Cryptography Reference
In-Depth Information
of X 0 ( )(
k
) corresponds to a pair ( E,G ) where E is an elliptic curve over
k
and where
G is a cyclic subgroup of E , defined over
, of order . Note that it is possible to have
an elliptic curve E together with two distinct cyclic subgroups G 1 and G 2 of order such
that the image curves E/G 1 and E/G 2 are isomorphic; in this case ( E,G 1 ) and ( E,G 2 )
are distinct points of X 0 ( ) but correspond to a repeated root of ( j ( E ) ,y ) (it follows
from the symmetry of ( x,y ) that this is a singular point on the model). In other words,
a repeated root of ( j ( E ) ,y ) corresponds to non-equivalent -isogenies from E to some
elliptic curve E .
Since there are
k
+
1 cyclic subgroups of E [ ] it follows that ( j ( E ) ,y ) has degree
+
=
x + 1
+
y + 1
( xy )
+···
1. Indeed, ( x,y )
with all other terms of lower degree (see
Theorem 11.18 of Cox [ 145 ] or Theorem 3 of Section 5.2 of Lang [ 328 ]). The coefficients
of ( x,y ) are large (as seen in Example 25.2.1 , even when
=
2 the coefficients are
large).
Example 25.2.1
x 3
y 3
x 2 y 2
1488( x 2 y
xy 2 )
162000( x 2
y 2 )
2 ( x,y )
=
+
+
+
+
+
40773375 xy
+
8748000000( x
+
y )
157464000000000 .
Let be prime. Cohen [ 128 ] showed that the number of bits in the largest coeffi-
cient of ( x,y )is O ( log( )) (see Br oker and Sutherland [ 103 ] for a more precise
bound). Since there are roughly 2 coefficients it follows that ( x,y ) can be written down
using O ( 3 log( )) bits, and it is believed that this space requirement cannot be reduced.
Hence, one expects to perform at least O ( 3 log( ))
O ( 3 + ) bit operations 3 to compute
( x,y ). Indeed, using methods based on modular functions, one can conjecturally 4 com-
pute ( x,y )in O ( 3 + ) bit operations (see Enge [ 179 ]). Using modular functions other
than the j -function can lead to polynomials with smaller coefficients, but this does not
affect the asymptotic complexity.
The fastest method to compute modular polynomials is due to Broker, Lauter and
Sutherland [ 102 ]. This method exploits some of the ideas explained later in this chapter
(in particular, isogeny volcanoes). The method computes ( x,y ) modulo small primes
and then determines ( x,y ) by the Chinese remainder theorem. Under the Generalised
Riemann Hypothesis (GRH) the complexity is O ( 3 log( ) 3 log(log( ))) bit operations. For
the rest of the chapter we abbreviate the cost as O ( 3 + ) bit operations. The method can
also be used to compute ( x,y ) modulo p , in which case the space requirements are
O ( 2 log( ) 2
=
2 log( p )) bits.
The upshot is that, given an elliptic curve E over
+
k
,the j -invariants of elliptic curves
E that are -isogenous over
k
(where gcd( , char(
k
))
=
1) are given by the roots of
( j ( E ) ,y )in
k
. When E is ordinary, Theorem 25.4.6 implies that ( j ( E ) ,y ) has either
0 , 1 , 2or
+
1 roots in
k
(counted with multiplicities).
3
Recall that a function f ( )is O ( 3 + ) if, for every > 0, there is some C ( ) ,L ( ) ∈ R > 0 such that f ( ) <C ( ) 3 + for all
>L ( ).
4
Enge needs an assumption that rounding errors do not affect the correctness of the output.
Search WWH ::




Custom Search