Definition of a Ring

A ring is an algebra for which (i) is a commutative group. (ii) is a Monoid. (iii) and for all (left and right distributive laws).

[[Math/ Books/A First Course in Abstract Algebra.pdf#page=172&selection=70,0,210,1&color=note|p.167]]

A ring is a set together with two binary operations + and ·, which we call addition and multiplication, defined on such that the following axioms are satisfied:

  • R1. is an abelian group.
  • R2. Multiplication is associative.
  • R3. For all a, b, c ∈ R, the left distributive law, a · (b + c) = (a · b) + (a · c) and the right distributive law (a + b) · c = (a · c) + (b · c) hold.

NOTE

A ring is called commutative if multiplication is commutative (ab = ba)

Examples of Rings

1) complex numbers

If then is actually

2) polynomial ring

(Note that means here the finite sequence of )

  • (extend the shorter tuple by zeros)

This is the polynomial ring in one indeterminate over : is the constant polynomial

Lemma 5.17: Properties of a ring

i) ii) iii) iv) (If is non-trivial, then )

Proof iv) Prove : trivial Prove : Let , assume Contradiction

Definition: Characteristic of a ring

(DE: Charakteristik) The characteristic of a ring is the order of in the additive group if it is finite, and otherwise the characteristic is defined to be Formally:

[[Section 19 Integral Domains#1913-definition-the-characteristic-of-the-ring-r|19.13 Definition The Characteristic of the ring ]]

Definition: Unit

(DE: Einheit) An element of a ring is called a unit if is invertible That is for some The set of units is denoted by (must be a group)

Example

The units of are and ,

Lemma 5.18: Multiplicative Group of Units

is a group

Definition: Zero Divisor

is zero divisor, if there exists such that

Applications

  • Error-Correcting Codes: Rings are used in the construction of error-correcting codes, which are essential for reliable data transmission and storage.
  • Secret Sharing: Rings play a role in secret sharing schemes, where a secret is divided into multiple shares distributed among participants, and a certain number of shares are required to reconstruct the secret.
  • Privacy Amplification: Rings are used in privacy amplification techniques, where a partially secret shared value (e.g., a bitstring) can be transformed into a shorter, more secret value. A public function f compresses the bitstring (e.g., from 1000 bits to 800 bits). The specific choice of f is public knowledge, but the way it is applied depends on an additional secret. The remaining 200 bits could function like this key, akin to a one-time pad.