Complete Linear Series on a Hyperelliptic Curve

نویسنده

  • EUISUNG PARK
چکیده

In this paper we study complete linear series on a hyperelliptic curve C of arithmetic genus g. Let A be the unique line bundle on C such that |A| is a g 2 , and let L be a line bundle on C of degree d. Then L can be factorized as L = A ⊗ B where m is the largest integer satisfying H(C,L⊗A) 6= 0. Let b = deg(B). We say that the factorization type of L is (m, b). Our main results in this paper assert that (m, b) gives a precise answer for many natural questions about L. We first show that (m, b) precisely determines the dimension of the vector spaces H(C,L) and H(C,L), and the base point freeness and the very ampleness of L. For example, L is very ample if and only if b = 0 and m ≥ g + 1 or 1 ≤ b ≤ g + 1 and m + b ≥ g + 2. When L is very ample, we study the Hartshorne-Rao module and the minimal free resolution of the linearly normal curve embedded by |L|. For d = 2g + 1 + p, p ≥ 0, we obtain all the graded Betti numbers explicitly. In this case, property Np holds while property Np+1 fails to hold. We show that a finite subscheme of C determined by the factorization of L causes the failure of Np+1. For d ≤ 2g, we discuss at length the Hartshorne-Rao module and the minimal free resolution. It turns out that they are precisely determined by (m, b). In particular, it is shown that the two line bundles have the same factorization type if and only if the Betti diagrams of the corresponding linearly normal curves are equal to each other. This enables us to understand how many distinct Betti diagrams occur at all.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Study of Hyperelliptic Curve Cryptosystem over Prime Field and Its Survey

Public key cryptography is the famous cryptography technique used in many corporate sectors for developing software to provide security services. Hyperelliptic Curve Cryptosystem (HECC) is one of the public key cryptographic technique, an expansion of Elliptic Curve Cryptography which offers the similar level of security compared with other cryptosystems such as RSA, ECC and DSA. HECC supervise...

متن کامل

Genus Two Hyperelliptic Curve Coprocessor

Hyperelliptic curve cryptography with genus larger than one has not been seriously considered for cryptographic purposes because many existing implementations are significantly slower than elliptic curve versions with the same level of security. In this paper, the first ever complete hardware implementation of a hyperelliptic curve coprocessor is described. This coprocessor is designed for genu...

متن کامل

Divisors on real curves

Let X be a smooth projective curve over R. In the first part, we study e¤ective divisors on X with totally real or totally complex support. We give some numerical conditions for a linear system to contain such a divisor. In the second part, we describe the special linear systems on a real hyperelliptic curve and prove a new Cli¤ord inequality for such curves. Finally, we study the existence of ...

متن کامل

Hyperelliptic Jacobians and Projective Linear Galois Groups

In [9] the author proved that in characteristic 0 the jacobian J(C) = J(Cf ) of a hyperelliptic curve C = Cf : y 2 = f(x) has only trivial endomorphisms over an algebraic closure Ka of the ground field K if the Galois group Gal(f) of the irreducible polynomial f ∈ K[x] is “very big”. Namely, if n = deg(f) ≥ 5 and Gal(f) is either the symmetric group Sn or the alternating group An then the ring ...

متن کامل

Pencils of quadrics and the arithmetic of hyperelliptic curves

In this article, for any fixed genus g ≥ 1, we prove that a positive proportion of hyperelliptic curves over Q of genus g have points over R and over Qp for all p, but have no points globally over any extension of Q of odd degree. By a hyperelliptic curve over Q, we mean a smooth, geometrically irreducible, complete curve C over Q equipped with a fixed map of degree 2 to P defined over Q. Thus ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008