Cryptography Reference
In-Depth Information
9.14 Elliptic curves over rings
The elliptic curve factoring method (and some other theoretical applications in cryp-
tography) use elliptic curves over the ring
= i = 1 p i is square-free 5
one can use the Chinese remainder theorem to interpret a triple ( x,y,z ) such that
y 2 z
Z
/N
Z
. When N
a 3 yz 2
x 3
a 2 x 2 z
a 4 xz 2
a 6 z 3
+
a 1 xyz
+
+
+
+
(mod N ) as an element of the direct
i
sum
F p i ) of groups of elliptic curves over fields. It is essential to use the projec-
tive representation, since there can be points that are the point at infinity modulo p 1 but
not the point at infinity modulo p 2 (in other words, p 1 |
1 E (
=
z but p 2
z ). Considering triples
( x,y,z ) such that gcd( x,y,z )
1 (otherwise, the point modulo some prime is (0 , 0 , 0))
up to multiplication by elements in (
=
Z
Z
) leads to a projective elliptic curve point in
/N
Z
Z
E (
). The usual formulae for the group operations can be used modulo N and, when
they are defined, give a group law. We refer to Section 2.11 of Washington [ 560 ]fora
detailed discussion, including a set of formulae for all cases of the group law. For a more
theoretical discussion we refer to Lenstra [ 339 , 340 ].
/N
5 The non-square-free case is more subtle. We do not discuss it.
Search WWH ::




Custom Search