Geometry of Algebraic Curves
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Kernelization of the Subset General Position Problem in Geometry Jean-Daniel Boissonnat, Kunal Dutta, Arijit Ghosh, Sudeshna Kolay
Kernelization of the Subset General Position problem in Geometry Jean-Daniel Boissonnat, Kunal Dutta, Arijit Ghosh, Sudeshna Kolay To cite this version: Jean-Daniel Boissonnat, Kunal Dutta, Arijit Ghosh, Sudeshna Kolay. Kernelization of the Subset General Position problem in Geometry. MFCS 2017 - 42nd International Symposium on Mathematical Foundations of Computer Science, Aug 2017, Alborg, Denmark. 10.4230/LIPIcs.MFCS.2017.25. hal-01583101 HAL Id: hal-01583101 https://hal.inria.fr/hal-01583101 Submitted on 6 Sep 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Kernelization of the Subset General Position problem in Geometry Jean-Daniel Boissonnat1, Kunal Dutta1, Arijit Ghosh2, and Sudeshna Kolay3 1 INRIA Sophia Antipolis - Méditerranée, France 2 Indian Statistical Institute, Kolkata, India 3 Eindhoven University of Technology, Netherlands. Abstract In this paper, we consider variants of the Geometric Subset General Position problem. In defining this problem, a geometric subsystem is specified, like a subsystem of lines, hyperplanes or spheres. The input of the problem is a set of n points in Rd and a positive integer k. The objective is to find a subset of at least k input points such that this subset is in general position with respect to the specified subsystem. -
Arxiv:1912.10980V2 [Math.AG] 28 Jan 2021 6
Automorphisms of real del Pezzo surfaces and the real plane Cremona group Egor Yasinsky* Universität Basel Departement Mathematik und Informatik Spiegelgasse 1, 4051 Basel, Switzerland ABSTRACT. We study automorphism groups of real del Pezzo surfaces, concentrating on finite groups acting with invariant Picard number equal to one. As a result, we obtain a vast part of classification of finite subgroups in the real plane Cremona group. CONTENTS 1. Introduction 2 1.1. The classification problem2 1.2. G-surfaces3 1.3. Some comments on the conic bundle case4 1.4. Notation and conventions6 2. Some auxiliary results7 2.1. A quick look at (real) del Pezzo surfaces7 2.2. Sarkisov links8 2.3. Topological bounds9 2.4. Classical linear groups 10 3. Del Pezzo surfaces of degree 8 10 4. Del Pezzo surfaces of degree 6 13 5. Del Pezzo surfaces of degree 5 16 arXiv:1912.10980v2 [math.AG] 28 Jan 2021 6. Del Pezzo surfaces of degree 4 18 6.1. Topology and equations 18 6.2. Automorphisms 20 6.3. Groups acting minimally on real del Pezzo quartics 21 7. Del Pezzo surfaces of degree 3: cubic surfaces 28 Sylvester non-degenerate cubic surfaces 34 7.1. Clebsch diagonal cubic 35 *[email protected] Keywords: Cremona group, conic bundle, del Pezzo surface, automorphism group, real algebraic surface. 1 2 7.2. Cubic surfaces with automorphism group S4 36 Sylvester degenerate cubic surfaces 37 7.3. Equianharmonic case: Fermat cubic 37 7.4. Non-equianharmonic case 39 7.5. Non-cyclic Sylvester degenerate surfaces 39 8. Del Pezzo surfaces of degree 2 40 9. -
Homology Stratifications and Intersection Homology 1 Introduction
ISSN 1464-8997 (on line) 1464-8989 (printed) 455 Geometry & Topology Monographs Volume 2: Proceedings of the Kirbyfest Pages 455–472 Homology stratifications and intersection homology Colin Rourke Brian Sanderson Abstract A homology stratification is a filtered space with local ho- mology groups constant on strata. Despite being used by Goresky and MacPherson [3] in their proof of topological invariance of intersection ho- mology, homology stratifications do not appear to have been studied in any detail and their properties remain obscure. Here we use them to present a simplified version of the Goresky–MacPherson proof valid for PL spaces, and we ask a number of questions. The proof uses a new technique, homology general position, which sheds light on the (open) problem of defining generalised intersection homology. AMS Classification 55N33, 57Q25, 57Q65; 18G35, 18G60, 54E20, 55N10, 57N80, 57P05 Keywords Permutation homology, intersection homology, homology stratification, homology general position Rob Kirby has been a great source of encouragement. His help in founding the new electronic journal Geometry & Topology has been invaluable. It is a great pleasure to dedicate this paper to him. 1 Introduction Homology stratifications are filtered spaces with local homology groups constant on strata; they include stratified sets as special cases. Despite being used by Goresky and MacPherson [3] in their proof of topological invariance of intersec- tion homology, they do not appear to have been studied in any detail and their properties remain obscure. It is the purpose of this paper is to publicise these neglected but powerful tools. The main result is that the intersection homology groups of a PL homology stratification are given by singular cycles meeting the strata with appropriate dimension restrictions. -
Real Rank Two Geometry Arxiv:1609.09245V3 [Math.AG] 5
Real Rank Two Geometry Anna Seigal and Bernd Sturmfels Abstract The real rank two locus of an algebraic variety is the closure of the union of all secant lines spanned by real points. We seek a semi-algebraic description of this set. Its algebraic boundary consists of the tangential variety and the edge variety. Our study of Segre and Veronese varieties yields a characterization of tensors of real rank two. 1 Introduction Low-rank approximation of tensors is a fundamental problem in applied mathematics [3, 6]. We here approach this problem from the perspective of real algebraic geometry. Our goal is to give an exact semi-algebraic description of the set of tensors of real rank two and to characterize its boundary. This complements the results on tensors of non-negative rank two presented in [1], and it offers a generalization to the setting of arbitrary varieties, following [2]. A familiar example is that of 2 × 2 × 2-tensors (xijk) with real entries. Such a tensor lies in the closure of the real rank two tensors if and only if the hyperdeterminant is non-negative: 2 2 2 2 2 2 2 2 x000x111 + x001x110 + x010x101 + x011x100 + 4x000x011x101x110 + 4x001x010x100x111 −2x000x001x110x111 − 2x000x010x101x111 − 2x000x011x100x111 (1) −2x001x010x101x110 − 2x001x011x100x110 − 2x010x011x100x101 ≥ 0: If this inequality does not hold then the tensor has rank two over C but rank three over R. To understand this example geometrically, consider the Segre variety X = Seg(P1 × P1 × P1), i.e. the set of rank one tensors, regarded as points in the projective space P7 = 2 2 2 7 arXiv:1609.09245v3 [math.AG] 5 Apr 2017 P(C ⊗ C ⊗ C ). -
Examples from Complex Geometry
Examples from Complex Geometry Sam Auyeung November 22, 2019 1 Complex Analysis Example 1.1. Two Heuristic \Proofs" of the Fundamental Theorem of Algebra: Let p(z) be a polynomial of degree n > 0; we can even assume it is a monomial. We also know that the number of zeros is at most n. We show that there are exactly n. 1. Proof 1: Recall that polynomials are entire functions and that Liouville's Theorem says that a bounded entire function is in fact constant. Suppose that p has no roots. Then 1=p is an entire function and it is bounded. Thus, it is constant which means p is a constant polynomial and has degree 0. This contradicts the fact that p has positive degree. Thus, p must have a root α1. We can then factor out (z − α1) from p(z) = (z − α1)q(z) where q(z) is an (n − 1)-degree polynomial. We may repeat the above process until we have a full factorization of p. 2. Proof 2: On the real line, an algorithm for finding a root of a continuous function is to look for when the function changes signs. How do we generalize this to C? Instead of having two directions, we have a whole S1 worth of directions. If we use colors to depict direction and brightness to depict magnitude, we can plot a graph of a continuous function f : C ! C. Near a zero, we'll see all colors represented. If we travel in a loop around any point, we can keep track of whether it passes through all the colors; around a zero, we'll pass through all the colors, possibly many times. -
A Review on Elliptic Curve Cryptography for Embedded Systems
International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011 A REVIEW ON ELLIPTIC CURVE CRYPTOGRAPHY FOR EMBEDDED SYSTEMS Rahat Afreen 1 and S.C. Mehrotra 2 1Tom Patrick Institute of Computer & I.T, Dr. Rafiq Zakaria Campus, Rauza Bagh, Aurangabad. (Maharashtra) INDIA [email protected] 2Department of C.S. & I.T., Dr. B.A.M. University, Aurangabad. (Maharashtra) INDIA [email protected] ABSTRACT Importance of Elliptic Curves in Cryptography was independently proposed by Neal Koblitz and Victor Miller in 1985.Since then, Elliptic curve cryptography or ECC has evolved as a vast field for public key cryptography (PKC) systems. In PKC system, we use separate keys to encode and decode the data. Since one of the keys is distributed publicly in PKC systems, the strength of security depends on large key size. The mathematical problems of prime factorization and discrete logarithm are previously used in PKC systems. ECC has proved to provide same level of security with relatively small key sizes. The research in the field of ECC is mostly focused on its implementation on application specific systems. Such systems have restricted resources like storage, processing speed and domain specific CPU architecture. KEYWORDS Elliptic curve cryptography Public Key Cryptography, embedded systems, Elliptic Curve Digital Signature Algorithm ( ECDSA), Elliptic Curve Diffie Hellman Key Exchange (ECDH) 1. INTRODUCTION The changing global scenario shows an elegant merging of computing and communication in such a way that computers with wired communication are being rapidly replaced to smaller handheld embedded computers using wireless communication in almost every field. This has increased data privacy and security requirements. -
Combination of Cubic and Quartic Plane Curve
IOSR Journal of Mathematics (IOSR-JM) e-ISSN: 2278-5728,p-ISSN: 2319-765X, Volume 6, Issue 2 (Mar. - Apr. 2013), PP 43-53 www.iosrjournals.org Combination of Cubic and Quartic Plane Curve C.Dayanithi Research Scholar, Cmj University, Megalaya Abstract The set of complex eigenvalues of unistochastic matrices of order three forms a deltoid. A cross-section of the set of unistochastic matrices of order three forms a deltoid. The set of possible traces of unitary matrices belonging to the group SU(3) forms a deltoid. The intersection of two deltoids parametrizes a family of Complex Hadamard matrices of order six. The set of all Simson lines of given triangle, form an envelope in the shape of a deltoid. This is known as the Steiner deltoid or Steiner's hypocycloid after Jakob Steiner who described the shape and symmetry of the curve in 1856. The envelope of the area bisectors of a triangle is a deltoid (in the broader sense defined above) with vertices at the midpoints of the medians. The sides of the deltoid are arcs of hyperbolas that are asymptotic to the triangle's sides. I. Introduction Various combinations of coefficients in the above equation give rise to various important families of curves as listed below. 1. Bicorn curve 2. Klein quartic 3. Bullet-nose curve 4. Lemniscate of Bernoulli 5. Cartesian oval 6. Lemniscate of Gerono 7. Cassini oval 8. Lüroth quartic 9. Deltoid curve 10. Spiric section 11. Hippopede 12. Toric section 13. Kampyle of Eudoxus 14. Trott curve II. Bicorn curve In geometry, the bicorn, also known as a cocked hat curve due to its resemblance to a bicorne, is a rational quartic curve defined by the equation It has two cusps and is symmetric about the y-axis. -
Contents 5 Elliptic Curves in Cryptography
Cryptography (part 5): Elliptic Curves in Cryptography (by Evan Dummit, 2016, v. 1.00) Contents 5 Elliptic Curves in Cryptography 1 5.1 Elliptic Curves and the Addition Law . 1 5.1.1 Cubic Curves, Weierstrass Form, Singular and Nonsingular Curves . 1 5.1.2 The Addition Law . 3 5.1.3 Elliptic Curves Modulo p, Orders of Points . 7 5.2 Factorization with Elliptic Curves . 10 5.3 Elliptic Curve Cryptography . 14 5.3.1 Encoding Plaintexts on Elliptic Curves, Quadratic Residues . 14 5.3.2 Public-Key Encryption with Elliptic Curves . 17 5.3.3 Key Exchange and Digital Signatures with Elliptic Curves . 20 5 Elliptic Curves in Cryptography In this chapter, we will introduce elliptic curves and describe how they are used in cryptography. Elliptic curves have a long and interesting history and arise in a wide range of contexts in mathematics. The study of elliptic curves involves elements from most of the major disciplines of mathematics: algebra, geometry, analysis, number theory, topology, and even logic. Elliptic curves appear in the proofs of many deep results in mathematics: for example, they are a central ingredient in the proof of Fermat's Last Theorem, which states that there are no positive integer solutions to the equation xn + yn = zn for any integer n ≥ 3. Our goals are fairly modest in comparison, so we will begin by outlining the basic algebraic and geometric properties of elliptic curves and motivate the addition law. We will then study the behavior of elliptic curves modulo p: ultimately, there is a fairly strong analogy between the structure of the points on an elliptic curve modulo p and the integers modulo n. -
Interpolation
Current Developments in Algebraic Geometry MSRI Publications Volume 59, 2011 Interpolation JOE HARRIS This is an overview of interpolation problems: when, and how, do zero- dimensional schemes in projective space fail to impose independent conditions on hypersurfaces? 1. The interpolation problem 165 2. Reduced schemes 167 3. Fat points 170 4. Recasting the problem 174 References 175 1. The interpolation problem We give an overview of the exciting class of problems in algebraic geometry known as interpolation problems: basically, when points (or more generally zero-dimensional schemes) in projective space may fail to impose independent conditions on polynomials of a given degree, and by how much. We work over an arbitrary field K . Our starting point is this elementary theorem: Theorem 1.1. Given any z1;::: zdC1 2 K and a1;::: adC1 2 K , there is a unique f 2 K TzU of degree at most d such that f .zi / D ai ; i D 1;:::; d C 1: More generally: Theorem 1.2. Given any z1;:::; zk 2 K , natural numbers m1;:::; mk 2 N with P mi D d C 1, and ai; j 2 K; 1 ≤ i ≤ kI 0 ≤ j ≤ mi − 1; there is a unique f 2 K TzU of degree at most d such that . j/ f .zi / D ai; j for all i; j: The problem we’ll address here is simple: What can we say along the same lines for polynomials in several variables? 165 166 JOE HARRIS First, introduce some language/notation. The “starting point” statement Theorem 1.1 says that the evaluation map 0 ! L H .ᏻP1 .d// K pi is surjective; or, equivalently, 1 D h .Ᏽfp1;:::;peg.d// 0 1 for any distinct points p1;:::; pe 2 P whenever e ≤ d C 1. -
Algebraic Curves and Surfaces
Notes for Curves and Surfaces Instructor: Robert Freidman Henry Liu April 25, 2017 Abstract These are my live-texed notes for the Spring 2017 offering of MATH GR8293 Algebraic Curves & Surfaces . Let me know when you find errors or typos. I'm sure there are plenty. 1 Curves on a surface 1 1.1 Topological invariants . 1 1.2 Holomorphic invariants . 2 1.3 Divisors . 3 1.4 Algebraic intersection theory . 4 1.5 Arithmetic genus . 6 1.6 Riemann{Roch formula . 7 1.7 Hodge index theorem . 7 1.8 Ample and nef divisors . 8 1.9 Ample cone and its closure . 11 1.10 Closure of the ample cone . 13 1.11 Div and Num as functors . 15 2 Birational geometry 17 2.1 Blowing up and down . 17 2.2 Numerical invariants of X~ ...................................... 18 2.3 Embedded resolutions for curves on a surface . 19 2.4 Minimal models of surfaces . 23 2.5 More general contractions . 24 2.6 Rational singularities . 26 2.7 Fundamental cycles . 28 2.8 Surface singularities . 31 2.9 Gorenstein condition for normal surface singularities . 33 3 Examples of surfaces 36 3.1 Rational ruled surfaces . 36 3.2 More general ruled surfaces . 39 3.3 Numerical invariants . 41 3.4 The invariant e(V ).......................................... 42 3.5 Ample and nef cones . 44 3.6 del Pezzo surfaces . 44 3.7 Lines on a cubic and del Pezzos . 47 3.8 Characterization of del Pezzo surfaces . 50 3.9 K3 surfaces . 51 3.10 Period map . 54 a 3.11 Elliptic surfaces . -
Curvature Theorems on Polar Curves
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES Volume 33 March 15, 1947 Number 3 CURVATURE THEOREMS ON POLAR CUR VES* By EDWARD KASNER AND JOHN DE CICCO DEPARTMENT OF MATHEMATICS, COLUMBIA UNIVERSITY, NEW YoRK Communicated February 4, 1947 1. The principle of duality in projective geometry is based on the theory of poles and polars with respect to a conic. For a conic, a point has only one kind of polar, the first polar, or polar straight line. However, for a general algebraic curve of higher degree n, a point has not only the first polar of degree n - 1, but also the second polar of degree n - 2, the rth polar of degree n - r, :. ., the (n - 1) polar of degree 1. This last polar is a straight line. The general polar theory' goes back to Newton, and was developed by Bobillier, Cayley, Salmon, Clebsch, Aronhold, Clifford and Mayer. For a given curve Cn of degree n, the first polar of any point 0 of the plane is a curve C.-1 of degree n - 1. If 0 is a point of C, it is well known that the polar curve C,,- passes through 0 and touches the given curve Cn at 0. However, the two curves do not have the same curvature. We find that the ratio pi of the curvature of C,- i to that of Cn is Pi = (n -. 2)/(n - 1). For example, if the given curve is a cubic curve C3, the first polar is a conic C2, and at an ordinary point 0 of C3, the ratio of the curvatures is 1/2. -
Hyperelliptic Curves with Many Automorphisms
Hyperelliptic Curves with Many Automorphisms Nicolas M¨uller Richard Pink Department of Mathematics Department of Mathematics ETH Z¨urich ETH Z¨urich 8092 Z¨urich 8092 Z¨urich Switzerland Switzerland [email protected] [email protected] November 17, 2017 To Frans Oort Abstract We determine all complex hyperelliptic curves with many automorphisms and decide which of their jacobians have complex multiplication. arXiv:1711.06599v1 [math.AG] 17 Nov 2017 MSC classification: 14H45 (14H37, 14K22) 1 1 Introduction Let X be a smooth connected projective algebraic curve of genus g > 2 over the field of complex numbers. Following Rauch [17] and Wolfart [21] we say that X has many automorphisms if it cannot be deformed non-trivially together with its automorphism group. Given his life-long interest in special points on moduli spaces, Frans Oort [15, Question 5.18.(1)] asked whether the point in the moduli space of curves associated to a curve X with many automorphisms is special, i.e., whether the jacobian of X has complex multiplication. Here we say that an abelian variety A has complex multiplication over a field K if ◦ EndK(A) contains a commutative, semisimple Q-subalgebra of dimension 2 dim A. (This property is called “sufficiently many complex multiplications” in Chai, Conrad and Oort [6, Def. 1.3.1.2].) Wolfart [22] observed that the jacobian of a curve with many automorphisms does not generally have complex multiplication and answered Oort’s question for all g 6 4. In the present paper we answer Oort’s question for all hyperelliptic curves with many automorphisms.