An Efficient Implementation of Braid Groups

  • Jae Choon Cha
  • Ki Hyoung Ko
  • Sang Jin Lee
  • Jae Woo Han
  • Jung Hee Cheon
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2248)


We implement various computations in the braid groups via practically efficient and theoretically optimized algorithms whose pseudo-codes are provided. The performance of an actual implementation under various choices of parameters is listed.


Hash Function Word Problem Braid Group Canonical Factor Maximal Head 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    J. S. Birman, K. H. Ko and S. J. Lee, A new approach to the word and conjugacy problem in the braid groups, Advances in Mathematics 139 (1998), 322–353.zbMATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    E. A. Elrifai and H. R. Morton, Algorithms for positive braids, Quart. J. Math. Oxford 45 (1994), 479–497.zbMATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    D. Epstein, J. Cannon, D. Holt, S. Levy, M. Paterson and W. Thurston, Word processing in groups, Jones & Bartlett, 1992.Google Scholar
  4. 4.
    F. A. Garside, The braid group and other groups, Quart. J. Math. Oxford 20 (1969), no. 78, 235–254.zbMATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    K. H. Ko, S. J. Lee, J. H. Cheon, J. H. Han, J. S. Kang and C. Park, New public key cryptosystem using braid groups, Advances in Cryptology, Proceedings of Crypto 2000, Lecture Notes in Computer Science 1880, ed. M. Bellare, Springer-Verlag (2000), 166–183.Google Scholar
  6. 6.
    E. Lee, S. J. Lee and S. G. Hahn, Pseudorandomness from braid groups, Advances in Cryptology, Proceedings of Crypto 2001, Lecture notes in Computer Science 2139, ed. J. Kilian, Springer-Verlag (2001), 486–502.Google Scholar
  7. 7.
    K. H. Ko, et al., Mathematical security analysis of braid cryptosystems, preprint.Google Scholar
  8. 8.
    R. P. Stanley, Enumerative combinatorics, Wadsworth and Brooks/Cole, 1986.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Jae Choon Cha
    • 1
  • Ki Hyoung Ko
    • 1
  • Sang Jin Lee
    • 1
  • Jae Woo Han
    • 2
  • Jung Hee Cheon
    • 3
  1. 1.Department of MathematicsKorea Advanced Institute of Science and TechnologyTaejonKorea
  2. 2.National Security Research InstituteTaejonKorea
  3. 3.International Research center for Information SecurityInformation and Communications UniversityTaejonKorea

Personalised recommendations