Chapter 9 Elliptic Curves This is a chapter from version 2.0 of the book “Mathematics of Public Key Cryptogra- phy” by Steven Galbraith, available from http://www.math.auckland.ac.nz/˜sgal018/crypto- book/crypto-book.html The copyright for this chapter is held by Steven Galbraith. This book was published by Cambridge University Press in early 2012. This is the extended and corrected version. Some of the Theorem/Lemma/Exercise numbers may be different in the published version. Please send an email to
[email protected] if youfind any mistakes. This chapter summarises the theory of elliptic curves. Since there are already many outstanding textbooks on elliptic curves (such as Silverman [564] and Washington [626]) we do not give all the details. Our focus is on facts relevant for the cryptographic appli- cations, especially those for which there is not already a suitable reference. 9.1 Group law Recall that an elliptic curve over afieldk is given by a non-singular affine Weierstrass equation 2 3 2 E:y +a 1xy+a 3y=x +a 2x +a 4x+a 6 (9.1) wherea 1, a2, a3, a4, a6 k. There is a unique point E on the projective closure that does not lie on the affine∈ curve. O We recall the formulae for the elliptic curve group law with identity element : For O E allP E(k) we haveP+ E = E +P=P so it remains to consider the case where P ,P∈ E(k) are suchO thatP ,PO= . In other words,P andP are affine points and 1 2 ∈ 1 2 6 O E 1 2 so writeP 1 = (x1, y1) andP 2 = (x2, y2).