{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T13:08:35Z","timestamp":1771938515303,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1409294"],"award-info":[{"award-number":["CCF-1409294"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1900820"],"award-info":[{"award-number":["CCF-1900820"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11971321"],"award-info":[{"award-number":["11971321"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11826102"],"award-info":[{"award-number":["11826102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2018YFA0704703"],"award-info":[{"award-number":["2018YFA0704703"]}]},{"name":"National Key Research and Development Program of China","award":["2018YFA0704702"],"award-info":[{"award-number":["2018YFA0704702"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10623-021-00973-6","type":"journal-article","created":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T13:02:21Z","timestamp":1637758941000},"page":"239-263","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["LWE from non-commutative group rings"],"prefix":"10.1007","volume":"90","author":[{"given":"Qi","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1159-7597","authenticated-orcid":false,"given":"Jincheng","family":"Zhuang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,24]]},"reference":[{"key":"973_CR1","first-page":"553","volume":"2010","author":"S Agrawal","year":"2010","unstructured":"Agrawal S., Boneh D., Boyen X.: Efficient lattice (H)IBE in the standard model. Adv. Cryptol. EUROCRYPT 2010, 553\u2013572 (2010).","journal-title":"Adv. Cryptol. EUROCRYPT"},{"key":"973_CR2","first-page":"98","volume":"2010","author":"S Agrawal","year":"2010","unstructured":"Agrawal S., Boneh D., Boyen X.: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. Adv. Cryptol. CRYPTO 2010, 98\u2013115 (2010).","journal-title":"Adv. Cryptol. CRYPTO"},{"key":"973_CR3","doi-asserted-by":"crossref","unstructured":"Albrecht M.R., Deo A.: Large modulus Ring-LWE $$\\ge $$ module-LWE. In: Advances in Cryptology\u2014ASIACRYPT, Volume 10624 of Lecture Notes in Computer Science, pp. 267\u2013296. Springer (2017)","DOI":"10.1007\/978-3-319-70694-8_10"},{"key":"973_CR4","doi-asserted-by":"crossref","unstructured":"Alexei G., Myasnikov V.S., Alexander U.: American Mathematical Society, Non-commutative Cryptography and Complexity of Group-theoretic Problems (2011)","DOI":"10.1090\/surv\/177"},{"issue":"4","key":"973_CR5","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/BF01445125","volume":"296","author":"W Banaszczyk","year":"1993","unstructured":"Banaszczyk W.: New bounds in some transference theorems in the geometry of numbers. Math. Ann. 296(4), 625\u2013636 (1993).","journal-title":"Math. Ann."},{"key":"973_CR6","doi-asserted-by":"crossref","unstructured":"Bootland C.,Castryck W., Vercauteren F.: On the security of the multivariate ring learning with errors problem. In: ANTS-XIV, Fourteenth Algorithmic Number Theory Symposium, Proceedings. MSP (2020)","DOI":"10.2140\/obs.2020.4.57"},{"key":"973_CR7","doi-asserted-by":"crossref","unstructured":"Brakerski Z., Vaikuntanathan V.: Efficient fully homomorphic encryption from (standard) LWE. In: IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS, pp. 97\u2013106 (2011)","DOI":"10.1109\/FOCS.2011.12"},{"key":"973_CR8","first-page":"505","volume":"2011","author":"Z Brakerski","year":"2011","unstructured":"Brakerski Z., Vaikuntanathan V.: Fully homomorphic encryption from Ring-LWE and security for key dependent messages. Adv. Cryptol. CRYPTO 2011, 505\u2013524 (2011).","journal-title":"Adv. Cryptol. CRYPTO"},{"key":"973_CR9","doi-asserted-by":"crossref","unstructured":"Brakerski Z., Gentry C., Vaikuntanathan V.: (Leveled) Fully homomorphic encryption without bootstrapping. In: Innovations in Theoretical Computer Science\u2014ICTS, pp. 309\u2013325 (2012)","DOI":"10.1145\/2090236.2090262"},{"key":"973_CR10","first-page":"523","volume":"2010","author":"D Cash","year":"2010","unstructured":"Cash D., Hofheinz D., Kiltz E., Peikert C.: Bonsai trees, or how to delegate a lattice basis. Adv. Cryptol. EUROCRYPT 2010, 523\u2013552 (2010).","journal-title":"Adv. Cryptol. EUROCRYPT"},{"key":"973_CR11","unstructured":"Chen H., Lauter K.E., Stange K.E.: Attacks on search RLWE. In: Cryptology ePrint Archive, Report 2015\/971 (2015)"},{"key":"973_CR12","unstructured":"Chen H., Lauter K.E., Stange K.E.: Vulnerable Galois RLWE families and improved attacks. In: Cryptology ePrint Archive, Report 2016\/193 (2016)"},{"key":"973_CR13","unstructured":"Coppersmith D. Attacking non-commutative NTRU. In: IBM Research Report (1997)"},{"key":"973_CR14","first-page":"559","volume":"2016","author":"R Cramer","year":"2016","unstructured":"Cramer R., Ducas L., Peikert C., Regev O.: Recovering short generators of principal ideals in cyclotomic rings. Adv. Cryptol. EUROCRYPT 2016, 559\u2013585 (2016).","journal-title":"Adv. Cryptol. EUROCRYPT"},{"key":"973_CR15","doi-asserted-by":"crossref","unstructured":"Cramer R., Ducas L., Wesolowski B.: Short stickelberger class relations and application to Ideal-SVP. In: Cryptology ePrint Archive, Report 2016\/885 (2016)","DOI":"10.1007\/978-3-319-56620-7_12"},{"key":"973_CR16","first-page":"183","volume":"2014","author":"K Eisentr\u00e4ger","year":"2014","unstructured":"Eisentr\u00e4ger K., Hallgren S., Lauter K.E.: Weak instances of PLWE. Select. Areas Cryptogr. 2014, 183\u2013194 (2014).","journal-title":"Select. Areas Cryptogr."},{"key":"973_CR17","first-page":"63","volume":"2015","author":"Y Elias","year":"2015","unstructured":"Elias Y., Lauter K.E., Ozman E., Stange K.E.: Provably weak instances of Ring-LWE. Adv. Cryptol. CRYPTO 2015, 63\u201392 (2015).","journal-title":"Adv. Cryptol. CRYPTO"},{"key":"973_CR18","unstructured":"Fan J., Vercauteren F.: Somewhat practical fully homomorphic encryption. In: Cryptology ePrint Archive, Report 2012\/144 (2012)"},{"issue":"4","key":"973_CR19","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1080\/00927877608822109","volume":"4","author":"JL Fisher","year":"1976","unstructured":"Fisher J.L., Sehgal S.K.: Principal ideal group rings. Commun. Algebra 4(4), 319\u2013325 (1976).","journal-title":"Commun. Algebra"},{"key":"973_CR20","doi-asserted-by":"crossref","unstructured":"Gentry C., Peikert C., Vaikuntanathan V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp.197\u2013206 (2008)","DOI":"10.1145\/1374376.1374407"},{"key":"973_CR21","unstructured":"Grover C., Ling C., Vehkalahti R.: Non-commutative ring learning with errors from cyclic algebras. In: Cryptology ePrint Archive, Report 2019\/680 (2019)"},{"key":"973_CR22","doi-asserted-by":"crossref","unstructured":"Jeffrey H., Jill P., Silverman Joseph H.: NTRU: A ring-based public key cryptosystem. In: Algorithmic Number Theory, Third International Symposium, ANTS-III, pp. 267\u2013288 (1998).","DOI":"10.1007\/BFb0054868"},{"issue":"3","key":"973_CR23","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","volume":"75","author":"A Langlois","year":"2015","unstructured":"Langlois A., Stehl\u00e9 D.: Worst-case to average-case reductions for module lattices. Des. Codes Cryptogr. 75(3), 565\u2013599 (2015).","journal-title":"Des. Codes Cryptogr."},{"key":"973_CR24","first-page":"319","volume":"2011","author":"R Lindner","year":"2011","unstructured":"Lindner R., Peikert C.: Better key sizes (and attacks) for LWE-based encryption. Top. Cryptol. CT-RSA 2011, 319\u2013339 (2011).","journal-title":"Top. Cryptol. CT-RSA"},{"key":"973_CR25","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V., Peikert C., Regev O.: On ideal lattices and learning with errors over rings. In:Advances in Cryptology\u2014EUROCRYPT, Volume 6110 of Lecture Notes in Computer Science, pp. 1\u201323. Springer (2010)","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"973_CR26","first-page":"700","volume":"2012","author":"D Micciancio","year":"2012","unstructured":"Micciancio D., Peikert C.: Trapdoors for lattices: simpler, tighter, faster, smaller. Adv. Cryptol. EUROCRYPT 2012, 700\u2013718 (2012).","journal-title":"Adv. Cryptol. EUROCRYPT"},{"key":"973_CR27","doi-asserted-by":"crossref","unstructured":"Mikl\u00f3s A.: Generating hard instances of lattice problems (extended abstract). In: Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing\u2014STOC, pp. 99\u2013108 (1996)","DOI":"10.1145\/237814.237838"},{"key":"973_CR28","doi-asserted-by":"crossref","unstructured":"Pan Y., Xu J., Wadleigh N., Cheng Q.: On the ideal shortest vector problem over random rational primes. In: Advances in Cryptology\u2014EUROCRYPT, Volume 12696 of Lecture Notes in Computer Science, pp. 559\u2013583. Springer (2021)","DOI":"10.1007\/978-3-030-77870-5_20"},{"key":"973_CR29","doi-asserted-by":"crossref","unstructured":"Pedrouzo-Ulloa A., Troncoso-Pastoriza J.R., P\u00e9rez-Gonz\u00e1lez, F.: Multivariate lattices for encrypted image processing. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1707\u20131711. IEEE (2015)","DOI":"10.1109\/ICASSP.2015.7178262"},{"key":"973_CR30","unstructured":"Pedrouzo-Ulloa A., Troncoso-Pastoriza J.R., P\u00e9rez-Gonz\u00e1lez, F.: On ring learning with errors over the tensor product of number fields. https:\/\/arxiv.org\/abs\/1607.05244 (2016)"},{"key":"973_CR31","unstructured":"Pedrouzo-Ulloa A., Troncoso-Pastoriza J.R., P\u00e9rez-Gonz\u00e1lez, F.: Multivariate cryptosystems for secure processing of multidimensional signals. In: CoRR abs\/1712.00848 (2017)"},{"key":"973_CR32","doi-asserted-by":"crossref","unstructured":"Peikert C.: Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 333\u2013342. ACM (2009)","DOI":"10.1145\/1536414.1536461"},{"key":"973_CR33","doi-asserted-by":"crossref","unstructured":"Peikert C., Pepin Z.: Algebraically structured LWE, revisited. In: Theory of Cryptography\u2014TCC 2019, Proceedings, Part I, Volume 11891 of Lecture Notes in Computer Science, pp. 1\u201323. Springer (2019)","DOI":"10.1007\/978-3-030-36030-6_1"},{"key":"973_CR34","doi-asserted-by":"crossref","unstructured":"Peikert C., Waters B.: Lossy trapdoor functions and their applications. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 187\u2013196 (2008)","DOI":"10.1145\/1374376.1374406"},{"key":"973_CR35","doi-asserted-by":"crossref","unstructured":"Peikert C., Regev O., Stephens-Davidowitz N.: Pseudorandomness of ring-LWE for any ring and modulus. In: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, pp. 461\u2013473 (2017)","DOI":"10.1145\/3055399.3055489"},{"key":"973_CR36","doi-asserted-by":"crossref","unstructured":"Regev O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing, STOC \u201905, pp. 84\u201393. ACM, New York (2005)","DOI":"10.1145\/1060590.1060603"},{"issue":"6","key":"973_CR37","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 34 (2009).","journal-title":"J. ACM"},{"key":"973_CR38","volume-title":"Units in Integral Group Rings","author":"SK Sehgal","year":"1993","unstructured":"Sehgal S.K.: Units in Integral Group Rings. Longman, London (1993)."},{"key":"973_CR39","volume-title":"Linear Representations of Finite Groups","author":"J-P Serre","year":"1997","unstructured":"Serre J.-P.: Linear Representations of Finite Groups. Springer, New York (1997)."},{"key":"973_CR40","unstructured":"Shor P.W.: Algorithms for quantum computation: Discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science\u2014FOCS, pp. 124\u2013134 (1994)"},{"key":"973_CR41","first-page":"27","volume":"2011","author":"D Stehl\u00e9","year":"2011","unstructured":"Stehl\u00e9 D., Steinfeld R.: Making NTRU as secure as worst-case problems over ideal lattices. Adv. Cryptol. EUROCRYPT 2011, 27\u201347 (2011).","journal-title":"Adv. Cryptol. EUROCRYPT"},{"key":"973_CR42","first-page":"617","volume-title":"Advances in Cryptology\u2013ASIACRYPT, Volume 5912 of Lecture Notes in Computer Science","author":"D Stehl\u00e9","year":"2009","unstructured":"Stehl\u00e9 D., Steinfeld R., Tanaka K., Xagawa K.: Efficient public key encryption based on ideal lattices. In: Matsui M. (ed.) Advances in Cryptology\u2013ASIACRYPT, Volume 5912 of Lecture Notes in Computer Science, pp. 617\u2013635. Springer, New York (2009)."},{"key":"973_CR43","unstructured":"Truman K.R.: Analysis and extension of non-commutative NTRU. PhD thesis, University of Maryland (2007)"},{"key":"973_CR44","unstructured":"Wang Y., Wang M.: Module-LWE versus Ring-LWE, revisited. In: Cryptology ePrint Archive, Report 2019\/930 (2019)"},{"key":"973_CR45","unstructured":"Yasuda T., Dahan X., Sakurai K.: Characterizing NTRU-variants using group ring and evaluating their lattice security. In: Cryptology ePrint Archive, Report 2015\/1170 (2015)"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00973-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00973-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00973-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T19:18:59Z","timestamp":1726168739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00973-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,24]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["973"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00973-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,24]]},"assertion":[{"value":"7 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}