Application of Explicit Hilbert s Pairing to Constructive Class Field Theory and Cryptography
|
|
- Kristian Wilkerson
- 6 years ago
- Views:
Transcription
1 Applied Mathematical Sciences, Vol. 10, 2016, no. 45, HIKARI Ltd, Application of Explicit Hilbert s Pairing to Constructive Class Field Theory and Cryptography S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko St. Petersburg State University Universitetskaya nab., 7-9, St. Petersburg, Russia Copyright c 2016 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko. This article is distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract In the present paper, we apply the explicit formula for Hilbert s pairing suggested by S.V. Vostokov in the late 1970s to class field theory and cryptography. We give an explicit construction of the norm group of a radical extension of a local field F. We also suggest a new public key cryptographic protocol based on the explicit Hilbert pairing. Mathematics Subject Classification: 12J10 Keywords: Hilbert pairing, local field, class group, public key protocol 1 Introduction In the 1985 N. Koblitz and V. Miller independently (see [2] and bibliography therein) inspired by Lenstra s factoring algorithm based on elliptic curves constructed a completely new Diffie-Hellman type protocols using the group of points of an elliptic curve defined over a finite field rather than the multiplicative group of a finite field. Since seminal works of N. Koblitz and V. Miller, more and more pairing-based cryptosystems have been invented. Some time earlier, I.R. Shafarevich, S.V. Vostokov, and H.Brückner initiated the study of explicit constructions in the classical class field theory, which led, above other things, to explicit formulas for Hilbert s pairing [3]. This research direction was further developed by S.V. Vostokov in the 1980s. In section 1 of the present
2 2206 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko paper, we give an explicit formula for Hilbert s pairing and list its basic properties needed in the sequel. In section 2, we apply the explicit Hilbert pairing to class field theory. In section 3, we give an explicit construction of the norm group of a radical extension of a local field F for a given set of generators of an open subgroup of finite index in the multiplicative group of a one-dimensional local field F with finite residue field of characteristic p > 0. In Sec. 4, we apply the explicit Hilbert s pairing to public key cryptography. We suggest an identity-based encryption protocol based on the explicit Hilbert pairing. 2 Hilbert symbol in a one-dimensional local field 2.1 Notation Let F be a local field (a finite extension of Q p ), π a prime element in F, a maximal ideal of the ring of integers in F, R the system of multiplicative representatives in F, U F the group of units in F, U 1 the subgroup of principal units in U F, T the inertia subfield in F, O := O T the ring of integers in T, tr the trace operator in the extension T/Q p, ζ := ζ p n a primitive p n th root of unity in F, e the ramification index of F, e e m =, 1 m n, p m 1 (p 1) U = 1 + XZ p [[X]], Eis(X) = ((1+X)p 1), X p the Frobenius operator on the ring O((X)), f = m a m X m m a σ mx pm, where σ is the Frobenius automorphism in O, R = O T [[X]] o the ideal of series with zero constant term (additive Z p - module), µ m the group of mth roots of unity.
3 Application of explicit Hilbert s pairing The definition and basic properties of the Hilbert symbol Let F contain µ m. For each α F, we denote by σ α the corresponding automorphism of the maximal Abelian extension of F, given by local class field theory. The Hilbert symbol is the pairing defined by the formula (, ) m : F F µ m (α, β) = m β σα 1, (see [1]). We list the basic properties of the Hilbert symbol. 1. Bilinearity (α 1 α 2, β) = (α 1, β)(α 2, β), (α, β 1 β 2 ) = (α, β 1 )(α, β 2 ) 2. Skew-symmetry (α, β) = (β, α) 1 3. Norm property { α is a norm in F ( m β)/f (α, β) = 1 β is a norm in F ( m α)/f. (1) 4. Independence in each argument. Namely, let Eis(X) be an irreducible Eisenstein s polynomial of degree p 1, Eis(X) = ((1 + X)p 1) X p, and let r(x) be the remainder upon dividing f(x) 1 by the polynomial u(x). Then < f(x), g(x) >=< r(x), g(x) >. (2) 2.3 Explicit form of the Hilbert symbol For all f R and g 1 + R, we define the Artin Hasse function and the Vostokov function (see [4, Sec.1]), ( E(f) = exp 1 + ) p + 2 p +... (f), l(g) = 1 2 p log gp. It can be proved (see [3, Proposition 1]) that the functions l and E are inverse isomorphisms between Z p -module R and multiplicative Z p -module 1 + R, i.e., l(e(f)) = f and E(l(g)) = g.
4 2208 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko For an element α F, we denote by α(x) an element of O((X)) such that α(π) = α. Let s(x) = ζ pn 1. It is easy to prove the following two statements. Proposition 1. Let f(x) XO[[X]] and f(x) = a m X m Then l(1 + f(x)) a m X m (mod deg(m + 1)). Proposition 2. Let ζ n = 1 + cπ en + c 1 π en , where c, c i O. Then 1/s(X) satisfies the congruence 1/s(X) c 1 X pe 1 (mod po{{x}}), (3) where O{{X}} = { a ix i i, a i 0}. Now, we define a bilinear pairing γ α,β : F F Z p. Let α = π a θε and β = π b θ η be elements of F, where θ, θ R, and ε, η U 1. We choose α(x) in the form X a θε(x), where ε(x) X=π = ε. In the same way, we define β(x) and η(x) for β. Let p 2. We put where γ α,β = res X Φ α,β (X)/s(X), (4) Φ(α, β) = l(ε) d l(η) d l(ε)β 1 dx dx β + d l(η)α 1 dx α. It can be proved (see [3, Secs. 2 and 3]) that the pairing γ α,β is bilinear, skewsymmetric (mod p n ), and does not dependent (mod p n ) on the choice of a prime element π. Moreover, < α, β > n = tr γ α,β (5) does not depend (mod p n ) on the choice of expansions of the elements α, β, and ζ in power series in π and has the following norm property: < α, β > m = 1 { α is a norm in F ( m β)/f β is a norm in F ( m α)/f In addition, for the Hilbert symbol we have an explicit formula (α, β) n = ζ trγ α,β = ζ <α,β>n.
5 Application of explicit Hilbert s pairing The class group of a cyclic p n -extension of a one-dimensional local field 3.1 Generators of cyclic p n -extensions In this section, we study generators of a cyclic extension F ( pn α), where F is a local field and α F. Lemma 1. Let L = F ( pn α) be a cyclic extension of degree p n. Let β F be such that β is a generator of the cyclic group F /Nm L/F L. Let α 1, α 2, and β 1 be elements of F such that α = α 1 α p 2 and (α 1, β 1 ) = ζ. Then β 1 is also a generator of F /Nm L/F L. Proof. We have (α, β 1 ) = (α 1, β 1 )(α p 2, β 1 ) = ζ 1+pk for some k. Therefore, (α, β 1 ) = (α, β 1+pk ) since (α, β) = ζ. Consequently, (α, β 1+pk β 1 1 ) = 1, and, by the norm property of the Hilbert symbol, we have β 1 β (1+pk) = Nm L/F γ, γ F, which implies that β 1 = β 1+pk Nm L/F γ, i.e., the elements β 1 and β 1+pk of F /Nm L/F L coincide. Therefore, β 1 also generates the factor group. Corollary 1. To find a generator of the group F /Nm L/F L, where L = F ( pn α), it is sufficient to consider the element α modulo F p. An element ω F is called p n -primary if the extension F ( pn ω)/f is unramified. In [4, Sec.4] it is proved that p n -primary elements have the form and ω(a) = E(as(X)) X=π, a O, Moreover, the following congruence is valid: (π, ω(a)) = ζ tr a (6) ω(a) 1 + cπ pe 1 (mod π pe 1+1 ). (7) Lemma 2. a) If α π a ε (mod F p ), (a, p) = 1, and ε is a principal unit, then there is a prime element τ in F such that F ( pn α) = F ( p n τ). b) If α 1 + aπ pe 1 (mod π pe 1+1 ), a O, then α ω(ac 1 ) (mod F p ), where the element c is from (7). c) If α ε (mod F p ) and ε = 1 + aπ u +..., where (p, au) = 1, 1 u < pe 1, then there is a prime element τ in F such that α 1 + aτ u (mod F p ).
6 2210 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko Proof. a) For any integer b prime to p, we have F ( pn α) = F ( p n αb ). Since (a, p) = 1, there is a b such that ab 1 (mod p n ). Consequently, where τ = πε b. b) Follows from (3) and (7). c) By assumption, we have F ( pn α) = F ( p n αb ) = F ( pn πεb ) = F ( pn τ), ε = 1 + aπ u +... = 1 + aπ u (1 + c 1 c 1 π +...) = 1 + aηπ u, where η = 1 + c 1 c 1 π +... U 1. Since the group of principal units U 1 is the m divisible for all m prime to p, there exists an η 1 U 1 such that η u 1 = η. It follows that ε = 1 + c(πη 1 ) u = 1 + cτ u (mod F p ), where τ = πη Generators of the class group of a cyclic p n -extension of a one-dimensional local field In this section, we prove the main result of the paper. Namely, we find an explicit form of a generator of the class group of a radical p n -extension. Theorem 1. Let L = F ( pn α), where α F, be a cyclic extension of degree p n. a) If α τ (mod F p ), then p n -primary element ω(a) with tr a 0 (mod p) is a generator of F /Nm L/F L. b) If α ω(a) (mod F p ), then any prime element π of F is a generator of F /Nm L/F L. c) If α 1 + aπ u (mod F p ), where (p, au) = 1 and 1 u < pe 1, then the element β = 1 + bπ v, where u + v = pe 1 and tr ab 1 (mod p) is a generator of F /Nm L/F L. Proof. a) and b) follow from (6) and Lemma 2. To prove c), we use formula (4) for the Hilbert symbol. We obtain Φ(α, β) = l(1 + bx v )d log(1 + ax u ) l(1 + ax u )d p log(1 + bxv ). By Proposition 1, we have Φ(α, β) ab X u+v 1 = ab X pe 1 1 (mod deg(pe 1 + 1)). (8)
7 Application of explicit Hilbert s pairing 2211 Since u + v = pe 1, congruences (3) and (8) imply Φ(α, β)/s(x) abc 1 X 1 (mod po{{x}}). Consequently, res X Φ(α, β)/s(x) abc 1 (mod p) and < α, β >= tr res Φ(α, β)/s = tr (ab/c) 1 (mod p). As a result, we see that < α, β > n 1 (mod p) and (α, β) = ζ 1+pk is a primitive p n th root of unity. From the norm property of the Hilbert symbol (1), it follow that β is a generator of the class group of F ( pn α) if and only if (α, β) = ζ, where ζ is a primitive p n th root of unity. This proves the theorem. 4 Protocol authentication without disclosure In this section, we use the explicit reciprocity law to describe a variant of a cryptographic protocol. The proof of security of the protocol under consideration is based on the non-polynomial complexity of the discrete logarithm problem in the ring of polynomials with integer coefficients. 4.1 Protocol of parameters and participants The participants of the protocol are Alice A and a verifier V. Both participants know a number s, a polynomial Eis(X), and a polynomial F (X) from the group U(x). Alice knows a secret polynomial a(x) U(X) such that < F (x), a(x) > 0. According to the classical problem of a protocol authentication without disclosure, Alice should be able to prove to the verifier that she knows the secret polynomial a(x) without disclosing it. To verify that Alice knows the secret polynomial a(x), the verifier uses the polynomial A(X) : A(X) = a(x) s mod Eis(X). 4.2 The protocol choreography 1. Alice chooses a random polynomial r(x) :< r(x), F (x) > 0 and calculates the polynomial R(X) = r(x) s mod Eis(X). 2. Alice transmits the value R(x) to the verifier. 3. V verifies < R(x), F (x) > 0 and can ask A one of the following questions:
8 2212 S.V. Vostokov, O.Yu. Podkopaeva and K.V. Ratko A must tell V the polynomial z(x) : s < z(x), F (X) > + < F (X), R(X) >= 0, A must tell V the polynomial y(x) : s < y(x), F (X) > + < F (X), R(X)A(X) >= To answer the first question, A uses the knowledge of the random polynomial r(x) and forms the polynomial z(x) = r(x); to answer the second question, A uses the knowledge of the secret polynomial a(x) and calculates the polynomial y(x) = r(x)a(x) mod Eis(X). 5. V makes sure that the answer of A is correct: for the answer to the first question, s < z(x), F (X) > + < F (X), R(X) > = s < r(x), F (X) > +s < F (X), r(x) >= 0 for the answer to the second question, s < y(x), F (X) > + < F (X), R(X)A(X) > = s < r(x)a(x), F (X) > +s < F (X), r(x)a(x) >= 0. The steps listed above are performed until the verifier makes sure that Alice knows the secret polynomial a(x). All properties of the protocol correspond completely to the classical protocol of authentication without disclosure. Acknowledgements. The work has been supported by the Russian Foundation for Basic Research (grant no ) and by the Russian Federation Government (grant no.14.z ) References [1] I.B. Fesenko and S.V. Vostokov, Local Fields and Their Extensions, The 2nd Edition, American Math Society, Translations of Math Monographs Vol. 121, [2] A.H. Koblitz, N. Koblitz and A. Menezes, Elliptic curve cryptography: the serpentine course of a paradigm shift, Journal of Number Theory, 131 (2011), [3] S.V. Vostokov, Explicit form of the reciprocity law, Izvestiya Acad. of Science USSR, Math., 42 (1978), no. 6,
9 Application of explicit Hilbert s pairing 2213 [4] S.V. Vostokov, Hilbert symbol in a discrete valuated field, Journal of Soviet Mathematics, 19 (1982), no. 1, Received: April 29, 2016; Published: July 6, 2016
Explicit Formulas for Hilbert Pairings on Formal Groups
CHAPTER 8 Explicit Formulas for Hilbert Pairings on Formal Groups The method of the previous chapter possesses a valuable property: it can be relatively easily applied to derive explicit formulas for various
More informationHASSE ARF PROPERTY AND ABELIAN EXTENSIONS. Ivan B. Fesenko
Math. Nachrichten vol. 174 (1995), 81 87 HASSE ARF PROPERTY AND ABELIAN EXTENSIONS Ivan B. Fesenko Let F be a complete (or Henselian) discrete valuation field with a perfect residue field of characteristic
More informationSome algebraic number theory and the reciprocity map
Some algebraic number theory and the reciprocity map Ervin Thiagalingam September 28, 2015 Motivation In Weinstein s paper, the main problem is to find a rule (reciprocity law) for when an irreducible
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 2: Mathematical Concepts Divisibility Congruence Quadratic Residues
More informationp-class Groups of Cyclic Number Fields of Odd Prime Degree
International Journal of Algebra, Vol. 10, 2016, no. 9, 429-435 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.6753 p-class Groups of Cyclic Number Fields of Odd Prime Degree Jose Valter
More informationFIELD THEORY. Contents
FIELD THEORY MATH 552 Contents 1. Algebraic Extensions 1 1.1. Finite and Algebraic Extensions 1 1.2. Algebraic Closure 5 1.3. Splitting Fields 7 1.4. Separable Extensions 8 1.5. Inseparable Extensions
More informationClassification of Finite Fields
Classification of Finite Fields In these notes we use the properties of the polynomial x pd x to classify finite fields. The importance of this polynomial is explained by the following basic proposition.
More informationSection V.7. Cyclic Extensions
V.7. Cyclic Extensions 1 Section V.7. Cyclic Extensions Note. In the last three sections of this chapter we consider specific types of Galois groups of Galois extensions and then study the properties of
More informationFinite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 25 Finite Fields Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay September 25, 2014 2 / 25 Fields Definition A set F together
More informationA Remark on Certain Filtrations on the Inner Automorphism Groups of Central Division Algebras over Local Number Fields
International Journal of lgebra, Vol. 10, 2016, no. 2, 71-79 HIKRI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.612 Remark on Certain Filtrations on the Inner utomorphism Groups of Central
More informationSkew Cyclic and Quasi-Cyclic Codes of Arbitrary Length over Galois Rings
International Journal of Algebra, Vol. 7, 2013, no. 17, 803-807 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2013.310100 Skew Cyclic and Quasi-Cyclic Codes of Arbitrary Length over Galois
More informationField Theory Qual Review
Field Theory Qual Review Robert Won Prof. Rogalski 1 (Some) qual problems ˆ (Fall 2007, 5) Let F be a field of characteristic p and f F [x] a polynomial f(x) = i f ix i. Give necessary and sufficient conditions
More informationOn Permutation Polynomials over Local Finite Commutative Rings
International Journal of Algebra, Vol. 12, 2018, no. 7, 285-295 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ija.2018.8935 On Permutation Polynomials over Local Finite Commutative Rings Javier
More informationQuasi-reducible Polynomials
Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let
More informationp-adic fields Chapter 7
Chapter 7 p-adic fields In this chapter, we study completions of number fields, and their ramification (in particular in the Galois case). We then look at extensions of the p-adic numbers Q p and classify
More informationPractice problems for first midterm, Spring 98
Practice problems for first midterm, Spring 98 midterm to be held Wednesday, February 25, 1998, in class Dave Bayer, Modern Algebra All rings are assumed to be commutative with identity, as in our text.
More informationAn introduction to the algorithmic of p-adic numbers
An introduction to the algorithmic of p-adic numbers David Lubicz 1 1 Universté de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France Outline Introduction 1 Introduction 2 3 4 5 6 7 8 When do we
More informationOn the image of noncommutative local reciprocity map
On the image of noncommutative local reciprocity map Ivan Fesenko 0. Introduction First steps in the direction of an arithmetic noncommutative local class field theory were described in [] as an attempt
More informationALGEBRA PH.D. QUALIFYING EXAM September 27, 2008
ALGEBRA PH.D. QUALIFYING EXAM September 27, 2008 A passing paper consists of four problems solved completely plus significant progress on two other problems; moreover, the set of problems solved completely
More informationSection VI.33. Finite Fields
VI.33 Finite Fields 1 Section VI.33. Finite Fields Note. In this section, finite fields are completely classified. For every prime p and n N, there is exactly one (up to isomorphism) field of order p n,
More informationElliptic curves: Theory and Applications. Day 4: The discrete logarithm problem.
Elliptic curves: Theory and Applications. Day 4: The discrete logarithm problem. Elisa Lorenzo García Université de Rennes 1 14-09-2017 Elisa Lorenzo García (Rennes 1) Elliptic Curves 4 14-09-2017 1 /
More informationCourse 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography
Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups
More informationGalois theory (Part II)( ) Example Sheet 1
Galois theory (Part II)(2015 2016) Example Sheet 1 c.birkar@dpmms.cam.ac.uk (1) Find the minimal polynomial of 2 + 3 over Q. (2) Let K L be a finite field extension such that [L : K] is prime. Show that
More informationMath 121 Homework 6 Solutions
Math 11 Homework 6 Solutions Problem 14. # 17. Let K/F be any finite extension and let α K. Let L be a Galois extension of F containing K and let H Gal(L/F ) be the subgroup corresponding to K. Define
More informationExtensions of Discrete Valuation Fields
CHAPTER 2 Extensions of Discrete Valuation Fields This chapter studies discrete valuation fields in relation to each other. The first section introduces the class of Henselian fields which are quite similar
More informationSM9 identity-based cryptographic algorithms Part 1: General
SM9 identity-based cryptographic algorithms Part 1: General Contents 1 Scope... 1 2 Terms and definitions... 1 2.1 identity... 1 2.2 master key... 1 2.3 key generation center (KGC)... 1 3 Symbols and abbreviations...
More informationCONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES. Reinier Bröker
CONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES Reinier Bröker Abstract. We give an algorithm that constructs, on input of a prime power q and an integer t, a supersingular elliptic curve over F q with trace
More informationFIXED-POINT FREE ENDOMORPHISMS OF GROUPS RELATED TO FINITE FIELDS
FIXED-POINT FREE ENDOMORPHISMS OF GROUPS RELATED TO FINITE FIELDS LINDSAY N. CHILDS Abstract. Let G = F q β be the semidirect product of the additive group of the field of q = p n elements and the cyclic
More informationarxiv: v1 [math.nt] 2 Jul 2009
About certain prime numbers Diana Savin Ovidius University, Constanţa, Romania arxiv:0907.0315v1 [math.nt] 2 Jul 2009 ABSTRACT We give a necessary condition for the existence of solutions of the Diophantine
More informationA BRIEF INTRODUCTION TO LOCAL FIELDS
A BRIEF INTRODUCTION TO LOCAL FIELDS TOM WESTON The purpose of these notes is to give a survey of the basic Galois theory of local fields and number fields. We cover much of the same material as [2, Chapters
More informationHomework 8 Solutions to Selected Problems
Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x
More informationElliptic curve cryptography. Matthew England MSc Applied Mathematical Sciences Heriot-Watt University
Elliptic curve cryptography Matthew England MSc Applied Mathematical Sciences Heriot-Watt University Summer 2006 Abstract This project studies the mathematics of elliptic curves, starting with their derivation
More informationNumber Theory in Cryptology
Number Theory in Cryptology Abhijit Das Department of Computer Science and Engineering Indian Institute of Technology Kharagpur October 15, 2011 What is Number Theory? Theory of natural numbers N = {1,
More informationSection IV.23. Factorizations of Polynomials over a Field
IV.23 Factorizations of Polynomials 1 Section IV.23. Factorizations of Polynomials over a Field Note. Our experience with classical algebra tells us that finding the zeros of a polynomial is equivalent
More informationLocal Class Field Theory I
CHAPTER 4 Local Class Field Theory I In this chapter we develop the theory of abelian extensions of a local field with finite residue field. The main theorem establishes a correspondence between abelian
More informationDefinition of a finite group
Elliptic curves Definition of a finite group (G, * ) is a finite group if: 1. G is a finite set. 2. For each a and b in G, also a * b is in G. 3. There is an e in G such that for all a in G, a * e= e *
More informationSchool of Mathematics and Statistics. MT5836 Galois Theory. Handout 0: Course Information
MRQ 2017 School of Mathematics and Statistics MT5836 Galois Theory Handout 0: Course Information Lecturer: Martyn Quick, Room 326. Prerequisite: MT3505 (or MT4517) Rings & Fields Lectures: Tutorials: Mon
More informationEvidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs
Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice
More informationSection 33 Finite fields
Section 33 Finite fields Instructor: Yifan Yang Spring 2007 Review Corollary (23.6) Let G be a finite subgroup of the multiplicative group of nonzero elements in a field F, then G is cyclic. Theorem (27.19)
More informationDONG QUAN NGOC NGUYEN
REPRESENTATION OF UNITS IN CYCLOTOMIC FUNCTION FIELDS DONG QUAN NGOC NGUYEN Contents 1 Introduction 1 2 Some basic notions 3 21 The Galois group Gal(K /k) 3 22 Representation of integers in O, and the
More informationMath 121 Homework 2 Solutions
Math 121 Homework 2 Solutions Problem 13.2 #16. Let K/F be an algebraic extension and let R be a ring contained in K that contains F. Prove that R is a subfield of K containing F. We will give two proofs.
More informationContradiction. Theorem 1.9. (Artin) Let G be a finite group of automorphisms of E and F = E G the fixed field of G. Then [E : F ] G.
1. Galois Theory 1.1. A homomorphism of fields F F is simply a homomorphism of rings. Such a homomorphism is always injective, because its kernel is a proper ideal (it doesnt contain 1), which must therefore
More informationSelected exercises from Abstract Algebra by Dummit and Foote (3rd edition).
Selected exercises from Abstract Algebra by Dummit and Foote (3rd edition). Bryan Félix Abril 12, 2017 Section 14.2 Exercise 3. Determine the Galois group of (x 2 2)(x 2 3)(x 2 5). Determine all the subfields
More informationMATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION
MATH 431 PART 2: POLYNOMIAL RINGS AND FACTORIZATION 1. Polynomial rings (review) Definition 1. A polynomial f(x) with coefficients in a ring R is n f(x) = a i x i = a 0 + a 1 x + a 2 x 2 + + a n x n i=0
More informationConstructing Families of Pairing-Friendly Elliptic Curves
Constructing Families of Pairing-Friendly Elliptic Curves David Freeman Information Theory Research HP Laboratories Palo Alto HPL-2005-155 August 24, 2005* cryptography, pairings, elliptic curves, embedding
More informationϕ : Z F : ϕ(t) = t 1 =
1. Finite Fields The first examples of finite fields are quotient fields of the ring of integers Z: let t > 1 and define Z /t = Z/(tZ) to be the ring of congruence classes of integers modulo t: in practical
More informationA SIMPLE PROOF OF KRONECKER-WEBER THEOREM. 1. Introduction. The main theorem that we are going to prove in this paper is the following: Q ab = Q(ζ n )
A SIMPLE PROOF OF KRONECKER-WEBER THEOREM NIZAMEDDIN H. ORDULU 1. Introduction The main theorem that we are going to prove in this paper is the following: Theorem 1.1. Kronecker-Weber Theorem Let K/Q be
More information1 The Galois Group of a Quadratic
Algebra Prelim Notes The Galois Group of a Polynomial Jason B. Hill University of Colorado at Boulder Throughout this set of notes, K will be the desired base field (usually Q or a finite field) and F
More informationElliptic Curves I. The first three sections introduce and explain the properties of elliptic curves.
Elliptic Curves I 1.0 Introduction The first three sections introduce and explain the properties of elliptic curves. A background understanding of abstract algebra is required, much of which can be found
More information1. Group Theory Permutations.
1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7
More informationAbstract Algebra: Chapters 16 and 17
Study polynomials, their factorization, and the construction of fields. Chapter 16 Polynomial Rings Notation Let R be a commutative ring. The ring of polynomials over R in the indeterminate x is the set
More informationSpeeding up the Scalar Multiplication on Binary Huff Curves Using the Frobenius Map
International Journal of Algebra, Vol. 8, 2014, no. 1, 9-16 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2014.311117 Speeding up the Scalar Multiplication on Binary Huff Curves Using the
More informationCourse MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography
Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups
More information14 Ordinary and supersingular elliptic curves
18.783 Elliptic Curves Spring 2015 Lecture #14 03/31/2015 14 Ordinary and supersingular elliptic curves Let E/k be an elliptic curve over a field of positive characteristic p. In Lecture 7 we proved that
More informationFactorization in Integral Domains II
Factorization in Integral Domains II 1 Statement of the main theorem Throughout these notes, unless otherwise specified, R is a UFD with field of quotients F. The main examples will be R = Z, F = Q, and
More informationAlgebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.
More informationMath 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille
Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is
More informationKatherine Stange. ECC 2007, Dublin, Ireland
in in Department of Brown University http://www.math.brown.edu/~stange/ in ECC Computation of ECC 2007, Dublin, Ireland Outline in in ECC Computation of in ECC Computation of in Definition A integer sequence
More informationAlgebraic Number Theory Notes: Local Fields
Algebraic Number Theory Notes: Local Fields Sam Mundy These notes are meant to serve as quick introduction to local fields, in a way which does not pass through general global fields. Here all topological
More informationConstructing Pairing-Friendly Elliptic Curves for Cryptography
Constructing Pairing-Friendly Elliptic Curves for Cryptography University of California, Berkeley, USA 2nd KIAS-KMS Summer Workshop on Cryptography Seoul, Korea 30 June 2007 Outline 1 Pairings in Cryptography
More informationOn a Diophantine Equation 1
International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 2, 73-81 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.728 On a Diophantine Equation 1 Xin Zhang Department
More informationChapter 4 Finite Fields
Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number
More informationName: Solutions Final Exam
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Put your name on each page of your paper. 1. [10 Points] For
More informationInformation Theory. Lecture 7
Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible
More informationMath/Mthe 418/818. Review Questions
Math/Mthe 418/818 Review Questions 1. Show that the number N of bit operations required to compute the product mn of two integers m, n > 1 satisfies N = O(log(m) log(n)). 2. Can φ(n) be computed in polynomial
More informationIntroduction to Elliptic Curve Cryptography. Anupam Datta
Introduction to Elliptic Curve Cryptography Anupam Datta 18-733 Elliptic Curve Cryptography Public Key Cryptosystem Duality between Elliptic Curve Cryptography and Discrete Log Based Cryptography Groups
More informationConstructing Abelian Varieties for Pairing-Based Cryptography
for Pairing-Based CWI and Universiteit Leiden, Netherlands Workshop on Pairings in Arithmetic Geometry and 4 May 2009 s MNT MNT Type s What is pairing-based cryptography? Pairing-based cryptography refers
More information1 Rings 1 RINGS 1. Theorem 1.1 (Substitution Principle). Let ϕ : R R be a ring homomorphism
1 RINGS 1 1 Rings Theorem 1.1 (Substitution Principle). Let ϕ : R R be a ring homomorphism (a) Given an element α R there is a unique homomorphism Φ : R[x] R which agrees with the map ϕ on constant polynomials
More informationRamification Theory. 3.1 Discriminant. Chapter 3
Chapter 3 Ramification Theory This chapter introduces ramification theory, which roughly speaking asks the following question: if one takes a prime (ideal) p in the ring of integers O K of a number field
More informationMATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions
MATH 3030, Abstract Algebra Winter 2012 Toby Kenney Sample Midterm Examination Model Solutions Basic Questions 1. Give an example of a prime ideal which is not maximal. In the ring Z Z, the ideal {(0,
More informationOne can use elliptic curves to factor integers, although probably not RSA moduli.
Elliptic Curves Elliptic curves are groups created by defining a binary operation (addition) on the points of the graph of certain polynomial equations in two variables. These groups have several properties
More informationApplications of Complex Multiplication of Elliptic Curves
Applications of Complex Multiplication of Elliptic Curves MASTER THESIS Candidate: Massimo CHENAL Supervisor: Prof. Jean-Marc COUVEIGNES UNIVERSITÀ DEGLI STUDI DI PADOVA UNIVERSITÉ BORDEAUX 1 Facoltà di
More informationMath 4320 Final Exam
Math 4320 Final Exam 2:00pm 4:30pm, Friday 18th May 2012 Symmetry, as wide or as narrow as you may define its meaning, is one idea by which man through the ages has tried to comprehend and create order,
More informationSection V.8. Cyclotomic Extensions
V.8. Cyclotomic Extensions 1 Section V.8. Cyclotomic Extensions Note. In this section we explore splitting fields of x n 1. The splitting fields turn out to be abelian extensions (that is, algebraic Galois
More informationNon-generic attacks on elliptic curve DLPs
Non-generic attacks on elliptic curve DLPs Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC Summer School Leuven, September 13 2013 Smith
More informationFORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS
Sairaiji, F. Osaka J. Math. 39 (00), 3 43 FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS FUMIO SAIRAIJI (Received March 4, 000) 1. Introduction Let be an elliptic curve over Q. We denote by ˆ
More informationCurves, Cryptography, and Primes of the Form x 2 + y 2 D
Curves, Cryptography, and Primes of the Form x + y D Juliana V. Belding Abstract An ongoing challenge in cryptography is to find groups in which the discrete log problem hard, or computationally infeasible.
More informationA brief overwiev of pairings
Bordeaux November 22, 2016 A brief overwiev of pairings Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Overview pairings 0 / 37 Plan of the lecture Pairings Pairing-friendly curves Progress of NFS attacks
More informationConstructing genus 2 curves over finite fields
Constructing genus 2 curves over finite fields Kirsten Eisenträger The Pennsylvania State University Fq12, Saratoga Springs July 15, 2015 1 / 34 Curves and cryptography RSA: most widely used public key
More informationPrimes of the Form x 2 + ny 2
Primes of the Form x 2 + ny 2 Steven Charlton 28 November 2012 Outline 1 Motivating Examples 2 Quadratic Forms 3 Class Field Theory 4 Hilbert Class Field 5 Narrow Class Field 6 Cubic Forms 7 Modular Forms
More informationTC10 / 3. Finite fields S. Xambó
TC10 / 3. Finite fields S. Xambó The ring Construction of finite fields The Frobenius automorphism Splitting field of a polynomial Structure of the multiplicative group of a finite field Structure of the
More informationFinite Fields. [Parts from Chapter 16. Also applications of FTGT]
Finite Fields [Parts from Chapter 16. Also applications of FTGT] Lemma [Ch 16, 4.6] Assume F is a finite field. Then the multiplicative group F := F \ {0} is cyclic. Proof Recall from basic group theory
More informationMath 201C Homework. Edward Burkard. g 1 (u) v + f 2(u) g 2 (u) v2 + + f n(u) a 2,k u k v a 1,k u k v + k=0. k=0 d
Math 201C Homework Edward Burkard 5.1. Field Extensions. 5. Fields and Galois Theory Exercise 5.1.7. If v is algebraic over K(u) for some u F and v is transcendental over K, then u is algebraic over K(v).
More informationPolynomials with nontrivial relations between their roots
ACTA ARITHMETICA LXXXII.3 (1997) Polynomials with nontrivial relations between their roots by John D. Dixon (Ottawa, Ont.) 1. Introduction. Consider an irreducible polynomial f(x) over a field K. We are
More informationLECTURE 2. Hilbert Symbols
LECTURE 2 Hilbert Symbols Let be a local field over Q p (though any local field suffices) with char() 2. Note that this includes fields over Q 2, since it is the characteristic of the field, and not the
More informationExplicit Methods in Algebraic Number Theory
Explicit Methods in Algebraic Number Theory Amalia Pizarro Madariaga Instituto de Matemáticas Universidad de Valparaíso, Chile amaliapizarro@uvcl 1 Lecture 1 11 Number fields and ring of integers Algebraic
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More information9. Finite fields. 1. Uniqueness
9. Finite fields 9.1 Uniqueness 9.2 Frobenius automorphisms 9.3 Counting irreducibles 1. Uniqueness Among other things, the following result justifies speaking of the field with p n elements (for prime
More informationField Theory Problems
Field Theory Problems I. Degrees, etc. 1. Answer the following: (a Find u R such that Q(u = Q( 2, 3 5. (b Describe how you would find all w Q( 2, 3 5 such that Q(w = Q( 2, 3 5. 2. If a, b K are algebraic
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer 1 Lecture 13 October 16, 2017 (notes revised 10/23/17) 1 Derived from lecture notes by Ewa Syta. CPSC 467, Lecture 13 1/57 Elliptic Curves
More informationAlgorithms for ray class groups and Hilbert class fields
(Quantum) Algorithms for ray class groups and Hilbert class fields Sean Hallgren joint with Kirsten Eisentraeger Penn State 1 Quantum Algorithms Quantum algorithms for number theoretic problems: Factoring
More information= 1 2x. x 2 a ) 0 (mod p n ), (x 2 + 2a + a2. x a ) 2
8. p-adic numbers 8.1. Motivation: Solving x 2 a (mod p n ). Take an odd prime p, and ( an) integer a coprime to p. Then, as we know, x 2 a (mod p) has a solution x Z iff = 1. In this case we can suppose
More informationx mv = 1, v v M K IxI v = 1,
18.785 Number Theory I Fall 2017 Problem Set #7 Description These problems are related to the material covered in Lectures 13 15. Your solutions are to be written up in latex (you can use the latex source
More informationOn attaching coordinates of Gaussian prime torsion points of y 2 = x 3 + x to Q(i)
On attaching coordinates of Gaussian prime torsion points of y 2 = x 3 + x to Q(i) Gordan Savin and David Quarfoot March 29, 2010 1 Background One of the natural questions that arises in the study of abstract
More informationCONSTRUCTION OF THE HILBERT CLASS FIELD OF SOME IMAGINARY QUADRATIC FIELDS. Jangheon Oh
Korean J. Math. 26 (2018), No. 2, pp. 293 297 https://doi.org/10.11568/kjm.2018.26.2.293 CONSTRUCTION OF THE HILBERT CLASS FIELD OF SOME IMAGINARY QUADRATIC FIELDS Jangheon Oh Abstract. In the paper [4],
More informationCHARACTERIZING INTEGERS AMONG RATIONAL NUMBERS WITH A UNIVERSAL-EXISTENTIAL FORMULA
CHARACTERIZING INTEGERS AMONG RATIONAL NUMBERS WITH A UNIVERSAL-EXISTENTIAL FORMULA BJORN POONEN Abstract. We prove that Z in definable in Q by a formula with 2 universal quantifiers followed by 7 existential
More informationRINGS: SUMMARY OF MATERIAL
RINGS: SUMMARY OF MATERIAL BRIAN OSSERMAN This is a summary of terms used and main results proved in the subject of rings, from Chapters 11-13 of Artin. Definitions not included here may be considered
More informationHomework 4 Solutions
Homework 4 Solutions November 11, 2016 You were asked to do problems 3,4,7,9,10 in Chapter 7 of Lang. Problem 3. Let A be an integral domain, integrally closed in its field of fractions K. Let L be a finite
More informationbut no smaller power is equal to one. polynomial is defined to be
13. Radical and Cyclic Extensions The main purpose of this section is to look at the Galois groups of x n a. The first case to consider is a = 1. Definition 13.1. Let K be a field. An element ω K is said
More information18. Cyclotomic polynomials II
18. Cyclotomic polynomials II 18.1 Cyclotomic polynomials over Z 18.2 Worked examples Now that we have Gauss lemma in hand we can look at cyclotomic polynomials again, not as polynomials with coefficients
More information