Bai–Galbraith Signature Scheme
- Bai–Galbraith signature scheme is a lattice-based digital signature protocol built on standard LWE, featuring rejection sampling to mask secrets.
- It operates in cyclotomic rings with carefully chosen small coefficient bounds, ensuring strong unforgeability under EUF-CMA in the random oracle model.
- The scheme highlights a trade-off between larger public keys and compact signatures, influencing post-quantum cryptosystems including code-based designs like LEDAsig.
The Bai–Galbraith signature scheme is a lattice-based digital signature protocol distinguished by its lack of public key compression and security reductions to the standard Learning with Errors (LWE) problem in general lattices. Originally proposed for use in post-quantum cryptography, it has close connections with the code-based LEDAsig system design and is notable for its explicit trade-off between public key size and signature length. It operates over polynomial rings, uses rejection sampling to mask secrets, and achieves strong unforgeability guarantees in the random oracle model.
1. Algebraic Foundations and Parameters
The Bai–Galbraith (B-G) scheme is constructed in the cyclotomic ring of degree , with modulus . The principal distributional parameters are two integer “smallness” bounds , typically , –$4$, .
Two flat discrete distributions are employed to generate secret and ephemeral elements:
A challenge space is defined as those ring elements with exactly $60$ coefficients in and the remainder zero, yielding a $256$-bit (classical and moderate quantum) security level.
The LWE problem underpinning security is: given (uniformly random) and for secrets , recover . The difficulty of solving this with provides the security foundation (Sengupta et al., 12 Nov 2025).
2. Protocol Algorithms
Key Generation
Let and be sampled independently from . The public matrix is chosen uniformly at random. The public tag vector is .
- Secret key:
- Public key:
KeyGen procedure:
- Sample uniformly.
- Sample , .
- Compute .
- Output , .
Signing
To sign :
- Sample ephemeral .
- Compute .
- Compute , where extracts the most significant bits per coefficient.
- Set .
- With : if or , abort and retry.
- Output .
denotes the complementary least significant bits such that , with in .
Verification
Given input , , and signature :
- Check .
- Compute .
- Extract .
- Compute .
- Accept if .
Correctness follows from , and the low-norm checks ensure (Sengupta et al., 12 Nov 2025).
3. Security Analysis
- Security reduces to the average-case hardness of LWE for random and secrets in , as forging a signature with such that is low-norm is equivalent to solving LWE.
- The scheme leverages rejection sampling to decouple from , with distributional bias , negligible for large enough .
- The protocol is a Fiat–Shamir with aborts transformation of a Σ-protocol for knowledge of , yielding existential unforgeability under chosen-message attack (EUF-CMA) in the random oracle model.
A successful signature forgery provides an adversary with an oracle for distinguishing LWE samples from uniform random elements, thus connecting signature forgery directly to the LWE assumption's hardness (Sengupta et al., 12 Nov 2025).
4. Concrete Parameterization and Performance
With , , for 128-bit standard LWE security:
- Public key: , , total .
- Secret key: .
- Signature: , , total .
Computation per signature involves two ring-matrix multiplications using NTT of complexity , and a single hash to . The expected number of restarts is constant (i.e., ) when , which holds for practical settings (Sengupta et al., 12 Nov 2025).
5. Comparison with Related Lattice Schemes
Relative to CRYSTALS-Dilithium:
- Bai–Galbraith omits public key compression. Dilithium compresses the tag to about $11$ bits per coefficient, while B-G uses $23$ bits per coefficient, making B-G’s public key about twice the size.
- B-G’s signature is , omitting the vector found in Dilithium, thus yielding signatures about half the length of Dilithium at the cost of larger public keys.
- Algebraically, Dilithium operates on Ring-LWE in power-of-two cyclotomics, while B-G is constructed from plain LWE in , with flexible not restricted to powers of two.
- Both attain comparable provable security under their respective hardness assumptions, with B-G proofs relying on standard LWE (not Ring-LWE), while Dilithium’s security depends on Ring-LWE, which is subject to additional ideal-lattice cryptanalysis (Sengupta et al., 12 Nov 2025).
6. Significance and Use Scenarios
The architectural choice not to compress the public key makes the Bai–Galbraith scheme suitable for environments where signature size must be minimized (e.g., high-rate, low-bandwidth signing), while the larger public key can be pre-distributed or amortized. In contrast, schemes such as Dilithium favor smaller public keys for efficient key exchange or frequent public key distribution.
The scheme’s reliance on standard LWE and simple rejection sampling ensures a conservative security profile, and the statistical properties of the output via rejection sampling render direct lattice attacks on the signature distribution ineffective. A plausible implication is that B-G's explicit LWE security basis may be preferable in scenarios where algebraic ring structures (as in Ring-LWE) are viewed as a potential weakness.
7. Connections to Code-Based Systems
The LEDAsig code-based signature scheme is characterized as "Bai–Galbraith-style" in its trapdoor structure and signing mechanism. LEDAsig replaces the lattice setting with sparse quasi-cyclic LDGM codes, analogous key generation and rejection sampling for masking trapdoor elements, and performance tuned for rapid sub-millisecond signing cycles with key sizes in the hundreds of kilobytes and signatures in the single- to tens-of-kilobyte range (Baldi et al., 2018). This suggests an architectural lineage where the B-G paradigm informs both lattice- and code-based cryptosystems for post-quantum signing.
References
- "Revisit to the Bai-Galbraith signature scheme" (Sengupta et al., 12 Nov 2025)
- "Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes" (Baldi et al., 2018)