******************* Background of Lattice Cryptography (part 2)