Results 221 to 230 of about 43,933 (259)
Some of the next articles are maybe not open access.
Constructing efficient and secure batch signature schemes
Journal of Military Science and Technology, 2021In ordinary signature schemes, such as RSA, DSA, ECDSA, the signing process is performed only for a single message. Due to performance issues, in some contexts, the above solutions will become unsuitable if a party needs to sign multiple messages simultaneously. For example, in the authenticated key exchange protocols based on signatures between client
openaire +1 more source
Secure Certificateless Signature Scheme Supporting Batch Verification
2013 Eighth Asia Joint Conference on Information Security, 2013In this paper, we propose a secure certificate less signature scheme supporting batch verification, which makes it possible for a verifier to verify a set of signatures more efficiently than verifying them one by one. In our proposed scheme, it is impossible for PKG to produce a signature which is indistinguishable from any signature produced by a user.
Chun-I Fan +3 more
openaire +1 more source
Cryptanalysis of a Batch Proxy Quantum Blind Signature Scheme
International Journal of Theoretical Physics, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cai, Xiao-Qiu +2 more
openaire +1 more source
Batch verification of Digital Signatures: Approaches and challenges
Journal of Information Security and Applications, 2017Abstract Digital Signatures can be considered analogous to an ordinary handwritten signature for signing messages in the Digital world. Digital signature must be unique and exclusive for each signer. Multiple Digital Signatures signed by either single or multiple signers can be verified at once through Batch Verification.
Apurva S. Kittur, Alwyn Roshan Pais
openaire +1 more source
Trade-off between signature aggregation and batch verification
2013 36th International Conference on Telecommunications and Signal Processing (TSP), 2013The paper deals with optimization techniques of digital signatures applied in information and communication architectures. The techniques called the signature aggregation and batch verification cause two contrary benefits: small computational overhead or small communication overhead, shorter chain of signatures or faster verification process ...
Lukas Malina, Jan Hajny, Vaclav Zeman
openaire +1 more source
Efficient Identification of Bad Signatures in RSA-Type Batch Signature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2006As the use of electronic voting systems and e-commerce systems increases, the efficient batch verification of digital signatures becomes more and more important. In this paper, we first propose a new method to identify bad signatures in batches efficiently for the case when the batch contains one bad signature. The method can find out the bad signature
openaire +1 more source
Finding Invalid Signatures in Pairing-Based Batches
2007This paper describes efficient methods for finding invalid digital signatures after a batch verification has failed. We present an improvement to the basic binary "divide-and-conquer" method, which can identify an invalid signature in half the time. We also present new, efficient methods for finding invalid signatures in some pairing-based batches with
Laurie Law, Brian J. Matt
openaire +1 more source
Efficient Self-certified Signatures with Batch Verification
2012To eliminate the need of public-key certificates from Public Key Infrastructure (PKI) and the problem of key escrow in identity-based cryptography, the concept of self-certified public key was put forth by Girault. In this paper, we propose an efficient and novel self-certified signature scheme, which requires only one modular multiplication in signing
Li, Nan, Mu, Yi, Susilo, Willy
openaire +1 more source
Revocable ID-based Signature Scheme with Batch Verifications
2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012Signature scheme is one of important primitives in modern cryptography, which may offer functionalities of user identification, non-repudiation, and message authentication. With the advent of identity (ID)-based public key system (IDPKS) with bilinear pairings, many cryptographic schemes and protocols based on the IDPKS system have been proposed ...
Tsu-Yang Wu +2 more
openaire +1 more source
Performance study of online batch-based digital signature schemes
Journal of Network and Computer Applications, 2010A digital signature is an important type of authentication in a public-key (or asymmetric) cryptographic system, and it is widely used in many digital government applications. We, however, note that the performance of an Internet server computing digital signatures online is limited by the high cost of modular arithmetic.
Cheng-Fu Chou +2 more
openaire +1 more source

