Escolar Documentos
Profissional Documentos
Cultura Documentos
PROEFSCHRIFT
ter verkrijging van de graad van Doctor aan de Rijksuniversiteit te Leiden, op gezag van de Rector Magnificus Dr. J.J.M. Beenakker, Hoogleraar in de Faculteit der Wiskunde en Natuurwetenschappen, volgens besluit van het College van Dekanen te verdedigen op woensdag 6 januari 1988 te klokke 14.15 uur
1
BENJAMIN
.-
1987
prof. dr . R. Tijdeman dr. F. Beukers prof .dr. P.L. Cijsow prof-dr. G. van Dijk prof-dr. J.P. Hurre prof .dr. H.N. Spijker
Chapter
1.
g 1.1.
5 1.2.
2.
Preliminaries. Algebraic number theory. Some auxiliary results. p-adic numbers and functions. Lower bounds for linear forms in logarithms. Numerical methods. Algorithms for diophantine approximation. Introduction. Homogeneous one-dimensional approximation in the real case: continued fractions. Inhomogeneous one-dimensional approximation in the real case: the Davenport lemma. The L3-lattice basis reduction algorithm, theory. 3 The-L -d&Xicekasis reduction algorithm, p~actice algurithm. Homogeneous multi-dimensional approximation in the real case: real approximation lattices. Inhomogeneous multi-dimensional approximation in the real case: an alternative for the generalized Davenport lemna.
5 2.1.
5 2.2.
5 2.3.
5 2.4. 5 2.5.
Chapter 3.
g 3.1.
8 3.2.
Het onderzoek dat geleid heeft tot dit proefschrift stond in het kader van het onderzoeksproject Diophantische Approximaties van de Nederlandse Stichting voor de Wiskunde (SCIC), dat gesubsidieerd werd door de Nederlandse
Inhomogeneous zero-dimensional approximation in the p-adic case. Homogeneous one-d&nsional approximation in the p-adic case: p-adic continued fractions and approximation lattices of p-adic numbers.
Hoqogeneous multi-dimensional approximation in the p-adic case: p-adic approximation lattices. Inhomogeneous one- and multi-dimensional approximation in the p-adic case. Useful sublattices of p-adic approximation lattices. Chapter Chapter 8.
The standard example. Tables. The Thue equation. Introduction. From the Thue equation to a linear form in logarithms. Upper bounds. Reducing the upper bound.
0 8.1.
8 8.2. 0 8.3.
8.4.
5 4.1.
3 4.2.
5 8.5.
8 4.6.
84.10. Chapter
5.
<x
y < y6
in S-integers.
5 5.1.
Introduction. Upper bounds for the solutions. Reducing the upper bounds in the multi-dimensional case. Tables. The equation Introduction. Upper bounds. The p-adic aperoximation lattices.
-
Chapter
6.
in S-Integers
Q 6.1.
0 6.2.
9 6.3. 3 6.4.
Reducing the upper bounds in the one-dimensional case. Reducing the-upper bounds in the multi-dimensional case. Examples related to the abc-conjecture. Tables. The sum of tvo S-units being a square. Introduction. The case
6.5.
8 6.6. 8 6.7.
Chapter
7.
5 7.1.
0 7.2.
Tovards generalized recurrences. Towards linear forms in logarithms. Upper bounds for the solutions: outline. Upper bounds for the solutions: details. The reduction technique.
5 7.6.
7.7.
1.1.
This thesis deals with certain types of diophantine equations. An equation is a mathematical formula. expressing equality of two expressions that involve one or more unknowns (variables). Solving an equation means finding all solutions. i.e. the values that can be substituted for the unknowns such that the equation becomes a true statement. An equation is called a diophantine equation if the solutions are restricted to be integers in some sense. usually the ordinary rational integers (elements of that. Examples of diophantine equarions that will be studied in this thesis are x2 + 7 (the (5c.n)
Z ) or some subset of
Ramanujan-Nagell
(1.3).
(a purely exponential equation, having only the solutions (2.1.01, (3.1.1). (S.3.1). (7.1.31
(x,y,z)
(1.0.0).
(an elliptic equation. having only 22 solutions. of which the largest are (x.y)
(1274.f45673)
only exaatples of classes of equations which we study. We also study (in Chapter 5) a diophancine inequality (a formula expressing that one expression is larger than another, vhere solutions are again restricted to integers). In the following discussion the statements about diophantine equations also hold for this inequalicy.
What the equations treated in this book have in c o m n is that they can all be solved by the same method. This method consists essentially of three
parts: a transformation step, a application of the Gelfond-Baker theory, and a diophantine approximation step. We explain these steps briefly. First, one transforms the equation to a purely exponential equation or inequality, i.e. a diophantine equation or inequality where the unknowns are all in the exponents, such as in the second example given above. Each type of diophantine equation needs a particular kind of transformation. so that it is difficult to be more specific at this point. In some instances, such as in the second example above, this transformation is easy, if not trivial. In other instances, as in the first example above, it uses some arguments from algebraic number theory, or, as in the third example above, a lot of them. In general, such a purely exponential equation has the form
sense). bounds
theory values
(respectively p-adic values) of such linear forms in logarithms of algebraic numbers. In many cases these bounds have been explicitly computed. Comparing the so-found upper and lower bounds it is possible to obtain explicit upper bounds for the solutions of the exponential diophantine equation or inequality, leading to upper bounds rather general nature. We remark that many authors have given effectively computable upper bounds for the solutions of a wide variety of diophantine equations, by applying the method sketched above. For a survey, see Shorey and Tijdeman [1986]. Often these authors were satisfied with the knowledge of the existence of such bounds, and they did not actually compute them. If they computed bounds. they did not always determine all the solutions. In this thesis, solving an and a corresponding pure y exponential inequality looks like equation will always mean: explicitly finding all the solutions. After the second step, the problem of solving the diophantine equation is reduced to a finite problem, which is the treated in the third part of the where
0 < 6 < 1 and t. si. c i s aij. 6 are constants with t. si E N belong to some algebraic extension of 0 and where the ci, aij "ij are the unknowns in X .,_We-now suppose that the number of terms: t on the left
the original
method. Namely, since we have found explicit upper bounds for the absolute values of the (integral) unknowns, we have to check only finitely many possibilities for the unknowns. However, the word f i n i t e does not meKn the same as small or t r i v i a l . In fact, the constants appearing in the bounds that the Celfond-Baker theory provides for linear forms in logarithms are rather large. Therefore, in practice the upper bounds that can be obtained in this as way for the solutions of purely exponential equations can be for instance --
hand side is equal to 2. This restriction is essential for the second step. in which we use results from the so-called theory of linear forms in logarithms, also known as the Celfond-Baker theory. (Some special exponential equations uith more terns can also be treate&-by the C e 1 f o n d ~ B d e e - m by ~ reducing them to exponential inequalities with two terms. cf. Stroeker and b Tijdeman [1982], Alex [1985a], [I985 1 , Tijdeman and Wang [I9871.)
large a s - p . This is far too large to admit simple entameranon of a11 the possibilities, s v e n with the fastest of computers today. Notwithstanding, it is generally assumed that the upper bounds found in this
way are far from the actual largest solution. Therefore, it is worthwile to search for methods to reduce these upper bounds to a size that can be more
-
easily handled. Often it is possible to devise such a method using directly certain properties of the original diophantine equation, for example that where the large solutions must satisfy certain congruences modulo large numbers, or are algebraic constants, and the ni are integral unknovns. some reciprocity condition (fqr some examples, see Grinstead [1978], Brown (19851, Pinch [1987], and Path6 (19831). The disadvantage of such rathods is that they work only for that particular type of diophantine equation. so that
Pi
Here, the logarithms can be real or complex, or can be p-adic. This relation between equation and linear form in logarithms is such that for a large solution of the equation the linear form is extremely close to zero (in the
in general for each type of equation a new reduction method must be devised. It would therefore be interesting to have methods for reducing upper bounds for the solutions of inequalities for linear forms in logarithms. They would be useful for solving any type of diophantine problem that leads to such inequalities. Such methods are provided by that part of the theory of diophantine
A rheoretfcal method is capable of proving results that hold for some large
set of values of the parameters. The Gelfond-Baker theory is of a theoretical nature, since it yields upper bounds for the solutions of many equations in terms of their parameters. Other examples are reciprocity. that shows that odd, at least 5 . solutions ID1 < 296 (x.n) x2 the theory of quadratic D is
D
-
--
2"
approximation that is concerned with studying how close to zero a linear form can be for given values of the variables. Recently important progress has been made in this field, leading to practically efficient algorithms. which can be employed for many diophantine equations to show that in a certain interval [X1.XO] X log , no solutions exist. Usually Xl is of the order of
- 2"
Beukers
satisfy 2 -2loglDl
+ 10-21oglDI
. Theoretical
magnitude of
the theoretical upper bound for the solutions is substituted. a new upper bound X1 is found. For many equations the upper bound Xo is well within reach of practical application of these algorithms, within only a few minutes of computer time. This thus leads in for finding all the solutions of many types of diophantine equations. for which alternative methods have not yet been found or employed with success. It is mainly in this third part of the method that new developments can be reported. The arguments we use in the first and second parts are mainly clas$ical. They are applied to types of equations that have been studied before. and also to new types of equations. The method outlined above. and used in this thesis to solve many examples of sense lies between ' a d explain below. parameter hocn methods and "theoretical" methods. Let a given. As This we shall practice to methods
. When for
Xo
mentioned result provides a small upper bound for the solutions, it can be solutions below the upper bound. In order to make the Gelfond-Baker theory algorithmic, enumeration of all possibilities is impractical. Therefore more ingenious ways of determining all the solutions below a large upper bound
have to be fougd. We remark that Beukers' method for the more general - n . - p equation x2 + D also has an ad hoc aspect. since it does not work for any value of p . Our method of Chapter 4 does not have this disadvantage. An ideal towards - which one might strive in solyLng dioph+riine equations is
-
var ieus-iEophmthe
to devise a computer algorithm, which only has to be fed with the parameters of the equation, and after a short tile gives a list of all the solutions as output. The user should have a guarantee (in the strictest, mathematical sense of proof), that no solutions have been missed. At first sight the lethod outlined above, and described in this dissertation, seeas to be a good candidate to be developed into such a general applicable algorithm. Namely, the second step is of a quite general nature. providing
set of diophantine equatrons with an unspecified an example of such a set, consider the x2 equation
in it be x, n
+ D
2 "
where
is a
An ad hoc method is a method for solving the equation for specific values of
the parameters only. However. it map not work at all for other than these particular values. The first example of solving an equation of the type 7 x2 + D 2" occurring in the literature is that by Nagell [I9481 of D
upper bounds for exponential diophantine equations that are explicit in the
parameters of the equation. Also +e third step, the algorithmic diophantine approximation part, works in principle for any set of values substituted for
The method he used is of an ad hoc nature, since it depends heavily on the special choice of
methods, because the application of the theory of linear forms in logarithms each particular set of values. The main difficulties in devising such a 'diophantine machine' are in the first part of the method outlined above, especially if some algebraic number theory is used. Developments taking place in the- theory of algorithic algebraic nrmber theory on computing fundamental units and on finding factorizations of prime numbers in algebraic extensions, are of importance here. We believe that when suitable algorithms of this kind are available, it will be possible in principle to make such a 'diophantine machine'.
he
1 5 .
is more complicated for these equations, and moreover the upper bounds are essentially x too large. An example of this kind is the Catalan equation
a
A.
in integers a. b, x, y , a11 2 2
that this equation has only the solution (a,b.x,y) (3.2.2.3) Tijdeman [1976] proved that the solutions of the Catalan equation are bounded by a computable number. This number can be taken to be exp(exp(exp(exp(730)))) , according to Langevin [1976]. However, we fail to see how the wthods that we describe in the forthcoming chapters can be applied for completely solving the Catalan equation.
ie
,
generality of such an algorithm is restricted by the generality of the first step. the transformation to the linear form in logarithms. In this thesis we use computer algorithms only if the magnitude of the computational tasks makes this necessary, and keep to *manualm work otherwise. In this way we also try to keep the presentation of the methods lucid. The reader should be aware of the fact that the computer programs and their results are part of the proofs of many of our theorems on specific diophantine equations. It is however impossible to publish all details of these progrand computations. The interested reader may obtain the details from the author by request, and is invited to check the computations himself. The book by Shorty and Tijdeman [I9861 gives a good survey of the diophantine equations for which computable4per bounds for the solutions can be found using the Celfond-Baker method ( ; e e and Schintel
-
hother dio~hantineequation, that for centuries has attracted the attention n of many mathematicians, is the Fermat equation x + yn zn in integers It is conjectured to have no x, y, z, n , with n r 3 and x - y - z + 0 solutions. Faltings [I9831 proved that for fixed n the number of solutions is finite. His proof is ineffective, and not based on the Gelfond-Baker theory. g he Gelfond-~aker theory seems not to be strong enough to dela with the Fermat equation in its full generality, not even if n is fixed. For partial results on the Fermat equation that have been obtained using this theory. see Tijdeman [1985] and Chapter 11 of Shorey and Tijdeman I1986). Ue remark that for many diophantine equations recently important progress
has been - - made in determining upper bounds for ,the number of solutions. See Evertse [1983] and Evertse, Gy6ry. Stewart and ~ijdeman[1987] for a survey.
equations can be completely salved by the wthods described in chis thesis, arPong wfiich khere are purely- exponential e q u a t i ~ m , e q e i o n s involvi binary recurrence sequences. and Thue equations and hue-Hahler equations. Especially the latter t w o are of importance in'various other parts 5 number theory. various For example. they are the key to solving equations arising in algebraic number theory. The
These results are often remarkably sharp. but ineffective, so that they cannot be used for actually finding the solutions.
. , - --- - TO conclude this section we give an overview of the reraining chapters of
this thesis. It is divided into three parts: Chapter 1 is introductory, Chapters 2 and 3 give the necessary preliminaries, and Chapters 4 to 8 deal
with various types of diophantine equations.
m t h o d was used to actually solve a diophantine equation for the first time in tke work of Baker and Davenport (19691, who solved the system of diophantine equations 3.2-2-y 2 8-?-7-z
Sections 1.2 to 1.5 give a short introduction to the Gelfond-Baker theory. diophantine approximation theory, the algorithmic aspects of diophantine approxiPlation, and the procedure for reducing upper bounds, respectively, for
the no-specialist. Chapter 2 contains the preliminary results that we need . f , f 0 1 algebraic number theory a8d from the theory of p-adic nrmbers and
f;mctions. and quotes in full. detail the theorfrom the Gelfond-Wer
0 ~ which
Other equations occurring in the literature for which upper bounds for the solutioru can be computed, cannot be treated as easily by our a l g o r i ~ i c
Chapter 3 gives in detail the algorithms in the field of diophantine approximation theory that we apply in the subsequent chapters. The remaining Chapters 4 to 8 are each devoted to a certain type of diophantine equation. Let Let only. Chapter 4 deals with elements of binary recurrence sequences ('generalized Fibonacci sequences") that are in equation x2 + k E S
(
1.2.
pl,
. . .,
ps
....
ps
In Section 1.1 we have explained that before applying the Celfond-Baker method to some diophantine equation, the equation should be transformed into a purely exponential diophantine equation or inequality with not too many terms (cf. (1.1). (1.2) ) . In this section we sketch the arguments from the
Gelfond-Baker theory that lead to upper bounds for the variables of this exponential equation/inequality. Let us first treat the case of the inequality (1.2). have the form It may be assumed to
quadratic-exponential equations, such as the generalized Ramanujan-Nagell k fixed) . The diophantine approximation part of this chapter is interesting for two reasons: the p-adic approximation is very simple. and in the case of the recurrence having negative discriminant. a nice interplay of p-adic and real/complex approximation arguments occurs. The research for Chapter 4 was done partly in cooperation with A. Petha from Debrecen. The results have been published in Petha and de Weger [I9861 and de b Ueger [I986 1 . Chapter 5 deals with the diophantine inequaliq are in
x,
y,
where the
ai
- maxinil . and
tail
Cop 6 i
are
positive constants.
S z
. and
0 < x
y < y6
. where
z
6 E (0.1)
x + y
- .
X.
are real, or
for all
In
where
log laO
diophantine equations that can be treated by our method. Since they are already purely exponential equations. the first (transformation) step is trivial. -So the linear forms in logarithms are directly related to the equations-thewe lves, Therefore they serve as good examples_-to ge U clear understanding of the diophantine approximation part of our method. results of &se chapters have been published in de Weger [1987~]. x The
- - .
-
m s t satisfy
---
- -
--
Ci linear form
for some
- .
r2
where
x, y E S
. and
z E Z
-..'
Log . a
1ni-Log ai + k-Log(-1)
i-1
.
-licit
i-( Arg no +
1 ni-Arg ai + k i i
i-1
In Chapter 8 a procedure is given to solve Thue equations. that works in principle for Thue equations of any degree. It is applied to find all x3 4.x + 1 We also oention integral points on the elliptic curve y2 briefly how Thue-Hahler equations can be dealt with. This chapter has been written jointly with N. Tzanakis from Iraklion. The results have been
where the Log and Arg functions take their principal values. Now we can *ply one of the many results ,from the Gelfond-Baker theory. giving an lower bound for IAl . , i n terms of
Let
, ! C we obtain constants .
cons t a n t s
ai o n l y , such t h a t i f
then
with
A
C
+
1
.
6
C .H 5 P bound for H
If H
S
If
H > C -H
+
N
Bj
then it can be shown that there exists a 5 P ' denoted with a prime sign, for which
+ C2 6
log N
.
for a constant
C6
It follows that
is bounded from above. (cf. the proof of Theorem 1.4, pp. 45-49, of Shorey and Tijdeman [1986]). Now we can apply Theorem 1.1. This yields
ai.
Bj
Ini1 , Imj 1
It follows that H
Bj
I n1 , m p
where
Bj
Bj
. There
ord ( a p o ' i , l
i
+
i
equation, it is clrucial that all constants can be computed explicitly. Therefore K c a n only use' the bounds from the Gelfond-Bakcr theory that are
may write down a p-adic linear
-
Assuming that
for all
. we
--
4 2 _lo5,aO
----
1 . 3 .
for which, if m
In
(1.4)
--
results
f r o ~ diophantine
ord (A) P
C2-m~
approximation theory, thus giving a background to the next section. We refer to Koksna [1937], Cassels [I9571 (Chapters I and 111) and to Hardy and Wright (19791 (Chapters XI and XXIII), for further details. The simplest form of diophantine approximation in the real case is that of approxhation of a real number 6 by rational numbers p/q It is vell
We are now in a position to apply the following result from the p-adic Celfond-Baker theory. Here. N v
naxlnil
a Let
h
, p
be as above. ai
C3, C4 , depending o n l y on t h e
and on
C
known that if
4p.q) E Z * I . _
such t h a t if
A z 0
then
with
is irrational, $hen there exist infinitely many solutions (p.q) 1 ofithe diophantine inequality
C4-log N
6 are such ~ l l convergents from the continued fraction expansion of solutions. The convergents are simple to compute f6r any particular 8 E R .
for
1.
.... n .
One way o f generalizing this is to study simultaneous approximations to a set of real numbers ... en i.e. rationaL--approximationsto 6L all
general form. We actually compute solutions of systems of inequalities that are slightly weaker in the sense that the right hand side is multiplied by a constant larger than 1. We now consider inhowgeneous approximation. This means that for all there is an inhomogeneous tern pi in the linear form i Li , viz. i
el.
having the same denominator. It is well known that the system of inequalities
(pl. ...,pn.q )
Bi
is Li
-Pi
m I q j - b i j for j-1
- 1.
i
....
n .
have been devised (cf. Brentjes (19811 for a survey), but they seem not to have the desired simplicity and generality. We shall see later how we can apply the so-called ~ ~ - a l ~ o r i tto h athis ~ problem. Another way of generalizing the simplest case of diophantine approximation is to study linear forms. such as
Li
- pi
I <
C-Q
-m/n
for
1. pi m
..., n ,
under some independence condition on the is Kronecker's theorem. The simplest case
-n-1
and
dij
comes down to
Lwhere 8 unknowns in
m lqj-ej j-1 To conclude this section, we remark that there is a p-adic analogue of this
-
are given real numbers. and ql, .... % are the Z . Put _4 maxlqil -. A classical theorem guarantees the of the inequality existence of a solution .(p,ql,...,%)
6
theory of diophantine approximation, founded by Uahler and Lutz. replace -in the above considerations R 'by CI the absolute value value
the p-adic
1 - Ip
--
(pl. .pn.ql. .q .qJ then the by any c o w e x noW p l . . ..pn.ql. m p-adic analogues of the theorems of Uinkowski and Kronecker are essentially
-)
--.
. ..
I-1
If we by
and
P * the measure Q
for an approximation
--
1 becomes our first-i~quaITty On divtding bythe 13-algorithm is very useful. as we shall See
analogous to the above mentioned results in the real case. See Koksna (19371 for references to Uahler's work, and Lutz (19511.
-
-----
--
--
We can incorporate the NO generalizati~nsabove in a further generalization. that of simultaneous approxination of linear forms. Let real numbers eij, be given for i
1 . 4 .
Li
1, m
..., n
, j
for
1. i
....
1.
Put
1 qj-bij
j-1
.... n .
A celebrated theorem of Uinkovski states that there exists a solution (pl.. .pnsql.. .. q , J of the system of inequalities
..
chapters of t h i s t h e s i s many examples a r e given, showing t h a t our methods a r e indeed useful i n practice. Applying the method i n practice may be the b e s t way of acquiring the necessary ~ i n ~ e r s ~ i t z e ;hl n ~ ef fo r the method. W e s h a l l deal with problem. Let constant
Q0
8
( c f . L e v t r a , Lenstra and b v 4 s z [1982], Proposition (1.11) 3.4). ( i i ) , f o r any given point nearest l a t t i c e point, v i z .
diophantine
- max[qj 1
be given, and l e t
Let
Li
..
approximation
(cf. our Lemmas 3.5 and 3.6). This algorithm enjoys the property t h a t these lower bounds a r e usually near t o the a c t u a l minimal s o l u t i o n s . I n a t y p i c a l s i t u a t i o n , where the l a t t i c e is not too d i s t o r t e d , the vectors reduced b a s i s a l l have about the same length, which is of magnitude of
ri of the t h e order of
where
(pl,.
.. ,pn,ql,. . .,qJ
Q s
QO .
The value of J!(r.y) t(r) large a s t h a t . I f a s well a s the lower bounds computed f o r i t , a r e about a s y is not too close t o a l a t t i c e point. the same holds f o r (it
is
From t h e theory outlined i n Section 1 . 3 it follows t h a t one w i l l be s a t i s f i e d i f t h i s lower bound is of the s i z e problem may be formulated. Related problems i n diophantine approximation theory a r e those of a c t u a l l y f i n d i n g a good o r the b e s t solution of maxlLi-p i ( < c f o r a fixed c > 0 . As w e s h a l l see. the L3-algorithm is a very useful tool f o r finding good solutions. The problem of finding the best W e note solution however seems t o be our applications of
3
case an analogous
Moreover, the running time of the algorithm is good, both i n the sense polynomial-time in the length of the input-
theoretical
parameters), and i n the p r a c t i c a l sense. To solve the problem of finding a lower bounds f o r above. w e take the l a t t i c e large a s
Q * " : /
as follovs. Let
I.
e s s e n t i a l l y more d i f f i c u l t .
t h a t i n most of
The l a t t i c e
of dimension
+ m
is defined by
of t h e matrix-
The computational t o o l t h a t w e use t o solve the afore-mentioned problems is 3 - k n-stra. the so-ca-1led-L - l a t t i c e b a s i s reduction algorithm. described i n - Lenstra and Lavlsz [1982]. W e s h a l l give d e t a i l s of t h i s a l g o r i t d . i n Chapter
3.
Below w e briefly
indicate how
it
can be used
to
solve diophantine
approximation problems.
Let
basis
I.
be a l a t t i c e i n P1,
(The symbol
.... P ,
of
I .
. hs
cl.
.... %
of
Applying the L3-algorithm t o t h i s l a t t i c e w e f i n d a reduced b a s i s . of which the b a s i s vectors w i l l hlVe1Tengths of about s i z e of QO c~'(*~)
C
t h e same l a t t i c e
r ,
means something l i k e nearly orthogonal. From a reduced b a s i s it is possible t o cormpute lower bounds f o r the following two quantities: ( i ) . t h e length of t h e non-zero l a t t i c e point t h a t is nearest t o the o r i g i n , viz.
8 . [ql..
..,%,pl,. ..pJT . I t
Bi
0 for a l l is equal t o
. Consider
The
above
process
describes
how
to
find
lover
bounds
for
systems with
of QO
d i f f i c u l t t o f i n d good s o l u t i o n s , i . e .
. . . ,q,,pl. .. . ,pn)
the b a s i s
Li
size QO
- j-1 1 q -[C-8 J ij
-
for
1,
...,
.
C(r)
vectors of a reduced b a s i s a r e adequate f o r the homogeneous case. and f o r the inhomogeneous case the l a t t i c e points near t o
w i l l be such s o l u t i o n s . The
.W e
of
a r e not d i f f i c u l t t o f i n d once a reduced b a s i s is sl, s E R a r e the coordinates of y with n then one may take the l a t t i c e points with si
( i
available. S p e c i f i c a l l y , i f coordinates
....
again f o r the
is a small
reduced b a s i s ,
).
there
i E .Z
t h a t a r e near t o
1.
.... n
).
r these expressions w e have constructed a l a t t i c e r c zWn The L3-algorithm can be adapted t o work exact f o r i n t e g r a l . i .e.
W e have ILi-C-LiI
m-Qo ,
SO
those l a t t i c e s . s o t h a t rounding-of f e r r o r s a r e avoided (cf . Section 3.5). C2* C3 The "errors" occur i n the difference between the
Li
C-Li 6
and a r e
c 2 , ,c .
Of
course one should take c a r e t o have the numerical values of the t h i s l a s t bound has the required s i z e . a r e zero. W e take
A possible v a r i a t i o n of
pi
correct
t o a s u f f i c i e n t precision.
W e
s h a l l discuss
such numerical
iJ
and the
problems b r i e f l y i n Section 2.5. Next, w e study the inhomogeneous case, where not a l l t h e same l a t t i c e
Bi
I"
(note t h a t the l a t t i c e
and the
From t h e reduced b a s i s found by the L3-algorithm w e have a lower bound f o r m , y - L A s s u w ,th,at l a t t i c e point
it is l a r g e enaugh,anbof-sFzeQo
.. W e
take the s *
h e r e the
3[ql..
[ql
...%.pl,. ..
qm,y-pl.
a r e fixed p o s i t i v e numbers. This s i t u a t i o n can be d e a l t with wi - . e a s i l y .by replacing t h e C 's i n the (n+i) t h - r o w of t h e G i r i x - b y proper
_
wi
_-_
x
vhere
-Y-
.-.-. -
--
.-.. in-c.pJ
.
.... n
.
constants depending on
QO'. To i l l u s t r a t e t h i s , assume t h a t
qj 1 , and t h a t
the
Li-
[C-Bi]
lqj-[C-dij] J -1
for
i-1.
The same reasoning a s i n the homogeneous case now y i e l d s the desired r e s u l t . Note t h a t i f w e have performed the ~ ~ - a l ~ o r i c once h m f o r given with d i f f e r e n t bij
N o w suppose t h a t f o r s o w
Q1
>
Q2 ( i t w i l l be handy t o have
Q2
I Q 1
) w e
w e may
a r e i n t e r e s t e d i n the s o l u t i o n s with
pi
's
iJ
's
a r e the same.
) q j l 5 Q2
for' j
ml+l.
..., q
Next let
be of the size of
1 -1
1
-aij
pi o
for
1,
.... n
The ~ ~ - a l ~ o r i tprovides hm a lower bound for the length of the nonzero vectors For a lattice point sow c ' , c cn (ql..
... k . i - ~ - p ) ~ we
for
t i
t
in this set, which is of the same sire as This yields the desired result, if p For the inhomogeneous case, put
y
p p . n ' ( n + m )
, and that of
90 .
i r
I
techniques is used, such as for the Thue-Mahler equation (see Section 8.6). We conclude this section by giving the analogous method of p-adic diophantine approximation. We assume that the are p-adic integers. Let No
p E No we denote by 7 " )
(0..
.
-
aij. Bi
are in Q and, moreover, that P N U (0) For any p-adic integer 7 and
7 = 7 " )
<
pp
.
<*In
_ C._
Bi
, and
in the
1 qj -aij
j -1
pi (mod pp)
for
1,
..., n
Let
p E N
be such that
-assume.-that y is large e n o u g ~ t A ~ d o g of u e the constant real case above). Take for c o l b vectors of the matrix
'
Then x E r if and only if + y E r so r* is a translated lattice. A lower bound for4ri-y) n a ~ y i e l d sthe desired result. _Again variations are possible. a s i n the real case. e.g. by replacing on the (n+i) th row the p by different p pi
' I
. It
at the same t h e .
We conclude this section with three remarks. Firstly, in the case that the dimension of the lattice under consideration is only 2, the ~ ~ - a l ~ o o r i t h is m essentially the continued fraction algorithm. and so yields nothing new. For the p-adic continued fraction algorithm, see de Weger [1986a]. Secondly, the inhomogeneous case of diophantine approximation of one linear form of real Consider the lattice point numbers can also be treated
by
25
[1971a]). W e w i l l r e t u r n t o t h i s i n Chapter 3, and explain there why w e p r e f e r our method. Finally, one of the nice features of the above method
C
I t w i l l be c l e a r from Section 1.4 t h a t the methods outlined there a r e of use f o r solving t h i s problem. For case w e expect, by choosing
C
QO
w e take
No
.W e
a t l e a s t of s i z e
c1
have
I n the r e a l
, that
of
practical
)
diophantine approximation i s t h a t i f an extreme solution e x i s t s . then i n the homogeneous case the l a t t i c e (with proper constant or
p
w i l l be
f o r a small constant
lAl
c'
d i s t o r t e d . This means t h a t the reduced basis w i l l not be as nice as expected, f o r example there might be a b a s i s vector i n it t h a t is s u b s t a n t i a l l y shorter than the other ones. In the inhomogeneous case the existence of an extreme s o l u t i o n means t h a t there is a l a t t i c e point extremely near t o the extremal solution is presented e x p l i c i t l y (e.g. a s one of the vectors of the reduced b a s i s ) . by replacing i n the above reasoning (r) or
that
The
algorithm detects such an extraordinary s i t u a t i o n a t once, and i n most cases i n the homogeneous case One can check whether t h i s (r,y) by lower bounds f o r
No
for
Nl
of the s i z e
procedure with
instead of
extremal solution a c t u a l l y s a t i s f i e s the original equation, and then proceed a l l vectors i n the l a t t i c e except the extremal one. These new lower bounds e solved diophantine w i l l i n general be of the expected s i z e . However. when w equations i n practice. w e have never met such an extraordinary s i t u a t i o n .
s i t u a t i o n the reduced upper bound is near t o the a c t u a l l a r g e s t solution. anyway so small t h a t simple methods of finding a l l the s o l u t i o n s below t h a t bound s u f f i c e . I n the p-adic case an analogous reduction of upper bounds can be reached.
A
following a similar argument. W e have f o r the l i n e a r form 1.5. The procedure f o r reducing upper bounds. seen i n Section 1.2 how u p p bounds ~ inequalities f o r - the solutions of can be found. the In where c ord (A) P
( c f . (1.4)).
sc +c
1
2"'"" *
W e have
exponential
c a r e small constants, and mj is pne of t h e variables. 1'. 2- _ - -. Moreover, the variables a r e bounded by a large constant that is
No
Section 1.4 w e have studied some diophantine approximation theory from a p r a c t i c a l point of view. N o w these two things come together.
-
e x p l i c i t l y known. W e take
JL
such t h a t
pp is a t l e a s t of s i z e :+$t
SO
--
I '
(or
r
I?
) is
-
--
--
_ ;
- . Then ~ it ~ follpws
From
the
application of
the Gelfond-Baker
theory w e are
left
with
of the t r a n s l a t e d l a t t i c e
r*
t h a t the elements , o r t h e l a t t t c e
Therefore.
mj
where the
B _and d
A
a r e i n t e g r a l unknowns.
is about
log No / log p
.W e
t h a t is of t h e s i z e of
JL
which
repeat t h i s procedure f o r a l l t h e
applying a reduction s t e p f o r r e a l l i n e a r forms, where w e may take advantage of t h e f a c t t h a t f o r some of the variables a much b e t t e r upper bound has j u s t been found ( c f . t h e second v a r i a t i o n i n Section 1.4).
where
N
No
e x p l i c i t upper bound
. This
v x 1n,
. Finally,
los0
w e have an
-.
Again we repeat t h e
is very l a r g e ,
say.
element
a E K
be defined by
NKB(a) E Z
a,
21
T w o elements
a
such t h a t
B
Let
of
K a r e c a l l e d associates i f there is a
(a)
c.B
Associated elements generate the same i d e a l , and d i s t i n c t generators of an I n t h i s s e c t i o n we quote r e s u l t s from algebraic number theory t h a t w e use throughout the remaining chapters. W e refer t o Borevich and Shafarevich [I9661 o r other text-books Let are let
K D
Let
al,
Z-al x
+C .
..., ... x
OK
that are
2-aD i s c a l l e d an order of
[K:Q]
. There
d , and
'maximal order' In
K
irreducible
Let
a E K
be an element of degree
a .
> 0
elements. Here an irreducible element (prime element) is an element t h a t has no i n t e g r a l divisors but its own associates. However, t h i s decomposition i n t o primes need not be unique. Ideals can a l s o be decomposed i n t o prime i d e a l s . and t h i s decomposition is unique. A principal ideal is an i d e a l generated by
. Note
K
that t h i s definition
a s i n g l e element
T w o f r a c t i o n a l i d e a l s a r e c a l l e d equivalent i f t h e i r
I t is well known t h a t there a r e only f i n i t e l y many
al.
... ad
h(a)
Hence, i f
the conjugates of
- Q(a)
are
quotient is principal.
yields
% .
For an
d _. -1z-log(aO( I . i-1
I~~-I))
" K a
i s a p r i n c i p a l i d e a l . T h e o m of the
is defined by
NK/P (a)
#(oK/Q)
such t h a t
p -is-a-dfvfsur uf (p)
Let t h e r e be s r e a l and cl.
.W e
saythat
p --liesabove -p p
divides (p)
. The-ramffi cation
. The
residue class
2 -t
non-real
embeddings (with
D -- s
index
2 - t ).
. -
degree
_.9
.... c r
1 C
, where
a system of
- 1,
E
< - l1 - ...-
for
i-1..
...r
the i d e a l
divides
For f r a c t i o n a l i d e a l s
. Any
p a r t of the u n i t group Is c a l l e d a
. Note
that
ord (a)/e
PO.
The nraber
is c a l l e d an algebraic integer i f
a .
.W e vill
r e t u r n t o t h i s i n Section 2.3,
which
. Let
t h e norm of an
2 .$.
In this section we give a few simple auxiliary lemmas. The first one enables
us to find an upper bound in closed form for.some real number
x > 1
that is If
-
bounded by a polynomial in
LEMMA 2.1.
log x . See Petha and de Weger [1986]. Lemma 2.3. b > 0 , and l e t
x E R, x > 1 satisfy
- e2
x I a
So we may assume
0
in this case. The result follows. x and log(l+x) are near if 1x1
Let
5
a 2 0 ,
h 2 1 ,
is
h b-(log x) .
then
If
LEHHA 2.2,
Let
If a < 1 and
ga
1x1 < a
then
zh-(alfi+blfi-log(hh-b)lh
then
.
and
Ilog(l+x) l <
-10 (1-a) -
1x1
and i f
2 (e /hlh
5
2h-(a1fi+2.e2)h
Proof,
Proof. at x
Note that
log l+x)/x
is a strictly positive and strictly decreasing 1x1 < a always less than its value
.
we infer
- -a
Hence it is for
BY
,a y '
?-
+ c -log(x1&)
y by
,
xlfi
JBWi 2.3,
0 < a I
If
1x1 c a
then
where
- h-blfi . Define
-
(l+y) -c.log c
From
log c
< log(c.log c)
1x1 <
then
-.
it follows that
Note that x
le
i-x -11 a
2 -! s i n ( : x )
and that 0
Ix
2-sin(:-x)/x
is a
Now.
< a
. Hence
it takes its
. The
.
2.3.
p-adic numbers and functions.
Hence
In this section we mention the facts about p-adic numbers and functions that
If c r e2
it follows that
we use. For details we refer to Bachman [I9641 and Koblitz [1977]. [1980].
I /
numbers 0P a s defined i n ord . Note t h a t the ordinary ord P P 0 coincides with the d e f i n i t i o n given i n Section 2.1. W e denote by n the P P completion of the algebraic closure of 0 i . e . the f i e l d t o which a l l P * -- p-adic theory is applied. Every nonzero number a
i
0
logp({)
0
- logp((/r)
, where
i s a root of
>
logarithm is a well
logp(() if
l i e s i n the s u b f i e l d of
D
P
generated
< . Finally
w e note t h a t
1 ui-P
i-k
.
ui
- ordP( l o5(I+())
- ordP ( a )
.
are in
0, 1,
...,
p-1 1 , k
uk z 0
a
The number
and a l l d i g i t s equal t o
is c a l l e d a p-adic
2.4.
0 I n t h i s section w e quote i n d e t a i l the r e s u l t s from the Gelfond-Baker that w e use. algebraic They y i e l d lower bounds f o r l i n e a r forms W e do not always give the numbers. theorems in their
A p-adic unit i s an a E 0 with ord ( a ) 0 . For any p-adic integer P P P P-1 a and any p E No there e x i s t s a unique r a t i o n a l integer a(') ui-pi i-0 satisfying
i n logarithms of
g e n e r a l i t y . since i n t h i s t h e s i s only l i n e a r forms with r a t i o n a l unknowns occur, whereas most Gelfond-Baker theorems a r e formulated f o r l i n e a r forms with algebraic unknowns. W e selected r e s u l t s t h a t give completely e x p l i c i t
For by
ord ( a ) 2 k P
w e also write
with a t l e a s t three terms is due t o Baker (19661, and i n the p-adic The p-adic norm is defined der Poorten [1977]. W e will use more recent, sharper results,
case t o due to
Coates [1969], [1970]. For a survey of t h i s theory, see Baker [I9771 and van Wiildschmidt [I9801 and Y u ;[1987~]. Further improvements of the constants have been reached, but too recently t o be taken i n t o account i n t h i s t h e s i s .
14,
-
-ord (a) P P .
-
and
. For
any
lo
(-l+a)
r e s u l t of Waldschnidt [198'0]
l i n e a r forms i n logarithms.
. --
W e quote the
[K:O]
V1,
-.-,an E K ,
a d
bl,
..., b n Z
1/D s V1
. Let
and
. Let .... Vn be
-D
--- -
lo^((^-(^)
e
function
has
the
well
known
properties,
such
as
... s Vn
1ogP(e1)
logp(()
f o r a11
(
el,
Z2
i f and only i f
is a root of unity.
t h roots of unity ( i f
where
log a
l p t h e s e p r o p e r t i e s , t h i s logarithmic function can be extended t o a l l ( E C k 0 , a s follows. Let k E N such t h a t ord (( -1) > l/(p-1) with ord (e) P P Then
the logarfthm of
for
a
. Let
1,
.... n
V+ j
- -( V
,1)
for
Put
. If
then
where
e(n)
- min
known t h a t
[Q(hl..
replace t h e factor
8 - n + 51, 1 0 - n + 33, 9 - n + 39 ) . I f , moreover, i t i s 9 - n + 26 and - ., A n ) :0] 2n , then we can take e ( n ) 2-n n+4 n i n the above bound f o r Ihl by n .
V. 2 max ( h ( a . 1 , f - ( l o g p ) / d )
for
1.
.... n
.vn-l)
.
,
such t h a t
V1 I
...
Vnl
v;-~
e(n)
as detailed as
w e do, but he does s o i n h i s proof, c f . p. 283. W e remark t h a t improvements t h e above bounds have r e c e n t l y been found by Blass. Glass, Heronk and d S t e i n e r [1987C], (1987 1 , Loxton. Hignotte, van d e r Poorten and Waldschmidt [1987]. and Philippon and Waldschmidt (19871. For t h e case bound has been given by Hignotte and Waldschmidt [1978]. n B 2 max
2 mix
lbll.
.-., l b n l ,
) ,
f p - ( l o g p)/d
-2 .
a sharp
3 l o g ( l c - B . l o g Bo. 4-n
) .
Suppose t h a t
I n t h e p-adic case we quote two r e s u l t s : one due t o Schinzel 119671 (Theorem 1 ) f o r the case of a l i n e a r form i n logarithms with two terms. and another b f o r t h e general case. due t o Y u ( 1 9 8 7 ~ 1(Theorem 1 , s e e a l s o Y u (1987 I ) . W e note t h a t Yu's bounds improve much upon t h e r e s u l t s of van der Poorten's van der Poorten [1977]. Moreover.
-
o r d (a ) P j
for
1,
..., n
. that
(2.1)
abl
[~(a;'?
..., a y q ) :L]
ord (b ) P j
n q ,
that
ord (b ) P n
for
1.
...,
n , and
bn -...a n
z 1
. Then
,
Let
p
be prime. Let
be t h e discriminant o f
be a squarefree i n t e g e r , and
(
(pAp-1) (2+)
(Pa( l o g p ) / d ) - ( n + 2 T ~ l
- ..- - vn -
Q(/A)
,
Let
- .fn/('
and
- -..
- xn/x'
be elements o f
L
K , vhere
-
l o g max
I~-DI'''.
I t *- x * l . I t * . x n l . I t W . x * l .I t " . x w l
K
1
7 E K
where Let
p
IrD
p
be a prime ideal o f
pP
.
4
Put
-- ordP(p)
.If
.f
or
i s a p-adic u r i c and
tn
+-
.
and
Cl(p,n)
2/p.log
p ,
i s given by t h e following t a b l e , w i t h f o r
p r 5
then
Put
a ( n L 2 ) be nonzero algebraic numbers. n [L:Q] . Let . , bn be rational i n t e g e r s . bl. Let p be a prime ideal o f L , l y i n g above t h e rational prime p . Let e P be t h e ramification index, and f t h e residue c l a s s degree o f p . Write P Lp f o r t h e completion o f L w i t h respect t o ord . (Note t h a t f o r a l l
ale
...,
Q(al,.
..,an)
, d
..
Remark,
log(l+x)
or by the more rapidly converging series 2.5. Numerical methods. For In solving diophantine equations using computational methods from diophantine approximation theory, as we will do in Chapters 4 to 8, it is necessary to have logarithms (real, complex or p-adic) of algebraic numbers available to a large enough precision (maybe several hundreds of digits). We will not go deeply into the problems of computing such approximations, but make only a few remarks on it in this section. which is a matter of a few divisions of a multi-precision number with a To start with, the precision with which most computers (mainframes as well as personal computers) work, is insufficient for our purposes. Usually at most double precision (52 bits. equivalent to 15 decimal digits), or at best X1 and x3
E
x 3/3 + x 5/5 +
very small this method works fast, whereas for larger log 1.0001, log 1.00000001 and k 1
E No
following idea works well. Compute approximations to the desired precision of log 1.1,
x1 E [l,1.1)
such that
rational number with small numerator and denominator (11 and 10) only, that can be done fast. Next. compute x2 E [1,1.0001) and k2 E No such that
quadruple precision (112 bits, equivalent to 33 decimal digits) is standard available. This is not sufficient for our purposes. not only because we may require larger precision. but also because we want to have the rounding off errors under control, to be sure that no solution of a diophantine equation is missed by unexpected consequences of rounding off errors.
[1,1.00000001) and
Then compute Packages for computations with arbitrary precision are available and very useful. e.g. difficult
.-
compute
log x
log x3 by
to
package
kl-log 1.1 .
-
When computing 2 1 1 thls, -one should take care of_ having the rounding off errors at each addition/multiplication under control. This can e g. be done by doing-all computations twice, rounding off in different directions at each step, such that finally a small interval is found in which the exact number lies (with mathematical certainty). Computation of arctan x is done by the Taylor series
manipulations on p-adic numbers, but the programs are similar to those for real numbers. Computing roots of polynomials with integral coefficients can be done by Newton's (only) method, both in the real and the p-adic case. One should make sure desired precision, preferably not of the root into the by substituting the found approximation that the result obtained is correct --the
I
polynomial and checking that the result is 0 within the desired precision, but (also) by theoretical error estimates for the Newton method. Computing logarithms can be done by the Newton method too. However. we did it by using the Taylor series
r
- x3/3
+ x5/5
- ... .
3.l4lS9. . .
16-arctan
Doing p-adic arithmetic has the advantage above real arithmetic that rounding off errors do not tend to become larger, as long as one is not dividing by a number with large p-adic order. If computed by the Taylor series log (l+x) P ord (x) > 0 P then log (l+x) P can be
The above considerations are sufficient for doing exact computations with the L3-algorithm. as we present it in Section 3.5. We also use the simple continued fraction algorithm in some instances. This we do as follows. Suppose we want to compute the continued fraction expansion of a real number
6 , that we have approximated by rational numbers
- x - x2/2 + x3/3 +
2.(X
el, e2
such that
k E N
0 (mod p)
and
3 x /3
x /5
e2
continued fraction expansion of is needed so far that the xk = 1 (mod p) , and then
1 (mod p)
k th
there exists a
such that
Xo
. then
xi2 .
and the above given Taylor series can be used to compute the denominators of the terms. Hence. to find the first log (l+x) p
logp x
Note that
Almost all computer calculations done for the research of this thesis were performed on an IBM 3083 computer at the Centraal Rekeninstituut of the University of Leiden, using the Fortran-77 language. Also some computations were done at a VAX 11/750 computer at the Rekencentrum of the University of Twente.
p in p-adic digits of
log k/log p r p
For rapid convergence of Taylor series it^?^ desirable to apply them only for numbers x with large p-adic order. For example,
--
1 - j-(
1 --log3 6 4 3
7-32
3 - 62 4 -' 7 - 3 /2 + 7 3 /3 - ... )
Bi, @
maxlxil
Let
Xo
be a (large)
3.1.
Introduction.
In this section we give details of the computational methods we use to reduce upper bounds for the solutions of diophantine equations. Our starting point will always be a linear form involving the unknowns), A
Let
be real constants, with c2 > 0 . In the p-adic case we shall cl, c2 and assume that x > 0 for some index j E (1.....n) j
sense, with the word "close" defined explicitly in terms of an inequality together with a large but explicitly known upper ord (A) 1 cl + c2-XJ P bound for the absolute values of the unknowns. Our aim is to reduce the upper bound by showing that there are no solutions between the new and the old upper bound. Let p al,
(3.3) (3.4)
XSX,.
Our aim is to find a constant X1 real case (3.2) can be replaced by
of the size of
X s X1
log Xo
. Let
. xn
xj s Xo
(a consequence of (3.4))
can be improved to
5.
In the forthcoming sections we treat all cases. according to the 3 classification given above. We insert Sections 3.4, 3.5 on the L -algorithm. which will be our main computational tool, Section 3.6 We classify such linearfor~saccord_ing to three criteria: on finding short vectors in lattices, and Section 3.13 on certain sublattices that are3eful for our applications. n
+ + +
homogeneous if fi
;
;
r 3
real if all the numbers are in R , p-adic if all the numbers are in Q n
.
3.2.
fractions.
-
a1/e2 . The
A
1 , viz. 5
!
Put
- a1/e2
. -We-assume
that
-6+
is not of any interest in the real case, but it is of interest in the p-adic case. We call this the zero-dimnsional case. In the p-adic case we require that the quotients and let the convergents pn/% for n
- 0.
1. 2,
...
be defined by
i I i / 6 ,
and
@/*j
are in
4 d
r
directly, or as follows.
Let
A
-(ak+l)
,
k
s a t i s f y i n g (3.7)
I f (3.1)
xl. x2
with
X r X1 , then
and that if
p/q
1 1 X X < x-l~g(~.(~+2)/(821) + z - l ~ g
.
X b follows. We can apply Lemma only.
Remark, then p/q must be one of the convergents (cf. Hardy and Wright [1979], Proof,
1 8 1 1
2.1 here. but Lemma 2.1 is sharp for large Theorems 163, 171 and 184). We may assume without loss of generality that and that such that (x1,x2! X (3.1) and (3.5) yield
0 ,
-1 -c -exp(C-X)
The result follows by applying Lemma 3.1(i). In practice it does not often occur that
.
0
xl
(p,q)
X*
now
(-x2 ,xl)
. We
LElMA 3.1.
(-x2,x1)
(i) . (p . q ) k k
xl. x2
with
X r X* , then
is useful indeed. Summarizing, this case comes dovn to computing the continued fraction of a
that s a t i s f i e s
s -1 + l o @
.x0+1] /log(+4))
a,+l
(3.7)
real number to a certain precision, and establishing that it has no extremely large partial quotients. This idea has been applied in practice by Ellison b [I971 1. by Cijsouw, - Uorlaar and Tijdcman (appendix to - Stroeker and Tijdeman
) [1_982]
Moreover, the p a r t i a l q u o t i e n t
satisfies
and 1 ' )
by__Hunt
and
for
solving-
home computer only) for determining all imaginary quadratic number fields with class number 1. We shall use it in Chapters 4 and 5.
then (3.1) h o l d s f o r
(-x2,x1)
(pk,qk)
.
(-x2,x1)
B o o L an index
(i). By
k qk
)(t
X*
qk
. Since
- . -
(pk,qk)
for
3.3.
follows from
- -Xs
xl
. To
inequality of (3.5). (if). Combine (3.9) with the second inequality of (3.5).
0
A
1
has t h e ' f o r n
b
A-B+x.t3
+ x - 6
2'
where
p . r 0
We
then use the so-called Davenport lemma, which was [1969]. It is. like the homogeneous
of
Iq-$l
q-$
are all extremely small. In practicq is always far enough from the nearest
Is-$[
a1/a2
Davenport [I9691 as we already mentioned. by Ellison. Ellison, Pesek. Stahl and Stall [1972]. and by Steiner [1986]. We shall use it in Chapter 4.
. with
q > Xo . We now have the following To deal with linear forms with the case n
result.
-2
a straightforward generalization of
would be to study multi-dimensional continued fractions. For to have the &sired efficiency and
a good survey of this field, see Brentjes [1981]. However, the available algorithms in this field seem not generality. Fortunately, since 1981 there is a useful alternative, which in a
( b y 1.1 o f (3.1).
we d e n o t e t h e d i s t a n c e t o t h e n e a r e s t i n t e g e r ) . Then t h e s o l u t i o n s
sense is also a generalization of the onedimensional continued fraction algorithm. In 1981, L. bv&z invented an algorithm, that has since then become known as 3 the L -algorithm. It has been published in Lenstra. Lenstra and LovAsz [1982], Fig. 1, p. 521. Throughout this and the next section we refer to this
(3.2) s a t i s f y
Proof.
paper as " W " . The algorithm computes from an arbitrary basis of a lattice in
-
Rn
+
7
certain nice properties (its vectors are nearly orthogonal). The algorithm has many important applications in a variety of mathematical fields, this leads to (3.11). such as _ the factorization te Riele has ,of- polynomials Of
{ F ) _,public-key
are its
-_
cryptography (Lagarias and Odlyzko [1985]), and the disproof of the Mertens
> Xo
Conjecture
[1985]). a very
interest to us theoretical
If (3.10) is not true for the first convergent with denominator one should try some further convergents. If than (3.10) as desired. If no
q
. then
p.
algorithm
good
complexity
(polynomial-time in the length of the input parameters), very well in practical computations. Let
and p e r f o m also
then not all is lost. since then only very few exceptional possible solutions have to be checked. See Baker and Davenport [I9691 for details. Summarizing, we see that in this case the essential idea is that an extremely large solution of (3.1) and (3.2) leads to a large range of convergents p/q
r c
Rn
* hi
.%
(1-1,
..., n
ahdtherealnumbers
"
i 93
( l s j < i S n )
Then PI,
h;.
.... P,
.. . , n b*
of
is an orthogonal basis of
R"
W e c a l l the l a t t i c e basis
with
Z ,
" 1 ;
r :
E R
Let
r.
reduced
for
if 1r j
Then, since
Ipinjl a :
< i a n ,
for 1< i
all
and
""
span the same l i n e a r . space a s hl. for -i is the projection of si+l on the orthogonal complement 0
---.
1 ,
+ 0
"* hi
* 2 3 * L lhi-l12 + i , i l i l l
. ;
a n
* . io
0
Hence, by ( 3 . 1 2 ) .
Hence a reduced b a s i s i s nearly orthogonal. For a reduced basis w e have, by Ilt (1.7).
P1. ...,
( r )
{r:2-lhi{ i-1
C2-l< l 2
io
. and
mil
2 2- n 1 2 - l l l
for
1.
.... n .
el. .... n c be a reduced 1 si-si f o r s l , . . . , sn E R , w i t h
3.5, n Let
s
basis o f t h e l a t t i c e
W e remark t h a t a l a t t i c e may have more than one reduced b a s i s , and t h a t the ordering of the b a s i s vectors is not a r b i t r a r y . The L3-algorithm accepts as input any b a s i s
let
. .
of
.. . , E ~ ,
most i n t e r e s t t o us a r e the following. Let not a l a t t i c e point. W e denote by vector i n the l a t t i c e , viz.
not a l l
si
in
Z . Let
i0 be
io
B Z . Then
t(r,y)
the l a t t i c e point n e a r e s ~t o
So
Iz-yI
- t(r.y)
Let
be
Write
t o it. v i z .
--
. .
ri E Z
s il
with
I
From a reduced b a s i s
t(r)
alp__ - t ( r , y )
can be ril
ri.
*-
si. si E R
--
--
Let
il
. Then,
LEJU'U 3.4.
Let
el,
..., %
be a
Using (3.12) it follows t h a t
reduced b a s i s o f t h e l a t t i c e
r . Then
Proof.
1 ~ 1
il 2 i0
If
C(r)
. Write
Z. sil + ril
il
hence
lril-sill
2 1
The above lemma is rather weak in the extraordinary situation that extremely close to an integer. If one of the other integer, we can apply the following variant. si
is
io
Obviously,
then til follows.
il z i0
If il
il
i0
il > i0
is not close to an
EZ, t
il
+ r
, hence
3.6. Let pl, % be a reduced b a s i s o f &he.-lattice I' and l e t n y s i - s i f o r sl. sn E R with not a11 si i n Z . Suppose that i-1 such that 0 < 62 s f there i s an index i0 and constants 61
....
....
i
Remark,
LI with
depending on the
dimension of the lattice only. This result can also be used instead of L e m a
Isi!
61
for
iO+l,
.... n
3.5.
Then
Below we describe the variant of the L3-algorithm that we use in this thesis to solve diophantine equations. This variant has been &signed to work with integers only, so that rounding-off errors are avoided completely. In the algorithm as stated in ttL, Fig. 1, p. 521, non-integral rational numbers may occur, even if the input parameters are all integers. Let di
Proof.
nearest to
. and
ti
- si
ti i0
be the integer
for
. Put
c 2"
hl. .
as in ttL (1.2),
respectively. The i. j
can be used as
denominators for all numbers that appear in the original algorithm ( W , p. with ti E R
. Let
(1.29).
Bi
* - lkil
--
-3 -
in stead of hi. i .l , thus eliminating all non-integral rationals. We give this variant
ri. dim
of the ~'-al~orithm in Fig. 1. All the lines in this variant are evident from and. using (3.12). applying (3.13) and (3.14) to the corresponding lines in the original algorithm, except the lines (A), (B) and (C), which will be explained below. We added a few lines to the algorithm, in order to compute the matrix of the transformation from the initial to the reduced basis. Let with column vectors
hl. ...,
r e
which is the input for the algorithm. We say: the basis basis
bl. . . . ,
Ti :X i Sj
hi
... , which the algorithm delivers as output. Then we define cl, this transformation matrix V by
.c
Let
:- (b OG 1 ;
-i
ri
:- (d
J -s-1
i
k-1 ;
.... 1
- S0 -1 . Denote the column vectors of by ..., , and the * T row vectors of v e T . Ye feed the algorithm with 1 and by yl . ... . n I f ' also. All manipulations in the algorithm done on the hi are also done on the u . and the v ! ~are adjusted accordingly. This does not affect the -i computation time seriously. The algorithm now gives as output matrices e . 1 ' and lfw-I , such that e is associated to a reduced basis, e - S - V . and U' - U - V . Note that is not computed explicitly, unless 1 - J (the
, so
S
U
SO
to
-1
terninate ;
It follows that
We now explain why lines (A). (B) and (C) are correct. (A): From U t (1.2) it follows that
. -
for
k+l,
.... n
Define for
- 0, 1, ..., i-1
--
Then
(*)
si(0) Pi , and
si(i-1)
- si .
The
si(j)
step, since
[r
:- integer nearest to
Xk,& :-
for j
1.
.... G l
This explains the recursive formula in line (A). It remains to show that the
occurring vectors
ti(j)
- 'k'k-1-'i,k-1
Finally, from (3.19) we see
% 2 ' i . k
which is integral by ttt p. 523, 4. 11. (B), (C): Notice that the third and fourth line. starting from label (2). in the original algorithm, are independent of the first, second and fifth line. Thus a permutation of these lines is allowed. We rewrite the first, second and fifth line as follows, where we indicate variables that have been changed with a prime sign. and (8) follows.
ei
~l-"k,k-l-%,k-l~-"i,k ;
(3.18) (3.19)
digits. We can compute a reduced basis of this lattice directly, using the matrix space
d
itself as input for the ~ ~ - a l ~ o r i t h m But . it may save time and split up the computation into several steps vith increasing
pivk :- %.k-l
- pk,k-l*piok ;
to
0. 1.
.. . ,
k-2
k+l.
.... n . The
i
accuracy, as follows.
di k
remain unchanged
Now, (3.15) is
Let
be a natural
equivalent to
n
ei
have
about
k-C
(decimal---digLts. -For
..., n
and
...,
k put
Thus, the j
hence \,k-l remains unchanged. From (3.18) we obtain 'k-k-1 1 *i.k-I+ %-1 relevant j
)
the
are blocks of n x n
C consecutive digits of
Bi
. Define
for the
matrices
A 1 ---.%-1
whence, by multiplying by
%-l-dic_l
If
l
C
~n( j ) w e have
e J
i
L(C.) n 4-j/n
J .
Put
rl
( c ) :
qj
,
(uieh) (3 1
d -TI
1,
...,
- 1,
...,
and
w e have
c (3 i.h
.
(
then by )
fir
i .h
r
Notice &at
J +l
tj
*
- e.r. + *, J dk . since
. (
j r 1
11
let
and
U
-I
such t h a t
1 1 j -1
Y
-I .
Instead of applying the L3-algorithm once with times, with factor S1,
.I
a s inpur. v e apply it
J -1
, and
J '
11
and
... ,
Sk
N o w put
j+l
For
between
2.5-11 and
0 . 4 - n2
By induction
- 1,
.. . ,
?' &
Note t h a t
C-(l+(k-l)/n)
i n s t e a d of
Dj
digits. d
s o the
S
-%-I dl , w e have
0
S SU-'
J J-1
&-! - dJ 1
-
f i r a11
. Hence
-
Since
3.6.
-&
Sometimes i t is not s u f f i c i e n t t o have a lower bound f o r the same only. I t may be useful t o know exactly +alIfyectors- x E or (x-yl
and
dk since
a r e a s s ~ c i a-t e d t o bases of
. Moreover,
ek
z
is output of the ~ ~ - a l ~ o r i t h i m t.
is a s s o c i a t e d t o a reduced b a s i s of
--
f o r a given constant
. There
r -- s u c h c h a t 1x1 s C e x i s t s an e f f i c i e n t algorithm
M w e denote by L(A) 3 t h e maxinal number of (decimal) d i g i t s bf .its e n t r i e s . I f the L -algorithm is v i t h a s output a matrix e , then according t o t h e a p p l i e d t o a matrix S
experiences of Lenstra, Odlyzko ( c f . Lenstra [1984]. p. 7) and ourselves. the computation time is proportional to L(d13 i n practice. Since
C
is
r , x
E I.
1x1 S
> 0
.
(X
a p a r t from
.
,
L(DJ)
and
xi
.X
.W e
g i v e t h e algorithm i n
2
f o r t h e column vectors-of
iJ )
f o r matrices
4, S, I, 9 , 1 ,
I n our s i t u a t i o n .
3)
and since
det C
det d
of which t h e
55
qil
:- aij
for
1S i I j
n ; for
1 5 i
<j
I n ;
In
for
1I i I
and l e t
ri
for a l l
. Put
for
1s i s n ;
0
i , r
~1-I;
for
1s j < i 5 n ;
of 2-'
- R-a
1-I
and
11, U'
such
Then
1E
ly-11
<
C'
C'
( C*
n - p-zlbil
y
w i l l do).
Since
it s u f f i c e s t o search f o r a l l l a t t i c e points
; r
determine a permutation
1
s
---
- z+
with Ig-yl
lgl s
C*
since
<
implies
for i
r-'(i) qiJ
:- ail
for
1 5 i
j I n ;
1I i < j n ; 5 C s n for 1 s i
3.7.
I
Homogeneous multidimensional a p p r o x h t i o n
i n t h e real case:
real
n ;
W e assume t h a t
r 2
The case
In fact.
-
Let
X :
y E N approximation lattice
Let
(5)
if
xi
for
1s i
terminate ;
(n)
'x r
hi..,
...
zn
of determinant
I .
n A - 1 ~ ~ - [ 7 - C -. 6~]
i-1
Condition (3.21) can be checked by computing a reduced b a s i s of t h e l a t t i c e - - --3 r by t h e L -algorithm, and applying Lemma 3.4. The parameter y is used t o keep the "rounding-off The length of the v e c t o r
g
error"
Clearly, both
is c l o s e t o
1A1
Xo
and
7-C-A
large.
, simply take
- 1.
of reducing t h e upper bound. To do s o , w e use the following lemma, which i s a s l i g h t refinement of Lemma 3.7, together with the a l g o r i t h o of Fincke and lxil for different
i
Pohst ( c f . Section 3.6). I t i s p a r t i c u l a r l y u s e f u l i n the s i t u a t i o n t h a t one has d i f f e r e n t upper bounds f o r the Remark. size Proof,
X :
W e apply t h i s lemma f o r
X1
- Xo
. then
I f it holds f o r a constant
X
of s i z e
XI
. -
Let
xl.
....
be a s o l u t i o n of (3.1) with
0 < X
Consider
the l a t t i c e point
---
-- -
i-1 '
as above. Then
-
with
Proof.
Define t h e l a t t T c e point
a s i n t h e proof of L e &
3.7.
By (3.23)
and (3.24)
and
1
The r e s u l t follows a t once by (3.1). W e proceed a s follows. Choose a constant
0
n-X1
B y (3.1).
(3.21) and t h e d e f i n i t i o n of
C(r)
we
1xi 1
imply (3.24).
--
Co
such t h a t i f
1x1
>
Co
then
length of t h e v e c t o r
.W e
1x1
d Co
compute a l l l a t t i c e p o i n t s s a t i s f y i n g t h i s bound
by the algorithm of Fincke and Pohst, and check them for (3.1). Summarizing, the reduction method presented above is based on the fact that a large solution of (3.1) corresponds to an extremely short vector in an appropriate approximation lattice. Since we can actually prove by - ---computations that such short vectors do not exist. it follows that such large solutions do not exist. We will apply the above described techniques in Chapter 5.
(3.2) satisfy
x
Proof,
3.8.
Inhomogeneous multi-dimensional approximation in the real case: an To apply this generalized Davenport method in practice, it is necessary to (pl,. . .pn-l ,q) . We indicated in Section 1.4 how this can be done with the L3-algorithm. As lattice we take compute the simultaneous approximations the one associated to the following matrix:
where
(the case
-2
be incorporated here also). To deal with this inhomogeneous case, two methods are available. The first method is a generalization of the method the homogeneous case of the previous section. Davenport that we discussed in Section 3.3. The second method is closer to n is a constant of size Xo
. Then
c1 ,
First we explain briefly [1971a] (where only the case the generalized Davenport method. n 3 is treated). Put
reduced basis. will have length of the size of can be written as See Ellison
But
sl
pl,
..., pn-l.
--
. It can be
,
expected that
-__/-
q
----
is of size
-
' : x
,
-- --
Let q
(pls...,pnl,q)
be a simultaneous approximation to
of the size of
xghl
di.
1.
..., n-1
...,
6k1 with
9 ' .
c1
X n
q l l n
that
x~-~/c-x~-~
The above method has been applied in practice to solve Thue and Thue-Hahler
equations by Agrawal, Coates. Hunt and van der Poorten [1980] (using multidimensional continued fractions instead of the L3-algorithm). Peth6 and b 1. So Schulenberg [I9871 and Blass, CLass, Heronk and Steiner [1987~],(1987
it has proved to be useful. However, we prefer another method, for several reasons. Firstly, it is close to the homogeneous case as described in the previous section, whereas the generalized Davenport method has no obvious
counterpart
for
the
homogeneous
case.
Secondly,
it
actually
produces
3 . 1 0 .
+t
X1
solutions for which the linear form A under the condition the
is almost as near to zero as possible Finally, if a linear relation between the method detects these
Xo
ai
exists, but had not been noticed before (a situation that sometimes Thue equations),
relations. by finding explicitly an extremely short lattice vector giving the coefficients of the relation. Concerning computation time we think that the tvo methods are about equally fast. The method works as follovs. We take the approximation lattice chosen properly, i .e. a reduced basis its inverse C
Xl
Xo
of the
log Xo
X size :
exactly as
7 . C
sl. ...
.c
X is of the size :
of
.
e
proofL Let
Compute vith the L3-algorithm the lattice point be the matrix associated to
...,
x n
0<X
XI
Consider
r .
Let
Y '
Note that
. and
t vith
hence also
e '
1 - Y , and
compute, namely by
Put
--
7i
[y-c-fi] +
X0 . Then
zn
be defined by and
--
si E R
can be computed by
f1
has
as
n th column, so
C(r,y)
Again we may prove refinements of the above l e m a , similar to Lemma 3.8 the homogeneous case. We explained in Section 3.5. how to apply the Fincke
63
and Pohst algorithm in the inhomogeneous case. ye do not work that out here. Summarizing, the method described above is based on the fact that a large solution of (3.1) in the inhomogeneous case leads to a lattice point extremely near to a fixed point in
LEUHA 3 -11
such that
Let
X1
zn .
computations that such lattice points do not exist, so that such extreme solutions do not exist. The method outlined in this section is used in Chapter 8. Note that in the case as the Davenport lemma. n
the method is essentially the same Remark& We apply the lemma with X1
Xo
is that in the p-adic expansion.of 6 ' 3.9. Inhomogeneout zero-dimensional approximation in the p-adic case. randomly over
(
. ..,
p-l 1
In the p-adic case we start with a very simple linear form a very simple reduction method applies. Let
A
A , to which also
will not be much larger than upper bound of size Proof- Let log Xo
be
log Xo/log p , and then (3.30) yields a reduced as desired. ord (6'-x) 2 r P
X1
. Then
such that @ / ~ E O ~and X E Z , x > 0 . It is obvious P that in the real case with such a simple linear form A inequality (3.1) has only finitely many solutions (we even don' t need (3.2)) , and that they are for 4,
ED
x
By
-1
x r 0
- -@/a .
Then 8 ' E 0
. Inequality
-. In
. Hence
ord (6'-x) P
and (3.30)
0
proof it is esseiiEiZi1thae- x - r 0 ui
It --isrhowever--not-
difficult to formulate a similar result that holds for all p z 2 'for p-adic digits
x E Z
z 0
by
-looking, if
z p-1
, and if p
but also
ui z u ~ + ~
ord (6') < 0 . Hence we may assume that P is a p-adic integer. Let the p-adic expansion of 6' be
8 '
A method very similar to the one described above was used by Wagstaff [1979].
(19811 for solving congruences such as in Chapter 4 . 5 " 2 (mod 3n)
. We
where ui
ui E
( 0.
1.
.... p-1
for all
No
3 1
Figure 3 ,
x
Let
A
:- [l,a(qT
if
; y :- (O,~P)= ;
and
y ;
compute K E Z
y :- y
I y-K-XI
is minimal ;
K-a ;
e2
S A P
such that
- al/e2
E Q
ord (6) 1 0 P
. Now
, and
xl, x2 E Z
if We may
1x1
>
1x1
.
explicitly. Then we can
With this algorithm it is possible to compute (I" ) Ir apply the following lemma. So (3.3) now means that the rational number the p-adic number
6
x2/x1
In analogy of the real case it seems reasonable to study p-adic continued fraction algorithms. However, a p-adic continued fraction algorithm that provides all best approximations to a p-adic number seems not to exist. Therefore we introduce the concept of p-adic approximation lattices, as was From . this paper we adopt the best approximation done in de Weger [ 1 9 ~ 6 ~ ] algorithm. which is a generalization of the algorithm of Hahler [1961]. Chapter IV. This algorithm goes back also on the euclidean algorithm. and thus is close to a continued fraction algorithm. But it is not a p-adic continued fraction algorithm in the sense that a p-adic number is expanded into a continued fraction. and that the approximations are then fiXihd by truncating the continued fraction. Recall that for ordn(84(Ir))
r
Bepark,
We take
lemna for X1
such that
is of the sire of
: X
a d apply the Xo
Xo
(rP )
-
is of the size of
.. .-
so
b
Proof.
6")
Apply the proof of Lemma 3.14 (in the next section) for
E No
--
is defined by
.
The above -method has been applied by Agrawal. -PootCeK (19-801. We use-it in Chapteys 6-and 7.
.I tI
i
and
0s d ( * ) I '
P
<
.=define-&
any
& NO
thebadis
'*
approximation -lattice
I '
' 4 '
is
3.11.
Homogeneous rmlti-dimensional approximation in the p-adic case: p-adic .pproximation lattices. We now study the case
.!
(cf. L e m a 3.13 in the next section. where we prove a more general result). The following algorithm computes the point of minimal length in
. )
r . P
where
ei
E Q
L 2
. We
such that
8 /d
. Put
i. j
and with
6 ;
- ailen
for all
for i
Remark, 1,
We take X1
..., n-1 .
lemma for
such that
pP
is of :the size of : X C ( r ) P
Xo
. Then we
expect that
is of the size of
Then 6 ' E Z i P
..., xn
(xl..
5
Xl
Then (3.33) I . P
prohibits the point by Lemma 3.13, approximation lattices can be generalized directly from the one-dimensional case. Namely, for any p E No we define The definition of the p-adic
. ..XJ=
p-1
ord ( A ' ) P
. Hence.
O
r
P
as the lattice associated to the matrix . 3.12. case. Finally we study an inhomogeneous p-adic form Inhomogeneous one- and multi-dimensional approxinurtion in the p-adic
rP
i s equal t o the s e t
8 . ei
n 2 2
n such that j/6 6 /6 E Q and xi E Z for all i. j P j ' i j P We assume that ordp(bi) is minimal for i n , and that
. Put
for i p '
.-
F a L
xn
Hence
- (xl.. . . . x d T
. Then
-
E F
xi
zi
P for n-1
there exists a i
1.
.. .
.
n-1
(zl.. and
...zJT
zn
3
6;
-t9i/6n
1. n-1
...,
n-1 ,
B'
8 / 6 ,
n-1
1 ~~-6~(') + m-pP
--
i-1
-1
A '
~ ~ - (mod 6 ' $ ) ~
-
Alen
- 1 xi-*f + Xn .
i-1 1
-- .
'
.
Then
i-1
ord-(A*) r p
ord ( A ' ) - t P
8'. 6 ; E Z
( x
-
.. ., x T
0
such that
lattices
p E
there obviously~sxists a
zn
such that
SP-z
.
3.12.
No
P the lattice
-rp
for all i As p-adic approximation lattices we take the -P ~ti3Ztiwerk -&fined for the homogeneous case, i .e. for any
P .
--
(see Section
3.11). C(rP)
Put further
. Then we
can
where
cl.
..., E,
is a reduced basis of
C(r,y)
P '
and
. This
following lema.
t
.b
J B l M3.15%
The s e t
rP (y)
-5+
i s equal t o t h e s e t
3.13.
rp(y)
.
Note that
In our p-adic applications of solving diophantine equations via linear forms, we always have linear forms in logarithms of algebraic numbers, i.e. in
ProofL Let
&
(xl .....x,)~
satisfy I
y E
rp .
and
In Section 2.3 we have seen that for a ordp(logp(0) The left hand side is just ord (A') P , which proves the lemma.
i
D
( E Op
if
ordp(E()
> l/(p-1)
then
ord ( 1 5 0 P
Obviously, the length of the shortest vector in (unless in the case lattice) is equal to l(rP.y) following useful l e m a . Let X1 be a constant such that
y E T , , ) . We have the
C(y)
(a translated
> >
5
for which
ord ( ( 1 ) is large. This implies that ordp(lo$(()) is large P too, on which we based the definition of our approximation lattices. However, ord (lo
imply that ord ( ( 1 ) is large. This is due the fact that the p-adic P logarithm is a multi-branched function. To be more precise. for any root of 0 (cf. Section 2.3). In 0 there exist unity c E Op we have logp(<) P only the (p-1) th roots of unity if p is odd, and only 21 as roots of
$ to
(4))
-2
- -1
Let if
<
p
be a primitive,fp-1) 2
(
th
root of unity if
is
It follows 'that
0, 1.
..., p-2
KO
-5 .
is of the size of : X and apply the P .y)--ls -of the size of Xo so-; Then we e x p e c t X a t such that
pp
.
--
Boof 3.15.
xl.
.... xn
X s X1
. Then
(3.35)
0
( x l . .
.- , X J ~
from being in
rP(y)
Hence. by L o -
x , x such that ord ( ( 1 ) (or . n if one wishes) is large, is a sublattice r* (or rP ) of r P P P C In the following lemma we shall prove this fact, and indicate how a basis of this sublattice can be found. Then we can work vith this sublattice instead ord ( ( f l ) of by all
I'
....
.-
itself. Of course. in Lemmas 3.12. 3 - 1 6 and 3.16 we can replace I ' P P ' : For shplicity we assume that a; E Qp for these sublatxices r* I i
Ve shall not apply the above l e m in this thesis, so we have included it here only for the sake of completeness. However, when solving Thue-Hahler equations (see Section 8 . 6 ) . it will be of use.
. We
take
aO
-* .
P'
LPIHA
a11
i
3.17&
Let
al,
md
..., an,$ 0P
aO r. 1
.
xl. ord (ai) 0 P x E Z n
be given numbers w i t h i
minimal for
.t
...,
for
. Put
k(x)
is are are
characterized by
Put f o r any
C, E
(p-1)/2
I k(x)
N0
characterized by
P P
(xl,.. . .xn) E
zn
I ordp(logp(0)
2 P +
.
-3
.
P
that for
- 1, ..., n-1
(p-1) I k(x)
. It
r*
P
C1
of
r :
r*
1
.
.
p Note that Write
rX P
Then then
#
pO
rPC rPC r
are l a t t i c e s . If
p
r*
P
I .
'4
. Let further
f o r any
Define
k(r)
.-
hl. . . .
r
as
P
a 3
.XJ'
Let
hl. ...
by
. 4 be a
.
#
and
, : P
. . .. c
l ,
I ' P
basis o f
(xl..
..
rP
. Then
it follows that
h i . .. . b <
be a b a s i s o f
rP such that
Put f o r
- 1.
.... n-1
and
p 2 5
So
if and only if
yn I yn
. and
E I .
if and only if
# 7 ,
# 1 yn
.
0
and f o r
p r 3
also
Further put f o r
p 2 5
and f o r
p 2 3
also
Them
PI. ... h ,
i s a b a s i s of
rP
p
and
hl.
. . ..
is a basis o f
I .
Proof.
It is trivial that
$E
fl are
72
hyperbolic case this suffices to be able co find all solutions of (4.1). This is based on a trivial observation of the exponential growth of )Gn( in this case. In the elliptic case the situation is essentially more complicated. lGnl can be obtained from the complex Then information on the growth of Gelfond-Baker theory. Therefore in this case we have to combine the p-adic arguments Acknovledgements. The research for this chapter has been done partly in with the one-dimensional homogeneous or inhomogeneous real diophantine approximation method, cf. Sections 3.2 and 3.3. We shall give explicit upper bounds for the solutions of (4.1) which are small enough to admit the practical application of the reduction algorithms, if the parameters of the equation are not too large. Petha (19851 pointed out 4.1. Introduction. that essentially better upper bounds hold for all but possibly one solutions. The generalized Ramanujan-Nagell equation
cooperation with A. Peth6 from Debrecen. The results have been published in b Pethi5 and de Weger [I9861 and de Weger [I986 1 .
Let
A, B. Go. G1
(Gn'n-~ be
defined by Gn+l- A-Gn - B-Gn-l for Assume that let pl, equation
A
- 1. 2.
... .
w
where
k E Z s and
is fixed, and
x. zl,
...,
E No
- A2 - 4 - B
ps
reduced to a finite number of equations of type (4.1) with is not a square. Let be a nonzero integer. and (4.2) with survey),
.. .,
-1
. Equation
Bremner,
has a long history (cf. Hasse [1966], Beukers [I9811 for a applications in coding theory (cf. [1983], HacWilliams and Sloane
interesting
[1977]. and Tzanakis and Wolfskill [1986]. [1987]). Examples of (4.2) have using the Gelfond-Baker theory -by Hunt and van der Poorten They used real or complex, not p-adic linear forms in
n, ml,
.. .
.
A
(unpublished).
logarithms. As far as we know, none of the proposed methods to treat (4.2) gives rise to an algorithm which works for arbitrary values o f pi's
.- I-was
s h a m
.
t
k and the --.. .=-.-- whereas Tzanakis' elementary method (cf. Tzanakis (1983)) seems to be
s .a 1Our method has both
computable upper bound for the solutions. b Mignotte [1984a], [I984 ] indicated how in s o w instances (4.1) with method will work for any equation (4.1) with seems not to be generalizable for
A > O ,
we
give
some The n
preliminaries on binary recurrence sequences. In Section 4.3 we study the grovth of solving l G , (
s > 1
both
hyperbolic case is trivial, and in the elliptic case we give a method for
< v
for a fixed
. by
that has particularly good depedence on Our reduction algorithms are based on a simple case of p-adic diophantine approximation, namely the zero-dimensional case. cf. Section 3.9. In the (4.1).
such an upper bound. Section.4.4 gives upper bounds for the solutions of Section 4.5 treats a special case: that of 'symmetric'
algorithms fail.
but elementary arguments will always work for solving (4.1) in these cases. Section 4.6 gives a lemma on which the p-adic part of the reduction procedure is based, and some trivial cases are excluded. In Section 4.7 we give the algorithm for reducing upper bounds for the solutions of (4.1) in the case A > 0 , with some elaborated examples. The same is done for the case A < 0 in Section 4.8. Section 4.9 shows how to treat the generalized Ramanujan-Nagell equation (4.2).
as an application of the hyperbolic case of (4.1).
Namely, if
(G2sG3)
I
p
( G I . ) )
then
p 1 (G1.G2)
and if
(A,B)
then
and if P 1 (G
common factor
.Gn +1) then p 1 Gn for all " 0 0 can be divided out in equation (4.1).
n r no , so the
LEMMA 4.1.
Let
n, ml.
....
i
As an
assumptions. we have f o r
- 1. .... s
such that
x2
mi
Then, or
the above
or
larger than 20, thus extending the result of Nagell (19481 on the equation + 7 2n (the original Ramanujan-Nagell equation). Finally in Section
4.10 we give an application of the elliptic case of (4.1) to a certain type of mixed quadratic-exponential diophantine equation, analogous to the application of the hyperbolic case to solving (4.2). As an example. we determine the solutions Suppose Pi 1
PrePf.
X. ml, m2. n
of
Now,
and
4.2.
Let by
E
be defined
132
A. B. G ~ : G1
(GnIn4
Gwl
--
, a.
A-Gn
-
- BSG*~
x2 a/fl
for n
%-
1, 2,
... .
7-
(4.3)
__
.-
Let
fl
be the roots of
- A-x + B
. We
assume that
- 4-B
.-Hence-la
+
pi 1 6
. Next
suppose
--
ord (A-/A) pi
ord (p-/A) pi
--
- pi 1 pi 1 E,
G n z for all
-
n -
since
then
ord (E) pi
* . / A
and
*-/A
Then n r O
and
are conjugates in K
From Lemma 2 . 1 it follows that we may assume without loss of generaliq that
@(/A)
. It
-.
1. 1.
we see from (4.3) that we may assume without loss of generality that
4.3.
E
First we treat the hyperbolic case A > 0 . Note that la1 rr 1/31 , since the
-A-p-A ,
(
lo1 >
u2
U ;
C1 C3
- A-max
r, log B ) ,
u3
We have the
--
A-max ( r, log E
Let
---
-(
min (
u2. u3
. U; -
max (
u2. u3
.
+
B) ) -4/log B
Note that
> 0
Let
.
A > 0
THEOREM 4.4,
Let
v E R , v 2 1 max
. All
solutions
n r 0 of (4.7) satisfy
4 n < C3 + --log
( v. 2. IGO.p-/~() .
LEKMA 4.2,
If
n r no and
then
.
n r no that Remark, Note that C3 does not depend on
v
ProofL By (4.5).
la1 >
no > 0
I G ~ ~ . ~ Ul I~ -+ ~ p-Q-~l a IAI
jl-nr 7 .
A < 0
. Any
solution
n, ml, ..., m
of (4.1) satisfies
n. ml.
. . .,
of (4.1) vith
satisfies
lo1
- 1/31 - /B
r ( 2
We may assume n r 2
- -
. Let
-X/p
2ri-*-
A < 0
v
. Since
- i < c s i .
Let
ko..klsZ
r 2
. Since
IAI
and
(a,@)
and
(X.p)
- I@I
Then
Ik 1 5 1 + A - n s n for j j .
0. 1
. Put
<+$' I s f .
Ipl
Let
v E R ,
r 1
inequality
0, 1
. By
IAIJ
We apply a result of Waldschmidt (see Section 2.3) from the complex theory of linear forms in logarithms, which gives an upper bound for particularly good in v n that is It may happen that A1
. See also
In that case.
+ n - 9 E Z , hence
-(A/p)
- ( a / ~ )-~1
we apply another, sharper result from the Gelfond-Baker theory than Kiss did.
...
Note that, by
- /B
$ j
where dj
vo 0
-+ . We
- max
$3
and
described in Sections 3.2 and 3.3 respectively. Unlike in other chapters, here we give the results in the form of precisely defined algorithms. Now and . A j
z 0
, since by
n 1 2
p E Q
-1
, which is
if A1 z 0 First we study the homogeneous case algorithm. Let N the bound found in Theorem 4.3.
1)J
We have
x m-MX ( v. 2- l ~ we
~ - ~ - / l) ~ l
lower bound
.
for choose IAjl V1 -
(4- 9)
From
z
Lemma
2.4
uu(j,n.21kj1)
s 2-n
can
derive W
so that
- log(2.n)
. We
+j
. The
Note
that
number
a//3
satisfies
.
N* for n
0 ).
.
such t h a t
no 1 2/1og B
- -A/p
V2
satisfies IpI , w i t h
hence
h(-A/p)
: . l o g
. Thus
- u;-+
+
Y3
and t h e denominators
ql.
""
qt0+1
o f t h e convergents o f
U ;
Lo
SO
large that
...,
; c q t e the l m g e s t
)
-
integer
-
Ni+l
such t h a t
- . -
(4.10)
1
) .
< a + b-log n
where
- m2
and
'uch t h a t
(log aax
( v.
2. I G ~ - P - / ) A~ + log-
qc i+l
2-C1/log B
if
no INi+l < Ni
i :- i
1 , g s ! g ~(ii) ;
idas N*
4.6, 1 . 6 8 1 ~ 1 0 log ~ ~ Bg- B , ~ -YX(I, ( ~ * ~ log ~ E) log(2-e-u;)
:- mu(no.Ni+l)
, LEM
2-Cl/log B
Algorithm H t e n u f n a t e s . I n e q u a l i t y (4.11) w i t h
solutfons with
0
*<n
<N
.
Ni
x
has
proof.
We now want to reduce the bound found in Theorem 4.3. We do this by studying
r 2/log B . Hence, if n r no
> 4 - N i and
iqCi-$j 1
I
Ikjl/n
1 9 1
Ikjl/n
It follows (cf.
(3.6))
pd%
. Then % 5
Ikj l/n
is a convergent of
eoto
(ii) ;
N* :-Ni ; S m P
-
$.
I Icl
Suppose
-P
J ~ 1 > 1/(ae1+2)-%
for some
.
m
5
LEUHA *
4.7,
n d Ni
i 2 0 . Then
Li
N < n < N only the finicely many solutions found by the algorithm. Proof. some It is clear that the algorithm terminates. Suppose that ia 0 n
5
has for
Hence.
then if
.Iqi'
-$jj( >
2-Ni/qt i
. we have
- -
Ni
for
then n
N i+l
0
'
$j + 0
Again, let
be an upper
a qci-wj+n-Ptkjl+ n/qc i
It follows that n a Ni+l
qci vo B-"I2
+ N i/qCi .
If
lqi' -$ji
c 2-Ni/qCi
. then
LOPVT;
Output;
9 . $j. B. vo. N
N*
for a11 but a finite number of
explicitly given
n . (i) (initialization) No :- [N] ; compuce che continued fraction then K + napC kj'q&i 0 since it is an integer. qC .v0.~-n/2 5 i .By ( p ) 1 it f~llowsthat n no (mod q& ) . Since qti > Ni * thei i only possibility is n no If qL -v0a-"i2 > , then n Ni+l 0 1 1 0 ~ ~ i 0 imediat~ly. ~f
1. . . . to , with to SO large and the convergents pi/qi for i > 2 - N / q . (If such Lo cannot be that qc > 4 - N O and 0 O &o so large that qc > 4-NO ) ; vithin reasonable take , fo-und -- -- - - . cine, 0 i:-0;
1q40-$jl
t.
- .
'
--
-. -
- .- -
ti
such that
if
Ni
is large enough.
compute K E Z 0
if
-Sj 1 " : ; compute n 0 Z qci no < qC , i t K no-pCi= 0 (mod q ) ; i i ' n no is a solution of (4.11). & b print ~ an
with
1 K-
.
4 . 4 .
Upper bounds.
In this section we will derive explicit upper bounds for the solutions of ( 4 1 ) both in the hyperbolic and elliptic cases. O u r first step is the application of the p-adic Cheory of linear forms in logarit-. the s . . e log n way in both cases. We use it to find a bound for vhich works in terms of
if
Ni+l < Ni i :- i
. Then we
ti <
such that
the recurrence sequence, which for the solutions of (4.1) yield a bound for n in terms of the mi no 1 2 (Corollaries 4.3 and 4.5). D be the discriminant of Q(/A)
In the case C5
A > 0
let
no > max
( 2, loglA/pl/logla/81 ) )
and put
Assume that
Let
Put
L
Let d
c6 C ,
log P /
( loglrl
+ min(O.log(~/lwl))
log max
( le-~l~'~. I
A
A
1,
. 18-~44-. 18.r./~l )
.
In the case
For
...,
put
2 2
pi
if
pi
d , pi
-1
otherwise, or if pi > 2,
if pi
2, d - 5 (mod 8)
e)i
-1 ,
-1
cgSi
log
c ~ for ) ~
- 1.
...,
Then we have the following result, giving explicit upper bounds for the
solutions of (4.1).
THEOREM 4.9.
4.8,
The solutions of (4.1) with
Let
n, ml,
then
..., m
then
be a solution of (4.1).
n 2 no 1,
satisfy
(i). If (ii). If
A > 0
and
n r no
m < C6 i
mi <
log
n13
for
. . .. s .
A < 0
n < C7
and
1,
Proof-
(i). Corollary 4.3 yields n < C5-m . By Lemma 4.8 we now have 3 m < ~ ~ . ( l o g n ) ~ < ~ ~ - ( l o. g ~ ~ - m )
-P
3 , and
- (log n) 3
n < 12564
. Now.
. --
x'
.e
n we i d , i
n ord ( - ) Pi
pi-ord ( - 1 , pi
4-Cqlog P/log B
> (e /3)3
I J
4.5.
If
exIst an Before we give our reduction method for the upper bounds following from Theorem 4.9, we treat in this section separately the cases of 'symmetric' recurrences. for which the reduction methods fail. The reduction methods make use of the zero-dimensional p-adic diophantine approximation, as explained in Section 3.9, applied to the p-adic linear form loge@ for p
(if d -1 ) G where o p or
r E NO
and a
a E Q
such that
. Further,
for some
No . From the
+ n-log P
ps
9
means that we must study the p-adic number hence
rl
p , .
...,
. This
- (b/aIr-(ec/A)
Gn
an-r + q.an"
+1
It nay however happen that this number 6 is zero, or that all digits in the p-adic expansion of 6 are zero from a certain point on. Then obviously the reduction process of Section 3.9 breaks down, since it is based on the assumption that the p-adic non-zero digits. Define the following special 'symmetric recurrences'. For in Section 6.2, let Rn for d a, expansion of
6
First let
Then
A > 0
and
as defined
Note that
- an -an a - p
( d
--
'
sn
- an + an .
A ) also
-1
'BY
(GO,G1)
-1
it f o l l ~ ~that s
+*-or
- 1,
o r l/(a-p)
. respectively.
and for
6 --3-rls&
(with
Or
f * r
- $' (14(-~))
--
Next suppose
-
JBJ 2
. Then
Since
(a.8)
for all n E Z
.
51
we have
a.fi
c---r q-a f B
By
(A.B)
6
1 pr
- 1 r
q
we have
0
So
. The
.
T , T ;
un(~). u n ( ; ) - R ~ 3 .R~,
vnb) .vn(~).sn .
- sjn .
i I
fp, f p
if
- -3
result now follows easily, since for and moreover f/(-1) if for all d
ordP (8) 2 0
In the cases of Lemma 4.10 we can treat (4.1) as follows. The smallest index n
g(m-p ) > 0
yap
I Gn
Also.
Gn Hence
Gg b - p1
n , as follows from Lemma 4.2 and Theorem 4.4. exponentially with C It follows that
as the mi tend to infinity. w-p1 -...-pss cannot keep up with G g(a) m is large enough, there exists a prime q ~t follows that ii (Rn), (Sn) have
Gn-Hn-Rn
- R3n/3
Since
Rn
We find:
such that a . Now the sequences I Gg(a) but q t special divisibility properties, such as Rn Sn
I Rm if and only if n I m ,
Skn
for odd k
Iord2(S3)
Now, n 2 1
Gn
ord (S ) 2 n
for all
.
q ( G
a I Gn . This gives an upper bound for the solutions of (4.1). those solutions a I Gn but q l Gn . We give two examples. Exam~le, Let a
6
0 (mod 16) if and only if 4 n 0 (mod 12) . Note that G4-H4-R4 R12/3 -2 - 5 - 7 - 1 1 - 2 3 . Considering 4 the sequences modulo 5, 7, 11 and 23 we find that 2 7 11 -23 1 Gn-Hn for
and only if n and a11 n
0 (mod 16)
if and only if
n = 8 (mod 12)
4 (mod 12) ,
Rn
--
Hn = 0 (mod 16)
if
0 (mod 4) m s 3
implies
. It
- -
and in fact
11 1 Gn
whenever
16 1 Gn lGnl
. Thus
I8
Gn
2 2 .
8 0
- 16, B - 1, Go - 1, G1 - 8, w - 1, pl - 2, p2 - 11 . Then 8 - 3-(7, A -: . so A is a root of unity. Hence , for both p - 2 and p - 11 . Note that we have a sequence of type
A
3 ( 7 .
fi
We note that a process as described above can always be applied when dealing with a situation as in Lemma 4.10. There is an alternative way, that we will mention in the next section. It provides immediately a very sharp upper bound for the mi
Sn
here. We have
4.6.
G (mod 16) n G (mod 11) n 2 Gn (mod 11 ) It follows that ordli(Cn) > 0 odd
8
0
3
-1 6 6
8 8
1 1 1
8
8
-1 6
8
0
We introduce some notation, and then give an almost trivial lemma that is at the heart of our reduction methods for both the hyperbolic and the elliptic cases. Let for i
88
ord (G ) 2 n if and o G3
8
0 or
6
n ~
Cn
3 , according as
1,
.... s
-
~ 3 (mod-&) i Now,
. Note
that
has exactly 3
2 -11
q
G3 factors 2 , and
F 3 G 1 factor
-
11
. But
2
By Lemna 4.1 the pi-adic logarithms of 105~(a/fi) z 0 conjkated l o g ( ( / ( ' ) /A-Q pi 3.p.
88
. Hence
- -
there is a prime 11
q , distinct from Gn
such that m
2
whenever
Gn
. Thus
; ' I F 2 n q
solutions with
. Note
has no -1, 0
--
explicitly. 23 1 Gn
a/#
and
(G ) n a d
'
also
lo$<
.
G1 1
5. B
(1+p)/3
. We
solve Gn Hn
to the sequence
--
- -d .
13, Go
. Then
Rn
The sequence Gn to
A-an
+ A-2 and
-27, a
/A-QP bi E Q
.
pi
so
. Hence.
if Qi
fi
we can vrite
+
)
A-an +
1.2
is related
( an
- zn )/(
-OL
by
where
ord (ei) and u E ( 0 , 1, i.4 pi following lemma l o c a l i z e s the elements of ( C ) n terms of the pi-adic expansion of ki
...,
pi-1
for a l l
The
Section 4.3 s u f f i c e t o &a1 with t h i s inequality instead of (4.7). Another t r i v i a l case is t h a t of satisfy
mi 5 l/(pi-l)
with many f a c t o r s
Pi
in
- ei
+
JEHM 4.11,
Let
NO
. If
SO.
ord (Gn) pi
ei > l/(pi-1)
then mi
Since n
E
ord (Gn) Pi
- gi
fi
ei
+ ord ( n a i ) Pi
.
Z
and max
mi
ord (ai) pi
. Hence
Proof,
+ ord
pi
(ai).
ei
ord pi
[b]n-[~]] w e have
~ ~ d ~ , [ [ $ ] - b ] ~ - l ].
With
( A ) (
ord (0 pi and i t f o l l a t h a t
> l/(pi-1).
Hence
- 1. ....
s , and t h a t i n f i n i t e l y many
pi-adic
for a l l
ei
are
nonzero.
ord pi
[ n.logpi b]
+
fi
+ logpi
[$] ]
4.7.
d i g i t s of that
ord ( n a i ) pi
First w e give the reduction algorithm f o r the case L e m m a 4.11 and Corollary 4.3 only. Let solutions n , ml ,
N
A > 0
N
be an upper bound f o r
.. ., m
.
of (4.1)
-
For example,
ai
C5 C6
4.9.
,
A
ei
1,
...
-
>0
).
r , which i s the
-. __
__
B,
n
A. P. w, pl,
..., pS,
.
mi
0
--
m i s max ( gi
Then we have, i f
A
ord (n-r), pi
- ei
) s
gi
1-+ ord
pi
(n-r)
. (4.12) -
f o r bi--&
-.... s
. d - N
*
-
( i) ( i n i t i a l i z a t i o n ) Choose'a n
Y :-
no
such that
111
- lPl-l~/Bl
+
-"o
.
if if if pi pi pi
ng >
gi :- ord (A) pi from which a good upper bound f o r proof of L e m m a 4.10 y i e l d s bi n can be derived. And i f
< 0 , the
0 , whence, by (4.12).
hi :- ord (A) pi
2
3 5
1
}
for
1.
.... s
f o r some constant
vO
. Only
1.
.... s
the first
ri
u i*si.j
2 0 ,
i + O ; pi r N o a n d u i. ri :- ri + 1 (iii) (further initialization, start outer loop) s i ,o i 1. ..., s ; j :- 1 ; where ri is so large that
for which contradicts our assumption. Thus, mi Then from Corollary 4.3 it follows that
d
gi + s
i . J
for
1,
.... s
(iv) (start inner loop) i :- 1 ; K, :- ,false, ; J (v) (computation of the new bounds for mi , terminate inner loop)
( s N 0 I p ; ~ N : . i n isj 1 -1 Ff si,j < si,j-l then K ,true, ;
and
i.s
+ O 1 ; hence n < N
0
Ff
i < s
---
-1p : i ' ~
Remark 1. (vi) computation of the new bound for n , terminate outer loop) N
. 1
J
terminate in three or
log N . In practice. the algorithm will often j-1 four steps, near to the largest solution. The s , the bottleneck of the algorithm is the
if
N r n O and K j J j :-j+l;w(iv);
N* :- ux
ni
D E O R E n 4.12,
:-
(
(
N ~ . no
hi. gi
+
:
siej )
1,
...,
s ; &gp. terminates.
Petha I19851 pi
s Cn
-1
+
0
With all
*5
n 2 0
lim g(u)
UiQ
-- -
py
as the
I Gn
.
(Gn)&
- d
---k 3.
Proof. exist
If B
- +I
(hence
ri < s
...,
r 1 s N . So si#j si#j-l j j-1 s for all there is a j such that N S no or si, 1.j-1 j s . In the latter case, K remains ,falsei ; in both cases the
A-B-G n
- BSG,+~
for n
0. -1, -2,
...
-I
algorithm terminates. We prove by induction on n < N j that For j hold for all j
n < N for some j r 1 . Suppose there exists an 1-1 . From Lemma 4.11 we have " i > gi "i,j
+
-i
mi
Note that
~~-(p.a~+l-B") and
, defined by
C ; I
G-n
such that
Now. instead of applying Algorithm P twice, we can mpdify it, so that it works for all replace n by replaced by n E Z , as follows. Lemmas 4.8 and 4.11 remain correct if we In1
e2
so
In Theorem 4.9
no
must be
r1 r2
- 90
29
Ul,go 6. 1 1 2 '
> No
289 > No 1.
).
( 2. Iloglr/All/logla/BL
llog
(iii) (v)-(vi)
7 has to be replaced by 7
ri
0 " '
, lrl
v 111
(v)-(vi) Similar modifications should be made in step (i) of Algorithm P. Further, in step (ii), should be chosen so large that (v)-(vi) Hence In1 -5
- 29, K1 -
2. K2 1. K3 1, K4
&trueL. N1 < 76.9 ; *true.. ,true" ,false., N2 < N3 < N4 < 8.7 ; 5.8 ; 5.8
5, ml 5 6 . m2 I 2
. We
1 2 n
have 0 1
if
pi+2
then
i pi z N 0 r -1
and
u. + O , l.ri u i.ri
z u
u. + p - 1 ; l,ri i,ri-1
*
n Gn
4
373
-3 64
-2 11
1
4
2 23
3
134
5 4552
Pi
2 No
and
2174
781
and similar modifications have to be made in step (v) for changes. Theorem 4.12 remains true with n replaced by
S L ~
. With
these
In1
4.8.
Let 2-/2. 32
-;3
6. B
and
no
1, Go
2-/2. A
. With
of
e60
1. G1
4. w
1. pl
1 + 2-/2 )/4./2, p
we have
7
2. p2
11
Then
We now present an algorithm to reduce upper bounds for the solutions of (4.1) in the case Theorem 4.9.
-
( -1 + 2-/2 )/4-/2
A < 0
N
The idea is to apply alternatingly Algorithms P and one be an upper bound for n , for example n
of H and I. Let
- C7
as in
modifications
Reaark
> 0.323, C , 2
-
2 : 1 . 1 ; C6 < 2 . 6 2 ~ 1 0 ~ C ~ .- C < 4 . 6 2 ~ 1 0 ~ ~ Hence a11 solutions of Gn - - 5 . - - ---~a .x ( y . m 2 ) < 2 . 6 2 ~ 1 0 . ~ We ~ perform the reduction satisfy In1 < 4 . 6 2 ~ 1 0 ~ m Algorithm 0.u u u
P step by
step.
2..
. and
number--^^^-^^ to
< 1.76,
C-R ) .
for
P-
-J
as
if
).
p > 10
1 .
..., s .
+
3 if pi
for
symbols A. B, C,
...
- )
2 of
for
1.
.... s
9 , Ip )
Compute for
1. ...
the
ri pi-adic d i g i t s u
i . C
qC
(qc
-$I > 2.
+1
for
~ ~ / (if q such ~ ~ tj
such that
ri
i s so large that
Log(-X/p)/2si
' pi 2No
and
qc, J
) ; j :- j
; g g & ~ (iii) ;
1.
.... s
; STPP.
The following theorem now follows at once from the proofs of Lemmas 4 -6. 4.7 and Theorem 4.12.
pi/qi
0
for
I,
.. ., Co
, where Co
i s so
O 4.13, R ~
Algorithm
if $ - 0 ;
solutions with
can be found i n a reasonable
N* < n < N
> Mi
for
1.
.. . . s
has no
, apart from
O amount o f time,
iq 1 > 2-N /q
and such
Co
qco
- 1. .... s
put
,-F
and
X
if
let
( 2
+ 4-7
1, B ) / / 7
2, GO
. Let .
2. G1 3 fl. Pl
- -.
then A 3. P2 7
-.
.....at
j
; v :- Iwl-
s H piisJ , i-1
choose no r 2/log B
such that
n0/2
B
No
/no
r v/2- lpl
- 1.
. We
g2
0 , hl
1. h2
-0
BY
7.42~10~'
have
--
--. -
compute
n O ~ z , ~
~ i .w qith ~ 3-1
"
N ,
< Nj-l
compute the minimal
C j
Now we choose to
- .
61
since
<C
J-1
such that
and qg q6 M
Iq6,*$I
.
74
0.104 ...
We have C1
637
2.3 Hence
and
Iqg.e5
N2
4 , and we find
Iq6-$i
N3
5
3 , and we find
60, ml
5
6, m2
Next we choose
Next we choose
C2
-6
M
We have , since
We have
Put
u i-r+l
- fT1-T2 :
with
4.9.
- y.1-r+l 1
pi , and also to
The most interesting application of the reduction algorithms of the preceding section seems to be the solution of the generalized Ramanujan-Nagell equation (4.2). Let k be a nonzero integer, and let pl, "., ps be distinct prime numbers. Then we ask for all nonnegative integers x. zl,
...,
Do-x1 w
- y.
k2
-kl-DO
Ik21 1-
zi
whenever
-k
is a quadratic nonresidue
If
. Thus we 1, . , ., t
1,
...,
i Let pi I k and p I k for i t+l, , s . Let ord (k) be odd i . pi -- -r and even for i r+l, ..., t Dividing by large enough
powers of equations
pi. for
1, ... , t ,
--
;..
(D-2
with of v2 r th
> 1
- D - v2
and k2
D > 1 . Let
be
v2
- D - w2 - k2
+t ---there be-
1.
..., T
+
wr.0
in the
v r .O
-/D > 1
v
are given by
class the solution v 7 . 0 ' w r,O such is minimal. Then a11 solutions - of
hr,n. w
, with
with
p kl for i 1. ..., s and Do composed of pl, ..., pr only. i and squarefree. Ue distinguish between the 2s-r combinations of zi odd or i
even for
r+l, i
...,
. Suppose
that
z ;
is odd for
u+l.
..., s . Put
r+l,
.. . , u
for
n E Z
where
7;
vrs0
w r.0 ./D
That is.
)* (vrSn n__-
and
are linear binary recurrence sequences. Now. (4.16) and (4.17) (wr,n1* n--reduce to T equations of M e (4.1). If k2 1 , then T 1. rl c. -1 If k2 1 2 - 0 . k 2 * 1 thenit is easy toprove that 7 : Ik21-c. 7i- c -1 , SO that 7 k c
with In both cases. (4.16) and (4.17) can be solved by elementary means (see Section 4.5, of related interest are Stsrmer [1897], Mahler [1935], Lehmer [1964], Runsey and Posner (19641 and Hignotte [1985]). If k2 1 2 - 0 apply the reduction algorithm to one of the equations
w
r ,n
c ( 2 - D , and either
or
composed of factors
and
11
only.
We have :
v
?*"
- fl .
- n
r
. Note that n is allowed to be i-r+l so we can use the modified algorithm of Remark 3, Section 4.7.
m. pi1
(i)
(ii) (iii) (iv)
then we
m-1 pi ,
-
fi
zl even, z2 zl odd, z2
z1/2 z2/2 2 -11 z x/7, (z1+1)/2 z2/2 2 -11 z x/7. z1/2 (z2-1)/2 x, z 2 -11 (zl-1)/2 (z2-1)/2 , x, z 2 11
. -
c c c
. -
1. D 2. D -7, D -7, D
7 ; 14 ; 77 ; 154
In the first example of Section 4.5 we have worked out case (i). We leave the other cases to the reader. Equation (4.19) can be solved by the reduction algorithm. Again we have four cases, each leading to an equation of the type
Thus we have a procedure for solving (4.2) completely. It is well known how
r ,O' r ,o be computed by the continued fraction algorithm for
the unit
for
/D
...,
section with an example. It extends the result of Nagell [I9481 (also proved by many others) on the original Ramanujan-Nagell equation x2 4.14, The only nonnegative integers 20 are the 16 x such that
+
x2
2z 7
.
has no
or
composed of factors
and
x, z
- x. z
x, z
zl even, z2 zl odd, z2
odd, y - x , 2
z1/2 z2/2 2 -11 , 1 - / 2 z2/2 2 -11 z1/2 (z2-1)/2 2 -11 (z2-12/2 , - 2 -11
. .
c--7.D-
c
c
-7. D -7. D
Case (i) is trivial. The other three cases each lead to one equation of type (4.1). In the example in Section 4.7 we have worke? out case (ii) . With the roiEming data the & r is a correct upper bound. Proof, x2 Since -7 is a quadratic nonresidue modulo 2. 7 and 11 3. 5, 13, 17 and 19 should be able to perform Algorithm P by h a o r
the cases (iii) and (iv), thus coaplering the proof. In these eases
N < l o 3 '
Case (iii):
10
3-dl1
. X
( 2
+ dl1
)/2-(11
7 can occur in
Equation (4.20) can be solved in an elementary way. We distinguish four cases, each leading to an equation of the type Case (iv):
a
197 + 42./22
( 9
2-422 )/2-/22
4(X,Y)
n v-q
with
(0)-(z) -
n (a-v-q
I
pemarks, 1. The computation time for the above proof was less than 2 sec. 2. Let 4(X,Y)
a-X
" 2 - a - 3 - Y- y-n
'
a-X
where a-X
is composed of
a-X
- a-@-Y
and
y
a.x2
Ci
a-3-Y
Note
choices for
b2 Ps
be a nonzero
....
4-a-O(X,Y)
Gn 2
A-/*
in integers X z 0
and
zl.
.... zs
E No
Here.
(G In is a recurrence sequence with negative discriminant. SO " 2 2 (4.22) is of type (4.1). and can thus be solved by the reduction algorithm of
4.10.
Section 4.8. Before giving an example we remark that (4.21) with with D > 0 is not solvable
In this section we give an application of Algorithm C to the following diophantine equation. Let
with the methods of this chapter. This is due to the fact that in
o(/D)
is to
D > 0 qn by
possibilities for
- -
be a quadratic form with integral coefficients, such that D negative. Let q, v, w be nonzero integers, and pl, numbers. Consider the equation
..., ps
t b2
- 4-a-c
is
distinct prime
the method of 1-1 this chapter. since it does not lead to a binary recurrence sequence if t 2 2
replace
. -These problems
in integers X , and
Let
@.
n.
~ y ..., ,
ms N o
. . Let
h-n2 h be the class number of
0
e(x.1) n
Q(h)
There exists a
equation
(qh) . P u t
-%+
with
a nl < h
Then
mEOREM 4.15,
The equation
in X E Z, n, ml, m2
No
--
solutions:
The results of this chapter have been published in de Ueger [1987~]. 5.1. Let Introduction. S be the set of all positive integers composed of primes from a fixed
(
finite set
pl.
. . .,
ps
, vhere
s 1 2 ,
and let
6 E (0.1)
In this
( 1
/-7 )/2
. Then
in x, y E S
x2 - X - Y +
Note that a(/-7)
2.2
- (x-8.~)-(x-3-Y) .
1 , and that 1' - 7m2 (P-/~)-Y - - 4-7-3 X
. We
give explicit upper bounds for the solutions. and ve show diophantine P1.
how the algorithms for homogeneous, one- and multi-dimensional has class number for finding all solutions of (5.1) for any set of parameters
6
approximation in the real case, that were presented in Chapter 3, can be used
For
Suppose
1 X
8 - Y and
y
I X
3.y
. Then
y
On the o t h c hand,
I 11-2"
It follows that
- 21 . hence
s r 3
the continued fraction method (cf. Section 3.2) is used. For 3 we use the L -algorithm for reducing upper bounds (cf. Section 3.7).
-2
. - . . Ps.
8 - Y and Tijdeman [1973] (see also Shorey and Tijdeman [l986]. Theorem 1.1) shoued that there exists a computable number c , depending on that for all x, y E S with x >y r 3
max(pi)
only, such
Thus. for any solution of (5.1) a bound for showed how to solve the equation x
, ( J ) n
with : :
A(J).Bn+~(J).gn
C ; j )
so that)':6 i
- ci2) $ ( ' )
- 2.~2:
for
1. Gil)
1. 2 , and
- -+(2)
- 3y.7 - , m
2 j 1. 2 3, Gi2) For
for j and
-k
.
x. y
with
1. 2
vith an
1, 2 ,
elementary method (see also Xahler [1935], tehmer [1964]). Our method can
~(l)
- I(~) -
(24-7)//-7
,
for
solve this equation for arbitrary k E Z For the one-dimensional case b 2 , Ellison (1971 ] has proved the following result: for all but finitely
-1
. Note
that ) ' : 6
-1
I 2X
1/10))
for
This can be done with the numerical data given for the case j
.
0
p, q
with
p < q
< 20
and with
-1.
We shall extend
p, q
and with 6 - L .
0.9
Further, we t
.... p6
- 1 2 . 3, 5. 7. 11. 13
-6
,
A
with
Combining this with (5.3) we find In Section 5.2 we derive upper bounds for the solutions of (5.1). In Sections 5.3 and 5.4 we give a method for reducing such upper bounds in the one- and multi-dimensional cases respectively, and work them out explicitly for some examples. Section 5.5 contains tables with numerical data. The result now follows from Lemma 2.1, since s , With Ex-~l e 19 C2 < 1.97~10 . With We assume that the primes are ordered as x, y of (5.1). the finitely many
z E N
+
C
C1-log X
> e2
.
17 C1 < 2.30~10
2, 2
pi
199, 6
0.9
we have
5.2.
- 6 , 2 m pi a 13. 6 - 1
we find
. ..
< p ,
For a solution is also a 5.3. Reducing the upper bounds in the one-dimensional case. s
for which
z-x, z-y
solution of (5.1) can be found without any difficulty. Therefore we may assume that X Put (x.y)
- 1 . Put
In this section we work out the examples max ord (x-y) . ULcs pi
run pl. p2 through either the set of primes below 200. or the set of non-powers below
2. 6
- 0.9 . and
p2, 6
50. We note that for any other set of parameters p similarly. We prove the following result.
THEOREHL
(a)
with
THEOREM 5 - 1 - The solutions of (5.1) satisfy X < C2
p2
.
xl, x2 E 2 . x1 z 2, x2 co%Gdicts--y-r
and
. .
---
proofL
]if y
A-x
y >A -x 2
. put
2. and either
then
log(x/y)
f >x -y . Then
a y
; uhrcx
. So
-A
(5 -5) non-powers such that
- 0.9,
.
- --
min
[ pl
-XI
X2 p2
-> 1015-
77 50
solutions listed in Table I. with pl, p2 and conditions (5.5). has only the 74 solutions listed in
By
(b) max(x.y)
r pl , we obtain
Table XI.
<
< 21-6.p;(l-6)-X
result. Lemma 2.4. to
[0(/PI,
We apply Waldschmidt's p
r 3 we have Vi i
...,/Pn) :O ]
with
log pi
for
r 2 . Thus
2 "
s. q
The Tables are given in Section 5.5. gives the real number with
In Tables 1. I1
the column
holds. Since
X1 P ,
X2 - P2
" n
I P1
x1
x2
' P2
delta
(x1.x2)
- .
1
and in Theorem
pl.
p2
are and
W e f i n d from (3.7)
that
k I 92.996
, hence
k I 92
Lemma 3 . 1 f u r t h e
numerous
solutions
0.9
pyl, p 2 : Write
) + 10''
.---
Proof,
w e assume t h a t
p ;
>
.
log pl/log p2 have
(x1,x2)
(qk.rk)
.W e
s i n c e i t i s easy t o f i n d the remaining solutions. Let the simple continued f r a c t i o n expansion ( c f . Section 3.2)
i n the l o g pl/log p2 mentioned ranges f o r pl, p2 exactly up t o the index n such that 19 ( c f . Section 2.5 f o r d e t a i l s of the computational qn-1 S 1 . 9 7 ~ 1 0 < qn e checked a l l c o w e r g e n t s f o r (5.9), and method). Note t h a t n S 93 . W subsequently f o r (5.10). I t is possible, though u n l i k e l y , t h a t t h e r e is a convergent t h a t s a t i s f i e s (5.9) but f a i l s (5.10). log 15/log 23 22 W e met only one such a
expansions and
the
convergents of
a11 numbers
. First
rn/%
for
1. 2.
. .. .
w e show t h a t
x1 2 x2
, hence X
W e may assume t h a t
case: so that
pl
xl
. For
)
if
x1
< x2 ,
a5
15, p2
51. r4
23 , with 19, q4
. Now.
[ 0 , 1 , 6, 2, 1 , 51,
...I ,
x2.10g p2
- xl-log
p1 > X.[
log p2
- log p1
2 X.log 197
-,
199
W e have i n t h i s case
is true. But
0.002714..
20.1.15-2.2 s o (5.1)
<
< 2.1-10-w<
0.0034
This example i l l u s t r a t e s tha-t (5.3) is weaker than (5.1). Therefire a l l found solutions of (5.3) have been checked f o r (5.1) as v e l l . The proof i s now completed by the d e t a i l s of the computations, which w e do not give here. 0
--
Then
21 0 ' p :
2X/10
i 3.1-X
, , and
it
follow^
that
5.4.
X a 80
. This
contradicts
3.1-X
>
-X/lO.
. From
(5.3) we i n f e r
X2
-: : : :', I
<-. 20.1
log p
1 x
Hence
x2/X
i s , by L e u 3.1. a comergent of
log pl/log
p2
S
' 1 ( 9 k 19
'
Xo < 1 . 9 7 ~ 1 0
6, 1 pl.
..., p6
2. 3. 5. 7, 1 1 , 13 1
(the f i r s t s i x
re
uJe
s m a ~ rexrnemencs ~
ox Lemmas
3. I
LEMMA 5.3,
Let
L(r)
X1
----
a / (4 -n2+(n-1)
-5 .
i
ord (xy) given f o r the 571 s o l u t i o n s not pi l i s t e d i n Table 111 a r e chosen such t h a t i t takes a reasonable amount of
1.
..., s
~ O ~ [ ~ - C - / ~ / S - X ~ pi ) / ~ d - lxil ~ O ~J X d
x1
Proof
Xo
C
LPMA 5.4,
Suppose that
for B y the example a t the end of Section 5.2 w e know t h a t X < Xo 36 1.35~10 . W e apply the method described i n Section 3.7. Take 6 (which is chosen s o t h a t i t is somewhat l a r g e r than Xo ). and
rl
.... s6
with
lcll >
9 . 4 0 x 1 0 ~ ~ SO L e u 3.4
and
Then
This is l a r g e r than
XI
1.64.
.. x 1 0 ~ ~ s o
Xo
. By
Lemmas 5.3
and 5.4
a r e refinements
of
L e m m a 3.8,
i n t h a t they so
d i f f e r e n t - i a t e between the d i f f e r e n t
xi . Moreover, Lemma23.3 has slightly sharper condition and conclusion than L e m m a 3.7.
X d 1350
of
. Next
w e choose
---
1 , and
--
Xo
1350
. The ...
reduced
basis
the
corresponding -
lattice
r,
was
2 -
> 4.;9x104
c6mputed, which
i
and
is
w e 'found
5.3 y i e l d s f o r a11
larger
1.
than
THEOREH 5.5,
Next ve choose
in
(x.y)
x,
Y E S - ( 2 l -
...-
13X6
xieN0
for
i-1.
....
1012. 7
lo4 .
W e use
Lemma 5.4
as follows.
If
6 1
(A(
>
lo6
1 has exactly
605
571 satisfy
All vectors
in the corresponding
lattice
r3
sa~isfying (5.15)
and
1 1 1 < lo6
Section 3.6. vectors, but
have been computed with the Fincke and Pohst algorithm. sf. We omit details. We found that there exist only two such they do not correspond to solutions of Next, we choose C then Lemma 5 -4 yields
Table 11, (Theorem 5.2(b)) : see p . 116-117.
- . -
(5.1). 8 10 7
If
I X I > 5x10'
r4
satisfying (5.16)
IX I
I5 x 1 0 ~
. Of
At
C, 7 , and
0
[XI
RelPark. Theorems 5.2 and 5.5 find applications in solving other exponential diophantine equati;as, see Stroeker and Tijdeman [I9821, Alex [ 1 9 8 ~ ~ ] ,
b [I985 1, Tijdenan and Wang [1987]. and Section 6.4 of this thesis. RemarkL The computation of the reduced basis of rl took 113 sec, where we - - -3 applied the L -algo'ritinas~describ&f-it In Section 3.5, i%-1Tsteps. The direct search for the solutions of (5.17) computations (computation of the Hence in total we used 349 sec. took 228 sec. The remaining
--
log pi up to 250 decimal digits, of the reduced basis of I'2 , and of the short vectors in r3 and r , ) took 8 sec.
5.5.
Tables.
(Throrrm 5.2(.)).
1
1
PI
XI
I
I
P:'
8 27
P2
x2
P;:
9 25 27 1 2 1 1 2 1 125 243 361 529 2197 2209 2209 6889 29929 32761 627 42241 1 11 91 3 04731 02767 1 63043 64614 03549 2 25229 22321 39041 2 21331 49190 66161 2 25229 22321 39041 2 35124 32775 37493 3 93658 88057 02081 9 97473 03260 05057 I 1 51499 04768 98413 1 1 51499 04768 98413 1 1 69414 60928 34141 12 20050 97657 05829 I2 35866 42791 61399 2 1 61 148 23132 84249 45 84850 07184 49031 58 871 58 67082 67913 174 88747 03655 13049 350 35640 37074 85209 498 31141 43181 21121 511116753300641401 498311414318121121
delta
C
C P
2 3 2 5 2 2 2 7 2 3 3 1 3 1 9 31 2 1 3 2 7 1 9 2 2 5 1 3 17 7 61
5
5 29 23
II
5 37 29 23 23
3 3 5 3 7 7 8 3 9 7 7 3 3 3 1 5 7 50 1 8 12 5 1 51 22 14 1 3 1 9 9 23 23 11 12 16 24
II
II
12 1 3 1 3 17
;1 128 I 1 1 2 8 1 256 343 51 2 2187 ' 2187 ' 2197 6859 29791 32768 627 48517 1 12589 99068 42624 I 62841 35979 10449 2 21331 49190 66161 2 25179 98136 85248 2 25179 98136 85248 2 38418 57910 15625 3 93737 63856 99289 9 90457 80329 05937 11 39889 51853 73143 1 1 69414 60928 34141 1 1 92092 89550 78125 1 I 92092 89550 78125 12 20050 97657 05829 2 1 91462 44320 20321 45 94972 98635 72161 59 60464 47753 90625 177 91762 17794 60413 353 81478 32054 69041 5 0 4 03636 19364 67383 504 03636 19364 67383 505 44702 84992 93771
1
3 5 3 11
II
5 3 1 9 23 1 3 47 47 83 173 1 8 1 89 47 149 83 1 9 83 157 89 193 1 ' 9 7 197
4!
2 2 3 2 2 3 5 2 2 3 2 2 2 2 2 4 9 7 8 1 2 8 7 8 7 7 7 9 11 7 10 9 9 10 9 8 10 8
0.00000 0.21534 0.48832 0.28906 0.40575 0.22754 0.46694 0.49512 0.45416 0.29941 0.40194 0.32293 0.38504 0.47828 0.18716 0.48703 0.85259 0.80898 0.88568 0.88532 0.76159 0.87942 0.76282 0.86560 0.87594 0.88743 0.89343 0.89862 0.88268 0.88656 0.84059 0.88642 0.89785 0.88568 0.89040 0.89536 0.89580
I I
a(Theorem 5.2(b)).
I
PI
XI
P;'
'
p2
s2
2 3 2 2 5 2 2 6 2 7 2
2
6 12 2 3 3 1 3 I 5 6
3 3 5 5 3 7 7 3 8 3 9 10 4 3
''
pi:
d e l t a
1'
I
I
I1
7 7 3 4 7
'
8 27 32 32 125 128 128 216 256 343 512 1024 1296 1728 2048 2187 2187 2197 50625 2 79936
3 5 3 6
II II
5 I 5 3 1 9 23 10
2 2 3 2 2 2 3 2 5 2 2 3 3 2 2 3 2 2 3 4
9 25 27 36 1 2 1 I 2 1 125 225 243 361 529 lo00 1331 1764 2025 2197 2209 2209 50653 2 79841
II
42 45 1 3 47 47 37 23
.00000 0.21534 0.48832 0.40000 0.289M 0.40575 0.22754 0.40876 0.46694 0.49512 0.45416 0.46007 0.49607 0.48070 0.41184 0.29941 0.40194 0.32293 0.30762 0.36309
'
'
t
(6.1)
pl.
. .. ,
P4
2, 3, 5. 7
and Brenner and Foster [I982I . We conclude in Section 6.6 with some remarks on the Oesterle-Hasser conjecture, also known as the is related to equation (6.1). leads to a method of finding e&&les The results of this chapter have been published in de Weger [1987~].
In particular, our method of solving (6.1) that are of interest with respect to
6.2. 6.1. Let Introduction. S be the set of all positive integers composed of primes from a fixed
Upper bounds.
. where
s 2 3
We give in this section an upper bound for the solutions of (6.1). based on lemma 2.6 (cf. Yu [1987a)). Note that in our paper de Weger [1987a] we used the result of van der Poorten (1977) instead of Yu's. We introduce a lot of notation. Assume that smallest prlme with qi 2 pi-(pi-1) for i pl < 1,
in x, y, z E S
. Without loss of
Let
qi
be the
are
-t,
It was proved by Hahler [I9331 that (6.1) has only finitely many solutions, but hi* proof is ineffective. An effective version. computable upper bound for
can be derived from the results of Coates [1969], (1970) and sprin&uk [I9691, since (6.1) can be reduced to a finite number of Thue equations. See also Chapof-Shorey -and -Tijdeman (19861
- --
----
6.3 is devoted to
vi
-'=(l.log
pi)
- for
S-t+i,
.. .,
some details of the p-adic approximation lattices on vhich the reduction method of Sections 6.4 and 6.5 are based. In Section 6.4 we give a method of solving (6.1) in the one-dimensional case s
..
- ii
i-s-t+l
vi ,
the reduction procedure given in Section 3.10. As an example we find all the y w - z , where x. y, z solutions of the slightly more general equation x
are powers of 2. 3 or 5 , and w E Z , (w( S 1000000 , (w,z) 1 In Section 6.5 we give a procedure for solving (6.1) in the multi-dimensional case
s r 4
pl,
..., p6
2, 3, 5. 7, 11. 13
, and actually
determine all the solutions. This generalizes the result of Alex [1976), who
N o w we s t a t e t h e main r e s u l t .
-
which is l e s s than
by the d e f i n i t i o n of
C4
and
C6
Hence
prime d i v i s o r s ,
m(x-y)
ps
. Then
pi , 1
...,
Pit
Thus w e obtain
and
(
m(z) 2 2
. Then
f o r some
- pi
- ordP
+E
1)
ordp(lo
El) 5( Y
- -
.
This c o n t r a d i c t s our assumption t h a t (6.4) (Yu's and t r u e i n a11 cases. Now, by (6.3) then y i e l d s EXlLmPfes - If -sC4
Put
x/y
fl
- - - B
-W max lxi I t j
. -
m(x-y)
> e2
Lemma 2 . 1 y i e l d s
is
and
0
m(x.y-z) < C8 3.
.
3,
t r 2
we have
> r
then then
C8
< f;9al0l7
27
..
If
s-6,
pl,
..., p6
I -
2, 3, 5 , 7 , 1 1 . 1 3 )
-
Cg<5.60x10
.W e
obtain 6.3.
m(z)
<2
. If
i n (6.2)
t h e p l u s s i g n holds.
pl,
1.
.... s-2
... ps .. . ps-2
Let
be the
.W e
may assume t h a t
. Rename
ord (lo$(po)) P
is minimal. For
B y (6.3)
and
C3
>0
it then follows t h a t
where
uiSC E
0. 1,
..., p-1
r
P for
The
ei
6;
of
6.4.
Section 3.11. Then it is c l e a r from Section 3.11 how t o define the p-adic approximation l a t t i c e s p E No
. Put
I n Section 3.10 w e have described how an upper bound f o r the s o l u t i o n s of (6.1) i n the case
s
-3
THEOREM 6.2,
where
where p0
ordp(logp(po))
. In
(5.2.3) 291
solutions for
p u 5
for with
which is a s u b l a t t i c e of i f for p r 5 p
. -
po
Xo
- plX1 ,
xo. xl.
u E No p
- . .
pU p
3 , and xo
S
570
solutions for
rP .
r*
- 3 . and
s 2 satisfy
for
5
- .
2
Remark,
I2
The Tables
is minimal, but a l s o
hi
- hi
pi
- 1, .... S-2
I = po ( w d p)
. Then
pi
B y
k(Bg) (0.
, and
it follows t h a t
we
Put
have
with
JwJ s
lo6
i n the proof
--
If
po
_(mod p)
, then it-follows t h a t
--
-- -
-_
--
- p2-$
,- 6-0
- logp(pl)/lo$(*--
_ L -
rp , rP
as i n Section
cl
0. c 2
1 ) now yields: i f
For p-2, 3 wehave
> 4(s-l)
-5
r*-I' , andfor P P
p - 5
r h s i s o f
rC
is
if
6")
- is odd.
if
b ( ~ '
i s even
. Using
cl.
g2 p
lcll
- C ( 5*)
the of as
.W e
d i d so. with
i n the following t a b l e .
I <
> W ,
since
> lo4'
Hence
, and we
The values of
6")
r*
P
below.
I f i n (6.7) the plussign holds. then t h i s inequality follows a t once. So now the bounds given i n the above table f o r IyOI, lyll follow from
a s i n the following t a b l e .
The numbers a r e now so small t h a t the computations can be performed by hand. For example, f o r p
- 5 . the l a t t i c e
F ;
is generated by
and a reduced b a s i s is
. -
Cl
-[
205
'y.
G-z
u
.-
42
supposing
In a l l
1 sI
1
i n f e r from (6.6) t h a t
t a b l e above. V e now f i n d the new upper bounds f o r IyOI. lyll a s follows. I f i n (6.7) the minus s i g n holds, then. on supposing t h a t min(x,y) > V 10/9 , we infer
I x y I < m i n ( ~ . ~ ) has ~ . ~ By Theorem S.2(a) w e see t h a t the inequality (265 28 (281 , 3 53 ) . However. both have only two s o l u t i o m : (x,y) *s 1. '-0.9 I x y I - > lo1' So w e infer min(x,y) 5 lo1' , hence by J ) , a lo1' + V we obtain the bounds f o r I yo I 1 yl 1 a s given above. ~ ( x
6.5.
t(rP) I n Section 3.11 w e have described how an upper bound f o r the solutions of (6.1) i n the case
s L 3
Is11/4 >
x + y - z
in
x. y, Z E S -
(x,y)
2X1-....13
X6
x i ~ H o for
i-1.
....
514
S
6 1
with
a r e a l l l a r g e r than
/ 5 - 5 . 6 0 ~ 1 0 ~(note. ~ that
1 and
has exactly
545
solutions. Of them.
S
satisfy
ord2(x-y-z) 5 12 ord7(x-y-z)
5
ord3( x - y - z ) ordll(x-y-z)
7 ,
ord5(x.y-z)
.
.
XI
4 ,
3 , ord13(x-y-z) 5 4
e thus f i n d ord (z) S p + p0 Since equation (6.2) i s i n v a r i a n t p w P under permutations of x , y, z , w e even have ord ( x - y - 2 ) S p + po , a s P shown i n the above t a b l e . Hence m(x-y-z) S 606 W e repeated the procedure with Xo
- Xo
~ ' s probably
5 . 6 0 ~ 1 0. ~ For ~
The remaining
Remark, (6.8). Proof
31
606
and
a s i n the following t a b l e .
After computing the reduced bases of the s i x l a t t i c e s following data. Note t h a t i n a l l cases t(r*) r /5-606 P
r* P
we found the
< Xo
- 5 . 6 0 ~ 1 0.~With ~ the
-
m(x-y-z)
parameters;
5 6
. .
0 0
-2
1
2
-
1443
18 18
-
3196
--
--
Hence
m(x-y-z)
s 67
. Next,
v2
Xo
- .
67
and
yo
y1
v3
y4
C(S) >
ordP ( x - y - z ) d
i9p)
for
- 1. 2.
3. 4
(and g i r . them
r*
P
by the
~ ~ - r l ~ o r i t h Thus m . w obtained:
Hence
m(x-y-z)
56
ord ( x - y - z ) below the bounds given i n P the above t a b l e , w e followed the following procedure. Suppose t h a t w e are a t f(p)
z
is given f o r
2.
...
13
Choose
; .
x1.
...
of
(6.2)
e x i s t s with with xi
x4. xO
IT
ord
ord7z) P (x/y)
r p + po
for
i
0.
. ..
4 , is i n the
A l l vectors i n
r*
I '
with length below t h i s bound can be computed by the algorithm of Fincke and Pohst, a s given i n Section 3.6. Then a l l solutions of (6.2) corresponding t o l a t t i c e points can be selected. Then w e replace w e r e p e a t the procedure f o r newly chosen i n t h e above t a b l e f o r page. Here,
#
f(p)
by
p0
p,
and
and with
p, m
-4
, f (p)
-1
found a t t h a t
3,
.. . ,
13
The
0
Theorems 6.2 and 6.3 have applications i n group theory ( c f . Alex W e use Theorem 6.3 i n Section 7.2. The computer calculations f o r the proof of Theorem 6.3 took 438
Remark.
sec., o f which 412 were used f o r the f i r s t reduction s t e p . In t h i s f i r s t s t e p w e a p p l i e d the L3-algorithm in 1 1 s t e p s ( c f . Section 3.5). which c o s t on average about 60 see. per l a t t i c e . The remaining 50 sec. were mainly used f o r the computation of the 24 6") i *s
.
absolute constant
C
6.6.
Let
Examples r e l a t e d t o t h e abc-conjecture.
x, y. z
be p o s i t i v e integers. Put
such t h a t
c
c(x,y.z) all
<
for
all
conjectured the stronger a s s e r t i o n t h a t some bound depending on For a l l x, y, z c(x,y,z) Recently, with (x,y) only. f o r
c(x.y.z) < 1 + r
. when
x. y. z z
ndsser exceeds
1 and
r e s u l t s and conjectures. see Stewart and Tijdeman [I9861 and Vojta (19871. z w e define I t might be i n t e r e s t i n g t o have some empirical r e s u l t s on search f o r
X,
log z / log G
.
t o decide whether there exists an
c(x.y,z)
a d to
y, z
may be c l e a r t h a t such
performing the algorithm of Fincke and Pohst. All examples that we found with are listed below. Our search was rather unsystematic, so we that occured is 1.626 , which was reached by
fable I
(Theorem 6 - 2 . )
do not guarantee that this list is complete in any sense. The largest value c(x,y.z)
p=2.p,,=3,p,=5
This example was found on September 20. 1985. and has not yet been beaten. to the author's knowledge.
X
c(x.y,z)
These results & not seem to yield any heuristical evidence for the truth or
- -. .
6.7.
Tables.
(cont.)
Tabl+ (cont.)
x0
P2
"I
p;l
sign
W'
(VNN NNN C J 4 0
4dO OON
444
44N
404
0 U Y 4 )
NNO
000
-. -04NN
ONO OAN -ON
044
uu m u NO
ou
4-
U d
uu m 4 . 4 y
mu 4m UO ON 4u UO m o 40 do
uu mN cum mu umo NNU moo
UNr)
N-4 NU
dr)
um
ON u4
OY)
Nv)
mul
ulul NN
N.4 NU
N4
NU
O C J H N
N.444
NNNO
0400 0400
40
m u m.4 m 4 NO
40
N4 0-
mu Mw w4 N w u mY) do N w O 00 N
om Nm mo w.4 dm m(Y wN om *7 tn m u
00 NU
w om w mu dm
04
04
AN m o
aro
u i n
ue
u4
NNU
040d
NO40 OCOO
NNON N4ON
-0tN-4
Nor)
ONN
NUN
omv u m
4NU
ncu - 0 .
om u m m o
--
NUN
. \ -
dU
roo we wul ON md
. N
N
I n n mu)
mm N d ou
WYJ
NN
om d u
O U
\ O N
40
N400
N4tJN
eNdN O W N 4
d0N 04N
N
-7
Y)
.-cw U mul O
UY) Nul
u4 Nm
0-
dNNd
4000
N44
ONNd
ONdN
dNd
. . v)d
u-40
VIV v)N
wo
mN rod
uo
NN
ON dm d No N mul
N Y )
mmr) OOd
-7 uu AN4
mhn ON
AIn NN
In*
M dm U
UN
Oul
Y ) u
N-0
u w u o mul NU w u u u l VN -3 v roo N wO e
Wul
dNdN
Nd4.4
NNd
UNN d d U
OONN OONO
. -7u.4
UNN
0-0
N O 4
-7 -10 d
CJ I n
ON
m.0
N *N O om mu Vul MO
N4
NN
N . ? N
OMm
004
ONU O d d
. r
N
ON0
NdNN
NN-N
. miw
N
u4 uu OY)
-3 4
Nr) -7 N
mr) mul uo mm u m
In0
eul r7 In
NOCJN
dNNN
N4-4 C U - 4 0
OOON
OANN
C J c ( N 4
UNO NmN
duo
+Or)
ddv)
N O 4
w-4
Ud
em mr) wNH
InN NY)
m-n NO \fu
coo NNm
-04
u u ) U* 3
&.NN @Om
oou
+N4
NUN
dUY)
OddN
OONN OdON
dONN
NO00 40-0
ous
ANN
-d mo N
O N
mu) mm UN uu OW
Nu044
roul mu mr)
40
B0-
m u row
04NO
OOON
O d d 0 ONNN -N-O
-00.4 04-4
OUN uum
Y)wm
00N4-4
NUY)
% - d
ul4
wul MN
OY)
4000
4-4
Y)UN
OY) w u '
OONO d4lWO
4N4d
NNN4 NdNd
ONNN
N4NN
NNU 4uu ON0 -00 UOU OOA NmN 4NU w-4 (vmw N#ON NNNO
4NU
444 -40
Y ) 4 u Y ) u 4 ONN
UUY)
-44
UY) y -7
'Y)
.
'
4 0 .
L ? C
UCJul
004
OVm
UInul
404
4dU
N4U
NUU
UNO A d 4 m o d vom
-7oul h * 0N Inulul
am0
\tdN
-00
U W d NNU
4dU
W U N NNN
d4N4 ddN4
NNNN
u u m
r)dN
0Y)Y)
00-
mow d m 4
n0
4-3N
OON
4uul
ul-lr,
0-u UmN
N-iW
uor)
NUN
OUN
004
ONNN
Y ) u u
mmN
d4U
Nul4 I n u l u
4wm
UmN
d u l c )
Inou
(Vw)Y)
NN4
W U N
0
137
m
solution
pl, - . - . ps be given. There exists an effectively pl, . . ., ps only, such that any C , depending on of equation (7.1) with conditions (7.2) satisfies
where y yields
ylVy2 .:and
y1 E S ,
ky2 E S , and
y1 > ly21
Subtraction
.
(
pl.
....
pS
2, 3. 5. 7
in or
By
(u,yl) ( a )
388
2-a + 2-b
- 2 - c , where
hence u, yl. y2 (apart from the sign) are in S c , (u.y2) 1 , equation (7.5) is of the form a + b
only. and 1. The Tables are given in Section 7.9. We stress that the aim of this chapter is not only to prove these theorems, but to show as well that pl. .... ps ) a result similar to Theorem 7.2 can be proved along the same lines, in a more-or-less algorithmic way. for any given set of primes
(
a. b , c
2 . pl.
....
ps we
1 ,
such an equation
a + b
-c
a r b > 0
. For
)
our
pl.
have the following result . LEE(HA 7.3, with Proof. (a.b) Let
..-. ps
)
2. 3 . 5 . 7 1
I pl. D
2. Equation (7.1) with conditions (7.2) can be seen as a further generalization of the generalized Ramanujan-Nagell equation
-1.
.. .
1
. ps -
2 , 3. 5, 7
95
Ikl
arbitrary instead of
k E Z
-1 .
with
a, b, c E S ,
of these gives rise to three possibilities for (7.5): if if 2 1 a 2 1 b 2 1 c then then then (u.yl.y2) (u.yl,y2) (u,yl.y2)
fixed. The method of this chapter to solve (7.1) is also a generalization of the method of Chapter 4 to solve (7.3). Equation (7.1) can be transformed into a number of Pell-like equations. Put if
(ta.b.c).
(b.2c.2a).
where for- D
-
D. u E S
Of the thus found 189 possibilities. the 95 ones given in Table I with and D is squarefree. There are only
-
2S
-
possibilities
satisfy x L y
and
z > 0
-1
0
. Now.
in
z2
2 D-u
+ -y
--
u E S ,
E S
with z
z > 0 and u
and
(u,y)
equation (7.4) by factorizing its both sides in the field dealing with equation (7 -4) we allow
We treat
Q(/D)
. When
7.3.
T w a r d s generalized recurrences. D > 1 . Put K O(/D) . Let o : K + K be the K with o(/D) --/D -.-- For any number or ideal X in K we for u(X) , for convenience.
to be negative.
7.2.
The case
automorphism of 1
.
D
write
X'
pi
. Then
(7.4) is equivalent to
for
1,
....
such that
Z + u z - u -
"1 y2
ord (pi) > 0 . If pi splits in OK , this is well defined if a choice has pi been made from the two possibilities for /D (mod pi) . Put for a solution
(ai-bil
max(ai,bi)
if pi
and
b , j
1 ). Hence
is a principal
max(ai.bi) + 1
min(ai.bi)
-1
0
if
Pi
for an a E OK
. Up
- min(ai,bi) if - 2 occurs, and bo - otherwise. (Note that min(ai,bi) - 1 may occur only if p + pi , hence only if pi - 2 splits). Let us assume that the splitting primes of pl, . . . . Ps are P1. - . - ' Pt
Put bo
pi
possibilities for
. Let
with
> 1
for some
s t s s . Put
For
where 1.
Put for
Z ,
...,
t , let
hi pi
ml-
, mt
a
No
If
. then
hi I h . Now, ri
For
1.
...,
. put . and
0 5 di I hi
The f e t i o n s sequences.
Go
and
Ha
all w i a b l e s but one -are-f ixed ,-then they become -integral bin-
with
ci, di E No
- .- -
. Consider
the ideal
7.4.
pl, ..., ps From the above considerations it follows that, for given K there are only finitely many possibilities for a . By (7.7) it follows that
1,
.... s . Put
(namely,
lai-bil
max(ai.bi)
if
pi + 2
0 ; and
....,m t)
E Z x: N
Note t h a t s i n c e
(u.y)
1 the s e t s
pi-adic
i E I. I'
l i n e a r forms i n logarithms, i n or
IU
. Put
if then p p 5 .
equation (7.4) t h a t w e presupposed. However, w e know t h a t f i n i t e s e t , which can be computed e x p l i c i t l y . completely f o r each hence of (7.1). The s e t of the If
D
belongs t o a Then yi
Ti-+
if
pi-2.
yi-1
if
pi-3.
y1
Ti-;
> l/(pi-1)
, hence i f
z
.
for a
E K
1 (mod 8) then
- 0.
2-aO is
. Hence
- .
being a
then
- ao,
2-a0
Let
(7.10). (i).
n, ci
ui
( i E IU )
be a solution of
aO i f a l s o
2-a0
already
ord (a ) 0 also a 2-aO 2 0 may occur, s o t h a t w e only have t o consider the l a t t e r . Note t h a t i t may now occur t h a t
IU and
D = 5 (mod 8)
then with
B y
the
aO
same
argument,
if
For
i E IU put
A,
(u,y)
I u I'
- 2 . The condition
(a0)
- ordp i ( 2 ( ~ / a ' ) .
(u,y)
-2
'.
'
Further. i f a
I . I'
(a6)
f o r some
of the p a i r belonging t o
a o , ai)
Namely, by
- -
c-c#-
- fl
aO by
I, I'
are
16,
IO )
i+AiLyi
then
--
(ii).
For
put
ord .Pi a
and analogously
If
hivei
' c ~ L yi
then
(ii*).
For
i E I * put
Ai-h
*- A i ,
- h
*- n + n O , *
3 + nj
Then it follows t h a t
Ki
a* i
logpi (55) a
n.lOgpi(e)
jEIU
uj - l o gP i (pj
h -c i i
So, by (7.12).
r yi
then
where Remark.
IU, I
a
vi
logarithms a r e well-defined,
since splits,
for pi
t h e i r arguments have
I'
adic order zero. This follows from the f a c t t h a t ia r e disjunct. and i f D 1 (mod 8) from the choice
vo
otherwise. I f
- t+l.
. ..
s , and
vo
1 bo
if
-1.
2-a 0
Proof,
For ( i ) , divide (7.10) by i t s second term. For ( i i ) . divide (7.10) by i n a l l three cases, take the pi-adic order. and apply Then i t follows t h a t
s u b t r a c t 1. Then. (7.11).
.
-
seem t o be inhomogeneous. since the f i r s t term has c o e f f i c i e n t 1. However. it can be made homogeneous by incorporating t h i s f i r s t term i n the other ones, as_foll~ws. Put
.
--
--
Note t h a t , by the d e f i n i t i o n of
n, c i
aim a ;
for
1E I
u I*
ni
for
0 s i s s
a r e i n t e g r a l . I t follows t h a t
ui
for
i E
(7.10). l e t Ai,
ui* (i).
* I,,
be as i n L e m m a 7.5. and l e t
ui +-.Xi L yi
h , At.
be a solution o f
Kt,
K ; , ni, c i ,
be as above.
i E
Let
IU
A
i
. If
+
&en
ui
Put
ord (h ) pi
ord (Ai) pi
* .
(ii).
Let
i E I
. If
K
h -c. i 1
+ ii 2 yi
then
h -c i i (ii').
ord (h*) Pi h -c i i
- ordP i (K:)
+
s ;
.
then
)
and f o r
Ki,
* K i*
Let
i E I'
.
i
If
r yi
h -c i i
K'
ord (h ) Pi
- ordP i (K;*
.
hi.
C1.
C2.
C3,
C ,
we t r y t o f i n d constants
ClO, Cll
such
a r b i t r a r y i n t e g r a l values of the v a r i a b l e s
a
ui
Ki,
K;
. Notice t h a t the
I n view of (7.13) we may i n s e r t and d e l e t e a s t e r i s k s any time w e like, as In[ by a constant times log B
has disappeared completely from these l i n e a r forms. This means only, instead of f o r
long a s we don't specify the constants. I n order t o prove (7.16) it remains. i n view of (7.14) and (7.15). t o bound w i l l introduce c e r t a i n constants
C5.
.W e
7.5.
- ( C6
C8, C9
(7.17)
C7-H )
.
Ga
dominates. W e s h a l l show t h a t there e x i s t
p-adic
I n case ( a ) it i s , by (7.15). obvious t h a t (7.16) holds. I n cases (b) and ( c ) one of the two t e r n s of constants such t h a t
. Then we give arguments hi, Ki, K; w h y we choose t h i s way t o apply the theory, and not other possible ways. I n
t h e next s e c t i o n w e give f u l l d e t a i l s of the derivation of the upper bounds. I n t h e sequel, by the 'constants' C1,
...,
C12
Then (7.16) follows from (7.14). F r o r (7.16) we derive immediately an x x p l i c i t upper bound hen= f o r a l l the v a ~ i a b l e s ~ i n v o l ~ Since d. the c k t a n t s also
C12
.
C12
C 1 . ,
..
for
C4
will
be very l a r g e .
w i l l be very large.
proceed by reducing t h i s upper bound, by applying the computational p-adic diophantine approximation technique described i n Section 3-11. t o t h e p-odic l i n e a r f o r a s i n logarithms t h a t t h e constants C5, hi, Ki.
C9
To f i n d a l l s o l u t i o n s we
* *
Ki
* . Crucial
i n t h a t l i n e of argument is Cl.
. .. ,
....
C 4
orders of
the l i n e a r
Then i t follows t h a t
forms. Then w e can replace (7.14) and (7.15) by much sharper i n e q u a l i t i e s , and repeat t h e above argument, t o f i n d a much sharper i n e q u a l i t y f o r (7.16). I n general we expect t h a t it i s i n t h i s way possible t o reduce i n one s t e p
for
H,
U. B
A :
C12
for
2.6
t o the p-adic
linear
forms i n
t o a reduced bound of s i z e
log C
12
logarithms. For
we f i n d , i n view o f L e u 7 . 6 ( i ) .
(7.10) partly by the theory of real (instead of p-adic) logarithms, and subsequently Ki and by a real approximation technique (cf. Section 3.7). First, note that
computational
Ki
occur only in case (a), Ki, K; this is the most difficult case. Equation (7.10) consist of three terms, each therefore more complicated to handle. Since of which is purely exponential, i .e. the bases are fixed and the exponents are variable. If one of these three terms is essentially smaller than the other two (more specifically, smaller than the other terms raised to the power 6
. for a fixed
In1 cannot be very large, and we are essentially -(i.e. apart from a finite domain) in case (a). Unfortunately. the region for In1 that w can cover in this way becomes smaller as (see the example below). Second, suppose that
Ix-X'
. or
1x1 <
*
1x' 1 6 . Then we are essentially in case (b) or (c). But this area can be dealt with easier p-adically, since here we use the linear forms
whereas the real linear forms in logarithms used in this case will The really hard part is C. It can be reduced to and Ix*( + IX'16 < x < c - ( x ' ~ for any c > 1 generically have more terms. The areas sketched above, in which we can apply the real theory. will not cover the whole domain corresponding to case (a) (cf . the white regions in Fig. 4- bel&) the p-adic linear forms Ki. K; use of real linear forms. --
. b u t w i l l never
<
Ix'l
Ix'l
disappear. So we cannot avoid the p-adic linear form in case (a), vhich then works in regions C and D together.
1 + f2
(1+f2)n-(1+2-/2)x Fig. 4 below gives in the (n.X)-plane 2 the curves 2IX* * which are boundaries of the four regions A. C, We have the following y possibilities.
Then we have
--
s1
2./2
I - - (11
pl
and
7.6.
--
We now proceed with filling in the details of the procedure outlined in the previous section. We apply Yu's lemma (Lemma 2 . 6 ) - - r o - -follows We have ai we have r / c ' . r /r'
-2.
- K - a(&) .
so
For the
, or
t.
s j . Wehave
1.
h
...,
a prime i d e a l in
; i
l y i n g above
pi
Let
hi
be a d i v i s o r ui
of
such t h a t all pi
Let
e i t h e r : (1)
s p l i t , and then fj
to
or: ( 2 )
ca
'
-3
"j
for
1.
...,
h(>)
- log(.) .
ai
1,
h
j
-1 0 ( l j l j 1 ]
ord (b ) is P " a r e the unknowns, w e should
Vi
Let
be an odd prime, n o t d i v i d i n g
. Then
for
.. .
I?;
n-1
...Vn
ErooL
Let
KO
i
..
v ,:
- K((:'~)
, and
qi*l
Ki
Ki-1(F:t21
induction on Suppose t h a t
t o prove t h a t
and
only
[Ki:K]
matters f o r defining
. It
[Ks:K]
it s u f f i c e s t o prove t h a t
. I t remains el+, t Z Ki
K-vector
for
1.
. .. . s . W e
[KO:K]
.
q
Note t h a t [Ki+l:Ki]
is prime.
t o prove t h a t
- q . hence
, with as
use q
, since
Suppose the
contrary is t r u e .
Ki
is a
space of dimension
qi+l
- -
k + ~ ( O , l ,
J .
...,
q-1 )
for
0,
...
,
I t follows t h a t there
exist
.ki
E K
such t h a t
B Then
- Bo
BnP-7
- max-{dbll,
. By
....
B 2 2
<B
3 log(1~-Br ) f - ( l o g p)/d
i t follows t h a t
3 1 + z-B
The group of
j
w
There -are
log B
.
conditions to be checked. The first one
K-embeddings of defined by
Ki
into
i s generated by the
0.
..., i
'3
..
not a l l
-2
bi
two
more
is
that
r 1
. This
..
- .
h
pi
where
i s a primitive
q th
given by
7.7
number. tat
Let pl,
.... p,
- Q(/D) .
with
as class
be d l s t l n c t p r l w n d e r s , and let
be f o r
for C E I 0, 1. j
.... q-1
. It
follows that
.
and in case (2) to
over j
(
is
( : $ are
p j ( : $
for mj
- 0. 1.
O*
xq .... q-1
.
)
Hence the
(where that
p ' * '
(to)
stands for q
or
(note
- 0, 1, .... q-1
we have
.--*
q-1
- 1.
...,
and
hi+l
This
0
.
1 > 1 - 1 then
Remarks, Hence i
1. If
- . ..a n-
1 ord (a P 1
.. . .-o "-1) n
We prefer to work with the logarithmic version. since that is the one we use in the computational method of reducing the upper bounds. Now apply 2. In order to apply Yu's that does not divide lemma we can take for q the smallest odd prime
cpC0' ' ' . .ti to (7.19). Then for each tuple (to,.. . ,ti) we find
h-p-(pfp-1)
.
C1 to C12
We now proceed to comp-iite the constants we apply Lemma 2.6 to constants Here we have a system of q i+l linear equations in the q i+l unknowns i+l (where ti Cl.i* C2.i
- Ai *
To find
C1
and
, for all
, , i E I
. Then
=2
% ( , .
discriminant of
hi ) , we obtain
*.
e -ord P P
K :
max (li-Xi)
Iu
it suffices to take In case (1) this leads to the i&al equation
.- *
c1
. C2 for a11
iIu
( C2,i/epi
K ;
and C4
Kif
C3
and
. By
x(' '
I if
and i
and
E
I* I
we denote constants
X C3.1
I*
There exist by
L e ~ a a a 2.6
Then we infer
C4,i
(where again
K:
'
C4,
- log B* .
l o g ( )4 4 ~ + U -log(P) )/log
1 0 1
n < min ( -(C6+C7-kt), 0 ) it suffices to take Then we find that the second term of
.
Ga dominates, namely
c ,
.:'.'+or@
. a x ( iIUI '
(h 1 . pi
+-
3.1
) , C4-
hi
hi.ePi
C 'Pax iIUI* i Pi
~" -~
We take
C5
to
C ,
as follows:
c7
Note that C , take C8
-(
C9
1 log iI
C6
1 4
+
1'
log
I4
-
I'
Put )/2.log
c
.
-C6
C5 and
or
. Suppose first
- I*
< C5
. firther.
Then we infer
that
Then, from
r-c*
fl
RemarksL
1. Theorem 7.1 is an immediate corollary of Lehma 7.8. N of c ; ? will in practice disappear in the rounding C10 and Cll , the dominating factors
2. In practice, almost alvays the first term in the --definition dominates. Moreover, the tern are in practice Hence C1 to off. Similarly, in the definitions of
C4
7.7.
The remaining possibilities in cases (b) and (c) are 0
4
C5 < n
and
for
. which
i . We
. So we
1 ,
is equivalent), to a much smaller upper bound. We do so using the p-adic computational diophantine approximation technique described in Section 3.11. We perform this procedure for A
hi. Ki. Ki
work in the p-adic approximation lattices Then (7.18) holds in the cases (b) and (c)
C1
. Now
take
computation of the p-adic logarithms to the desired precision. and the 3 application of the L -Algorithm. We refer to Chapter 3 for details. Once ve have found reduced bounds for ord (A) for the above mentioned A , we P combine these bounds with Lemma 7.6 and with estimates (7.13). (7.17) and (7.18) to find reduced bounds for B and B
Cl1
max
* .
Then it follows that (7.16) is true, if conditions (7.20) and (7.21) hold. Hence,-by L e m 2.1, ve infer the following result.
B.
replaced by their reduced analogons. above procedure again, with C 1 2 c;~ Ue nay repeat the argument as long as improvement is still being made. But at a certain stage. usually near to the actual largest solution. the procedure will-not yield any Curther iaprxwement, Then we have to find -all solu%otls-by
c;~
max
--
some other method. One technique that may be useful is the algorithm of
* (h (ri-~i)+~]
iIu
Fincke and Pohst, described in Section 3.6. Another way is to search directly for solutions of the original diophantine equation below the reduced bounds. In our present equation this may well be done by below the obtained bounds. employing congruence arguments for finding all solutions of the second equation of system (7.9)
7.8.
RroofL Clear.
In this section we shall bork out the procedure outlined above for our standard example
(
pl,
.. ., ps
2, 3, 5 , 7
7.2. I n Tables I1 and 1 1 1w e give the necessary data on the f i e l d s f o r the 15 values of
D , and on the f a c t o r i z a t i o n of
Q(/D)
Sketch of each
Cl
roof,
I n Table V w e give the necessary d a t a f o r these 54 cases. w e give C 1 , nl, a l , h2, . . . h7 C1+l p 1 Ga(n) f o r a l l n E Z and
2, 3, 5, 7
in
Explanation of Tables I 1 and 111. For generator of the i d e a l i d e a l . and w e give "Pia 2 2 , s o pi (si) hi Pi with
e give i n Table I1 a 2, 3, 5, 7 w pi ord (Pi) > 0 i f pi is a p r i n c i p a l pi i f it is not principal. I n a l l the l a t t e r cases, a t most one of the primes 2, 3, 5, 7 splits,
2, 3 . 5. 7
is given, then
I f for a
only for a t
Ga(n)
l e a s t one
n E Z
If
nl, al
a r e given, then
is p r i n c i p a l . A n a s t e r i s k (*) denotes a s p l i t t i n g D
Define
n2
al
if
nl
0 , and
n2 cl+l p n
n1
if
nl
Then
n2
is the
a generator
of the i d e a l i : P .P
i
pi
not p r i n c i p a l , but
J
0
are
whenever symmetry
Ca(n2)
N o w it is true that
nl (mod a l l
of
.
the recurrence sequence
W e may assume pi
I*
This
is
Q
related
(Ga(n) In-
.
h 9
For q
to
properties
2. 3 . 5. 7
w e have defined
. The
XU
i s found by checking
f o r a11 pi
.
Hence
ord (C (n2)) 9 0
.
whenever C1+l p
-0
D
2h2
- P3. gh5-7h7
Ga(n)
I Ca(n)
W e have taken
s o large t h a t always
. Now,
- --
-- -
--
With
(a)
s ' E
--
Z , B
- N c
-
c-r*
- .
fl
-
Consequently, there e x i s t s some prime r 2 1 1 t h a t divides Ga(n2) , hence C, +1 I Cp(n) I t follows t h a t f o r a s o l u t i o n r divides a 11 Ga(n) with p A
- - -- -
. -
Ga(n+2)
- .
A-Ga(n+l)
- B-Ga(n) .
no E 2
--
w e have f o r a l l
n E Z
Since
(a')
t h e r e i s an
such t h a t
a'
fenO-a
. Hence
3 , a
/3
. Then
h y ve c a l l these cases w s y m e t r i c w . I n t h i s n E Z -,--which explains w s i t u a t i o n we can apply elementary congruence arguments, a s explained i n
for a l l
and
Ga(-n)
Ga(n)
.W e
have f o r
Ga(n) :
Let
pl,
I
...,
(*).
pq
2, 3, 5, 7 ) 91
0 has e x a c t l y
I marked w i t h an a s t e r i s k
a , only on the
pi ) . The values
a r e the
.
C12
< 3.23~10
30
So n
and only i f
1 Ga(n)
.W e
of
- n
digits. W e
a s follows:
- 0 does not lead t o (7.23). since then n2 - 2 . and Ga(2) - 7 . so t h a t no s u i t a b l e r e x i s t s . But with C 1 - 1 w e have n2 - 14 , and h2 - h3 - h5 - 0 , h7 - 2 . and (7.23) holds. since Ga(14) > 72 . Hence
t h e r e e x i s t s a prime whenever 72 1 Ga(n)
any prime
1 1
such t h a t
r I Ga(14)
r I Ga(n)
w e have i n order t o have
p :
- .
14
I t follows t h a t f o r solutions of
somewhat l a r g e r t-+n
the maximal
is known e x p l i c i t l y , only t h a t
tG
b(')*s
c ; :
, being
337
or
- 3079
satisfy.
-.
-- -
non-elementary reduction technique described i n Sections 7.5 t o 7.7. I n a l l our instances, the s e t and ve v r i t e
m
the
ni
belonging t o t h i s prime,
. Equation
C(I'C)
cases. L(I;)
L e u 3.14 with n
2. cl
0. c2
C 1
to
C12
C12
each o f t h e 54 cases. W e omit the d e t a i l s of these computations, and simply give the data i n Table VI. I n t h i s t a b l e w e give f o r each together with the vi and
Xi
( i t t u r n out t h a t the
Xi
the f i v e
d i g i t s , with
a s follows.
e obtain from L e u 7 . 6 ( i ) upper ord (h*) 2 0 w pi a s given i n the i E IU , hence the upper bounds f o r U
Ai
so that
p :
: c :
W e computed the 40
values of the
6") , but do not give them here. The l a t t i c e s 1.2.3.4 generated by the columns of the following matrices:
cc
are
Ki
one f o r each
where i
j'i
, so
pi
( D (mod pi)
becomes c l e a r .
W e computed the reduced bases of the 10 l a t t i c e s by the ~ ~ - a l ~ o r i t h Again. m. w e omit the computational d e t a i l s . W e f o d d a t a a s follows.
ord (h ) 2 0 and hi 2 1 we have M d ord ( K ; ) PI I pi upper bound for M as given in the table above. Finally, we compute the new. reduced bounds for we do by (nl < max In1
"
> /5-C12 ,
SO
<
+ po
and
hence an
. This
( C5, C6 + C7-X. C8 + C g - U )
Hence ve find data as in the following table. Here we used the bound
s h -B
and
h*
B* < 3 . 2 3 ~ 1 0 ~ to ~
B* I 1627
0.7 sec for each 2-dimensional lattice. and 170 sec for
The computation time was 1s sec. We made a third step, with for
.
--
Ai.
K ;
We ma&
a further reduction step, now using the reduced bound for C12
* .
B*
as
we took
pl-p2
. with
in the table
as below:
We found with p
L ( I .
; r e found. ) and bounds for U as given above. For the K P pl-p2 with p2 as above, and p1 as in the first table below.
~ O O I I I I I I ~
r r n n n m n n n n
n n m n n n n n n n
n n n o w w w o c e
c c e r c c r r r c
ord pi
for
I"
h l
L.
n n r m w e c a 0 ~ n n r m w e c m o ~ n n r m w ~ e m4 o eeerereeec w w w w w w w w w e mmmmmmmmmw
d n n r n w r - o a o c o r o c c a a r m
c . n n r m w e r a o m m a a a m s a m o
d
Now we will not find any further improvement if we proceed in the same way. But the upper bounds are now small enough to admit enumeration of the p remaining possibilities, making use of mod p arithmetic for only 3 sec computer time for this last step.
- 2.
3, 5 , 7
We did so. and found the remaining solutions, presented in Table I. We used
7.9.
Tables.
o n n r o r m d m o
n
O I N
o - - o o c w n m n
N N
d W 1 I
wl-
e-+ncora
8 - W d r . 4
4
r a w - o o + o o m r n o ~ n o o
N
r I
I
Inn
n
I
c r
r n - r a w n o o n m o 4 r m n c o r I w o o n 1 I d N I
0
n r w m o r r - n n n r m n c c r n -on ~ n o mw
I d
I 0
-4
m n r n a m w o w r r r n n n o o a o a n n n r r n m m r
- 4 -
d - d
dooooooo+o c o m o n m n o o r w w r o d n m n r d d - r d - d - w n
r.
m o u n
o w ~ n
m o r o o o o - d o o n m o + m n o w r n o - o n - m o ~ n n m o m n o n ow n w a r r n r c o n o o n n o o o a w a r n - w o o w r r r w r n m0 - 0 - n o r r c o n n d n n n m n ~ n n n n r ~ ~ n ~ ~ nmr r r n n m r r
d
d N n r m w r c a 0 w w w w w w w w w r
-.ddr."-.lddd
WNOOOWlUb-d I c m o o m ~ r w m n I 1 1 1
w m w r o m o w a n m o a e m r w m r r
Nd
0
m m o o w o w m a o C I ~ I ~ P Q ~ P N ~ * m 0 w m r w o o l d
Table 11,
o d a m n w A w d m
d
o a w o r r o r o o o n o r m a d r nod - 1
I
m w o o w o o ~ n m r o d o a w r w n d w o o m o o ~ r l n aw a a r n r m
I
a ma w w m m m o r t c r n r a l o Pda m r r ~ m l n d
I
d
n on
m o ~ w m m o w ~ ~ w a o n n r o a c rr a n o r w r a p 1 N I d I I
a o o ~ a o o a m m r m ~ m o a o o o ro m m o o r m m d o r o o a r u m r n r r n a r n r r o o a o r o o w r n o r o o o o n o a ~ n o na w C m a o o n n w o a d o r d - m a 0 a n t c a a m n o m ~ c r w w r a m ~r r d n a m n o a a o m w w r m w a a r o a n n r a d w r a o o d m w r o a c m r 4 - 4 4d-d-n n n n n ~ n n w o r
d-
n n w o
w n r r d o m n d t r m a n w a d d n r m
r d c ~ r r r a
r a a m o o m c w o n o o r ~ m a w w o n r n r o m m o
Table IV,
NN NN
00
00
NN
00
MM
40
00
N
0
N
0
IU
40
0
4
0
0
0 4
0 0
0 0
0 0
4
0
N
0
4
0 0 0
0 0 0
00
6 - 4 0
N
0
O
0
0 0
0 0
do
MO 0000
00
MO 0 0 0
---
uu
04
NN
NN
OU
4 4400
ww
-In
00
0
0 -
Csf.
0 -
NN
04
N O U O M
0
N
0
4
M
0
A N
0
4
C s r .
0 -
N
44
N
44
NNOO
0000
00
0000
4040
0000
0040
0000
NO
-400
UN
MOO0
UMOO
-0
-004
MNOO
MdNd
4000
W - 0 0
Table VI,
4 4 4
4
4
0
0 0 0
i '
0
4
0
0
0
4
w l 4
( c b
( c b
(ccc
O w l
0000
b
0
(c
O w l
0000
O w l
0000
Y)
0000
O w l
u
4
U
0
N
4
N
0
U r n
4
4 .
wl00Y)
M o d 0
oouo
0000
NOON NQ
wwwo
NNNN
0000
NNNN
0000
mmmm
0000 W h b W
0000 mnmm
0000
4.4.4.4
mV)YIUl
0000
4.4.4.4
NNNN
Acknovledgements.
with N. Tzanakis from Iraklion. The results have been published in Tzanakis b and de Weger 119871. See also Tzanakis [I9871 and de Veger [I987 1.
8.1.
I
Introduction. F(X.Y)
E
Let
Z[X,Y]
in
X. Y E Z
theory of diophantine equations. In 1909 Thue proved that it has only finitely many solutions (cf. Thue [1909]). His proof was ineffective. An effective proof was given by Baker Tijdeman [ 19861 for. a s u . = e J r [1968]. See Chapter 5 of Shorey and
in Baker's argument, we derive a fully explicit upper bound for the solutions of the Thue equation. Then we show how the methods developed in Chapter 3 can
-
- -!
I
be used to actually find all the solutions of a Thue equation. Our method works- in pr-incipb for any Thue equation, and - iw-practice for a n * -
equation of not too large degree, provided that some algebraic data on the form
are available.
Variants of the method we use here have been used in practice to solve Thue equations by Ellison. Ellison. Pesek, Stahl and Stall (19751, Steiner [1986], Peth6 and Schulenberg [1987], and Blass. Glass, Heronk and Steiner 1 1 9 8 7 ~ 1 . b [I987 1 . When determining all cubes in the Fibonacci sequence, Peth6 [I9831 solved a Thue equation by the Gelfond-Baker method. but with a completely different vay to find all the solutions belov the upper bound.
8.2.
try to prove that no 'large* solutions exist. The value of Lemma 8.1 below. This lemma shows that if 1YI 'extremely close* to one of the real roots may be as large as 10los0 , Y2 <(i)
In this section we show how the solution of the general Thue equation implies an inequality involving a linear form in the logarithms of algebraic numbers with rational integral coefficients (unknowns). Let
Y3
LEMMA 8.1,
Let
X. Y E Z
s a t i s f y (8.1). Put
- X - <-Y ,
if t . 1
2n-1. lml
be a binary form of degree the Thue equation n 2 3 and let m be a nonzero integer. Consider
yo
min 1 I* ((s+i) B u t
in the unknowns
X. Y E Z
If
is reducible over
reduced to a system of finitely many equations of type (8.1) with irreducible binary forms. For such equations of degree 1 or 2 it is well known how to determine the solutions. Therefore we may assume from now on that irreducible over 9 and of degree
Z
. Let
g(x)
g(x)
. Then we
F(x.1)
1,
..., s
such t h a t
roots then one can trivially find small upper bounds for the solutions that the algebraic equation its roots as follows:
max(lXl. lY 1 )
C(s+l)
have
F(s+t+l);,
.. . ,
IB(~)I 2
(ii). I f IYI > Y1
C ~ - I Y tor I
then2/Y
i E I 1.
.... n
i r io
r 1 )
F(s*t)
t ( r 0 )
-n
expansion of
<
( i , )
.
-
, where g(f) 0 . We will define three Y1 < Y2 < .~;--,-that will divide the set of possible
. -
- a(()
--- -
?roofk
-Let
i0 E ( 1,
-18
__I
---min Uisn
- .
I) the 'very small* solutions, with enumeration of all possibilities, 11) the 'small* solutions. with 111) the *largeq solutions, with
Y1
By the minirality of
. They
.
1 8
(Io)
will be proved-nrto
exist by a computational diophantine approximation technique. IV) the 'very large* solutions. with IYI > Y3 They will be proved not to Hence exist by the theory of linear forms in logarithms.
le(i)l r C2-IYI
. Further.
The value of
Yj
follovs from the Gelfond-Baker theory of linear forms in follows from the restrictions that we use as we
Now, if
i > s 0
(and hence
t 2 1 )
Yo
C ,
Log(z)
(hence
n
-n
< Im L o g ( . )
r ). By
<(k)
- <(j)
we have
IA( I
.
(A1 is.
k I
n which is impossible if once. Moreover, if JYI > Yl and thus
min
-s+l.iIs+t
IImt(i)~
1YI > Yo
. Hence
i0 I s
then
C3
rnax i1ci*+i3+i1
I x F
- (io) ~1
< f - l ~ l - 2since ,
(io) (
If
( Y J> Y2
then
follows from a well known result on continued fractions. cf. (3.6). Now let j. k E
(
IYI > Y1 1.
and
)
i0
1,
...,
as in Lemma 8.1.
Choose Eroof. Consider first the real case. Fron IY( > Y ; and L e u 8.1 it a * -
....
such that
iO. j, k
-k
-X-
(so that
- ((j)
i
for
).
iO. j
.i
we get.
follows that the right hand side of (8.2) is absolutely less than consequently,
B(k)
(k)-<(j (i0) we
( i , )
.L
@(j)
C3
C
j
8 " )
By Lemma 8.1, the right hand side of (8.2) is 'extremely small*. Put, if k E 1
- .
log
eA-1 1 <
implies (cf. L e -
2.2)
C
and if j, k E
(
(iO)
(k)
@(j) which proves our claim in the real case. (let us call it 'the complex case*) In the complex case the 1 e R hand side of (8.2) is equal to in the real case. we derive eu-1
s+l.
.... s+2-t )
and. as
1I
- 2- 1
5
. and therefore
and in the complex case
.
/ A1
2 . sin 1/4
Isin ~ / 2 1
---
which proves the lemma in the complex case. In the ring of integers of the field of r +1
with . a
.
.
and
-r < Arg(z) s r
for every
z E C
. Note
ai
that
in the
...
F
. where
K
are
i-A
is irreducible
I i
We shall not discuss here the problem of finding such a system (for
efficient methods see e. g. Berwick [I9321, ~illevix [I9561 , [I9641, Pohst and Zassenhaus [1982]. Buchmann [1986], [1987]). We simply assume that a system of fundamental units is known. On the other hand, there exist only finitely many non-associates i pl.
. This
---.
pv
in
K
pi's
(
such that
fo-N(pi)
-m
K/a
8.3.
Upper bounds. A
for
.) We
1.
..., v .
(Ve use
$
N(-)
to ¬e
Let
rnax (ail
. First we
/YI
be the set
lsisr
- - .
1 0 1
is a root of unity in
it is clear that
-1. 1
) ).
p E M
and
.. .
E 2 -,
(vhere
-
i n d i c a t e s a row and
a coluam of t h e matrix)
--
--
..
Thus, the initial problem of solving (8.1) is reduced to that of finding all a r for some p E M b e . integral r-tuples (a1.. ar) such tha; p:e tr of the special shape X
.. - Y-e
with
X, Y E Z
. As
. ..-
Put also
we have seen, X
and
can be eliminated, so that we obtain (8.2). solving finitely many equations of the type
i
(
\
w e have
~l~~l$ll
< (n-l)-log(~~1~
1 1 for
- 1.
...
(i)/p (ill (B
l/3(i)/p(i)l
< 1
By
m o o f L By
/ j
a a 1 - pee1 -...c
h E (1 1,
....
(8.7).
the definition of
N [ u ; ' ]
we have not put so far any restriction on be minimal. It remains to show that
.
h E I
i0
Q
Choose
such that
lfl(h)/p(h)
Note that
C4-lYI > 1
Lemmas
a 1mI
Therefore
i
LgQu 8.4, - .
Put
c4- lY I
Then.
c;
.+
max 1 s i l < i 2 , 1 (
(ill
-t
(19I
I - 1YI.ImI -11"
>
I Y I> 1
21m11/n
If
IY I > Y ;
then
8.4.
i s replaced by
A'
6 . pl,
..., pq
( q L 2
, the case
1 is t r i v i a l ) . Write
where the max lail . I f K1. K2. K3 be Bilq given p o s i t i v e numbers. then f i n d a11 q-tuples (a1. .. . a ) E Zq s a t i s f y i n g 9 ai's belong t o
C7
and
C8
It should be
Z , and put
makes now its appearance. while it was a . n o t present i n Lemmas 8.3 and 8.4. I n order t o obtain an upper bound f o r A
A'
i n terms of
Indeed, using the I n our case, it follows from (8.3) o r (8.4) how t o define pi's q, 6 and the Put
how t o define
K3
K1,
K2, K3
I n general,
(aO1 <
;-r-A
K1
are
'small'
constants, whereas
is 'very l a r g e ' .
IA1/2r
A
< 1+
r - A Ir - A C8
if by
A L 2
i f we replace
C i , where
so that
+ A. . W e
Ci Ci
C8 C8
i n the r e a l case,
log r
Below w e d i s t i n g u i s h three cases. I n the f i r s t two w e suppose t h a t the are Q-independent. ( i ) . Let (iiX L e t (iii).
--
pi's
.
-
- .
0
so t h a t
A .
. Then
8 . 5 ,
Cg
Put
6 z 0
Then the l i n e a r form is inhomogeneous, and w e apply the the pi's a r e a-dependent.
A
- -.(
2
5 log C6
-
C -C'
8
-
C5-C7 C7.10g -) n
-
Suppose now t h a t
Let
be
the
If
(YI >Y+
then-A<-Cg
lowerbound f o r
1x1
LI 7 z z Q )
. .-
Proof
1e
h l1
<
i n the r e a l
dependence r e l a t i o n w i l l give r i s e t o a very s h o r t vector i n the l a t t i c e . So t h e reduction process, a s applied i n the two previous c a s e s , w i l l not work. I n such a case w e work as follows. Let
c a s e , and
leu-11
<
fi
(io)
. Hence
(8.2) 'implies -A rr 0
A
. Therefore
C6
be
maximal
subset of
C5 ( log < -n
C -C'
C7-log A )
.
0
Fl
> 0 and d
iJ
for
Rtolark.
that
an upper bound f o r
(YI
can be (These numbers d. dij can be found a s coordinates o f extremely s h o r t vectors i n reduced bases). On the other hand, (8.9) is equivalent t o
d e r i v e d , thus a value f o r
Yi
Y2
( c f . Section 8.2).
small enough to admit enumeration of the remaining possibilities in a reasonable time. then it might be necessary, or at least advisable. to use where
A'
- d.A
ai
and d-a.
Ki
6'
- d-6
and
the technique of Fincke and Pohst, cf. Section 3.6. However, when solving a Thue equation, and not only an inequality for a linear form in logarithms. it may be better to avoid this method, and to use continued fractions of the roots C
j-p+l
--
((i)
(X.Y)
of (8.1)
we obtain
satisfying
Y1 < IYI I C
as follows, referring to Lemma 8.1. Here e.g. here as being a 'large' constant compared to Y1. Y2 in Section 8.2).
Put
- max
( ldl, ldijl
: 1 1 i 5 p. p+l 5 j I q )
Then
Let
be a rational approximation of
<
( i , )
, such that
- 1.
.... p .
A ' I (q-p+l)-D-A , and (8.10) Since IYI > Y1
'
then
X/Y
fraction expansion of
must be a convergent. pk/qk say, from the continued (id) . Denote by ao, al, a2, ... the partial
<
a,+l
2 3
Indeed, we have
Ki
K2/(q-l+p).D
.
-0
Kj
- (q-p+l)-Kg .
A'
If since
-1
-
or
l ~ l n -< 2 4-C1
--
. which is absurd.
Now. to solve (8.11) we apply the reduction process described in (i) or (ii), depending on whether 6' or 6 ' rr 0 , and maybe more than once. if necessary, until we find a very small upper bound for found all solu~ons--(a'a for make lA'
After having
-?
1 .
Therefore.
...
. a'P
being 'small'
'extremely small'.
Now combine
I A ' l
z L
inequality of (8.10) to get and this means that fraction expansion of Since for A Pk/Qk is in fact a convergent from the continued
is not 'very small', as argued heuristically, the above upper bound is 'small'.
Returning now to the general case. we point out that if the reduced upper bound for A (found after some reduction steps as described above) is not
qk
namely
8.5.
y2 = x3
4-x
such that
qk
IC
.
( i , ) for
In this section we prove, as an application of the general theory described in the previous sections, the following result.
---.--
To sum up, we propose the following process for every real root i0
1.
...,
THEOREM 8.6,
(note that of
i0
(1) Compute a
(2) Expand
1.
.. . , k
with
C < qk+l
X/Y X/Y
pi/qi , then
F(pi.qi) Z-pi m
. Y
. (3) Test all these convergents . Concerning this last test, note
Z.qi for some Z E Z with
Zn
.
We prove this theorem in two main steps. First, we reduce the problem to the solution of two quartic Thue equations. Then we solve these equations using the general theory developed in the previous sections. Let
is an
Having tested for all solutions in the range IYI > C For such solutions (X,Y)
corresponding A as follows (the idea is due to A. PethB. cf. also Section 1 b of Blass, Glass. Heronk and Steiner [I987 I). For every (i.j) E (1.. . .,rl x (1..
.. .nl
let
p.,
be the number
+1
or
-1
for which
c : j )
$(3)
be
I'($
1.860.
.. . From
-7
0.254.4,
$(2)
i2.114..
Z[$]
.,
p. 141) we see
--Table
2-$
discriminant is 229, and a pair of independent uniis (9. 2 I of Buchmann [ l m we-s& hat -7 + 2-$ 3 - $ + $* fundamental units
j l. j
with
z j
we have
+ d2
in
Z[$]
Since
$, 2
( 2 $ ) '
we see that
-$
is a - p a G 0 3 ( 2 )
units in Z[$]
and from this we can find a lower bound for Of course, for an other pair j , j and therefore ve can take the larger one.
A , if we know that
IYI > C
y2
( x
- $ ) - ( x2 + x - $ +
($2-4) )
(8.15)
r
and the factors on the right hand side are relatively prime. Indeed, if were a common prime divisorof them, then n would divide
which is prime. since its norm is -229. Therefore we would have that r is a 2 unit times this prime. and then by (8.15). x - $ unitx(3 - $ -4)xsquare . f229xsquare which is clearly impossible. Take norms, then we get y2
,
I
- -(m+n12
. After
. is of no
importance, we may
x 5 0 (the only solutions with x S O are the first three pairs stated in the theorem), we may assume that x r 1
Then. by
$(2)
-2.114. . .
. We
therefore
- (1.0).
(20.89).
it
can
be
solved very
easily.
(0.1)
They lead to x
-0
- 20. 12
ul
?(u,v,w)
Its
only
solutions (4.-2.-1)
are
(4.2,-1).
, and
(12.41)
Then
(8.17)
implies.
on
equating
vl
is even, so by
m, n E Z with
Note that u
is odd and
is even. hence
4 ( 2 - u - w , so
?-(a2+n2) , v
3
2.m.n , w
- -m 2
or
- -n2 .
- -m2
The left hand side is again reducible. The only solutions; as-is easily seen,
are
f(m.n)
(1.0).
(1.1).
(1.-1)
Since
and
2 zl
. Then
m, n
u2
E
U1 -- 2 - z1 .
ul
-
and
w2
2 u l - w + vl
2 vl
and 2-u2 u2
2
.
1
1
parity, only the first pair is accepted. It leads to and hence to (x.fy) (4.7) for (8.14).
(2.0.-1)
case:
x
there exist
Z such that
2-u2 + v
4.w2
2.u.w
- 4 - v - w,
(8.19)
It follovs that
THEOREH 8.7,
-1
.
- v - 2.w
has o n l y t h e s o l u t i o n s
(1.0)
- 2-z-(u-z) .
has o n l y t h e s o l u t i o n s
f(X,Y)
(1.0), (1.-l),
(1.3). (3.-1)
Z such that
Proof. We use the notation and results of Sections 8.2 and 8.3.
6 and
9 be defined by
u 2 0
and
(u,w)
Since
9
cp
- 2/6
cp
or In Theorem 8.7 below we prove that this equation has only the solutions +(m,n) (x.3)
cp
< - 6, (p
4, s
4, t
over
0. and
<
we can take
- (1.0) . leading to
(3.4)
(u,v,w)
n, n
&
with
C2 from ; C2, -Cy _C4 from above and below, making use of the following approximations for the conjugates of 6
-
u - z - n
and
Now we work in the order In Theorem 8.7 below we prove that this equation has only the solutions ( n ) (u,v,w) (note that
of
with
Z-basis
I 1, 6. f ~ 6 ~ f -d3 . 1
- (1.0.0).
f-e2
(01)
(1-1) (3.-2.-2),
(3.1),
(-13)
They
lead
respectively
to
q , -2 z-4+6-e-~.6 3 E R .
(x,+) (2,1), (10,31), (1274,45673). (116.1217) Thus this result completes the proof of theorem 8.6. provided the Thue equations
(19.30,6),
On
the
other hand,
Nonk/p(X-Y-6)
(8.24)
and
(8.25)
and
Ilor4~q(X-Y-cp) then X
(m,n)
mentioned
- Y-6
- .
1
are
respectively equivalent
to is
- Y.9
(X,Y)
t l - 1 + 8 .
c 2 - 3 + 8 .
1 2 t3---8
IYI > 3
so that
W e do not prove t h i s f a c t here. For a proof, see Tzanakis and de Ueger I19871 Section 111.2 and Appendix I . Before Thus the solution
E
w e
apply
the
reduction
A
method of S e c t i o n
3.8
w e
show
that
the
V 's
of
(8.24)
and
(8.25) kc1- c
is
reduced
t 3
to
finding
all
application of Lemma 2.4 y i e l d s the above constants r e s u l t i n the case of f o r the various for
i
C7, C8
W e apply t h i s
(a1,a2,a3)
X
z3
X
such t h a t the u n i t
Ye8
or
Y.9
a f t e r some numerical computations. t h a t w e leave t o the reader t o check. t h a t enin N[u;'] I (here. of course.
- 1. 2,
ai*s 3
ifi
thl
then
ai
is a u n i t and hence
a .
(appearing i n the ai
is i n
- 0.634950.. . .
I
max N [ d l ] I I
1.210070..
1. 2. 3. 4
) ).
and Also,
Hi
. Therefore.
h(oi)
Hi
1c
or its
and
C6
inverse, it follows t h a t
Vi
log Hi
'
I:+
C3
Therefore,
h(ai)
where choose
j. k
a .
and
a r e a s i n the d e f i n i t i o n of
-
h(a)
a -
.
.
ai
. An
upper
fixed * w e can
boynd - fo _ r a
xih
Now, x(0)
f-(((iP-((h')
....
with
.
8
I t can be or
cp
.xih
o
f o r each permutation
a r e algebraic i n t e g e r s f o r
(-0
Therefore. f o r each
<
E ( 8, cp )
w e have four p o s s i b i l i t i e s f o r
For
each of these e i g h t cases w e have, a s w i l l be shown below, Consider a l s o the number and therefore. by Lemw 8.5, i f t h e upper bound
C9
IYI > 3
then f o r
I Y I s 3 a r e those l i s t e d i n t h e statement of
'
1
K1
where
is the
A2
therefore
discriminant of
of P(X)
229
. On
, and a r e up t o
<
4 - - 6.38771~10 .
C6
K2
- - 1.211 >
n 4
3'303 , , . K
- 3 . 2 6 ~ 140 0
( K2
t h e s i g n the elementary symmetric functions of they a r e symmetrical expressions of the This means t h a t P(X) E Q[X]
S4 , and so
A
*s
d4
with r a t i o n a l c o e f f i c i e n t s . ,yih*s
6 + alepl
and the
where f o r
pi's
P(X)
multiplied by
is a polynomial of the
and therefore it is an-algebraic integer. Combine P(X) E Q[X] t o see t h a t h(ai) Since 22g2-p(x) E Z[X] a .
t h i s with the f a c t t h a t
is a root of
. Hence.
(8.28)
P(X) , i t s leading c o e f f i c i e n t
i s a t most
. To
conclude. w e have
s 2 - ( l o g 229)/d + log C3
ai @ 9 w e have d r 2
log 229
log C3
log H2
5.667432
...
.
Numerical cO
I
(
(3) (1) l o g ( 3 ) ( 2 )
or
:- log
.
if if
(8.29)
...
- . <- ,
cp
details
are
given
i n Tzanakis
and
de
Ueger
[1987].
U e
take
l o g 229
7.327545...
-
.
n e have the same Note t h a t i n each of the four cases of (8.28) (resp. (8 .-29-)) w lattice,
rl
(resp.
r2
),
. and
-
w e had no
for
V1
l o g H1 , Thus we f i n d t h a t
V2
8 'or
, - and bl
log H3
- . - . b3-a3* , - . - al b2 a3
V3 V ;
pi's
Therefore w e worked a s i n
B - A .
log H2
V4
V4
For each
ri
and
, a s defined
with
C7
5.71~10~ and ~
C8
- 6.17
i n Section 3.7.
I n our cases, the coordinates of the v e c t o r s of the reduced b & i s vectors a r e of the s i r e of
.
.
I n our
the
a s expected.
s l , s2. s3 of
8.6.
Let bl, h p ,
...,
ps
numbers. The diophantine equation with respect to the reduced basis computations we found
b3
3.247~10'~
T1 ,
in the variables
X. Y
Z , nl,
...,
NO , with
(X,Y)
-1
an
, is known
r2
.
3 , and
as a Thue-Hahler equation. It was proved by Hahler I19331 that this equation has only finitely many solutions, and by Coates (19701 that they can, at least in principle, be determined effectively. since effectively computable upper bound for the variables can be derived from the p-adic theory of linear forms in logarithms. For the history of this equation we refer to Shorey and Tijdeman [1986], Chapter 7.
This means that in view of Lemma 3.5, in all cases L(ri.x) > 0 . 0 2 9 . ; .
i0
3 . 2 4 7 ~ 1 0> ~~ 4 . 7 0 8 ~ 1 0.~ ~
K1. 6
K2. Xo
- X1 A
I
K3 , since
3.
1. C
- c0'
We'believe that it is possible to solve Thue-hhler equations, not only in principle. but in practice. This can be done by reducing the above mentioned upper bounds, using a combination of real and p-adic computational h m reducing diophantine approximation techniques, based on the ~ ~ - a l ~ o r i t for
A <
-3.303 I
.
K3
It follows that c
0
72
and
bases of lattices (cf. Sections 3.7. 3.8, 3.11 and 3.12). which we report in the preceding sections.
. r2 .
T1 i0
- , 3 Such an idea (but without using the L -algorithm) was used by Agrawal.
-
Coates, Hunt and van der Poorten [1980], who determined all solutions of the
in all 8 cases.
--
- .
3
--and
equation
-.
x 3
- X 2 .Y + X - Y2 + y3 - +1lX .
-
--
This is one of the only 'two examples in the literature where a Thue-Hahler equation has been solved completely, the other one being ~ 3.742~10 , Then the assumptions of L e m a 3.10 are fulfilled, since 4 2 7 : ~ < which implies X
2
3.y3
2 " ,
which was solved by Tzanakis (19841 by a different method. Both examples are of the simplest kind, in view of the fact that the cubic field It follows that
10
is a root of
F(x.1)
Q(8)
, where
real
found no other solutions of (8.24) and (8.25) than mentioned in the theorem. This completes the proof of Theorem 8.7. hence also that of Theorem 8.6. The computations for the proof of Theorem 8.7 took 35 sec.
continued fractions and ane-dimensional p-adic continued fractions, instead of the more complicated ~ ~ - a l ~ o r i t h (which m was not yet available in 1980). 3 With the use of the L -algorithm the method can in principle be extended to
204
the general situation. where there are more than~onefundamental units. and more than one primes. In a forthcoming publication, Tzanakis and the present author plan to give details and worked-out examples.
in which the
Agrawal, M.K., Coates, J.H., Hunt, D.C. and van der Poorten. A.J. [1980]. Elliptic curves of conductor 11, Wath. Comp. 35, 991-1002. (3.8;3.10; 8.6) Alex, L . J . [1976], Diophantine equations related to finite groups, Como. Algebra 4, 77-100. (6.1;6.5) Alex. L . J . [198sa]. On the diophantine equation Math. Comp. 44, 267-278. (1.1;5.4) b Alex, L . J . [I985 1. On the diophantine equation Arch. Math. 45, 538-545. (1.1;5.4) Babai, L. (19861, On LovAsz lattice reduction and the nearest lattice point problem. Combinatorica 6. 1-13. (3.4) Bachman, G. [1964], I n t r o d u c t f o n t o p-adic Numbers and V a l u a t i o n Theory. Academic Press, New York and London. (2.3) Baker, A. [1966]. Linea~formsin the - logarithms of algebraic numbers, Mathematika 13, 2042216. (2.4) Baker, A. [1968], Contributions to the theory of diophantine equations, I. rqwtion 1 1
+ +
2a 2a
C s ' 3
+ 2 d 3 e ~ f,
3b7C + 2d3e7f ,
On the representation of integers by binary forms, I_I. The diophantine 3 y2 u k , P M I . ~ r u uR-. . ond don^-^ 263. 173-208.
-*.-
(8.1) Baker, A. [1972], A shatpening of the bounds for linear folms in logarithms
I . Acta A r i t h . 21, 117-129. (1.2)
Baker, A. [1977], The theory of linear forms in logarithms, Transcendence Theory: Advances and A p p l f c a t f o n s . Academic Press. London. pp. 1-27. (2 -4) Baker, A. and Davenport. H. [1969]. The equations 8x2
- 7 - z2
2 3x
- 2 - y2
and
Berwick, U.E.H. [1932]. Algebraic number fields with two independent units. Proc. London Uath. SOC: 34, 360-378. (8.2) h ; generalized Raaanujan-Nagell equation, Acta k i t h . Beukers. F. [1981], On t
~illevig,K.K. [1956], On the units of algebraic fields of third and fourth degree (Russian), Hat. Sbornik Vol. 40, 82, 123-137. (8.2) Billevic, K.K. (19641, A theorem on the units of algebraic fields of n-th degree (Russian). Hat. Sbornik Vol. 64, 106, 145-152. (8.2) Practical Blass, J., Glass, A.H.U.. Heronk, D.B. and Steiner. R.P. [1987~],
-- -
C h e ~ b i n i ,J.M. and Walliser, R.V. [19871, On the computation of all imaginary quadratic fields of class number one. Wath. Comp. 49. 295-300. (3.2) Coates, J. [1969], An effective p-adic analogue of a theorem of Thue. Acta Arith. 1 5 , 279-305. (2.4;6.1) Coates, J. (19701. An effective p-adic analogue of a theorem of Thue 11: The greatest prime factor of a binary form, Acta k i t h . 16, 399-412. (2.4; 6.1;8.6) Delone, B.N. and Faddeev, D.K. [1964]. The theory of irrationalities of the third degree, Transl. of Math. Monogr.. Vol 10. A.M.S., Providence R.I.
solutions to Thue equations of degree 4 over the rational integers, Preprint. Bowling Green State University. (3.8;8.1) b Blass, J., Glass, A.M.W.. Heronk, D.B. and Steiner, R.P. (1987 1. Practical solutions to Thue equations over the rational integers, Preprint. Bowling Green State University. (3.8;8.1;8.4) Blass, J., Glass, A.M.W., Meronk. D.B. and Steiner, R.P. [1987C]. Constants for lower bounds for linear forms in the logarithms of algebraic numbers I: The general case. Preprint. Bowling Green State University. (2.4) d Blass. J., Glass. A.M.W., Meronk. D.B. and Steiner, R.P. [I987 1 . Constants for lower bounds for linear forms in the logarithms of algebraic numbers 11: The homogeneous rational case. Preprint, Bowling Green State University. (2.4) Borevich. 2.1. and Shafarevich, I.R. (19661, Number Theory, Academic Press. New York. (2.1;7.3) Bremner, A.. Calderbank. R., Hanlon, P.. Morton, P. and Wolfskill, J. [1983], Two-weight ternary codes and the equation y2 Theory 16, 212-234. (4.1) Bren~er,J.L. and Foster, L.1. [1982], Exponential diophantine equations,
- -
(8.5) Ellison, W.J. (197la] Recipes for solving diophantine problems by Baker's
Th. Nombr. C.N.R.S., Exp. 11. 10 pp. (1.4;3.8) b Ellison. W.J. [I971 1. On a theorem of S. Sivasankaranarayana Pillai. SCm.
Thdorie des Nombres, Universitd de Bordeaux I, 1970-1, Lab. Th. Nombr. C.N.R.S., Exp. 12. 10 pp. (3.2;S.l) Ellison, U . J . . Ellison, F., Pesek. J., Stahl. C.E. and Stall. D.S. [1972]. The diophantine equation y2 + k
(3.3;B.l) Evertse, J.-H. (1983). Upper Bounds for the Numbers of Solutions of Diophantine Equations, HC Tract 168. Centr. Hath. Comput. Sci.,
,
1
+ 313 ~, J.
Number
Amsterdam. (1.1) GyBry, K., Stewart, C.L. and Tijdeman. R. [1987]. S-unit equations and their applications, Proceedings of the Durham Symposium on Transcendental Number Theory, July 1986, to appear. (1.1)
Pacific J. Hath. 101, 263-301. (6.1) Brent, R.P. [1978], A Fortran multiple-precision arithmetic package, ACH Trans. Math. Software 4, 57-70; and: Algorithm 524. MP. a Fortran
pultiplz-precisioyarithme t ic package,_@ Trans. Hath . Sof m a r e 4, 71-81. (2.5)
4
Evertse, J.-H.,
__
--
Faltlngs, G. 119831, Endlichkeitssdltze far abe-lsche V d e t s t e a aber Zahlkarpern, Invent. Hath. 73, 349-366. (1.1)
-.
BrentJes, A.J. (19811. HuLti-dimensional Continued Fraction Algorithms, . MC Tract 145. Centr. Math. Comput. Sci.. Amsterdam. (1.3;3.4) Brown, E. [1985]. Sets in which xy + k is always a square, Uath. Comp. 45.
'
I
short length in a lattice, including a complexity analysis, Math. Comp. 44, 463471. (3.6) *Grinstead. C.M. [1978]. On a method of solving a class of diophantine equations, Hath. Comp. 32, 936-940. (1.1) Hardy, G.H. and Wright, E.M. [1979], An Introduction to the Theory of Numbers, (5th ed.), Oxford University Press. Oxford. (1.3;3.2) Hasse. H. [1966]. b e r eine diophantische Gleichung von Ramanujan-Nagell und ihre Verallgemeinerung, Nagoya Hath. J. 27, 77-102. (4.1) Hunt, D.C. and van der Poorten, A.J., Solving diophantine equations u x2 + d a unpublished. (3.2i4.1)
B u c b n n , J. [1986]. A generalization of Voronoi's unit algorithm I & 11. J. Number Theory 20, 177-191 & 192-209. (8.2;a.S) Buchmann, J. (1987). The generalized Voronoi algorithm in totally real algebraic number fields, to appear. (8.2) Cassels, J.W.S. [1957]. An Introduction to Diophantine Approximation, Cambridge University Press. Cambridge. (1.3)
- .
Kiss, P. (19791, Zero.terms in second order linear recurrences. Math. Sem. Notes Kobe Univ. (Japan) 7 , 145-152. (4.3) Knuth, D.E. (19811. The Art of Computer Prograuming, Vol. 2: Seminumerical Algorithms. (2nd ed.), Addison-Wesley. Reading Mass. (2.5) Koblitz. N. (19771, p-adic Numbers, p-adic Analysis, and Zeta-functions. Springer Verlag, New York. (2.3) Koblitz. N. [1980], p a d i c Analysis: a Short Course on Recent Work, Cambridge University Press, Cambridge. (2.3) Koksma. J.F. [1937]. Diophantische Approximationen. Ergebnisse der Mathematik und ihrer Crenzgebiete, Vol. 4, Springer Verlag, pp. 407-571. (1.3) Lagarias. J.C. and Odlyzko. A.M. (19851, Solving low-density subset sum problems, J. Assoc. Comput. Mach. 32, 229-246. (3.4) Langevin. H. [1976]. Quelques applications de noweaux rdsultats de van der Poorten, Sbm. Delange-Pisot-Poitou 1975/76, Paris, Exp. G12. 11 pp. (1.1) Lehmer, D.H. (4.9;S.l) Lenstra. A.K. (19841, Polynomial-time Algorithms for the Factorization of Polynomials, Dissertation. University of Amsterdam. (3.5) Lenstra, A.K., Lenstra, H.W. Jr. and Lovlsz, L. [1982], Factoring polynomials with rational coefficients. Math. Ann. 261, 515-534. (1.4; 3.4;3.5) Loxton. J.H.,
-
Hignotte, M. [1984a]. On the automatic resolution of certain diophantine equations, Proceedings of EUROSM 84, Lecture Notes in Comput. Sci. 174, Springer Verlag. Berlin, pp. 378-38s. (4.1) b Mignotte, M. (1984 I, Une nowelle rbsolution de l'kquation x2 + 7
- 2" .
Rend. Sem. Fac. Sci. Univ. Cagliari 54, Fasc. 2. 41-43. (4.1) 2 Mignotte, M. (19851, P ( x +1) 2 17 si x r 240 , C. R. Acad. Sci. Paris 301, Sbrie I, No. 13, 661-664. (4.9) Mignotte, M. and Waldschmidt, H. (19781. Linear forms in two logarithms and Schneider's method. Math. Ann 231. 241-267. (2.4) Nagell. T. [1948], Lesning Oppg. 2. 1943. s.29 (Norwegian), Norsk Mat. Tidsskr. 30, 62-64. (1.1;4.1;4.9) Odlyzko. A.M. and te Riele, H.J.J. (19851. Disproof of the Mertens conjecture, J. reine angew. Math. 357, 138-160. (3.4) Peth6, A. (19831, Full cubes in the Fibonacci sequence. Publ. Math. Debrecen 30, 117-127. (1.1;8.1). Petha, A. (19851, On the solution of the diophantine equation Gn Sci. 204, Springer Verlag. Berlin, pp. 503-512. (4.1;4.7) Petha, A. and Schulenberg, R. [1987], Effektives E s e n von Thue Gleichungen. Publ. Math. Debrecen, to appear. (3.8;a.l) Peth6, A. and de Weger. B.H.H. [1986], Products of prime powers in binary recurrence sequences I: The hyperbolic case, with an application to the
- .
pz
of algebraic
generalized Ramanujan-Nagell equation. Math. Comp. 47, 713-727.; (1.1; . - 2.2;4) Philippon, P. and Waldschmidt, H. (19871, Lower bounds for linear forms in logarithms, preprint. (2.4)
numbers,
C.R. Math. rep. Acad. Sci. Canada 11, 119-124. (2.4) Lutz. $. [1951]. Sur les approximations diophantie~eslindaires P-adiques.
-
These. UniversitC de Strasbourg. - -. . . (1.3) MacUilliams. F.J. and Sloane, N.J.A. [1977], The Theory of Error-Correcting Codes. North-Holland, Amsterdam. (4.1) Mahler, K . [1933]. Zur Approximation algebraischer Zahlen I : iiber den gr6ssten Primteiler binErer Formen. Math. Ann. 107, 691-730. (6.1;8.6)
Pohst, M. and Zassenhaus, H. (19821, On effective computation of fundamental units I & 11, Math. Comp. 38, 275-291 & 293-329. (8.2) van der Poorten, A.J. (19771, Linear forms in logarithms in the p a d i c case, Transcendence Theory: Advances and Applications, Academic press, London, pp. 29-57. (1.2;2.4;6.2) Rumsey, H. Jr. and Posner, E.C. (1964). On a class of exponential equations, Proc. Am. Math. SOC. 15, 974-978. (4.9;6.1) Schinzel. A. (19671, On two theorens of Gelfond and some of their applications, Acta k i t h . 13. 177-236. (2.4;4. 1)
Xahler. K. [1934]. Eine arithmetische Eigenschaft der rekurrierenden Reihen. Mathematika B (Leiden) 3, 153-156. (4.1) Mahler,l(. (19351, h e r den gr6ssten Primteilar spezieller Polynome zweiten Grades. Arch. Math. Naturvid. B 41, 3-26. (4.9;S.l) Mahler, K . (19611. Lectures on Diophancine Approxfmutions I: g-adic Numbers and Roth's Theorem, University of Notre Dame Press, Notre Dame. (3.10)
Applications of the Gelefond-Baker method to diophantine equations. Transcendence Theory: Advances and Applications, Academic Press. London, pp. 59-77. (1.1) Shorey, T.N. and Tijdeman, R. [1986]. Exponential Diophantine Equations, Cambridge University Press, Cambridge. (1.1;1.2;4.2;5.1;6.1;8.1;886) v Sprindzuk. V.G. [1969], Effective estimates in 'ternary' exponential diophantine equations (Russian), Dokl. Akad. Nauk BSSR 12. 293-297. (6.1) Steiner, R.P. [1977]. A theorem on the Syracuse problem. Proc. Seventh Hanicoba Conf. Numer. Hath. Comp., pp. 553-559. (3.2) Steiner. R.P. (19861, On Hordell's equation y2
Thue equation, Hemorandum No. 668, Faculty of Applied Mathematics, University of Twente, to appear. (1.1;8) Tzanakis, N. and Wolfskill, J. [1986], On the diophantine equation
- 4qn + 4q + 1 . Number Theory 23. 219-237. (4.1) Tzanakis, N. and Wolfskill, J. [1987], The diophantine equation x2 - 4qaI2 + 4q + 1 with an application in coding theory. to appear.
y2
3.
(4.1) Vojta, P. (19871, Diophantine Approximations and Value Distribution Theory, Lecture Notes in Mathematics 1239. Springer Verlag. Berlin. (6.6) Wagstaff, S.S. Jr. [1979], Solution of Nathanson's exponential congruence. Hath. Comp. 33. 1097-1100. (3.9) Wagstaff, S.S. Jr. [1981]. The computational complexity of solving exponential congruences, Congressus Numerantium. University of Winnipeg. Canada. Vol. 31. pp. 275-286. (3.9) Waldschmidt, H. [1980]. A lower bound for linear forms in logarithms. Acta Arith. 37, 257-283. (2.4) de Weger, B.H.H. [1986a], Approximation lattices of p-adic numbers, J. Number Theory 24, 70-88. (1.4;3.10) b de Weger. B.H.H. [I986 1, Products of prime powers in binary recurrence sequences 11: The elliptic case, with an application to a mixed quadratic-exponential equation. Math. Comp. 47, 729-739. (1.1;4) de Weger , B.H.H. [ 1 9 8 7 ~ 1 , Solving exponential diophantine equations using lattice basis reduction-algorithms. J. Number Theory 26. 325-367. (1.1; 5;6)
de Weger. B.H.H.
_-
-k
x3 : a problem of
Stolarsky, Hath Comp. 46, 703-714. (3.3;g.l) Stewart, C.L. and Tijdeman, R. [1986], On the Oesterld-Hasser conjecture, Honatsh. Hath. 102, 251-257. (6.6) Sterwr. C. [1897]. Quelques thLor&mes sur l'kquation de Pel1 No. 2. 48 pp. (6.9;S.l) Stroeker, R.J. and Tijdeman, R. [1982], Diophantine equations. (with an Appendix by P.L. Cijsouw, A. Korlaar and R. Tijdeman). Computational Hechods in Number Theory. HC Tract 155. Centr. Hath. Comp. Sci.. Amsterdam, pp. 321-369. (1.1;3.2;5.1;5.4) Thue. A. [1909], lher Anaherungswerten algebraischer Zahlen. J. reine angev. Hath. i35. 284-305. (8.1) Tijdeman, R. [1973]. On integers with many small prime factors. Compositio Hath. 26, 319-330. (5.1) the equation of Catalan, Acca Arith, 29, 197-209. Tijdeman. R. [1976], On . ----(1.1) Tijdeman, R. [1985], On the Fermat-Catalan equation. Jahresber,Deucsche
)
- D~~
- fl
Mach. Verein. 87, 1-18. (1.1) Tijdeman, R. and Wang. L. [1987). Sums of products of powers of given prime numbers. Preprinc, University of Leiden. (1.1;5.4) Tzanakis, N. [1983]. On the diophantine equation y2 Theory 17. 144-164. (4.1) Tzanakis. N. [1984]. The complete solution in integers of
Max Planck Institut M r Mathematik, Bonn. (1.2;2.4;6.2) b Yu, K.R. [I987 1, Linear forms in logarithms in the p-adic case, Proceedings of the Durham Symposium on Transcendental Number Theory, July 1986. to appear. (2.4)
- .
2k
J. Number 2y3
x3 +
- .
2"