Abstract:A new presentation of the n-string braid group B n is studied. Using it, a new solution to the word problem in B n is obtained which retains most of the desirable features of the Garside Thurston solution, and at the same time makes possible certain computational improvements. We also give a related solution to the conjugacy problem, but the improvements in its complexity are not clear at this writing.
Academic Press
“…In this section, we will briefly introduce the notion of braids and give evidence that the braid groups can also play important roles in cryptography. The general reference for braid theory is the Birman's book [5] and for the word problem and conjugacy problem, see [6,13,14,16]. This section is composed as follows: §2.1 is the definition of the braid groups.…”
Section: A Cryptographic Aspect Of the Braid Groupsmentioning
confidence: 99%
“…In late sixties, Garsides solved the word problem after exploring the properties of the semigroup of positive words in [16] and his idea was improved by Thurston [14], Elrifai-Morton [13] and BirmanKo-Lee [6]. They showed that there is a fast algorithm to compute the canonical form, which is unique for their results briefly.…”
Section: Describing Braids Using Permutationsmentioning
confidence: 99%
“…The adversary may try to use a mathematical solution to the conjugacy problem by Garside [16], Thurston [14], Elrifai-Morton [13] and Birman-Ko-Lee [6]. But the known algorithms find an element a ∈ B +r , not in LB .…”
Section: Attack Using the Super Summit Setmentioning
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups can serve as a good source to enrich cryptography. The feature that makes the braid groups useful to cryptography includes the followings: (i) The word problem is solved via a fast algorithm which computes the canonical form which can be efficiently manipulated by computers. (ii) The group operations can be performed efficiently. (iii) The braid groups have many mathematically hard problems that can be utilized to design cryptographic primitives. The other is to propose and implement a new key agreement scheme and public key cryptosystem based on these primitives in the braid groups. The efficiency of our systems is demonstrated by their speed and information rate. The security of our systems is based on topological, combinatorial and group-theoretical problems that are intractible according to our current mathematical knowledge. The foundation of our systems is quite different from widely used cryptosystems based on number theory, but there are some similarities in design.
“…In this section, we will briefly introduce the notion of braids and give evidence that the braid groups can also play important roles in cryptography. The general reference for braid theory is the Birman's book [5] and for the word problem and conjugacy problem, see [6,13,14,16]. This section is composed as follows: §2.1 is the definition of the braid groups.…”
Section: A Cryptographic Aspect Of the Braid Groupsmentioning
confidence: 99%
“…In late sixties, Garsides solved the word problem after exploring the properties of the semigroup of positive words in [16] and his idea was improved by Thurston [14], Elrifai-Morton [13] and BirmanKo-Lee [6]. They showed that there is a fast algorithm to compute the canonical form, which is unique for their results briefly.…”
Section: Describing Braids Using Permutationsmentioning
confidence: 99%
“…The adversary may try to use a mathematical solution to the conjugacy problem by Garside [16], Thurston [14], Elrifai-Morton [13] and Birman-Ko-Lee [6]. But the known algorithms find an element a ∈ B +r , not in LB .…”
Section: Attack Using the Super Summit Setmentioning
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups can serve as a good source to enrich cryptography. The feature that makes the braid groups useful to cryptography includes the followings: (i) The word problem is solved via a fast algorithm which computes the canonical form which can be efficiently manipulated by computers. (ii) The group operations can be performed efficiently. (iii) The braid groups have many mathematically hard problems that can be utilized to design cryptographic primitives. The other is to propose and implement a new key agreement scheme and public key cryptosystem based on these primitives in the braid groups. The efficiency of our systems is demonstrated by their speed and information rate. The security of our systems is based on topological, combinatorial and group-theoretical problems that are intractible according to our current mathematical knowledge. The foundation of our systems is quite different from widely used cryptosystems based on number theory, but there are some similarities in design.
“…There are theoretically similar solutions to the word and conjugacy problems in B n for both presentations [1][2][3]. The band-generator presentation has a computational advantage over the Artin as far as the word problem is concerned.…”
Section: A Quick Review Of the Braid Groupsmentioning
confidence: 94%
“…In this paper we discuss implementation issues of the braid group given by either the Artin presentation [2] or the band-generator presentation [1]. Due to the analogy between the two presentations, our implementations on the two presentations are basically identical, except the low-level layer consisting of data structures and algorithms for canonical factors, which play the role of the building blocks for braids.…”
Abstract. We implement various computations in the braid groups via practically efficient and theoretically optimized algorithms whose pseudo-codes are provided. The performance of an actual implementation under various choices of parameters is listed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.