Ice Ih: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
en>El Roih
mNo edit summary
 
en>JorisvS
Line 1: Line 1:
I'm Luther but I by no means truly favored that title. Climbing is what love performing. My job is a manufacturing and distribution officer and I'm performing pretty great financially. Delaware is our birth location.<br><br>Here is my blog; car warranty ([http://Jogos.procurar.pt/profile/deqeze helpful hints])
{{About|the mathematics concept|other uses|Pair (disambiguation)}}
The concept of '''pairing''' treated here occurs in [[mathematics]].
 
==Definition==
Let ''R'' be a [[commutative ring]] with unity, and let ''M'', ''N'' and ''L'' be three [[Module (mathematics)|''R''-modules]].
 
A '''pairing''' is any ''R''-bilinear map <math>e:M \times N \to L</math>. That is, it satisfies
 
:<math>e(rm,n)=e(m,rn)=re(m,n)</math>,
 
:<math>e(m_1+m_2,n)=e(m_1,n)+e(m_2,n)</math> and <math>e(m,n_1+n_2)=e(m,n_1)+e(m,n_2)</math>
 
for any <math>r \in R</math> and any <math>m,m_1,m_2 \in M</math> and any <math>n,n_1,n_2 \in N </math>. Or equivalently, a pairing is an ''R''-linear map
 
:<math>M \otimes_R N \to L</math>
 
where <math>M \otimes_R N</math> denotes the [[tensor product]] of ''M'' and ''N''.
 
A pairing can also be considered as an R-linear map
<math>\Phi : M \to \operatorname{Hom}_{R} (N, L) </math>, which matches the first definition by setting
<math>\Phi (m) (n) := e(m,n) </math>.
 
A pairing is called '''perfect''' if the above map <math> \Phi </math> is an isomorphism of R-modules.
 
If <math> N=M </math> a pairing is called '''alternating''' if for the above map we have <math> e(m,m) = 0 </math>.
 
A pairing is called '''non-degenerate''' if for the above map we have that <math> e(m,n) = 0 </math> for all <math>m</math> implies <math> n=0 </math>.
 
==Examples==
Any [[scalar product]] on a '''real''' vector space V is a pairing (set ''M'' = ''N'' = ''V'', R = '''R''' in the above definitions).
 
The determinant map (2 &times; 2 matrices over ''k'') → ''k''  can be seen as a pairing <math>k^2 \times k^2 \to k</math>.
 
The Hopf map <math>S^3 \to S^2</math> written as <math>h:S^2 \times S^2 \to S^2 </math> is an example of a pairing. In <ref>A nontrivial pairing of finite T0 spaces
Authors: Hardie K.A.1; Vermeulen J.J.C.; Witbooi P.J.
 
Source: Topology and its Applications, Volume 125, Number 3, 20 November 2002 , pp. 533-542(10)
 
</ref> for instance, Hardie et al. present an explicit construction of the map using poset models.
 
==Pairings in cryptography==
In [[cryptography]], often the following specialized definition is used:<ref>Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing ''Advances in Cryptology - Proceedings of CRYPTO 2001'' (2001)</ref>
 
Let <math>\textstyle G_1, G_2</math> be additive groups and <math>\textstyle G_T</math> a multiplicative [[group (Mathematics)|group]], all of prime [[Order (group theory)|order]] <math>\textstyle p</math>. Let <math>\textstyle P \in G_1, Q \in G_2</math> be [[Generating set of a group|generators]] of <math>\textstyle G_1</math> and <math>\textstyle G_2</math> respectively.
 
A pairing is a map: <math> e: G_1 \times G_2 \rightarrow G_T </math>
 
for which the following holds:
# [[Bilinearity]]: <math>\textstyle \forall a,b \in \mathbb{Z}_p^*:\ e\left(P^a, Q^b\right) = e\left(P, Q\right)^{ab}</math>
# [[Degeneracy (mathematics)|Non-degeneracy]]: <math>\textstyle e\left(P, Q\right) \neq 1</math>
# For practical purposes, <math>\textstyle e</math> has to be [[computable]] in an efficient manner
 
Note that is also common in cryptographic literature for all groups to be written in multiplicative notation.
 
In cases when <math>\textstyle G_1 = G_2 = G</math>, the pairing is called symmetric. If, furthermore, <math>\textstyle G</math> is [[Cyclic group|cyclic]], the map <math> e </math> will be [[Commutative property|commutative]]; that is, for any <math> P,Q \in G </math>, we have <math> e(P,Q) = e(Q,P) </math>. This is because for a generator <math> g \in G </math>, there exist integers <math> p </math>, <math> q </math> such that <math> P = g^p </math> and <math> Q=g^q </math>. Therefore <math> e(P,Q) = e(g^p,g^q) = e(g,g)^{pq} = e(g^q, g^p) = e(Q,P) </math>.
 
The [[Weil pairing]] is an important pairing in [[elliptic curve cryptography]]; e.g., it may be used to attack certain elliptic curves (see [http://crypto.stackexchange.com/q/1871/77 MOV attack]).  It and other pairings have been used to develop [[identity-based encryption]] schemes.
 
==Slightly different usages of the notion of pairing==
Scalar products on '''complex''' vector spaces are sometimes called pairings, although they are not bilinear.
For example, in [[representation theory]], one has a scalar product on the characters of complex representations of a finite group which is frequently called '''character pairing'''.
 
==References==
<references/>
 
==External links==
* [http://www.larc.usp.br/~pbarreto/pblounge.html The Pairing-Based Crypto Lounge]
{{Use dmy dates|date=September 2010}}
 
[[Category:Linear algebra]]
[[Category:Module theory]]
[[Category:Pairing-based cryptography]]
 
[[de:Bilineare Abbildung]]

Revision as of 09:44, 11 November 2013

29 yr old Orthopaedic Surgeon Grippo from Saint-Paul, spends time with interests including model railways, top property developers in singapore developers in singapore and dolls. Finished a cruise ship experience that included passing by Runic Stones and Church. The concept of pairing treated here occurs in mathematics.

Definition

Let R be a commutative ring with unity, and let M, N and L be three R-modules.

A pairing is any R-bilinear map e:M×NL. That is, it satisfies

e(rm,n)=e(m,rn)=re(m,n),
e(m1+m2,n)=e(m1,n)+e(m2,n) and e(m,n1+n2)=e(m,n1)+e(m,n2)

for any rR and any m,m1,m2M and any n,n1,n2N. Or equivalently, a pairing is an R-linear map

MRNL

where MRN denotes the tensor product of M and N.

A pairing can also be considered as an R-linear map Φ:MHomR(N,L), which matches the first definition by setting Φ(m)(n):=e(m,n).

A pairing is called perfect if the above map Φ is an isomorphism of R-modules.

If N=M a pairing is called alternating if for the above map we have e(m,m)=0.

A pairing is called non-degenerate if for the above map we have that e(m,n)=0 for all m implies n=0.

Examples

Any scalar product on a real vector space V is a pairing (set M = N = V, R = R in the above definitions).

The determinant map (2 × 2 matrices over k) → k can be seen as a pairing k2×k2k.

The Hopf map S3S2 written as h:S2×S2S2 is an example of a pairing. In [1] for instance, Hardie et al. present an explicit construction of the map using poset models.

Pairings in cryptography

In cryptography, often the following specialized definition is used:[2]

Let G1,G2 be additive groups and GT a multiplicative group, all of prime order p. Let PG1,QG2 be generators of G1 and G2 respectively.

A pairing is a map: e:G1×G2GT

for which the following holds:

  1. Bilinearity: a,bp*:e(Pa,Qb)=e(P,Q)ab
  2. Non-degeneracy: e(P,Q)1
  3. For practical purposes, e has to be computable in an efficient manner

Note that is also common in cryptographic literature for all groups to be written in multiplicative notation.

In cases when G1=G2=G, the pairing is called symmetric. If, furthermore, G is cyclic, the map e will be commutative; that is, for any P,QG, we have e(P,Q)=e(Q,P). This is because for a generator gG, there exist integers p, q such that P=gp and Q=gq. Therefore e(P,Q)=e(gp,gq)=e(g,g)pq=e(gq,gp)=e(Q,P).

The Weil pairing is an important pairing in elliptic curve cryptography; e.g., it may be used to attack certain elliptic curves (see MOV attack). It and other pairings have been used to develop identity-based encryption schemes.

Slightly different usages of the notion of pairing

Scalar products on complex vector spaces are sometimes called pairings, although they are not bilinear. For example, in representation theory, one has a scalar product on the characters of complex representations of a finite group which is frequently called character pairing.

References

  1. A nontrivial pairing of finite T0 spaces Authors: Hardie K.A.1; Vermeulen J.J.C.; Witbooi P.J. Source: Topology and its Applications, Volume 125, Number 3, 20 November 2002 , pp. 533-542(10)
  2. Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing Advances in Cryptology - Proceedings of CRYPTO 2001 (2001)

External links

30 year-old Entertainer or Range Artist Wesley from Drumheller, really loves vehicle, property developers properties for sale in singapore singapore and horse racing. Finds inspiration by traveling to Works of Antoni Gaudí.

de:Bilineare Abbildung