Cryptography Reference
In-Depth Information
The maps f are (continuous) maps of sets that are required to satisfy the
given condition. Note that g 1 f ( g 2 ) means that we evaluate f ( g 2 )andobtain
an element of M , then act on this element of M by the automorphism g 1 .
The set Z is sometimes called the set of twisted homomorphisms from G
to M . It is a group under addition of maps.
We note one important case. If G acts trivially on M ,then
Z ( G, M ) = Hom( G, M )
is the set of group homomorphisms from G to M .
There is an easy way to construct elements of Z ( G, M ). Let m be a fixed
element of M and define
f m ( g )= gm
m.
Then f m gives a map from G to M .Since
f m ( g 1 g 2 )= g 1 ( g 2 m )
m
= g 1 m
m + g 1 ( g 2 m
m )
= f m ( g 1 )+ g 1 f m ( g 2 ) ,
we have f m ∈ Z ( G, M ). Let
B ( G, M )= {f m | m ∈ M}.
Then B ( G, M ) ⊆ Z ( G, M ) is called the set of coboundaries . Define the
first cohomology group
H 1 ( G, M )= Z/B.
In the important special case where G acts trivially, B ( G, M )=0since
gm − m =0forall g, m . Therefore
H 1 ( G, M ) = Hom( G, M )
is simply the set of group homomorphisms from G to M .
A homomorphism φ : M 1 → M 2 of G -modules induces a map
φ : H j ( G, M 1 ) → H j ( G, M 2 )
of cohomology groups for j =0 , 1. For H 0 , this is simply the restriction of φ
to M 1 . Note that if gm 1 = m 1 ,then ( m 1 )= φ ( gm 1 )= φ ( m 1 ), so φ maps
M 1 into M 2 .For H 1 ,weobtain φ by taking an element f ∈ Z and defining
( φ ( f ))( g )= φ ( f ( g )) .
It is easy to see that this induces a map on cohomology groups.
Themainpropertyweneedisthefollowing.
Search WWH ::




Custom Search