{"title":"Varieties over Special Fields","authors":"G. Frey, T. Lange","doi":"10.1201/9781420034981.ch5","DOIUrl":"https://doi.org/10.1201/9781420034981.ch5","url":null,"abstract":"In the previous chapter we dealt with algebraic and geometric objects over arbitrary fields. In this chapter we explain additional properties of these objects when considered over special fields. We concentrate on varieties over the complex numbers and finite fields.","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126065585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Background on Weil Descent","authors":"G. Frey, T. Lange","doi":"10.1201/9781420034981.ch7","DOIUrl":"https://doi.org/10.1201/9781420034981.ch7","url":null,"abstract":"Weil descent — or, as it is alternatively called — scalar restriction, is a well-known technique in algebraic geometry. It is applicable to all geometric objects like curves, differentials, and Picard groups, if we work over a separable field L of degree d of a ground field K. It relates t-dimensional objects over L to td-dimensional objects over K. As guideline the reader should use the theory of algebraic curves over C, which become surfaces over R. This example, detailed in Section 5.1.2, already shows that the structure of the objects after scalar restriction can be much richer: the surfaces we get from algebraic curves carry the structure of a Riemann surface and so methods from topology and Kahler manifolds can be applied to questions about curves over C. This was the reason to suggest that Weil descent should be studied with respect to (constructive and destructive) applications for DL systems [FRE 1998]. We shall come to such applications in Sections 15.3 and 22.3. In the next two sections we give a short sketch of the mathematical properties of Weil descent. The purpose is to provide a mathematical basis for the descent and show how to construct it. For a thorough discussion in the frame of algebraic geometry and using the language of schemes, we refer to [Die 2001]","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121458602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Background on Pairings","authors":"S. Duquesne, G. Frey","doi":"10.1201/9781420034981.ch6","DOIUrl":"https://doi.org/10.1201/9781420034981.ch6","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pairing-Based Cryptography","authors":"S. Duquesne, T. Lange","doi":"10.1201/9781420034981.ch24","DOIUrl":"https://doi.org/10.1201/9781420034981.ch24","url":null,"abstract":"Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced DL systems with bilinear structure. In this chapter we first give more applications of this construction, namely the extension of the tripartite protocol given before to multiparty key exchange, identity-based cryptography, and short signatures. In recent years many systems using this extra structure have been proposed. We include some more references to further work in the respective sections, since giving a complete survey of all these schemes is completely out of the scope of this book. For a collection of results on pairings we refer to the \"Pairing-Based Crypto Lounge\" [BAR]. The second section is devoted to realizations of such systems. In Chapter 6 we gave the mathematical theory for the Tate–Lichtenbaum pairing and Chapter 16 provided algorithms for efficient evaluation of this pairing on elliptic curves and the Jacobian of hyperelliptic curves. There we assumed that the embedding degree (i.e., the degree k of the extension field Fqk to which the pairing maps), is small, so as to guarantee an efficiently computable map as required in a DL system with bilinear structure. In Section 24.2 we explain for which curves and fields these requirements can be satisfied and give constructions.","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arithmetic of Special Curves","authors":"C. Doche, T. Lange","doi":"10.1201/9781420034981.ch15","DOIUrl":"https://doi.org/10.1201/9781420034981.ch15","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compositeness and Primality Testing Factoring","authors":"R. Avanzi, H. Cohen","doi":"10.1201/9781420034981.ch25","DOIUrl":"https://doi.org/10.1201/9781420034981.ch25","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Background on p-adic Numbers","authors":"D. Lubicz","doi":"10.1201/9781420034981.ch3","DOIUrl":"https://doi.org/10.1201/9781420034981.ch3","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122759699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arithmetic of p-adic Numbers","authors":"F. Vercauteren","doi":"10.1201/9781420034981.ch12","DOIUrl":"https://doi.org/10.1201/9781420034981.ch12","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Background on Curves and Jacobians","authors":"G. Frey, T. Lange","doi":"10.1201/9781420034981.ch4","DOIUrl":"https://doi.org/10.1201/9781420034981.ch4","url":null,"abstract":"This chapter introduces the main characters of this book — curves and their Jacobians. To this aim we give a brief introduction to algebraic and arithmetic geometry. We first deal with arbitrary varieties and abelian varieties to give the general definitions in a concise way. Then we concentrate on Jacobians of curves and their arithmetic properties, where we highlight elliptic and hyperelliptic curves as main examples. The reader not interested in the mathematical background may skip the complete chapter as the chapters on implementation summarize the necessary mathematical properties. For full details and proofs we refer the interested reader to the books [CAFL 1996, FUL 1969, LOR 1996, SIL 1986, STI 1993, ZASA 1976]. Throughout this chapter let K denote a perfect field (cf. Chapter 2) and K its algebraic closure. Let L be an extension field of K. Its absolute Galois group AutL(L) is denoted by GL.","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125436321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generic Algorithms for Computing Discrete Logarithms","authors":"R. Avanzi","doi":"10.1201/9781420034981.pt5","DOIUrl":"https://doi.org/10.1201/9781420034981.pt5","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126186765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}