2000
DOI: 10.1007/3-540-44448-3_5
|View full text |Cite
|
Sign up to set email alerts
|

Attacking and Repairing Batch Verification Schemes

Abstract: Batch verification can provide large computational savings when several signatures, or other constructs, are verified together. Several batch verification algorithms have been published in recent years, in particular for both DSA-type and RSA signatures. We describe new attacks on several of these published schemes. A general weakness is explained which applies to almost all known batch verifiers for discrete logarithm based signature schemes. It is shown how this weakness can be eliminated given extra propert… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
71
0

Year Published

2001
2001
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(71 citation statements)
references
References 20 publications
0
71
0
Order By: Relevance
“…We list a few examples, but omit details since the techniques in this work will apply to any scheme with batch verification. RSA* is an RSA-variant with batch verification presented by Boyd and Pavlovski [6]. DSA** is a signature scheme based on DSA, given by Naccache et al [27], which uses the small exponents test from [4].…”
Section: Definition 11 ([8])mentioning
confidence: 99%
“…We list a few examples, but omit details since the techniques in this work will apply to any scheme with batch verification. RSA* is an RSA-variant with batch verification presented by Boyd and Pavlovski [6]. DSA** is a signature scheme based on DSA, given by Naccache et al [27], which uses the small exponents test from [4].…”
Section: Definition 11 ([8])mentioning
confidence: 99%
“…In 1995 Laih and Yen proposed a new method for batch verification of DSA and RSA signatures [29], but the RSA batch verifier was broken five years later by Boyd and Pavlovski [6]. In 1998 Harn presented two batch verification techniques for DSA and RSA [22,23] but both were later broken [6,25,26].…”
Section: Batch Verification Overviewmentioning
confidence: 99%
“…In 1998 Harn presented two batch verification techniques for DSA and RSA [22,23] but both were later broken [6,25,26]. The same year, Bellare, Garay and Rabin took the first systematic look at batch verification [2] and presented three generic methods for batching modular exponentiations, called the random subset test, the small exponents test and the bucket test which are similar to the ideas from [35,29].…”
Section: Batch Verification Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Batch verification, which is firstly introduced by Naccache et al [40], is used to verify multiple signatures simultaneously consuming less time than verifying total individual signatures. Successive research results have achieved improvements in terms of efficiency and security [1,3,4,5,8,9,21,27,51]. There also have been researches for batch signature schemes [22,42,53] and batch generation of exponentiations [10,39].…”
Section: Introductionmentioning
confidence: 99%