Results 211 to 220 of about 36,354 (259)
Some of the next articles are maybe not open access.
Batch Verification of EdDSA Signatures
2014In AfricaCrypt 2012 and ACNS 2014, several algorithms are proposed for the batch verification of ECDSA signatures. In this paper, we make a comparative study of these methods for the Edwards curve digital signature algorithm (EdDSA). We describe the adaptation of Algorithms N, N′, S2′ and SP for EdDSA signatures.
Sabyasachi Karati, Abhijit Das
openaire +1 more source
Improved DSA variant for batch verification
Applied Mathematics and Computation, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lin, Chu-Hsing +2 more
openaire +2 more sources
Batch Verification for Certificateless Signature Schemes
2009 International Conference on Computational Intelligence and Security, 2009Batch verification is a practical and significant technique which is very useful for greatly reducing the computational cost of verifying many signatures simultaneously. This technique is very attractive for authentications in computation-limited applications such as sensor network and banking service.
Manman Geng, Futai Zhang
openaire +1 more source
Research on Pairing-Based Batch Verification
2010 International Conference on Communications and Mobile Computing, 2010Batch verification is used in cases of verifying many signatures at the same time, for it can speedup the verification of signature significantly. It is well known that if the verifier uses batch verification to verify n different signatures, he needs to pick n exponents at random.
Xin Qin, Shaowu Zhang, Lixin Jia
openaire +1 more source
Batch Verification of ECDSA Signatures
2012In this paper, we study several algorithms for batch verification of ECDSA signatures. The first of these algorithms is based upon the naive idea of taking square roots in the underlying field. We also propose two new and efficient algorithms which replace square-root computations by symbolic manipulations.
Sabyasachi Karati +5 more
openaire +1 more source
Cryptanalysis schemes against batch verification signature
2009 Chinese Control and Decision Conference, 2009Batch verification signature is an efficient signature to generate and verify signatures for a batch of message in a single protocol. In the paper, analyses were made on the basic principles of batch verification signature, as to the security problems of present batch verification signature schemes; we presented an improved batch verification signature
openaire +1 more source
Batch Verifications with ID-Based Signatures
2005An identity (ID)-based signature scheme allows any pair of users to verify each other’s signatures without exchanging public key certificates. With the advent of Bilinear maps, several ID-based signatures based on the discrete logarithm problem have been proposed. While these signatures have an advantage in the fact that the system secret can be shared
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
openaire +1 more source
Batch Verification for Statistical Zero Knowledge Proofs
2020A statistical zero-knowledge proof (\(\mathsf {SZK}\)) for a problem \(\varPi \) enables a computationally unbounded prover to convince a polynomial-time verifier that \(x \in \varPi \) without revealing any additional information about x to the verifier, in a strong information-theoretic sense.
Kaslasi, Inbar +4 more
openaire +1 more source
Secure Certificateless Signature Scheme Supporting Batch Verification
2013 Eighth Asia Joint Conference on Information Security, 2013In this paper, we propose a secure certificate less signature scheme supporting batch verification, which makes it possible for a verifier to verify a set of signatures more efficiently than verifying them one by one. In our proposed scheme, it is impossible for PKG to produce a signature which is indistinguishable from any signature produced by a user.
Chun-I Fan +3 more
openaire +1 more source
Energy-Efficient Mobile Node in Multicast Batch Verification
SN Computer Science, 2020Conventional methods used in batch signature verification do not distinguish between static node signature verification and mobile node signature verification. Static nodes rarely face energy expenditure problem, but energy conservation is given a critical importance in mobile nodes.
R. Jagadeesha, K. Thippeswamy
openaire +1 more source

