Cryptography Reference
In-Depth Information
while the right-hand side is
φ ( P )
=
( φ 1 ( x )
+
yf ( x ) ,
2 ( x )
φ 3 ( x )
a 1 ( φ 1 ( x )
+
yf ( x ))
a 3 ) .
It follows that (2 y
+
a 1 x
+
a 3 ) f ( x ) is a function that is zero for all points ( x,y )
E (
k
).
Since 2 y
+
a 1 x
+
a 3 is not the zero function (if it was zero then
k
( E )
= k
( x,y )
= k
( y ),
which contradicts Theorem 8.6.4 ) it follows that f ( x )
=
0.
It then follows that
2 φ 3 ( x )
=−
a 1 φ 1 ( x )
a 3 +
( a 1 x
+
a 3 ) φ 2 ( x ) .
Lemma 9.6.12 will be refined in Theorem 9.7.5 .
E be as in Lemma 9.6.12 where φ 1 ( x )
Lemma 9.6.13 Let φ : E
=
a ( x ) /b ( x ) . Then the
degree of φ is max
{
deg x ( a ( x )) , deg x ( b ( x ))
}
.
Corollary 25.1.8 will give a more precise version of this result in a special case.
( E )
Proof We have
k
( E )
= k
( x,y ) being a quadratic extension of
k
( x ), and
k
= k
(
x,
y )
1
1
being a quadratic extension of
k
(
x ). Now φ 1 ( x ) gives a morphism φ 1 :
P
→ P
and this
morphism has degree d
=
max
{
deg x ( a ( x )) , deg x ( b ( x ))
}
by Lemma 8.1.9 . It follows that
( x ) is a degree d extension of φ 1 k
k
(
x ). We therefore have the following diagram of field
extensions
k
( E )
2
( E )
k
( x )
k
d
2
k
(
x )
( E )]
( E ): φ k
and it follows that [
k
=
d .
p m for some m
Example 9.6.14 Let p be a prime and let q
=
∈ N
.Let E be an elliptic
F q .The q -power Frobenius map is the rational map π q : E
curve over
E such that
O E it is an isogeny
(this can also be easily seen by explicit computation). If E has equation y 2
O E )
= O E and π q ( x,y )
=
( x q ,y q ). Since π q is a morphism that fixes
π q (
=
F ( x ) (and so q
( x q ,yF ( x ) ( q 1) / 2 ).
is odd) then one can write π q in the form of Lemma 9.6.12 as π q ( x,y )
=
Note that π q is the identity map on E (
F q ) but is not the identity on E (
F q ).
Corollary 9.6.15 Let the notation be as in Example 9.6.14 . The q-power Frobenius map
is inseparable of degree q.
Exercise 9.6.16 Prove Corollary 9.6.15 .
 
Search WWH ::




Custom Search