An Efficient Batch Verifying Scheme for Detecting Illegal Signatures
نویسندگان
چکیده
In a batch verifying scheme, multiple RSA digital signatures can be verified simultaneously in just one exponential operation time. Currently, the verifier could not easily detect where the signature-verification fault was located in most schemes, if the batch verification fails. In this article, we proposed a new batch verifying multiple RSA digital signatures scheme based on a cube. The scheme can detect accurately where the signature-verification fault is located. Moreover, once the total number of signatures is fixed, the size of exponentiation operations is independent from the number of illegal signatures in our scheme. Therefore, our scheme has a better performance and higher efficiency than the previous ones. Finally, we described an extend batch verifying scheme under the condition of n-dimension.
منابع مشابه
How to Cheat Verifiers in Shao’s Batch Verifying Multiple DSA-type Digital Signatures
Batch verification can reduce large computational cost when multiple signatures are verified together. In 2001, Shao proposed an efficient algorithm for batch verifying DSA-type multiple signatures. He also provided mathematic proof to show that his scheme has the same security as the underlying DSA-type signature. In this paper, we first point out that Shao’s algorithm is insecure, and further...
متن کاملCryptanalysis of the Batch Verifying Multiple DSA-type Digital Signatures
To reduce the signature verification time, Harn proposed an efficient batch verifying multiple DSA-type digital signatures instead of verifying each individual digital signature separately. However, there is a weakness in his scheme. In this article, we present our attack to against his scheme.
متن کاملCryptanalysis of the Batch Verifying Multiple RSA Digital Signatures
Recently, Harn proposed an efficient scheme that can batch verification multiple RSA digital signatures. His scheme can reduce signature verification time. However, there is a weakness in his scheme. In this study, we present two methods to against his scheme.
متن کاملAn Efficient Identity-based Signature Scheme and Its Applications
Mapping messages or user’s identity into a point on elliptic curves is required in many pairing-based cryptographic schemes. In most of these pairing-based schemes, this requirement is realized by a special hash function called MapToPoint function. However, the efficiency of the MapToPoint function is much lower than the general hash functions. In this paper, we propose a new identity-based sig...
متن کاملSecurity Analysis of Some Batch Verifying Signatures from Pairings
Batch verification can provide large computational savings when multiple signatures are verified together. Recently, some batch verifying signature schemes have been proposed from bilinear pairings. In this paper, we show that an attacker can cheat a verifier to accept invalid signatures in these batch verifying schemes. We also show that randomized batch verification technique can be used to a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2015