Algebraic Curves an Elementary Introduction
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Arxiv:1912.10980V2 [Math.AG] 28 Jan 2021 6
Automorphisms of real del Pezzo surfaces and the real plane Cremona group Egor Yasinsky* Universität Basel Departement Mathematik und Informatik Spiegelgasse 1, 4051 Basel, Switzerland ABSTRACT. We study automorphism groups of real del Pezzo surfaces, concentrating on finite groups acting with invariant Picard number equal to one. As a result, we obtain a vast part of classification of finite subgroups in the real plane Cremona group. CONTENTS 1. Introduction 2 1.1. The classification problem2 1.2. G-surfaces3 1.3. Some comments on the conic bundle case4 1.4. Notation and conventions6 2. Some auxiliary results7 2.1. A quick look at (real) del Pezzo surfaces7 2.2. Sarkisov links8 2.3. Topological bounds9 2.4. Classical linear groups 10 3. Del Pezzo surfaces of degree 8 10 4. Del Pezzo surfaces of degree 6 13 5. Del Pezzo surfaces of degree 5 16 arXiv:1912.10980v2 [math.AG] 28 Jan 2021 6. Del Pezzo surfaces of degree 4 18 6.1. Topology and equations 18 6.2. Automorphisms 20 6.3. Groups acting minimally on real del Pezzo quartics 21 7. Del Pezzo surfaces of degree 3: cubic surfaces 28 Sylvester non-degenerate cubic surfaces 34 7.1. Clebsch diagonal cubic 35 *[email protected] Keywords: Cremona group, conic bundle, del Pezzo surface, automorphism group, real algebraic surface. 1 2 7.2. Cubic surfaces with automorphism group S4 36 Sylvester degenerate cubic surfaces 37 7.3. Equianharmonic case: Fermat cubic 37 7.4. Non-equianharmonic case 39 7.5. Non-cyclic Sylvester degenerate surfaces 39 8. Del Pezzo surfaces of degree 2 40 9. -
Real Rank Two Geometry Arxiv:1609.09245V3 [Math.AG] 5
Real Rank Two Geometry Anna Seigal and Bernd Sturmfels Abstract The real rank two locus of an algebraic variety is the closure of the union of all secant lines spanned by real points. We seek a semi-algebraic description of this set. Its algebraic boundary consists of the tangential variety and the edge variety. Our study of Segre and Veronese varieties yields a characterization of tensors of real rank two. 1 Introduction Low-rank approximation of tensors is a fundamental problem in applied mathematics [3, 6]. We here approach this problem from the perspective of real algebraic geometry. Our goal is to give an exact semi-algebraic description of the set of tensors of real rank two and to characterize its boundary. This complements the results on tensors of non-negative rank two presented in [1], and it offers a generalization to the setting of arbitrary varieties, following [2]. A familiar example is that of 2 × 2 × 2-tensors (xijk) with real entries. Such a tensor lies in the closure of the real rank two tensors if and only if the hyperdeterminant is non-negative: 2 2 2 2 2 2 2 2 x000x111 + x001x110 + x010x101 + x011x100 + 4x000x011x101x110 + 4x001x010x100x111 −2x000x001x110x111 − 2x000x010x101x111 − 2x000x011x100x111 (1) −2x001x010x101x110 − 2x001x011x100x110 − 2x010x011x100x101 ≥ 0: If this inequality does not hold then the tensor has rank two over C but rank three over R. To understand this example geometrically, consider the Segre variety X = Seg(P1 × P1 × P1), i.e. the set of rank one tensors, regarded as points in the projective space P7 = 2 2 2 7 arXiv:1609.09245v3 [math.AG] 5 Apr 2017 P(C ⊗ C ⊗ C ). -
Examples from Complex Geometry
Examples from Complex Geometry Sam Auyeung November 22, 2019 1 Complex Analysis Example 1.1. Two Heuristic \Proofs" of the Fundamental Theorem of Algebra: Let p(z) be a polynomial of degree n > 0; we can even assume it is a monomial. We also know that the number of zeros is at most n. We show that there are exactly n. 1. Proof 1: Recall that polynomials are entire functions and that Liouville's Theorem says that a bounded entire function is in fact constant. Suppose that p has no roots. Then 1=p is an entire function and it is bounded. Thus, it is constant which means p is a constant polynomial and has degree 0. This contradicts the fact that p has positive degree. Thus, p must have a root α1. We can then factor out (z − α1) from p(z) = (z − α1)q(z) where q(z) is an (n − 1)-degree polynomial. We may repeat the above process until we have a full factorization of p. 2. Proof 2: On the real line, an algorithm for finding a root of a continuous function is to look for when the function changes signs. How do we generalize this to C? Instead of having two directions, we have a whole S1 worth of directions. If we use colors to depict direction and brightness to depict magnitude, we can plot a graph of a continuous function f : C ! C. Near a zero, we'll see all colors represented. If we travel in a loop around any point, we can keep track of whether it passes through all the colors; around a zero, we'll pass through all the colors, possibly many times. -
A Review on Elliptic Curve Cryptography for Embedded Systems
International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011 A REVIEW ON ELLIPTIC CURVE CRYPTOGRAPHY FOR EMBEDDED SYSTEMS Rahat Afreen 1 and S.C. Mehrotra 2 1Tom Patrick Institute of Computer & I.T, Dr. Rafiq Zakaria Campus, Rauza Bagh, Aurangabad. (Maharashtra) INDIA [email protected] 2Department of C.S. & I.T., Dr. B.A.M. University, Aurangabad. (Maharashtra) INDIA [email protected] ABSTRACT Importance of Elliptic Curves in Cryptography was independently proposed by Neal Koblitz and Victor Miller in 1985.Since then, Elliptic curve cryptography or ECC has evolved as a vast field for public key cryptography (PKC) systems. In PKC system, we use separate keys to encode and decode the data. Since one of the keys is distributed publicly in PKC systems, the strength of security depends on large key size. The mathematical problems of prime factorization and discrete logarithm are previously used in PKC systems. ECC has proved to provide same level of security with relatively small key sizes. The research in the field of ECC is mostly focused on its implementation on application specific systems. Such systems have restricted resources like storage, processing speed and domain specific CPU architecture. KEYWORDS Elliptic curve cryptography Public Key Cryptography, embedded systems, Elliptic Curve Digital Signature Algorithm ( ECDSA), Elliptic Curve Diffie Hellman Key Exchange (ECDH) 1. INTRODUCTION The changing global scenario shows an elegant merging of computing and communication in such a way that computers with wired communication are being rapidly replaced to smaller handheld embedded computers using wireless communication in almost every field. This has increased data privacy and security requirements. -
Combination of Cubic and Quartic Plane Curve
IOSR Journal of Mathematics (IOSR-JM) e-ISSN: 2278-5728,p-ISSN: 2319-765X, Volume 6, Issue 2 (Mar. - Apr. 2013), PP 43-53 www.iosrjournals.org Combination of Cubic and Quartic Plane Curve C.Dayanithi Research Scholar, Cmj University, Megalaya Abstract The set of complex eigenvalues of unistochastic matrices of order three forms a deltoid. A cross-section of the set of unistochastic matrices of order three forms a deltoid. The set of possible traces of unitary matrices belonging to the group SU(3) forms a deltoid. The intersection of two deltoids parametrizes a family of Complex Hadamard matrices of order six. The set of all Simson lines of given triangle, form an envelope in the shape of a deltoid. This is known as the Steiner deltoid or Steiner's hypocycloid after Jakob Steiner who described the shape and symmetry of the curve in 1856. The envelope of the area bisectors of a triangle is a deltoid (in the broader sense defined above) with vertices at the midpoints of the medians. The sides of the deltoid are arcs of hyperbolas that are asymptotic to the triangle's sides. I. Introduction Various combinations of coefficients in the above equation give rise to various important families of curves as listed below. 1. Bicorn curve 2. Klein quartic 3. Bullet-nose curve 4. Lemniscate of Bernoulli 5. Cartesian oval 6. Lemniscate of Gerono 7. Cassini oval 8. Lüroth quartic 9. Deltoid curve 10. Spiric section 11. Hippopede 12. Toric section 13. Kampyle of Eudoxus 14. Trott curve II. Bicorn curve In geometry, the bicorn, also known as a cocked hat curve due to its resemblance to a bicorne, is a rational quartic curve defined by the equation It has two cusps and is symmetric about the y-axis. -
Contents 5 Elliptic Curves in Cryptography
Cryptography (part 5): Elliptic Curves in Cryptography (by Evan Dummit, 2016, v. 1.00) Contents 5 Elliptic Curves in Cryptography 1 5.1 Elliptic Curves and the Addition Law . 1 5.1.1 Cubic Curves, Weierstrass Form, Singular and Nonsingular Curves . 1 5.1.2 The Addition Law . 3 5.1.3 Elliptic Curves Modulo p, Orders of Points . 7 5.2 Factorization with Elliptic Curves . 10 5.3 Elliptic Curve Cryptography . 14 5.3.1 Encoding Plaintexts on Elliptic Curves, Quadratic Residues . 14 5.3.2 Public-Key Encryption with Elliptic Curves . 17 5.3.3 Key Exchange and Digital Signatures with Elliptic Curves . 20 5 Elliptic Curves in Cryptography In this chapter, we will introduce elliptic curves and describe how they are used in cryptography. Elliptic curves have a long and interesting history and arise in a wide range of contexts in mathematics. The study of elliptic curves involves elements from most of the major disciplines of mathematics: algebra, geometry, analysis, number theory, topology, and even logic. Elliptic curves appear in the proofs of many deep results in mathematics: for example, they are a central ingredient in the proof of Fermat's Last Theorem, which states that there are no positive integer solutions to the equation xn + yn = zn for any integer n ≥ 3. Our goals are fairly modest in comparison, so we will begin by outlining the basic algebraic and geometric properties of elliptic curves and motivate the addition law. We will then study the behavior of elliptic curves modulo p: ultimately, there is a fairly strong analogy between the structure of the points on an elliptic curve modulo p and the integers modulo n. -
An Efficient Approach to Point-Counting on Elliptic Curves
mathematics Article An Efficient Approach to Point-Counting on Elliptic Curves from a Prominent Family over the Prime Field Fp Yuri Borissov * and Miroslav Markov Department of Mathematical Foundations of Informatics, Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, 1113 Sofia, Bulgaria; [email protected] * Correspondence: [email protected] Abstract: Here, we elaborate an approach for determining the number of points on elliptic curves 2 3 from the family Ep = fEa : y = x + a (mod p), a 6= 0g, where p is a prime number >3. The essence of this approach consists in combining the well-known Hasse bound with an explicit formula for the quantities of interest-reduced modulo p. It allows to advance an efficient technique to compute the 2 six cardinalities associated with the family Ep, for p ≡ 1 (mod 3), whose complexity is O˜ (log p), thus improving the best-known algorithmic solution with almost an order of magnitude. Keywords: elliptic curve over Fp; Hasse bound; high-order residue modulo prime 1. Introduction The elliptic curves over finite fields play an important role in modern cryptography. We refer to [1] for an introduction concerning their cryptographic significance (see, as well, Citation: Borissov, Y.; Markov, M. An the pioneering works of V. Miller and N. Koblitz from 1980’s [2,3]). Briefly speaking, the Efficient Approach to Point-Counting advantage of the so-called elliptic curve cryptography (ECC) over the non-ECC is that it on Elliptic Curves from a Prominent requires smaller keys to provide the same level of security. Family over the Prime Field Fp. -
Hyperelliptic Curves with Many Automorphisms
Hyperelliptic Curves with Many Automorphisms Nicolas M¨uller Richard Pink Department of Mathematics Department of Mathematics ETH Z¨urich ETH Z¨urich 8092 Z¨urich 8092 Z¨urich Switzerland Switzerland [email protected] [email protected] November 17, 2017 To Frans Oort Abstract We determine all complex hyperelliptic curves with many automorphisms and decide which of their jacobians have complex multiplication. arXiv:1711.06599v1 [math.AG] 17 Nov 2017 MSC classification: 14H45 (14H37, 14K22) 1 1 Introduction Let X be a smooth connected projective algebraic curve of genus g > 2 over the field of complex numbers. Following Rauch [17] and Wolfart [21] we say that X has many automorphisms if it cannot be deformed non-trivially together with its automorphism group. Given his life-long interest in special points on moduli spaces, Frans Oort [15, Question 5.18.(1)] asked whether the point in the moduli space of curves associated to a curve X with many automorphisms is special, i.e., whether the jacobian of X has complex multiplication. Here we say that an abelian variety A has complex multiplication over a field K if ◦ EndK(A) contains a commutative, semisimple Q-subalgebra of dimension 2 dim A. (This property is called “sufficiently many complex multiplications” in Chai, Conrad and Oort [6, Def. 1.3.1.2].) Wolfart [22] observed that the jacobian of a curve with many automorphisms does not generally have complex multiplication and answered Oort’s question for all g 6 4. In the present paper we answer Oort’s question for all hyperelliptic curves with many automorphisms. -
Diophantine Problems in Polynomial Theory
Diophantine Problems in Polynomial Theory by Paul David Lee B.Sc. Mathematics, The University of British Columbia, 2009 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE in The College of Graduate Studies (Mathematics) THE UNIVERSITY OF BRITISH COLUMBIA (Okanagan) August 2011 c Paul David Lee 2011 Abstract Algebraic curves and surfaces are playing an increasing role in mod- ern mathematics. From the well known applications to cryptography, to computer vision and manufacturing, studying these curves is a prevalent problem that is appearing more often. With the advancement of computers, dramatic progress has been made in all branches of algebraic computation. In particular, computer algebra software has made it much easier to find rational or integral points on algebraic curves. Computers have also made it easier to obtain rational parametrizations of certain curves and surfaces. Each algebraic curve has an associated genus, essentially a classification, that determines its topological structure. Advancements on methods and theory on curves of genus 0, 1 and 2 have been made in recent years. Curves of genus 0 are the only algebraic curves that you can obtain a rational parametrization for. Curves of genus 1 (also known as elliptic curves) have the property that their rational points have a group structure and thus one can call upon the massive field of group theory to help with their study. Curves of higher genus (such as genus 2) do not have the background and theory that genus 0 and 1 do but recent advancements in theory have rapidly expanded advancements on the topic. -
Determining the Automorphism Group of a Hyperelliptic Curve
Determining the Automorphism Group of a Hyperelliptic Curve ∗ Tanush Shaska Department of Mathematics University of California at Irvine 103 MSTB, Irvine, CA 92697 ABSTRACT 1. INTRODUCTION In this note we discuss techniques for determining the auto- Let Xg be an algebraic curve of genus g defined over an morphism group of a genus g hyperelliptic curve Xg defined algebraically closed field k of characteristic zero. We denote over an algebraically closed field k of characteristic zero. by Aut(Xg) the group of analytic (equivalently, algebraic) The first technique uses the classical GL2(k)-invariants of automorphisms of Xg. Then Aut(Xg) acts on the finite set binary forms. This is a practical method for curves of small of Weierstrass points of Xg. This action is faithful unless genus, but has limitations as the genus increases, due to the Xg is hyperelliptic, in which case its kernel is the group of fact that such invariants are not known for large genus. order 2 containing the hyperelliptic involution of Xg. Thus The second approach, which uses dihedral invariants of in any case, Aut(Xg) is a finite group. This was first proved hyperelliptic curves, is a very convenient method and works by Schwartz. In 1893 Hurwitz discovered what is now called well in all genera. First we define the normal decomposition the Riemann-Hurwitz formula. From this he derived that of a hyperelliptic curve with extra automorphisms. Then dihedral invariants are defined in terms of the coefficients of |Aut(Xg)| ≤ 84 (g − 1) this normal decomposition. We define such invariants inde- which is known as the Hurwitz bound. -
Geometry of Algebraic Curves
Geometry of Algebraic Curves Fall 2011 Course taught by Joe Harris Notes by Atanas Atanasov One Oxford Street, Cambridge, MA 02138 E-mail address: [email protected] Contents Lecture 1. September 2, 2011 6 Lecture 2. September 7, 2011 10 2.1. Riemann surfaces associated to a polynomial 10 2.2. The degree of KX and Riemann-Hurwitz 13 2.3. Maps into projective space 15 2.4. An amusing fact 16 Lecture 3. September 9, 2011 17 3.1. Embedding Riemann surfaces in projective space 17 3.2. Geometric Riemann-Roch 17 3.3. Adjunction 18 Lecture 4. September 12, 2011 21 4.1. A change of viewpoint 21 4.2. The Brill-Noether problem 21 Lecture 5. September 16, 2011 25 5.1. Remark on a homework problem 25 5.2. Abel's Theorem 25 5.3. Examples and applications 27 Lecture 6. September 21, 2011 30 6.1. The canonical divisor on a smooth plane curve 30 6.2. More general divisors on smooth plane curves 31 6.3. The canonical divisor on a nodal plane curve 32 6.4. More general divisors on nodal plane curves 33 Lecture 7. September 23, 2011 35 7.1. More on divisors 35 7.2. Riemann-Roch, finally 36 7.3. Fun applications 37 7.4. Sheaf cohomology 37 Lecture 8. September 28, 2011 40 8.1. Examples of low genus 40 8.2. Hyperelliptic curves 40 8.3. Low genus examples 42 Lecture 9. September 30, 2011 44 9.1. Automorphisms of genus 0 an 1 curves 44 9.2. -
Canonical Heights and Division Polynomials 11
CANONICAL HEIGHTS AND DIVISION POLYNOMIALS ROBIN DE JONG AND J. STEFFEN MULLER¨ Abstract. We discuss a new method to compute the canonical height of an algebraic point on a hyperelliptic jacobian over a number field. The method does not require any geometrical models, neither p-adic nor complex analytic ones. In the case of genus 2 we also present a version that requires no factori- sation at all. The method is based on a recurrence relation for the `division polynomials' associated to hyperelliptic jacobians, and a diophantine approx- imation result due to Faltings. 1. Introduction In [EW] G. Everest and T. Ward show how to approximate to high precision the canonical height of an algebraic point on an elliptic curve E over a number field K with a limit formula using the (recurrence) sequence of division polynomials φn associated to E, and a diophantine approximation result. The φn have natural analogues for jacobians of hyperelliptic curves. In [Uc2] Y. Uchida shows how to obtain recurrence relations for the φn for hyperelliptic jaco- bians of dimension g ≥ 2. Further there exists a suitable analogue of the diophantine approximation result employed by Everest and Ward, proved by G. Faltings. In this paper we derive a limit formula for the canonical height of an algebraic point on a hyperelliptic jacobian from these inputs. We have implemented the resulting method for computing canonical heights in Magma for g = 2. The method does not require geometrical models, neither p-adic nor complex analytic ones. If the curve is defined over Q and the coordinates of the point are integral, then it also requires no factorisation.