Next Article in Journal
Word Sense Disambiguation with Wikipedia Entities: A Survey of Entity Linking Approaches
Next Article in Special Issue
Unified Space–Time-Message Interference Alignment: An End-to-End Learning Approach
Previous Article in Journal
Review of Prognosis Approaches Applied to Power SiC MOSFETs for Health State and Remaining Useful Life Prediction
Previous Article in Special Issue
Model-Data Hybrid-Driven Wideband Channel Estimation for Beamspace Massive MIMO Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Survey of Lattice-Based Physical-Layer Security for Wireless Systems with p-Modular Lattice Constructions †

1
School of Engineering, Faculty of Applied Science, University of British Columbia (UBC), Okanagan Campus, Kelowna, BC V1V 1V7, Canada
2
School of Mathematics and Statistics, Carleton University, Ottawa, ON K1S 5B6, Canada
3
Department of Electrical and Computer Engineering, University of British Columbia (UBC), Vancouver, BC V6T 1Z4, Canada
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), 2018.
Entropy 2026, 28(2), 235; https://doi.org/10.3390/e28020235
Submission received: 30 December 2025 / Revised: 11 February 2026 / Accepted: 13 February 2026 / Published: 18 February 2026
(This article belongs to the Special Issue Wireless Communications: Signal Processing Perspectives, 2nd Edition)

Abstract

Physical-layer security (PLS) provides an information-theoretic framework for securing wireless communications by exploiting channel and signal-structure asymmetries, thereby avoiding reliance on computational hardness assumptions. Within this setting, lattice codes and their algebraic constructions play a central role in achieving secrecy over Gaussian and fading wiretap channels. This article offers a comprehensive survey of lattice-based wiretap coding, covering foundational concepts in algebraic number theory, Construction A over number fields, and the structure of modular and unimodular lattice families. We review key secrecy metrics, including secrecy gain, flatness factor, and equivocation, and consolidate classical and recent results to provide a unified perspective that links wireless-channel models with their underlying algebraic lattice structures. In addition, we review a newly proposed family of p-modular lattices in Khodaiemehr, H., 2018 constructed from cyclotomic fields Q ( ζ p ) for primes p 1 ( mod 4 ) via a generalized Construction A framework. We characterize their algebraic and geometric properties and establish a non-existence theorem showing that such constructions cannot be extended to prime-power cyclotomic fields Q ( ζ p n ) with n > 1 . Finally, motivated by the fact that these p-modular lattices naturally yield mixed-signature structures for which classical theta series diverge, we integrate recent advances on indefinite theta series and modular completions. Drawing on Vignéras’ differential framework and generalized error functions, we outline how modularly completed indefinite theta series provide a principled analytic foundation for defining secrecy-relevant quantities in the indefinite setting. Overall, this work serves both as a survey of algebraic lattice techniques for PLS and as a source of new design insights for secure wireless communication systems.

1. Introduction

The relentless evolution of wireless communication systems, characterized by increasing demands for spectral efficiency, data rates, and robust connectivity, necessitates a parallel advancement in security paradigms. Traditional cryptographic methods, while foundational for secure communication, often confront inherent limitations in dynamic wireless environments. These include significant computational overhead, complex key management protocols, and susceptibility to sophisticated attacks such as the man-in-the-middle exploit [1,2]. Consequently, there has been a surge in interest towards physical-layer security, an approach that leverages the intrinsic physical properties of the wireless channel itself to establish security guarantees. PLS operates at the physical layer, providing a complementary layer of defense rooted in information theory, distinct from algorithmic cryptography [3,4].
Historically, algebraic techniques have proven to be unexpectedly powerful tools in various facets of communication system design. Initially, elementary number theory laid the groundwork for error-correcting codes, while finite fields became the mathematical engine for designing powerful binary and non-binary codes. As digital receiver processing capabilities advanced, attention shifted to signal-space codes, where the theory of Euclidean lattices emerged as a cornerstone for constructing dense signal constellations. These lattices facilitated efficient transmission over additive white Gaussian noise (AWGN) channels, with their efficiency often quantified by the volume-to-noise ratio (VNR). The pursuit of capacity-achieving and sphere-bound-achieving lattices spurred significant research efforts [5,6,7]. This led to the development of various practically decodable lattice families, characterized by sparse parity-check matrices that enabled high-dimensional decoding [8,9,10,11,12,13]. Other notable constructions include low-density lattice codes (LDLC) [14], integer low-density lattices based on Construction A (LDA) [15], and polar lattices [16]. Beyond core communication, algebraic methods, such as Gröbner bases, have also found applications in generalized lattice forms and algebraic decoding algorithms [17,18].
The application of algebraic structures extended further with the advent of wireless communication over fading channels. New code design criteria, focused on improving performance in bandwidth-limited scenarios, emerged. Algebraic number theory proved instrumental in this context, facilitating the design of robust coding schemes. These often manifested as multi-dimensional lattice signal constellations, achieving high coding gain through modulation diversity (or signal space diversity) [19]. This involved designing intrinsic high-diversity algebraic lattices via canonical embeddings of number fields or applying specific rotations to quadrature amplitude modulation (QAM) constellations. Furthermore, the theoretical exploration of multi-antenna wireless communication in the late 1990s revealed the critical role of division algebras in space–time coding. Once performance criteria for space–time codes were cast as matrix design problems, division algebras, including number fields and cyclic algebras, naturally emerged as optimal solutions, satisfying various performance metrics [20,21,22,23,24,25,26,27]. Other advanced algebraic structures, such as Clifford algebras [28] and crossed product algebras [29], have also been investigated.
Building upon this rich foundation, the focus has more recently shifted to leveraging these advanced algebraic techniques for physical-layer security. The open nature of wireless mediums, the decentralized nature of many networks, and the dynamic topology of mobile systems render traditional cryptographic approaches challenging for secure communication. This context underscores the significance of the information-theoretic approach, initiated by Wyner [3] and Csiszár and Körner [4], which conceptualizes the wiretap channel as a scenario where a legitimate receiver (Bob) has a superior channel to an eavesdropper (Eve). This framework demonstrates that reliable and confidential communication is achievable by exploiting physical channel differences without reliance on cryptographic keys. Extensive research has since characterized secrecy capacity across various wiretap channel models, including Gaussian point-to-point and relay networks [1,30].
Within the domain of Gaussian wiretap channels, where secrecy capacity is well-established [31], lattice codes have emerged as a powerful paradigm. Early designs focused on binary inputs [32,33], but a more sophisticated approach introduced by Belfiore and Oggier [34] proposed lattice codes optimized via novel invariants like secrecy gain and flatness factor. These metrics precisely quantify the eavesdropper’s confusion and the code’s ability to obscure information. A vanishing flatness factor (or equivalently, an infinitely large secrecy gain) is directly linked to robust semantic security [35]. The investigation of these metrics for -modular lattices, particularly unimodular lattices, has been a key research thrust [36,37]. The Belfiore–Solé conjecture on weak secrecy gain sparked rigorous methods for its verification [38,39], with studies extending to the asymptotic behavior, achievable bounds, and specific classifications of unimodular and modular lattices in various dimensions [30,37,40,41,42,43,44,45].
A versatile methodology for constructing lattices with desired properties is Construction A [46]. Its efficacy was amplified through generalization to number fields, initially proposed by Ebeling using cyclotomic fields [47], and subsequently extended to complex multiplication (CM) fields and totally real number fields [48,49]. This generalization provided a framework for lattice coset encoding in wireless channels, including wiretap scenarios [19,49,50], and facilitated the design of lattices with inherent properties like modularity and large shortest vectors, crucial for coding applications and physical network coding [51]. Extensive secrecy gain analysis for -modular lattices from quadratic extensions further underscores the utility of this approach [52,53].
This paper investigates the advanced application of algebraic number theory for constructing cyclotomic modular lattices, specifically designed for improving physical-layer security in next-generation wireless systems. Our structured investigation begins by detailing the Gaussian wiretap channel model in Section 2. This section provides a technical exposition on lattice properties critical for secure communication, including rigorous definitions of secrecy gain and flatness factor. Section 3 introduces the foundational mathematical prerequisites in algebraic number theory. We explore cyclotomic number fields, a class of monogenic fields with predictable algebraic structures, and describe their role in cryptographic and information security contexts. We subsequently examine the Construction A framework, focusing on its application for lattices over general number fields in Section 4. In Section 5, we address the application of cyclotomic number fields in the construction of modular lattices. A central contribution of this work lies in the rigorous construction and characterization of families of p-modular lattices derived from cyclotomic number fields. In Section 6, we present explicit construction methodologies utilizing the generalized Construction A framework and review recent theoretical results that precisely determine the conditions under which such modular lattices can exist. These results are not merely of theoretical interest; they yield concrete engineering design rules that provide a clear roadmap for system architects. For example, based on these results, one can demonstrate that constructing modular lattices via Construction A over cyclotomic fields of prime-power order p n is generally infeasible when n > 1 , while simultaneously proving feasibility and strong structural guarantees for fields of prime order p with p 1 ( mod 4 ) . These insights illuminate both promising future directions and fundamental limitations in algebraic lattice construction for secure communications. Interestingly, these p-modular constructions naturally give rise to lattices of mixed signature, for which classical secrecy metrics such as secrecy gain and flatness factor, which are well understood in the positive-definite setting, are no longer directly applicable, as the associated theta series diverges. This challenge motivates a deeper examination of recent advances in the theory of indefinite theta series and their modular completions, particularly the framework introduced by Vignéras and extended through generalized error functions [54]. These developments provide a principled analytic foundation for studying secrecy properties of indefinite lattices and open new future pathways for defining secrecy-relevant quantities beyond the positive-definite regime. To bridge these mathematical advances with physical-layer security, this paper outlines the role of modular completions, Vignéras’ operator, and generalized error functions in enabling meaningful analysis of mixed-signature lattice codes [55,56].
Finally, we transition from theoretical exposition to practical relevance by linking these advanced algebraic constructions to the cutting-edge landscape of modern wireless systems in Section 7. We explore how the unique algebraic structure and inherent properties of our cyclotomic modular lattices—their specific modularity, predictable behavior, and intrinsic potential for optimized secrecy—render them highly suitable for deployment in next-generation security solutions. This includes a detailed discussion of their integration into sophisticated multiple-input multiple-output (MIMO) systems, their synergistic potential with reconfigurable intelligent surfaces (RIS) for dynamic channel shaping, and their role within machine learning (ML)-assisted communication paradigms. This section identifies concrete design benefits, illustrates how our theoretical properties translate into tangible performance gains, and illuminates crucial future research directions for leveraging these robust algebraic constructions in the context of wireless systems. Section 8 offers our concluding remarks and summarizes the broader implications of this work.

2. Wireless Wiretap Channels and Secrecy Metrics

This section establishes the fundamental models and performance metrics essential for understanding PLS in wireless communication systems. We begin by reviewing the canonical wireless wiretap channel models, from basic AWGN scenarios to more complex fading environments. Subsequently, we delve into the information-theoretic foundations of secrecy, defining key concepts such as secrecy capacity and equivocation. The section then introduces entropy-based metrics, specifically secrecy gain and flatness factor, which are crucial for quantifying the security performance of lattice codes. Finally, we discuss lattice coset coding as a practical technique for simultaneously achieving reliability and secrecy. This framework will serve as the unifying basis for the subsequent algebraic constructions and analyses presented in this paper.

2.1. Wireless Wiretap Models: AWGN and Quasi-Static Fading

Effective PLS design requires a precise understanding of the underlying wireless channel characteristics. The simplest yet fundamental model is the Gaussian wiretap channel, where a legitimate receiver (Bob) and an eavesdropper (Eve) experience independent additive white Gaussian noise. In this scenario, Alice transmits a signal x, which is received by Bob as y and by Eve as z. This model is represented as
y = x + v b , z = x + v e ,
where x is the transmitted signal, v b and v e denote the Gaussian noise at Bob and Eve’s side, respectively, both with zero mean, and respective variances σ b 2 and σ e 2 (see Figure 1).
A more realistic scenario for wireless communications involves fading channels, where the channel gain fluctuates over time and space. We primarily consider quasi-static fading models, where the channel coefficients remain constant over a coherence interval but vary across different intervals. This distinction is critical as fading can be either exploited or mitigated for secrecy purposes. For the quasi-static fading channel, Alice transmits a signal x, which is received by Bob and Eve via channel gains h B and h E , respectively, further corrupted by AWGN. The fading channel is modeled as
y = h B x + v b , z = h E x + v e ,
where h B and h E are the constant (within a coherence interval) channel gains for Bob and Eve, respectively, and  v b , v e are zero-mean AWGN with variances σ b 2 and σ e 2 .
In both AWGN and fading contexts, the fundamental assumption for PLS is usually that Bob possesses a superior channel quality compared to Eve. Specifically, we assume that Alice knows Bob’s channel, that is σ b ; however, Eve’s channel, σ e , can be known or unknown [37] to Alice. The goal is to achieve reliable communication between Alice and Bob, but also confidentiality despite the presence of Eve. As usual in information security, we assume that Bob has a good SNR (signal to noise ratio) but Eve has a poor SNR, in particular with respect to Bob; that is σ e 2 σ b 2 .
Alice’s encoder maps l bits s 1 , , s l from S = 0 , 1 to a codeword x = ( x 1 , , x n ) R n . Over a transmission of n symbols, we get
y = x + v b , z = x + v e .

2.2. Information-Theoretic Secrecy: Capacity, Equivocation, Mutual Information

The ultimate goal of PLS is to achieve information-theoretic secrecy, ensuring that the legitimate recipient can reliably decode the message while the eavesdropper gains negligible information. This is formally quantified through several key metrics. The information theoretic approach to achieving secure communication was initiated by Wyner [3] and Csiszár and Körner [4], introducing the wiretap channel model. Secrecy capacity represents the maximum rate at which information can be transmitted reliably and confidentially. For a wiretap channel, it is defined as the difference between the legitimate channel capacity and the eavesdropper’s channel capacity. Extensive research has since characterized secrecy capacity across various wiretap channel models, including Gaussian point-to-point and relay networks [1,40]. The secrecy capacity of Gaussian wiretap channels was established in [31].
To measure how efficient wiretap coding is in providing confidentiality, the information leaked to the eavesdropper is measured in terms of equivocation (conditional entropy), that is H ( S l | Z n ) , where S and Z denote random variables corresponding, respectively, to Alice’s data and the message received by Eve. The best possible secrecy is achieved when H ( S l | Z n ) = H ( S l ) , or equivalently when I ( S l ; Z n ) = H ( S l ) H ( S l | Z n ) = 0 . It was shown in [35], Theorem 5, for the Gaussian wiretap channel that
I ( S l ; Z n ) ϵ n ( n R log ϵ n ) ,
where
ϵ n = vol ( Λ e ) Θ Λ e ( 1 / 2 π σ e 2 ) ( 2 π σ e 2 ) n 1 ;
in which vol and Θ are defined in (8) and (14), respectively. For more details about ϵ n and its properties, the reader may consult [35].

2.3. Entropy-Based Metrics: Secrecy Gain and Flatness Factor

While secrecy capacity and equivocation provide fundamental bounds, specific metrics are needed for the practical design and analysis of lattice codes. For lattice-based systems, two critical entropy-based metrics are used to quantify the confusion at the eavesdropper. A different approach was adopted in [34], where lattice codes were proposed using as design criterion a new lattice invariant called secrecy gain defined as the maximum of its secrecy function; it was shown that it characterizes the confusion at the eavesdropper. In [35], the result concerning semantic security was generalized to continuous channels, and a new lattice design criterion, designated as the flatness factor, was proposed. This study established that a vanishing flatness factor (or equivalently an infinitely large secrecy gain) implies semantic security. This suggests the study of the secrecy gain of lattices as a way to understand how to design good Gaussian lattice wiretap codes.
These metrics are defined formally based on the lattice’s theta series. Before formally defining the theta series, let us establish the fundamental definitions of a lattice and its associated geometric properties.
Definition 1.
A lattice Λ is a discrete additive subgroup of the m-dimensional real space R m . It can be generated by a basis B = { b 1 , , b n } R m , where n m . Any vector x Λ can be represented as an integer linear combination of the basis vectors. The  n × m matrix M with b 1 , , b n as rows is a generator matrix for the lattice. The rank of the lattice is n and its dimension is m. If  n = m , the lattice is a full-rank lattice. A lattice Λ can be formally described as
Λ = x = uM | u Z n .
For any lattice point p of a lattice Λ R m , its Voronoi cell is defined by
V Λ ( p ) = x R m , d ( x , p ) d ( x , q ) for all q Λ .
All Voronoi cells are congruent; thus, V Λ ( p ) = V Λ ( 0 ) V ( Λ ) . The Gram matrix of a lattice is given by G = M M t .
Definition 2.
The volume of a lattice Λ, denoted vol ( Λ ) , is the volume of its fundamental Voronoi cell. It is mathematically defined as the square root of the determinant of its Gram matrix:
vol ( Λ ) = vol ( V ( Λ ) ) = det ( G ) .
A lattice Λ in R m is an integral lattice if its Gram matrix has coefficients in Z . This means that the inner product x , y Z for all x , y Λ . The set of all vectors in R m whose inner product with all vectors of Λ is in Z forms the dual lattice of Λ , denoted by Λ * .
The minimum non-zero squared Euclidean norm of a lattice, denoted d min 2 ( Λ ) , and its associated Hermite parameter, γ H ( Λ ) , are critical for coding performance:
γ H ( Λ ) = d min ( Λ ) vol ( Λ ) n 2 = d min 2 ( Λ ) det ( G ) n .
The Hermite parameter quantifies the density of the lattice packing. The number of vectors in Λ with squared norm equal to d min 2 ( Λ ) is the kissing number  τ ( Λ ) . These definitions are fundamental to understanding the subsequent formulation of the theta series, which provides a comprehensive spectral representation of the lattice’s structure.
Building on the preceding definitions, the secrecy function  Ξ Λ ( τ ) of an n-dimensional lattice Λ is given by
Ξ Λ ( τ ) = Θ vol ( Λ ) n Z n ( τ ) Θ Λ ( τ ) , τ = y i , y > 0 .
The strong secrecy gain  χ Λ , strong of an n-dimensional lattice Λ is defined by
χ Λ , strong = sup y > 0 Ξ Λ ( y i ) .
Since the above maximum value is not easy to calculate for a general lattice, a weaker definition of secrecy gain has been introduced [37]. A multiplicative symmetry point is a point y 0 such that Ξ Λ ( y 0 · y ) = Ξ Λ ( y 0 / y ) for all y > 0 . The weak secrecy gain χ Λ of a lattice Λ is then given by
χ Λ = Ξ Λ ( y 0 ) = Θ vol ( Λ ) n Z n ( y 0 i ) Θ Λ ( y 0 i ) .
For an n-dimensional d-modular lattice, the weak secrecy gain χ Λ is given by [37]:
χ Λ = Θ d 4 Z n ( τ ) Θ Λ ( τ ) , τ = i d ,
noting that the volume of a d-modular lattice is vol ( Λ ) = d n 4 . The secrecy gain characterizes the amount of confusion that a wiretap lattice code brings [37]. The weak secrecy gain χ Λ is conjectured to be the secrecy gain itself. To the best of our knowledge, this conjecture is still open [53], but for large classes of unimodular lattices, it is known to be true [38,43]. The relationship between d and χ Λ for d-modular lattices has been investigated in [30,40,52,53].
The theta series of a lattice Λ , denoted Θ Λ ( τ ) , is a fundamental tool for analyzing its properties. For  H = { a + i b C | b > 0 } (the upper half-plane) and q = e π i τ , τ H , the theta series is defined by
Θ Λ ( τ ) = t Λ q t 2 ,
where t 2 = t , t is the squared Euclidean norm of a lattice vector, in which , : Λ × Λ R is the bilinear form that Λ is defined based on it. If  Λ R n , we can consider t 2 = i = 1 n t i 2 , for  t = ( t 1 , , t n ) Λ . If we consider Λ to be integral, the theta series of Λ can be written as m Z A m q m , where A m = | { x Λ : x 2 = m } | . For an integral lattice Λ , the coefficient of the second term of Θ Λ = m Z A m q m , which is A μ q μ with
μ = μ Λ = min x 2 : x Λ , x 0 ,
is the kissing number of Λ , and the power of q in the second term gives the minimum, or minimal norm of Λ . The theta series helps in determining bounds for the minimum [57] as well as classifying lattices [58]. It has also been used recently to define the notion of secrecy gain. Exceptional lattices have theta series that can be expressed as functions of the Jacobi theta functions ϑ i ( q ) , q = e π i τ , ( τ ) > 0 , i = 2 , 3 , 4 , themselves defined by
ϑ 2 ( q ) = k = + q k + 1 2 2 ,
ϑ 3 ( q ) = k = + q k 2 ,
ϑ 4 ( q ) = k = + ( 1 ) k q k 2 .
A few examples of theta series of exceptional lattices are given in Table 1 [37,46].

2.4. Lattice Coset Coding: Reliability and Secrecy Analysis

Lattice coset coding is a powerful technique for simultaneously achieving high reliability for the legitimate receiver and strong secrecy for the eavesdropper. This method, originally proposed in [3,59], involves mapping an information vector s d { 0 , 1 } k to a coset of a nested lattice structure, rather than a single lattice point. Alice, the transmitter, chooses a point x from the selected coset Λ e + c j ( s d ) by adding a random vector r Λ e to the coset representative c j ( s d ) . The transmitted signal is thus x = r + c j ( s d ) Λ e + c j ( s d ) .
The underlying principle involves partitioning a dense lattice Λ b (intended for Bob) into a union of disjoint cosets of a coarser sublattice Λ e , such that Λ b = j = 1 2 k ( Λ e + c j ) . The number of such cosets, 2 k , is determined by the ratio of volumes:
Λ b Λ e = 2 k = vol V ( Λ e ) vol V ( Λ b ) .
Once the mapping s d Λ e + c j ( s d ) is done, Alice randomly chooses a point x Λ e + c j ( s d ) and sends it over the wiretap channel. The coset encoding means that a random vector r Λ e is chosen and the transmitted lattice point x Λ b is finally of the form
x = r + c j ( s d ) Λ e + c j ( s d ) .
The subscript of the sublattice Λ e is chosen since it encodes the random bits that are there to increase Eve’s confusion, and so is the lattice intended for Eve [37]. The total rate R is then
R = R s + R e ,
where R s = 2 k n is the information bits rate intended to Bob, and  R e = 2 r n , with r the number of random bits, is the random bit rate, all per (complex) channel use [37].
Example 1.
Based on [34], Example 1, take Λ b = Z 2 and Λ e = 2 Z 2 , for which we have
Z 2 = 2 Z 2 ( 2 Z 2 + ( 0 , 1 ) ) ( 2 Z 2 + ( 1 , 0 ) ) ( 2 Z 2 + ( 1 , 1 ) ) .
The lattice Z 2 is thus partitioned into 2 k = 4 cosets, allowing to transmit k = 2 bits of information. Alice can label any of the above 4 cosets by their representatives. To transmit the two bits 01, she then randomly picks a point in the coset 2 Z 2 + ( 0 , 1 ) , say x = ( 2 , 3 ) = 2 ( 1 , 1 ) + ( 0 , 1 ) and sends this point over the wiretap channel.
Using lattice coset encoding, two lattices play a role:
  • the lattice Λ b , that Alice uses to communicate reliably with Bob, and 
  • the lattice Λ e , which is a sublattice of Λ b , that appears in the process of coset coding for encoding random bits.
In the rest of this section, we present the properties of these two lattices which are related to the design of good wiretap codes. Suppose that the lattice point x k = r k + c k Λ b has been transmitted over the unconstrained AWGN channel and y k = x k + v has been received, where v = ( v 1 , , v n ) is the error term with components independently and identically distributed (i.i.d.) with N ( 0 , σ 2 ) . The probability P c of finding the correct coset is [34]
P c = 1 ( σ 2 π ) n r Λ e V ( Λ b ) + r e u 2 / 2 σ 2 d u .
Considering the wiretap channel where Alice transmits lattice codewords from an n-dimensional lattice Λ b , we get that the probabilities P c , b and P c , e , which are the correct decision probabilities for Bob and Eve, respectively, can be obtained from (22) by replacing σ = σ b and σ e , respectively. Since by assumption Bob has a good SNR, its received vector y is most likely to lie in the Voronoi region around the origin, and thus the terms corresponding to r 0 in (22) are negligible, which yields [34]
P c , b 1 ( σ b 2 π ) n V ( Λ b ) e u 2 / 2 σ b 2 d u .
This is now the familiar case of transmitting lattice points over the Gaussian channel, for which it is known that Λ b should have a good Hermite parameter to get a good coding gain [46]. We know how to design good codes for Bob’s channel, and have his probability of making a correct decision arbitrarily close to 1 (see, e.g., [7,8,14,60,61]).
On the contrary under a low SNR assumption for Eve, namely σ e is large, by using a Taylor expansion, the probability of making a correct decision for Eve is given by [34]
P c , e 1 ( σ e 2 π ) n vol ( V ( Λ b ) ) r Λ e e u 2 / 2 σ e 2 .
In order to minimize the probability P c , e of Eve making a correct decision, while keeping P c , b unchanged, we should find a lattice Λ b which is as good as possible for the Gaussian channel, its sublattice Λ e minimizes r Λ e e u 2 / 2 σ e 2 and log 2 | Λ b / Λ e | = k ; see [34]. The constraint on the cardinality of cosets (or rate) is equivalent to set the fundamental volume of Λ e equal to a constant. Two lattice design criteria have been proposed to characterize the confusion created by Λ e : the secrecy gain [37], and the flatness factor [35,62]. The secrecy gain originally captures the loss in Eve’s probability of correctly decoding when Λ e is used instead of Z n [37]. Both the flatness factor and the secrecy gain involve the theta series of Λ e at a particular point, which turns out to give an upper bound on Eve’s knowledge of the secret message (when it is expressed in terms of mutual information) [35]. This concludes our survey of wireless wiretap channels and secrecy metrics, setting the stage for the algebraic construction methods that follow.

3. Mathematical Background on Algebraic Number Theory

To systematically engineer lattice codes with tailored properties for wireless communication security, we leverage the powerful tools of algebraic number theory. This section lays out the fundamental definitions and theorems necessary to understand the construction of lattices from number fields. These algebraic structures provide the blueprint for generating lattices with specific characteristics, such as integrality, modularity, and prescribed embedding properties, which are critical for optimizing secrecy metrics.

3.1. Number Fields, Dedekind Domains, and Discriminants

We begin with the fundamental definitions concerning number fields, which are finite extensions of the field of rational numbers Q . These fields provide the algebraic setting for constructing advanced lattice codes.
Let K and L be two fields. If K L , L is a field extension of K denoted by L / K . The dimension of L as a vector space over K is the degree of L over K, denoted by [ L : K ] . Any finite extension of Q is a number field.
An element α L is algebraic over K if it is a root of a non-zero irreducible monic polynomial p K [ x ] . The polynomial of least degree with this property is known as the minimal polynomial of α over K. If all elements of L are algebraic over K, then L is an algebraic extension of K.
Definition 3
(Algebraic Integer). Let K be an algebraic number field of degree n. If α K is a root of a monic polynomial with coefficients in Z , then α is an algebraic integer. The set of algebraic integers of K is the ring of integers of K, denoted by O K . The ring O K is also called the maximal order of K.
If K is a number field, then K = Q ( θ ) for an algebraic integer θ O K [63], p. 49. For a number field K of degree n, the ring of integers O K forms a free Z -module of rank n.
Definition 4
(Integral Basis). Let ω 1 , , ω n be a basis of the Z -module O K , so that we can uniquely write any element of O K as i = 1 n a i ω i with a i Z for all i. Then, ω 1 , , ω n is an integral basis for K.
Theorem 1
([63], p. 41). Let K = Q ( θ ) be a number field of degree n over Q . There are exactly n embeddings σ 1 , , σ n of K into C defined by σ i ( θ ) = θ i , for i = 1 , , n , where θ i ’s are the distinct zeros in C of the minimum polynomial of θ over Q .
For any x K , the images σ 1 ( x ) , , σ n ( x ) are the conjugates of x. These conjugates are fundamental for defining two important field-theoretic operations: the norm and the trace.
Definition 5
(Norm and Trace). Let K be a number field of degree n and x K . The norm of x over Q is defined as N K / Q ( x ) = i = 1 n σ i ( x ) , and the trace of x over Q is defined as Tr K / Q ( x ) = i = 1 n σ i ( x ) . For any x K , N K / Q ( x ) and Tr K / Q ( x ) belong to Q . If x O K , these values are integers, i.e., N K / Q ( x ) Z and Tr K / Q ( x ) Z .
Definition 6
(Discriminant). Let ω 1 , , ω n be an integral basis for a number field K. The discriminant of K, denoted d K , is defined as d K = ( det [ ( σ j ( ω i ) ) i , j = 1 n ] ) 2 . The discriminant d K of a number field belongs to Z and is independent of the choice of basis.
Definition 7
(Integrally Closed Ring). A ring A is integrally closed in a field L if every element of L which is integral over A lies in A. An integral domain is integrally closed if it is integrally closed in its quotient field.
Theorem 2
([64], p. 18). Let D be a ring which is Noetherian, integrally closed, and such that every non-zero prime ideal is maximal. Then, every ideal of D can be uniquely factored into prime ideals.
A ring satisfying the properties of Theorem 2 is a Dedekind ring. Crucially, the ring of algebraic integers O K in any number field K is a Dedekind ring.

3.2. Cyclotomic Fields: Monogenicity and Galois Structure

Monogenic number fields simplify arithmetic within their rings of integers, making them particularly attractive for lattice constructions. Among these, cyclotomic fields hold a prominent place due to their well-understood structure and Abelian Galois groups.
Definition 8
(Monogenic Number Field). Let K be a number field of degree n and O K its ring of integers. Then, considering O K as a Z -module, if it has a basis of the form 1 , α , , α n 1 , for some α O K , α is a power generator, this basis is a power basis and K is monogenic.
The problem of identifying monogenic number fields is classical. Quadratic and cyclotomic number fields are known to be monogenic, though this is not a general property for all number fields. For instance, Dedekind [65], p. 64, provided an example of a non-monogenic cubic field. Monogenicity significantly simplifies arithmetic tasks like factoring prime ideals.
Cyclotomic number fields are among the most important monogenic number fields. For any field K, an extension of the form K ( ζ ) , where ζ is a root of unity, is a cyclotomic extension of K. A key algebraic property is that cyclotomic extensions always possess an Abelian Galois group. This makes them essentially the only direct construction method for Abelian extensions over arbitrary base fields [66].
Let μ n denote the group of n different nth roots of unity. A primitive nth root of unity, denoted ζ n , is an nth root of unity that has order n.
Lemma 1
([66], Lemma 2.1). For σ Gal ( K ( ζ n ) / K ) there is an integer a σ that is relatively prime to n such that σ ( ω ) = ω a σ for all ω μ n .
Based on Lemma 1, for any field K, the mapping τ : Gal ( K ( ζ n ) / K ) ( Z / n Z ) × , σ a σ , is an injective group homomorphism. When K = Q , this embedding is an isomorphism. For n > 2 , K = Q ( ζ n ) is a totally imaginary field. It is proved in [67], Theorem 2.6, that Z [ ζ n ] is the ring of algebraic integers of Q ( ζ n ) , confirming its monogenicity.
The discriminant of cyclotomic fields can be computed via the following theorem:
Theorem 3
([67], Proposition 2.7). Let K = Q ( ζ n ) , then the discriminant d K is given by
d K = ( 1 ) ϕ ( n ) / 2 n ϕ ( n ) p | n p ϕ ( n ) / ( p 1 ) .
For the specific case where n = p k (for p a prime number), the discriminant of K = Q ( ζ p k ) is
d K = ± p p k 1 ( p k k 1 ) ,
where the sign depends on p k ( mod 4 ) [67], Proposition 2.1. For n = 2 r with r > 2 , d Q ( ζ 2 r ) = 2 2 r 1 ( r 1 ) and for r = 2 , d K = 4 [68].
Differences exist between the prime-power case and the general n case. For n with at least two distinct prime factors, 1 ζ n is a unit of Z [ ζ n ] [67], Proposition 2.8. If n is prime, however, 1 ζ n is not a unit, and P = ( 1 ζ n ) forms a prime ideal of O K = Z [ ζ n ] , with n O K = P n 1 signifying total ramification in Q ( ζ n ) [67], Lemma 1.4.
The nth cyclotomic polynomial, Φ n ( X ) , is irreducible over Z and defined as
Φ n ( X ) = ( j , n ) = 1 X ζ n j .
It factors X n 1 = d | n Φ d ( X ) . The factorization of Φ n ( X ) modulo p (for p not dividing n) yields distinct monic irreducible factors, each with degree equal to the order of p ( mod n ) [66], Theorem 5.4.
Proposition 1
([66], Corollary 5.7). The reduction Φ ¯ n is irreducible in F p [ X ] if and only if ( p , n ) = 1 and p ( mod n ) is a generator of ( Z / ( n ) ) × .

3.3. Ideals, Embeddings, and Minkowski Space

The theory of ideals within number fields is fundamental for constructing lattices, particularly through Construction A, as it governs the structure of the resulting lattice and its properties.
Definition 9
(Signature). Let σ 1 , , σ n be the n embeddings of K into C . Let r 1 be the number of embeddings whose images lie in R (real embeddings), and 2 r 2 be the number of embeddings whose images lie in C R (complex embeddings). These values satisfy r 1 + 2 r 2 = n . The pair ( r 1 , r 2 ) is called the signature of K.
  • If r 2 = 0 , K is a totally real algebraic number field.
  • If r 1 = 0 , K is a totally complex algebraic number field.
The canonical embedding, also known as the Minkowski embedding, is a crucial mapping that translates the algebraic structure of a number field into a concrete geometric representation, laying the foundation for lattice constructions.
We order the embeddings σ j such that σ j ( x ) R for 1 j r 1 , and σ j + r 2 ( x ) = σ j ( x ) ¯ for r 1 + 1 j r 1 + r 2 .
Definition 10
(Canonical Embedding). The canonical embedding σ : K R r 1 × C r 2 is the homomorphism defined by
σ ( x ) = ( σ 1 ( x ) , , σ r 1 ( x ) , σ r 1 + 1 ( x ) , , σ r 1 + r 2 ( x ) ) .
By identifying R r 1 × C r 2 with R n , the canonical embedding can be rewritten as σ : K R n
σ ( x ) = ( σ 1 ( x ) , , σ r 1 ( x ) , σ r 1 + 1 ( x ) , σ r 1 + 1 ( x ) , , σ r 1 + r 2 ( x ) , σ r 1 + r 2 ( x ) ) ,
where σ j denotes the real part of σ j and σ j the imaginary part of σ j , for j = r 1 + 1 , , r 1 + r 2 .
This embedding transforms algebraic integers into lattice points in Euclidean space, allowing us to leverage their geometric properties for coding.
In applications of number fields to lattice construction, understanding the factorization of prime ideals is essential. This process involves selecting an integer α O L such that L = K ( α ) , and examining the factorization of its minimal polynomial modulo p .
Let A be a Dedekind ring, K its quotient field, L a finite separable extension of K, and B the integral closure of A in L. If p is a prime ideal of A, then the ideal p B in B can be factored uniquely into prime ideals:
p B = P 1 e 1 P g e g ,
where P i are distinct prime ideals of B lying above p .
  • e i 1 is the ramification index of P i over p , denoted e ( P i / p ) .
  • f i = [ B / P i : A / p ] is the residue class degree (or inertia degree) of P i over p .
Theorem 4
([64], p. 24). Let A be a Dedekind ring, K its quotient field, L a finite separable extension of K, and B the integral closure of A in L. Let p be a prime of A. Then, the fundamental identity holds as follows:
[ L : K ] = P | p e ( P / p ) f ( P / p ) .
For a Galois extension L / K of degree n, this simplifies to n = e f g , where g is the number of primes P of B above p , and e = e ( P / p ) and f = f ( P / p ) are constant for all P .
  • p is unramified in L if all e i = 1 .
  • p is ramified if any e i > 1 .
  • P is totally ramified over p if e ( P / p ) = [ L : K ] (implying g = 1 , f = 1 ).
  • p  splits completely in L if e i = 1 , f i = 1 for all i, so g = [ L : K ] .
These concepts are crucial for understanding the properties of lattices constructed from ideals, particularly in Construction A where the choice of prime ideal p significantly influences the modularity and other characteristics of the resulting lattice.
Proposition 2
([64], p. 27). Let A be a Dedekind ring with quotient field K and let E be a finite separable extension of K. Let B be the integral closure of A in E and assume that B = A [ α ] for some element α. Let f be the irreducible polynomial of α over K, p be a prime of A and f ¯ be the reduction in f mod p . Consider
f ¯ ( X ) = P 1 ¯ ( X ) e 1 P r ¯ ( X ) e r ,
to be the factorization of f ¯ into powers of irreducible factors over A ¯ = A / p , with leading coefficients 1. Then
p B = P 1 e 1 P r e r ,
is the factorization of p in B, so that e i is the ramification index of P i over p . We also have
P i = p B + P i ( α ) B ,
where P i A [ X ] is a polynomial with leading coefficient 1 whose reduction mod p is P i ¯ . For each i, P i has residue class degree [ B / P i : A / p ] = d i , where d i = d e g ( P i ¯ ) .
In our cases, A = Z , K = Q , E = Q ( α ) , B = O E = Z [ α ] and p = p Z , for a prime number p. Proposition 2 shows the importance of monogenic number fields. Indeed, the task of factoring p O K , for a prime number p, into prime ideals over O K which is a difficult task in general, reduces to factoring the minimal polynomial of α over F q , which is significantly easier. Thus, we present other useful results about monogenic number fields.
Theorem 5
([67], Proposition 2.16). Z [ ζ n + ζ n 1 ] is the ring of integers of Q ( ζ n ) + .
If n = p r , the degree of K = Q ( ζ p r ) over Q is p r 1 ( p 1 ) and the prime p totally ramifies in K as p O K = P p r 1 ( p 1 ) , where P is a prime principal ideal with generator 1 ζ p r and residue field O K / P F p . The degree of K + = Q ( ζ p r + ζ p r 1 ) over Q is p r 1 ( p 1 ) 2 and it can be proved that the prime p also totally ramifies in K + as p O K + = p p r 1 ( p 1 ) 2 , with p = P O K + = ( 2 ζ p r ζ p r 1 ) O K + [49]. By using the Hasse Theorem that states the conductor-discriminant relation, a formula has been obtained to compute the discriminant of any subfield of Q ( ζ p r ) where p is an odd prime and r is a positive integer [69]. Let p be an odd prime number, r a positive integer, and L = Q ( ζ p r ) . Since L is a Galois extension of Q and its Galois group is a cyclic group isomorphic to ( Z / p r Z ) × , there is a one-to-one correspondence between the subfields of L and the divisors of [ L : Q ] = ( p 1 ) p r 1 . The discriminant of any subfield K of L can be obtained as a function of p and its degree only. Since the degree of K is a divisor of ( p 1 ) p r 1 , we write [ K : Q ] = u p j , where u is a divisor of p 1 and j r 1 .
Theorem 6
([69], Theorem 4.1). Let K be a subfield of Q ( ζ p r ) with [ K : Q ] = u p j , where p u . Then, d K = p u ( j + 2 ) p j p j + 1 1 p 1 1 .
Another formula for computing the discriminant of any number field K Q ( ζ 2 r ) , with r 3 , is derived in [68]. In this case the Galois group is ( Z / 2 r Z ) × = 1 ¯ , 5 ¯ = ( 1 ¯ ) a 5 ¯ b | a = 1 , 2 and b = 1 , 2 , , 2 r 2 , which is not cyclic.
Theorem 7
([68], Theorem 3.2). Let K be a subfield of Q ( ζ 2 r ) of degree 2 ( m 1 ) . Then, if K = Q ( ζ 2 m ) , d K = 2 2 m 1 ( m 1 ) and if K Q ( ζ 2 m ) , d K = 2 m 2 m 1 1 .

4. Lattices from Number Fields and Construction A

This section details the construction of lattices using algebraic number theory, particularly focusing on the widely used Construction A. This methodology translates algebraic structures into concrete lattice geometries, enabling the design of codes with desired properties for physical-layer security.

4.1. Lattices and Modularity

A fundamental understanding of lattices and their modular properties is essential for their application in coding theory and physical-layer security. The definitions of a lattice, its volume, Voronoi cell, Gram matrix, integral lattice, dual lattice, Hermite parameter, and kissing number have been comprehensively established in Section 2.3, which discusses entropy-based secrecy metrics. Readers are directed there for the detailed mathematical definitions essential for understanding lattice properties. Here, we build upon those foundational concepts to introduce the specialized notions of unimodular and modular lattices, which are particularly relevant for algebraic constructions in physical-layer security. First, we present the definition of some lattices that arise from algebraic number theory.
Definition 11.
An integral lattice Γ is a free Z -module of finite rank together with a positive definite symmetric bilinear form , : Γ × Γ Z .
Definition 12.
The discriminant of a lattice Γ, denoted d i s c ( Γ ) , is the determinant of M M t where M is a generator matrix for Γ. The volume vol ( R n / Γ ) of a lattice Γ is defined to be | det ( M ) | .
Thus, the discriminant is related to the volume of a lattice by
vol ( R n / Γ ) = disc ( Γ ) .
Moreover, when Γ is integral, we have disc ( Γ ) = | Γ * / Γ | , where Γ * is the dual of the lattice defined by
Γ * = y R m | y · x Z x Γ .
Definition 13
(Unimodular and Modular Lattices). When Γ = Γ * , the lattice Γ is unimodular. If ( L , b ) is integral and ( L , b ) ( L * , d b ) for some positive integer d, it is d-modular (or modular of level d). An integral lattice ( Λ , b ) is called even if b ( x , x ) 2 Z for all x Λ and odd otherwise.
The canonical embedding (29) gives a geometrical representation of a number field and makes the connection between algebraic number fields and lattices.
Theorem 8
([63], p. 155). Let ω 1 , ω 2 , , ω n be an integral basis for a number field K. The n vectors v i = σ ( ω i ) R n , i = 1 , , n are linearly independent, so they define a full rank lattice Λ = Λ ( O K ) = σ ( O K ) .
Theorem 9
([70]). Let d K be the discriminant of a number field K. The volume of the fundamental parallelotope of Λ ( O K ) is given by
vol ( Λ ( O K ) ) = 2 r 2 | d K | .

4.2. Construction A over O K

Construction A provides a powerful method to build lattices from linear codes, and its generalization to number fields allows for the creation of lattices with rich algebraic properties suitable for wireless communication.
The generalized Construction A method leverages a number field K and a finite field F p f . Let K be a Galois number field of degree n which is either totally real or a CM field. Let O K be the ring of integers of K and p be a prime ideal of O K above the prime p. We have O K / p F p f , where f is the inertia degree of p. The reduction map ρ from O K N to F p f N is defined componentwise as
ρ : O K N F p f N , ( x 1 , , x N ) x 1 mod p , , x N mod p ,
for some positive integer N. Let C F p f N be a linear code over F p f . Since ρ is a Z -module homomorphism, ρ 1 ( C ) is a submodule of O K N . Given that O K is a free Z -module of rank n, ρ 1 ( C ) is a free Z -module of rank n N . The lattice is then constructed using a symmetric bilinear form b α : O K N × O K N R defined by
b α ( x , y ) = i = 1 N Tr K / Q ( α x i y ¯ i ) ,
where α K R and y ¯ i denotes the complex conjugate of y i if K is a CM field, and y ¯ i = y i if K is totally real. For b α to be positive definite, α must be chosen to be totally positive, i.e., σ i ( α ) > 0 for all real embeddings σ i : K R [53]. If α is chosen from the codifferent of K (i.e., α D K 1 ), then Tr ( α x i y ¯ i ) Z [53]. The pair ( ρ 1 ( C ) , b α ) thus forms a lattice of rank n N . The canonical embedding σ N , defined componentwise as σ N : K N R n N , ( x 1 , , x N ) ( σ ( x 1 ) , , σ ( x N ) ) , maps ρ 1 ( C ) to a real lattice σ N ( ρ 1 ( C ) ) R n N of dimension n N .
This method of constructing lattices from linear codes is generally referred to as Construction A [46,49,53]. The original binary Construction A, proposed by Forney [71], used K = Q , O K = Z , p = 2 and typically α = 1 / 2 or α = 1 . This binary version can be seen as a particular case of the cyclotomic field approach by Ebeling [47], which takes K = Q ( ζ p ) , O K = Z [ ζ p ] , and p = ( 1 ζ p ) . The generalization to CM fields and totally real number fields, particularly when p is totally ramified, has broadened the applicability of Construction A [49].

Generator and Gram Matrices for Construction A

The structure of the resulting lattice is explicitly defined by its generator and Gram matrices. Let n = [ K : Q ] . We consider the n N -dimensional lattice ( ρ 1 ( C ) , b α ) . Let Δ = | d K | be the absolute value of the discriminant of K.
Proposition 3
([53]). The following results hold:
  • The lattice ( ρ 1 ( C ) , b α ) has discriminant Δ N p 2 f ( N k ) N ( α ) N and volume Δ N 2 p f ( N k ) N ( α ) N 2 .
  • The dual lattice ( ρ 1 ( C ) * , b α ) has discriminant Δ N p 2 f ( N k ) N ( α ) N and volume Δ N 2 p f ( N k ) N ( α ) N 2 .
  • The lattice ( ρ 1 ( C ) , b α ) has discriminant Δ N p 2 f k N ( α ) N and volume
    Δ N 2 p f k N ( α ) N 2 .
Let { v 1 , , v n } be a Z -basis for O K and let { ω 1 , , ω n } be a Z -basis for p . Suppose C admits a generator matrix in the standard (systematic) form and let A be a matrix such that I k A ( mod p ) is a generator matrix of C .
Proposition 4
([53], Proposition 2.3). For K, a totally real number field of degree n with Galois group G = σ 1 , , σ n , a generator matrix for ( ρ 1 ( C ) , b α ) is given by
M C = I k M A ˜ M 0 n ( N k ) , n k I N k M p I N D α ,
where M = [ σ j ( v i ) ] i , j = 1 , , n , M p = [ σ j ( ω i ) ] i , j = 1 , , n are, respectively, generator matrices for ( O K N , b 1 ) and ( p N , b 1 ) , D α is a diagonal matrix whose diagonal entries are σ i ( α ) , i = 1 , , n , and
A ˜ M B 1 , 1 B 1 , n | B 2 , 1 B 2 , n | | B N k , 1 B N k , n ,
where B j , i = σ i ( A j ) M i , in which M i and A j denote the ith and jth columns of the matrices M and A , respectively, for i = 1 , , n and j = 1 , , N k . The operation of σ i is understood componentwise, for i = 1 , , n . The Gram matrix G C = M C M C t of ( ρ 1 ( C ) , b α ) is
G C = Tr α ( I k + AA t ) M 1 M 1 t Tr α A M 1 M p , 1 t Tr α A M 1 M p , 1 t Tr α I N k M p , 1 M p , 1 t ,
where Tr = Tr K / Q is taken componentwise, and M 1 and M p , 1 denote the first columns of the matrices M and M p , respectively.
When K is a CM number field, n is even and all embeddings of K into C are complex embeddings. Assume σ i + 1 is the conjugate of σ i for i = 1 , 3 , 5 , , n 1 .
Proposition 5
([53], Proposition 2.6). Let K be a CM field with degree n and Galois group G = { σ 1 , σ 2 , , σ n } , where σ i + 1 is the conjugate of σ i , for i = 1 , 3 , , n 1 . A generator matrix for ( ρ 1 ( C ) , b α ) is given by
M C = I k M A ˜ ˜ M 0 n ( N k ) , n k I N k M p I N D α ,
where M is the generator matrix for the lattice ( O K , b 1 ) with det ( M ) = Δ 1 2 as follows:
M = 2 σ 1 ( v 1 ) σ 2 ( v 1 ) σ 3 ( v 1 ) σ n 1 ( v 1 ) σ n ( v 1 ) σ 1 ( v n ) σ 2 ( v n ) σ 3 ( v n ) σ n 1 ( v n ) σ n ( v n ) ,
and M p is the following generator matrix for ( p , b 1 ) and has determinant Δ 1 2 p f
M p = 2 σ 1 ( ω 1 ) σ 2 ( ω 1 ) σ 3 ( ω 1 ) σ n 1 ( ω 1 ) σ n ( ω 1 ) σ 1 ( ω n ) σ 2 ( ω n ) σ 3 ( ω n ) σ n 1 ( ω n ) σ n ( ω n ) .
The matrix D α is a diagonal matrix whose diagonal entries are σ i ( α ) , i = 1 , , n , A is a matrix such that I k A ( mod p ) is a generator matrix of C and
A ˜ ˜ M A 1 | A 2 | | A N k ,
where A j = B 1 , j B 1 , j B 3 , j B 3 , j B n 1 , j B n 1 , j , for j = 1 , , N k , in which B i , j = σ i ( A j ) M i + σ i ( A j ) M i + 1 , B i , j = σ i ( A j ) M i + 1 σ i ( A j ) M i with A j and M i as the jth and ith columns of A and M , respectively, for j = 1 , , N k and i = 1 , , n . We understand ℜ and ℑ componentwise.
Remark 1
([53], Remark 2.7). Let v = ( v 1 , v 2 , , v n ) t and v j = A j v , for j = 1 , , N k , then
A ˜ ˜ M = 2 V 1 | V 2 | | V N k ,
where V j = σ 1 ( v j ) σ 2 ( v j ) σ n 1 ( v j ) σ n ( v j ) , for j = 1 , , N k . When p is totally ramified, the entries of A ( mod p ) are in F p and hence A ˜ ˜ M = A M . In this case, the generator matrix of ( ρ 1 ( C ) , b 1 ) coincides with the one obtained in [49], Proposition 1.
Proposition 6
([53], Proposition 2.8). The Gram matrix G C = M C M C t of ( ρ 1 ( C ) , b α ) is
G C = Tr α ( I k + A A ) v v Tr α A ( v ω ) Tr α A t ( ω ¯ v t ) Tr α I N k ω ω ,
where Tr = Tr K / Q is taken componentwise, ω = ( ω 1 , ω 2 , , ω n ) t and v = v ¯ t is the conjugate transpose of v . Similarly, A = A ¯ t and ω = ω ¯ t .
Two particular cases of the above construction method, when α = 1 / p or α = 1 / 2 p for K a real quadratic field with p inert and K an imaginary quadratic field with p totally ramified, have been discussed in [53].

4.3. Known Modular/Unimodular Constructions

Self-dual codes play a crucial role in constructing modular and unimodular lattices, a property that makes them particularly interesting for communication theory due to their well-behaved characteristics.
Proposition 7
([53], Proposition 2.9). If C is not self-orthogonal, i.e., if C C , then ( ρ 1 ( C ) , b α ) is not an integral lattice for any α p 1 Q when K is totally real or when K is a CM field and p is totally ramified.
This proposition justifies why we consider self-orthogonal codes in the construction of modular lattices, which are of great interest in information security. Past work has extensively explored modular lattice constructions from quadratic number fields [53]:
  • Totally Real Quadratic Fields: Let K = Q ( d ) be a totally real quadratic field, where d is a positive squarefree integer. Its Galois group is { σ 1 , σ 2 } . The discriminant d K is d for d 1 ( mod 4 ) , and 4 d for d 2 , 3 ( mod 4 ) . For a prime p Z inert in K, and a linear code C over F p 2 , if C is self-orthogonal, then ( ρ 1 ( C ) , b α ) is an integral lattice. Furthermore, if C is self-dual, then it forms a d-modular lattice with α = 1 / p (for d 1 ( mod 4 ) ) or α = 1 / 2 p (for d 2 , 3 ( mod 4 ) ).
  • Imaginary Quadratic Fields (CM Fields): Let K = Q ( d ) be an imaginary quadratic field (d a positive squarefree integer). Its Galois group is { σ 1 , σ 2 } where σ 1 is the identity and σ 2 is complex conjugation. The discriminant Δ is 4 d for d 1 , 2 ( mod 4 ) , and d for d 3 ( mod 4 ) . For a prime p Z totally ramified in K, and a linear code C over F p , if C is self-orthogonal, then ( ρ 1 ( C ) , b α ) is integral. If C is self-dual, it produces unimodular lattices for α = 1 / p (for d 3 ( mod 4 ) ) or α = 1 / 2 p (for d 1 , 2 ( mod 4 ) ).
These results demonstrate how algebraic properties (type of field, prime factorization behavior) directly influence the modularity and integrality of constructed lattices.

4.4. Classical Families Used for Wiretap Codes

The development of lattice codes for wiretap channels has relied heavily on classical families of self-dual codes, which enable the construction of modular and unimodular lattices. These families are critical for balancing coding gain and secrecy performance.
Definition 14.
A linear code C F q N of dimension k over a finite field F q (where q is a prime power) has a dual code C = x F q N | x · y = i = 1 N x i y i = 0 for all y C . C is self-orthogonal if C C , and is self-dual if C = C .
It is well known for the binary Construction A that C F 2 N is self-dual if and only if ( ρ 1 ( C ) , b 1 2 ) is unimodular [46,47]. More generally, for K = Q ( ζ p ) , if C F p N is self-dual, then ( ρ 1 ( C ) , b 1 p ) is unimodular [47]. The converse of this statement is proved in [53] for totally real number fields and CM fields with a totally ramified prime.
Self-dual codes thus provide a systematic way to obtain modular lattices. Specific examples include the following:
  • 2-Modular Lattices: Constructed from self-dual codes over F 3 in imaginary quadratic fields like K = Q ( 2 ) [72].
  • 3-Modular Lattices: Constructed from self-dual codes over F 4 in fields like K = Q ( ζ 3 ) [73].
  • Other Modular Lattices: Quadratic fields ( Q ( 7 ) , Q ( i ) ) and specific cyclotomic fields ( Q ( ζ 3 ) ) have been used with self-dual codes to construct various modular lattices [74].
More generalized versions of Construction A have also been introduced, where the ring of integers O K is replaced by any lattice L R n , further expanding the scope of lattice constructions [75].

Self-Dual Codes for 5-Modular Lattices

For our construction of 5-modular lattices, we need a family of self-dual codes over F 5 . These codes exist if and only if their length is even [76]. A key property for a codeword u in a self-orthogonal code C over F 5 , if it contains i 0’s, j { ± 1 } ’s and k { ± 2 } ’s (so that the Hamming weight of u is j + k ), then u · u = 0 implies
j k ( mod 5 ) .
Equation (48) also implies that a codeword in a self-orthogonal code cannot have weight 1 or 3, although all other weights can occur [76]. Well-known 5-ary self-dual codes include [76]:
  • C 2 : The [ 2 , 1 , 2 ] code consisting of codewords { ( 0 , 0 ) , ( 1 , 2 ) , ( 2 , 1 ) , ( 2 , 1 ) , ( 1 , 2 ) } , with generator matrix 1 2 .
  • F N : The [ N , N / 2 , 4 ] code, for N = 6 , 8 , 10 , , with a specific generator matrix structure
    1 1 2 2 0 0 0 0 0 0 0 0 0 0 0 1 1 2 2 0 0 0 0 0 0 0 0 0 0 0 1 1 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 2 2 2 2 0 0 0 0 0 0 0 0 0 1 1 .
    Exceptional cases like F 6 and F 8 have more convenient generator matrix forms. For F 6 , it is more convenient to use the generator matrix
    1 0 1 1 1 1 1 1 0 1 1 1 1 1 1 0 1 1 .
    For F 8 , it is convenient to use the generator matrix I 4 | H 4 , where I n denotes an n × n identity matrix and H 4 is a Hadamard matrix
    H 4 = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 .
  • L N : The Hadamard codes, denoted by L N , contain three obvious classes of self-dual codes that can be obtained from Hadamard matrices. Let H t denote an arbitrary Hadamard matrix of order t.
    -
    For N 0 ( mod 20 ) , let L N be the code generated by the rows of H N .
    -
    For N 8 ( mod 40 ) , let L N be the code with generator matrix I N / 2 | H N / 2 .
    -
    For N 32 ( mod 40 ) , let L N have generator matrix 2 I N / 2 | H N / 2 . For example, there is a unique code L 8 which is equivalent to F 8 .
  • Q N and Q N : The quadratic residue codes Q N and Q N differ from the Hadamard codes only in that the diagonal entries of the Hadamard matrices are altered [76].
    -
    When N 0 or 12 ( mod 20 ) and N 1 = q is a prime power, Q N is the code with generator matrix ( m i , j ) , where the rows and columns are labeled , 0 , l , , q 1 , and m i , i = q for all i, m , i = 1 and m i , = 1 . For i 0 , m i , j = 1 if j i is a square in F q , and m i , j = 1 if j i is a nonsquare ( i , j > 0 , i j ) . Then, Q N is the usual self-dual extended quadratic residue code (see, for example, [77,78]). The first four of these codes are Q 12 = [ 12 , 6 , 6 ] , Q 20 = [ 20 , 10 , 8 ] , Q 32 = [ 32 , 16 , 10 ] and Q 60 = [ 60 , 30 , d 18 ] .
    -
    A conference matrix  B N is a real N × N matrix with diagonal entries 0 and other entries ± 1 which satisfies B B t = ( n 1 ) I N . For N 6 ( mod 10 ) , let Q N be the self-dual code generated by the rows of a conference matrix B N , if one exists. For example, Q 6 F 6 . A more interesting example is obtained from B 16 , which gives a [ 16 , 8 , 7 ] code Q 16 with generator matrix
    B 4 H 4 H 4 H 4 H 4 B 4 H 4 H 4 ,
    where H 4 is given in (51) and
    B 4 = 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0 .
    -
    For N 12 ( mod 20 ) , let Q N be the code generated by the rows of B N + 2 I N , where B N is a skew-symmetric conference matrix.
    -
    For N 0 ( mod 20 ) , let Q N be generated by I N / 2 | B N / 2 , where B N / 2 is any conference matrix. For example, using the Paley matrix B 20 produces a [ 40 , 20 , 13 ] code Q 40 [76].
    -
    For N 32 ( mod 40 ) , let Q N be generated by I N / 2 | B N / 2 + 2 I N / 2 , where B N / 2 is skew-symmetric.
    -
    For N 4 ( mod 20 ) , let Q N , be generated by 2 I N / 2 | B N / 2 , where B N / 2 is any conference matrix. For example, using the Paley matrix B 12 produces a [ 24 , 12 , 9 ] code Q 24 .
    -
    Finally, for N 16 ( mod 40 ) , let Q N generated by 2 I N / 2 | B N / 2 + 2 I N / 2 , where B N / 2 is skew-symmetric.

5. Cyclotomic Fields and Modular Lattices

This section bridges the theoretical foundations of algebraic number theory with the practical construction of modular lattices for physical-layer security. We specifically focus on cyclotomic fields, which offer a rich algebraic structure for generating lattices with desirable properties. This survey consolidates classical and modern results on cyclotomic lattices, analyzes the conditions for their modularity, and identifies existing limitations, thereby setting the stage for our novel contributions in the next section.

5.1. Classical Cyclotomic Lattices

Cyclotomic fields, due to their well-understood algebraic properties and monogenicity (as discussed in Section 3.2), have been a fertile ground for lattice constructions, particularly in coding theory. Many interesting lattices can be constructed as ideal lattices over cyclotomic fields K = Q ( ζ m ) . For instance, root lattices like E 8 (for m = 15 , 20 , 24 ), the Coxeter–Todd lattice K 12 (for m = 21 ), and the Leech lattice Λ 24 (for m = 35 , 39 , 52 , 56 , 84 ) have been realized as cyclotomic lattices [79].
Constructions of modular ideal lattices over specific cyclotomic fields Q ( ζ m ) have been extensively studied. For example, for m = p r (p prime, r 1 ), a construction results in an even, p-modular ideal lattice of trace type over K = Q ( ζ p r ) , with a specified rank and determinant [79], Proposition 1. Similar constructions exist for m = p r q s [79], Proposition 2.
Theorem 10
([79], Theorem 1). There exists a modular ideal lattice over K = Q ( ζ m ) if and only if m is not a power of a prime p with p 1 ( mod 4 ) .
The authors of [79] have also characterized the cyclotomic fields for which there exists a modular ideal lattice of trace type.
Definition 15.
Let p be a prime divisor of m. Then, p is a norm of m if we have D K = I J J ¯ for some integral O K -ideals I and J such that J is above p and I is prime to p. Let m be a divisor of m. Then, m is a norm of m if all the prime divisors of m are norms of m.
Theorem 11
([79], Theorem 2). Let = 1 or a prime number p, with p 1 ( mod 4 ) . Let m = r m , with m prime to ℓ. Then, there exists an ℓ-modular ideal lattice of trace type if and only if m is a norm of m.
For = 1 (i.e., unimodular lattices), if m is a norm of m, then L m 1 ( J ) (constructed with I = J 1 and b ( x , y ) = Tr ( x y ¯ ) ) is a unimodular ideal lattice of trace type, and even if m is not a power of 2 [79], Proposition 5. For = p (p prime, p 1 ( mod 4 ) ), similar constructions yield p-modular ideal lattices of trace type [79], Proposition 6.

5.2. Conditions for Modularity

The modularity property is highly desirable for lattice codes in communication, as it ensures certain symmetries and favorable characteristics for secrecy metrics. Understanding the algebraic conditions that lead to modularity is therefore critical.
A lattice ( Λ , b ) is d-modular if it is integral and its dual Λ * is similar to Λ scaled by d , i.e., Λ * = d Λ . For Construction A over number fields, the modularity conditions are deeply intertwined with the properties of the underlying number field K, the choice of the element α , and the characteristics of the linear code C .
The key conditions for modularity in Construction A include the following:
  • Self-Dual Codes: As shown in Proposition 2.9 [53], self-orthogonal codes are a prerequisite for integrality. Specifically, for Construction A over Q ( ζ p ) , a self-dual code C over F p leads to a unimodular lattice ( ρ 1 ( C ) , b 1 / p ) [47].
  • Discriminant and Trace Relations: The determinant of the lattice, its dual, and the properties of the trace form ( Tr K / Q ) play a direct role in determining modularity. The relation vol ( Λ ) = d n / 4 for a d-modular lattice is a key property.
  • Choice of α : The specific choice of α K in the bilinear form b α is critical. For instance, α = 1 / p or α = 1 / 2 p are common choices to achieve unimodularity or modularity over quadratic fields [53].
These algebraic conditions dictate whether the constructed lattice will possess the desired modularity, which directly influences its suitability for specific wireless communication scenarios.

5.3. Existing Results and Limitations

While Construction A over number fields is a powerful tool for designing lattices, achieving modularity for specific field types and parameters is not always straightforward. Prior research has identified both successful constructions and inherent limitations, often tied to the specific algebraic properties of the chosen number fields.
Notable successes in constructing modular and unimodular lattices from cyclotomic fields via Construction A include the following.
Proposition 8
([47], Section 5.2, [48], Example 1). For an odd prime p, let K = Q ( ζ p ) be a CM field with ring of integers O K = Z [ ζ p ] . Taking p = ( 1 ζ p ) and defining the bilinear form b 1 / p ( x , y ) = i = 1 N Tr K / Q ( x i y ¯ i / p ) , if the code C C over F p , then ( ρ 1 ( C ) , b 1 / p ) yields an even integral lattice of rank N ( p 1 ) . Furthermore, if C is self-dual, the resulting lattice is an even unimodular lattice.
Proposition 9
([49], Corollary 2). Let K + = Q ( ζ p + ζ p 1 ) be a totally real subfield. For a code C F p N with C C , the lattice ( ρ 1 ( C ) , b α ) formed with α = 1 / p is an integral lattice of rank N ( p 1 ) / 2 . If C is self-dual, this construction produces an odd unimodular lattice.
However, these successful constructions are often contrasted with scenarios where achieving modularity proves challenging, indicating inherent constraints in the design space. For instance, in this paper, we demonstrate a counter example where, for K = Q ( ζ 6 ) , a 3-modular lattice cannot be constructed via Construction A, despite initial conditions suggesting its feasibility. Similarly, for K = Q ( ζ 4 ) = Q ( i ) and prime p = 5 , our result shows that a 5-modular lattice is not obtained from Construction A, even with an integral code over F 5 .
These examples highlight that achieving modularity is not universally guaranteed. Furthermore, the literature has generally not addressed the specific case of cyclotomic fields Q ( ζ p r ) and Q ( ζ p r + ζ p r 1 ) for ramification degree r > 1 , nor general cyclotomic fields Q ( ζ n ) where n is not a prime power. The observed difficulties in achieving modularity under specific conditions, coupled with these unaddressed cases, represent significant gaps and limitations in existing Construction A frameworks for cyclotomic fields. Our work, therefore, aims to directly address these limitations by rigorously establishing new existence and non-existence results for p-modular lattices derived from these specific types of cyclotomic fields.

6. Newly Proposed  p -Modular Lattices for p 1 ( mod 4 )

This section reviews the newly proposed family of p-modular lattices in [80] specifically constructed from cyclotomic number fields, addressing some of the limitations identified in the existing literature (Section 5.3). Following [80], we review the construction methodology, characterize the key algebraic and geometric properties of these lattices, and rigorously establish non-existence results for certain parameter choices. These findings provide critical design principles and insights into the suitability of these new lattices for physical-layer security applications.
The importance of cyclotomic number fields in the construction of modular lattices for wireless communication cannot be overstated. Their well-defined algebraic properties and monogenicity make them ideal candidates for systematic lattice design. In this section, we present a new framework based on Construction A and cyclotomic number fields, yielding a family of p-modular lattices where p 1 ( mod 4 ) .
A foundational result in algebraic number theory is the Kronecker–Weber theorem, which highlights the pervasive nature of cyclotomic fields in number theory. Every cyclotomic field is an Abelian extension of the rational number field Q . The Kronecker–Weber theorem, first announced by Kronecker in 1853, provides a powerful converse.
Theorem 12
(Kronecker–Weber [81,82]). Every finite Abelian extension of Q lies in a cyclotomic field Q ( ζ m ) for some integer m.
In other words, any algebraic integer in a number field whose Galois group is Abelian can be expressed as a sum of roots of unity with rational coefficients. Let Q m = Q ( e 2 π i / m ) . We can assume that m 2 ( mod 4 ) , because if m 2 ( mod 4 ) with m = 2 m 0 , then it is easy to check that e 2 π i / m 0 is a primitive mth root of unity, and hence Q m = Q m 0 . The Kronecker–Weber theorem motivates the following definition.
Definition 16
(Conductor). Let L / Q be a finite Abelian extension. A positive integer m is a defining modulus or an admissible modulus of L if L Q m . Such an m exists by the Kronecker–Weber theorem. The conductor of L, f L , is the smallest admissible modulus of L.
Example 2
([83]). Let L = Q ( ζ m + ζ m 1 ) be the maximal real subfield of Q m . For m 5 , its conductor f L = m . If m = 3 , 4 , then L = Q and f L = 1 . As another case, consider L = Q ( d ) , where d is a squarefree integer, | d | > 1 . Then, its conductor is given by
f L = | d L | = | d | , i f d 1 ( mod 4 ) , | 4 d | , i f d 2 , 3 ( mod 4 ) .
If L = Q p (p an odd prime), then using (26), d L = ( 1 ) p 1 2 p p 2 is the square of an integer in O L ; thus, Q ( 1 ) p 1 2 p Q p . It follows that for a prime p:
Q ( p ) Q p , i f p 1 ( mod 4 ) , Q 4 p , i f p 3 ( mod 4 ) , Q 8 , i f p = 2 .
Moreover, if d = ± 2 ν p 1 p 2 p r is squarefree, then Q ( d ) Q 4 d .

6.1. Construction: Generalized Construction A from Q ( ζ p )

Our primary construction leverages the generalized Construction A framework (Section 4.2) applied to cyclotomic number fields Q ( ζ p ) for primes p 1 ( mod 4 ) . This specific choice of number field allows for the creation of p-modular lattices with well-defined properties.
Theorem 13.
Let K = Q ( ζ p ) where p is an odd prime and p 1 ( mod 4 ) , with the ring of integers O K = Z [ ζ p ] . Then, K is a CM field and the prime p totally ramifies in K as p O K = P p 1 , with residue field O K / P F p , where P = p O K + ( 1 ζ p ) O K . Let C F p N be an ( N , k ) self-dual code over F p . Then, ( ρ 1 ( C ) , b α ) with b α ( x , y ) = i = 1 N Tr K / Q ( α x i y ¯ i ) and α = 1 p , is a p-modular lattice.
Proof. 
See Appendix A.1. □
Remark 2.
For K = Q ( ζ p ) , the p 1 embeddings σ 1 , , σ p 1 : K C are given by
σ r ( ζ p ) = ζ r , r = 1 , , p 1 .
Then, the trace of an element γ K , γ = a 0 + a 1 ζ p + + a p 2 ζ p p 2 , a i Q , is easily computed to be [47], p. 122
Tr K / Q ( γ ) = ( p 1 ) a 0 a 1 a 2 a p 2 .
Let P = ( 1 ζ p ) be the principal ideal of O K = Z [ ζ p ] generated by the element 1 ζ p in O K . Then, P Z = p Z and for any x P , Tr K / Q ( x ) p Z [47], p. 122. The mapping ρ : O K F p sending γ = a 0 + a 1 ζ p + + a p 2 ζ p p 2 , a i Z , to ρ ( γ ) = a 0 + a 1 + + a p 2 ( mod p ) is an additive homomorphism and the kernel of this homomorphism is equal to P . This shows that the mapping ρ can be considered as the reduction mod P [47], p. 123. The vectors
1 ζ p , ζ p ζ p 2 , ζ p 2 ζ p 3 , , ζ p 2 ζ p 1
form a Z -basis for P [47], p. 126.
Remark 3.
In order to use Theorem 13, we need to express p in terms of the Z -basis of Z [ ζ p ] . To this end, we use quadratic Gauss sums. A quadratic Gauss sum can be interpreted as a linear combination of the values of the complex exponential function with coefficients given by a quadratic character (for a general character, one obtains a more general Gauss sum) [84], pp. 70–76. Let p be an odd prime number and a an integer. Then, the Gauss sum ( mod p ) , g ( a ; p ) , is the sum of the pth roots of unity
g ( a ; p ) = k = 0 p 1 e 2 π i a k 2 / p = k = 0 p 1 ζ p a k 2 .
If a is not divisible by p, an alternative expression for the Gauss sum is
G ( a , χ ) = k = 0 p 1 χ ( k ) e 2 π i a k / p ,
where χ ( k ) = k p is the Legendre symbol, which is a quadratic character ( mod p ) . Putting a general character χ in place of the Legendre symbol defines the Gauss sum G ( χ ) . The value of the Gauss sum is an algebraic integer in Q ( ζ p ) . The evaluation of the Gauss sum can be reduced to the case a = 1 as follows:
g ( a ; p ) = a p g ( 1 ; p ) .
We also have the following useful result [84], p. 75
g ( 1 ; p ) = k = 0 p 1 e 2 π i k 2 / p = p p 1 ( mod 4 ) , i p p 3 ( mod 4 ) .
The main reason for applying the canonical embedding on algebraic lattices is the embedding of their corresponding lattices, into the real space R n for some n. Theorem 13 does not guarantee that its introduced lattice is embedded in R N ( p 1 ) , because the element α is not necessarily totally positive and some of σ i ( α ) ’s may be purely imaginary numbers. This issue, particularly for p = 5 , is addressed in the following proposition.
Proposition 10.
Let p = 5 and ρ 1 ( C ) be the obtained lattice in Theorem 13. Define Γ C = σ N ( ρ 1 ( C ) ) , where σ N is the canonical embedding which has been applied componentwise over O K N ; that is, σ N ( x 1 , , x N ) = ( σ ( x 1 ) , , σ ( x N ) ) , for ( x 1 , , x N ) O K N and σ = ( σ 1 , , σ 4 ) . Then, Γ C is a Z -lattice in R 2 N × R * 2 N , where R * is the set of purely imaginary numbers.
Proof. 
See Appendix A.2. □
Using Theorem 13, we find a new family of 5-modular lattices which is applicable in information security. We need a family of self dual codes over F 5 , which is provided in [76].
Example 3.
Let p = 5 and K = Q ( ζ 5 ) , with ρ : Z [ ζ 5 ] 2 F 5 2 given in Remark 2. The degree of K / Q is 4, and the four embeddings of K are σ 1 , which is the identity, σ 2 , which is the conjugate of σ 1 and maps ζ 5 to ζ 5 4 , σ 3 , which maps ζ 5 to ζ 5 2 , and σ 4 , which is the conjugate of σ 3 and maps ζ 5 to ζ 5 3 . Consider the self dual code C = C 2 of length 2 over F 5 as in the above, with generator matrix I A ( mod 5 ) and A ( mod 5 ) = 2 . Using the mapping ρ is Remark 2, we can take 2 to be the preimage of 2 and we have A = 2 . We next compute a generator matrix for the lattice ρ 1 ( C ) explicitly using the discussion from Section 4. We choose the basis { v 1 = 1 , v 2 = ζ 5 , v 3 = ζ 5 2 , v 4 = ζ 5 3 } for O K , and it follows that the generator matrix for the lattice O K together with the trace form x , y = Tr K / Q ( x y ¯ ) , x , y O K , is
M = 2 σ 1 ( 1 ) σ 2 ( 1 ) σ 3 ( 1 ) σ 4 ( 1 ) σ 1 ( ζ 5 ) σ 2 ( ζ 5 ) σ 3 ( ζ 5 ) σ 4 ( ζ 5 ) σ 1 ( ζ 5 2 ) σ 2 ( ζ 5 2 ) σ 3 ( ζ 5 2 ) σ 4 ( ζ 5 2 ) σ 1 ( ζ 5 3 ) σ 2 ( ζ 5 3 ) σ 3 ( ζ 5 3 ) σ 4 ( ζ 5 3 ) = 2 1 0 1 0 ζ 5 ζ 5 4 ζ 5 2 ζ 5 3 ζ 5 2 ζ 5 3 ζ 5 4 ζ 5 ζ 5 3 ζ 5 2 ζ 5 ζ 5 4 .
It should be noted that
ζ 5 = ζ 5 4 = cos ( 2 π 5 ) = 1 + 5 4 , ζ 5 2 = ζ 5 3 = cos ( 4 π 5 ) = 1 5 4 ,
ζ 5 = 1 4 10 + 2 5 , ζ 5 4 = 1 4 10 + 2 5 , ζ 5 2 = 1 4 10 2 5 , ζ 5 3 = 1 4 10 2 5 .
Using Proposition 5, a generator matrix for ( ρ 1 ( C ) , b α ) , with α = 1 / 5 , is
M C = M A M 0 4 × 4 M p I 2 D α ,
where M p is obtained using the Z -basis { ω 1 = 1 ζ 5 , ω 2 = ζ 5 ζ 5 2 , ω 3 = ζ 5 2 ζ 5 3 , ω 4 = ζ 5 3 ζ 5 4 } for P as follows:
M p = 2 σ 1 ( ω 1 ) σ 2 ( ω 1 ) σ 3 ( ω 1 ) σ 4 ( ω 1 ) σ 1 ( ω 2 ) σ 2 ( ω 2 ) σ 3 ( ω 2 ) σ 4 ( ω 2 ) σ 1 ( ω 3 ) σ 2 ( ω 3 ) σ 3 ( ω 3 ) σ 4 ( ω 3 ) σ 1 ( ω 4 ) σ 2 ( ω 4 ) σ 3 ( ω 4 ) σ 4 ( ω 4 ) = 2 ( 1 ζ 5 ) ( 1 ζ 5 4 ) ( 1 ζ 5 2 ) ( 1 ζ 5 3 ) ( ζ 5 ζ 5 2 ) ( ζ 5 4 ζ 5 3 ) ( ζ 5 2 ζ 5 4 ) ( ζ 5 3 ζ 5 ) ( ζ 5 2 ζ 5 3 ) ( ζ 5 3 ζ 5 2 ) ( ζ 5 4 ζ 5 ) ( ζ 5 ζ 5 4 ) ( ζ 5 3 ζ 5 4 ) ( ζ 5 2 ζ 5 ) ( ζ 5 ζ 5 3 ) ( ζ 5 4 ζ 5 2 ) .
The matrix D α is the diagonal matrix diag σ 1 ( α ) , σ 2 ( α ) , σ 3 ( α ) , σ 4 ( α ) . In order to show that ( ρ 1 ( C ) , b α ) is integral, we compute the Gram matrix which is proposed in (47). Define v = ( v 1 , v 2 , v 3 , v 4 ) t = ( 1 , ζ 5 , ζ 5 2 , ζ 5 3 ) t and ω = ( ω 1 , ω 2 , ω 3 , ω 4 ) t = ( 1 ζ 5 ) v , then
G C = Tr K / Q 5 α v v Tr K / Q 2 α v ω Tr K / Q 2 α ω ¯ v t Tr K / Q α ω ω ,
in which
v v = 1 ζ 5 ζ 5 2 ζ 5 3 1 ζ 5 4 ζ 5 3 ζ 5 2 = 1 ζ 5 4 ζ 5 3 ζ 5 2 ζ 5 1 ζ 5 4 ζ 5 3 ζ 5 2 ζ 5 1 ζ 5 4 ζ 5 3 ζ 5 2 ζ 5 1 ,
v ω = v ( 1 ζ 5 ¯ ) v = ( 1 ζ 5 4 ) v v ,
ω ¯ v t = ( 1 ζ 5 ¯ ) v ¯ v t = ( 1 ζ 5 4 ) ( v v ) t ,
ω ω = ( 1 ζ 5 ) ( 1 ζ 5 4 ) ( v v ) = ( 3 + ζ 5 2 + ζ 5 3 ) v v .
Using the additive property of the trace function, it is enough to find Tr K / Q ( 5 ζ 5 i ) , for i = 0 , 1 , , 4 . We have
Tr K / Q ( 5 ) = Tr K / Q ( 1 2 ζ 5 2 2 ζ 5 3 ) = 4 ( 1 ) + 2 + 2 = 0 , Tr K / Q ( 5 ζ 5 ) = Tr K / Q ( 2 + ζ 5 + 2 ζ 5 2 ) = 8 1 2 = 5 , Tr K / Q ( 5 ζ 5 2 ) = Tr K / Q ( 2 ζ 5 + ζ 5 2 + 2 ζ 5 3 ) = 2 1 2 = 5 , Tr K / Q ( 5 ζ 5 3 ) = Tr K / Q ( 2 2 ζ 5 ζ 5 3 ) = 8 + 2 + 1 = 5 , Tr K / Q ( 5 ζ 5 4 ) = Tr K / Q ( 1 ζ 5 ζ 5 2 + ζ 5 3 ) = 4 + 1 + 1 1 = 5 .
For example, we compute the upper left component of G C as follows:
Tr K / Q 5 α v v = Tr K / Q 5 Tr K / Q 5 ζ 5 4 Tr K / Q 5 ζ 5 3 Tr K / Q 5 ζ 5 2 Tr K / Q 5 ζ 5 Tr K / Q 5 Tr K / Q 5 ζ 5 4 Tr K / Q 5 ζ 5 3 Tr K / Q 5 ζ 5 2 Tr K / Q 5 ζ 5 Tr K / Q 5 Tr K / Q 5 ζ 5 4 Tr K / Q 5 ζ 5 3 Tr K / Q 5 ζ 5 2 Tr K / Q 5 ζ 5 Tr K / Q 5 = 0 5 5 5 5 0 5 5 5 5 0 5 5 5 5 0 .
Other components can be computed similarly and we have
G C = 0 5 5 5 2 4 0 4 5 0 5 5 2 2 4 0 5 5 0 5 4 2 2 4 5 5 5 0 0 4 2 2 2 2 4 0 2 3 2 2 4 2 2 4 3 2 3 2 0 4 2 2 2 3 2 3 4 0 4 2 2 2 3 2 .
Thus, ( ρ 1 ( C ) , b α ) is an integral lattice and it can be checked that det ( G C ) = 5 4 , that is a necessary condition for being 5-modular.

6.2. Non-Existence of Modular Lattices from Prime-Power Cyclotomic Fields via Construction A

In this section, we review the construction of modular lattices in [80] using the provided algebraic tools in the previous sections. We consider K = Q ( ζ n ) and its maximal totally real subfield K + , when n is a prime power or when n is composite. There are two approaches to construct modular lattices using algebraic number fields:
  • Construction using ideal lattices [79,85,86,87],
  • Construction using generalized Construction A, which was introduced in Section 4.2.
An ideal lattice is an ideal of a number field K together with a bilinear form satisfying an invariance relation [86]. Using ideal lattices in order to construct modular lattices has been investigated in [79,85,87]. Here, we concentrate on generalizing the results of Propositions 8 and 9 to obtain d-modular lattices using cyclotomic number fields. As far as we are aware, the generalizations of the above results to K = Q ( ζ p r ) and K + = Q ( ζ p r + ζ p r 1 ) , with r > 1 , or generalization to the cases that K = Q ( ζ n ) , with n p r for a prime number p, have not been addressed in the literature. In the following theorems, we consider all of these cases.
Theorem 14.
Let K = Q ( ζ p r ) , with r > 1 and p an odd prime number, be the cyclotomic field with the ring of integers O K = Z [ ζ p r ] . We have that K is a CM field and the prime p totally ramifies in K as p O K = P p r 1 ( p 1 ) , with residue field O K / P F p , where P = ( 1 ζ p r ) . Let C F p N be an ( N , k ) self-dual code over F p . Then, ( ρ 1 ( C ) , b 1 / p ) with b 1 / p ( x , y ) = i = 1 N Tr K / Q ( x i y ¯ i / p ) , is d-modular if and only if d = 1 and r = 1 .
Proof. 
See Appendix A.3. □
Theorem 15.
Let K + = Q ( ζ p r + ζ p r 1 ) , with r > 1 and p an odd prime number, be the totally real maximal subfield of a cyclotomic field with the ring of integers O K + = Z [ ζ p r + ζ p r 1 ] . We have that K + is a totally real number field and the prime p totally ramifies in K + as p O K + = p p r 1 ( p 1 ) 2 , with residue field O K + / p F p , where p = ( 2 ζ p r ζ p r 1 ) . Let C F p N be an ( N , k ) self-dual code over F p . Then, ( ρ 1 ( C ) , b 1 / p ) with b 1 / p ( x , y ) = i = 1 N Tr K / Q ( x i y i / p ) is d-modular if and only if d = 1 and r = 1 .
Proof. 
See Appendix A.4
In other cases, that is when K = Q ( ζ n ) and n p r for an odd prime number p, making a general decision is not easy. In the sequel, we present an example that indicates the complexity of this general case.
Example 4.
Let K = Q ( ζ 6 ) with the ring of integers O K = Z [ ζ 6 ] . The minimal polynomial of ζ 6 is Φ 6 ( X ) = X 2 X + 1 and using Proposition 2, we conclude that 2 is inert in O K ; that is, P = 2 O K is a prime ideal of O K with residue field O K / P F 4 . Define ρ : O K N F 4 N , as the componentwise reduction modulo P and consider the 2 N -dimensional lattice Γ C = ( ρ 1 ( C ) , b 1 / 2 ) , where b 1 / 2 ( x , y ) = i = 1 N Tr K / Q ( x i y i / 2 ) and C is an ( N , k ) linear code over F 4 . The volume of Γ C is vol ( Γ C ) = | d K | N 2 4 N k 2 N , where d K is given in (25)
d K = ( 1 ) ϕ ( 6 ) / 2 6 ϕ ( 6 ) p | 6 p ϕ ( 6 ) / ( p 1 ) = 6 2 2 2 3 1 = 3 .
Thus, v o l ( Γ C ) = 3 N 2 2 N 2 k . Equating v o l ( 1 d Γ C ) and v o l ( Γ C * ) gives us d N = 3 N 4 N 2 k . If we consider a self dual code C over F 4 , k = N / 2 and d = 3 . In principal, it seems that construction of a family of 3-modular lattices is possible. However, this is not true and we show this providing a counter example. Consider the self-dual code C = ( 1 , ω , ω + 1 , 0 ) , ( 1 , 1 , 1 , 1 ) [52], where ω is the primitive element of F 4 and ω 2 + ω + 1 = 0 . The Galois group of K / Q is G = { σ 1 , σ 2 } , where σ 1 is the identity map and σ 2 is complex conjugation. The set { v 1 = 1 , v 2 = ζ 6 } forms a Z -basis for O K and { ω 1 = 2 , ω 2 = 2 ζ 6 } forms a Z -basis for P . The map ρ : O K N F 4 N sends ζ 6 to ω and using the following generator matrix for C
I 2 A ( mod P ) = 1 0 ω ω + 1 0 1 ω + 1 ω ,
we obtain
A = ζ 6 ζ 6 + 1 ζ 6 + 1 ζ 6 .
Using the above matrix A and the matrices in Proposition 5, gives us the generator matrix of Γ C
M = 2 σ 1 ( 1 ) σ 2 ( 1 ) σ 1 ( ζ 6 ) σ 2 ( ζ 6 ) = 2 1 0 1 2 3 2 ,
M p = 2 σ 1 ( 2 ) σ 2 ( 2 ) σ 1 ( 2 ζ 6 ) σ 2 ( 2 ζ 6 ) = 2 2 0 1 3 ,
A ˜ ˜ M = 2 σ 1 ( A 1 v ) σ 2 ( A 1 v ) σ 1 ( A 2 v ) σ 2 ( A 2 v ) = 2 1 2 3 2 3 2 3 2 1 2 3 2 0 3 3 2 3 2 1 2 3 2 0 3 1 2 3 2 ,
D α = σ 1 ( 1 2 ) 0 0 σ 2 ( 1 2 ) = 1 2 I 2 ,
where ˜ ˜ was defined in (45). Thus, the generator matrix of Γ C is
M C = 1 0 0 0 1 2 3 2 3 2 3 2 1 2 3 2 0 0 1 2 3 2 0 3 0 0 1 0 3 2 3 2 1 2 3 2 0 0 1 2 3 2 0 3 1 2 3 2 0 0 0 0 2 0 0 0 0 0 0 0 1 3 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 1 3 .
Computing the Gram matrix G C = M C M C t indicates that Γ C is not integral and consequently is not modular.
The only case that was not considered in the previous theorems is the case where n = 2 r , for r > 1 . In this case, we were unsuccessful in changing r and α in order to obtain a family of d-modular lattices. We should point out that when considering applications in information security only special values of d are accepted, more precisely, d = 1 , 2 , 3 , 5 , 6 , 7 , 11 , 14 , 15 and 23 [53]. We could not find any modular lattice in our trials using cyclotomic number fields (with non-prime orders) and Construction A, that fulfil these conditions. Thus, these remain open problems.
Example 5.
Let K = Q ( ζ 4 ) = Q ( i ) be the cyclotomic field of order 4 with the ring of integers O K = Z [ i ] . Then, K is a CM field and the prime p = 5 splits completely in K as 5 O K = P 1 P 2 , with residue field O K / P i F 5 , for i = 1 , 2 , where P 1 = 5 O K + ( i 2 ) O K and P 2 = 5 O K + ( i 3 ) O K . Let C F 5 N be an ( N , k ) self-dual code over F 5 . Then, ( ρ 1 ( C ) , b 1 / 2 ) with b 1 / 2 ( x , y ) = i = 1 N Tr K / Q ( x i y ¯ i / 2 ) is an integral lattice and its determinant is 5 N . Thus, ρ 1 ( C ) has some necessary conditions to be a 5-modular lattice. However, one can check that this lattice is not 5-modular.

6.3. Secrecy Performance Characterization via Secrecy Gain and Flatness Factor

Computing the secrecy gain for unimodular lattices has been considered in [40]. Then, in [30,52], the authors propose some methods, based on the techniques introduced in [57] for calculating the theta series of modular lattices, to calculate the weak secrecy gain of 2 , 3 -modular lattices and 5-modular lattices, respectively. The introduced approaches to obtain a closed form expression for the theta series of modular lattices can be divided into two different cases: the modular form approach and the weight enumerator approach. The modular form approach relies on the fact that the theta series of an -modular lattice belongs to the space of modular forms generated by some basic functions, which gives a decomposition formula. The formula is given for -modular (possibly odd) lattices, which holds for the specific values of = 1 , 2 , 3 , 5 , 6 , 7 , 11 , 14 , 15 , 23 [30,57]. A weight enumerator approach exploits the connection between the weight enumerator of a self-dual code and the theta series of a lattice constructed from this code. The theta series of a 5-modular lattice Γ , with dimension n = 2 t , can be written as [30,57], Lemma 2
Θ Γ ( τ ) = f 1 ( τ ) t i = 0 5 t 8 a i f 2 ( τ ) i ,
where f 1 ( τ ) = ϑ 3 ( τ ) ϑ ( 5 τ ) and
f 2 ( τ ) = η ( τ 2 ) η ( 5 τ 2 ) η ( 2 τ ) η ( 10 τ ) η ( τ ) 2 η ( 5 τ ) 2 8 2 ,
in which η is the Dedekind eta function which is defined by [88], Chapter 3
η ( τ ) = q 1 12 m = 1 ( 1 q 2 m ) .
Equation (79) gives the theta series in terms of the unknown values a i ’s. An interesting computational approach has been proposed in [30] for the cases that = 2 , 3 . In their approach, the Gram matrix has been computed and inputted it to Magma [89] to generate the lattice Λ . The first few terms of Θ Λ ( τ ) have been obtained (using the command ThetaSeries ( Λ , 0 , Ord ) ;). Then, by solving a linear system of equations in terms of the unknowns a i ’s, the theta series has been obtained as polynomials in terms of basic functions ϑ 1 , ϑ 2 , ϑ 3 which are implemented in Mathematica [90]. Then, the weak secrecy gains have been approximated using Mathematica. We are not able to use this approach for the obtained lattice in Example 3, because the Gram matrix of our lattices are not positive definite and it is a necessary condition for Magma to compute the theta series; we are not aware of other computer algebra packages for this task.
The main conclusion about the connection between the weak secrecy gain of the lattice and other lattice parameters has been reported in [53] after studying many examples. This conclusion is summarized as follows [53], Remark 4.12:
1.
When the dimension increases, the weak secrecy gain χ Λ tends to increase, which has been proven for unimodular lattices [40].
2.
Fixing dimension and level d, a large length for the shortest non-zero vector is more likely to induce a large χ Λ .
3.
Fixing dimension, level d and the length of the shortest non-zero vector, a smaller kissing number gives a larger χ Λ . It was shown for unimodular lattices [40] that when the dimension n is fixed, n 23 , the secrecy gain is totally determined by the kissing number, and the lattice with the best secrecy gain is the one with the smallest kissing number.
4.
Fixing dimension, the length of the shortest non-zero vector, kissing number, and a smaller level d gives a bigger χ Λ . However, the lattices with high level d are more likely to have a large length for the shortest non-zero vector.

6.4. Motivation for Indefinite Theta Series in Physical Layer Security

The construction of p-modular lattices in our framework inevitably produces lattices whose Gram matrices are not positive definite and have indefinite signature. While this is a natural outcome from the algebraic constraints imposed by the construction, it creates a fundamental obstacle: the classical theta series Θ Λ ( τ ) = x Λ q 2 Q ( x ) , q = e π i τ , is only absolutely convergent on the unit disk when the quadratic form Q is positive definite. For indefinite lattices, the summand does not decay fast enough along directions of positive norm, and the series diverges on the unit circle. This prevents the direct use of standard tools from modular lattice theory for computing secrecy gain, flatness factor, or any performance metric that depends on the analytic behavior of Θ Λ ( τ ) .
Mathematical advances in the theory of indefinite theta series, most notably the work of Zwegers [56] and the general framework developed in [55], provide a way around this difficulty. Instead of attempting to force convergence by restricting the lattice or modifying the construction, one replaces the classical theta series by a modular completion built from special kernels that regularize the contribution of directions with positive norm. These kernels are expressed in terms of generalized error functions, such as E 1 , M 1 in the Lorentzian case and their higher-dimensional analogues E 2 , M 2 for signature ( 2 , n 2 ) lattices. The key insight is that these functions interpolate smoothly between the discontinuous sign functions that appear in naive truncations of the lattice sum, while still satisfying Vignéras’ differential equation and thus preserving modular covariance.
From the perspective of physical-layer security, this development is highly relevant. The secrecy rate and the eavesdropper’s decoding probability are governed by the flatness factor of the lattice, which in turn depends on the behavior of its theta series near the unit circle. As we discussed earlier, for positive definite lattices, the flatness factor admits a clean expression in terms of Θ Λ ( τ ) evaluated at purely imaginary arguments. However, for the indefinite lattices produced by our construction, the classical theta series is not defined in this regime. The modularly completed indefinite theta series, on the other hand, is well defined and exhibits controlled analytic behavior even when the underlying quadratic form has mixed signature.
This observation motivates the study of indefinite theta series as a natural analytic tool for characterizing secrecy performance. The completed theta series captures the oscillatory structure of the lattice while regularizing divergent contributions, allowing us to define meaningful analogues of the flatness factor and secrecy gain. Moreover, the modular properties of the completed series provide structural constraints that can be exploited to bound or approximate the eavesdropper’s error probability. In particular, the smoothing induced by the generalized error functions plays a role analogous to artificial noise in physical-layer security: it suppresses the contribution of directions that would otherwise leak information to the eavesdropper.
In summary, although our construction yields indefinite lattices for which the classical theta series is not applicable, the modern theory of indefinite theta series offers a principled replacement. This framework not only restores analytic control but also reveals deeper connections between lattice geometry, modularity, and secrecy performance. Consequently, the study of indefinite theta series is not merely a mathematical necessity but a promising avenue for developing new secrecy metrics and designing lattice codes optimized for physical layer security.

Indefinite Quadratic Forms, Vignéras’ Operator, and Generalized Error Functions

The analytic framework for handling theta series associated with indefinite lattices relies on several structural definitions. These notions originate in the modern theory of indefinite theta series and generalized error functions, and they provide the mathematical backbone for constructing modularly well-behaved completions of divergent lattice sums [55].
Let Λ be a lattice equipped with a symmetric bilinear form B ( · , · ) and associated quadratic form Q ( x ) = B ( x , x ) , where x Λ R . The form Q is said to have signature ( n + , n ) if it has n + positive and n negative eigenvalues. In our construction of p-modular lattices, the Gram matrices naturally acquire mixed signature, which places us in the regime n + 1 where classical theta series fail to converge.
Definition 17
(Vignéras’ Operator). Let Λ be a lattice equipped with a symmetric bilinear form B ( · , · ) of signature ( n + , n ) , and let Q ( x ) = B ( x , x ) denote the associated quadratic form. We write B 1 for the bilinear form on the dual space whose matrix is the inverse of the matrix of B. Following the general framework of Vignéras, we introduce the second–order differential operator [54]
W λ Φ ( x ) : = Δ B 1 Φ ( x ) + 2 π x · x Φ ( x ) 2 π λ Φ ( x ) ,
where Δ B 1 is the Laplacian associated with B 1 and x · x is the Euler operator. A function Φ ( x ) is said to be a Vignéras kernel of weight λ if it satisfies the differential equation
W λ Φ ( x ) = 0 .
Solutions of (83) play a central role in the construction of modular completions of indefinite theta series. In particular, when Φ satisfies suitable decay conditions, the associated theta series transforms as a Jacobi form of weight λ + n 2 , even when the underlying quadratic form Q has mixed signature.
Definition 18
(Indefinite Theta Series with Kernel [55]). Given a kernel Φ ( x ) satisfying mild growth conditions, one defines the regularized theta series
Θ Φ ( τ , b , c ) = k Λ + P / 2 ( 1 ) B ( k , P ) q 2 Q ( k + b ) e 2 π i B ( c , k + b ) Φ ( k + b ) ,
where P is a characteristic vector and ( b , c ) are real shifts.
When Φ is locally constant (e.g., a sign function), the series is holomorphic but not modular; when Φ solves Vignéras’ equation, the series is modular but non-holomorphic. The modular completion replaces the discontinuous kernel by a smooth one.
Definition 19
(Generalized Error Functions [55]). For signature ( 1 , n 1 ) , the classical error function
E 1 ( u ) = Erf ( π u ) ,
where Erf ( x ) = 2 π 0 x e t 2 d t , and its complementary counterpart
M 1 ( u ) = sign ( u ) Erfc ( | u | π ) ,
in which Erfc ( x ) = 1 Erf ( x ) = 2 π x e t 2 d t , provide the smoothing needed to regularize the theta series.
In higher signature, one introduces double error functions  E 2 and M 2 , depending on two real variables ( u 1 , u 2 ) and a geometric parameter controlling the angle between the associated hyperplanes. These functions interpolate between piecewise-constant sign kernels and smooth solutions of Vignéras’ equation on R 2 .
Definition 20
(Modular Completion [55]). Given a discontinuous kernel Φ disc (typically built from sign functions that restrict the lattice to a cone), its modular completion is constructed by replacing each sign term with the corresponding smooth error function:
Φ comp ( x ) = Φ disc ( x ) + ( c o r r e c t i o n t e r m s b u i l t f r o m M 1 , M 2 , etc . ) .
The resulting completed theta series is modular and well-behaved on the unit circle, even when Q is indefinite. These definitions allow us to reinterpret the divergent theta series associated with our p-modular constructions as regularized indefinite theta series. This provides a mathematically rigorous pathway to define secrecy-relevant quantities—such as flatness factor and secrecy gain—even when the underlying lattice is not positive definite.

6.5. Quantitative Comparison of Lattice Families for PLS

To position the proposed p-modular lattices within the broader framework of algebraic lattice design for physical-layer security, we compare their principal structural invariants like signature, discriminant, and modularity constant, which together with the minimum norm and kissing number, strongly influence shaping behavior, coding efficiency, and the analytic feasibility of secrecy metrics. Table 2 summarizes these invariants across classical and newly introduced families. Beyond these structural aspects, secrecy-relevant analytic behavior must be interpreted in light of the dependencies identified in [53], Remark 4.12: the weak secrecy gain χ Λ tends to increase with dimension; it improves with larger minimum norm; it decreases with larger kissing number when dimension, level, and minimum norm are fixed; and, for fixed geometric parameters, smaller level d generally yields larger χ Λ , while higher levels often enable larger minimum norms. These principles provide a quantitative framework for evaluating the proposed p-modular lattices.
For K = Q ( ζ p ) , the discriminant satisfies | disc ( K ) | = p p 2 , and the modularity constant p imposes strong arithmetic constraints on the admissible combinations of volume, minimum norm, and kissing number. Moreover, the total ramification of p in Q ( ζ p ) facilitates Construction A lattices for which the minimum norm can be improved through the underlying code while keeping the growth of the kissing number analytically tractable. In this sense, the p-modular family occupies a structurally advantageous region of the secrecy-design landscape: the dimension grows linearly with p, the minimum norm is tunable via the code, and the kissing number can be studied and bounded through the explicit cyclotomic embedding.
Indeed, in the cyclotomic setting, the kissing number of the associated lattices can be analyzed with finer arithmetic control by exploiting the explicit Q -embedding of O K into Euclidean space. For K = Q ( ζ p ) , the canonical embedding σ : K C ( p 1 ) / 2 (or its realification into R p 1 ) is determined by the embeddings σ j ( ζ p ) = exp 2 π i j p , 1 j p 1 2 , where each σ j is paired with its complex conjugate. Writing x O K in the power basis x = k = 0 p 2 a k ζ p k with a k Z , the Euclidean norm of its image is
σ ( x ) 2 = j = 1 ( p 1 ) / 2 σ j ( x ) 2 = j = 1 ( p 1 ) / 2 k = 0 p 2 a k exp 2 π i j k p 2 ,
which is an explicit positive-definite quadratic form in the integer vector ( a 0 , , a p 2 ) . The Construction A lattices considered in this work are obtained by embedding codewords with coordinates in (the image of) O K and then scaling by a suitable power of the prime above p, so any non-zero lattice vector corresponds to a tuple ( x 1 , , x N ) O K N whose Euclidean norm is given by i = 1 N σ ( x i ) 2 , again an explicit quadratic form in the underlying integer coefficients. The minimum norm λ 1 ( Λ ) is therefore the minimum of this quadratic form over a discrete subset of Z ( p 1 ) N determined by the code constraints, and candidate shortest vectors can be characterized by bounding the integer coefficients a k .
From the arithmetic side, the algebraic norm N K / Q ( x ) = j = 1 p 1 σ j ( x ) is an integer and satisfies an inequality of the form
| N K / Q ( x ) | C p σ ( x ) p 1 ,
for a constant C p depending only on p. Thus, any bound on the Euclidean norm imposes a corresponding bound on | N K / Q ( x ) | . Consequently, the set of x O K that can contribute to shortest vectors lies in a finite, explicitly describable subset of O K cut out by simultaneous constraints on σ ( x ) 2 and | N K / Q ( x ) | . Moreover, the Galois group Gal ( K / Q ) ( Z / p Z ) × acts transitively on the embeddings σ j and preserves the Euclidean norm, so (under the natural assumption that the lattice and the code constraints are stable under this action) if x yields a shortest vector, then so do all its Galois conjugates, which form orbits whose sizes divide p 1 . As a consequence, the multiplicity of shortest vectors (and hence the kissing number) can be expressed in terms of the number of Galois orbits of algebraic integers (or code-constrained tuples) achieving λ 1 ( Λ ) , each orbit contributing a controlled number of vectors. Altogether, the explicit quadratic form arising from the cyclotomic embedding, the finiteness imposed by algebraic norm bounds, and the orbit structure induced by the Galois action ensure that both the minimum norm and the kissing number of the resulting p-modular lattices can be studied and bounded through the cyclotomic embedding, rather than treated as opaque geometric invariants of an arbitrary Euclidean lattice.
Although the analytic lift of these lattices has mixed signature, which makes classical positive-definite theta-series techniques inapplicable, recent advances on modular completions of indefinite theta series provide a natural analytic framework for assessing their secrecy performance. Taken together, these structural constraints and analytic tools indicate that the proposed p-modular lattices are well aligned with the geometric and arithmetic features empirically associated with large secrecy gain, and they therefore constitute a technically robust and theoretically well-motivated class of lattices for high-dimensional physical-layer security.

6.6. Open Problems and Future Research Directions

The interplay between indefinite theta series and physical-layer security opens a number of intriguing research avenues. A central open problem is the development of secrecy metrics, such as generalized flatness factors or secrecy gains, that remain analytically meaningful when the underlying lattice has mixed signature and the classical theta series diverges. Closely related is the challenge of characterizing the behavior of modular completions built from higher-dimensional error functions (e.g., E 2 and M 2 ) in channel regimes relevant to wiretap coding, particularly when the noise distribution interacts nontrivially with the time-like and space-like directions of the lattice. Another promising direction is the design of coding schemes whose secrecy performance can be directly optimized through the geometry of indefinite cones, potentially leveraging the structural constraints imposed by Vignéras’ equation. Extending these ideas to signatures ( n + , n ) with n + > 2 , where triple and higher-order generalized error functions arise, remains largely unexplored and may reveal new analytically tractable lattice families. Finally, bridging the gap between the abstract modular-analytic theory and practical wiretap coding through numerical approximations, simulation frameworks, or machine-assisted optimization of indefinite kernels represents a fertile direction for future research.

7. Discussion and Integration into Modern Wireless Systems

The evolution toward next-generation wireless networks is characterized by the adoption of advanced paradigms that fundamentally reshape wireless communication. Within this landscape, lattice-based PLS offers both significant opportunities and formidable challenges. Modern architectures such as multi-antenna systems (MIMO and massive MIMO), RIS, and ML–driven optimization are no longer peripheral enhancements but central pillars of wireless design. Their integration with algebraic lattice coding introduces new dimensions of secrecy: spatial degrees of freedom, programmable propagation environments, and data-driven adaptation can be harnessed to reinforce the confusion of eavesdroppers while sustaining reliability for legitimate users [91]. This section explores how the code-based wiretap approaches like lattice-code surveyed earlier can be adapted to, and enriched by, these emerging technologies. For each paradigm, we highlight recent advances, analyze how lattice coset structures interact with the new physical and algorithmic features, and identify open research directions that define the frontier of secure 6G system design.

7.1. MIMO and Massive MIMO Deployment

Massive MIMO has emerged as a cornerstone of 5G and 6G wireless systems, offering unprecedented spectral efficiency and reliability by exploiting large antenna arrays to serve multiple terminals simultaneously. Beyond throughput, these spatial degrees of freedom provide new opportunities for physical-layer security. By carefully designing precoders and injecting artificial noise (AN), transmitters can degrade the eavesdropper’s channel while maintaining high- quality links for legitimate users. Recent works have demonstrated that secrecy capacity in massive MIMO can be significantly improved by exploiting channel hardening and favorable propagation. For example, refs. [92,93] analyzed secrecy in spherical-wave channels and showed that near-field beamforming can be leveraged to enhance PLS in practical deployments. Similarly, ref. [94] studied secrecy guard zones in ultra-reliable low-latency communications (uRLLC), highlighting how dense antenna deployments can enforce spatial secrecy constraints under strict latency requirements.
While these approaches rely on spatial processing, lattice codes provide an algebraic complement. Nested lattice coset coding introduces structured randomness that confuses the eavesdropper independently of channel state information (CSI) assumptions. Semantically secure lattice codes for compound MIMO channels, as developed by [95], demonstrate that secrecy can be achieved even under partial or uncertain CSI. These constructions align naturally with massive MIMO, where imperfect CSI is common due to pilot contamination and feedback delays. By embedding cyclotomic p-modular lattices (with p 1 ( mod 4 ) ) into space–time blocks, one can exploit unit-group rotations and Minkowski embeddings to maintain low flatness factor at Eve while preserving diversity and rate at the receiver. The dual lattice’s theta series governs Eve’s confusion, and when combined with AN in unused spatial dimensions, secrecy gain can be amplified.
Cell-free massive MIMO extends these ideas by distributing many access points (APs) to jointly serve users via coherent transmission. This architecture inherently reduces Eve’s ability to gain coherent combining benefits in passive scenarios. Ref. [96] showed that secure transmission in cell- free systems can be maintained against active eavesdroppers by coordinating AN and robust power control. More recently, ref. [97] analyzed secrecy rate degradation under pilot contamination and proposed secure pilot design strategies for cell-free networks. These findings suggest that lattice-coded pilots, constructed from collision-resistant projections of cyclotomic lattices, could further mitigate spoofing attacks, while coset-coded payloads ensure resilience against residual leakage. In ultra-dense cell-free deployments, ref. [96] demonstrated that secrecy can be preserved even under hardware impairments by adopting rate-splitting multiple access (RSMA), opening avenues for lattice-coded RSMA schemes.
From a lattice perspective, space–time lattice designs remain particularly attractive. Semantically secure lattice codes for compound MIMO channels [94] and design criteria for MIMO wiretap channels [98] provide theoretical foundations for integrating algebraic lattices into multi-antenna secrecy. By aligning legitimate codewords with the receiver’s dominant singular vectors and dispersing Eve’s projections through lattice rotations, one can systematically engineer flatness factors that remain low at Eve. In multi-receiver wiretap scenarios, refs. [99,100] characterized optimal encoding orders for Gaussian MIMO channels, offering guidance for scheduling lattice layers across streams to maintain confidentiality. These results highlight the synergy between algebraic lattice coding and massive MIMO: spatial degrees of freedom create controllable subspaces for secrecy-aware transmission, while structured cosets ensure persistent confusion at Eve independent of beamforming imperfections.
The trade-offs are clear. Multi-antenna lattice precoding can significantly improve secrecy capacity but requires careful CSI acquisition and high-complexity decoding. Sphere decoding scales poorly with dimension, and while massive MIMO provides many antennas, practical receivers often limit effective dimensionality per codeword to meet latency constraints. Hybrid designs, such as block-diagonal space–time lattices or multi-layer coset coding with short lattices, can deliver secrecy gains without prohibitive complexity. Emerging ML-aided lattice decoders may further reduce decoding burden, though interpretability and robustness against adversarial attacks remain open challenges. Ultimately, joint precoder–lattice co-design under imperfect CSI, pilot contamination, and energy constraints offers a realizable path to secrecy gains in 5G/6G MIMO systems.

7.2. RIS-Aided Communications

Reconfigurable intelligent surfaces change the secrecy game by turning the propagation environment into a controllable design variable. An RIS is a planar array of passive elements whose reflection coefficients (amplitude and/or phase) can be programmed to reshape multipath, steer energy, and create constructive or destructive interference patterns at chosen spatial locations. For physical-layer security, this capability enables a new class of defenses: instead of relying only on transmitter beamforming or artificial noise, the network can program the channel so that the legitimate receiver sees a strengthened, well-conditioned effective lattice channel while the Eve sees a scrambled, low-mutual-information projection. This programmable geometry is a natural partner for algebraic lattice codes, because lattice secrecy metrics (flatness factor, secrecy gain, and dual-lattice theta series) are fundamentally geometric and therefore directly affected by RIS-induced channel transformations [101,102].
Recent works have established RIS as an effective secrecy tool in a variety of practical settings. The authors in [103] analyzed RIS-aided links with mobile or unmanned aerial vehicle (UAV) eavesdroppers and show that RIS phase control can substantially increase ergodic secrecy capacity by dispersing Eve’s channel gains and reducing its coherent combining opportunities. UAV-mounted RIS and jointly optimize UAV trajectory and RIS phase profiles have been studied by [104] to maximize secrecy rate under realistic CSI uncertainty, demonstrating that mobility plus programmable reflections yields large secrecy improvements over static deployments. Advancing physical-layer security in RIS-assisted wireless systems, the authors in [101] address multi-user secrecy in intelligent reflective surfaces (IRS)-aided systems and propose joint beamformer–phase optimization algorithms that balance secrecy across users while respecting RIS hardware constraints. These works make two points clear for lattice-based secrecy: (i) RIS can amplify the channel asymmetry that lattice coset coding exploits, and (ii) RIS constraints (finite phase resolution, training overhead, and imperfect CSI) must be explicitly modeled when designing algebraic codes for RIS channels.
From the lattice-coding side, there is a compact set of rigorous results that translate naturally to RIS contexts. A lattice design criterion presented in [105] for wiretap channels correlates algebraic diversity and minimum distance with secrecy performance. This criterion pinpoints algebraic parameters that increase the eavesdropper’s flatness factor under conditions where the effective channel is favorable to the legitimate receiver. In [102], Near-Field RIS secure lattice constructions were developed for compound channels, with the investigation revealing that control over the flatness factor facilitates information-theoretic secrecy, even amidst channel uncertainty. Also, ref. [106] constructs almost universal modular coding structures that achieve secrecy capacity and enable quantum-resistant authentication and key agreement, making them compatible with lattice-based RIS-assisted 6G networks. It considers a range of fading wiretap channels, demonstrating robustness of algebraic lattices to channel variations. Although these lattice works were not written specifically for RIS, their secrecy metrics are channel-geometric: an RIS that reshapes singular vectors and path gains directly changes the lattice embedding seen by the receiver and Eve. Therefore, the algebraic design aspects identified in these works (index, discriminant, unit rotations, and modularity) can be jointly optimized with the RIS phase shifts.
Putting these strands together suggests concrete design recipes and research directions:
  • Co-optimization of RIS phases and lattice rotations. Treat RIS phase settings and lattice unit rotations as coupled variables in a secrecy objective that directly includes the flatness factor or secrecy gain. The RIS can be used to align the receiver’s effective channel with lattice directions that maximize minimum distance, while simultaneously dispersing Eve’s projections to increase the flatness factors.
  • Robust coset scheduling under quantized RIS control. Practical RIS hardware has finite phase resolution and limited update rates. Design cyclotomic p-modular coset families whose decoding regions are tolerant to small phase errors, and schedule coset randomization across coherence blocks so that Eve cannot average out RIS-induced randomness.
  • Pilot and training design using lattice structure. Pilot contamination and insecure feedback are major RIS vulnerabilities. Lattice-structured pilots (pilots drawn from carefully chosen coset representatives) can make spoofing harder and enable joint pilot–phase estimation algorithms that exploit algebraic redundancy to detect active attacks.
  • Mobility and time-varying RIS strategies. For UAV-RIS or mobile RIS platforms, synchronize coset changes with RIS trajectory/phase updates so that Eve’s channel observations are decorrelated over time; this temporal diversity compounds the spatial confusion provided by lattice cosets.
  • Complexity-aware implementations. High-dimension lattices yield strong secrecy gains but heavy decoding cost. Use block-diagonal or layered lattice constructions that match RIS-created subspaces, enabling per-subspace decoding with moderate complexity while preserving global secrecy metrics.
There are also important practical challenges. Accurate CSI is essential for effective RIS phase optimization; imperfect CSI reduces the ability to align lattice directions and can leak structure to Eve if not handled carefully [107]. Channel estimation overhead for RIS-assisted links is nontrivial, and secure feedback channels for RIS control are required to prevent adversarial reconfiguration. Finally, hardware impairments (phase noise, element coupling, and quantization) change the effective lattice seen by receivers; algebraic constructions with built-in robustness (e.g., modular lattices with favorable discriminants and unit groups) are promising candidates to absorb such distortions [105,108].
In short, RIS and lattice codes are complementary: RIS provides a programmable, geometric degree of freedom that can be exploited to shape the lattice channel in favor of secrecy, while algebraic lattice constructions provide provable, information-theoretic secrecy metrics that guide RIS optimization. Because the studies that jointly analyze lattice codes and RIS secrecy are still sparse, a high-impact research agenda is to develop rigorous flatness-factor and secrecy-gain analyses for RIS-transformed lattice channels, accompanied by practical co-design algorithms that respect RIS quantization, training, and complexity constraints.

7.3. Potential Machine-Learning Integration

Machine learning is increasingly leveraged in wireless systems, and physical-layer security is no exception. Deep learning can, for example, learn to optimize transmit strategies or to detect eavesdropping anomalies in complex environments. In the context of lattice-based PLS, ML can aid both encoding and decoding. On the encoding side, reinforcement learning has been proposed to tune IRS or UAV parameters for secrecy, effectively learning good RIS configurations without full CSI. For instance, ref. [109] apply a deep deterministic policy gradient (DDPG) algorithm to jointly optimize the phases of UAV-mounted RIS and achieve a high secrecy rate in a complex cell-free MIMO scenario. This demonstrates that ML can help solve the non-convex optimization problems arising in coded secure transmission. On the decoding side, one might employ neural-network-based lattice decoders that approximate maximum-likelihood decoding for high-dimensional lattices, reducing complexity. Preliminary work on deep decoders for lattice codes suggests that neural nets can learn to invert lattice quantization under noise [110,111].
Moreover, ML can assist in estimating the eavesdropper’s channel or in implementing privacy amplification: for example, a neural network could predict the secrecy outage probability of a given lattice code in fading environments, and adapt the code parameters (such as choosing among different cyclotomic lattices); accordingly, [112] presents a dynamic range query privacy-preserving scheme for blockchain-enhanced smart grid based on lattice. Conversely, one must be cautious of adversarial machine learning: an intelligent eavesdropper might use ML to infer the lattice structure or to mount new attacks.
The literature on learning for secure communications is rapidly growing. In addition to the DDPG [113], there are broad surveys of ML for wireless security. For example, ref. [114] overview 5G-and-beyond privacy-preserving data-driven learning models for emerging communication networks and mention the use of learning algorithms for joint communication and physical-layer security. The authors in [115] study intelligent decentralized federated graph learning with lightweight zero trust architecture for next-generation networking security, making it compatible with lattice-based architectures. These and related works indicate that ML can augment lattice-based schemes, but also that integrating ML introduces new trade-offs: learning models need data and training time, and their decisions may lack provable guarantees (in contrast to information-theoretic lattice designs). Ensuring the reliability and interpretability of ML-aided PLS algorithms is thus an open challenge.

7.4. Open Problems

The integration of modular lattice codes into MIMO, RIS, and ML-based systems raises many research questions. First, designing optimal lattice codes for MIMO wiretap channels remains unsolved: how to choose p-modular lattices that maximize secrecy gain under multi-antenna constraints and imperfect CSI? Closed-form design criteria (generalizing flatness factor) for fading MIMO channels are still lacking. Second, implementation complexity is a major issue: effective high-dimensional lattice decoding in real time (especially over MIMO) is challenging. Hybrid schemes that combine lattices with more conventional MIMO precoding need exploration. Third, in RIS-assisted systems, joint optimization of lattice cosets and RIS phases is a new design space. How to quantize phase shifts to preserve lattice secrecy, and how to coordinate distributed RIS elements for cooperative secrecy coding, are open problems. Additionally, the discrete nature of p-modular lattices (integer ring structure) may need adaptation to the analog domain of RIS (like continuous phase).
From a machine learning perspective, integrating data-driven methods with algebraic coding raises questions of generalization and security: can learning algorithms reliably optimize lattice-coded transmissions for secrecy across diverse channel conditions? How can we guard against learned models that may overfit or be fooled by adversaries? The intersection of ML and lattice coding is largely unexplored. Finally, multi-user and network scenarios (multiple eavesdroppers, relays, or feedback links) have not been studied with cyclotomic lattice codes. Extending these codes to distributed networks (for example, using compute-and-forward or cooperative jamming with lattices) is a rich avenue for future work. Modern intelligent wireless platforms offer new tools for physical-layer security, but they also introduce new vulnerabilities and design complexities. The algebraic and geometric features of p 1 ( mod 4 ) cyclotomic lattices (e.g., rich unit groups, well-roundedness) may be leveraged to meet these challenges. For instance, their flatness factors could potentially be engineered to remain low over the enhanced channels in RIS environments, or ML could be used to approximate optimal decoding. Nevertheless, rigorous analysis and prototypes are needed to validate these ideas in practice.

8. Conclusions

This article has provided a comprehensive survey bridging the theoretical richness of algebraic lattice theory with its critical applications in physical-layer security for wireless communications. We established the foundational models of wireless wiretap channels and detailed essential information-theoretic secrecy metrics such as secrecy gain and flatness factor, which remain central to evaluating the confidentiality of lattice-coded transmissions. Our exposition moved from algebraic number theory fundamentals and Construction A to modular and unimodular lattice families, consolidating classical and modern results into a unified framework that highlights the deep interplay between algebraic structures and secure communication. In addition, we reviewed a newly proposed family of p-modular lattices constructed from cyclotomic number fields Q ( ζ p ) for primes p 1 ( mod 4 ) , developed through a generalized Construction A methodology. We rigorously characterized their algebraic and geometric properties and established a non-existence theorem for p-modular lattices arising from prime-power cyclotomic fields Q ( ζ p n ) with n > 1 . These results provide concrete engineering design principles, identifying both viable construction pathways and fundamental structural limitations for future lattice code development.
Another future research direction is the integration of recent advances in the theory of indefinite theta series and modular completions. Since these p-modular constructions naturally yield lattices with mixed signature, the classical theta series fails to converge on the unit circle, rendering traditional secrecy metrics inapplicable. By drawing on the modern framework of Vignéras’ differential equation and the generalized error functions E 1 , M 1 , E 2 , M 2 , we highlighted how modularly completed indefinite theta series offer a principled analytic replacement. This perspective opens the door to defining secrecy-relevant quantities for indefinite lattices and suggests new directions for characterizing flatness, smoothing, and eavesdropper performance through the geometry of time-like and space-like directions.
The broader implications of this research are significant for next-generation wireless systems. The algebraic structure, modular behavior, and potential secrecy advantages of these lattices make them promising candidates for integration into advanced communication paradigms such as Massive MIMO, RIS-aided architectures, and machine-learning-driven optimization. By combining algebraic number theory, modular analysis, and physical-layer security, this paper serves as both a tutorial and a design resource, guiding researchers and engineers in leveraging sophisticated mathematical tools to build robust, analyzable, and secure wireless networks for the future.

Author Contributions

Conceptualization, H.K., K.B. and A.M.; methodology, H.K. and K.B.; validation, H.K. and K.B.; formal analysis, H.K., K.B., C.F. and D.P.; investigation, H.K., K.B., and A.M.; resources, C.F., V.C.M.L. and D.P.; writing—original draft preparation, H.K. and K.B.; writing—review and editing, A.M., C.F., D.P. and V.C.M.L.; visualization, H.K.; supervision, C.F., V.C.M.L. and D.P.; project administration, V.C.M.L.; funding acquisition, C.F. and D.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study.

Acknowledgments

The authors would like to express their sincere gratitude to the anonymous reviewers for their careful reading of the manuscript and for their insightful comments and suggestions, which have significantly improved the quality and clarity of this work.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ANArtificial Noise
APsAccess Points
AWGNAdditive White Gaussian Noise
CSIChannel State Information
DDPGDeep Deterministic Policy Gradient
IRSIntelligent Reflecting Surfaces
LDAInteger Low-Density Lattices
LDLCLow-Density Lattice Codes
MIMOMultiple-Input Multiple-Output
MLMachine Learning
PLSPhysical-Layer Security
QAMQuadrature Amplitude Modulation
RISReconfigurable Intelligent Surfaces
RSMARate-Splitting Multiple Access
SNRSignal to Noise Ratio
UAVUnmanned Aerial Vehicle
uRLLCUltra-Reliable Low-Latency Communications
VNRVolume-to-Noise Ratio

Appendix A. Proofs

Appendix A.1. Theorem 13

Proof of Theorem 13.
Since G = { σ 1 , , σ p 1 } , with σ i : ζ p ζ p i , is the Galois group of K / Q , K is a totally imaginary number field and it is a quadratic extension of K + = Q ( ζ p + ζ p 1 ) , which is a totally real number field. Thus, K is a CM field. The minimal polynomial of ζ p is Φ p ( X ) = 1 + X + X 2 + + X p 1 and p | Φ p ( 1 ) . This indicates ( X 1 ) | Φ ¯ p ( X ) , where Φ ¯ p = Φ p ( mod p ) . Using Proposition 2, P = p O K + ( 1 ζ p ) O K is a prime ideal of O K and O K / P F p . It can be proved that P is totally ramified and p O K = P p 1 [47], Lemma 5.3, p. 123. We also conclude from the Kronecker–Weber theorem that p K and consequently α = 1 p is in K. Thus, b α , with b α ( x , y ) = i = 1 N Tr K / Q ( α x i y ¯ i ) for x , y O K N , is a symmetric bilinear form. The dual of ρ 1 ( C ) is given by ( ρ 1 ( C ) * , b α ) , where ρ 1 ( C ) * = { x K N : b α ( x , y ) Z , for all y ρ 1 ( C ) } . First, we prove that 1 p ρ 1 ( C ) = ρ 1 ( C ) * as Z -modules. Take any x 1 p ρ 1 ( C ) = 1 p ρ 1 ( C ) , x = 1 p x with x ρ 1 ( C ) , and y ρ 1 ( C ) , then
ρ ( x · y ) = ρ i = 1 N x i y i = i = 1 N ρ ( x i ) ρ ( y i ) = ρ ( x ) · ρ ( y ) = 0 F p ,
which gives x · y 0 ( mod P ) . As P is totally ramified, by the proof from [49], γ ¯ = γ ( mod P ) , for all γ O K . Indeed, using O K / P F p , we can write γ = γ + γ , with γ { 0 , 1 , , p 1 } and γ P and since P is the only prime above p, P ¯ = P and we have γ ¯ P . Thus
γ ¯ = γ ¯ + γ ¯ = γ + γ ¯ γ γ ( mod P ) .
Then, we can conclude
x · y ¯ x · y ( mod P ) x · y ¯ P .
As P is the only prime above p, we have σ i ( x · y ¯ ) P , for i = 1 , , p 1 . Hence, Tr K / Q ( x · y ¯ ) P Z = p Z (see Remark 2) and
b α ( x , y ) = i = 1 N Tr K / Q ( α x i y ¯ i ) = Tr K / Q ( α x · y ¯ ) = Tr K / Q α p x · y ¯ = 1 p Tr K / Q ( x · y ¯ ) 1 p p Z .
Hence, b α ( x , y ) Z and we have proved that 1 p ρ 1 ( C ) ρ 1 ( C ) * . On the other hand, vol ( ρ 1 ( C ) ) = | d K | N / 2 p N k N ( α ) N / 2 , with k = N 2 , | d K | = p p 2 and N ( α ) = 1 p p 1 2 that is obtained from 1 p p 1 = N ( 1 p ) = N ( α 2 ) = ( N ( α ) ) 2 , implies
vol 1 p ρ 1 ( C ) = vol ( ρ 1 ( C ) ) ρ 1 ( C ) 1 p ρ 1 ( C ) = p ( p 1 ) N 4 1 p ( p 1 ) N
= p ( p 1 ) N 4 ,
and
vol ( ρ 1 ( C ) * ) = 1 vol ( ρ 1 ( C ) ) = p ( p 1 ) N 4 .
Thus, we have ρ 1 ( C ) * = 1 p ρ 1 ( C ) . Define
h : ( ρ 1 ( C ) , b α ) ( ρ 1 ( C ) * , b α ) x 1 p x .
Due to the above discussion, h is a Z -linear bijection. Let x , y ρ 1 ( C ) ,
p · b α ( h ( x ) , h ( y ) ) = p · Tr K / Q i = 1 N α h ( x ) i h ( y ) ¯ i = p · Tr K / Q i = 1 N α x i p y i ¯ p = Tr K / Q i = 1 N α x i y i ¯ = b α ( x , y ) .
This completes the proof. □

Appendix A.2. Proposition 10

Proof of Proposition 10.
Using Proposition 5, a generator matrix for ( ρ 1 ( C ) , b α ) , with α = 1 / 5 , is
M C = M A M 0 4 × 4 M p I 2 D α ,
where M , M p and A are real matrices and the matrix D α is the diagonal matrix diag σ 1 ( α ) , σ 2 ( α ) , σ 3 ( α ) , σ 4 ( α ) . Thus, it is enough to compute σ i ( α ) , for i = 1 , , 4 . Using quadratic Gauss sums in (62) and ζ 5 4 = 1 ζ 5 ζ 5 2 ζ 5 3 , we can write α = 5 / 5 as follows:
5 5 = ζ 5 ζ 5 2 ζ 5 3 + ζ 5 4 5 = 1 2 ζ 5 2 2 ζ 5 3 5 .
Consequently, we have
σ 1 ( α ) = σ 2 ( α ) = 1 2 ζ 5 2 2 ζ 5 3 5 = 5 5 = α , σ 3 ( α ) = σ 4 ( α ) = 1 2 ζ 5 4 2 ζ 5 5 = 1 + 2 ζ 5 2 + 2 ζ 5 3 5 = α .
Using the above equations and (57), we can check that N ( α ) = 5 2 and Tr K / Q ( α ) = 0 . Due to the definition of ρ in Remark 2, we have 5 P , because ρ ( 5 ) = 1 2 2 ( mod 5 ) = 0 . We have
D α = diag α , α , α , α = diag α , α , i α , i α .
This proves the result. □

Appendix A.3. Theorem 14

Proof of Theorem 14.
If r = 1 and d = 1 , then K = Q ( ζ p ) and the result follows from Proposition 8. Now assume that ( ρ 1 ( C ) , b 1 / p ) is a d-modular lattice. Then, due to the definition of modular lattices, we have 1 d ρ 1 ( C ) = ( ρ 1 ( C ) ) * . Consequently, vol ( 1 d ρ 1 ( C ) ) = vol ( ( ρ 1 ( C ) ) * ) . We have vol ( ( ρ 1 ( C ) ) * ) = 1 / vol ( ρ 1 ( C ) ) that implies d n N 2 ( vol ( ρ 1 ( C ) ) ) 2 = 1 . It is enough to compute vol ( ρ 1 ( C ) ) . To this end, we have vol ( ρ 1 ( C ) ) = disc ( ρ 1 ( C ) ) = Δ N p 2 N 2 k n N , where Δ = | d K | = p p r 1 ( p r r 1 ) . Thus, we have
d n N 2 p 2 N 2 k n N p N p r 1 ( p r r 1 ) = 1 .
We conclude that d is 1 or p. Let d = p and apply n = p r 1 ( p 1 ) in (A5). We have
p r 1 ( p 1 ) N 2 + 2 N 2 k p r 1 ( p 1 ) N + N p r 1 ( p r r 1 ) = 0 .
Simplifying the above equation gives the following relation
N 3 ( 1 p ) p r 1 + 2 p r 1 ( p r r 1 ) + 4 = 4 k .
Since C is a self-dual code, k = N / 2 and we have
2 = 3 ( 1 p ) p r 1 + 2 p r 1 ( p r r 1 ) + 4 = p r 1 ( 1 3 p + 2 p r 2 r ) + 4 .
Finally, we have p r 1 ( 1 3 p + 2 p r 2 r ) = 2 which implies r = 2 and p = 2 or r = 1 and p = 1 and both of these cases are contradictions. Thus, d = 1 and it is enough to show that r = 1 . In this case, ρ 1 ( C ) is unimodular and we have ρ 1 ( C ) = ( ρ 1 ( C ) ) * and consequently vol ( ρ 1 ( C ) ) = vol ( ( ρ 1 ( C ) ) * ) , which implies
k N 2 p r 1 ( r p r p ) + 2 = k + N 2 p r 1 ( r p r p ) .
We conclude that p r 1 ( r p r p ) = 1 which is possible if and only if r = 1 . □

Appendix A.4. Theorem 15

Proof of Theorem 15.
If r = 1 and d = 1 , then K + = Q ( ζ p + ζ p 1 ) and the result follows from Proposition 9. Now, assume that ( ρ 1 ( C ) , b 1 / p ) is a d-modular lattice. Then, due to the definition of modular lattices, we have 1 d ρ 1 ( C ) = ( ρ 1 ( C ) ) * . Consequently, vol ( 1 d ρ 1 ( C ) ) = vol ( ( ρ 1 ( C ) ) * ) . We have vol ( ( ρ 1 ( C ) ) * ) = 1 / vol ( ρ 1 ( C ) ) that implies d n N 2 ( vol ( ρ 1 ( C ) ) ) 2 = 1 . It is enough to compute vol ( ρ 1 ( C ) ) . Similarly as before, we have vol ( ρ 1 ( C ) ) = disc ( ρ 1 ( C ) ) = Δ N p 2 N 2 k n N , where Δ = | d K + | = p p 1 2 ( r + 1 ) p r 1 p r 1 p 1 1 . Thus, we have
d n N 2 p 2 N 2 k n N p N p 1 2 ( r + 1 ) p r 1 p r 1 p 1 1 = 1 .
We conclude that d is 1 or p. Let d = p , and apply n = p r 1 ( p 1 ) 2 in (A7). We have
p r 1 ( 1 p ) N 4 + N + p r 1 ( 1 p ) N + N ( p 1 ) ( r + 1 ) p r 1 p r 1 p 1 2 = 2 k .
Since C is a self-dual code, k = N / 2 and we have
0 = N ( p 1 ) 4 3 p r 1 + 2 ( r + 1 ) p r 1 2 ( p r 1 ) p 1 = N 4 3 ( p 1 ) p r 1 + 2 ( r + 1 ) ( p 1 ) p r 1 2 ( p r 1 ) = N 4 p r ( 2 r 3 ) + p r 1 ( 1 2 r ) + 2 = N 4 p r 1 ( 2 p r 3 p + 1 2 r ) + 2 .
Thus, we have p r 1 ( 1 3 p + 2 p r 2 r ) = 2 which implies r = 2 and p = 2 or r = 1 and p = 1 and both of these cases are contradictions. Thus, d = 1 and it is enough to show that r = 1 . In this case, ρ 1 ( C ) is unimodular and we have ρ 1 ( C ) = ( ρ 1 ( C ) ) * and consequently vol ( ρ 1 ( C ) ) = vol ( ( ρ 1 ( C ) ) * ) , which implies
k + N p r 1 ( r p r p ) 1 4 = k N p r 1 ( r p r p ) + 3 4 .
We conclude that p r 1 ( r p r p ) = 1 which is possible if and only if r = 1 . □

References

  1. Liang, Y.; Poor, H.V.; Shamai (Shitz), S. Information theoretic security. Found. Trends Commun. Inf. Theory 2009, 5, 355–580. [Google Scholar] [CrossRef]
  2. Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press: Boca Raton, FL, USA, 1996. [Google Scholar]
  3. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  4. Csiszár, I.; Körner, J. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24, 339–348. [Google Scholar] [CrossRef]
  5. Erez, U.; Zamir, R. Achieving 12log(1+SNR) on the AWGN Channel with Lattice Encoding and Decoding. IEEE Trans. Inf. Theory 2004, 50, 2293–2314. [Google Scholar] [CrossRef]
  6. Forney, G.D.; Trott, M.D.; Chung, S.Y. Sphere-bound-achieving coset codes and multilevel coset codes. IEEE Trans. Inf. Theory 2000, 46, 820–850. [Google Scholar] [CrossRef]
  7. Urbanke, R.; Rimoldi, B. Lattice codes can achieve capacity on the AWGN channel. IEEE Trans. Inf. Theory 1998, 44, 273–278. [Google Scholar] [CrossRef]
  8. Sadeghi, M.R.; Banihashemi, A.H.; Panario, D. Low-density parity-check lattices: Construction and decoding analysis. IEEE Trans. Inf. Theory 2006, 52, 4481–4495. [Google Scholar] [CrossRef]
  9. Khodaiemehr, H.; Kiani, D.; Sadeghi, M.R. One-level LDPC lattice codes for the relay channels. In Proceedings of the 2015 Iran Workshop on Communication and Information Theory (IWCIT); IEEE: Piscataway, NJ, USA, 2015; pp. 1–6. [Google Scholar]
  10. Khodaiemehr, H.; Sadeghi, M.R.; Panario, D. Construction of full-diversity 1-level LDPC lattices for block-fading channels. In 2016 IEEE International Symposium on Information Theory (ISIT); IEEE: Piscataway, NJ, USA, 2016. [Google Scholar]
  11. Khodaiemehr, H.; Panario, D.; Sadeghi, M.R. Design and Practical Decoding of Full-Diversity Construction A Lattices for Block-Fading Channels. IEEE Trans. Inf. Theory 2021, 67, 138–163. [Google Scholar] [CrossRef]
  12. Sadeghi, M.; Khodaiemehr, H.; Feng, C. Full-Diversity Construction-D Lattices: Design and Decoding Perspective on Block-Fading Channels. IEEE Trans. Commun. 2025, 73, 13146–13162. [Google Scholar] [CrossRef]
  13. Sadeghi, M.; Khodaiemehr, H.; Feng, C. Design and Decoding of Full-Diversity Construction-D Lattices on Block-Fading Channels. In 2025 IEEE International Symposium on Information Theory (ISIT); IEEE: Piscataway, NJ, USA, 2025; pp. 1–6. [Google Scholar] [CrossRef]
  14. Sommer, N.; Feder, M.; Shalvi, O. Low-density lattice codes. IEEE Trans. Inf. Theory 2008, 54, 1561–1585. [Google Scholar] [CrossRef]
  15. di Pietro, N.; Boutros, J.J.; Zemor, G.; Brunel, L. Integer low-density lattices based on construction A. In 2012 IEEE Information Theory Workshop (ITW); IEEE: Piscataway, NJ, USA, 2012; pp. 422–426. [Google Scholar]
  16. Yan, Y.; Ling, C. A construction of lattices from polar codes. In 2012 IEEE Information Theory Workshop (ITW); IEEE: Piscataway, NJ, USA, 2012; pp. 124–128. [Google Scholar]
  17. Aliasgari, M.; Sadeghi, M.R.; Panario, D. Gröbner bases for lattices and an algebraic decoding algorithm. IEEE Trans. Commun. 2013, 61, 1222–1230. [Google Scholar] [CrossRef]
  18. Álvarez-Barrientos, I.; Borges-Quintana, M.; Borges-Trenard, M.A.; Panario, D. Computing Gröbner bases associated with lattices. Adv. Math. Commun. 2016, 10, 851–860. [Google Scholar] [CrossRef][Green Version]
  19. Oggier, F.; Viterbo, E. Algebraic Number Theory and Code Design for Rayleigh Fading Channels; Foundations and Trends in Communications and Information Theory; Now Publishers: Norwell, MA, USA, 2004. [Google Scholar]
  20. Berhuy, G.; Oggier, F. An Introduction to Central Simple Algebras and Their Applications to Wireless Communication; Mathematical Surveys and Monographs; American Mathematical Society: Providence, RI, USA, 2013; Volume 199. [Google Scholar]
  21. Sethuraman, B.A.; Rajan, B.S.; Shashidhar, V. Full-diversity, high-rate space-time block codes from division algebras. IEEE Trans. Inf. Theory 2003, 49, 2596–2616. [Google Scholar] [CrossRef]
  22. Belfiore, J.C.; Rekaya, G.; Viterbo, E. The golden code: A 2×2 full rate space-time code with non vanishing determinants. IEEE Trans. Inf. Theory 2005, 51, 1432–1436. [Google Scholar] [CrossRef]
  23. Damen, M.O.; Tewfik, A.; Belfiore, J.C. A construction of a space-time code based on number theory. IEEE Trans. Inf. Theory 2002, 48, 753–760. [Google Scholar] [CrossRef]
  24. Elia, P.; Sethuraman, B.A.; Kumar, P.V. Perfect space-time codes for any number of antennas. IEEE Trans. Inf. Theory 2007, 53, 3853–3868. [Google Scholar] [CrossRef]
  25. Lahtonen, J.; Markin, N.; McGuire, G. Construction of space-time codes from division algebras with roots of unity as non-norm elements. IEEE Trans. Inf. Theory 2008, 54, 5231–5235. [Google Scholar] [CrossRef]
  26. Oggier, F.; Rekaya, G.; Belfiore, J.C.; Viterbo, E. Perfect space-time block codes. IEEE Trans. Inf. Theory 2006, 52, 3885–3902. [Google Scholar] [CrossRef]
  27. Unger, T.; Markin, N. Quadratic forms and space-time block codes from generalized quaternion and biquaternion algebras. IEEE Trans. Inf. Theory 2011, 57, 6148–6156. [Google Scholar] [CrossRef]
  28. Karmakar, S.; Rajan, B.S. High-rate, multi-symbol-decodable STBCs from Clifford algebras. IEEE Trans. Inf. Theory 2009, 55, 2682–2695. [Google Scholar] [CrossRef]
  29. Vummintala, S.; Rajan, B.S.; Sethuraman, B.A. Information-lossless space-time block codes from crossed-product algebras. IEEE Trans. Inf. Theory 2006, 52, 3913–3935. [Google Scholar]
  30. Lin, F.; Oggier, F.; Solé, P. 2- and 3-modular lattice wiretap codes in small dimensions. AAECC 2015, 26, 571–590. [Google Scholar] [CrossRef]
  31. Leung-Yan-Cheong, S.K.; Hellman, M.E. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  32. Klinc, D.; Ha, J.; McLaughlin, S.; Barros, J.; Kwak, B. LDPC codes for the Gaussian wiretap channel. IEEE Trans. Inf. Forensics Secur. 2011, 6, 532–540. [Google Scholar] [CrossRef]
  33. Liu, R.; Poor, H.V.; Spasojevic, P.; Liang, Y. Nested codes for secure transmission. In 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications; IEEE: Piscataway, NJ, USA, 2008; pp. 1–5. [Google Scholar]
  34. Belfiore, J.C.; Oggier, F. Secrecy gain: A wiretap lattice code design. In 2010 International Symposium On Information Theory & Its Applications (ISITA); IEEE: Piscataway, NJ, USA, 2010; pp. 174–178. [Google Scholar][Green Version]
  35. Ling, C.; Luzzi, L.; Belfiore, J.C.; Stehlé, D. Semantically secure lattice codes for the Gaussian wiretap channel. IEEE Trans. Inf. Theory 2014, 60, 6399–6416. [Google Scholar] [CrossRef]
  36. Belfiore, J.C.; Solé, P. Unimodular lattices for the Gaussian wiretap channel. In 2010 IEEE Information Theory Workshop (ITW); IEEE: Piscataway, NJ, USA, 2010; pp. 1–5. [Google Scholar][Green Version]
  37. Oggier, F.; Solé, P.; Belfiore, J.C. Lattice codes for the wiretap Gaussian channel: Construction and analysis. IEEE Trans. Inf. Theory 2016, 62, 5690–5708. [Google Scholar] [CrossRef]
  38. Ernvall-Hytönen, A.M. On a conjecture by Belfiore and Solé on some lattices. IEEE Trans. Inf. Theory 2012, 58, 5950–5955. [Google Scholar] [CrossRef]
  39. Ernvall-Hytönen, A.M. Some results related to the conjecture by Belfiore and Solé. IEEE Trans. Inf. Theory 2014, 60, 2805–2812. [Google Scholar] [CrossRef]
  40. Lin, F.; Oggier, F. A classification of unimodular lattice wiretap codes in small dimensions. IEEE Trans. Inf. Theory 2013, 59, 3295–3303. [Google Scholar] [CrossRef]
  41. Lin, F.; Oggier, F. Gaussian wiretap lattice codes from binary self-dual codes. In 2012 IEEE Information Theory Workshop (ITW); IEEE: Piscataway, NJ, USA, 2012; pp. 662–666. [Google Scholar]
  42. Pinchak, J. Wiretap codes: Families of lattices satisfying the Belfiore-Solé secrecy function conjecture. In 2013 IEEE International Symposium on Information Theory (ISIT); IEEE: Piscataway, NJ, USA, 2013; pp. 2617–2620. [Google Scholar]
  43. Pinchak, J.; Sethuraman, B.A. The Belfiore-Solé conjecture and a certain technique for verifying it for a given lattice. In 2014 Information Theory and Applications Workshop (ITA); IEEE: Piscataway, NJ, USA, 2014; pp. 1–3. [Google Scholar]
  44. Ernvall-Hytönen, A.M.; Sethuraman, B.A. Counterexample to the generalized Belfiore-Solé secrecy function conjecture for -modular lattices. In 2015 IEEE International Symposium on Information Theory (ISIT); IEEE: Piscataway, NJ, USA, 2015; pp. 2466–2469. [Google Scholar]
  45. Lin, F.; Oggier, F. Secrecy gain of Gaussian wiretap codes from 2-and 3-modular lattices. In 2012 IEEE International Symposium on Information Theory (ISIT); IEEE: Piscataway, NJ, USA, 2012; pp. 1747–1751. [Google Scholar]
  46. Conway, J.H.; Sloane, N.J.A. Sphere Packings, Lattices and Groups; Springer: New York, NY, USA, 1988. [Google Scholar]
  47. Ebeling, W. Lattices and Codes: A Course Partially Based on Lecturers by F. Hirzebruch; Advanced Lectures in Mathematics; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  48. Kositwattanarerk, W.; Ong, S.S.; Oggier, F. Wiretap encoding of lattices from number fields using codes over Fp. In 2013 IEEE International Symposium on Information Theory; IEEE: Piscataway, NJ, USA, 2013; pp. 2612–2616. [Google Scholar]
  49. Kositwattanarerk, W.; Ong, S.S.; Oggier, F. Construction A of lattices over number fields and block fading wiretap coding. IEEE Trans. Inf. Theory 2015, 61, 2273–2282. [Google Scholar] [CrossRef]
  50. Belfiore, J.C.; Oggier, F. Lattice code design for the Rayleigh fading wiretap channel. In 2011 IEEE International Conference on Communications Workshops (ICC); IEEE: Piscataway, NJ, USA, 2011; pp. 1–5. [Google Scholar]
  51. Oggier, F.; Belfiore, J.C. Enabling multiplication in lattice codes via Construction A. In 2013 IEEE Information Theory Workshop (ITW); IEEE: Piscataway, NJ, USA, 2013; pp. 9–13. [Google Scholar]
  52. Hou, X.; Lin, F.; Oggier, F. Construction and secrecy gain of a family of 5-modular lattices. In 2014 IEEE Information Theory Workshop (ITW); IEEE: Piscataway, NJ, USA, 2014; pp. 117–121. [Google Scholar]
  53. Hou, X.; Oggier, F. Modular lattices from a variation of Construction A over number fields. Adv. Math. Commun. 2017, 11, 719–745. [Google Scholar] [CrossRef]
  54. Vignéras, M. Séries thêta des formes quadratiques indéfinies. In Séminaire Delange–Pisot–Poitou, Théorie des Nombres; Lecture Notes in Mathematics; Springer: Berlin/Heidelberg, Germany, 1977; Volume 627, pp. 227–239. [Google Scholar]
  55. Alexandrov, S.; Banerjee, S.; Manschot, J.; Pioline, B. Indefinite theta series and generalized error functions. Sel. Math. 2018, 24, 3927–3972. [Google Scholar] [CrossRef]
  56. Zwegers, S.P. Mock Theta Functions. Ph.D. Thesis, Utrecht University, Utrecht, The Netherlands, 2002. [Google Scholar]
  57. Rains, E.M.; Sloane, N.J.A. The shadow theory of modular and unimodular lattices. J. Number Theory 1998, 73, 359–389. [Google Scholar] [CrossRef]
  58. Böcherer, S.; Nebe, G. On theta series attached to maximal lattices and their adjoints. J. Ramanujan Math. Soc. 2009, 3, 265–284. [Google Scholar]
  59. Ozarow, L.H.; Wyner, A.D. Wire-tap channel II. Bell Syst. Tech. J. 1984, 63, 2135–2157. [Google Scholar] [CrossRef]
  60. Erez, U.; Litsyn, S.; Zamir, R. Lattices which are good for (almost) everything. IEEE Trans. Inf. Theory 2005, 51, 3401–3416. [Google Scholar] [CrossRef]
  61. Khodaiemehr, H.; Sadeghi, M.R.; Sakzad, A. Practical Encoder and Decoder for Power Constrained QC LDPC-Lattice Codes. IEEE Trans. Commun. 2017, 65, 486–500. [Google Scholar] [CrossRef]
  62. Lin, F.; Ling, C.; Belfiore, J.C. Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices. In 2014 IEEE International Symposium on Information Theory; IEEE: Piscataway, NJ, USA, 2014; pp. 971–975. [Google Scholar]
  63. Stewart, I.N.; Tall, D.O. Algebraic Number Theory; Chapman and Hall: London, UK, 1979. [Google Scholar]
  64. Lang, S. Algebraic Number Theory; Springer: Berlin/Heidelberg, Germany, 1994. [Google Scholar]
  65. Narkiewicz, W. Elementary and Analytic Theory of Algebraic Numbers; Springer Monographs in Mathematics; Springer: Berlin/Heidelberg, Germany, 2004. [Google Scholar]
  66. Conrad, K. Cyclotomic Extensions. Available online: https://kconrad.math.uconn.edu/blurbs/galoistheory/cyclotomic.pdf (accessed on 11 February 2026).
  67. Washington, L.C. Introduction to Cyclotomic Fields, Volume 83 of Graduate Texts in Mathematics; Springer Science & Business Media: Berlin/Heidelberg, Germany, 1997. [Google Scholar]
  68. Lopes, J.O.D. The discriminant of subfields of Q(ζ2r). J. Algebra Its Appl. 2003, 2, 463–469. [Google Scholar] [CrossRef]
  69. da Nóbrega Neto, T.P.; Interlando, J.C.; Lopes, J.O.D. On computing discriminants of subfields of Q(ζpr). J. Number Theory 2002, 96, 319–325. [Google Scholar] [CrossRef][Green Version]
  70. Samuel, P. Théorie Algébrique des Nombres; Hermann: Paris, France, 1971. [Google Scholar]
  71. Forney, G.D. Coset codes-Part I: Introduction and geometrical classification. IEEE Trans. Inf. Theory 1988, 34, 1123–1151. [Google Scholar] [CrossRef]
  72. Chapman, R.; Dougherty, S.T.; Gaborit, P.; Solé, P. 2-modular lattices from ternary codes. J. Théorie Nombres Bordx. 2002, 14, 73–85. [Google Scholar] [CrossRef]
  73. Chua, K.S.; Solé, P. Eisenstein lattices, Galois rings, and theta series. Eur. J. Comb. 2004, 25, 179–185. [Google Scholar] [CrossRef][Green Version]
  74. Bachoc, C. Applications of coding theory to the construction of modular lattices. J. Comb. Theory Ser. A 1997, 78, 92–119. [Google Scholar] [CrossRef]
  75. Sloane, N.J.A. Codes over GF(4) and complex lattices. J. Algebra 1978, 52, 168–181. [Google Scholar] [CrossRef][Green Version]
  76. Leon, J.S.; Pless, V.; Sloane, N.J.A. Self-dual codes over GF(5). J. Comb. Theory Ser. A 1982, 32, 178–194. [Google Scholar] [CrossRef]
  77. Assmus, E.F.; Mattson, H.F. On weights in quadratic-residue codes. Discret. Math. 1972, 3, 1–20. [Google Scholar] [CrossRef]
  78. MacWilliams, F.J.; Sloane, N.J.A. The Theory of Error-Correcting Codes; North-Holland: Amsterdam, The Netherlands, 1977. [Google Scholar]
  79. Bayer-Fluckiger, E. Cyclotomic modular lattices. J. Théorie Nombres Bordx. 2000, 12, 273–280. [Google Scholar] [CrossRef]
  80. Khodaiemehr, H.; Panario, D.; Sadeghi, M.R. Modular Construction A Lattices from Cyclotomic Fields and their Applications in Information Security. In 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC); IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar] [CrossRef]
  81. Conrad, K. History of Class Field Theory. Available online: https://www.math.uconn.edu/~kconrad/blurbs/gradnumthy/cfthistory.pdf (accessed on 11 February 2026).
  82. Milne, J. Class Field Theory, Version 4.02. 2013. Available online: https://www.jmilne.org/math/CourseNotes/CFT.pdf (accessed on 11 February 2026).
  83. Shemanske, T.R. An Overview of Class Field Theory. 2000. Available online: https://math.dartmouth.edu/~trs/expository-papers/CFT.pdf (accessed on 11 February 2026).
  84. Ireland, K.; Rosen, M. A Classical Introduction to Modern Number Theory, 2nd ed.; Springer: Berlin/Heidelberg, Germany, 1990. [Google Scholar]
  85. Batut, C.; Quebbemann, H.G.; Scharlau, R. Computations of cyclotomic lattices. Exp. Math. 1995, 4, 175–179. [Google Scholar] [CrossRef]
  86. Bayer-Fluckiger, E. Ideal lattices. In A Panorama of Number Theory or the View from Bakers Garden; Cambridge University Press: Cambridge, UK, 2002; pp. 168–184. [Google Scholar]
  87. Bayer-Fluckiger, E.; Suarez, I. Modular lattices over cyclotomic fields. J. Number Theory 2005, 114, 394–411. [Google Scholar] [CrossRef]
  88. Apostol, T.M. Modular Functions and Dirichlet Series in Number Theory; Springer: Berlin/Heidelberg, Germany, 1977. [Google Scholar]
  89. Bosma, W.; Cannon, J.; Playoust, C. The Magma algebra system. I. The user language. J. Symb. Comput. 1997, 24, 235–265. [Google Scholar] [CrossRef]
  90. Wolfram Research Inc. Mathematica, version 8.0; Wolfram Research Inc.: Champaign, IL, USA, 2010. [Google Scholar]
  91. Mucchi, L.; Jayousi, S.; Caputo, S.; Panayirci, E.; Shahabuddin, S.; Bechtold, J.; Morales, I.; Abreu, A.S.G.; Haas, H. Physical-Layer Security in 6G Networks. IEEE Open J. Commun. Soc. 2021, 2, 1901–1914. [Google Scholar] [CrossRef]
  92. Ferreira, J.; Guerreiro, J.; Dinis, R. Physical Layer Security With Near-Field Beamforming. IEEE Access 2024, 12, 4801–4811. [Google Scholar] [CrossRef]
  93. Yu, D.; Yang, L.; Gao, X.; Wu, Y.; Yue, G. Physical Layer Security in Spherical-Wave Channel Using Massive MIMO. In 2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC); IEEE: Piscataway, NJ, USA, 2022; Volume 33, pp. 288–293. [Google Scholar]
  94. Ji, Y.; Yu, K.; Qiu, J.; Yu, J. Massive MIMO and Secrecy Guard Zone Based Improving Physical Layer Security in UAV-Enabled uRLLC Networks. IEEE Trans. Veh. Technol. 2023, 72, 4553–4567. [Google Scholar] [CrossRef]
  95. Campello, A.; Ling, C.; Belfiore, J.C. Semantically secure lattice codes for compound MIMO channels. IEEE Trans. Inf. Theory 2019, 66, 1572–1584. [Google Scholar] [CrossRef]
  96. Hoang, T.M.; Ngo, H.Q.; Duong, T.Q.; Tuan, H.D.; Marshall, A. Cell-free massive MIMO networks: Optimal power control against active eavesdropping. IEEE Trans. Commun. 2018, 66, 4724–4737. [Google Scholar] [CrossRef]
  97. Zhang, Y.; Zhao, H.; Xia, W.; Zhu, Y.; Ngo, H.Q.; Tan, B. Enhancing secrecy in hardware-impaired cell-free massive MIMO by RSMA. IEEE Trans. Wirel. Commun. 2024, 23, 18788–18805. [Google Scholar] [CrossRef]
  98. Mirghasemi, H.; Belfiore, J.C. Lattice code design criterion for MIMO wiretap channels. In 2015 IEEE Information Theory Workshop (ITW); IEEE: Piscataway, NJ, USA, 2015; pp. 277–281. [Google Scholar]
  99. Wang, Q.; Zhang, Y.; Zhang, W. Secure Nested Lattices for MIMO Broadcast Channel with Confidential Messages. IEEE Wirel. Commun. Lett. 2024, 13, 3167–3171. [Google Scholar] [CrossRef]
  100. Gamal, H.E.; Caire, G.; Damen, M.O. Lattice coding and decoding achieve the optimal diversity-multiplexing tradeoff of MIMO channels. IEEE Trans. Inf. Theory 2004, 50, 968–985. [Google Scholar]
  101. Abughalwa, M.; Nguyen, D.N.; Hoang, D.T.; Dutkiewicz, E. Multi-user secrecy rate maximization in IRS-aided systems. In GLOBECOM 2024—2024 IEEE Global Communications Conference; IEEE: Piscataway, NJ, USA, 2024; pp. 2491–2496. [Google Scholar]
  102. Haq, A.U.; Singh, P.; Mihovska, A.; Beliatis, M.J. Enhancing Security in Near-Field RIS Communications Assisted by UAV. IEEE Trans. Consum. Electron. 2025, 71, 10404–10417. [Google Scholar] [CrossRef]
  103. Wei, L.; Wang, K.; Pan, C.; Elkashlan, M. Secrecy Performance Analysis of RIS-Aided Communication System with Randomly Flying Eavesdroppers. IEEE Trans. Commun. 2023, 71, 7079–7093. [Google Scholar] [CrossRef]
  104. Pang, X.; Zhao, N.; Tang, J.; Wu, C.; Niyato, D.; Wong, K.K. IRS-Assisted Secure UAV Transmission via Joint Trajectory and Beamforming Design. IEEE Trans. Commun. 2022, 70, 1140–1152. [Google Scholar] [CrossRef]
  105. Jain, T.; Bitragunta, S.; Bhatia, A. Secrecy Capacity and Efficiency Outage Analysis of Cooperative PHY-Secure Wireless Systems and Secrecy Capacity-Based RIS Design. IEEE Access 2025, 13, 54808–54822. [Google Scholar] [CrossRef]
  106. Rasheed, I.; Mostafa, H. EP-SeaAKA: Enhanced Privacy-Preserving Quantum-Resistant Authentication and Key Agreement for RIS-assisted 6G Networks. IEEE Commun. Lett. 2025. [Google Scholar] [CrossRef]
  107. Hossain, M.N.; Islam, M.R.; Tamanna-Kamal, S.K.; Kaniz, A.; Ullah, S.E.; Shimamura, T. Integrated WHT-and DFT-based Multiuser Massive MIMO System for Secure RIS-enabled mmWave Communications. IEEE Access 2025, 13, 111037–111055. [Google Scholar] [CrossRef]
  108. Shi, E.; Zhang, J.; Du, H.; Ai, B.; Yuen, C.; Niyato, D.; Letaief, K.B.; Shen, X. RIS-Aided Cell-Free Massive MIMO Systems for 6G: Fundamentals, System Design, and Applications. IEEE Trans. Commun. 2024, 72, 3451–3467. [Google Scholar] [CrossRef]
  109. Sobhi-Givi, S.; Nouri, M.; Shayesteh, M.G.; Behroozi, H.; Kwon, H.H.; Piran, M.J. Efficient Optimization in RIS-Assisted UAV System Using Deep Reinforcement Learning for mmWave-NOMA 6G Communications. IEEE Internet Things J. 2025, 12, 26042–26057. [Google Scholar] [CrossRef]
  110. Corlay, V.; Boutros, J.J.; Ciblat, P.; Brunel, L. Neural Lattice Decoders. In 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP); IEEE: Piscataway, NJ, USA, 2018; pp. 569–573. [Google Scholar] [CrossRef]
  111. Sadeghi, M.R.; Amirzade, F.; Panario, D.; Sakzad, A. A Neural Network Lattice Decoding Algorithm. In 2018 IEEE Information Theory Workshop (ITW); IEEE: Piscataway, NJ, USA, 2018; pp. 1–5. [Google Scholar] [CrossRef]
  112. Li, K.C.; Shi, R.H.; Guo, W.P.; Wang, P.B.; Shao, B.S. Dynamic range query privacy-preserving scheme for blockchain-enhanced smart grid based on lattice. IEEE Trans. Dependable Secur. Comput. 2023, 21, 1652–1664. [Google Scholar] [CrossRef]
  113. Sarhan, A.Y.; Abdullah, O.A.; Al-Hraishawi, H.; Alsubaei, F.S. Reinforcement Learning-Driven Secrecy Energy Efficiency Maximization in RIS-Enabled Communication Systems. IEEE Access 2025, 13, 128048–128059. [Google Scholar] [CrossRef]
  114. Fouda, M.M.; Fadlullah, Z.M.; Ibrahem, M.I.; Kato, N. Privacy-Preserving Data-Driven Learning Models for Emerging Communication Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2025, 27, 2505–2542. [Google Scholar] [CrossRef]
  115. Zhou, X.; Liang, W.; Wang, K.; Yada, K.; Yang, L.T.; Ma, J.; Jin, Q. Decentralized Federated Graph Learning With Lightweight Zero Trust Architecture for Next-Generation Networking Security. IEEE J. Sel. Areas Commun. 2025, 43, 1908–1922. [Google Scholar] [CrossRef]
Figure 1. Gaussian wiretap channel setup.
Figure 1. Gaussian wiretap channel setup.
Entropy 28 00235 g001
Table 1. Theta series of some exceptional lattices.
Table 1. Theta series of some exceptional lattices.
Lattice Λ Theta Series Θ Λ
Cubic lattice Z n ϑ 3 n
Checkerboard lattice D n 1 2 ( ϑ 3 n + ϑ 4 n )
Gosset lattice E 8 1 2 ( ϑ 2 8 + ϑ 3 8 + ϑ 4 8 )
Leech lattice Λ 24 1 8 ( ϑ 2 8 + ϑ 3 8 + ϑ 4 8 ) 3 45 16 ( ϑ 2 · ϑ 3 · ϑ 4 ) 8
Table 2. Secrecy-relevant indicators for classical and proposed lattice families, including signature and definiteness.
Table 2. Secrecy-relevant indicators for classical and proposed lattice families, including signature and definiteness.
Lattice FamilyConstruction SettingField SignatureIs Definite?Secrecy Implications
Unimodular latticesIntegral, positive-definite ( n , 0 ) YesClassical secrecy gain and flatness factor available; strong shaping
q-modular latticesIntegral, positive-definite ( n , 0 ) YesClassical secrecy metrics applicable; good confusion at Eve
Lattices from cyclotomic fieldsCanonical embedding or Construction ACM: ( 0 , n 2 ) or real: ( n , 0 ) YesClassical secrecy metrics applicable (positive-definite theta series)
Proposed p-modular latticesAs in Theorem 13: K = Q ( ζ p ) , α = 1 / p CM: ( 0 , p 1 2 ) No, mixed signature ( n + , n ) Classical secrecy gain fails for analytic model; modularly completed indefinite theta series required for secrecy-relevant quantities
Prime-power cyclotomic fields Q ( ζ p r ) , r > 1 No modular Construction A latticeCM: ( 0 , ϕ ( p r ) 2 ) Not applicableNot suitable for PLS under generalized Construction A
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Khodaiemehr, H.; Bagheri, K.; Mohajer, A.; Feng, C.; Panario, D.; Leung, V.C.M. A Survey of Lattice-Based Physical-Layer Security for Wireless Systems with p-Modular Lattice Constructions. Entropy 2026, 28, 235. https://doi.org/10.3390/e28020235

AMA Style

Khodaiemehr H, Bagheri K, Mohajer A, Feng C, Panario D, Leung VCM. A Survey of Lattice-Based Physical-Layer Security for Wireless Systems with p-Modular Lattice Constructions. Entropy. 2026; 28(2):235. https://doi.org/10.3390/e28020235

Chicago/Turabian Style

Khodaiemehr, Hassan, Khadijeh Bagheri, Amin Mohajer, Chen Feng, Daniel Panario, and Victor C. M. Leung. 2026. "A Survey of Lattice-Based Physical-Layer Security for Wireless Systems with p-Modular Lattice Constructions" Entropy 28, no. 2: 235. https://doi.org/10.3390/e28020235

APA Style

Khodaiemehr, H., Bagheri, K., Mohajer, A., Feng, C., Panario, D., & Leung, V. C. M. (2026). A Survey of Lattice-Based Physical-Layer Security for Wireless Systems with p-Modular Lattice Constructions. Entropy, 28(2), 235. https://doi.org/10.3390/e28020235

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop