Cryptography Reference
In-Depth Information
PROOF
Write j k = j ( τ k )forsome τ k . Suppose Φ N ( j 1 ,j 2 )=0. Then
j ( τ 1 )= j ( S ( τ 2 )) for some S = ab
∈ S N .
By Corollary 9.19, there
0 d
exists M = st
SL 2 ( Z ) such that ( 1 + t ) / ( 1 + v )= S ( τ 2 ). Writing
uv
τ 1 = ω 1 2 for some basis 1 2 } of L 1 , we see that ( 1 + 2 ) / ( 1 + 2 )=
S ( τ 2 ). But {sω 1 + 2 ,uω 1 + 2 } is another basis for L 1 since M ∈ SL 2 ( Z ).
We conclude that there exist bases
ω ( i )
( i )
{
}
of L i ,for i =1 , 2, such that
1
2
ω (1)
= S ( τ 2 )= (2)
+ (2)
1
ω (1)
1
2
.
(2)
2
2
Let α =( (2)
2 . Therefore αω (1 i ,for
i =1 , 2, is a linear combination with integer coe cients of the basis elements
of L 2 ,so αL 1
+ (2)
) (1)
.Then αω (1)
= (2)
1
2
1
2
L 2 .
As we saw in the proof of Lemma 12.1, the index
[ L 2 : αL 1 ] is the determinant of ab
,whichis N . Therefore, [ α ]givesan
0 d
N -isogeny from C /L 1 to C /L 2 .
Conversely, suppose that there is an N -isogeny [ α ]from C /L 1 to C /L 2 .
Write
α ω (1)
=( a ij ) ω (2)
,
1
ω (1)
1
ω (2)
2
2
as in Lemma 12.1. By Lemma 10.10, we can write
a 11 a 12
a 21 a 22
= b 11 b 12
ab
0 d
b 21 b 22
with ( b ij )
SL 2 ( Z ). Let
=( b ij ) 1 ω (1)
.
ω 1
ω 2
1
ω (1)
2
Then
ω (2)
.
α ω 1
= ab
1
ω (2)
ω 2
0 d
2
Therefore,
= (2)
+ (2)
ω 1
ω 2
= 2 + b
d
1
2
,
(2)
2
where τ 2 = ω (2)
(2)
ω 1 2 }
. The fact that ( b ij )
SL 2 ( Z ) implies that
{
is a
1
2
basis of L 1 .Since j 1 = j ( ω 1 2 ), we obtain
j 1 = j ( S ( τ 2 )) , where S = ab
.
0 d
 
Search WWH ::




Custom Search