Cryptography Reference
In-Depth Information
Therefore,
3
1
f
3
=3
℘
4
16
g
2
=3
℘
4
+6
A℘
2
+12
B℘ − A
2
=
ψ
3
(
℘
)
.
2
g
2
℘
2
−
−
3
g
3
℘
−
This proves the lemma for
n
=3.
By Equation (9.7) in Section 9.2, we have
℘
(2
z
)
2
℘
(
z
)
℘
(2
z
+
z
)=
1
4
−
− ℘
(2
z
)
− ℘
(
z
)
℘
(2
z
)
−
℘
(
z
)
and
℘
(2
z
)+
℘
(
z
)
℘
(2
z
)
− ℘
(
z
)
2
℘
(2
z − z
)=
1
4
− ℘
(2
z
)
− ℘
(
z
)
.
Therefore,
f
4
f
2
f
3
−
=
℘
(3
z
)
−
℘
(
z
)
℘
(2
z
)
−
℘
(
z
)
℘
(2
z
)
− ℘
(
z
)
2
℘
(2
z
)+
℘
(
z
)
℘
(2
z
)
− ℘
(
z
)
2
1
4
1
4
=
−
℘
(2
z
)
℘
(
z
)
(
℘
(2
z
)
− ℘
(
z
))
2
=
−
℘
(2
z
)
℘
(
z
)
(
−f
3
/℘
(
z
)
2
)
2
=
−
(by Equation 9.25)
℘
(2
z
)
℘
(
z
)
5
f
3
=
−
.
1
This yields
f
4
f
2
=
℘
(2
z
)
℘
(
z
)
5
. We know that
2
℘
(2
z
)isthe
y
-coordinate of
2
℘
(
z
)), which means that
℘
(2
z
) can be expressed in terms of
℘
(
z
)
and
℘
(
z
), using the formulas for the group law. When this is done, we obtain
f
4
=
ψ
4
℘,
1
1
2(
℘
(
z
)
,
2
℘
,
so the lemma is true for
n
=4.
Since the
f
n
's satisfy the same recurrence relations as the
ψ
n
's (see Lem-
mas 9.29 and 9.30 and the definition of the
ψ
n
's), and since the lemma holds
for enough small values of
n
, the lemma now follows for all
n
.
LEMMA 9.32
℘
(
nz
)=
f
2
n
f
n
.
Search WWH ::
Custom Search