{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2015:UNCH6M2DZEYBHXPYDGLV7DIKFQ","short_pith_number":"pith:UNCH6M2D","schema_version":"1.0","canonical_sha256":"a3447f3343c93013ddf819975f8d0a2c0d103ec910dcb23716ffbe69e2fa4a07","source":{"kind":"arxiv","id":"1502.03708","version":2},"attestation_state":"computed","paper":{"title":"Provably weak instances of Ring-LWE","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.NT"],"primary_cat":"cs.CR","authors_text":"Ekin Ozman, Katherine E. Stange, Kristin E. Lauter, Yara Elias","submitted_at":"2015-02-12T15:54:35Z","abstract_excerpt":"The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the Ring-LWE problem for general number rings and demonstrate provably weak instances of Ring-LWE. We construct an explicit family of number fields for which we have an efficient attack. We demonstrate th"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1502.03708","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2015-02-12T15:54:35Z","cross_cats_sorted":["math.NT"],"title_canon_sha256":"198069c5b4884f9f8bdfe579a23ee09792279cc70aa27a34df68c132b2b709a6","abstract_canon_sha256":"cf50aa0bebe67ff16e87c39b67ce936bb542140b84cd440c5417b1b7f0559ccf"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:35:38.180648Z","signature_b64":"0Vhlm0TJV38kqYHlq0BuyOFUyFX328o3KscjXw+nt3tCfVADxEr7cBZEPAIwyMLPR5hHPLx7iPiqdDo92C2/CA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a3447f3343c93013ddf819975f8d0a2c0d103ec910dcb23716ffbe69e2fa4a07","last_reissued_at":"2026-05-18T01:35:38.179796Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:35:38.179796Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Provably weak instances of Ring-LWE","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["math.NT"],"primary_cat":"cs.CR","authors_text":"Ekin Ozman, Katherine E. Stange, Kristin E. Lauter, Yara Elias","submitted_at":"2015-02-12T15:54:35Z","abstract_excerpt":"The ring and polynomial learning with errors problems (Ring-LWE and Poly-LWE) have been proposed as hard problems to form the basis for cryptosystems, and various security reductions to hard lattice problems have been presented. So far these problems have been stated for general (number) rings but have only been closely examined for cyclotomic number rings. In this paper, we state and examine the Ring-LWE problem for general number rings and demonstrate provably weak instances of Ring-LWE. We construct an explicit family of number fields for which we have an efficient attack. We demonstrate th"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1502.03708","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1502.03708","created_at":"2026-05-18T01:35:38.179938+00:00"},{"alias_kind":"arxiv_version","alias_value":"1502.03708v2","created_at":"2026-05-18T01:35:38.179938+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1502.03708","created_at":"2026-05-18T01:35:38.179938+00:00"},{"alias_kind":"pith_short_12","alias_value":"UNCH6M2DZEYB","created_at":"2026-05-18T12:29:44.643036+00:00"},{"alias_kind":"pith_short_16","alias_value":"UNCH6M2DZEYBHXPY","created_at":"2026-05-18T12:29:44.643036+00:00"},{"alias_kind":"pith_short_8","alias_value":"UNCH6M2D","created_at":"2026-05-18T12:29:44.643036+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/UNCH6M2DZEYBHXPYDGLV7DIKFQ","json":"https://pith.science/pith/UNCH6M2DZEYBHXPYDGLV7DIKFQ.json","graph_json":"https://pith.science/api/pith-number/UNCH6M2DZEYBHXPYDGLV7DIKFQ/graph.json","events_json":"https://pith.science/api/pith-number/UNCH6M2DZEYBHXPYDGLV7DIKFQ/events.json","paper":"https://pith.science/paper/UNCH6M2D"},"agent_actions":{"view_html":"https://pith.science/pith/UNCH6M2DZEYBHXPYDGLV7DIKFQ","download_json":"https://pith.science/pith/UNCH6M2DZEYBHXPYDGLV7DIKFQ.json","view_paper":"https://pith.science/paper/UNCH6M2D","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1502.03708&json=true","fetch_graph":"https://pith.science/api/pith-number/UNCH6M2DZEYBHXPYDGLV7DIKFQ/graph.json","fetch_events":"https://pith.science/api/pith-number/UNCH6M2DZEYBHXPYDGLV7DIKFQ/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/UNCH6M2DZEYBHXPYDGLV7DIKFQ/action/timestamp_anchor","attest_storage":"https://pith.science/pith/UNCH6M2DZEYBHXPYDGLV7DIKFQ/action/storage_attestation","attest_author":"https://pith.science/pith/UNCH6M2DZEYBHXPYDGLV7DIKFQ/action/author_attestation","sign_citation":"https://pith.science/pith/UNCH6M2DZEYBHXPYDGLV7DIKFQ/action/citation_signature","submit_replication":"https://pith.science/pith/UNCH6M2DZEYBHXPYDGLV7DIKFQ/action/replication_record"}},"created_at":"2026-05-18T01:35:38.179938+00:00","updated_at":"2026-05-18T01:35:38.179938+00:00"}