Next Article in Journal
Goedesics Completeness and Cauchy Hypersurfaces of Ricci Solitons on Pseudo-Riemannian Hypersurfaces at the Fictitious Singularity: Schwarzschild-Soliton Geometries and Generalized-Schwarzschild-Soliton Ones
Previous Article in Journal
Generalized Local Morrey Spaces Associated with Ball Banach Function Spaces and Their Application
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Natural Representations of Black Box Groups SL2(Fq)

by
Alexandre Borovik
1,* and
Şükrü Yalçınkaya
2
1
Department of Mathematics, University of Manchester, Manchester M13 9PL, UK
2
Department of Mathematics, Istinye University, Istanbul 34396, Turkey
*
Author to whom correspondence should be addressed.
Axioms 2025, 14(12), 895; https://doi.org/10.3390/axioms14120895
Submission received: 29 October 2025 / Revised: 21 November 2025 / Accepted: 25 November 2025 / Published: 1 December 2025
(This article belongs to the Section Algebra and Number Theory)

Abstract

In this paper, we make one step further in the recognition of black box groups of Lie type: given a black box group encrypting a special linear group of dimension 2 over a finite field of an unknown odd characteristic, we construct a black box field and a polynomial time isomorphism from the special linear group of dimension 2 over this new field to the black box, which can be made polynomial time-reversible for small characteristics at the expense of constructing a look-up table for the prime field. Our result opens a way to constructing structural proxies for black box groups of Lie type.

1. Introduction

In computations with finite groups, one of the central problems has a deceptively simple formulation:
Given a set of matrices X 1 , , X l of size n × n over a given field F p m of characteristic p, determine if they generate a group G = X 1 , , X l isomorphic to SL 2 ( F p k ) . If so, find a nontrivial unipotent element in G (i.e., an element of order p) in time polynomial in k , l , m , n , and log p .
This problem was posed by Babai and Beals in the context of black box groups in 1999 [1]. Solutions were discovered only much later, in [2] for p = 2 and in [3] for odd p.
Our approach to its solution in [3] was based on the use of two concepts: black box groups introduced by Babai and Szemerédi in [4], and black box fields originating from the papers [5,6]. These concepts are discussed in Section 2; they significantly expand the range of tools and methods, even for problems in matrix groups over finite fields.
In [3], we presented an algorithm constructing the adjoint representation of a black box group Y encrypting PSL 2 ( F ) for a field F of odd order, that is, we constructed within Y a black box field K encrypting F and represented elements of Y as 3 × 3 orthogonal matrices with entries from this black box field K . In the present paper, we considerably extend this result: we produce an algorithm that constructs the natural representation of a black box group X encrypting SL 2 ( F ) . The need for such a construction arises from the fact that constructive recognition algorithms for black box groups of Lie type of higher rank involve a constructive recognition of a black box group encrypting SL 2 ( F ) , see [7,8,9,10,11,12,13], where it was postulated as being provided by a SL 2 -oracle. These papers also used the discrete logarithm oracle in F along with a SL 2 -oracle. We wish to emphasize that we make no use of any oracles.
We prove the following theorem (notation and terminology are explained in Section 2).
Theorem 1.
Let Y be a black box group encrypting SL 2 ( F ) , where F is an unknown finite field of unknown odd characteristic, and E be a global exponent for Y , that is, y E = 1 for all y Y . Then, there is a Las Vegas algorithm that constructs, in probabilistic time polynomial in log E , the following:
(a)
A black box field K encrypting F ;
(b)
Isomorphisms
ψ : Y SL 2 ( K )   a n d   ψ 1 : SL 2 ( K ) Y
that run in probabilistic time polynomial in log E .
We call the pair of isomorphisms ψ and ψ 1 constructed in Theorem 1 a structural approximation of the black box group Y and call the matrix group SL 2 ( K ) its structural proxy.
Most groups of Lie type (we exclude series B 2 2 , F 4 2 , and G 2 2 ) can be seen as functors G : R G from the category of commutative unital rings R with involution (that is, an automorphism of order 2 ) to the category of groups. There are other algebraic structures that can be defined in a similar functorial way, such as functors A : R A . For example, finite-dimensional simple associative algebras and finite-dimensional simple Lie algebras can be viewed as rings. The corresponding structural proxy problem can be stated as follows.
  • Construction of a structural proxy. Suppose that we are given a black box structure X A ( F ) . Construct, in probabilistic polynomial in l ( X ) time, where l ( X ) is the uniform length of the strings in X , the following:
    A black box field K F ;
    Probabilistic polynomial time isomorphisms:
    ψ : A ( K ) X
    and
    ψ 1 : X A ( K ) .
Remark 1.
One of the principal results of [3] amounts to construction of a structural proxy for a black box group X encrypting SO 3 ( F ) ,
X SO 3 ( K ) ,
where F is an unknown finite field of unknown odd characteristic and K F . In this paper, we have another structural proxy for X ,
X PGL 2 ( K )
with K being the same black box field. Indeed, in Section 7, we construct an efficient isomorphism between SO 3 ( K ) and PGL 2 ( K ) . The existence of this isomorphism is well-known but its efficient computational realization needs a delicate treatment.
Theorem 2.
Let X be a black box group encrypting PSL 2 ( F ) or PGL 2 ( F ) , where F is an unknown finite field of unknown odd characteristic, and let E be a global exponent for X . Then, there is a Las Vegas algorithm that constructs, in probabilistic time polynomial in log E , structural proxies
X PSL 2 ( K )
or
X PGL 2 ( K ) ,
respectively.
Theorem 3.
Let X be a black box group encrypting one of the groups SL 2 ( F ) , PSL 2 ( F ) , or PGL 2 ( F ) , where F is the standard explicitly given finite field of known characteristic. Then, there is a Las Vegas algorithm that constructs, in probabilistic time polynomial in log | F | , isomorphisms
SL 2 ( F ) X , PSL 2 ( F ) X   o r   PGL 2 ( F ) X ,
respectively. Our algorithm runs in probabilistic polynomial time in log | F | .
The proof of Theorem 3 follows from a construction of an isomorphism from F to K , which is given in [6]. Note that the isomorphism SL 2 ( F ) X in Theorem 3 could be seen as a “half SL 2 -oracle”. Moreover, when the characteristic of F is small (in the sense that we can inverse the isomorphism of prime fields F p K 0 and construct a look-up table for the inverse isomorphism K 0 F p ), we can reverse the isomorphism from F to K by using the results from [6] which establishes a full SL 2 -oracle, that is, probabilistic polynomial time two-way isomorphisms between SL 2 ( F ) and X . Now, if we call such finite fields tame fields, then we have the following theorem.
Theorem 4.
For a black box group X encrypting SL 2 ( F ) over a tame field F , there exists a polynomial time Las Vegas algorithm constructing two-way isomorphism
SL 2 ( F ) X .
Notice that the finite fields of characteristic p 1000 can be easily seen as tame fields.
Notice also that if | F | < 7 , then all our theorems are obviously true and do not require the methods developed in this paper, since we can list elements of Y and provide necessary isomorphisms with no difficulty in these cases. For technical results in this paper, we assume that | F | 7 . We note that all classical black box groups over small fields can be recognized efficiently by the algorithms in [14].

2. Axiomatic Description of Black Box Algebraic Structures

A black box algebraic structure  X is a black box (device, algorithm, or oracle), which produces and operates with 0–1 strings of uniform length l ( X ) encrypting (not necessarily in a unique way) elements of some fixed algebraic structure A: if x is one of these strings, then it corresponds to a unique (but unknown to us) element π ( x ) A . Here, π is the decrypting map, not necessarily known to us in advance.
BB1
On request, X produces a string x of fixed length l ( X ) , which depends on X , encrypting an element π ( x ) for some fixed explicitly given algebraic structure A; this is done in time polynomial in l ( X ) . When this procedure is repeated, the elements π ( x 1 ) , π ( x 2 ) , are independent and uniformly distributed in A.
In this paper, we work only with groups and fields so we assume that operations on A are unary or binary; a general case can be treated in exactly the same way.
BB2
On request, X performs algebraic operations on the encrypted strings, which correspond to operations in A in a way that makes the map π (unknown to us) a homomorphism: for every binary (unary case is similar) operation ⊡ and strings x and y produced or computed by X ,
π ( x y ) = π ( x ) π ( y ) .
It should be noted that we do not assume the existence of an algorithm which allows us to decide whether a specific string can be potentially produced by X ; requests for operations on strings can be made only in relation to strings previously output by X . Also, we do not make any assumptions on probabilistic distribution of strings.
BB3
On request, X determines, in time polynomial in l ( X ) , whether two strings x and y encrypt the same element in A, that is, check whether π ( x ) = π ( y ) .
We say in this situation that a black box X  encrypts the algebraic structure A and we write X A .
Clearly, in black box problems, the decrypting map π is not given in advance. However, it is useful to think about any algebraic structure (say, a finite field) implemented on a computer as a trivial black box, with π being the identity map, and with random elements produced with the help of a random number generator. In this situation, obviously, the axioms BB1–BB3 hold.
In our algorithms, we have to build new black boxes from existing ones and work with several black box structures at once. This is why we have to keep track of the length l ( X ) on which a specific black box X operates. For example, it turns out in [3] that it is useful to consider an automorphism of A as a graph in A × A . This produces another algebraic structure isomorphic to A, which can be seen as being encrypted by a black box Z producing, and operating on, certain pairs of strings from X ; see [3] for more examples. In this case, clearly, l ( Z ) = 2 l ( X ) .
Axiom BB1 is the only difference between our axioms and the original set up of Babai and Szemerédi [4]. When we construct a new black box structure Y from X , operations on Y are usually more expensive than a direct construction of random elements in Y from random elements in X . This is the case, for example, of a black box field constructed from a black box projective plane constructed from a black box group PGL 2 , which, in turn, is constructed from a black box group SL 2 [3]. Another example where Axiom BB1 is very natural in analysis of an impersonation attack on homomorphic encryption [15]. Here, supply of random elements is achieved simply by picking random codewords from the intercepted communication traffic.

3. Black Box Fields

We use Axioms BB1–BB3 to define black box fields with a few obvious changes in the wording. In Axiom BB2, we assume that the black box can perform the addition, multiplication, and inversion in the field. The reader may wish to compare our exposition with [5]. We remind that, in this paper, we do not necessarily know the characteristic of the field. Therefore, we slightly generalize the definition of a black box field given in [5,6] by removing the assumption that the characteristic of the field is known. We refer the reader to [5,6] for more details of black box fields of known characteristic.
When we are dealing with the isomorphism SL 2 ( F q ) X in Theorem 3, we first construct a field isomorphism between an explicitly given finite field F q and a black box field K F q . Clearly, this leads to an isomorphism SL 2 ( F q ) SL 2 ( K ) . In this situation, the characteristic p of F q is given, and to construct such an isomorphism, we will use some results about the isomorphism problem for black box fields of known characteristic p [6]. The explicit data for a finite field of cardinality p n is defined to be a system of structure constants over the prime field, that is, n 3 elements ( c i j k ) i , j , k = 1 n of the prime field F p = Z / p Z (represented as integers in [ 0 , p 1 ] ) so that F p n becomes a field with ordinary addition and multiplication by elements of F p , and multiplication determined by
s i s j = k = 1 n c i j k s k ,
where s 1 , s 2 , , s n denotes a basis of F p n over F p . The concept of an explicitly given field of order p n is robust; indeed, Lenstra Jr. has shown in [16] (Theorem 1.2) that for any two fields, A and B of order p n given by two sets of structure constants ( a i j k ) i , j , k = 1 n and ( b i j k ) i , j , k = 1 n , an isomorphism A B can be constructed in time polynomial in n log p .
By an efficient isomorphism between a black box field and an explicitly given finite field F p n , we mean an algorithm constructing such an isomorphism in time polynomial in the input length, that is, we find a procedure that computes images and preimages in time polynomial in n and log p .
One of the key results on black box fields belongs to Maurer and Raub [6]; its statement and proof can be reformulated to yield the following result.
Theorem 5.
Let K be a black box field of known characteristic p encrypting an explicitly given finite field F p n and K 0 the prime subfield of K . Then, the isomorphism problem between K and F p n can be efficiently reduced to the isomorphism problem between K 0 and F p . In particular,
  • an efficient isomorphism K 0 F p can be extended in time polynomial in the input length l ( K ) to an efficient isomorphism K F p n ;
  • there exists an isomorphism F p n K computable in time polynomial in l ( K ) .
In our terminology, Theorem 5 provides a structural proxy for black box fields of known characteristic. Indeed, if K is a black box field of known characteristic p, then we can construct an isomorphism F p = Z / p Z K 0 by the map
m 1 + 1 + + 1 ( m   times )
where 1 is the unit in K 0 ; it is computable in linear in log p time by the double-and-add method. Construction of an isomorphism K 0 F p remains an open problem when p is an astronomically large prime.

4. Plan of Proof of Theorem 1

Let Y SL 2 ( F ) , where F is an unknown finite field of unknown odd characteristic. It is easy to see that at least half of elements in Y are of even order. Therefore, by using the standard method [3] (Section 4.7), we can easily construct an involution in Y but Y contains only one involution—the generator of the center.
In the proof of Theorem 1, we first redefine the equality of strings in Y in the following way to be able to pass to the quotient group Y / Z ( Y ) :
x y xy 1   is either identity or the central involution in   Y .
Then, we use algorithms developed in [3] (Theorem 1.3) for the black box group Y / Z ( Y ) PSL 2 ( F ) to construct a black box group X PGL 2 ( F ) , a black box field K F , and computable, in polynomial time, homomorphisms
Y Y / Z ( Y ) X SO 3 ( K ) .
We note here that we can add and multiply elements and take additive and multiplicative inverses of (non-zero) elements of the black box field K (see [3] (Section 9)). Furthermore, the two isomorphisms
X SO 3 ( K )
are inverses of each other ([3] (Section 11)).
It is well-known that SO 3 ( K ) is isomorphic to PGL 2 ( K ) , and we need to present an efficient algorithm constructing such an isomorphism. We deal with this problem in Section 6.
The group SO 3 ( K ) arises in [3] as the group of matrices from GL 3 ( K ) preserving the quadratic form with the matrix
1 0 0 0 1 0 0 0 1 ;
we will denote this group as SO 3 ( K ) .
It turns out that it is much more convenient to compute in the orthogonal groups SO 3 ( K ) preserving the quadratic form with the matrix
0 0 1 0 2 0 1 0 0 ;
we will denote this group as SO 3 ( K ) .
Of course, the two groups SO 3 ( K ) and SO 3 ( K ) are conjugate in GL 3 ( K ) ; the computation of the conjugating (change of basis) matrix is very easy if K contains 1 , but it requires more attention if K does not contain 1 ; see Section 5.3.
After that we obtain the homomorphisms
Y Y / Z ( Y ) X SO 3 ( K ) SO 3 ( K ) PGL 2 ( K )
and focus on its restriction
Y / Z ( Y ) [ X , X ] PSL 2 ( K ) .
We reverse the first homomorphism, making it
Y / Z ( Y ) [ X , X ]
(this step requires a careful analysis of the corresponding constructions from [3]) and then lift the resulting isomorphisms
Y / Z ( Y ) PSL 2 ( K )
to
Y SL 2 ( K ) .
This is performed in Section 6.
It will become clear that the appropriate fragments of this proof, together with [17], provide a proof of Theorem 2; see Section 7.

5. Orthogonal Groups in Two Types of Bases

5.1. Generalities on Symmetric Bilinear Forms

Let V be a vector space of dimension 3 over a black box field K F , where F is an unknown finite field of unknown odd characteristic. An important additional assumption that we are making is that we are given a computationally feasible global exponent for K , that is, a natural number E such that a E = 1 for all a K { 0 } , so that we can compute square roots in K , when they exist, by a version of the Tonelli–Shanks algorithm, [3] (Lemma 5.6).
Assume that β ( · , · ) is a non-degenerate symmetric bilinear form on V. It is well-known [17] (Section 1.4) that β has Witt index 1 and that there are only two classes of equivalence of non-degenerate symmetric bilinear forms on V, and if β belongs to one of these classes, then ϵ β , where ϵ is not a square root in K , belongs to another class.
We set Q ( v ) = β ( v , v ) ; this is the quadratic form associated with β . (In the literature, the quadratic form associated with β is frequently taken to be Q ( v ) = 1 2 β ( v , v ) ; it can be seen that our choice simplifies some of our calculations.)
Notice that the orthogonal groups SO ( V , β ) and SO ( V , ϵ β ) coincide elementwise for arbitrary 0 ϵ K .
It is important to keep this basic observation in mind because in the algorithms that we develop in this paper, the orthogonal groups SO ( V , β ) will be their sets of inputs. Moreover, they will be given to us as subsets of the matrix group GL 3 ( K ) . Writing orthogonal transformations from SO ( V , β ) in different bases of V introduces some subtle changes, which we will have to take into account.

5.2. Two Types of Bases: Spinor and Canonical

We shall call a basis B = { v 1 , v 2 , v 3 } of V a spinor basis if
β ( v i , v j ) = λ for some fixed 1 λ K if i = j 0 if i j .
In a spinor basis, the quadratic form Q associated with β is written by the scalar matrix λ I , and we will denote the group of matrices that preserves this form as O 3 ( K ) , the corresponding special orthogonal group as SO 3 ( K ) , and its commutator subgroup as Ω 3 ( K ) .
Therefore,
O 3 ( K ) = { M GL 3 ( K ) : M t · λ I · M = λ I } ,
which is the same as the standard definition of the orthogonal group:
O 3 ( K ) = { M GL 3 ( K ) : M t M = I } .
We shall call a basis C = { e , w , f } of V canonical if the quadratic form Q is written in it by the matrix λ J , where
J = 0 0 1 0 2 0 1 0 0 .
We define O 3 ( K ) as
O 3 ( K ) = { M GL 3 ( K ) : M t · λ J · M = λ J } ,
or, which is the same,
O 3 ( K ) = { M GL 3 ( K ) : M t J M = J } ,
with SO 3 ( K ) and Ω 3 ( K ) defined in an obvious way (the latter is the commutator of SO 3 ( K ) , but it can also be defined as the group of elements of spinor norm 1 ).
The quadratic forms Q and Q associated with matrices I and J are Q = x 1 2 + x 3 2 + x 3 2 and Q = 2 x 2 2 + 2 x 1 x 3 . When SO 3 ( K ) PGL 3 ( K ) are seen as acting on their Lie algebra l 2 ( K ) , that is, the algebra of 2 × 2 matrices M = x 2 x 1 x 3 x 2 over K of trace 0 , Q turns out to be most the natural quadratic form: Q ( M ) = 2 det M ; of course, it is also proportional to the Killing form on l 2 ( K ) .
To summarize, the subgroups O 3 ( K ) and O 3 ( K ) in GL 3 ( K ) represent the same orthogonal group O 3 ( V , β ) written in two different bases; one of them is spinor, and the other is canonical. The groups O 3 ( K ) and O 3 ( K ) do not change if we replace the corresponding symmetric bilinear form β by its non-zero scalar multiple λ β .

5.3. Change of Basis

In this subsection, we construct the change of basis matrix that conjugates SO 3 ( K ) to SO 3 ( K ) in GL 3 ( K ) , where K is a black box field.
Let us take a canonical basis C = { e , w , f } with λ = 1 . Then,
β ( e , e ) = β ( f , f ) = β ( e , w ) = β ( f , w ) = 0 , β ( e , f ) = 1 , β ( w , w ) = 2 .
In every finite field K of odd characteristic, there exist a , b K such that a 2 + b 2 = 1 , and such pairs can be easily found by the Tonelli–Shanks algorithm [3] (Lemma 5.6) in probabilistic time polynomial in log E . Note that we can compute a and b without knowing the characteristic of K . Then, a direct calculation shows that the vectors
v 1 = e + f v 2 = b e + a w + b f v 3 = a e + b w a f
form a spinor basis. Let us call it B , and we have the change of basis matrix from C to B
P = 1 b a 0 a b 1 b a .
If K contains square root of 1 , say, ϵ 2 = 1 , then we can take a = ϵ , b = 0 , and obtain a simpler transition matrix
P = 1 0 ϵ 0 ϵ 0 1 0 ϵ .

Analysis of This Calculation

The three-dimensional vector space V = K 3 with a non-degenerate symmetric bilinear form β ( · , · ) has a model that is very natural in the context of this paper: the space (actually, the Lie algebra) sl 2 ( K ) of 2 × 2 matrices over K of trace 0 with
β ( U , V ) = Tr ( U V ) .
For the space sl 2 ( K ) , the matrices
E = 0 0 1 0 , W = 1 0 0 1 , F = 0 1 0 0
form a canonical basis; applying construction of a spinor basis as described above, we obtain
V 1 = 0 1 1 0 , V 2 = a b b a , V 3 = b a a b .
The matrices V 1 , V 2 , V 3 are generators of three cyclic subgroups of order 4 in a quaternion group Q < GL 2 ( K ) , and they satisfy the following relations:
V 1 2 = V 2 2 = V 3 2 = 1 , V 1 V 2 = V 3 , V 2 V 3 = V 1 , V 3 V 1 = V 2 .
Our previous paper [3] (Section 9) explains why finding a quaternion subgroup Q amounts to constructing of a spinor basis in sl 2 ( K ) in a pure black box and hence coordinate-free context. In [3] (Section 8), computing in a black box group X PGL 2 ( F ) , we construct the image Q ¯ of Q in X and its normalizer N X ( Q ¯ ) Sym 4 , and this is one of the key steps in the algorithm developed in [3].

5.4. Isomomorphisms PGL 2 ( K ) SO 3 ( K )

Proposition 1.
Let K be a black box finite field and let E be a global exponent for the multiplicative group K * . Then, there is a Las Vegas algorithm that constructs, in probabilistic time polynomial in log E , two-way isomorphism
Φ : PGL 2 ( K ) SO 3 ( K ) , Φ 1 : SO 3 ( K ) PGL 2 ( K ) .
The algorithm runs in time polynomial in log E .
Proof. 
The required isomorphism comes from the action of GL 2 ( K ) on the Lie algebra l = sl 2 ( K ) of 2 × 2 matrices over K of trace 0 . Following Section 5.3, we choose a canonical basis in l as
E = 0 0 1 0 , W = 1 0 0 1 , F = 0 1 0 0 .
Let
A = a b c d GL 2 ( K ) ,
then
A 1 = 1 ad bc d b c a ,
and it is easy to compute
E A = 1 ad bc ab b 2 a 2 ab = 1 ad bc a 2 E + ab W + b 2 F , W A = 1 ad bc ad + bc 2 bd 2 ac 2 ad bc = 1 ad bc 2 ac E + ( ad + bc ) W + 2 bd F , F A = 1 ad bc cd d 2 c 2 cd = 1 ad bc c 2 E + cd W + d 2 F .
Therefore, the conjugation by the matrix A = a b c d is written in the basis E, W, F by the matrix
1 ad bc a 2 2 ac c 2 ab ad + bc cd b 2 2 bd d 2 ,
and we have a homomorphism from GL 2 ( K ) to SO 3 ( K ) :
A = a b c d a 2 δ 2 ac δ c 2 δ ab δ ( ad + bc ) δ cd δ b 2 δ 2 bd δ d 2 δ ,
where δ = 1 / ( ad bc ) . It is easy to check that the kernel of this homomorphism is the group of scalar matrices and results in an isomorphism
Φ : PGL 2 ( K ) SO 3 ( K ) .
The inverse isomomorphism
Φ 1 : SO 3 ( K ) PGL 2 ( K )
can now be found with ease. Note that we can construct, if they exist, the square roots of the elements of the black box field K in time polynomial in log E by [3] (Lemma 5.6).
Assume that we are given a matrix
B = b 11 b 12 b 13 b 21 b 22 b 23 b 31 b 32 b 33 SO 3 ( K )
and wish to find A = a b c d such that Φ ( A ) = B . Because of Equation (1), this amounts to solving the system of equations in variables a , b , c , d
a 2 δ 2 ac δ c 2 δ ab δ ( ad + bc ) δ cd δ b 2 δ 2 bd δ d 2 δ = b 11 b 12 b 13 b 21 b 22 b 23 b 31 b 32 b 33
It is easy to see that at least one of the matrix elements b 11 , b 13 , b 31 , b 33 is not zero; assume that b 11 0 , and other cases can be treated similarly.
If b 11 = a 2 δ has no square root in K , then δ also has no square root. In that case, pick some γ that is not a square root in K ; alternatively, set γ = 1 . In both cases, δ γ is a square and, for the sake of argument, denote (but do not compute—we cannot compute because we do not know δ )
ϵ 2 = δ γ ,
and compute
b i j = b i j γ for i , j = 1 , 2 , 3 .
This allows us to rewrite Equation (2) as
a 2 ϵ 2 2 ac ϵ 2 c 2 ϵ 2 ab ϵ 2 ( ad + bc ) ϵ 2 cd ϵ 2 b 2 ϵ 2 2 bd ϵ 2 d 2 ϵ 2 = b 11 b 12 b 13 b 21 b 22 b 23 b 31 b 32 b 33 ,
which can be immediately solved. If b 12 0 , then we set
b 11 = a ϵ b 21 b 11 = b ϵ b 12 2 b 11 = c ϵ 2 b 23 · b 11 b 12 = d ϵ .
If b 12 = 0 , then similar computations yield us the matrix
ϵ a b c d = ϵ A
which is the same element of PGL 2 ( K ) as A. Notice that we do not compute δ and ϵ .
This establishes the isomorphism Φ 1 : SO 3 ( K ) PGL 2 ( K ) .

6. Construction of a Proxy for Y SL 2

In this section, we present the proof of Theorem 1. The following lemma is crucial.
Lemma 1.
Let X and Y be two groups isomorphic to SL 2 ( F ) over a finite field F of odd characteristic, then any surjective homomorphism
X Y / Z ( Y )
can be lifted to a homomorphism
X Y ,
and this homomorphism is unique.
Proof. 
The proof immediately follows from the well-known property: every automorphism of Y / Z ( Y ) can be lifted to an automorphism of Y, and this automorphism of Y is unique. □
To prove Theorem 1, we need some details of the constructions from [3], which we shall give a summary here. Let Y SL 2 ( F ) . We construct two cyclic subgroups S (torus of order twice odd number) and R (torus containing an element of order 4) in Y and form the direct product Y × Y . Then, we consider the black box subgroup X * that is generated in Y × Y by the pairs ( s , s ) for s S and ( r , r 1 ) for r R . Now, X = ( X * / Z ( X * ) ) δ PGL 2 ( F ) , where δ is the involution swapping the two copies of Y in Y × Y . Using the results in [3], these constructions lead up to a construction of a black box field K F and the morphisms
X SO 3 ( K ) .

6.1. Construction of the Morphism SL 2 ( K ) Y

Through the construction of the morphisms
X SO 3 ( K )
from [3] and
SO 3 ( K ) PGL 2 ( K )
in Section 5.4, together with
SO 3 ( K ) SO 3 ( K )
in Section 5.3, we have a chain of morphisms
X SO 3 ( K ) SO 3 ( K ) PGL 2 ( K ) .
Reading this diagram from right to left and restricting the map to PSL 2 ( K ) , we can obtain a chain of morphisms
PSL 2 ( K ) Ω 3 ( K ) X * / Z ( X * ) ,
then we expand it to
SL 2 ( K ) PSL 2 ( K ) Ω 3 ( K ) X * / Z ( X * ) Y / Z ( Y ) ,
where the last arrow is induced by the natural projection of X * = Y × Y on its direct factor. Hence, we have a morphism
ϕ : SL 2 ( K ) Y / Z ( Y ) .
Now, we shall lift this morphism ϕ to the desired morphism
ψ : SL 2 ( K ) Y .
Let z Z ( Y ) be the central involution of Y . If x SL 2 ( K ) , then ϕ ( x ) is a coset in Y made of two elements, say y and yz . If x is of odd order, then one of the elements in the coset { y , yz } has odd order and, by Lemma 1, is equal to the image ψ ( x ) of x .
It is well-known that every matrix x SL 2 ( K ) can be written as a product of k 4 transvections, x = x 1 x k ; explicit formulae are in [17] (pp. 81–82). Indeed, if
a b c d SL 2 ( K )
and c 0 , then
a b c d = 1 ( a 1 ) c 1 0 1 1 0 c 1 1 ( d 1 ) c 1 0 1 .
If b 0 , we have
a b c d = 1 0 ( d 1 ) b 1 1 1 b 0 1 1 0 ( a 1 ) b 1 1 .
If b = c = 0 , we have
a 0 0 a 1 = 1 0 a 1 1 1 1 1 0 1 1 0 a 1 1 1 a 1 0 1 .
Since we work in fields of odd characteristic, transvections are elements of odd order, and the previous argument allows us to compute ψ ( x ) as
ψ ( x ) = ψ ( x 1 ) ψ ( x k ) .

6.2. Construction of the Morphism Y SL 2 ( K )

To construct the reverse morphism presented in Section 6.1, it is important to observe that the morphism
ψ : SL 2 ( K ) Y
is reversible on S and R , since we have natural maps
S X * and R X *
and we can map them back to SL 2 ( K ) .
Now, we show how to reverse ψ on the entire Y . Let us denote Y ¯ = Y / Z ( Y ) . Abusing notation, we may use the same notation for elements in Y ¯ PSL 2 as for elements in Y SL 2 .
Indeed, it will suffice to reverse the map ρ induced by ψ on
ρ : PSL 2 ( K ) Y ¯ ,
and have a morphism
ρ 1 : Y ¯ PSL 2 ( K ) ,
expand it to
σ : Y PSL 2 ( K )
and then lift it to a map
θ : Y SL 2 ( K ) .
Let us call elements in Y ¯ with already known preimages in PSL 2 ( K )  “white”. Obviously, products of white elements are white.
We shall prove that every element in Y is white.
Lemma 2.
All elements in N Y ¯ ( S ) and N Y ¯ ( R ) are white.
Proof. 
It suffices to prove the statement for involutions in N Y ¯ ( S ) S . We first construct one such involution. Since the elements of S are white, we can represent any element from S by 2 × 2 matrices with entries from K . Let s S be an element of order bigger than or equal to 3, and let M be its image in SL 2 ( K ) . Then we need to locate an involution A SL 2 ( K ) satisfying M A = M 1 which is equivalent to M A = A M 1 . The entries of such a matrix A can be found by solving a system of linear equations over the black box field K . Now, by using the map ψ from Section 6.1, we construct a white element u = ψ ( A ) N Y ¯ ( S ) S . Now, any other involution t N Y ¯ ( S ) can be written as t = u · u t , with u t S being a white element. □
Lemma 3.
If a is a white involution then all elements in C Y ¯ ( a ) are white.
Proof. 
One of the white tori S or R contains an involution; without loss of generality, we can assume that this is s S . Being white involutions, a and s are conjugate by a white element (we can do the corresponding calculation in PSL 2 ( K ) ); hence, C Y ¯ ( a ) is conjugate to the white subgroup C Y ¯ ( s ) = N Y ¯ ( S ) by a white element and is therefore white. □
We can now complete construction of ρ 1 : Y ¯ PSL 2 ( K ) .
Lemma 4.
Every involution in Y ¯ is white.
Proof. 
Let t Y ¯ be an involution. Taking random white involutions (that is, images of random involutions from PSL 2 ( K ) ), we can find a white involution a such that the product a t is of even order, thus yielding an involution z commuting with both a and t ; this involution z is therefore white. This means that we can produce random white involutions in C Y ¯ ( t ) until they generate a white dihedral subgroup containing t . □
Lemma 5.
Every element of Y ¯ is white.
Proof. 
Applying the same arguments in [3] (Lemma 5.4), we have a Las Vegas polynomial time algorithm with which we can write every element of Y ¯ as a product of involutions. Since every involution is white, every element is white. □
We can now complete the proof of Theorem 1. Indeed, we have the inverse morphism ρ 1 and we thus have a morphism
σ : Y PSL 2 ( K ) .
Let y Y . We can compute σ ( y ) as the coset in PSL 2 ( K ) consisting of two elements u and v , and compute ρ ( u ) . If ρ ( u ) = y , then θ ( y ) = u ; otherwise, θ ( y ) = v .

7. Construction of a Proxy for Y PSL 2 and Y PGL 2

If X PGL 2 ( F ) , the proof of Theorem 2 is a simple combination of Remark 1 and Proposition 1.
If X PSL 2 ( F ) , the proof is a slight modification of arguments of Section 6.

8. GAP Code

The isomorphism from the group SL 2 ( F ) , given in its natural representation to a black box group encrypting SL 2 ( F ) , is implemented in GAP [18] where F is a field of prime order. We present our GAP code at https://github.com/sukru-yalcinkaya/SL2Morphisms, accessed on 29 October 2025.
Our implementation takes a group element from SL 2 ( F ) , as it is represented in GAP and computes its image in the black box group encrypting SL 2 ( F ) . The correctness of the isomorphism can be verified by a user by comparing, for example, the well-known Chevalley Commutator Formulas between the elements in the natural SL 2 and their images in the black box group.
In our implementation, the only GAP functions employed are the black box operations described in BB1–BB3, namely group multiplication, inversion, identity testing, together with the generation of pseudo-random elements. For an exponent, we use the order of the group SL 2 ( F ) . We emphasize that operations such as computing the orders of group elements are not used. The code is intended primarily to be a proof of concept rather than a fully practical implementation, leaving considerable room for optimization and extension. Further discussion of our implementation can be found in [19]; see also our GitHub repository above.

Author Contributions

Both authors equally contributed to theoretical research. Implementation of algorithms in the GAP code and computer experiments are performed by Ş.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

This paper—and other papers in our project—would have never been written if the authors did not enjoy the warm hospitality offered to them at the Nesin Mathematics Village in Şirince, Izmir Province, Turkey, as part of their Research in Pairs program; our thanks go to Ali Nesin and to all volunteers, staff, and students who have made the Village a mathematical paradise.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviation is used in this manuscript:
GAPGroups, Algorithms and Programming; computer algebra system

References

  1. Babai, L.; Beals, R. A Polynomial-Time Theory of Black Box Groups; London Mathematical Society Lecture Note Series; Cambridge University Press: Cambridge, UK, 1999; pp. 30–64. [Google Scholar]
  2. Kantor, W.M.; Kassabov, A. Black box groups isomorphic to PGL(2, 2e). J. Algebra 2015, 421, 16–26. [Google Scholar] [CrossRef]
  3. Borovik, A.; Yalçınkaya, Ş. Adjoint representations of black box groups PSL2 ( F q ) . J. Algebra 2018, 506, 540–591. [Google Scholar] [CrossRef]
  4. Babai, L.; Szemerédi, E. On the complexity of matrix group problems. In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science, Singer Island, FL, USA, 24–26 October 1984; pp. 229–240. [Google Scholar]
  5. Boneh, D.; Lipton, R.J. Algorithms for black-box fields and their application to cryptography. In Proceedings of the Advances in Cryptology—CRYPTO ’96, Santa Barbara, CA, USA, 18–22 August 1996; Lecture Notes in Computer Science; Koblitz, N., Ed.; Springer: Berlin/Heidelberg, Germany, 1996; pp. 283–297. [Google Scholar]
  6. Maurer, U.; Raub, D. Black-box extension fields and the inexistence of field-homomorphic one-way permutations. In Proceedings of the Advances in Cryptology—ASIACRYPT 2007, Kuching, Malaysia, 2–6 December 2007; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2007; Volume 4833, pp. 427–443. [Google Scholar]
  7. Brooksbank, P.A. Fast constructive recognition of black-box unitary groups. LMS J. Comput. Math. 2003, 6, 162–197. [Google Scholar] [CrossRef][Green Version]
  8. Brooksbank, P.A. Fast constructive recognition of black box symplectic groups. J. Algebra 2008, 320, 885–909. [Google Scholar] [CrossRef][Green Version]
  9. Brooksbank, P.A.; Kantor, W.M. On constructive recognition of a black box PSL(d, q). In Groups and Computation III; de Gruyter: Berlin, Germany, 2001; pp. 95–111. [Google Scholar]
  10. Brooksbank, P.A.; Kantor, W.M. Fast constructive recognition of black box orthogonal groups. J. Algebra 2006, 300, 256–288. [Google Scholar] [CrossRef][Green Version]
  11. Dietrich, H.; Leedham-Green, C.R.; O’Brien, E.A. Effective black-box constructive recognition of classical groups. J. Algebra 2015, 421, 460–492. [Google Scholar] [CrossRef]
  12. Kantor, W.M.; Magaard, K. Black box exceptional groups of Lie type II. J. Algebra 2015, 421, 524–540. [Google Scholar] [CrossRef]
  13. Lübeck, F.; Magaard, K.; O’Brien, E.A. Constructive recognition of SL3(q). J. Algebra 2007, 316, 619–633. [Google Scholar] [CrossRef]
  14. Kantor, W.M.; Seress, Á. Black box classical groups. Mem. Amer. Math. Soc. 2001, 149, 708. [Google Scholar] [CrossRef]
  15. Borovik, A.; Yalçınkaya, Ş. Homomorphic encryption and some black box attacks. In Proceedings the of Mathematical Software—ICMS 2020—7th International Conference, Braunschweig, Germany, 13–16 July 2020; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2020; pp. 115–124. [Google Scholar]
  16. Lenstra, H.W., Jr. Finding isomorphisms between finite fields. Math. Comput. 1991, 56, 329–347. [Google Scholar] [CrossRef][Green Version]
  17. Carter, R.W. Simple Groups of Lie Type; John Wiley & Sons: London, UK, 1972. [Google Scholar]
  18. The GAP Group. GAP—Groups, Algorithms, and Programming, Version 4.15.1. 2025. Available online: https://www.gap-system.org (accessed on 25 October 2025).
  19. Borovik, A.; Yalçınkaya, Ş. An implementation of the morphisms SL2 ( F ) →SL2(K)→X. arXiv 2025, arXiv:2510.14569. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Borovik, A.; Yalçınkaya, Ş. Natural Representations of Black Box Groups SL2(Fq). Axioms 2025, 14, 895. https://doi.org/10.3390/axioms14120895

AMA Style

Borovik A, Yalçınkaya Ş. Natural Representations of Black Box Groups SL2(Fq). Axioms. 2025; 14(12):895. https://doi.org/10.3390/axioms14120895

Chicago/Turabian Style

Borovik, Alexandre, and Şükrü Yalçınkaya. 2025. "Natural Representations of Black Box Groups SL2(Fq)" Axioms 14, no. 12: 895. https://doi.org/10.3390/axioms14120895

APA Style

Borovik, A., & Yalçınkaya, Ş. (2025). Natural Representations of Black Box Groups SL2(Fq). Axioms, 14(12), 895. https://doi.org/10.3390/axioms14120895

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop