SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Adrian Atanasiu. A New Batch Verifying Scheme for Identifying Illegal Signatures[J]. Journal of Computer Science and Technology, 2013, 28(1): 144-151. DOI: 10.1007/s11390-013-1318-4 |
[1] |
Bellare M, Garay J A, Rabin T. Fast batch verification formodular exponentiation and digital signatures. In LectureNotes in Computer Science 1403, Nyberg K (ed.), Springer-Verlag, 1998, pp.236-250.
|
[2] |
Boyd C, Pavlovski C. Attacking and repairing batch verificationschemes. In Proc. the 6th ASIACRYPT, Dec. 1976,pp.58-71.
|
[3] |
Camenish J, Hohenberger S, Pedersen M. Batch verificationof short signatures. In Proc. the 26th EUROCRYPT, May2007, pp.246-263.
|
[4] |
Hwang M, Lee C, Tang Y. Two simple batch verifying multipledigital signatures. In Proc. the 3rd ICICS, Nov. 2001,pp.233-237.
|
[5] |
Lim C H. Efficient multi-exponentation and applicationto batch verification of digital signatures. 2000,http://dasan.sejong.ac.kr/~chlim/pub/multi exp.ps.
|
[6] |
Kim K, Yie I, Lim S, Park H. A method of finding bad signaturesin an RSA-type batch verification. Informatica, 2011,22(2): 189-201.
|
[7] |
Kirn K, Yie I, Lim S, Nyang D. Batch verification and findinginvalid signatures in a group signature scheme. InternationalJournal of Network Security, 2011, 13(2): 61-70.
|
[8] |
Lee S, Cho S, Choi J, Cho Y. Efficient identification of bad signaturesin RSA-type batch signature. IEICE Trans. Fundamentalsof Electronics, Communications and Computer Sciences,2006, E89-A(1): 74-80.
|
[9] |
Matt B. Identification of multiple invalid signatures inpairing-based batched signatures. In Proc. the 12th Int.Conf. Practice and Theory in Public Key Cryptography,March 2009, pp.337-356.
|
[10] |
Bao F, Lee C, Hwang M. Cryptanalysis and improvementon batch verifying multiple RSA digital signatures. AppliedMathematics and Computation, 2006, 172(2): 1195-1200.
|
[11] |
Cao T, Lin D, Xue R. Security analysis of some batch verifyingsignatures from pairings. International Journal of NetworkSecurity, 2006, 3(2): 138-143.
|
[12] |
Hwang M, Lin I, Hwang K. Cryptanalysis of the batch verifyingmultiple RSA digital signatures. Informatica (LithuanianAcademy of Sciences), 2000, 11(1): 15-19.
|
[13] |
Lim C, Lee P. Security of interactive DSA batch verification.Electronics Letters, 1994, 30(19): 1592-1593.
|
[14] |
Selvi S S D, Vivek S S, Shriram J et al. Securityanalysis of aggregate signature and batch verification signatureschemes. IACR Crptology ePrint Archive, 2009,http://eprint.iacr.org/2009/290.pdf.
|
[15] |
Stanek M. Attacking LCCC batch verification of RSAsignatures. IACR Cryptology ePrint Archive, 2006,http://eprint.iacr.org/2006/111.pdf.
|
[16] |
Ferrara A, Green M, Hohenberger S, Pedersen M.On the practicality of short signature batch verification.IACR Cryptology ePrint Archive, 2008,http://eprint.iacr.org/2008/015.pdf.
|
[17] |
Cheon J H, Kim Y, Yoon H J. A new ID-based signaturewith batch verification. Cryptology ePrint Archive, 2004,http://eprint.iacr.org/2004/131.pdf.
|
[18] |
Cui S, Duan P, Chan C W. An efficient identity-based signaturescheme with batch verifications. In Proc. the 1st InfoScale,May 29-June 1, 2006, Article No.22.
|
[19] |
Yoon H, Cheon J H, Kim Y. Batch verifications with ID-basedsignatures. In Proc. the 7th ICISC, Dec. 2004, pp.233-248.
|
[20] |
Tzeng S, Lee C, Hwang M. A batch verification for multipleproxy signature. Parallel Processing Letters, 2011, 21(1):77-84.
|
[21] |
Zhang C, Ho P, Tapolcai J. On batch verification with grouptesting for vehicular communications. Wireless Network,2011, 17(8): 1851-1865.
|
[22] |
Changchien S W, Hwang M. A batch verifying and detectingmultiple RSA digital signatures. International Journalof Computational and Numerical Analysis and Applications,2002, 2(3): 303-307.
|
[23] |
Fiat A. Batch RSA. In Proc. the 9th CRYPTO, August 1989,pp.175-185.
|
[24] |
Harn L. Batch verifying multiple RSA digital signatures.Electronics Letters, 1998, 34(12): 1219-1220.
|
[25] |
Harn L. Batch verifying multiple DSA digital signatures.Electronics Letters, 1998, 34(9): 870-871.
|
[26] |
Li C, Hwang M, Chen S. A batch verifying and detecting theillegal signatures. International Journal of Innovative Computing,Information and Control, 2010, 6(12): 5311-5320.
|
[27] |
Stinton D. Cryptography Theory and Practice (2nd edition).Chapman & Hall/CRC, 2002.
|
[28] |
Cohen H, Frey G. Handbook of Elliptic and HyperellipticCurve Cryptography (Discrete Mathematics and Its Applications).Chapman & Hall/CRC, 2005.
|
[29] |
Hankerson D, Menezes A, Vanstome S. Guide to EllipticCurve Criptography. Springer Verlag, 2004.
|