On the Distribution of Atkin and Elkies Primes
- 152 Downloads
- 4 Citations
Abstract
Given an elliptic curve \(E\) over a finite field \(\mathbb {F}_q\) of \(q\) elements, we say that an odd prime \(\ell \not \mid q\) is an Elkies prime for \(E\) if \(t_E^2 - 4q\) is a square modulo \(\ell \), where \(t_E = q+1 - \#E(\mathbb {F}_q)\) and \(\#E(\mathbb {F}_q)\) is the number of \(\mathbb {F}_q\)-rational points on \(E\); otherwise, \(\ell \) is called an Atkin prime. We show that there are asymptotically the same number of Atkin and Elkies primes \(\ell < L\) on average over all curves \(E\) over \(\mathbb {F}_q\), provided that \(L \ge (\log q)^\varepsilon \) for any fixed \(\varepsilon >0\) and a sufficiently large \(q\). We use this result to design and analyze a fast algorithm to generate random elliptic curves with \(\#E(\mathbb {F}_p)\) prime, where \(p\) varies uniformly over primes in a given interval \([x,2x]\).
Keywords
Elkies prime Elliptic curve Character sumMathematical Subject Classification
11G07 11L40 11Y16Notes
Acknowledgments
During the preparation I. E. Shparlinski was supported in part by ARC Grant DP130100237 and by NRF Grant CRP2-2007-03, Singapore. A. V. Sutherland received financial support from NSF Grant DMS-1115455.
References
- 1.M. Agrawal, N. Kayal, and N. Saxena, ‘PRIMES is in P’, Ann. Math., 160 (2004), 781–793.Google Scholar
- 2.R. Avanzi, H. Cohen, C. Doche, G. Frey, T. Lange, K. Nguyen and F. Vercauteren, Elliptic and hyperelliptic curve cryptography: Theory and practice, CRC Press, 2005.Google Scholar
- 3.D. Bernstein, ‘Proving primality in essentially quartic random time’, Math. Comp., 76 (2007), 389–403.Google Scholar
- 4.A. Bostan, B. Salvy, F. Morain and É. Schost, ‘Fast algorithms for computing isogenies between elliptic curves’, Math. Comp., 77 (2008), 1755–1778.Google Scholar
- 5.R. Bröker, K. Lauter and A. V. Sutherland, ‘Modular polynomials via isogeny volcanoes’, Math. Comp., posted on July 14, 2011, PII S 0025–5718(2011) 02508–1, to appear in print.Google Scholar
- 6.D. A. Cox, Primes of the form \(x^{2}+ny^{2}\): Fermat, class field theory, and complex multiplication, John Wiley & Sons, New York, 1989.Google Scholar
- 7.N. D. Elkies, ‘Elliptic and modular curves over finite fields and related computational issues’, Computational perspectives on number theory, D. A. Buell and J. T. Teitelbaum eds., Studies in Advanced Mathematics, Amer. Math. Soc., Providence, RI, 7 (1998), 21–76.Google Scholar
- 8.S. Galbraith, Mathematics of public key cryptography, Cambridge University Press, 2012.Google Scholar
- 9.J. von zur Gathen and J. Gerhard, Modern computer algebra, 2nd ed., Cambridge University Press, 2003.Google Scholar
- 10.P. Gaudry and F. Morain, ‘Fast algorithms for computing the eigenvalue in the Schoof-Elkies-Atkin algorithm’, Intern. Symp. on Symbolic and Algebraic Comput. (ISSAC 2006), ACM, 2006, 109–115.Google Scholar
- 11.D. Hankerson, A. Menezes, and S. Vanstone, Guide to ellitpic curve cryptography, Springer, New York, 2004.Google Scholar
- 12.H. Iwaniec and E. Kowalski, Analytic number theory, Amer. Math. Soc., Providence, RI, 2004.Google Scholar
- 13.E. Jeong, ‘Isomorphism classes of elliptic curves over finite fields with characteristic 3’, J. Chungcheong Math. Soc., 22 (2009), 207–213.Google Scholar
- 14.N. Koblitz, ‘Elliptic curve implementation of zero-knowledge blobs’, J. Cryptology, 4 (1991), 207–213.Google Scholar
- 15.H. W. Lenstra, ‘Factoring integers with elliptic curves’, Ann. Math., 126 (1987), 649–673.Google Scholar
- 16.J. E. Littlewood, ‘On the class-number of the corpus \({P}(\sqrt{-k})\)’, Proc. London Math. Soc., 27 (1928), 358–372.Google Scholar
- 17.R. Lidl and H. Niederreiter, Finite fields, Cambridge Univ. Press, Cambridge, 1997.Google Scholar
- 18.M. Lochter and J. Merkle, Elliptic curve cryptography (ECC) brainpool standard curves and curve generataion, https://tools.ietf.org/html/rfc5639, 2010.
- 19.F. Luca and I. E. Shparlinski, ‘On quadratic fields generated by polynomials’, Arch. Math., 91 (2008), 399–408.Google Scholar
- 20.J. McKee, ‘Subtleties in the distribution of the numbers of points on elliptic curves over a finite prime field’, J. London Math. Soc., 59 (1999), 448–460.Google Scholar
- 21.H. L. Montgomery and R. C. Vaughan, Multiplicative number theory I: Classical theory, Cambridge Univ. Press, Cambridge, 2006.Google Scholar
- 22.M. Rabin, ‘Probabilistic algorithms for testing primality’, J. Number Theory, 12 (1980), 128–138.Google Scholar
- 23.T. Satoh, ‘On \(p\)-adic point counting algorithms for elliptic curves over finite fields’, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 2369 (2002), 43–66.Google Scholar
- 24.A. Schönhage and V. Strassen, ‘Schnelle Multiplikation großer Zahlen’, Computing, 7 (1971), 281–292.Google Scholar
- 25.R. Schoof, ‘Counting points on elliptic curves over finite fields’, J. Théorie des Nombres de Bordeaux, 7 (1995), 219–254.Google Scholar
- 26.I. E. Shparlinski, ‘On the product of small Elkies primes’, Proc. Amer. Math. Soc. (to appear).Google Scholar
- 27.J. H. Silverman, The arithmetic of elliptic curves, 2nd ed., Springer, Dordrecht, 2009.Google Scholar
- 28.A. V. Sutherland, ‘Identifying supersingular elliptic curves’, LMS J. Comp. and Math., 15 (2012), 317–325.Google Scholar
- 29.A. V. Sutherland, ‘Computing Hilbert class polynomials with the Chinese Remainder Theorem’, Math. Comp., 80 (2011), 501–538.Google Scholar