Elliptic curves and C*-algebras

نویسنده

  • Igor Nikolaev
چکیده

We use C-algebras in the context of modular curves and holomorphic 1-forms. We focus on the “leaf space” X and C-algebra C(X) of the Weil 1-form ωN on the modular curve X0(N). It is proved that K0(C (X)) is isomorphic to a stationary dimension group of rank 4g − 3. An application of this result to Hilbert’s 12th problem is discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On complex and noncommutative tori

The “noncommutative geometry” of complex algebraic curves is studied. As first step, we clarify a morphism between elliptic curves, or complex tori, and C-algebras Tθ = {u, v | vu = e2πiθuv}, or noncommutative tori. The main result says that under the morphism isomorphic elliptic curves map to the Morita equivalent noncommutative tori. Our approach is based on the rigidity of the length spectra...

متن کامل

Complete characterization of the Mordell-Weil group of some families of elliptic curves

 The Mordell-Weil theorem states that the group of rational points‎ ‎on an elliptic curve over the rational numbers is a finitely‎ ‎generated abelian group‎. ‎In our previous paper, H‎. ‎Daghigh‎, ‎and S‎. ‎Didari‎, On the elliptic curves of the form $ y^2=x^3-3px$‎, ‎‎Bull‎. ‎Iranian Math‎. ‎Soc‎.‎‎ 40 (2014)‎, no‎. ‎5‎, ‎1119--1133‎.‎, ‎using Selmer groups‎, ‎we have shown that for a prime $p...

متن کامل

An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Local diophantine properties of modular curves of D-elliptic sheaves

We study the existence of rational points on modular curves of D-elliptic sheaves over local fields and the structure of special fibres of these curves. We discuss some applications which include finding presentations for arithmetic groups arising from quaternion algebras, finding the equations of modular curves of D-elliptic sheaves, and constructing curves violating the Hasse principle.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008