A Method of Finding Bad Signatures in an RSA-Type Batch Verification

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Method of Finding Bad Signatures in an RSA-Type Batch Verification

Batch cryptography has been developed into two main branches – batch verification and batch identification. Batch verification is a method to determine whether a set of signatures contains invalid signatures, and batch identification is a method to find bad signatures if a set of signatures contains invalid signatures. Recently, some significant developments appeared in such field, especially b...

متن کامل

Efficient Identification of Bad Signatures in RSA-Type Batch Signature

As the use of electronic voting systems and e-commerce systems increases, the efficient batch verification of digital signatures becomes more and more important. In this paper, we first propose a new method to identify bad signatures in batches efficiently for the case when the batch contains one bad signature. The method can find out the bad signature using smaller number of modular multiplica...

متن کامل

Attacking LCCC Batch Verification of RSA Signatures

Batch verification of digital signatures is used to improve the computational complexity when large number of digital signatures must be verified. Lee at al. [2] proposed a new method to identify bad signatures in batches efficiently. We show that the method is flawed.

متن کامل

Batch verifying multiple RSA digital signatures

Conclusions; We propose a fully digital auto-focusing system based on novel out-of-focus blur estimation and restoration algorithms. The main advantages of the proposed PSF estimation algorithm are that it can estimate both radius and sample values of an arbitrary circularly symmetric blur, and that it does not require the DFT or a numerical optimisation process for parameter estimation. As a r...

متن کامل

Batch Verification of EdDSA Signatures

In AfricaCrypt 2012 and ACNS 2014, several algorithms are proposed for the batch verification of ECDSA signatures. In this paper, we make a comparative study of these methods for the Edwards curve digital signature algorithm (EdDSA). We describe the adaptation of Algorithms N, N′, S2′ and SP for EdDSA signatures. The randomization methods are also explained in detail. More precisely, we study s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Informatica

سال: 2011

ISSN: 0868-4952,1822-8844

DOI: 10.15388/informatica.2011.322