Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups
Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.
đĄ Research Summary
The paper âSome Proxy Signature and Designated Verifier Signature Schemes over Braid Groupsâ explores the use of braid groups as a nonânumberâtheoretic foundation for digital signatures, focusing on scenarios where delegation and restricted verification are required. After a concise introduction that motivates the shift away from traditional integerâbased cryptographyâespecially in light of emerging quantum threatsâthe authors provide a thorough mathematical background on braid groups Bâ, including Artinâs presentation, the definition of the conjugacy operation, and the two hard problems that underlie security: the Conjugacy Search Problem (CSP) and the Conjugacy Decision Problem (CDP). These problems are believed to be resistant to known quantum algorithms, making braidâbased constructions attractive for postâquantum cryptography.
The core contribution consists of five distinct signature schemes, each built on the same basic keyâgeneration framework. In the keyâgeneration phase, a user selects a private braid a from a suitably chosen subgroup of Bâ and publishes a public key of the form aâŻrâŻaâťÂš, where r is a random braid. The schemes are:
-
Proxy Signature (PS) â The original signer A creates a delegation token by conjugating the proxyâs public key with his private braid (aâŻbâŻaâťÂš). The proxy B can then sign messages on Aâs behalf using this token together with his own randomness.
-
Designated Verifier Signature (DVS) â The signer incorporates the designated verifierâs public braid v into the signature via a doubleâconjugation vâŻĎâŻvâťÂš. Only the holder of the corresponding private braid vâťÂš can successfully verify the signature, rendering it opaque to any third party.
-
BiâDesignated Verifier Signature (BDVS) â Extends DVS to two verifiers Vâ and Vâ, each receiving an independently conjugated component (vââŻĎâŻvââťÂš and vââŻĎâŻvââťÂš). Both verifiers can validate, but no outsider can.
-
Designated Verifier Proxy Signature (DVPS) â Merges the proxy delegation token with the designatedâverifier transformation, so that a proxy can sign only for a specific verifier. The token and the verifierâs braid are combined in a nested conjugation structure.
-
BiâDesignated Verifier Proxy Signature (BDVPS) â The most complex construction, integrating proxy delegation, doubleâdesignated verification, and the braidâbased security assumptions into a single protocol.
For each scheme the authors detail the algorithms for key generation, signing, verification, and, where applicable, delegation or designation. They also discuss the required random braid selections and the handling of subgroup membership to avoid leakage of secret information.
Security analysis is carried out in a formal model that defines properties such as unforgeability, nonârepudiation, delegationârestriction, verifierâprivacy, and proxyâmisuse resistance. The authors prove that breaking any of these properties would imply an efficient solution to CSP or CDP, which is assumed to be infeasible. In particular, they show that even if an adversary obtains a delegation token, reconstructing the original signerâs private braid remains as hard as solving CSP. Similarly, a verifierâonly signature cannot be validated by anyone lacking the designated verifierâs private key, because verification requires the inverse conjugation that only the verifier can compute.
Performance evaluation is performed using concrete braid parameters (e.g., nâŻ=âŻ80, braid length ââŻ256 bits). The authors implement the schemes in a highâlevel language and measure the time for key generation, signing, and verification. Results indicate that the computational overhead is comparable to, and in some cases slightly better than, latticeâbased proxy signatures and ellipticâcurve based designatedâverifier signatures. Memory consumption is modest, and the schemes scale linearly with the chosen braid length. The paper also discusses parameter selection tradeâoffs: larger n and longer braids increase security against CSP/CDP attacks but incur higher computational cost.
In the concluding section, the authors argue that braidâgroupâbased signatures provide a viable alternative for postâquantum environments, especially where delegation and restricted verification are essential. They outline future research directions, including optimizing braid parameter generation, extending the constructions to multiâproxy or multiâverifier settings, formalizing security proofs in the universal composability framework, and integrating the schemes into realâworld protocols such as secure email or blockchain smart contracts. Overall, the paper delivers a comprehensive set of constructions, rigorous security arguments, and practical performance data, making a solid case for the applicability of braid groups in advanced digital signature scenarios.
Comments & Academic Discussion
Loading comments...
Leave a Comment