A Nontrivial Algebraic Cycle in the Jacobian Variety of the Fermat Sextic
نویسنده
چکیده
B. Harris [5] defined the harmonic volume for the compact Riemann surface X of genus g ≥ 3, using Chen’s iterated integrals [2]. Let J(X) be the Jacobian variety of X. By the Abel-Jacobi map X → J(X), X is embedded in J(X). By a consideration of the special harmonic volume, Harris [6] proved that the algebraic cycle F (4)−F (4) is not algebraically equivalent to zero in J(F (4)). Here, F (4) is the Fermat quartic, which is a compact Riemann surface of genus 3. Ceresa [1] showed that the algebraic cycle X −X− is not algebraically equivalent to zero in J(X) for a generic X. We know few explicit nontrivial examples except for F (4). Harris [7] used the special feature of F (4) that its normalized period matrix has entries in a discrete subring of C. The Fermat sextic F (6) has the same feature. We use this and prove
منابع مشابه
A Nontrivial Algebraic Cycle in the Jacobian Variety of the Klein Quartic
Let X be a compact Riemann surface of genus g ≥ 2 and J(X) its Jacobian variety. By the Abel-Jacobi map X → J(X), X is embedded in J(X). The algebraic 1-cycle X −X− in J(X) is homologous to zero. Here we denote by X the image of X under the multiplication map by −1. If X is hyperelliptic, X = X in J(X). For the rest of this paper, suppose g ≥ 3. B. Harris [5] studied the problem whether the cyc...
متن کاملDually quasi-De Morgan Stone semi-Heyting algebras I. Regularity
This paper is the first of a two part series. In this paper, we first prove that the variety of dually quasi-De Morgan Stone semi-Heyting algebras of level 1 satisfies the strongly blended $lor$-De Morgan law introduced in cite{Sa12}. Then, using this result and the results of cite{Sa12}, we prove our main result which gives an explicit description of simple algebras(=subdirectly irreducibles) ...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملDeformation of Outer Representations of Galois Group
To a hyperbolic smooth curve defined over a number-field one naturally associates an "anabelian" representation of the absolute Galois group of the base field landing in outer automorphism group of the algebraic fundamental group. In this paper, we introduce several deformation problems for Lie-algebra versions of the above representation and show that, this way we get a richer structure than t...
متن کاملde Bordeaux 16 (2004), 577–585 The cuspidal torsion packet on hyperelliptic Fermat quotients
Let ` ≥ 7 be a prime, C be the non-singular projective curve defined over Q by the affine model y(1 − y) = x, ∞ the point of C at infinity on this model, J the Jacobian of C, and φ : C → J the albanese embedding with ∞ as base point. Let Q be an algebraic closure of Q. Taking care of a case not covered in [12], we show that φ(C)∩Jtors(Q) consists only of the image under φ of the Weierstrass poi...
متن کامل