A Comparison of Direct and Indirect Methods for Computing Selmer Groups of an Elliptic Curve

نویسندگان

  • Z. Djabri
  • Nigel P. Smart
چکیده

In this paper we examine diierences between the two standard methods for computing the 2-Selmer group of an elliptic curve. In particular we focus on practical diierences in the timings of the two methods. In addition we discuss how to proceed if one fails to determine the rank of the curve from the 2-Selmer group. Finally we mention brieey ongoing research i n to generalizing such methods to the case of computing the 3-Selmer group. Computing the 2-Selmer group is a basic problem in the computational theory of elliptic curves over the rationals. It is, assuming the Tate-Shaferevich group, X, has no 2-primary part, the most eecient way known of computing the rank and generators of the Mordell-Weil group. That we do not have a n a l-gorithm to compute the Mordell-Weil group in general is one of the major open problems in the theory of elliptic curves. The computation of the Mordell-Weil group is basic to many Diophantine problems such as computing the set of integral points on a curve via elliptic logarithms, 11, 222, 21, or verifying the Birch-Swinnerton-Dyer conjecture, 2, 33. Throughout this paper, by an elliptic curve w e shall mean a curve of the form 1 where I ; J2Z Z. W e let = 4 I 3 , J 2 denote the discriminant of the curve. There are currently two methods used to compute the 2-Selmer group, S 2. The rst method, which is essentially part of the standard proof of the Mordell-Weil theorem, uses number eld arithmetic. This method works directly with the Selmer group and can therefore make explicit use of the underlying group structure of the elements. The second method, due to Birch and Swinnerton-Dyer, 22, computes S 2 in an indirect way b y computing a set of binary quartic forms which indirectly represent the elements of S 2 .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the elliptic curves of the form $ y^2=x^3-3px $

By the Mordell-Weil theorem‎, ‎the group of rational points on an elliptic curve over a number field is a finitely generated abelian group‎. ‎There is no known algorithm for finding the rank of this group‎. ‎This paper computes the rank of the family $ E_p:y^2=x^3-3px $ of elliptic curves‎, ‎where p is a prime‎.

متن کامل

Complete characterization of the Mordell-Weil group of some families of elliptic curves

 The Mordell-Weil theorem states that the group of rational points‎ ‎on an elliptic curve over the rational numbers is a finitely‎ ‎generated abelian group‎. ‎In our previous paper, H‎. ‎Daghigh‎, ‎and S‎. ‎Didari‎, On the elliptic curves of the form $ y^2=x^3-3px$‎, ‎‎Bull‎. ‎Iranian Math‎. ‎Soc‎.‎‎ 40 (2014)‎, no‎. ‎5‎, ‎1119--1133‎.‎, ‎using Selmer groups‎, ‎we have shown that for a prime $p...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Refined Iwasawa theory for p-adic representations and the structure of Selmer groups

In this paper, we develop the idea in [16] to obtain finer results on the structure of Selmer modules for p-adic representations than the usual main conjecture in Iwasawa theory. We determine the higher Fitting ideals of the Selmer modules under several assumptions. Especially, we describe the structure of the classical Selmer group of an elliptic curve over Q, using the ideals defined from mod...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998