39
Poincar´ e series from Cryptology and Exceptional Towers Mike Fried, UCI and MSU-B 03/26/07 Part 0: Exceptionality and fiber products Part I: Exceptional rational functions over number fields Part II: The exceptional tower T Z,F q of any variety Z over F q Part III: Generalizing Exceptionality: Pr-exceptional covers and Davenport pairs Part IV: (Chow) motives from exceptional covers and Davenport pairs: Diophantine category of Poincare series over (Z, F q ) Part V: Comparing T P 1 ,F q with various subtowers: Generated by Serre’s Open Image Theorem, CM part; By Serre’s Open Image Theorem, GL part; By Wildly ramified polynomials. – Typeset by Foil T E X 1

Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Poincare series from Cryptology and Exceptional

Towers Mike Fried, UCI and MSU-B 03/26/07

Part 0: Exceptionality and fiber products

Part I: Exceptional rational functions over number fields

Part II: The exceptional tower TZ,Fq of any variety Z over Fq

Part III: Generalizing Exceptionality: Pr-exceptional covers and

Davenport pairs

Part IV: (Chow) motives from exceptional covers and Davenport pairs:

Diophantine category of Poincare series over (Z, Fq)

Part V: Comparing TP1,Fqwith various subtowers: Generated by

Serre’s Open Image Theorem, CM part; By Serre’s Open

Image Theorem, GL part; By Wildly ramified polynomials.

– Typeset by FoilTEX – 1

Page 2: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Part 0: Exceptionality and fiber products

http://math.uci.edu/~mfried → §1.a. Articles and Talks: → • Finite fields, Exceptional covers and

motivic Poincare series

An Fq cover ϕ : X → Z of absolutely irreducible

normal varieties is exceptional if ϕ one-one on Fqt

points for infinitely many t.

For a # field: ϕ has infinitely many exceptional

residue class field reductions. We use the Davenport-

Lewis name exceptional because, equivalently, a

version of their geometric property holds for ϕ.

– Typeset by FoilTEX – 2

Page 3: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Using fiber products

Assume ϕi : Xi → Z, i = 1, 2, are two covers

(of normal varieties) over K. The set theoretic fiber

product has geometric points

{(x1, x2) | xi ∈ Xi(K), i = 1, 2, ϕ1(x1) = ϕ2(x2)} :x ∈ X(Fq) is a point in X with coordinates in Fq.

Won’t be normal at (x1, x2) if x1 and x2 both

ramify over Z. The categorical fiber product here is

normalization of the result: components are disjoint,

normal varieties, X1 ×Z X2.

– Typeset by FoilTEX – 3

Page 4: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Galois closure of a cover

Denote X ×Z X minus the diagonal by X2Z \ Δ.

XkZ \Δ: kth iterate of the fiber product minus the

fat diagonal ; empty if k > n = deg(ϕ).Any K component X of Xn

Z \ Δ is a K Galois

closure of ϕ: unique up to K isomorphism of Galois

covers of Z.

Sn action on XnZ \ Δ gives the Galois group

G(X/Z) def= Gϕ: subgroup fixing X. Without ,

Gϕ, denotes absolute Galois closure.

– Typeset by FoilTEX – 4

Page 5: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Part I: Exceptional rational functions over # fields

Cyclic polynomials have the form x → xn. RSA

code scheme uses these. Fewer people know about

Chebychev polynomials. Yet, these also have their

cryptography use, as do compositions of these types.

Proposition 1. If (n, p − 1) = 1, then we can usexn to scramble data into Z/p. If n is odd, there areinfinitely many such primes p.Proof. Euler’s Theorem: Powers of a single integer

α fill out Z/p \ {0} def= Z/p∗.

– Typeset by FoilTEX – 5

Page 6: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Residue Primes that work for (odd) nTake p ∈ {k + m · n|m ∈ Z} where k satisfies:

• (k, n) = 1 (apply Dirichlet’s Theorem); and

• (k − 1, n) = 1 ((p − 1 = k − 1 + m · n, n) = 1).

Example: k = 2 works; other integers may too.

– Typeset by FoilTEX – 6

Page 7: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Tchebychev polynomials of odd degree n

Tn(12(x + 1/x)) = 1

2(xn + 1/xn),

Tn : {∞,±1} �→ {∞,±1}.

Proposition 2. If (n, 6) = 1, then Tn : Z/p → Z/p

maps one-one for infinitely many p. Exactly thoseprimes p with (p2 − 1, n) = 1.

Proof: Use finite fields Fp2 ⊃ Z/p: F∗p2 cyclic.

– Typeset by FoilTEX – 7

Page 8: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

2. Schur’s Conjecture:

Cryptography we recognize in modern algebra goes back to

the middle of the 1800s. They used finite fields as the place to

encode a message.

Conjecture 3 (Schur 1921).Only compositions of

cyclic, Tchebychev and degree 1 (x �→ ax + b) give

polynomials mapping 1-1 on Z/p for ∞-ly many p.

Problem 4.How to check if an f(x) is a composition

of the correct polynomials? If so, how to check if it

is 1-1 for ∞ of p (notation: 1−1∞)?

– Typeset by FoilTEX – 8

Page 9: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Points toward proving Schur’s conjecture:

Step 1: If f = f1 ◦ f2 (fi ∈ Fq[x]), then f is 1−1∞if and only f1 and f2 are 1−1∞.

Subtle reduction: If f decomposes over C then

it decomposes over Q (not automatic for rational

functions). So, to prove Schur’s conjecture we

consider f indecomposable over K.

Step 2: Consider 1−1∞f with f : Z/p → Z/p 1-1.

Then, the polynomial expression

(∗) ϕ(x, y) =f(x) − f(y)

x − y= 0

has no solutions (x0, y0) ∈ Z/p × Z/p, x0 = y0.

– Typeset by FoilTEX – 9

Page 10: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Cover characterization of exceptionality

Proposition 5 (Weil). If ϕ(x, y) has u absolutelyirreducible factors (over Fp), then (*) has at leastu · p + A

√p solutions (some A constant in p).

Corollary 6. If f is 1−1∞, then ϕ(x, y) mod p hasno absolutely irreducible factors (for p large).Proposition 7. [DL63] → [Mc67] → [Fr74] →[Fr05] → [GLTZ07]: General Fq cover of normalvarieties: ϕ : X → Z exceptional over Fqt

⇔ X2Z \ Δ has no Fqt abs. irred. components.

– Typeset by FoilTEX – 10

Page 11: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

For 1−1∞ f : P1x → P1

z, the groups Gf and Gf

Consider f(x) − z = 0 with z a variable. Find

n solutions x1, . . . , xn in some algebraic closure

F of Q(z): f(xi) = z; they generate a field

Q(x1, . . . , xn, z) def= Lf . Then, Gf = G(Lf/Q(z)).Proposition 8. Then, Gf ≤ Sn is primitive, notdoubly transitive, and contains an n-cycle.Example 9.Assume n > 2 is prime. The group Dn

(Dihedral of degree n) with generatorsg1 = (1n)(2 n−1) · · · (n−1

2n+3

2 )g2 = (2n)(3 n−1) · · · (n+1

2n+3

2 )is primitive,not double transitive, has an n-cycle.

– Typeset by FoilTEX – 11

Page 12: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Why primitive with an n-cycle?With f(x) = xn+a1x

n−1+ · · ·+an (exceptionality

allows monic). Solve for x from f(x) = z. Solution:x1 = z1/n + b0 + b1z

−1/n + b2z−2/n + · · · .

Substitute e2πi·k

n z1n �→ z1/n for n-cycle in Gf .

Let Gf(x1) be the subgroup of Gf fixing x1.

Primitive means no proper group H with Gf(x1) <

H < Gf . Galois correspondence: Such an H would

mean a field L = Q(w) with Q(z) < L < Q(x1).So, w = f2(x1), and z = f1(w). Contrary to

indecomposable f : f1(f2(x1)) = z.

– Typeset by FoilTEX – 12

Page 13: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Concluding Schur’s Conjecture

Why Gf is not doubly transitive: Equivalent to

ϕ(x, y) (X2Z \ Δ) has at least two factors over Q

(from no abs. irred. factors over Q).Get Schur’s conjecture if 1−1∞ and indecomposable f is

variable change of cyclic or Chebychev polynomial. Chebychev

case: variable change, (z, x) → (az + b, a′x + b′) (a, b, a′, b′ ∈K), allows f(±u) = ±u with u2 = a ∈ K.

Then, with �u : x �→ ux, f = �u ◦ Tn ◦ �u−1def= Tn,a:

un−1Tn,a is what a large literature calls a Dickson polynomial

[LMT93].

– Typeset by FoilTEX – 13

Page 14: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

All exceptional prime degree rational fStep 1: Show Gf is a cyclic or dihedral group.

Proposition 10 (Famous Group Results). If n isa prime, then (Burnside):Gf ≤

{( u v

0 1

)| u ∈ (Z/n)∗, v ∈ Z/n

} def= Z/n×s(Z/n)∗.

For n not prime there is no such Gf: Schur.Step 2: Show Gf dihedral (resp. cyclic) ⇐⇒

polynomial f is Chebychev (resp. cyclic) after

changing variables.

Best part: Monodromy method solves many other

problems (Schur’s conjecture the easiest).

– Typeset by FoilTEX – 14

Page 15: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Step 2 cont: Apply Riemann’s Existence Theorem.

For g ∈ Sn, ind(g) def= n− # of disjoint cycles in g

(including length 1).

If f : Cx ∪ {∞} → Cz ∪ {∞}, with branch points

z1, . . . , zr =⇒ r elements g1, . . . , gr ∈ Gf (branch

cycles) with these properties:

• Gf = 〈g1, . . . , gr−1〉 (generation);

• ∏ri=1 gi = 1 (product-one); and

• 2(n − 1) =∑r

i=1 ind(gi) (genus 0).

– Typeset by FoilTEX – 15

Page 16: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Finish Polynomial case

• grdef= g∞ is an n-cycle; and

• n − 1 =∑r−1

i=1 ind(gi) (genus 0).

Proposition 11.Combine withg1, . . . , gr−1, g∞ ∈ Z/n ×s(Z/n)∗.

Polynomial Result:• {g1, . . . , gr−1} = {g1, g2} as in Ex. 9 modulo

conjugation in Sn, g∞ = (1 2 . . . n)−1; or

• r = 2 and g1 = (1 2 . . . n).Tchebychev/cyclic polynomial branch cycles.

– Typeset by FoilTEX – 16

Page 17: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Dominant rational (not polynomial) function case

Branch cycles are (g1, g2, g3, g4), gi s conjugate to( −1 0

0 1

)∈ Z/n ×s{±1}. Most new functions from

Weierstrass ℘-functions through this diagram:

C{±w} ∪ {∞} f−→ C{±z} ∪ {∞}mod {±1}

�⏐⏐

�⏐⏐ mod {±1}

Cw/Lwmod Lz/Lw≡Z/n−−−−−−−−−−−→ Cz/Lz.

Here Lw ≤ Lz both generated over Z by two

linearly independent (over R) complex numbers.

– Typeset by FoilTEX – 17

Page 18: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Part II: Exceptional tower TZ,Fq of variety Z over Fq

Extension of constants series

Let Kϕ(k) be the minimal def. field of (geom.) K

components of XkZ \ Δ, 1 ≤ k ≤ n:

ker(Gϕ → G(Kϕ(n)/K)) = Gϕ.

Each Kϕ(k)/K is Galois: kth ext. of constants

field : G(Kϕ(k)/K) permutes geom. components of

XkY \ Δ. Denote perm. rep. by Tϕ,k.

– Typeset by FoilTEX – 18

Page 19: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Characterize exceptional

There is a natural sequence of quotients

G(X/Y ) → G(Kϕ(n)/K) → · · · → G(Kϕ(k)/K)→ · · · → G(Kϕ(1)/K).

G(K(1)/K) is trivial iff all K components of X

are absolutely irreducible.

Theorem 12. For K a finite field, G(Kϕ(2)/K)having no fixed points under Tϕ,2 characterizes ϕ

being exceptional ([Fr74], [Fr05], [GLTZ07]).

– Typeset by FoilTEX – 19

Page 20: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

The tower TZ,Fq and its cryptology potential

Morphisms (X, ϕ) ∈ TZ,Fq to (X ′, ϕ′) ∈ TZ,Fq are

covers ψ : X → X ′ with ϕ = ϕ′ ◦ ψ. Partially

order TZ,Fq by (X, ϕ) > (X ′, ϕ′) if there is an (Fq)

morphism ψ from (X, ϕ) to (X ′, ϕ′).Then ψ induces:

• a homomorphism G(Xϕ/Xϕ) to G(Xϕ′/Xϕ′); and• canonical map from cosets of G(Xϕ/Xϕ) in

G(Xϕ/Z) to the corresponding cosets for X ′.

Note: (X, ψ) is automatically in TX′,Fq.

– Typeset by FoilTEX – 20

Page 21: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Forming the exceptional tower

Nub of an exceptional tower of (Z, Fq): ∃ unique

minimal exceptional cover X — the fiber product —

dominating exceptional covers ϕi : Xi → Z, i = 1, 2.

Note: Everything depends on Fq.

For (X, ϕ) ∈ TZ,Fq denote cosets of G(Xϕ/Xϕ) in

G(Xϕ/Z) = Gϕ by Vϕ; coset of 1 by vϕ and the

rep. of Gϕ on these cosets by Tϕ : Gϕ → SVϕ. Write

G(Kϕi(2)/Fq) as Z/d(ϕi), i = 1, 2.

– Typeset by FoilTEX – 21

Page 22: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Why X1 ×Z X2 has exactly one abs. irred. comp.

Do 12, suppose none! Let Fqt0 contain coefficients

of all absolutely irred. X1 ×Z X2 comps. Then, if

(t, t0) = 1, X1 ×Z X2 has no abs. irr. com. over Fqt.

Normality =⇒ X1 ×Z X2(Fqt) = ∅.D-L criterion allows assuming ϕi s are etale.

Then, t ∈ (Z/d(ϕi))∗, i = 1, 2, =⇒ ϕi is 1-1 and

onto (over Fqt), i = 1, 2. For t large, ∃z ∈ Z(Fqt)=⇒ ∃xi ∈ Xi(Fqt) �→ z, i = 1, 2.

So (x1, x2) ∈ X1 ×Z X2(Fqt).

– Typeset by FoilTEX – 22

Page 23: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

TZ,Fq is a very rigid category

Proposition 13. In TZ,Fq there is at most one (Fq)morphism between any two objects. So, ϕ : X → Z

has no Fq automorphisms: CenSVϕ(Gϕ) = {1}.

Then, {(Gϕ, Tϕ, vϕ)}(X,ϕ)∈TZ,Fqcanonically defines

a compatible system of permutation representations;it has a projective limit (GZ, TZ).

Value of the Tower: It now makes sense to form the

subtower generated by special exceptional covers: The minimal

tower including all covers in the set. Examples: Tamely

ramified subtower; Schur-Dickson subtower of TP1z,Fq

; Subtower

generated by CM (or GL2) covers from Serre’s OIT (Part V).

– Typeset by FoilTEX – 23

Page 24: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Exceptional scrambling

For any t let TZ,Fq(t) be those covers with t in

their exceptionality set.

Cryptology starts by encoding a message into a

set. For t large our message encodes in Fqt. Then,

select (X, ϕ) ∈ TZ,Fq(t). Embed our message as

x0 ∈ X(Fqt). Use ϕ as a one-one function to pass x0

to ϕ(x0) = z0 ∈ Z(Fqt) for “publication.” You and

everyone else who can understand “message” x0 can

see z0 below it. To find out what is x0 from z0, need

an inverting function ϕ−1t : Z(Fqt) → X(Fqt).

– Typeset by FoilTEX – 24

Page 25: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Inverting the scrambling mapQuestion 14 (Periods).With X = P1

x and Z = P1z,

identify them to regard ϕ on Fqt as ϕt, permuting

Fqt ∪ {∞}. Label the order of ϕt as mϕ,t = mt.

Then, ϕmt−1t inverts ϕt. How does mϕ,t vary, for

genus 0 exceptional ϕ, as t varies?

Standard RSA inverts x �→ xn by inverting the

nth power map on F∗qt (mult. by n on Z/(qt − 1)

— Euler’s Theorem). Works for all covers in the

Schur Sub-Tower of (P1y, Fq) generated by xn s and

Tn s. (For Tn s, “invert mult. by n” on Z/(q2t − 1).)

– Typeset by FoilTEX – 25

Page 26: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Part III: pr-exceptional covers and Davenport pairsDefinition 15. ϕ : X → Z is p(ossibly)r(educible)-exceptional :

ϕ : X(Fqt) → Z(Fqt) surjective for ∞-ly many t.

Then, ϕ is exceptional iff X is abs. irreducible. We even

allow X to have no abs. irred. comps.

Form X → Z (with its canonical rep. Tϕ), the

Galois closure with group Gϕ, and get an extension

of constants field with G(Fϕ/Fq) = Z/d(ϕ).

– Typeset by FoilTEX – 26

Page 27: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

D-L generalization; pr-exceptional characterization

For t ∈ Z/d(ϕ):

Gϕ,tdef= {g ∈ Gϕ | restricts to t ∈ Z/d(ϕ)}.

Exceptionality set Eϕ of a pr-exceptional cover:

{t ∈ Z/d(ϕ) | ∀g ∈ Gϕ,t fixes ≥ 1 letter of Tϕ}.pr-exceptional correspondences: W ⊂ X1 × X2

with projections W → Xi s pr-exceptional.

Exceptional correspondence between X1 and X2

=⇒ |X1(Fqt)| = |X2(Fqt)| for ∞-ly many t.

If X2 = P1z, then

∑∞t=1(an

def= |X1(Fqt)|)ut has an =qt + 1 for ∞-ly many t.

– Typeset by FoilTEX – 27

Page 28: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

A zoo of high genus except. correspondences

between P1x1

and P1x2

If ϕi : P1xi

→ P1z, i = 1, 2 is exceptional, then

P1x1

×P1z

P1x2

has a unique absolutely irreducible

component, an exceptional cover of P1xi, i = 1, 2.

Suppose ϕi : Xi → Z, i = 1, 2, are abs. irreducible

covers. The minimal (Fq) Galois closure X of both

is any Fq component of X1 ×Z X2. Attached group,

G = G(ϕ1,ϕ2) = G(X/Z): Fiber product of G(X1/Z)and G(X2/Z) over maximal H through which they

both factor.

– Typeset by FoilTEX – 28

Page 29: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

D(avenport)Pairs: new pr-except. correspondencesDefinition 16. (ϕ1, ϕ2) is a DP (resp. i(sovalent)DP) if

ϕ1(X1(Fqt)) = ϕ2(X2(Fqt)) for ∞-ly many t (resp. ranges

assumed with same multiplicity; T. Bluer’s name).

Equivalent to being a DP:

X1 ×Z X2prXi−→Xi, is pr-exceptional, and the

exceptionality sets Epri(Fq), i = 1, 2, have nonempty

(so infinite) intersection

Epr1(Fq) ∩ Epr2(Fq)def= Eϕ1,ϕ2(Fq).

– Typeset by FoilTEX – 29

Page 30: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Part IV: (Chow) motives: Diophantine category of

Poincare series over (Z, Fq)Let WD,Fq(u) =

∑∞t=1 ND(t)ut be a Poincare series

for a diophantine problem D over a finite field Fq. We

call these Weil vectors. Example: F (xxx,zzz) ∈ Fq[xxx,zzz],ND(t) = |{zzz ∈ F

mzzzqt | ∃xxx ∈ F

mxxxqt , F (xxx,zzz) = 0}|.

Weil Relation between WD1,Fq(u) and WD2,Fq(u):∞-ly many coefficients of WD1,Fq(u) − WD2,Fq(u)equal 0. Effectiveness result: For any Weil vector,

the support set of t ∈ Z of 0 coefficients differs by a

finite set from a union of full Frobenius progressions.

– Typeset by FoilTEX – 30

Page 31: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Motivic formulation

Question 17. If Poincare series of X over Fq has t-th

coefficient equal qt + 1 for ∞-ly many t, is there a

chain of except. correspondences from X to P1?

Equivalent to characterizing X for which∑∞t=1 trFrqt[

∑20(−1)iHi

�(X)]ut has a relation with the

series with X = P1: Chow motive coefficients.

There are p-adic versions: Replace Fqt by higher

residue fields with the Witt vectors Rt with residue

class Fqt; and use integration instead of counting.

– Typeset by FoilTEX – 31

Page 32: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Result of Denef-Loeser [Fr77], [DL01], [Ni04]

Consider a number field version, by Rppp the

completion the integers of K with respect to prime ppp.

Then, WD,Rppp(u) def=∑∞

v=1 ND,Rppp(v)uv with ND,Rppp(v)using values in Rppp/ppp

v that lift to values in Rppp. To

make this useful motivically requires doing this for

those D with a map to a fixed space Z/K.

Given D, There is a string of — relative to Z

— Chow motives (over K) {[Mv]}∞v=0, so for almost

all ppp, WD,Rppp(u) =∑∞

t=1 trFrppp[Mt]ut.

– Typeset by FoilTEX – 32

Page 33: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Role of iDPs

Given Weil Vector W (D, Fq) over (Z, Fq) and ϕ :X → Z can define pullback Wϕ(D, Fq) over (X, Fq).

Assume ϕi : Xi → Z, i = 1, 2, is an iDP over Fq,

X1 = X2 and D has a map to Z. Then, (ϕ1, ϕ2)produces new Weil vectors Wϕi

D,Fq, i = 1, 2, and

a relation between Wϕ1D,Fq

(u) and Wϕ2D,Fq

(u): ∞-ly

many coefficients of Wϕ1D,Fq

(u) − Wϕ2D,Fq

(u) equal 0.

– Typeset by FoilTEX – 33

Page 34: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Part V: CM and GL2 exceptional genus 0 covers

Test for a cover ϕ : X → Z decomposing. Check X×ZX\Δfor irreducible components Z of form X ′ ×Z X ′. If none, then

ϕ is indecomposable. Otherwise, ϕ factors through X ′ → Z

(Gutierrez, et.al. from [FrM69]).

Denote the minimal Galois extension of K over

which ϕ decomposes into absolutely indecomposable

covers by Kϕ(ind): The indecomposability field of ϕ.

Proposition 18.For any cover ϕ : X → Z over afield K, Kϕ(ind) ⊂ Kϕ(2).

– Typeset by FoilTEX – 34

Page 35: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Most of rest of genus 0 except. covers/Q

[Fr78], [GSM04]: From Weierstrass ℘-functions.

P1±w

f−→ P1{±z}

mod {±1}�⏐⏐

�⏐⏐ mod {±1}

Cw/Lwmod Lz/Lw−−−−−−−−−→ Cz/Lz.

• Case CM: deg(f) = r, a prime

• Case GL2: deg(f) = r2, a prime squared

[O67], [Se68], [Se81], [R90], [Se03] ⇔ case of Serre’s

O(pen)I(mage)T(heorem). CM case can describe inversion

period from “Euler’s Theorem,”essentially equivalent to the

theory of complex multiplication.

– Typeset by FoilTEX – 35

Page 36: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

GL2 gist [Fr05, §6.1-.2], Serre’s GL2 OIT [Se68, etc]

• [f ] �→ P1j by the j-invariant of the 4 branch points;

• Gf = (Z/r)2 ×s{±1}; yet

• for a non-CM j-invariant (say in Q), then for a.a. r, then

for fdef= fj,r, Gf = (Z/r)2 ×sGL2(Z/r).

Exceptionality versus indecomposability: Given fj,r and the

set A of A ∈ GL2(Z/r)/{±1} for which A acts irreducibly on

(Z/r)2. Consider Pfj,r,A those primes p with the Frobenius of

fj,r : P1w → P1

z mod p in A. For such p

• fj,r mod p is exceptional; and (equivalently)

• fj,r mod p is indecomposable, but decomposes over Fp.

– Typeset by FoilTEX – 36

Page 37: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Two automorphic function questions

[Fr05,§6] poses an analog of [Se03] to find an automorphic

funct. (should exist according to Langlands) for primes of

except. for j ↔ Ogg’s curve 3+ [Se81, extensive discuss].

Would give an explicit structure to the primes of exceptionality.

For any exceptional fj,r mod p, form a Poincare series

with the period of exceptionality its coefficients. Conjecture,

this series is rational. This result would then remove from

consideration the arbitrary identification of P1w with P1

z.

– Typeset by FoilTEX – 37

Page 38: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Bibliography; Parts 0 and I:• [DL63] H. Davenport and D.J. Lewis, Notes on Congruences (I), Quart. J. Math. Oxford (2) 14 (1963),

51–60.• [Fr70] M.D. Fried, On a conjecture of Schur, Mich. Math. J. 17 (1970), 41–45.• [Fr74] M. Fried, On a Theorem of MacCluer, Acta. Arith. XXV (1974), 122–127.• [Fr78] M. Fried, Galois groups and Complex Multiplication, T.A.M.S. 235 (1978) 141–162.• [Fr05] M. Fried, The place of exceptional covers among all diophantine relations, J. Finite Fields 11

(2005) 367–433.• [GMS03] R. Guralnick, P. Muller and J. Saxl, The rational function analoque of a question of Schur and

exceptionality of permutations representations, Memoirs of AMS 162 773 (2003),ISBN 0065-9266.• [LMT93] R. Lidl, G.L. Mullen and G. Turnwald, Dickson Polynomials, Pitman monographs, Surveys in

pure and applied math,65, Longman Scientific, 1993.• [GLTZ07] R. Guralnick, T. Tucker and M. Zieve (behind the scenes Lenstra), Exceptional covers and

bijections on Rational Points, to appear IRMN, 2007.• [Mc67] C. MacCluer, On a conjecture of Davenport and Lewis concerning exceptional polynomials,

Acta. Arith. 12 (1967), 289–299.• [Sch23] I. Schur, Uber den Zusammenhang zwischen einem Problem der Zahlentheorie and einem Satz

uber algebraische Functionen, S.-B. Preuss. Akad. Wiss., Phys.-Math. Klasse (1923), 123–134.

– Typeset by FoilTEX – 38

Page 39: Typeset by Foil Poincar´ T Towers T P F q GLmfried/talklist-ff/michnt03-26-07.pdf · 7. 2. Schur’s Conjecture: Cryptography we recognize in modern algebra goes back to the middle

Bibliography; Parts II and V:• [DL01] J. Denef and F. Loeser, Definable sets, motives and p-adic integrals, JAMS 14 (2001), 429–469.• [Fr76] M. Fried, Solving diophantine problems over all residue class fields of a number field . . ., Annals

Math. 104 (1976), 203–233.• [FGS93] M.D. Fried, R. Guralnick and J. Saxl, Schur covers and Carlitz’s conjecture, Israel J. Math. 82

(1993), 157–225.• [GTZ07] R. Guralnick, T. Tucker and M. Zieve, Exceptional covers and bijections on rational points, to

appear in IRMN.• [Le95] H.W. Lenstra Jr., Talk at Glasgow conference, Finite Fields III, (1995).• [Ni04] J. Nicaise, Relative motives and the theory of pseudo-finite fields, to appear in IMRN.• [O67] A.P. Ogg, Abelian curves of small conductor, Crelle’s J 226 (1967), 204–215.• [R90] K. Ribet, Review of new edition of [Se68], BAMS 22 (1990), 214–218.• [Se68] J.-P. Serre, Abelian �-adic representations and elliptic curves, 1st ed., McGill University Lecture

Notes, Benjamin, New York • Amsterdam, 1968, in collaboration with Willem Kuyk and John Labute.• [Se81] J.-P. Serre, Quelques Applications du

Theoreme de Densite de Chebotarev, Publ. Math. IHES 54 (1981), 323–401.• [Se03] J.-P. Serre, On a Theorem of Jordan, BAMS 40 #4 (2003), 429–440.

– Typeset by FoilTEX – 39