Cryptography Reference
In-Depth Information
SL 2 ( Z ), as in Proposition 9.14. Then, by Proposition 9.13,
j ( τ 1 )= j ( τ 1 )= j ( τ 2 )= j ( τ 2 ) .
By Corollary 9.18, τ 1 = τ 2 . Since an element of SL 2 ( Z )maps τ 1 to τ 1 ,and
an element of SL 2 ( Z )maps τ 1 = τ 2 to τ 2 , the product of these two matrices
(see Exercise 9.2) maps τ 1 to τ 2 , as desired.
There is also a version of Corollary 9.19 for lattices (the j -invariant of a
lattice is defined on page 276).
COROLLARY 9.20
Let L 1 ,L 2 C be lattices. T hen j ( L 1 )= j ( L 2 ) ifand onlyifthere exists
0
= λ
C su ch that λL 1 = L 2 .
PROOF One direction was proved on page 276. Conversely, suppose
j ( L 1 )= j ( L 2 ). Write L i =( λ i )( Z τ i + Z )with τ i ∈F , as in Corollary 9.15.
Then j ( τ 1 )= j ( L 1 )= j ( L 2 )= j ( τ 2 ), so Corollary 9.18 implies that τ 1 = τ 2 .
Let λ = λ 2 1 .Then λL 1 = L 2 .
We can now show that every elliptic curve over C corresponds to a torus.
THEOREM 9.21
Let y 2 =4 x 3
− Ax − B define an ellipticcurve E over C .Thenthere isa
lattice L su ch that
g 2 ( L )= A
and g 3 ( L )= B.
Thereisanisom orphism of groups
C /L E ( C ) .
PROOF
Let
A 3
27 B 2 .
By Corollary 9.18, there exists a lattice L = Z τ + Z such that j ( τ )= j ( L )= j .
Assume first that g 2 ( L )
j = 1728
A 3
C ×
=0. Then j = j ( L )
=0,so A
= 0. Choose λ
such that
g 2 ( λL )= λ 4 g 2 ( L )= A.
The equality j = j ( L ) implies that
g 3 ( λL ) 2 = B 2 ,
so g 3 ( λL )= ±B .If g 3 ( λL )= B , we're done. If g 3 ( λL )= −B ,then
g 3 ( iλL )= i 6 g 3 ( λL )= B
g 2 ( iλL )= i 4 g 2 ( λL )= A.
and
Search WWH ::




Custom Search