inside the FFT Black Box–Serial and Parallel Fast Fourier Transform Algorithms. CRC Press; Boca Raton, FL, USA: 2000. [Google Scholar]
  • 47.Lyubashevsky V., Micciancio D. Generalized Compact Knapsacks Are Collision Resistant. In: Bugliesi M., Preneel B., Sassone V., Wegener I., editors. Automata, Languages and Programming. Springer; Berlin/Heidelberg, Germany: 2006. pp. 144–155. [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES