Professional Documents
Culture Documents
Explicit Formulas Describing: The Binary Operations Calculus in / (E - (A, B) /)
Explicit Formulas Describing: The Binary Operations Calculus in / (E - (A, B) /)
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/301907116
CITATIONS READS
0 2
2 authors, including:
Abdelhakim Chillali
Université Sidi Mohamed Ben Abdellah
50 PUBLICATIONS 60 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Abdelhakim Chillali on 12 June 2016.
The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document
and are linked to publications on ResearchGate, letting you access and read them immediately.
J. of Commun. & Comput. Eng. Copyright © Modern Science Publishers
ISSN 2090-6234 www.m-sciences.com
Volume 2, Issue 3, 2012, Pages 16:20
Abstract In this work we study the elliptic curve over the Proof Indeed the ring is a local ring with the maximal
artinian principal ideal ring = [ ], ( = ) . More ideal . ■
precisely, we establish a group homomorphism betweens
( , +) and the abelian group , of elliptic curve. For Remark 1.3 Let =∑ be the inverse of the
cryptography applications, we give many various explicit element = ∑ . Then,
formulas describing the binary operations calculus in , .
=
, ∀ > 0. [1]
Keywords Elliptic curves · ring; Finite field · Public key =− ∑
cryptography.
⟶
= |( ) ∈ : .
∑ ↦
, ⟶ ( ), ( )
, :
[ : : ] ↦ [ ( ): ( ): ( )]
Abdelhakim Chillali · Mohamed Charkani
is a surjective homomorphism of groups.
Department of Mathematics and Computer, Faculty of Science, FST
Fez, Morocco Proof Consider [ : : ] and [ : : ] in .
,
E-mail: Chil2015@yahoo.fr
We have
Explicit Formulas Describing: The Binary Operations Calculus in , . 17
, ([ : : ]+ [ : : ]) = , ([ : : ]) + > ∶= 3;
, ([ : : ]). (1)
> := ( [ ]∗ , = 0. . − 1);
We now quickly show how one can also obtain results (1)
using maple procedure “some and proj2”. So, π , is a > := ( [ ]∗ , = 0. . − 1);
homomorphism of groups.
> := ( [ ]∗ , = 1. . − 1);
Let [ : : ] in ( ), ( ) , then
> := ( [ ]∗ , = 1. . − 1);
= + +
> ([ , 1,0], [ , 1,0], , , );
= + +
∶= 3
= + +
= + +
= + +
= + +
= + +
= +
If [ ∶ ∶ ] in , , then = + + .
= +
In order to simplify this last expression, we have
[( + ) +( + ) , 1,0] ■
+ + =0 , (2)
Lemma 3.2 The mapping
where
⟶ ,
:
=− + + + ( , ℎ) ↦ [ + ℎ : 1: 0]
Coefficients + 3 ,2 and − +3 + ■
2 are partial derivative of a function
Corollary 3.3 The set G is equal to θ ( ).
F(X, Y, Z) = Y Z − X − aXZ − bZ
Proof Let [kε + hε : 1: 0] ∈ θ ( ) , then
at the point(x , y , z ), can not be all three null. We can then
at last conclude that [x : y : z ] and [x : y : z ]. , ([ + ℎ : 1: 0]) = [0 ∶ 1 ∶ 0],
■ Let = [ ∶ ∶ ] ∈ ( , ), then
We set ,
3. Main Results = + ,
[ + ℎ : 1: 0] + [ + ℎ : 1: 0] = + ,
= [( + ) + (ℎ + ℎ ) : 1: 0]
and
Proof
= 1+ + .
18 A. Chillali + M. Charkani
=[ : 1: ]=[ + ∶ 1: + ]. ∶= 3
Finally G =θ ( ). ■ = + +
Q = [∑ s ε :∑ t ε : 1]. Then = +
Proof = +
> ∶= 3; [0,1,0] ■
> := ( [ ]∗ , = 0. . − 1);
∶= 3 > := ( [ ]∗ , = 0. . − 1);
= + + > := ( [ ]∗ , = 0. . − 1);
= + + > := ( [ ]∗ , = 0. . − 1);
= + > := ( [ ]∗ , = 0. . − 1);
∶= 3
P+Q ∈ G . = + +
Proof = + +
> ∶= 3; = + +
> := ( [ ]∗ , = 0. . − 1); =− + +
> := ( [ ]∗ , = 0. . − 1);
P+Q ∉G . ∶= 3
Proof = + +
> ∶= 3; = + +
> := ( [ ]∗ , = 0. . − 1); = + +
> := ( [ ]∗ , = 0. . − 1); = + +
> := ( [ ]∗ , = 0. . − 1); = + +
> := ( [ ]∗ , = 0. . − 1); = + +
= + + =3 −3 − + − +
= + + =− −2 + + −3 +
3 −3 +2 − +3
= + +
■
= + +
Finally, as in [4], we summarize the results in the following
= + + table.
[ : : 1]
, ( + )
Where, [0: 1: 0]
1 [ + ℎ : 1: 0] [ + : 1: 0]
2 +2 − 18 −6 2 [ + ℎ : 1: 0] [ : : 1] [ , , 1]
=
6 +6 +2 +6
[0: 1: 0],
3 [ : + ℎ : 1] [ : + : 1] ( )= ( )
=
[0: 1: 0],
4 [ : : 1] [ : : 1] ( ) = ( ),
■ ( )=− ( )≠0
> ∶= 3;
> := ( [ ]∗ , = 0. . − 1);
> := ( [ ]∗ , = 0. . − 1);
1. Chillali, Elliptic Curve of the ring [ ], Int. Math. 3. N. Koblitz, Elliptic Curve Cryptosystems, Math. of
For., Vol. 6, no. 31, 1501-1505, 2011. Comput., 48, 203-209, 1987.
2. V. Miller, Use of elliptic curves in cryptography in 4. M. Virat, Courbe elliptique sur un anneau et
Advances in cryptography-CRYPTO 85, Lecture applications cryptographiques, Thèse Docteur en
Notes in Computer Science Springer-Verlag, vol. 218, Sciences, Nice-Sophia Antipolis, 2009.
pp. 417-426, 1989.
Filename: #182
Directory: C:\Documents and Settings\A. Ghareeb\My Documents
Template: G:\Journal of Advanced Studies in
TOPOLOGY\jcce_Papers\template_JCCE.dotx
Title:
Subject:
Author: A. Ghareeb
Keywords:
Comments:
Creation Date: 10/23/2011 6:29:00 PM
Change Number: 92
Last Saved On: 12/26/2011 8:30:00 PM
Last Saved By: A. Ghareeb
Total Editing Time: 98 Minutes
Last Printed On: 12/26/2011 8:30:00 PM
As of Last Complete Printing
Number of Pages: 5
Number of Words: 1,856 (approx.)
Number of Characters: 10,583 (approx.)