Proceedings of the 1st International Conference on Scalable Information Systems - InfoScale '06 2006
DOI: 10.1145/1146847.1146869
|View full text |Cite
|
Sign up to set email alerts
|

An efficient identity-based signature scheme with batch verifications

Abstract: Mapping messages or user's identity into a point on elliptic curves is required in many pairing-based cryptographic schemes. In most of these pairing-based schemes, this requirement is realized by a special hash function called MapToPoint function. However, the efficiency of the MapToPoint function is much lower than the general hash functions. In this paper, we propose a new identity-based signature (IBS) scheme without MapToPoint function, which speeds up extracting the secret key and verifying the signature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(20 citation statements)
references
References 29 publications
0
20
0
Order By: Relevance
“…As per the performance simulation results in [3,5], t a and t h(.) are quite lightweight as compared to the operations t b , t m , t H(.)…”
Section: Performance and Security Comparison Of The Improved Schemementioning
confidence: 93%
“…As per the performance simulation results in [3,5], t a and t h(.) are quite lightweight as compared to the operations t b , t m , t H(.)…”
Section: Performance and Security Comparison Of The Improved Schemementioning
confidence: 93%
“…In [24], the challenges of providing secure communication in DTNs is discussed and the use of Identity-Based Cryptography (IBC) [25] is suggested. In [26], source authentication and anonymous communication as well as message confidentiality are provided using IBC.…”
Section: Related Workmentioning
confidence: 99%
“…In the proposed scheme, the authentication mechanism for the packets generated by a specific source is provided by a Bloom filter [38] and ID-based signature (IBS) [25]. Whenever a source node sends some packets belonging to the flow that is initiated by itself, it creates a Bloom filter output from those packets, signs it using IBS, and sends it to its contacts.…”
Section: Trust Management Scheme For Dtnsmentioning
confidence: 99%
“…As we discussed in the introduction, several works (e.g., [15,16]) claim to do batch verification when, in fact, they often meet a weaker guarantee called screening [2]. However, in most cases the confusion is about words, e.g.…”
Section: Definition 1 (Batch Verification Of Signatures)mentioning
confidence: 99%