1. Introduction
The relentless evolution of wireless communication systems, characterized by increasing demands for spectral efficiency, data rates, and robust connectivity, necessitates a parallel advancement in security paradigms. Traditional cryptographic methods, while foundational for secure communication, often confront inherent limitations in dynamic wireless environments. These include significant computational overhead, complex key management protocols, and susceptibility to sophisticated attacks such as the man-in-the-middle exploit [
1,
2]. Consequently, there has been a surge in interest towards physical-layer security, an approach that leverages the intrinsic physical properties of the wireless channel itself to establish security guarantees. PLS operates at the physical layer, providing a complementary layer of defense rooted in information theory, distinct from algorithmic cryptography [
3,
4].
Historically, algebraic techniques have proven to be unexpectedly powerful tools in various facets of communication system design. Initially, elementary number theory laid the groundwork for error-correcting codes, while finite fields became the mathematical engine for designing powerful binary and non-binary codes. As digital receiver processing capabilities advanced, attention shifted to signal-space codes, where the theory of Euclidean lattices emerged as a cornerstone for constructing dense signal constellations. These lattices facilitated efficient transmission over additive white Gaussian noise (AWGN) channels, with their efficiency often quantified by the volume-to-noise ratio (VNR). The pursuit of capacity-achieving and sphere-bound-achieving lattices spurred significant research efforts [
5,
6,
7]. This led to the development of various practically decodable lattice families, characterized by sparse parity-check matrices that enabled high-dimensional decoding [
8,
9,
10,
11,
12,
13]. Other notable constructions include low-density lattice codes (LDLC) [
14], integer low-density lattices based on Construction A (LDA) [
15], and polar lattices [
16]. Beyond core communication, algebraic methods, such as Gröbner bases, have also found applications in generalized lattice forms and algebraic decoding algorithms [
17,
18].
The application of algebraic structures extended further with the advent of wireless communication over fading channels. New code design criteria, focused on improving performance in bandwidth-limited scenarios, emerged. Algebraic number theory proved instrumental in this context, facilitating the design of robust coding schemes. These often manifested as multi-dimensional lattice signal constellations, achieving high coding gain through
modulation diversity (or signal space diversity) [
19]. This involved designing intrinsic high-diversity algebraic lattices via canonical embeddings of number fields or applying specific rotations to quadrature amplitude modulation (QAM) constellations. Furthermore, the theoretical exploration of multi-antenna wireless communication in the late 1990s revealed the critical role of division algebras in space–time coding. Once performance criteria for space–time codes were cast as matrix design problems, division algebras, including number fields and cyclic algebras, naturally emerged as optimal solutions, satisfying various performance metrics [
20,
21,
22,
23,
24,
25,
26,
27]. Other advanced algebraic structures, such as Clifford algebras [
28] and crossed product algebras [
29], have also been investigated.
Building upon this rich foundation, the focus has more recently shifted to leveraging these advanced algebraic techniques for physical-layer security. The open nature of wireless mediums, the decentralized nature of many networks, and the dynamic topology of mobile systems render traditional cryptographic approaches challenging for secure communication. This context underscores the significance of the information-theoretic approach, initiated by Wyner [
3] and Csiszár and Körner [
4], which conceptualizes the
wiretap channel as a scenario where a legitimate receiver (Bob) has a superior channel to an eavesdropper (Eve). This framework demonstrates that reliable and confidential communication is achievable by exploiting physical channel differences without reliance on cryptographic keys. Extensive research has since characterized secrecy capacity across various wiretap channel models, including Gaussian point-to-point and relay networks [
1,
30].
Within the domain of Gaussian wiretap channels, where secrecy capacity is well-established [
31], lattice codes have emerged as a powerful paradigm. Early designs focused on binary inputs [
32,
33], but a more sophisticated approach introduced by Belfiore and Oggier [
34] proposed lattice codes optimized via novel invariants like
secrecy gain and
flatness factor. These metrics precisely quantify the eavesdropper’s confusion and the code’s ability to obscure information. A vanishing flatness factor (or equivalently, an infinitely large secrecy gain) is directly linked to robust semantic security [
35]. The investigation of these metrics for
ℓ-modular lattices, particularly unimodular lattices, has been a key research thrust [
36,
37]. The Belfiore–Solé conjecture on weak secrecy gain sparked rigorous methods for its verification [
38,
39], with studies extending to the asymptotic behavior, achievable bounds, and specific classifications of unimodular and modular lattices in various dimensions [
30,
37,
40,
41,
42,
43,
44,
45].
A versatile methodology for constructing lattices with desired properties is Construction A [
46]. Its efficacy was amplified through generalization to number fields, initially proposed by Ebeling using cyclotomic fields [
47], and subsequently extended to complex multiplication (CM) fields and totally real number fields [
48,
49]. This generalization provided a framework for lattice coset encoding in wireless channels, including wiretap scenarios [
19,
49,
50], and facilitated the design of lattices with inherent properties like modularity and large shortest vectors, crucial for coding applications and physical network coding [
51]. Extensive secrecy gain analysis for
ℓ-modular lattices from quadratic extensions further underscores the utility of this approach [
52,
53].
This paper investigates the advanced application of algebraic number theory for constructing cyclotomic modular lattices, specifically designed for improving physical-layer security in next-generation wireless systems. Our structured investigation begins by detailing the Gaussian wiretap channel model in
Section 2. This section provides a technical exposition on lattice properties critical for secure communication, including rigorous definitions of secrecy gain and flatness factor.
Section 3 introduces the foundational mathematical prerequisites in algebraic number theory. We explore cyclotomic number fields, a class of monogenic fields with predictable algebraic structures, and describe their role in cryptographic and information security contexts. We subsequently examine the Construction A framework, focusing on its application for lattices over general number fields in
Section 4. In
Section 5, we address the application of cyclotomic number fields in the construction of modular lattices. A central contribution of this work lies in the rigorous construction and characterization of families of
p-modular lattices derived from cyclotomic number fields. In
Section 6, we present explicit construction methodologies utilizing the generalized Construction A framework and review recent theoretical results that precisely determine the conditions under which such modular lattices can exist. These results are not merely of theoretical interest; they yield concrete engineering design rules that provide a clear roadmap for system architects. For example, based on these results, one can demonstrate that constructing modular lattices via Construction A over cyclotomic fields of prime-power order
is generally infeasible when
, while simultaneously proving feasibility and strong structural guarantees for fields of prime order
p with
. These insights illuminate both promising future directions and fundamental limitations in algebraic lattice construction for secure communications. Interestingly, these
p-modular constructions naturally give rise to lattices of mixed signature, for which classical secrecy metrics such as secrecy gain and flatness factor, which are well understood in the positive-definite setting, are no longer directly applicable, as the associated theta series diverges. This challenge motivates a deeper examination of recent advances in the theory of indefinite theta series and their modular completions, particularly the framework introduced by Vignéras and extended through generalized error functions [
54]. These developments provide a principled analytic foundation for studying secrecy properties of indefinite lattices and open new future pathways for defining secrecy-relevant quantities beyond the positive-definite regime. To bridge these mathematical advances with physical-layer security, this paper outlines the role of modular completions, Vignéras’ operator, and generalized error functions in enabling meaningful analysis of mixed-signature lattice codes [
55,
56].
Finally, we transition from theoretical exposition to practical relevance by linking these advanced algebraic constructions to the cutting-edge landscape of modern wireless systems in
Section 7. We explore how the unique algebraic structure and inherent properties of our cyclotomic modular lattices—their specific modularity, predictable behavior, and intrinsic potential for optimized secrecy—render them highly suitable for deployment in next-generation security solutions. This includes a detailed discussion of their integration into sophisticated multiple-input multiple-output (MIMO) systems, their synergistic potential with reconfigurable intelligent surfaces (RIS) for dynamic channel shaping, and their role within machine learning (ML)-assisted communication paradigms. This section identifies concrete design benefits, illustrates how our theoretical properties translate into tangible performance gains, and illuminates crucial future research directions for leveraging these robust algebraic constructions in the context of wireless systems.
Section 8 offers our concluding remarks and summarizes the broader implications of this work.
3. Mathematical Background on Algebraic Number Theory
To systematically engineer lattice codes with tailored properties for wireless communication security, we leverage the powerful tools of algebraic number theory. This section lays out the fundamental definitions and theorems necessary to understand the construction of lattices from number fields. These algebraic structures provide the blueprint for generating lattices with specific characteristics, such as integrality, modularity, and prescribed embedding properties, which are critical for optimizing secrecy metrics.
3.1. Number Fields, Dedekind Domains, and Discriminants
We begin with the fundamental definitions concerning number fields, which are finite extensions of the field of rational numbers . These fields provide the algebraic setting for constructing advanced lattice codes.
Let K and L be two fields. If , L is a field extension of K denoted by . The dimension of L as a vector space over K is the degree of L over K, denoted by . Any finite extension of is a number field.
An element is algebraic over K if it is a root of a non-zero irreducible monic polynomial . The polynomial of least degree with this property is known as the minimal polynomial of over K. If all elements of L are algebraic over K, then L is an algebraic extension of K.
Definition 3 (Algebraic Integer). Let K be an algebraic number field of degree n. If is a root of a monic polynomial with coefficients in , then α is an algebraic integer. The set of algebraic integers of K is the ring of integers of K, denoted by . The ring is also called the maximal order of K.
If
K is a number field, then
for an algebraic integer
[
63], p. 49. For a number field
K of degree
n, the ring of integers
forms a free
-module of rank
n.
Definition 4 (Integral Basis). Let be a basis of the -module , so that we can uniquely write any element of as with for all i. Then, is an integral basis for K.
Theorem 1 ([
63], p. 41)
. Let be a number field of degree n over . There are exactly n embeddings of K into defined by , for , where ’s are the distinct zeros in of the minimum polynomial of θ over . For any , the images are the conjugates of x. These conjugates are fundamental for defining two important field-theoretic operations: the norm and the trace.
Definition 5 (Norm and Trace). Let K be a number field of degree n and . The norm of x over is defined as , and the trace of x over is defined as . For any , and belong to . If , these values are integers, i.e., and .
Definition 6 (Discriminant). Let be an integral basis for a number field K. The discriminant of K, denoted , is defined as . The discriminant of a number field belongs to and is independent of the choice of basis.
Definition 7 (Integrally Closed Ring). A ring A is integrally closed in a field L if every element of L which is integral over A lies in A. An integral domain is integrally closed if it is integrally closed in its quotient field.
Theorem 2 ([
64], p. 18)
. Let D be a ring which is Noetherian, integrally closed, and such that every non-zero prime ideal is maximal. Then, every ideal of D can be uniquely factored into prime ideals. A ring satisfying the properties of Theorem 2 is a Dedekind ring. Crucially, the ring of algebraic integers in any number field K is a Dedekind ring.
3.2. Cyclotomic Fields: Monogenicity and Galois Structure
Monogenic number fields simplify arithmetic within their rings of integers, making them particularly attractive for lattice constructions. Among these, cyclotomic fields hold a prominent place due to their well-understood structure and Abelian Galois groups.
Definition 8 (Monogenic Number Field). Let K be a number field of degree n and its ring of integers. Then, considering as a -module, if it has a basis of the form , for some , α is a power generator, this basis is a power basis and K is monogenic.
The problem of identifying monogenic number fields is classical. Quadratic and cyclotomic number fields are known to be monogenic, though this is not a general property for all number fields. For instance, Dedekind [
65], p. 64, provided an example of a non-monogenic cubic field. Monogenicity significantly simplifies arithmetic tasks like factoring prime ideals.
Cyclotomic number fields are among the most important monogenic number fields. For any field
K, an extension of the form
, where
is a root of unity, is a
cyclotomic extension of
K. A key algebraic property is that cyclotomic extensions always possess an Abelian Galois group. This makes them essentially the only direct construction method for Abelian extensions over arbitrary base fields [
66].
Let denote the group of n different nth roots of unity. A primitive nth root of unity, denoted , is an nth root of unity that has order n.
Lemma 1 ([
66], Lemma 2.1)
. For there is an integer that is relatively prime to n such that for all . Based on Lemma 1, for any field
K, the mapping
,
, is an injective group homomorphism. When
, this embedding is an isomorphism. For
,
is a totally imaginary field. It is proved in [
67], Theorem 2.6, that
is the ring of algebraic integers of
, confirming its monogenicity.
The discriminant of cyclotomic fields can be computed via the following theorem:
Theorem 3 ([
67], Proposition 2.7)
. Let , then the discriminant is given by For the specific case where
(for
p a prime number), the discriminant of
is
where the sign depends on
[
67], Proposition 2.1. For
with
,
and for
,
[
68].
Differences exist between the prime-power case and the general
n case. For
n with at least two distinct prime factors,
is a unit of
[
67], Proposition 2.8. If
n is prime, however,
is not a unit, and
forms a prime ideal of
, with
signifying total ramification in
[
67], Lemma 1.4.
The
nth cyclotomic polynomial,
, is irreducible over
and defined as
It factors
. The factorization of
modulo
p (for
p not dividing
n) yields distinct monic irreducible factors, each with degree equal to the order of
[
66], Theorem 5.4.
Proposition 1 ([
66], Corollary 5.7)
. The reduction is irreducible in if and only if and is a generator of . 3.3. Ideals, Embeddings, and Minkowski Space
The theory of ideals within number fields is fundamental for constructing lattices, particularly through Construction A, as it governs the structure of the resulting lattice and its properties.
Definition 9 (Signature). Let be the n embeddings of K into . Let be the number of embeddings whose images lie in (real embeddings), and be the number of embeddings whose images lie in (complex embeddings). These values satisfy . The pair is called the signature of K.
If , K is a totally real algebraic number field.
If , K is a totally complex algebraic number field.
The canonical embedding, also known as the Minkowski embedding, is a crucial mapping that translates the algebraic structure of a number field into a concrete geometric representation, laying the foundation for lattice constructions.
We order the embeddings such that for , and for .
Definition 10 (Canonical Embedding)
. The canonical embedding is the homomorphism defined byBy identifying with , the canonical embedding can be rewritten as where denotes the real part of and the imaginary part of , for . This embedding transforms algebraic integers into lattice points in Euclidean space, allowing us to leverage their geometric properties for coding.
In applications of number fields to lattice construction, understanding the factorization of prime ideals is essential. This process involves selecting an integer such that , and examining the factorization of its minimal polynomial modulo .
Let
A be a Dedekind ring,
K its quotient field,
L a finite separable extension of
K, and
B the integral closure of
A in
L. If
is a prime ideal of
A, then the ideal
in
B can be factored uniquely into prime ideals:
where
are distinct prime ideals of
B lying above
.
is the ramification index of over , denoted .
is the residue class degree (or inertia degree) of over .
Theorem 4 ([
64], p. 24)
. Let A be a Dedekind ring, K its quotient field, L a finite separable extension of K, and B the integral closure of A in L. Let be a prime of A. Then, the fundamental identity holds as follows: For a Galois extension of degree n, this simplifies to , where g is the number of primes of B above , and and are constant for all .
is unramified in L if all .
is ramified if any .
is totally ramified over if (implying ).
splits completely in L if for all i, so .
These concepts are crucial for understanding the properties of lattices constructed from ideals, particularly in Construction A where the choice of prime ideal significantly influences the modularity and other characteristics of the resulting lattice.
Proposition 2 ([
64], p. 27)
. Let A be a Dedekind ring with quotient field K and let E be a finite separable extension of K. Let B be the integral closure of A in E and assume that for some element α. Let f be the irreducible polynomial of α over K, be a prime of A and be the reduction in f . Considerto be the factorization of into powers of irreducible factors over , with leading coefficients 1
. Thenis the factorization of in B, so that is the ramification index of over . We also havewhere is a polynomial with leading coefficient 1
whose reduction is . For each i, has residue class degree , where . In our cases, , , , and , for a prime number p. Proposition 2 shows the importance of monogenic number fields. Indeed, the task of factoring , for a prime number p, into prime ideals over which is a difficult task in general, reduces to factoring the minimal polynomial of over , which is significantly easier. Thus, we present other useful results about monogenic number fields.
Theorem 5 ([
67], Proposition 2.16)
. is the ring of integers of . If
, the degree of
over
is
and the prime
p totally ramifies in
K as
, where
is a prime principal ideal with generator
and residue field
. The degree of
over
is
and it can be proved that the prime
p also totally ramifies in
as
, with
[
49]. By using the Hasse Theorem that states the conductor-discriminant relation, a formula has been obtained to compute the discriminant of any subfield of
where
p is an odd prime and
r is a positive integer [
69]. Let
p be an odd prime number,
r a positive integer, and
. Since
L is a Galois extension of
and its Galois group is a cyclic group isomorphic to
, there is a one-to-one correspondence between the subfields of
L and the divisors of
. The discriminant of any subfield
K of
L can be obtained as a function of
p and its degree only. Since the degree of
K is a divisor of
, we write
, where
u is a divisor of
and
.
Theorem 6 ([
69], Theorem 4.1)
. Let K be a subfield of with , where . Then, . Another formula for computing the discriminant of any number field
, with
, is derived in [
68]. In this case the Galois group is
, which is not cyclic.
Theorem 7 ([
68], Theorem 3.2)
. Let K be a subfield of of degree . Then, if , and if , . 5. Cyclotomic Fields and Modular Lattices
This section bridges the theoretical foundations of algebraic number theory with the practical construction of modular lattices for physical-layer security. We specifically focus on cyclotomic fields, which offer a rich algebraic structure for generating lattices with desirable properties. This survey consolidates classical and modern results on cyclotomic lattices, analyzes the conditions for their modularity, and identifies existing limitations, thereby setting the stage for our novel contributions in the next section.
5.1. Classical Cyclotomic Lattices
Cyclotomic fields, due to their well-understood algebraic properties and monogenicity (as discussed in
Section 3.2), have been a fertile ground for lattice constructions, particularly in coding theory. Many interesting lattices can be constructed as ideal lattices over cyclotomic fields
. For instance, root lattices like
(for
), the Coxeter–Todd lattice
(for
), and the Leech lattice
(for
) have been realized as cyclotomic lattices [
79].
Constructions of modular ideal lattices over specific cyclotomic fields
have been extensively studied. For example, for
(
p prime,
), a construction results in an even,
p-modular ideal lattice of trace type over
, with a specified rank and determinant [
79], Proposition 1. Similar constructions exist for
[
79], Proposition 2.
Theorem 10 ([
79], Theorem 1)
. There exists a modular ideal lattice over if and only if m is not a power of a prime p with . The authors of [
79] have also characterized the cyclotomic fields for which there exists a modular ideal lattice of trace type.
Definition 15. Let p be a prime divisor of m. Then, p is a norm of m if we have for some integral -ideals I and J such that J is above p and I is prime to p. Let be a divisor of m. Then, is a norm of m if all the prime divisors of are norms of m.
Theorem 11 ([
79], Theorem 2)
. Let or a prime number p, with . Let , with prime to ℓ. Then, there exists an ℓ-modular ideal lattice of trace type if and only if is a norm of m. For
(i.e., unimodular lattices), if
m is a norm of
m, then
(constructed with
and
) is a unimodular ideal lattice of trace type, and even if
m is not a power of 2 [
79], Proposition 5. For
(
p prime,
), similar constructions yield
p-modular ideal lattices of trace type [
79], Proposition 6.
5.2. Conditions for Modularity
The modularity property is highly desirable for lattice codes in communication, as it ensures certain symmetries and favorable characteristics for secrecy metrics. Understanding the algebraic conditions that lead to modularity is therefore critical.
A lattice is d-modular if it is integral and its dual is similar to scaled by , i.e., . For Construction A over number fields, the modularity conditions are deeply intertwined with the properties of the underlying number field K, the choice of the element , and the characteristics of the linear code .
The key conditions for modularity in Construction A include the following:
Self-Dual Codes: As shown in Proposition 2.9 [
53], self-orthogonal codes are a prerequisite for integrality. Specifically, for Construction A over
, a self-dual code
over
leads to a unimodular lattice
[
47].
Discriminant and Trace Relations: The determinant of the lattice, its dual, and the properties of the trace form () play a direct role in determining modularity. The relation for a d-modular lattice is a key property.
Choice of : The specific choice of
in the bilinear form
is critical. For instance,
or
are common choices to achieve unimodularity or modularity over quadratic fields [
53].
These algebraic conditions dictate whether the constructed lattice will possess the desired modularity, which directly influences its suitability for specific wireless communication scenarios.
5.3. Existing Results and Limitations
While Construction A over number fields is a powerful tool for designing lattices, achieving modularity for specific field types and parameters is not always straightforward. Prior research has identified both successful constructions and inherent limitations, often tied to the specific algebraic properties of the chosen number fields.
Notable successes in constructing modular and unimodular lattices from cyclotomic fields via Construction A include the following.
Proposition 8 ([
47],
Section 5.2, [
48], Example 1)
. For an odd prime p, let be a CM field with ring of integers . Taking and defining the bilinear form , if the code over , then yields an even integral lattice of rank . Furthermore, if is self-dual, the resulting lattice is an even unimodular lattice. Proposition 9 ([
49], Corollary 2)
. Let be a totally real subfield. For a code with , the lattice formed with is an integral lattice of rank . If is self-dual, this construction produces an odd unimodular lattice. However, these successful constructions are often contrasted with scenarios where achieving modularity proves challenging, indicating inherent constraints in the design space. For instance, in this paper, we demonstrate a counter example where, for , a 3-modular lattice cannot be constructed via Construction A, despite initial conditions suggesting its feasibility. Similarly, for and prime , our result shows that a 5-modular lattice is not obtained from Construction A, even with an integral code over .
These examples highlight that achieving modularity is not universally guaranteed. Furthermore, the literature has generally not addressed the specific case of cyclotomic fields and for ramification degree , nor general cyclotomic fields where n is not a prime power. The observed difficulties in achieving modularity under specific conditions, coupled with these unaddressed cases, represent significant gaps and limitations in existing Construction A frameworks for cyclotomic fields. Our work, therefore, aims to directly address these limitations by rigorously establishing new existence and non-existence results for p-modular lattices derived from these specific types of cyclotomic fields.
6. Newly Proposed -Modular Lattices for
This section reviews the newly proposed family of
p-modular lattices in [
80] specifically constructed from cyclotomic number fields, addressing some of the limitations identified in the existing literature (
Section 5.3). Following [
80], we review the construction methodology, characterize the key algebraic and geometric properties of these lattices, and rigorously establish non-existence results for certain parameter choices. These findings provide critical design principles and insights into the suitability of these new lattices for physical-layer security applications.
The importance of cyclotomic number fields in the construction of modular lattices for wireless communication cannot be overstated. Their well-defined algebraic properties and monogenicity make them ideal candidates for systematic lattice design. In this section, we present a new framework based on Construction A and cyclotomic number fields, yielding a family of p-modular lattices where .
A foundational result in algebraic number theory is the Kronecker–Weber theorem, which highlights the pervasive nature of cyclotomic fields in number theory. Every cyclotomic field is an Abelian extension of the rational number field . The Kronecker–Weber theorem, first announced by Kronecker in 1853, provides a powerful converse.
Theorem 12 (Kronecker–Weber [
81,
82])
. Every finite Abelian extension of lies in a cyclotomic field for some integer m. In other words, any algebraic integer in a number field whose Galois group is Abelian can be expressed as a sum of roots of unity with rational coefficients. Let . We can assume that , because if with , then it is easy to check that is a primitive mth root of unity, and hence . The Kronecker–Weber theorem motivates the following definition.
Definition 16 (Conductor). Let be a finite Abelian extension. A positive integer m is a defining modulus or an admissible modulus of L if . Such an m exists by the Kronecker–Weber theorem. The conductor of L, , is the smallest admissible modulus of L.
Example 2 ([
83])
. Let be the maximal real subfield of . For , its conductor . If , then and . As another case, consider , where d is a squarefree integer, . Then, its conductor is given byIf (p an odd prime), then using (26), is the square of an integer in ; thus, . It follows that for a prime p:Moreover, if is squarefree, then . 6.1. Construction: Generalized Construction A from
Our primary construction leverages the generalized Construction A framework (
Section 4.2) applied to cyclotomic number fields
for primes
. This specific choice of number field allows for the creation of
p-modular lattices with well-defined properties.
Theorem 13. Let where p is an odd prime and , with the ring of integers . Then, K is a CM field and the prime p totally ramifies in K as , with residue field , where . Let be an self-dual code over . Then, with and , is a p-modular lattice.
Remark 2. For , the embeddings are given byThen, the trace of an element , , , is easily computed to be [47], p. 122Let be the principal ideal of generated by the element in . Then, and for any , [47], p. 122. The mapping sending , , to is an additive homomorphism and the kernel of this homomorphism is equal to . This shows that the mapping ρ can be considered as the reduction [47], p. 123. The vectorsform a -basis for [47], p. 126. Remark 3. In order to use Theorem 13, we need to express in terms of the -basis of . To this end, we use quadratic Gauss sums. A quadratic Gauss sum can be interpreted as a linear combination of the values of the complex exponential function with coefficients given by a quadratic character (for a general character, one obtains a more general Gauss sum) [84], pp. 70–76. Let p be an odd prime number and a an integer. Then, the Gauss sum , , is the sum of the pth roots of unityIf a is not divisible by p, an alternative expression for the Gauss sum iswhere is the Legendre symbol, which is a quadratic character . Putting a general character χ in place of the Legendre symbol defines the Gauss sum . The value of the Gauss sum is an algebraic integer in . The evaluation of the Gauss sum can be reduced to the case as follows:We also have the following useful result [84], p. 75 The main reason for applying the canonical embedding on algebraic lattices is the embedding of their corresponding lattices, into the real space for some n. Theorem 13 does not guarantee that its introduced lattice is embedded in , because the element is not necessarily totally positive and some of ’s may be purely imaginary numbers. This issue, particularly for , is addressed in the following proposition.
Proposition 10. Let and be the obtained lattice in Theorem 13. Define , where is the canonical embedding which has been applied componentwise over ; that is, , for and . Then, is a -lattice in , where is the set of purely imaginary numbers.
Using Theorem 13, we find a new family of 5-modular lattices which is applicable in information security. We need a family of self dual codes over
, which is provided in [
76].
Example 3. Let and , with given in Remark 2. The degree of is 4, and the four embeddings of K are , which is the identity, , which is the conjugate of and maps to , , which maps to , and , which is the conjugate of and maps to . Consider the self dual code of length 2 over as in the above, with generator matrix and . Using the mapping ρ is Remark 2, we can take 2 to be the preimage of 2 and we have . We next compute a generator matrix for the lattice explicitly using the discussion from Section 4. We choose the basis for , and it follows that the generator matrix for the lattice together with the trace form , , isIt should be noted thatUsing Proposition 5, a generator matrix for , with , iswhere is obtained using the -basis for as follows:The matrix is the diagonal matrix . In order to show that is integral, we compute the Gram matrix which is proposed in (47). Define and , thenin whichUsing the additive property of the trace function, it is enough to find , for . We haveFor example, we compute the upper left component of as follows:Other components can be computed similarly and we haveThus, is an integral lattice and it can be checked that , that is a necessary condition for being 5-modular. 6.2. Non-Existence of Modular Lattices from Prime-Power Cyclotomic Fields via Construction A
In this section, we review the construction of modular lattices in [
80] using the provided algebraic tools in the previous sections. We consider
and its maximal totally real subfield
, when
n is a prime power or when
n is composite. There are two approaches to construct modular lattices using algebraic number fields:
Construction using ideal lattices [
79,
85,
86,
87],
Construction using generalized Construction A, which was introduced in
Section 4.2.
An ideal lattice is an ideal of a number field
K together with a bilinear form satisfying an invariance relation [
86]. Using ideal lattices in order to construct modular lattices has been investigated in [
79,
85,
87]. Here, we concentrate on generalizing the results of Propositions 8 and 9 to obtain
d-modular lattices using cyclotomic number fields. As far as we are aware, the generalizations of the above results to
and
, with
, or generalization to the cases that
, with
for a prime number
p, have not been addressed in the literature. In the following theorems, we consider all of these cases.
Theorem 14. Let , with and p an odd prime number, be the cyclotomic field with the ring of integers . We have that K is a CM field and the prime p totally ramifies in K as , with residue field , where . Let be an self-dual code over . Then, with , is d-modular if and only if and .
Theorem 15. Let , with and p an odd prime number, be the totally real maximal subfield of a cyclotomic field with the ring of integers . We have that is a totally real number field and the prime p totally ramifies in as , with residue field , where . Let be an self-dual code over . Then, with is d-modular if and only if and .
In other cases, that is when and for an odd prime number p, making a general decision is not easy. In the sequel, we present an example that indicates the complexity of this general case.
Example 4. Let with the ring of integers . The minimal polynomial of is and using Proposition 2, we conclude that 2 is inert in ; that is, is a prime ideal of with residue field . Define , as the componentwise reduction modulo and consider the -dimensional lattice , where and is an linear code over . The volume of is , where is given in (25)Thus, . Equating and gives us . If we consider a self dual code over , and . In principal, it seems that construction of a family of 3-modular lattices is possible. However, this is not true and we show this providing a counter example. Consider the self-dual code [52], where ω is the primitive element of and . The Galois group of is , where is the identity map and is complex conjugation. The set forms a -basis for and forms a -basis for . The map sends to ω and using the following generator matrix for we obtainUsing the above matrix and the matrices in Proposition 5, gives us the generator matrix of where was defined in (45). Thus, the generator matrix of isComputing the Gram matrix indicates that is not integral and consequently is not modular. The only case that was not considered in the previous theorems is the case where
, for
. In this case, we were unsuccessful in changing
r and
in order to obtain a family of
d-modular lattices. We should point out that when considering applications in information security only special values of
d are accepted, more precisely,
and 23 [
53]. We could not find any modular lattice in our trials using cyclotomic number fields (with non-prime orders) and Construction A, that fulfil these conditions. Thus, these remain open problems.
Example 5. Let be the cyclotomic field of order 4 with the ring of integers . Then, K is a CM field and the prime splits completely in K as , with residue field , for , where and . Let be an self-dual code over . Then, with is an integral lattice and its determinant is . Thus, has some necessary conditions to be a 5-modular lattice. However, one can check that this lattice is not 5-modular.
6.3. Secrecy Performance Characterization via Secrecy Gain and Flatness Factor
Computing the secrecy gain for unimodular lattices has been considered in [
40]. Then, in [
30,
52], the authors propose some methods, based on the techniques introduced in [
57] for calculating the theta series of modular lattices, to calculate the weak secrecy gain of
-modular lattices and 5-modular lattices, respectively. The introduced approaches to obtain a closed form expression for the theta series of modular lattices can be divided into two different cases: the modular form approach and the weight enumerator approach. The modular form approach relies on the fact that the theta series of an
ℓ-modular lattice belongs to the space of modular forms generated by some basic functions, which gives a decomposition formula. The formula is given for
ℓ-modular (possibly odd) lattices, which holds for the specific values of
[
30,
57]. A weight enumerator approach exploits the connection between the weight enumerator of a self-dual code and the theta series of a lattice constructed from this code. The theta series of a 5-modular lattice
, with dimension
, can be written as [
30,
57], Lemma 2
where
and
in which
is the Dedekind eta function which is defined by [
88], Chapter 3
Equation (
79) gives the theta series in terms of the unknown values
’s. An interesting computational approach has been proposed in [
30] for the cases that
. In their approach, the Gram matrix has been computed and inputted it to Magma [
89] to generate the lattice
. The first few terms of
have been obtained (using the command ThetaSeries
;). Then, by solving a linear system of equations in terms of the unknowns
’s, the theta series has been obtained as polynomials in terms of basic functions
which are implemented in Mathematica [
90]. Then, the weak secrecy gains have been approximated using Mathematica. We are not able to use this approach for the obtained lattice in Example 3, because the Gram matrix of our lattices are not positive definite and it is a necessary condition for Magma to compute the theta series; we are not aware of other computer algebra packages for this task.
The main conclusion about the connection between the weak secrecy gain of the lattice and other lattice parameters has been reported in [
53] after studying many examples. This conclusion is summarized as follows [
53], Remark 4.12:
- 1.
When the dimension increases, the weak secrecy gain
tends to increase, which has been proven for unimodular lattices [
40].
- 2.
Fixing dimension and level d, a large length for the shortest non-zero vector is more likely to induce a large .
- 3.
Fixing dimension, level
d and the length of the shortest non-zero vector, a smaller kissing number gives a larger
. It was shown for unimodular lattices [
40] that when the dimension
n is fixed,
, the secrecy gain is totally determined by the kissing number, and the lattice with the best secrecy gain is the one with the smallest kissing number.
- 4.
Fixing dimension, the length of the shortest non-zero vector, kissing number, and a smaller level d gives a bigger . However, the lattices with high level d are more likely to have a large length for the shortest non-zero vector.
6.4. Motivation for Indefinite Theta Series in Physical Layer Security
The construction of p-modular lattices in our framework inevitably produces lattices whose Gram matrices are not positive definite and have indefinite signature. While this is a natural outcome from the algebraic constraints imposed by the construction, it creates a fundamental obstacle: the classical theta series , , is only absolutely convergent on the unit disk when the quadratic form Q is positive definite. For indefinite lattices, the summand does not decay fast enough along directions of positive norm, and the series diverges on the unit circle. This prevents the direct use of standard tools from modular lattice theory for computing secrecy gain, flatness factor, or any performance metric that depends on the analytic behavior of .
Mathematical advances in the theory of indefinite theta series, most notably the work of Zwegers [
56] and the general framework developed in [
55], provide a way around this difficulty. Instead of attempting to force convergence by restricting the lattice or modifying the construction, one replaces the classical theta series by a
modular completion built from special kernels that regularize the contribution of directions with positive norm. These kernels are expressed in terms of generalized error functions, such as
,
in the Lorentzian case and their higher-dimensional analogues
,
for signature
lattices. The key insight is that these functions interpolate smoothly between the discontinuous sign functions that appear in naive truncations of the lattice sum, while still satisfying Vignéras’ differential equation and thus preserving modular covariance.
From the perspective of physical-layer security, this development is highly relevant. The secrecy rate and the eavesdropper’s decoding probability are governed by the flatness factor of the lattice, which in turn depends on the behavior of its theta series near the unit circle. As we discussed earlier, for positive definite lattices, the flatness factor admits a clean expression in terms of evaluated at purely imaginary arguments. However, for the indefinite lattices produced by our construction, the classical theta series is not defined in this regime. The modularly completed indefinite theta series, on the other hand, is well defined and exhibits controlled analytic behavior even when the underlying quadratic form has mixed signature.
This observation motivates the study of indefinite theta series as a natural analytic tool for characterizing secrecy performance. The completed theta series captures the oscillatory structure of the lattice while regularizing divergent contributions, allowing us to define meaningful analogues of the flatness factor and secrecy gain. Moreover, the modular properties of the completed series provide structural constraints that can be exploited to bound or approximate the eavesdropper’s error probability. In particular, the smoothing induced by the generalized error functions plays a role analogous to artificial noise in physical-layer security: it suppresses the contribution of directions that would otherwise leak information to the eavesdropper.
In summary, although our construction yields indefinite lattices for which the classical theta series is not applicable, the modern theory of indefinite theta series offers a principled replacement. This framework not only restores analytic control but also reveals deeper connections between lattice geometry, modularity, and secrecy performance. Consequently, the study of indefinite theta series is not merely a mathematical necessity but a promising avenue for developing new secrecy metrics and designing lattice codes optimized for physical layer security.
6.5. Quantitative Comparison of Lattice Families for PLS
To position the proposed
p-modular lattices within the broader framework of algebraic lattice design for physical-layer security, we compare their principal structural invariants like signature, discriminant, and modularity constant, which together with the minimum norm and kissing number, strongly influence shaping behavior, coding efficiency, and the analytic feasibility of secrecy metrics.
Table 2 summarizes these invariants across classical and newly introduced families. Beyond these structural aspects, secrecy-relevant analytic behavior must be interpreted in light of the dependencies identified in [
53], Remark 4.12: the weak secrecy gain
tends to increase with dimension; it improves with larger minimum norm; it decreases with larger kissing number when dimension, level, and minimum norm are fixed; and, for fixed geometric parameters, smaller level
d generally yields larger
, while higher levels often enable larger minimum norms. These principles provide a quantitative framework for evaluating the proposed
p-modular lattices.
For , the discriminant satisfies , and the modularity constant p imposes strong arithmetic constraints on the admissible combinations of volume, minimum norm, and kissing number. Moreover, the total ramification of p in facilitates Construction A lattices for which the minimum norm can be improved through the underlying code while keeping the growth of the kissing number analytically tractable. In this sense, the p-modular family occupies a structurally advantageous region of the secrecy-design landscape: the dimension grows linearly with p, the minimum norm is tunable via the code, and the kissing number can be studied and bounded through the explicit cyclotomic embedding.
Indeed, in the cyclotomic setting, the kissing number of the associated lattices can be analyzed with finer arithmetic control by exploiting the explicit
-embedding of
into Euclidean space. For
, the canonical embedding
(or its realification into
) is determined by the embeddings
,
, where each
is paired with its complex conjugate. Writing
in the power basis
with
, the Euclidean norm of its image is
which is an explicit positive-definite quadratic form in the integer vector
. The Construction A lattices considered in this work are obtained by embedding codewords with coordinates in (the image of)
and then scaling by a suitable power of the prime above
p, so any non-zero lattice vector corresponds to a tuple
whose Euclidean norm is given by
, again an explicit quadratic form in the underlying integer coefficients. The minimum norm
is therefore the minimum of this quadratic form over a discrete subset of
determined by the code constraints, and candidate shortest vectors can be characterized by bounding the integer coefficients
.
From the arithmetic side, the algebraic norm
is an integer and satisfies an inequality of the form
for a constant
depending only on
p. Thus, any bound on the Euclidean norm imposes a corresponding bound on
. Consequently, the set of
that can contribute to shortest vectors lies in a finite, explicitly describable subset of
cut out by simultaneous constraints on
and
. Moreover, the Galois group
acts transitively on the embeddings
and preserves the Euclidean norm, so (under the natural assumption that the lattice and the code constraints are stable under this action) if
x yields a shortest vector, then so do all its Galois conjugates, which form orbits whose sizes divide
. As a consequence, the multiplicity of shortest vectors (and hence the kissing number) can be expressed in terms of the number of Galois orbits of algebraic integers (or code-constrained tuples) achieving
, each orbit contributing a controlled number of vectors. Altogether, the explicit quadratic form arising from the cyclotomic embedding, the finiteness imposed by algebraic norm bounds, and the orbit structure induced by the Galois action ensure that both the minimum norm and the kissing number of the resulting
p-modular lattices can be studied and bounded through the cyclotomic embedding, rather than treated as opaque geometric invariants of an arbitrary Euclidean lattice.
Although the analytic lift of these lattices has mixed signature, which makes classical positive-definite theta-series techniques inapplicable, recent advances on modular completions of indefinite theta series provide a natural analytic framework for assessing their secrecy performance. Taken together, these structural constraints and analytic tools indicate that the proposed p-modular lattices are well aligned with the geometric and arithmetic features empirically associated with large secrecy gain, and they therefore constitute a technically robust and theoretically well-motivated class of lattices for high-dimensional physical-layer security.
6.6. Open Problems and Future Research Directions
The interplay between indefinite theta series and physical-layer security opens a number of intriguing research avenues. A central open problem is the development of secrecy metrics, such as generalized flatness factors or secrecy gains, that remain analytically meaningful when the underlying lattice has mixed signature and the classical theta series diverges. Closely related is the challenge of characterizing the behavior of modular completions built from higher-dimensional error functions (e.g., and ) in channel regimes relevant to wiretap coding, particularly when the noise distribution interacts nontrivially with the time-like and space-like directions of the lattice. Another promising direction is the design of coding schemes whose secrecy performance can be directly optimized through the geometry of indefinite cones, potentially leveraging the structural constraints imposed by Vignéras’ equation. Extending these ideas to signatures with , where triple and higher-order generalized error functions arise, remains largely unexplored and may reveal new analytically tractable lattice families. Finally, bridging the gap between the abstract modular-analytic theory and practical wiretap coding through numerical approximations, simulation frameworks, or machine-assisted optimization of indefinite kernels represents a fertile direction for future research.
7. Discussion and Integration into Modern Wireless Systems
The evolution toward next-generation wireless networks is characterized by the adoption of advanced paradigms that fundamentally reshape wireless communication. Within this landscape, lattice-based PLS offers both significant opportunities and formidable challenges. Modern architectures such as multi-antenna systems (MIMO and massive MIMO), RIS, and ML–driven optimization are no longer peripheral enhancements but central pillars of wireless design. Their integration with algebraic lattice coding introduces new dimensions of secrecy: spatial degrees of freedom, programmable propagation environments, and data-driven adaptation can be harnessed to reinforce the confusion of eavesdroppers while sustaining reliability for legitimate users [
91]. This section explores how the code-based wiretap approaches like lattice-code surveyed earlier can be adapted to, and enriched by, these emerging technologies. For each paradigm, we highlight recent advances, analyze how lattice coset structures interact with the new physical and algorithmic features, and identify open research directions that define the frontier of secure 6G system design.
7.1. MIMO and Massive MIMO Deployment
Massive MIMO has emerged as a cornerstone of 5G and 6G wireless systems, offering unprecedented spectral efficiency and reliability by exploiting large antenna arrays to serve multiple terminals simultaneously. Beyond throughput, these spatial degrees of freedom provide new opportunities for physical-layer security. By carefully designing precoders and injecting artificial noise (AN), transmitters can degrade the eavesdropper’s channel while maintaining high- quality links for legitimate users. Recent works have demonstrated that secrecy capacity in massive MIMO can be significantly improved by exploiting channel hardening and favorable propagation. For example, refs. [
92,
93] analyzed secrecy in spherical-wave channels and showed that near-field beamforming can be leveraged to enhance PLS in practical deployments. Similarly, ref. [
94] studied secrecy guard zones in ultra-reliable low-latency communications (uRLLC), highlighting how dense antenna deployments can enforce spatial secrecy constraints under strict latency requirements.
While these approaches rely on spatial processing, lattice codes provide an algebraic complement. Nested lattice coset coding introduces structured randomness that confuses the eavesdropper independently of channel state information (CSI) assumptions. Semantically secure lattice codes for compound MIMO channels, as developed by [
95], demonstrate that secrecy can be achieved even under partial or uncertain CSI. These constructions align naturally with massive MIMO, where imperfect CSI is common due to pilot contamination and feedback delays. By embedding cyclotomic p-modular lattices (with
) into space–time blocks, one can exploit unit-group rotations and Minkowski embeddings to maintain low flatness factor at Eve while preserving diversity and rate at the receiver. The dual lattice’s theta series governs Eve’s confusion, and when combined with AN in unused spatial dimensions, secrecy gain can be amplified.
Cell-free massive MIMO extends these ideas by distributing many access points (APs) to jointly serve users via coherent transmission. This architecture inherently reduces Eve’s ability to gain coherent combining benefits in passive scenarios. Ref. [
96] showed that secure transmission in cell- free systems can be maintained against active eavesdroppers by coordinating AN and robust power control. More recently, ref. [
97] analyzed secrecy rate degradation under pilot contamination and proposed secure pilot design strategies for cell-free networks. These findings suggest that lattice-coded pilots, constructed from collision-resistant projections of cyclotomic lattices, could further mitigate spoofing attacks, while coset-coded payloads ensure resilience against residual leakage. In ultra-dense cell-free deployments, ref. [
96] demonstrated that secrecy can be preserved even under hardware impairments by adopting rate-splitting multiple access (RSMA), opening avenues for lattice-coded RSMA schemes.
From a lattice perspective, space–time lattice designs remain particularly attractive. Semantically secure lattice codes for compound MIMO channels [
94] and design criteria for MIMO wiretap channels [
98] provide theoretical foundations for integrating algebraic lattices into multi-antenna secrecy. By aligning legitimate codewords with the receiver’s dominant singular vectors and dispersing Eve’s projections through lattice rotations, one can systematically engineer flatness factors that remain low at Eve. In multi-receiver wiretap scenarios, refs. [
99,
100] characterized optimal encoding orders for Gaussian MIMO channels, offering guidance for scheduling lattice layers across streams to maintain confidentiality. These results highlight the synergy between algebraic lattice coding and massive MIMO: spatial degrees of freedom create controllable subspaces for secrecy-aware transmission, while structured cosets ensure persistent confusion at Eve independent of beamforming imperfections.
The trade-offs are clear. Multi-antenna lattice precoding can significantly improve secrecy capacity but requires careful CSI acquisition and high-complexity decoding. Sphere decoding scales poorly with dimension, and while massive MIMO provides many antennas, practical receivers often limit effective dimensionality per codeword to meet latency constraints. Hybrid designs, such as block-diagonal space–time lattices or multi-layer coset coding with short lattices, can deliver secrecy gains without prohibitive complexity. Emerging ML-aided lattice decoders may further reduce decoding burden, though interpretability and robustness against adversarial attacks remain open challenges. Ultimately, joint precoder–lattice co-design under imperfect CSI, pilot contamination, and energy constraints offers a realizable path to secrecy gains in 5G/6G MIMO systems.
7.2. RIS-Aided Communications
Reconfigurable intelligent surfaces change the secrecy game by turning the propagation environment into a controllable design variable. An RIS is a planar array of passive elements whose reflection coefficients (amplitude and/or phase) can be programmed to reshape multipath, steer energy, and create constructive or destructive interference patterns at chosen spatial locations. For physical-layer security, this capability enables a new class of defenses: instead of relying only on transmitter beamforming or artificial noise, the network can program the channel so that the legitimate receiver sees a strengthened, well-conditioned effective lattice channel while the Eve sees a scrambled, low-mutual-information projection. This programmable geometry is a natural partner for algebraic lattice codes, because lattice secrecy metrics (flatness factor, secrecy gain, and dual-lattice theta series) are fundamentally geometric and therefore directly affected by RIS-induced channel transformations [
101,
102].
Recent works have established RIS as an effective secrecy tool in a variety of practical settings. The authors in [
103] analyzed RIS-aided links with mobile or unmanned aerial vehicle (UAV) eavesdroppers and show that RIS phase control can substantially increase ergodic secrecy capacity by dispersing Eve’s channel gains and reducing its coherent combining opportunities. UAV-mounted RIS and jointly optimize UAV trajectory and RIS phase profiles have been studied by [
104] to maximize secrecy rate under realistic CSI uncertainty, demonstrating that mobility plus programmable reflections yields large secrecy improvements over static deployments. Advancing physical-layer security in RIS-assisted wireless systems, the authors in [
101] address multi-user secrecy in intelligent reflective surfaces (IRS)-aided systems and propose joint beamformer–phase optimization algorithms that balance secrecy across users while respecting RIS hardware constraints. These works make two points clear for lattice-based secrecy: (i) RIS can amplify the channel asymmetry that lattice coset coding exploits, and (ii) RIS constraints (finite phase resolution, training overhead, and imperfect CSI) must be explicitly modeled when designing algebraic codes for RIS channels.
From the lattice-coding side, there is a compact set of rigorous results that translate naturally to RIS contexts. A lattice design criterion presented in [
105] for wiretap channels correlates algebraic diversity and minimum distance with secrecy performance. This criterion pinpoints algebraic parameters that increase the eavesdropper’s flatness factor under conditions where the effective channel is favorable to the legitimate receiver. In [
102], Near-Field RIS secure lattice constructions were developed for compound channels, with the investigation revealing that control over the flatness factor facilitates information-theoretic secrecy, even amidst channel uncertainty. Also, ref. [
106] constructs almost universal modular coding structures that achieve secrecy capacity and enable quantum-resistant authentication and key agreement, making them compatible with lattice-based RIS-assisted 6G networks. It considers a range of fading wiretap channels, demonstrating robustness of algebraic lattices to channel variations. Although these lattice works were not written specifically for RIS, their secrecy metrics are channel-geometric: an RIS that reshapes singular vectors and path gains directly changes the lattice embedding seen by the receiver and Eve. Therefore, the algebraic design aspects identified in these works (index, discriminant, unit rotations, and modularity) can be jointly optimized with the RIS phase shifts.
Putting these strands together suggests concrete design recipes and research directions:
Co-optimization of RIS phases and lattice rotations. Treat RIS phase settings and lattice unit rotations as coupled variables in a secrecy objective that directly includes the flatness factor or secrecy gain. The RIS can be used to align the receiver’s effective channel with lattice directions that maximize minimum distance, while simultaneously dispersing Eve’s projections to increase the flatness factors.
Robust coset scheduling under quantized RIS control. Practical RIS hardware has finite phase resolution and limited update rates. Design cyclotomic p-modular coset families whose decoding regions are tolerant to small phase errors, and schedule coset randomization across coherence blocks so that Eve cannot average out RIS-induced randomness.
Pilot and training design using lattice structure. Pilot contamination and insecure feedback are major RIS vulnerabilities. Lattice-structured pilots (pilots drawn from carefully chosen coset representatives) can make spoofing harder and enable joint pilot–phase estimation algorithms that exploit algebraic redundancy to detect active attacks.
Mobility and time-varying RIS strategies. For UAV-RIS or mobile RIS platforms, synchronize coset changes with RIS trajectory/phase updates so that Eve’s channel observations are decorrelated over time; this temporal diversity compounds the spatial confusion provided by lattice cosets.
Complexity-aware implementations. High-dimension lattices yield strong secrecy gains but heavy decoding cost. Use block-diagonal or layered lattice constructions that match RIS-created subspaces, enabling per-subspace decoding with moderate complexity while preserving global secrecy metrics.
There are also important practical challenges. Accurate CSI is essential for effective RIS phase optimization; imperfect CSI reduces the ability to align lattice directions and can leak structure to Eve if not handled carefully [
107]. Channel estimation overhead for RIS-assisted links is nontrivial, and secure feedback channels for RIS control are required to prevent adversarial reconfiguration. Finally, hardware impairments (phase noise, element coupling, and quantization) change the effective lattice seen by receivers; algebraic constructions with built-in robustness (e.g., modular lattices with favorable discriminants and unit groups) are promising candidates to absorb such distortions [
105,
108].
In short, RIS and lattice codes are complementary: RIS provides a programmable, geometric degree of freedom that can be exploited to shape the lattice channel in favor of secrecy, while algebraic lattice constructions provide provable, information-theoretic secrecy metrics that guide RIS optimization. Because the studies that jointly analyze lattice codes and RIS secrecy are still sparse, a high-impact research agenda is to develop rigorous flatness-factor and secrecy-gain analyses for RIS-transformed lattice channels, accompanied by practical co-design algorithms that respect RIS quantization, training, and complexity constraints.
7.3. Potential Machine-Learning Integration
Machine learning is increasingly leveraged in wireless systems, and physical-layer security is no exception. Deep learning can, for example, learn to optimize transmit strategies or to detect eavesdropping anomalies in complex environments. In the context of lattice-based PLS, ML can aid both encoding and decoding. On the encoding side, reinforcement learning has been proposed to tune IRS or UAV parameters for secrecy, effectively learning good RIS configurations without full CSI. For instance, ref. [
109] apply a deep deterministic policy gradient (DDPG) algorithm to jointly optimize the phases of UAV-mounted RIS and achieve a high secrecy rate in a complex cell-free MIMO scenario. This demonstrates that ML can help solve the non-convex optimization problems arising in coded secure transmission. On the decoding side, one might employ neural-network-based lattice decoders that approximate maximum-likelihood decoding for high-dimensional lattices, reducing complexity. Preliminary work on deep decoders for lattice codes suggests that neural nets can learn to invert lattice quantization under noise [
110,
111].
Moreover, ML can assist in estimating the eavesdropper’s channel or in implementing privacy amplification: for example, a neural network could predict the secrecy outage probability of a given lattice code in fading environments, and adapt the code parameters (such as choosing among different cyclotomic lattices); accordingly, [
112] presents a dynamic range query privacy-preserving scheme for blockchain-enhanced smart grid based on lattice. Conversely, one must be cautious of adversarial machine learning: an intelligent eavesdropper might use ML to infer the lattice structure or to mount new attacks.
The literature on learning for secure communications is rapidly growing. In addition to the DDPG [
113], there are broad surveys of ML for wireless security. For example, ref. [
114] overview 5G-and-beyond privacy-preserving data-driven learning models for emerging communication networks and mention the use of learning algorithms for joint communication and physical-layer security. The authors in [
115] study intelligent decentralized federated graph learning with lightweight zero trust architecture for next-generation networking security, making it compatible with lattice-based architectures. These and related works indicate that ML can augment lattice-based schemes, but also that integrating ML introduces new trade-offs: learning models need data and training time, and their decisions may lack provable guarantees (in contrast to information-theoretic lattice designs). Ensuring the reliability and interpretability of ML-aided PLS algorithms is thus an open challenge.
7.4. Open Problems
The integration of modular lattice codes into MIMO, RIS, and ML-based systems raises many research questions. First, designing optimal lattice codes for MIMO wiretap channels remains unsolved: how to choose p-modular lattices that maximize secrecy gain under multi-antenna constraints and imperfect CSI? Closed-form design criteria (generalizing flatness factor) for fading MIMO channels are still lacking. Second, implementation complexity is a major issue: effective high-dimensional lattice decoding in real time (especially over MIMO) is challenging. Hybrid schemes that combine lattices with more conventional MIMO precoding need exploration. Third, in RIS-assisted systems, joint optimization of lattice cosets and RIS phases is a new design space. How to quantize phase shifts to preserve lattice secrecy, and how to coordinate distributed RIS elements for cooperative secrecy coding, are open problems. Additionally, the discrete nature of p-modular lattices (integer ring structure) may need adaptation to the analog domain of RIS (like continuous phase).
From a machine learning perspective, integrating data-driven methods with algebraic coding raises questions of generalization and security: can learning algorithms reliably optimize lattice-coded transmissions for secrecy across diverse channel conditions? How can we guard against learned models that may overfit or be fooled by adversaries? The intersection of ML and lattice coding is largely unexplored. Finally, multi-user and network scenarios (multiple eavesdroppers, relays, or feedback links) have not been studied with cyclotomic lattice codes. Extending these codes to distributed networks (for example, using compute-and-forward or cooperative jamming with lattices) is a rich avenue for future work. Modern intelligent wireless platforms offer new tools for physical-layer security, but they also introduce new vulnerabilities and design complexities. The algebraic and geometric features of cyclotomic lattices (e.g., rich unit groups, well-roundedness) may be leveraged to meet these challenges. For instance, their flatness factors could potentially be engineered to remain low over the enhanced channels in RIS environments, or ML could be used to approximate optimal decoding. Nevertheless, rigorous analysis and prototypes are needed to validate these ideas in practice.
8. Conclusions
This article has provided a comprehensive survey bridging the theoretical richness of algebraic lattice theory with its critical applications in physical-layer security for wireless communications. We established the foundational models of wireless wiretap channels and detailed essential information-theoretic secrecy metrics such as secrecy gain and flatness factor, which remain central to evaluating the confidentiality of lattice-coded transmissions. Our exposition moved from algebraic number theory fundamentals and Construction A to modular and unimodular lattice families, consolidating classical and modern results into a unified framework that highlights the deep interplay between algebraic structures and secure communication. In addition, we reviewed a newly proposed family of p-modular lattices constructed from cyclotomic number fields for primes , developed through a generalized Construction A methodology. We rigorously characterized their algebraic and geometric properties and established a non-existence theorem for p-modular lattices arising from prime-power cyclotomic fields with . These results provide concrete engineering design principles, identifying both viable construction pathways and fundamental structural limitations for future lattice code development.
Another future research direction is the integration of recent advances in the theory of indefinite theta series and modular completions. Since these p-modular constructions naturally yield lattices with mixed signature, the classical theta series fails to converge on the unit circle, rendering traditional secrecy metrics inapplicable. By drawing on the modern framework of Vignéras’ differential equation and the generalized error functions , we highlighted how modularly completed indefinite theta series offer a principled analytic replacement. This perspective opens the door to defining secrecy-relevant quantities for indefinite lattices and suggests new directions for characterizing flatness, smoothing, and eavesdropper performance through the geometry of time-like and space-like directions.
The broader implications of this research are significant for next-generation wireless systems. The algebraic structure, modular behavior, and potential secrecy advantages of these lattices make them promising candidates for integration into advanced communication paradigms such as Massive MIMO, RIS-aided architectures, and machine-learning-driven optimization. By combining algebraic number theory, modular analysis, and physical-layer security, this paper serves as both a tutorial and a design resource, guiding researchers and engineers in leveraging sophisticated mathematical tools to build robust, analyzable, and secure wireless networks for the future.