******************* Background of Lattice Cryptography (part 3)