|
›› 2013,Vol. 28 ›› Issue (1): 144-151.doi: 10.1007/s11390-013-1318-4
• Special Section on Selected Paper from NPC 2011 • 上一篇 下一篇
Adrian Atanasiu
Adrian Atanasiu
多重签名批验证方案可以实现多重签名的同时验证,从而比依次验证每一个签名具有更低的时间复杂度.本文,我们分析了2010年li,Hwang,和Chen提出的批验证方案的复杂度,并从两个方面提出了一个新的多重签名批验证方案:通过一个非法签名识别方案完善了Harn提出的基于RSA体制的方案,另外则适用于一个改进的椭圆曲线数字签名算法.
[1] Bellare M, Garay J A, Rabin T. Fast batch verification formodular exponentiation and digital signatures. In LectureNotes in Computer Science 1403, Nyberg K (ed.), Springer-Verlag, 1998, pp.236-250.[2] Boyd C, Pavlovski C. Attacking and repairing batch verificationschemes. In Proc. the 6th ASIACRYPT, Dec. 1976,pp.58-71.[3] Camenish J, Hohenberger S, Pedersen M. Batch verificationof short signatures. In Proc. the 26th EUROCRYPT, May2007, pp.246-263.[4] Hwang M, Lee C, Tang Y. Two simple batch verifying multipledigital signatures. In Proc. the 3rd ICICS, Nov. 2001,pp.233-237.[5] Lim C H. Efficient multi-exponentation and applicationto batch verification of digital signatures. 2000,http://dasan.sejong.ac.kr/~chlim/pub/multi exp.ps.[6] Kim K, Yie I, Lim S, Park H. A method of finding bad signaturesin an RSA-type batch verification. Informatica, 2011,22(2): 189-201.[7] Kirn K, Yie I, Lim S, Nyang D. Batch verification and findinginvalid signatures in a group signature scheme. InternationalJournal of Network Security, 2011, 13(2): 61-70.[8] Lee S, Cho S, Choi J, Cho Y. Efficient identification of bad signaturesin RSA-type batch signature. IEICE Trans. Fundamentalsof Electronics, Communications and Computer Sciences,2006, E89-A(1): 74-80.[9] Matt B. Identification of multiple invalid signatures inpairing-based batched signatures. In Proc. the 12th Int.Conf. Practice and Theory in Public Key Cryptography,March 2009, pp.337-356.[10] Bao F, Lee C, Hwang M. Cryptanalysis and improvementon batch verifying multiple RSA digital signatures. AppliedMathematics and Computation, 2006, 172(2): 1195-1200.[11] Cao T, Lin D, Xue R. Security analysis of some batch verifyingsignatures from pairings. International Journal of NetworkSecurity, 2006, 3(2): 138-143.[12] Hwang M, Lin I, Hwang K. Cryptanalysis of the batch verifyingmultiple RSA digital signatures. Informatica (LithuanianAcademy of Sciences), 2000, 11(1): 15-19.[13] Lim C, Lee P. Security of interactive DSA batch verification.Electronics Letters, 1994, 30(19): 1592-1593.[14] Selvi S S D, Vivek S S, Shriram J et al. Securityanalysis of aggregate signature and batch verification signatureschemes. IACR Crptology ePrint Archive, 2009,http://eprint.iacr.org/2009/290.pdf.[15] Stanek M. Attacking LCCC batch verification of RSAsignatures. IACR Cryptology ePrint Archive, 2006,http://eprint.iacr.org/2006/111.pdf.[16] Ferrara A, Green M, Hohenberger S, Pedersen M.On the practicality of short signature batch verification.IACR Cryptology ePrint Archive, 2008,http://eprint.iacr.org/2008/015.pdf.[17] Cheon J H, Kim Y, Yoon H J. A new ID-based signaturewith batch verification. Cryptology ePrint Archive, 2004,http://eprint.iacr.org/2004/131.pdf.[18] Cui S, Duan P, Chan C W. An efficient identity-based signaturescheme with batch verifications. In Proc. the 1st InfoScale,May 29-June 1, 2006, Article No.22.[19] Yoon H, Cheon J H, Kim Y. Batch verifications with ID-basedsignatures. In Proc. the 7th ICISC, Dec. 2004, pp.233-248.[20] Tzeng S, Lee C, Hwang M. A batch verification for multipleproxy signature. Parallel Processing Letters, 2011, 21(1):77-84.[21] Zhang C, Ho P, Tapolcai J. On batch verification with grouptesting for vehicular communications. Wireless Network,2011, 17(8): 1851-1865.[22] Changchien S W, Hwang M. A batch verifying and detectingmultiple RSA digital signatures. International Journalof Computational and Numerical Analysis and Applications,2002, 2(3): 303-307.[23] Fiat A. Batch RSA. In Proc. the 9th CRYPTO, August 1989,pp.175-185.[24] Harn L. Batch verifying multiple RSA digital signatures.Electronics Letters, 1998, 34(12): 1219-1220.[25] Harn L. Batch verifying multiple DSA digital signatures.Electronics Letters, 1998, 34(9): 870-871.[26] Li C, Hwang M, Chen S. A batch verifying and detecting theillegal signatures. International Journal of Innovative Computing,Information and Control, 2010, 6(12): 5311-5320.[27] Stinton D. Cryptography Theory and Practice (2nd edition).Chapman & Hall/CRC, 2002.[28] Cohen H, Frey G. Handbook of Elliptic and HyperellipticCurve Cryptography (Discrete Mathematics and Its Applications).Chapman & Hall/CRC, 2005.[29] Hankerson D, Menezes A, Vanstome S. Guide to EllipticCurve Criptography. Springer Verlag, 2004. |
No related articles found! |
|
版权所有 © 《计算机科学技术学报》编辑部 本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn 总访问量: |