2019
DOI: 10.1007/s12046-019-1142-9
|View full text |Cite
|
Sign up to set email alerts
|

A new batch verification scheme for ECDSA$$^*$$ signatures

Abstract: In this paper, we propose an efficient batch verification algorithm for ECDSA Ã (Elliptic Curve Digital Signature Algorithm) Ã signatures. Our scheme is efficient for both single and multiple signers. ECDSA Ã signature is a modified version of ECDSA, which accelerates the verification of ECDSA signature by more than 40%. However, the highlighting feature of our proposed scheme is its efficiency for varied batch sizes. The scheme is resistant to forgery attacks by either signer or intruder. The performance of o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…In their framework, security procedures for the domain and sensor were used to support both integrity and authentication. Moreover, many researchers [26][27][28][29][30] have pointed out that ECDSA is particularly appropriate for authentication and authorization schemes because it performs lightweight processes during security procedures. Many recent studies [31][32][33][34][35] have also pointed out that SHA1 suffers from collision, preimage, and second preimage attacks.…”
Section: Related Existing Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…In their framework, security procedures for the domain and sensor were used to support both integrity and authentication. Moreover, many researchers [26][27][28][29][30] have pointed out that ECDSA is particularly appropriate for authentication and authorization schemes because it performs lightweight processes during security procedures. Many recent studies [31][32][33][34][35] have also pointed out that SHA1 suffers from collision, preimage, and second preimage attacks.…”
Section: Related Existing Researchmentioning
confidence: 99%
“…Thus, REISCH provides longer network lifetime than the schemes in [78][79][80][81]. Recent research (e.g., [26][27][28][29][30]) has used different ways to improve ECDSA's procedures. However, REISCH provides better performance in terms of ECDSA's signature and verification than existing schemes (as shown in Table 6).…”
Section: Performance Comparisonmentioning
confidence: 99%
“…The base of hardness in ECC is the discrete logarithm structure of elliptic curves over finite fields [28,29], where the ECC is used to exchange keys, and to encrypt transmitted message between two parties [30][31][32]. Additionally, ECC is used to ensure the integrity of transmitted messages and non-repudiation using elliptic curve digital signature algorithms (ECDSA) [33,34]. Many schemes use ECC to secure communications, and these schemes vary depending on the type of ECC that used [35][36][37].…”
Section: Preliminary: Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
“…However, while this solution offers advancements in privacy protection, it also introduces additional computational work beyond ECDSA signing that may be prohibitive for IoT devices with limited resources. Furthermore, the use of batch ECDSA verification, as presented in [19], introduces a novel approach to authentication similar to ours but does not achieve the same performance. For instance, our system takes only 7.13 s to verify 100 signatures.…”
mentioning
confidence: 99%