Cryptography Reference
In-Depth Information
6. V 2 i + 1 =
V i V i + 1
V 1 .
V 1 V i
7. V 2 i + 1 =
V i V i 1
V 1 .
8. V i + j =
V i V j
V i j .
=
g q
=
v 1 +
=
+
=
( v 1 +
+
( v 1 +
Proof Let g
w 1 θ . Then Tr F q 2 / F q ( g )
g
g
w 1 θ )
w 1 (
θ
Aw 1 . S i milarly, g 0
A ))
=
2 v 1
=
1 and the first statement is proven. The second statement
follows from g 1
=
g . Statements 3 to 6 are all special cases of statement 8, which follows
from the equation
g i + j
g i + j
( g i
g i )( g j
g j )
g j g j ( g i j
g i j ) .
V i + j =
+
=
+
+
+
(An alternative proof of Statement 3 is to use the fact that g satisfies g 2
=
V 1 g
1.)
Statement 7 then follows from 3 and 6.
( g i
g i ) / ( g
Exercise 6.3.15 Define U i =
g ). Prove that U i + 1 =
Tr F q 2 / F q ( g ) U i
U i 1 ,
U 2 i =
V i U i , U i + j =
U i U j + 1
U i 1 U j .
Definition 6.3.16 Denote by G q, 2 /
σ
the set of equivalence classes of G q, 2 under the
g q
g 1 . Denote the class of g
g,g q
equivalence relation g
σ ( g )
=
=
G q, 2 by [ g ]
={
}
.
=
Tr F q 2 / F q ( g q ) and so a class [ g ] can be iden-
The main observation is that Tr F q 2 / F q ( g )
tified with the value V
=
Tr F q 2 / F q ( g ). This motivates Definition 6.3.18 . When q is odd,
the classes [1] and [
2 respectively; apart from these
cases, the other possible values for V are those for which the polynomial x 2
1] correspond to V
=
2 and V
=−
Vx
+
1is
irreducible over
F q .
Tr F q 2 / F q ( g )for g,g
G q, 2 then g ∈{
g,g q
Exercise 6.3.17 Prove that if Tr F q 2 / F q ( g )
=
}
.
Hence, show that when q is odd there are 2
+
( q
1) / 2 values for Tr F q 2 / F q ( g ) over g
G q, 2 .
∈ N
The set G q, 2 /
σ
is not a group; however, for a class [ g ]
G q, 2 /
σ
and n
one can
define [ g ] n to be [ g n ].
Definition 6.3.18 Let G q, 2 ={
G q, 2
Tr F q 2 / F q ( g ): g
G q, 2 }
.For V
and n
∈ N
define
Tr F q 2 / F q ( g n ) for any g
[ n ] V
Tr F q 2 / F q ( g ).
It follows that we may treat the set G q, 2 as an algebraic group quotient. One method to
efficiently compute [ n ] V for n
=
G q, 2 such that V
=
∈ F q 2 of x 2
∈ N
is to take a root g
Vx
+
1
=
0, compute
g n in
F q 2 using the square-and-multiply method and then compute Tr F q 2 / F q ( g n ). However,
we want to be able to compute [ n ] V directly using an analogue of the square-and-multiply
method. 5 Lemma 6.3.14 shows that, although V 2 n is determined by V n and n , V n + 1 is not
determined by V n alone. Hence, it is necessary to develop an algorithm that works on a
pair ( V n ,V n 1 ) of consecutive values. Such algorithms are known as ladder methods .One
starts the ladder computation with ( V 1 ,V 0 )
=
( V, 2).
5
In practice, it is often more efficient to use other processes instead of the traditional square-and-multiply method. We refer to
Chapter 3 of [ 520 ] for more details.
 
Search WWH ::




Custom Search