In this paper we introduce a cryptosystem based on the quotient groups of the group of rational points of an elliptic curve defined over p-adic number field. Some additional parameters are taken in this system, which ...In this paper we introduce a cryptosystem based on the quotient groups of the group of rational points of an elliptic curve defined over p-adic number field. Some additional parameters are taken in this system, which have an advantage in performing point multiplication while keeping the security of ECC over finite fields. We give a method to select generators of the cryptographic groups, and give a way to represent the elements of the quotient groups with finitely bounded storage by establishing a bijection between these elements and their approximate coordinates. The addition formula under this representation is also presented.展开更多
Let K be a cyclic quartic number field, and k its quadratic subfield. Let h(L) denote theideal class number of field L. Ten congruenees for h^- = h(K)/h(k) are obtained. In par-ticular, if K = Q((p+s(p^(1/2))))^(1/2) ...Let K be a cyclic quartic number field, and k its quadratic subfield. Let h(L) denote theideal class number of field L. Ten congruenees for h^- = h(K)/h(k) are obtained. In par-ticular, if K = Q((p+s(p^(1/2))))^(1/2) with the prime number p = r^2+s^2 and s is even, then C_1h^-≡B_((p-1)/_4)B_(3(p-1)/4) (mod p) for p≡1 (mod 8); and C_2h^-≡E_((p-5)/8)E_((3p-7)/8)(mod p) for p≡5 (mod 8)where B_n and E_n are the Bernoulli and the Euler numbers. If the real K = Q((v(5+2(5^(1/2))))^(1/2),then C_3h^-≡h(Q((-v)^(1/2))) h (Q((-5v)^(1/2))) (mod 5). If 3 ramifies in K = Q(θ^(1/2)), then C_4h(K)≡h(K~*) (mod 3) with K~* = Q((-3θ^(1/2))). All the above C_i are explicitly given constants.Some relations between the factors of class numbers h^- are also obtained. These results forcyclic quartic fields are an extension of the results for quadratic fields obtained by Ankeny-Artin-Chowla, Kiselev, Carlitz and Lu Hong-wen from 1948 to 1983.展开更多
基金Supported by the National Natural Science Foundation of China (Grant Nos. 60763009 and 10531060) the National 863 Project (Grant No.2007AA701315)
文摘In this paper we introduce a cryptosystem based on the quotient groups of the group of rational points of an elliptic curve defined over p-adic number field. Some additional parameters are taken in this system, which have an advantage in performing point multiplication while keeping the security of ECC over finite fields. We give a method to select generators of the cryptographic groups, and give a way to represent the elements of the quotient groups with finitely bounded storage by establishing a bijection between these elements and their approximate coordinates. The addition formula under this representation is also presented.
基金Project supported by the National Natural Science Foundation of China.
文摘Let K be a cyclic quartic number field, and k its quadratic subfield. Let h(L) denote theideal class number of field L. Ten congruenees for h^- = h(K)/h(k) are obtained. In par-ticular, if K = Q((p+s(p^(1/2))))^(1/2) with the prime number p = r^2+s^2 and s is even, then C_1h^-≡B_((p-1)/_4)B_(3(p-1)/4) (mod p) for p≡1 (mod 8); and C_2h^-≡E_((p-5)/8)E_((3p-7)/8)(mod p) for p≡5 (mod 8)where B_n and E_n are the Bernoulli and the Euler numbers. If the real K = Q((v(5+2(5^(1/2))))^(1/2),then C_3h^-≡h(Q((-v)^(1/2))) h (Q((-5v)^(1/2))) (mod 5). If 3 ramifies in K = Q(θ^(1/2)), then C_4h(K)≡h(K~*) (mod 3) with K~* = Q((-3θ^(1/2))). All the above C_i are explicitly given constants.Some relations between the factors of class numbers h^- are also obtained. These results forcyclic quartic fields are an extension of the results for quadratic fields obtained by Ankeny-Artin-Chowla, Kiselev, Carlitz and Lu Hong-wen from 1948 to 1983.